Abstract:
PROBLEM TO BE SOLVED: To provide efficient software distribution and update service regardless of the state or physical location of a computer even if the computer has already been shipped and is in use. SOLUTION: The software distribution service SDS 20 queries a third party data store 3PDS and connects to a server 14, and downloads and installs a software client 18 or a barebones installer for the update software. The SDS verifies the downloaded package with the client 18 using a hash value stored in the 3PDS, as indicated in block 36. The SDS or the update server 14 (for example, a gateway 16) marks the appropriate region in the 3PDS with a flag, indicating that no further download is needed and that the download has been completed. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To use hardware to remotely provide a platform with a bus device ID, as well as software updates, software, and drivers. SOLUTION: A management engine may be used to trap configuration cycles during a boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provide software to the platform even when the operating system is corrupted or non-functional. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To solve the problem that conventional PCR bindings can yield very rigid protection of data, where any change to the software that executes on the system results in the inability to access the data. SOLUTION: This disclosure describes methods for using the TPM's configuration binding capabilities to lock data to a configuration in a manner that is flexible enough to allow the software in that configuration to be upgraded, under a trusted upgrade service, without causing the processing system to lose access to the data. Additionally, a processing system can provide for recovery of data when the processing system is no longer able to get into the predefined safe and approved configuration, e.g., recovery from a failed upgrade is allowed. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
This application is directed to trusted platform module certification and attestation utilizing an anonymous key system. In general, TPM certification and TPM attestation may be supported in a device utilizing integrated TPM through the use of anonymous key system (AKS) certification. An example device may comprise at least combined AKS and TPM resources that load AKS and TPM firmware (FW) into a runtime environment that may further include at least an operating system (OS) encryption module, an AKS service module and a TPM Certification and Attestation (CA) module. For TPM certification, the CA module may interact with the other modules in the runtime environment to generate a TPM certificate, signed by an AKS certificate, that may be transmitted to a certification platform for validation. For TPM attestation, the CA module may cause TPM credentials to be provided to the attestation platform for validation along with the TPM and/or AKS certificates.
Abstract:
Various embodiments are generally directed to techniques for supporting the distributed execution of a task routine among multiple secure controllers incorporated into multiple computing devices. An apparatus includes a first processor component and first secure controller of a first computing device, where the first secure controller includes: a selection component to select the first secure controller or a second secure controller of a second computing device to compile a task routine based on a comparison of required resources to compile the task routine and available resources of the first secure controller; and a compiling component to compile the task routine into a first version of compiled routine for execution within the first secure controller by the first processor component and a second version for execution within the second secure controller by a second processor component in response to selection of the first secure controller. Other embodiments are described and claimed.
Abstract:
A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers.
Abstract:
Apparatus, systems, and/or methods to temporally and spatially bound personal information. A pseudo random number corresponding to time based on a random number time seed and generate a pseudo random number corresponding to location based on a random number location seed may be generated. In addition, the pseudo random number corresponding to time may be mixed with the pseudo random number corresponding to location to generate a combined pseudo random number corresponding to a specific user at a specific location at a specific time. The combined pseudo random number may be used to store and/or read personal information in an anonymous manner.
Abstract:
In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed.
Abstract:
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.