会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明申请
    • MANAGEABILITY ENGINE AND AUTOMATIC FIRMWARE VALIDATION
    • WO2019119408A1
    • 2019-06-27
    • PCT/CN2017/117970
    • 2017-12-22
    • INTEL CORPORATIONYAO, JiewenZIMMER, Vincent J.
    • YAO, JiewenZIMMER, Vincent J.
    • G06F9/445
    • Malicious attacks have moved from higher level virus attacks on software and data files operating on a device, to subverting the firmware underlying the device, where the firmware will compromise operation of the device even after attempts to remove the virus, unwanted programs, or other activity due to the subversion. If the firmware is compromised then even a clean reinstall of all software and/or services on the device may only result in a clean device that is then subsequently compromised again. Although device manufacturers may update a firmware to remove the vulnerability, there remains a problem in getting users to actually perform the update. To facilitate device security, a database or databases of firmware may be maintained where their status of vulnerable (bad) or not (good) is maintained and various options are presented for scanning firmware for vulnerabilities, out of band or manually, and pulling/pushing updates as desired to automatically update a device or prompt a user for updating. Updates may be mandatory per a policy and/or controlled by user preference. Looking for vulnerabilities may be device driven, or managed by an external entity. As new vulnerabilities are discovered, existing firmware may be checked for the vulnerability, and if found, devices having vulnerable firmware may be updated. New firmware may be recorded in the database (s) and the database (s) periodically scanned for vulnerabilities.
    • 9. 发明申请
    • TECHNIQUES FOR COORDINATING DEVICE BOOT SECURITY
    • 协调设备引导安全的技术
    • WO2017107122A1
    • 2017-06-29
    • PCT/CN2015/098651
    • 2015-12-24
    • INTEL CORPORATIONYAO, JiewenZIMMER, Vincent J.LI, WeiPOORNACHANDRAN, RajeshMUDUSURU, Giri P.
    • YAO, JiewenZIMMER, Vincent J.LI, WeiPOORNACHANDRAN, RajeshMUDUSURU, Giri P.
    • G06F21/57
    • G06F21/57G06F21/575
    • Techniques for providing and maintaining protection of firmware routines that form part of a chain of trust through successive processing environments. An apparatus may include a first processor component (550); a volatile storage (562) coupled to the first processor component; an enclave component to, in a pre-OS operating environment, generate a secure enclave within a portion of the volatile storage to restrict access to a secured firmware loaded into the secure enclave; a first firmware driver (646) to, in the pre-OS operating environment, provide a first API to enable unsecured firmware to call a support routine of the secured firmware from outside the secure enclave; and a second firmware driver (647) to, in an OS operating environment that replaces the pre-OS operating environment, provide a second API to enable an OS of the OS operating environment to call the support routine from outside the secure enclave.
    • 通过连续处理环境提供并维护构成信任链一部分的固件例程的保护技术。 一种装置可以包括第一处理器组件(550); 耦合到第一处理器组件的易失性存储器(562) 用于在OS前操作环境中在易失性存储器的一部分内生成安全区域以限制对加载到安全区域中的安全固件的访问的区域组件; 第一固件驱动程序(646),用于在OS前操作环境中提供第一API以使得不安全固件能够从安全区域外部调用安全固件的支持例程; 以及第二固件驱动程序(647),用于在替换操作系统前操作环境的操作系统操作环境中提供第二API以使操作系统操作环境的操作系统能够从安全飞地外调用支持例程。 p>
    • 10. 发明申请
    • TECHNIQUES FOR COORDINATING DEVICE BOOT SECURITY
    • 协调设备引导安全的技术
    • WO2017049539A1
    • 2017-03-30
    • PCT/CN2015/090576
    • 2015-09-24
    • INTEL CORPORATIONYAO, JiewenZIMMER, Vincent, J.
    • YAO, JiewenZIMMER, Vincent, J.
    • G06F21/50
    • G06F21/575
    • Various embodiments are generally directed to techniques for coordinating the formation of a chain of trust among components of a processing device. An apparatus may include a processor component including verification microcode to authenticate a verification routine based on a first security credential to create a chain of trust within a processing device that includes the verification microcode and the verification routine; a collecting register to provide a hash value of one or more values written to the collecting register since initialization of the processing device when read; and a verification component of the verification routine to determine a selected security level of the initialization, and based on the selected security level, to authenticate a firmware based on a second security credential to extend the chain of trust to include the firmware and store an indication of a result of the attempted authentication of the firmware in the collecting register.
    • 各种实施例通常涉及用于协调处理装置的组件之间的信任链的形成的技术。 设备可以包括处理器组件,其包括验证微代码,以基于第一安全凭证来验证验证例程,以在包括验证微代码和验证例程的处理设备内创建信任链; 收集寄存器,用于在读取时从处理设备初始化提供写入收集寄存器的一个或多个值的哈希值; 以及所述验证例程的验证部件,以确定所述初始化的所选安全级别,并且基于所选择的安全级别,基于第二安全凭证认证固件,以扩展所述信任链以包括所述固件并存储指示 是在收集寄存器中尝试认证固件的结果。