Abstract:
PROBLEM TO BE SOLVED: To provide a method for controlling access to data stored at a plurality of storage devices associated with the first platform. SOLUTION: A step of authenticating a user to access the first platform is provided. The first platform includes the first and second storage devices 180 and 172, a chipset encryption hardware 150 and memory. Data stored on the storage devices are encrypted, wherein the first data stored on the first storage device 180 is encrypted by the chipset encryption hardware, and the second data stored on the second storage device 172 is encrypted by another encryption mechanism. The data are decrypted and the user is allowed to access the first data and the second data. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for enterprise network single-sign-on by a manageability engine. SOLUTION: A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has successfully authenticated to the PC. The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK). The KEK may later be used by the PC to obtain a credential used to establish secure access to Enterprise servers. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for enterprise network single-sign-on by a manageability engine.SOLUTION: A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user is already successfully authenticated as a true user to a personal computer (PC). The KDC supplies the ME with single-sign-on credentials in the form of a key encryption key (KEK). The KEK may later be used by the PC to obtain a credential used to establish secure access to enterprise servers.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for controlling access to data stored at a plurality of storage devices associated with a first platform.SOLUTION: The method comprises a step of authenticating a user to access a first platform. The first platform includes first and second storage devices 180 and 172, chipset encryption hardware 150, and a memory. Data stored in the storage devices are encrypted. First data stored in the first storage device 180 is encrypted by the chipset encryption hardware, and second data stored in the second storage device 172 is encrypted by another encryption mechanism. The data are decrypted and the user is allowed to access the first data and the second data.
Abstract:
A credential management device has a protected domain and a credential manager to perform credential transactions. A credential transaction may comprise determining if a platform is operating in a trusted mode and releasing an operation credential if the platform is operating in a trusted mode. A credential transaction may comprise validating incoming credentials from other platforms.
Abstract:
In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.
Abstract:
Various embodiments are generally directed to an apparatus, method and other techniques generating one or more polynomial elements for a polynomial function using a node value of a pseudo random number generator tree as a seed value, the polynomial function comprising a secret value and the polynomial elements, and the pseudo random number generator tree at least partially matching at least one other pseudo random number generator tree on another device, generating a plurality of share values based on the one or more polynomial elements and the polynomial function and distributing a share value of the plurality of share values to a device.
Abstract:
Hiermit werden Vorrichtungen, Verfahren und Speichermedien offenbart, die mit Standortnachweis in Verbindung stehen. In einigen Ausführungsformen kann eine Vorrichtung eine Kommunikationsschaltung, die konfiguriert ist, um mit einem oder mehreren externen Servern zu kommunizieren, die gemeinsam einen Distributed Ledger für Endgerät-Nahbereichsaufzeichnungen hosten, und eine Versendungsschaltung beinhalten, die konfiguriert ist, um Aufzeichnungen des Teilens einer Nahbereichsaufzeichnung der Vorrichtung mit einer oder mehreren anderen, in der Nähe der Vorrichtung befindlichen Vorrichtung (en) sowie Aufzeichnungen des Erhalts von Nahbereichsaufzeichnungen der anderen, in der Nähe befindlichen Vorrichtungen von den anderen, in der Nähe befindlichen Vorrichtungen an den Distributed Ledger zu versenden. Die an den Distributed Ledger versendeten Nahbereichsaufzeichnungen können verwendet werden, um den Standort der Vorrichtung nachzuweisen. Darüber hinaus werden auch andere Ausführungsformen offenbart, die einen teilnehmenden Hostserver eines Distributed Ledgers oder einen Server eines Produkt-/Dienstanbieters beinhalten.
Abstract:
In a processor based system comprising a plurality of logical machines, selecting a logical machine of the system to serve as a host; the host communicating with a policy decision point (PDP) of a network to provision a data channel interconnecting the processor based system and the network and to provision a logical data channel interconnecting each logical machine of the system to the network.
Abstract:
A credential management device has a protected domain and a credential manager to perform credential transactions. A credential transaction may comprise determining if a platform is operating in a trusted mode and releasing an operation credential if the platform is operating in a trusted mode. A credential transaction may comprise validating incoming credentials from other platforms.