会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 61. 发明申请
    • Method and apparatus for authenticated, recoverable key distribution with no database secrets
    • 具有无数据库秘密的认证,可恢复密钥分发的方法和装置
    • US20070223704A1
    • 2007-09-27
    • US11387203
    • 2006-03-22
    • Ernest BrickellGary GraunkeWilliam StevensBalaji Vembu
    • Ernest BrickellGary GraunkeWilliam StevensBalaji Vembu
    • H04L9/00
    • H04L9/0841G09C1/00H04L2209/56
    • A method and apparatus for authenticated recoverable key distribution are described. In one embodiment, an application key is provided to an integrated chip platform. In one embodiment, the integrated chip platform encrypts the application key with a Key Encryption Key, which is stored within the persistent memory on the platform, and outputs a ChipID and the encrypted application key to enable recovery. In one embodiment, the platform can provide the ChipID to a recovery database to replace a lost encrypted application key. In one embodiment, the ChipID is the public key of a public/private key pair, and the application key is provided to the integrated chip platform by encrypting it using this public key. In one embodiment, the ChipID and the Key Encryption Key are derived from a secret random number programmed into the integrated chip. Other embodiments are described and claimed.
    • 描述了用于认证的可恢复密钥分发的方法和装置。 在一个实施例中,将应用密钥提供给集成芯片平台。 在一个实施例中,集成芯片平台用存储在平台上的持久存储器内的密钥加密密钥加密应用密钥,并输出ChipID和加密的应用密钥以使能恢复。 在一个实施例中,平台可以将ChipID提供给恢复数据库以替换丢失的加密应用密钥。 在一个实施例中,ChipID是公共/私人密钥对的公共密钥,并且通过使用该公开密钥将应用密钥提供给集成芯片平台。 在一个实施例中,ChipID和密钥加密密钥从编入集成芯片的秘密随机数导出。 描述和要求保护其他实施例。
    • 62. 发明申请
    • Apparatus and method for protected execution of graphics applications
    • 保护执行图形应用的装置和方法
    • US20050283602A1
    • 2005-12-22
    • US10873803
    • 2004-06-21
    • Balaji VembuClifford HallAditya Sreenivas
    • Balaji VembuClifford HallAditya Sreenivas
    • G06F12/10G06F12/14G06F21/00H04L9/00
    • G06F21/53G06F12/1036G06F12/1081G06F12/109G06F12/145
    • A method and apparatus for protected execution of graphics are described. In one embodiment, the method includes the formation of a translation table for a trusted application. In one embodiment, the translation table is formed according to one or more protected pages assigned to the trusted application in response to a protected page request from the trusted application. During execution of the trusted application, a virtual address space of the trusted application is translated to the one or more protected pages assigned to the trusted application. In one embodiment, the translation is performed according to the translation table assigned to the trusted application. Accordingly, by assigning a unique translation table to each trusted application, the various trusted applications may execute within the platform without generating an access into another application's physical address space. Other embodiments are described and claimed.
    • 描述用于保护执行图形的方法和装置。 在一个实施例中,该方法包括形成可信应用的转换表。 在一个实施例中,响应于受信任应用的受保护的页面请求,根据分配给受信任应用的一个或多个受保护页形成翻译表。 在可信应用的执行期间,可信应用的虚拟地址空间被转换为分配给可信应用的一个或多个受保护的页面。 在一个实施例中,根据分配给可信应用的转换表来执行翻译。 因此,通过为每个可信应用分配唯一的转换表,各种可信应用可以在平台内执行,而不产生对另一个应用的物理地址空间的访问。 描述和要求保护其他实施例。
    • 63. 发明申请
    • Method for secure key exchange
    • 密钥交换安全的方法
    • US20050154890A1
    • 2005-07-14
    • US10756444
    • 2004-01-12
    • Balaji Vembu
    • Balaji Vembu
    • G06F12/14G06F21/00H04L9/00H04L9/08H04L9/30
    • G06F21/10G06F2221/0797H04L9/0841H04L9/0897H04L9/30H04L2209/60
    • Secure key exchange and protected content distribution between a first entity and a second entity in a processing system may be accomplished by generating, by the first entity, a first key, encrypting the first key with a public key of a third entity, and storing the encrypted first key in the third entity. The second entity generates a second key, encrypts the second key with the public key of the third entity, and stores the encrypted second key in the third entity. The third entity decrypts the encrypted first key and the encrypted second key, using the third entity's private key to obtain the first key and the second key, encrypts the first key using the second key, and stores the first key encrypted by the second key in the third entity. The second entity then obtains the first key encrypted by the second key, and decrypts, using the second key, the first key encrypted by the second key. The first key may then be used to encrypt content sent to from the second entity to the first entity.
    • 在处理系统中的第一实体和第二实体之间的安全密钥交换和受保护的内容分发可以通过由第一实体生成第一密钥,用第三实体的公钥加密第一密钥来存储, 第三个实体加密的第一个密钥。 第二实体生成第二密钥,用第三实体的公开密钥对第二密钥进行加密,并将加密的第二密钥存储在第三实体中。 第三实体使用第三实体的私钥来解密加密的第一密钥和加密的第二密钥,以获得第一密钥和第二密钥,使用第二密钥加密第一密钥,并将由第二密钥加密的第一密钥存储在 第三个实体。 第二实体然后获得由第二密钥加密的第一密钥,并且使用第二密钥对由第二密钥加密的第一密钥进行解密。 然后可以将第一密钥用于加密从第二实体发送到第一实体的内容。