DEMAND BASED USB PROXY FOR DATA STORES IN SERVICE PROCESSOR COMPLEX
    2.
    发明申请
    DEMAND BASED USB PROXY FOR DATA STORES IN SERVICE PROCESSOR COMPLEX 审中-公开
    数据存储在服务处理器复合中的基于需求的USB代码

    公开(公告)号:WO2012045038A1

    公开(公告)日:2012-04-05

    申请号:PCT/US2011/054419

    申请日:2011-09-30

    CPC classification number: G06F13/105 G06F9/4812 G06F21/572 G06F2221/2105

    Abstract: A method, apparatus, system, and computer program product for secure server system management. A payload containing system software and/or firmware updates is distributed in an on-demand, secure I/O operation. The I/O operation is performed via a secured communication channel inaccessible by the server operating system to an emulated USB drive. The secure communication channel can be established for the I/O operation only after authenticating the recipient of the payload, and the payload can be protected from access by a potentially-infected server operating system. Furthermore, the payload can be delivered on demand rather than relying on a BIOS update schedule, and the payload can be delivered at speeds of a write operation to a USB drive.

    Abstract translation: 一种用于安全服务器系统管理的方法,设备,系统和计算机程序产品。 包含系统软件和/或固件更新的有效载荷以按需安全I / O操作分发。 I / O操作通过服务器操作系统无法访问到模拟USB驱动器的安全通信通道执行。 只有在验证有效负载的收件人之后,才能为I / O操作建立安全通信通道,并且可以保护有效负载免受潜在感染的服务器操作系统的访问。 此外,有效载荷可以按需传送,而不是依赖于BIOS更新计划,并且有效载荷可以以写入操作的速度传送到USB驱动器。

    METHOD TO ENSURE PLATFORM SILICON CONFIGURATION INTEGRITY
    3.
    发明申请
    METHOD TO ENSURE PLATFORM SILICON CONFIGURATION INTEGRITY 审中-公开
    确保平台硅配置完整性的方法

    公开(公告)号:WO2012040675A2

    公开(公告)日:2012-03-29

    申请号:PCT/US2011/053165

    申请日:2011-09-24

    CPC classification number: G06F9/4401 G06F21/575 G06F2221/2153

    Abstract: Some aspects include beginning a power on self test (POST) by a BIOS for a computer system; enumerating the computer system by the BIOS; providing, based on the enumeration of the computer system by the BIOS, at least one configuration setting of the computer system to a management engine (ME) of the computer system; and applying a lock to the at least one configuration setting by the ME to manage a change to the at least one configuration setting, all prior to an ending of the POST.

    Abstract translation: 某些方面包括由计算机系统的BIOS启动开机自检(POST); 通过BIOS列举计算机系统; 基于由计算机系统BIOS列举的计算机系统,将计算机系统的至少一个配置设置提供给计算机系统的管理引擎(ME); 以及由ME在至少一个配置设置上应用锁以管理对至少一个配置设置的改变,全部在POST结束之前。

    MULTINODE HUBS FOR TRUSTED COMPUTING
    4.
    发明申请
    MULTINODE HUBS FOR TRUSTED COMPUTING 审中-公开
    用于信用计算的MULTINODE HUBS

    公开(公告)号:WO2015147986A1

    公开(公告)日:2015-10-01

    申请号:PCT/US2015/013942

    申请日:2015-01-30

    Abstract: Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a trapping module, and a trusted platform module (TPM) component. Each memory region may be associated with and receive trust operation data from a coherent computing node. The trapping module may generate trap notifications in response to accesses to the plurality of memory regions by the associated coherent computing nodes. The trap notifications may indicate which of the plurality of memory locations has been accessed, and the TPM component may process the trust operation data in a memory region indicated by a trap notification. Other embodiments may be disclosed and/or claimed.

    Abstract translation: 本文公开了用于信任操作的多节点集线器的实施例。 在一些实施例中,多节点集线器可以包括多个存储器区域,陷阱模块和可信平台模块(TPM)组件。 每个存储器区域可以与相干计算节点相关联并接收来自相干计算节点的信任操作数据。 捕获模块可以响应于相关联的相干计算节点对多个存储器区域的访问而产生陷阱通知。 陷阱通知可以指示已经访问了多个存储器位置中的哪一个,并且TPM组件可以处理由陷阱通知指示的存储器区域中的信任操作数据。 可以公开和/或要求保护其他实施例。

    METHOD, SYSTEM AND APPARATUS FOR REGION ACCESS CONTROL
    5.
    发明申请
    METHOD, SYSTEM AND APPARATUS FOR REGION ACCESS CONTROL 审中-公开
    方法,用于区域访问控制的系统和设备

    公开(公告)号:WO2013048487A1

    公开(公告)日:2013-04-04

    申请号:PCT/US2011/054409

    申请日:2011-09-30

    Abstract: Techniques and mechanisms for providing access to a storage device of a computer platform. In an embodiment, an agent executing on the platform may be registered for access to the storage device, the agent being allocated a memory space by a host operating system of the platform. Registration of the agent may result in a location in the allocated memory space being mapped to a location in the storage device. In another embodiment, the agent may write to the location in the allocated memory space to request access to the storage device, wherein the request is independent of any system call to the host OS which describes the requested access.

    Abstract translation: 用于提供对计算机平台的存储设备的访问的技术和机制。 在一个实施例中,可以登记在平台上执行的代理以访问存储设备,代理由平台的主机操作系统分配存储空间。 代理的注册可能导致分配的存储器空间中的位置被映射到存储设备中的位置。 在另一个实施例中,代理可以写入分配的存储器空间中的位置以请求对存储设备的访问,其中该请求独立于描述所请求的访问的对主机OS的任何系统调用。

    PROVIDING FAST NON-VOLATILE STORAGE IN A SECURE ENVIRONMENT
    6.
    发明申请
    PROVIDING FAST NON-VOLATILE STORAGE IN A SECURE ENVIRONMENT 审中-公开
    在安全的环境中提供快速的非易失性存储

    公开(公告)号:WO2012018889A2

    公开(公告)日:2012-02-09

    申请号:PCT/US2011/046380

    申请日:2011-08-03

    Abstract: In one embodiment, a peripheral controller coupled to a processor can include a storage controller. This storage controller can control access to a non-volatile storage coupled to the peripheral controller. The storage may include both secure and open partitions, and the storage controller can enable access to the secure partition only when the processor is in a secure mode. In turn, during unsecure operation such as third party code execution, visibility of the secure partition can be prevented. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,耦合到处理器的外围控制器可以包括存储控制器。 该存储控制器可以控制对耦合到外围控制器的非易失性存储器的访问。 存储器可以包括安全和打开的分区,并且只有当处理器处于安全模式时,存储控制器才能够访问安全分区。 反过来,在诸如第三方代码执行的不安全操作期间,可以防止安全分区的可见性。 描述和要求保护其他实施例。

    METHODS AND APPARATUS TO PROTECT SEGMENTS OF MEMORY
    7.
    发明申请
    METHODS AND APPARATUS TO PROTECT SEGMENTS OF MEMORY 审中-公开
    保护记忆片段的方法和装置

    公开(公告)号:WO2012018529A2

    公开(公告)日:2012-02-09

    申请号:PCT/US2011/044744

    申请日:2011-07-20

    CPC classification number: G06F11/004 G06F11/1008

    Abstract: Methods and apparatus to protect segments of memory are disclosed herein. An example method includes intercepting an interrupt request indicating an error; determining whether a first segment of memory is corrupt, the first segment of memory being designated as a protected region of memory; when the protected region of memory is corrupt, repairing the corrupted region of memory using a parity block of code; and in response to validating the protected region of memory, generating an interrupt enabling a utilization of code stored in the protected region of memory to handle the error associated with the interrupt request.

    Abstract translation: 本文公开了保护存储器段的方法和装置。 示例方法包括拦截指示错误的中断请求; 确定第一存储段是否被破坏,所述第一存储段被指定为存储器的受保护区域; 当存储器的受保护区域被破坏时,使用奇偶校验码块修复已损坏的存储器区域; 并且响应于验证存储器的受保护区域,产生中断,使得能够利用存储在存储器的受保护区域中的代码来处理与中断请求相关联的错误。

    FIRMWARE INTERFACE WITH DURABLE MEMORY STORAGE
    8.
    发明申请
    FIRMWARE INTERFACE WITH DURABLE MEMORY STORAGE 审中-公开
    具有耐用存储器的固件接口

    公开(公告)号:WO2015199830A1

    公开(公告)日:2015-12-30

    申请号:PCT/US2015/030700

    申请日:2015-05-14

    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for a Unified Extensible Firmware Interface (UEFI) with durable storage to provide memory write persistence, for example, in the event of power loss. The system may include a processor to host the firmware interface which may be configured to control access to system variables in a protected region of a volatile memory. The system may also include a power management circuit to provide power to the processor and further to provide a power loss indicator to the firmware interface. The system may also include a reserve energy storage module to provide power to the processor in response to the power loss indicator. The firmware interface is further configured to copy the system variables from the volatile memory to a non-volatile memory in response to the power loss indicator.

    Abstract translation: 通常,本公开提供了用于具有耐用存储器的统一可扩展固件接口(UEFI)的系统,设备,方法和计算机可读介质,以提供例如在电力丢失的情况下的存储器写持续性。 该系统可以包括用于托管固件接口的处理器,其可被配置为控制对易失性存储器的受保护区域中的系统变量的访问。 该系统还可以包括电源管理电路,以向处理器提供电力,并进一步向固件接口提供功率损耗指示符。 系统还可以包括备用能量存储模块,以响应于功率损耗指示器向处理器提供电力。 固件接口还被配置为响应于功率损耗指示器将系统变量从易失性存储器复制到非易失性存储器。

    INITIALIZATION TRACE OF A COMPUTING DEVICE
    9.
    发明申请
    INITIALIZATION TRACE OF A COMPUTING DEVICE 审中-公开
    计算设备的初始化跟踪

    公开(公告)号:WO2015147981A1

    公开(公告)日:2015-10-01

    申请号:PCT/US2015/013317

    申请日:2015-01-28

    Abstract: Platform controller, computer-readable storage media, and methods associated with initialization of a computing device. In embodiments, a platform controller may comprise a boot controller and one or more non-volatile memory modules, coupled with the boot controller. In embodiments, the one or more non-volatile memory modules may have first and second instructions stored thereon. The first instructions may, when executed by a processor of a computing device hosting the platform controller, initialize the computing device. The second instructions, when executed by the boot controller, may cause the boot controller to monitor at least a portion of the execution of the first instructions by the computing device and may generate a trace of the monitored portion of the execution of the first instructions. In embodiments, the trace may be stored in the one or more non-volatile memory modules. Other embodiments may be described and/or claimed.

    Abstract translation: 平台控制器,计算机可读存储介质以及与计算设备的初始化相关联的方法。 在实施例中,平台控制器可以包括与引导控制器耦合的引导控制器和一个或多个非易失性存储器模块。 在实施例中,一个或多个非易失性存储器模块可以具有存储在其上的第一和第二指令。 当由托管平台控制器的计算设备的处理器执行时,第一指令可以初始化计算设备。 第二指令在由引导控制器执行时可能导致引导控制器监视计算设备执行第一指令的至少一部分,并且可以生成第一指令的执行的监视部分的跟踪。 在实施例中,迹线可以存储在一个或多个非易失性存储器模块中。 可以描述和/或要求保护其他实施例。

Patent Agency Ranking