会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Data Protection for Variable Length Records by Utilizing High Performance Block Storage Metadata
    • 通过利用高性能块存储元数据对可变长度记录进行数据保护
    • US20090259456A1
    • 2009-10-15
    • US12100237
    • 2008-04-09
    • Stefan AmannGerhard BanzhafKenneth Wayne BoydKenneth Day, IIIJeffrey William PalmHelmut H. WeberHarry Morris Yudenfriend
    • Stefan AmannGerhard BanzhafKenneth Wayne BoydKenneth Day, IIIJeffrey William PalmHelmut H. WeberHarry Morris Yudenfriend
    • G06F9/455
    • G06F11/1076G06F11/1004
    • An enhanced mechanism for providing data protection for variable length records utilizes high performance block storage metadata. In an embodiment, an emulated record that emulates a variable length record, such as a Count-Key-Data (CKD) record or an Extended-Count-Key-Data (ECKD) record, is generated by a Host Bus Adapter (HBA) of a mainframe system. The emulated record comprises a sequence of extended fixed-length blocks, each of which includes a data block and a footer. A confluence of the footers defines a high performance block storage metadata unit associated with the emulated record and includes a checksum that covers all data blocks and all footers of the entire emulated record. In one embodiment, the checksum is checked during transit of the emulated record between a HBA and a storage subsystem (e.g., by the HBA when the emulated record is received from the storage subsystem, and/or by a switch in the data transfer path), during a hardening step when writing the emulated record to a disk, and/or during a verification step when reading the emulated record from the disk.
    • 用于为可变长度记录提供数据保护的增强机制利用高性能块存储元数据。 在一个实施例中,仿真诸如计数密钥数据(CKD)记录或扩展计数密钥数据(ECKD)记录的可变长度记录的仿真记录由主机总线适配器(HBA)生成, 的大型机系统。 仿真记录包括一系列扩展的固定长度块,每个块包括数据块和页脚。 页脚的汇合定义了与仿真记录相关联的高性能块存储元数据单元,并且包括覆盖整个模拟记录的所有数据块和所有页脚的校验和。 在一个实施例中,在仿真记录在HBA和存储子系统之间(例如,当从存储子系统接收到仿真记录和/或通过数据传输路径中的交换机通过HBA)传送期间检查校验和, 在将仿真记录写入磁盘的硬化步骤期间和/或在从盘读取仿真记录时的验证步骤期间。
    • 9. 发明授权
    • Method for extending the CRTM in a trusted platform
    • 在可信平台上扩展CRTM的方法
    • US08185750B2
    • 2012-05-22
    • US12059274
    • 2008-03-31
    • Steven A. BadeRonald PerezLeendert Peter Van DoornHelmut H. Weber
    • Steven A. BadeRonald PerezLeendert Peter Van DoornHelmut H. Weber
    • G06F12/14G06F21/22
    • G06F21/572
    • A method, system and computer program product for enhancing the functionality of the existing core root of trust measurement (CRTM). The CRTM is extended to allow platform manufacturer controlled and certified code to be incorporated into the function of the CRTM, wherein the manufacturer may define the policy for accepting a new function into the CRTM. When a firmware or software module image is compiled, the build process generates a hash value of the compiled firmware or software image, wherein the hash value reflects a fingerprint (or short hand) representation of the compiled image. A determination is made as to whether the hash value of the firmware or software image is to be a CRTM extension. If so, a digital signature of the module is created using the CRTM extension private key. This signature value is added to the firmware or software module.
    • 一种用于增强现有核心信任度量(CRTM)功能的方法,系统和计算机程序产品。 CRTM被扩展为允许平台制造商控制和认证的代码被并入CRTM的功能,其中制造商可以将接受新功能的策略定义到CRTM中。 当编译固件或软件模块图像时,构建过程产生编译的固件或软件映像的哈希值,其中散列值反映编译图像的指纹(或短手)表示。 确定固件或软件映像的哈希值是否为CRTM扩展。 如果是这样,使用CRTM扩展专用密钥创建模块的数字签名。 该签名值被添加到固件或软件模块。
    • 10. 发明授权
    • Method for providing a scalable trusted platform module in a hypervisor environment
    • 在管理程序环境中提供可扩展的可信平台模块的方法
    • US07478246B2
    • 2009-01-13
    • US10902670
    • 2004-07-29
    • Richard Louis ArndtSteven A. BadeThomas J. DewkettCharles W. Gainey, Jr.Nia Letise KelleySiegfried SutterHelmut H. Weber
    • Richard Louis ArndtSteven A. BadeThomas J. DewkettCharles W. Gainey, Jr.Nia Letise KelleySiegfried SutterHelmut H. Weber
    • G06F11/30H04K1/10
    • H04L63/20G06F21/57H04L63/0876H04L63/102
    • A method is described for implementing a trusted computing environment within a data processing system where the data processing system includes a single hardware trusted platform module (TPM). Multiple logical partitions are provided in the data processing system. A unique context is generated for each one of the logical partitions. When one of the logical partitions requires access to the hardware TPM, that partition's context is required to be stored in the hardware TPM. The hardware TPM includes a finite number of storage locations, called context slots, for storing contexts. Each context slot can store one partition's context. Each one of the partitions is associated with one of the limited number of context storage slots in the hardware TPM. At least one of the context slots is simultaneously associated with more than one of the logical partitions. Contexts are swapped into and out of the hardware TPM during runtime of the data processing system so that when ones of the partitions require access to the hardware TPM, their required contexts are currently stored in the hardware TPM.
    • 描述了一种在数据处理系统内实现可信计算环境的方法,其中数据处理系统包括单个硬件可信平台模块(TPM)。 在数据处理系统中提供了多个逻辑分区。 为每个逻辑分区生成唯一的上下文。 当其中一个逻辑分区需要访问硬件TPM时,该分区的上下文需要存储在硬件TPM中。 硬件TPM包括有限数量的存储位置,称为上下文时隙,用于存储上下文。 每个上下文时隙都可以存储一个分区的上下文。 每个分区与硬件TPM中的有限数量的上下文存储时隙中的一个相关联。 至少一个上下文时隙同时与多于一个的逻辑分区相关联。 在数据处理系统的运行期间,上下文交换进出硬件TPM,以便当这些分区中的一个需要访问硬件TPM时,其所需的上下文当前存储在硬件TPM中。