Abstract:
PROBLEM TO BE SOLVED: To reduce cost by providing a function of re-generating one or more specific cryptographic keys, since an information processing system uses one or more cryptographic keys to encrypt/decrypt information, but when these keys are large keys (e.g., a pair of RSA keys of 2,048 bits), storage of the keys in a storage device increases the cost per system.SOLUTION: A method of cryptographic key generation makes use of a stored input value and a stored count value. A processor 100 includes a nonvolatile storage 140 storing an input value and a counted value, and a logic 122 to generate a cryptographic key, based on the stored input value and the stored counted value, and generates the cryptographic key.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for providing encryption, integrity, and anti-replay protection of data in a fault tolerant manner. SOLUTION: A data blob and an anti-replay table blob are copied to a temporary storage area in a nonvolatile memory. In an atomic operation, a status indicator is set and a monotonic counter is incremented after the data blob and the anti-replay table blob are copied to the temporary storage area. If a fault occurs while the status indicator is set, the data blob and the anti-replay table blob may be recovered from the temporary storage area. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
According to some embodiments, a method for providing encryption, integrity, and anti-replay protection of data in a fault tolerant manner is disclosed. A data blob and an anti-replay table blob are copied to a temporary storage region in a non-volatile memory. In an atomic operation, a status indicator is set and a monotonic counter is incremented after the data blob and the anti-replay table blob are copied to the temporary storage region. If a fault occurs while the status indicator is set, the data blob and the anti-replay table blob may be recovered from the temporary storage region.
Abstract:
In einer Ausführungsform umfasst eine Vorrichtung einen ersten Prozessor, um einen ersten kryptografischen Schlüssel ansprechend auf eine Anforderung von einer Software-Anwendung zu generieren; einen zweiten kryptografischen Schlüssel zu empfangen, der von einem zweiten Prozessor generiert wird; den ersten kryptografischen Schlüssel unter Verwendung des zweiten kryptografischen Schlüssels zu verschlüsseln; und den verschlüsselten ersten kryptografischen Schlüssel für die Verwendung durch die Software-Anwendung zu liefern.
Abstract:
A method and apparatus for storing and protecting a restore environment is provided. The restore environment is stored in a redundant array of independent disks (RAID) volume which is hidden from an operating system during runtime operations. Upon detecting that a restore operation is required due to a corrupted or missing image, the RAID volume storing the restore environment is dynamically exposed so that it can be accessed by the restore operation.
Abstract:
In some embodiments an embedded processor is to participate in cryptographic key exchange with an audio software application, and a key exchange communication path is coupled between the audio software application and the embedded processor. Other embodiments are described and claimed.
Abstract:
Encoded data decoding techniques. A data decoding agent determines a data segment size for a packet that includes a header and a data segment. The data decoding agent determines a segment end location based, at least in part, on the data segment size. The data decoding agent processes subblocks of data from the data segment. The data decoding agent compares a current location to the segment end location to determine if a current subblock of data from the data segments contains the segment end location. The data decoding agent triggers an exception handler if the current subblock contains the segment end location.
Abstract:
A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software.
Abstract:
The architecture and techniques described herein can improve system performance with respect to the following. Communication between two interdependent hardware engines, that are part of pipeline, such that the engines are synchronized to consume resources when the engines are done with the work. Reduction of the role of software/firmware from feeding each stage of the hardware pipeline when the previous stage of the pipeline has completed. Reduction in the memory allocation for software-initialized hardware descriptors to improve performance by reducing pipeline stalls due to software interaction.
Abstract:
An apparatus for secured playback is presented. In one embodiment, the apparatus includes a controller that includes a key derivation module to manage authentication and key derivation. In one embodiment, the apparatus provides a video decryption key to a graphics engine if video data portions in a data stream are retrievable without having to decrypt the data stream. In one embodiment, the apparatus also includes a decryption module to decrypt a part of data in conjunction with an encryption key to generate video information and video data. The controller then writes an encrypted version of the video data to a video buffer of a graphics engine.