Abstract:
PURPOSE: A platform based verification of contents of input/output devices for deleting an infected part is provided to supply an alarm about the infected parts by verifying the contents of I/O device. CONSTITUTION: A platform hardware receives an interruption from I/O(Input/Output) device(210). The platform hardware detects the contents of the I/O device before the contents of the I/O device is exposed to a host OS(Operating System)(250). If there are the infected parts, the platform hardware offers the emergency signal to a user or the platform hardware deletes the infected parts(280).
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a device, and a system, which can continuously and dynamically distribute symmetric keys from a dedicated key distribution server to each client on the Internet.SOLUTION: A method comprises: a step for receiving measured health information from a client 100 on a key distribution server 124; a step for validating the measured health information on the server; a step for sending a session key to the client on the server when the measured health information is validated; and a step for initiating encrypted and authenticated connection with an application server 106 in a domain 102 using the session key, on the client, when the client receives the session key.
Abstract:
PROBLEM TO BE SOLVED: To construct a system for achieving both end-to-end security and traffic visibility. SOLUTION: Both end-to-end security and traffic visibility can be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes derivation key to information technology monitoring devices and a server to provide traffic visibility. Furthermore, a client key and a client identifier can also be used so that end-to-end security can be achieved. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To delete a file infected with malware/worm/virus of an input-output device. SOLUTION: A platform includes platform hardware 150, which may verify the contents of the I/O device 190-N. The platform hardware 150 may include components such as a manageability engine 340 and a verification engine that are used to verify the contents of the I/O 190-N device even before the contents of the I/O device 190-N are exposed to an operating system 120 supported by a host. The platform components may delete the infected portions of the contents of I/O device 190-N if the verification process indicates that the contents of the I/O device 190-N include the infected portions. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To achieve end-to-end security with traffic visibility. SOLUTION: A combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag by using an authentication key, in parallel with the generation of the cipher text using an encryption key, where the authentication key and the encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in an AES-GMAC mode. Using a two key, single-pass combined mode algorithm preserves network performance by using a limited number of HW gates, while allowing an intermediate device to access to the encryption key for deciphering the data, without having to provide to that device the ability to compromise data integrity, which is preserved between the end to end devices. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method, device and system, which can continuously and dynamically distributes symmetric keys from a dedicated key distribution server to clients across the Internet. SOLUTION: The disclosed method includes the steps of: receiving measured health information from a client on a key distribution server; validating the measured health information on the server; sending a session key to the client on the server when the measured health information is validated; and on a client, when the client receives the session key, initiating an encrypted and authenticated connection with an application server in the domain using the session key. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits. An integrity action may be implemented, for example, when the unencrypted data includes a random distribution of the plurality of bits.
Abstract:
An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a server in a second domain. The channel may include a first and second domain sessions in the first and second domains. The circuitry may generate first and second domain session keys that may encrypt, at least in part, respectively, the first and second domain sessions. The first domain session key may be generated based upon a first domain key assigned to the first domain and a first data set associated with the first domain session. The second domain session key may be generated based upon a second domain key assigned to the second domain and a second data set associated with the second domain session.
Abstract:
In one embodiment, the present invention includes a system on a chip (SoC) that has a first agent with an intellectual property (IP) logic, an interface to a fabric including a target interface, a master interface and a sideband interface, and an access control plug-in unit to handle access control policy for the first agent with respect to incoming and outgoing transactions. This access control plug-in unit can be incorporated into the SoC at integration time and without any modification to the IP logic. Other embodiments are described and claimed.