BRPI0519080A2 - sistema e mÉtodo para bloquear um tpm sempre ligado usando um monitor - Google Patents
sistema e mÉtodo para bloquear um tpm sempre ligado usando um monitorInfo
- Publication number
- BRPI0519080A2 BRPI0519080A2 BRPI0519080-0A BRPI0519080A BRPI0519080A2 BR PI0519080 A2 BRPI0519080 A2 BR PI0519080A2 BR PI0519080 A BRPI0519080 A BR PI0519080A BR PI0519080 A2 BRPI0519080 A2 BR PI0519080A2
- Authority
- BR
- Brazil
- Prior art keywords
- monitor
- computer
- tpm
- always
- conditions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Abstract
SISTEMA E MÉTODO PARA BLOQUEAR UM TPM SEMPRE LIGADO USANDO UM MONITOR. Um computador pode ficar seguro contra ataque ao incluir um ambiente confiável utilizado para verificar um monitor conhecido. O monitor pode ser usado para determinar uma condição do computador para conformidade com um conjuntode condições. As condições podem se relacionar aos termos de uso, tais como os créditos disponíveis para um sistema "pague para usar", ou que o computador está executando um determinado software, como, por exemplo, uma proteção anti-vírus, ou que periféricos não autorizados não estão anexados, ou que uma ficha requerida se encontra presente. O monitor pode enviar um sinal diretamente ou através do arrtbíente confiável para um circuito de guarda. O circuito de guarda interrompe o uso do computador quando o sinal não é recebido em um dado período de espera.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/021,021 US7360253B2 (en) | 2004-12-23 | 2004-12-23 | System and method to lock TPM always ‘on’ using a monitor |
| PCT/US2005/046091 WO2006071630A2 (en) | 2004-12-23 | 2005-12-20 | System and method to lock tpm always 'on' using a monitor |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BRPI0519080A2 true BRPI0519080A2 (pt) | 2008-12-23 |
Family
ID=36613166
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BRPI0519080-0A BRPI0519080A2 (pt) | 2004-12-23 | 2005-12-20 | sistema e mÉtodo para bloquear um tpm sempre ligado usando um monitor |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US7360253B2 (pt) |
| EP (1) | EP1829274A4 (pt) |
| JP (1) | JP4945454B2 (pt) |
| KR (1) | KR101213807B1 (pt) |
| CN (1) | CN101116070B (pt) |
| BR (1) | BRPI0519080A2 (pt) |
| MX (1) | MX2007006143A (pt) |
| RU (1) | RU2007123617A (pt) |
| WO (1) | WO2006071630A2 (pt) |
Families Citing this family (53)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
| US20060242406A1 (en) | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
| US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
| US8464348B2 (en) | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
| US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
| US8176564B2 (en) | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
| US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
| US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
| US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
| US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
| US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
| US8353046B2 (en) | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
| US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
| US20070168574A1 (en) * | 2005-09-28 | 2007-07-19 | Dell Products L.P. | System and method for securing access to general purpose input/output ports in a computer system |
| JP2007242207A (ja) * | 2006-03-13 | 2007-09-20 | Fujitsu Ltd | ディスク装置の媒体スキャン方法 |
| JP4769608B2 (ja) * | 2006-03-22 | 2011-09-07 | 富士通株式会社 | 起動検証機能を有する情報処理装置 |
| US8122258B2 (en) | 2006-05-22 | 2012-02-21 | Hewlett-Packard Development Company, L.P. | System and method for secure operating system boot |
| US7984283B2 (en) * | 2006-05-22 | 2011-07-19 | Hewlett-Packard Development Company, L.P. | System and method for secure operating system boot |
| JP4048382B1 (ja) * | 2006-09-01 | 2008-02-20 | 富士ゼロックス株式会社 | 情報処理システムおよびプログラム |
| US20080077420A1 (en) * | 2006-09-27 | 2008-03-27 | Daryl Cromer | System and Method for Securely Updating Remaining Time or Subscription Data for a Rental Computer |
| US20080147555A1 (en) * | 2006-12-18 | 2008-06-19 | Daryl Carvis Cromer | System and Method for Using a Hypervisor to Control Access to a Rental Computer |
| US7971056B2 (en) * | 2006-12-18 | 2011-06-28 | Microsoft Corporation | Direct memory access for compliance checking |
| US7631169B2 (en) * | 2007-02-02 | 2009-12-08 | International Business Machines Corporation | Fault recovery on a massively parallel computer system to handle node failures without ending an executing job |
| US8522043B2 (en) * | 2007-06-21 | 2013-08-27 | Microsoft Corporation | Hardware-based computer theft deterrence |
| US20100212021A1 (en) * | 2009-02-18 | 2010-08-19 | Harris Technology, Llc | Decrement software |
| US9805196B2 (en) * | 2009-02-27 | 2017-10-31 | Microsoft Technology Licensing, Llc | Trusted entity based anti-cheating mechanism |
| JP4743297B2 (ja) * | 2009-03-16 | 2011-08-10 | コニカミノルタビジネステクノロジーズ株式会社 | 画像形成装置、機能拡張方法およびユーザ認証システム |
| EP2393007B1 (en) * | 2010-06-03 | 2013-03-27 | Telefonaktiebolaget LM Ericsson (publ) | Processing device |
| CN101984575B (zh) * | 2010-10-14 | 2015-06-03 | 中兴通讯股份有限公司 | 一种保护移动终端软件的方法和装置 |
| CN102063593B (zh) * | 2011-01-07 | 2013-01-09 | 北京工业大学 | 主动控制功能的可信设备及其认证方法 |
| US8375221B1 (en) | 2011-07-29 | 2013-02-12 | Microsoft Corporation | Firmware-based trusted platform module for arm processor architectures and trustzone security extensions |
| US9256734B2 (en) * | 2012-04-27 | 2016-02-09 | Broadcom Corporation | Security controlled multi-processor system |
| WO2013166278A1 (en) * | 2012-05-02 | 2013-11-07 | Visa International Service Association | Small form-factor cryptographic expansion device |
| US9633210B2 (en) * | 2013-09-13 | 2017-04-25 | Microsoft Technology Licensing, Llc | Keying infrastructure |
| US9542568B2 (en) * | 2013-09-25 | 2017-01-10 | Max Planck Gesellschaft Zur Foerderung Der Wissenschaften E.V. | Systems and methods for enforcing third party oversight of data anonymization |
| US20150220927A1 (en) * | 2013-09-25 | 2015-08-06 | Ned M. Smith | Method, apparatus and system for providing transaction indemnification |
| EP2955872B1 (en) * | 2014-06-12 | 2016-10-12 | Nxp B.V. | Method for configuring a secure element, key derivation program, computer program product and configurable secure element |
| US10097513B2 (en) | 2014-09-14 | 2018-10-09 | Microsoft Technology Licensing, Llc | Trusted execution environment extensible computing device interface |
| US20170116432A1 (en) * | 2015-01-22 | 2017-04-27 | Daniel Minoli | System and methods for cyber-and-physically-secure high grade weaponry |
| CN105989283B (zh) | 2015-02-06 | 2019-08-09 | 阿里巴巴集团控股有限公司 | 一种识别病毒变种的方法及装置 |
| US9612893B2 (en) | 2015-05-11 | 2017-04-04 | Silicon Laboratories Inc. | Peripheral watchdog timer |
| EP3270321B1 (en) * | 2016-07-14 | 2020-02-19 | Kontron Modular Computers SAS | Technique for securely performing an operation in an iot environment |
| US10402566B2 (en) * | 2016-08-01 | 2019-09-03 | The Aerospace Corporation | High assurance configuration security processor (HACSP) for computing devices |
| WO2019035825A1 (en) * | 2017-08-16 | 2019-02-21 | Hewlett-Packard Development Company, L.P. | MONITORING MEMORY |
| US10659054B2 (en) * | 2018-02-23 | 2020-05-19 | Nxp B.V. | Trusted monotonic counter using internal and external non-volatile memory |
| JP7059127B2 (ja) * | 2018-06-26 | 2022-04-25 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及びその制御方法 |
| JP7322233B2 (ja) * | 2018-06-26 | 2023-08-07 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及び改ざん検知方法 |
| US10965551B2 (en) * | 2018-11-21 | 2021-03-30 | Microsoft Technology Licensing, Llc | Secure count in cloud computing networks |
| US11232217B2 (en) * | 2018-12-06 | 2022-01-25 | Oracle International Corporation | Managing a security policy for a device |
| US11316694B2 (en) | 2019-03-27 | 2022-04-26 | Microsoft Technology Licensing, Llc | Cryptographic hardware watchdog |
| JP7522547B2 (ja) * | 2019-09-20 | 2024-07-25 | キヤノン株式会社 | 情報処理装置及びリセット制御方法 |
| DE102020114199A1 (de) * | 2020-05-27 | 2021-12-02 | Basler Aktiengesellschaft | Absicherung von Computersystemen gegen Manipulationen und Funktionsanomalien |
| EP4012586A1 (en) * | 2020-12-10 | 2022-06-15 | Nagravision S.A. | System for actively monitoring and securing a compute- and data-intensive electronic device, corresponding method and computer program product |
Family Cites Families (69)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4817094A (en) * | 1986-12-31 | 1989-03-28 | International Business Machines Corporation | Fault tolerant switch with selectable operating modes |
| US4855922A (en) * | 1987-03-20 | 1989-08-08 | Scientific-Atlanta, Inc. | Apparatus and method for monitoring an energy management system |
| US6507909B1 (en) * | 1990-02-13 | 2003-01-14 | Compaq Information Technologies Group, L.P. | Method for executing trusted-path commands |
| DE4039355C2 (de) * | 1990-12-10 | 1998-07-30 | Bosch Gmbh Robert | Vorrichtung zur Funktionsüberprüfung einer Watchdog-Schaltung |
| JPH0635718A (ja) * | 1992-07-15 | 1994-02-10 | Matsushita Electric Works Ltd | システム異常時のシステム縮退方式 |
| US5563799A (en) * | 1994-11-10 | 1996-10-08 | United Technologies Automotive, Inc. | Low cost/low current watchdog circuit for microprocessor |
| CN1153348A (zh) * | 1995-12-25 | 1997-07-02 | 合泰半导体股份有限公司 | 微处理器旗标设定电路 |
| DE19712375A1 (de) * | 1997-03-25 | 1998-10-01 | Bosch Gmbh Robert | Watchdog-Schaltung |
| DE19744375A1 (de) * | 1997-10-08 | 1999-04-15 | Philips Patentverwaltung | Steuerschaltung für einen Microcontroller |
| US6385727B1 (en) * | 1998-09-25 | 2002-05-07 | Hughes Electronics Corporation | Apparatus for providing a secure processing environment |
| CN1107920C (zh) * | 1998-11-27 | 2003-05-07 | 中国科学院空间科学与应用研究中心 | 一种通用的数据采集装置及其数据采集方法 |
| US7236455B1 (en) * | 1999-02-15 | 2007-06-26 | Hewlett-Packard Development Company, L.P. | Communications between modules of a computing apparatus |
| US6874087B1 (en) * | 1999-07-13 | 2005-03-29 | International Business Machines Corporation | Integrity checking an executable module and associated protected service provider module |
| EP1076279A1 (en) * | 1999-08-13 | 2001-02-14 | Hewlett-Packard Company | Computer platforms and their methods of operation |
| JP2001101033A (ja) * | 1999-09-27 | 2001-04-13 | Hitachi Ltd | オペレーティングシステム及びアプリケーションプログラムの障害監視方法 |
| GB0020441D0 (en) * | 2000-08-18 | 2000-10-04 | Hewlett Packard Co | Performance of a service on a computing platform |
| GB0020488D0 (en) * | 2000-08-18 | 2000-10-11 | Hewlett Packard Co | Trusted status rollback |
| US7000100B2 (en) * | 2001-05-31 | 2006-02-14 | Hewlett-Packard Development Company, L.P. | Application-level software watchdog timer |
| US20040255000A1 (en) * | 2001-10-03 | 2004-12-16 | Simionescu Dan C. | Remotely controlled failsafe boot mechanism and remote manager for a network device |
| US7490250B2 (en) * | 2001-10-26 | 2009-02-10 | Lenovo (Singapore) Pte Ltd. | Method and system for detecting a tamper event in a trusted computing environment |
| US6744616B2 (en) * | 2001-12-28 | 2004-06-01 | General Electric Company | Method and apparatus for controlling an electronic control |
| JP2003208314A (ja) * | 2002-01-15 | 2003-07-25 | Mitsubishi Electric Corp | オペレーティングシステムの自動入れ替え可能な計算機システムおよびそのシステムを利用したオペレーションシステムの自動入れ替え方法 |
| US7013384B2 (en) * | 2002-01-15 | 2006-03-14 | Lenovo (Singapore) Pte. Ltd. | Computer system with selectively available immutable boot block code |
| US7127579B2 (en) * | 2002-03-26 | 2006-10-24 | Intel Corporation | Hardened extended firmware interface framework |
| US7028149B2 (en) * | 2002-03-29 | 2006-04-11 | Intel Corporation | System and method for resetting a platform configuration register |
| US7069442B2 (en) * | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US7130951B1 (en) * | 2002-04-18 | 2006-10-31 | Advanced Micro Devices, Inc. | Method for selectively disabling interrupts on a secure execution mode-capable processor |
| CA2491447C (en) * | 2002-07-05 | 2008-07-15 | Cyberscan Technology, Inc. | Secure game download |
| US7000829B1 (en) * | 2002-07-16 | 2006-02-21 | Diebold, Incorporated | Automated banking machine key loading system and method |
| US7121460B1 (en) * | 2002-07-16 | 2006-10-17 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Automated banking machine component authentication system and method |
| EP1429224A1 (en) | 2002-12-10 | 2004-06-16 | Texas Instruments Incorporated | Firmware run-time authentication |
| DE10235564A1 (de) * | 2002-08-03 | 2004-02-12 | Robert Bosch Gmbh | Verfahren zum Überwachen eines Mikroprozessors und Schaltungsanordnung mit einem Mikroprozessor |
| US7171539B2 (en) * | 2002-11-18 | 2007-01-30 | Arm Limited | Apparatus and method for controlling access to a memory |
| CN2599652Y (zh) * | 2002-12-04 | 2004-01-14 | 华为技术有限公司 | 一种看门狗清狗电路 |
| GB2400461B (en) * | 2003-04-07 | 2006-05-31 | Hewlett Packard Development Co | Control of access to of commands to computing apparatus |
| TWI319147B (en) * | 2003-04-10 | 2010-01-01 | Lenovo Singapore Pte Ltd | Apparatus, motherboard, method and computer-readable storage medium recording instructions capable of determinging physical presence in a trusted platform in a computer system |
| US7444667B2 (en) * | 2003-07-28 | 2008-10-28 | Intel Corporation | Method and apparatus for trusted blade device computing |
| US7275263B2 (en) * | 2003-08-11 | 2007-09-25 | Intel Corporation | Method and system and authenticating a user of a computer system that has a trusted platform module (TPM) |
| US7533274B2 (en) * | 2003-11-13 | 2009-05-12 | International Business Machines Corporation | Reducing the boot time of a TCPA based computing system when the core root of trust measurement is embedded in the boot block code |
| US20050138389A1 (en) * | 2003-12-23 | 2005-06-23 | International Business Machines Corporation | System and method for making password token portable in trusted platform module (TPM) |
| US7222062B2 (en) * | 2003-12-23 | 2007-05-22 | Intel Corporation | Method and system to support a trusted set of operational environments using emulated trusted hardware |
| US7207039B2 (en) * | 2003-12-24 | 2007-04-17 | Intel Corporation | Secure booting and provisioning |
| US7421588B2 (en) * | 2003-12-30 | 2008-09-02 | Lenovo Pte Ltd | Apparatus, system, and method for sealing a data repository to a trusted computing platform |
| US20050166051A1 (en) * | 2004-01-26 | 2005-07-28 | Mark Buer | System and method for certification of a secure platform |
| US7653727B2 (en) * | 2004-03-24 | 2010-01-26 | Intel Corporation | Cooperative embedded agents |
| US20050221766A1 (en) * | 2004-03-31 | 2005-10-06 | Brizek John P | Method and apparatus to perform dynamic attestation |
| US8271783B2 (en) * | 2004-04-19 | 2012-09-18 | Hewlett-Packard Development Company, L.P. | Subordinate trusted platform module |
| US7480804B2 (en) * | 2004-04-29 | 2009-01-20 | International Business Machines Corporation | Method and system for hierarchical platform boot measurements in a trusted computing environment |
| US7380119B2 (en) * | 2004-04-29 | 2008-05-27 | International Business Machines Corporation | Method and system for virtualization of trusted platform modules |
| US7484091B2 (en) * | 2004-04-29 | 2009-01-27 | International Business Machines Corporation | Method and system for providing a trusted platform module in a hypervisor environment |
| US7664965B2 (en) * | 2004-04-29 | 2010-02-16 | International Business Machines Corporation | Method and system for bootstrapping a trusted server having redundant trusted platform modules |
| US20060010326A1 (en) * | 2004-07-08 | 2006-01-12 | International Business Machines Corporation | Method for extending the CRTM in a trusted platform |
| US7552326B2 (en) * | 2004-07-15 | 2009-06-23 | Sony Corporation | Use of kernel authorization data to maintain security in a digital processing system |
| US7716494B2 (en) * | 2004-07-15 | 2010-05-11 | Sony Corporation | Establishing a trusted platform in a digital processing system |
| US20060015732A1 (en) * | 2004-07-15 | 2006-01-19 | Sony Corporation | Processing system using internal digital signatures |
| US20060026422A1 (en) * | 2004-07-29 | 2006-02-02 | International Business Machines Corporation | Method, apparatus, and product for providing a backup hardware trusted platform module in a hypervisor environment |
| US20060026418A1 (en) * | 2004-07-29 | 2006-02-02 | International Business Machines Corporation | Method, apparatus, and product for providing a multi-tiered trust architecture |
| US7478246B2 (en) * | 2004-07-29 | 2009-01-13 | International Business Machines Corporation | Method for providing a scalable trusted platform module in a hypervisor environment |
| US8160244B2 (en) * | 2004-10-01 | 2012-04-17 | Broadcom Corporation | Stateless hardware security module |
| US7653819B2 (en) * | 2004-10-01 | 2010-01-26 | Lenovo Singapore Pte Ltd. | Scalable paging of platform configuration registers |
| US20060072748A1 (en) * | 2004-10-01 | 2006-04-06 | Mark Buer | CMOS-based stateless hardware security module |
| US7516326B2 (en) * | 2004-10-15 | 2009-04-07 | Hewlett-Packard Development Company, L.P. | Authentication system and method |
| US8166296B2 (en) * | 2004-10-20 | 2012-04-24 | Broadcom Corporation | User authentication system |
| US8332653B2 (en) * | 2004-10-22 | 2012-12-11 | Broadcom Corporation | Secure processing environment |
| US20060112267A1 (en) * | 2004-11-23 | 2006-05-25 | Zimmer Vincent J | Trusted platform storage controller |
| US7987356B2 (en) * | 2004-11-29 | 2011-07-26 | Broadcom Corporation | Programmable security platform |
| US20060129824A1 (en) * | 2004-12-15 | 2006-06-15 | Hoff James P | Systems, methods, and media for accessing TPM keys |
| US20060136717A1 (en) * | 2004-12-20 | 2006-06-22 | Mark Buer | System and method for authentication via a proximate device |
| US7373551B2 (en) * | 2004-12-21 | 2008-05-13 | Intel Corporation | Method to provide autonomic boot recovery |
-
2004
- 2004-12-23 US US11/021,021 patent/US7360253B2/en not_active Expired - Fee Related
-
2005
- 2005-12-20 KR KR1020077012294A patent/KR101213807B1/ko not_active Expired - Fee Related
- 2005-12-20 EP EP05854752A patent/EP1829274A4/en not_active Ceased
- 2005-12-20 MX MX2007006143A patent/MX2007006143A/es active IP Right Grant
- 2005-12-20 RU RU2007123617/09A patent/RU2007123617A/ru not_active Application Discontinuation
- 2005-12-20 WO PCT/US2005/046091 patent/WO2006071630A2/en not_active Ceased
- 2005-12-20 BR BRPI0519080-0A patent/BRPI0519080A2/pt not_active IP Right Cessation
- 2005-12-20 JP JP2007548385A patent/JP4945454B2/ja not_active Expired - Fee Related
- 2005-12-20 CN CN2005800407642A patent/CN101116070B/zh not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| CN101116070A (zh) | 2008-01-30 |
| EP1829274A2 (en) | 2007-09-05 |
| WO2006071630A3 (en) | 2007-08-02 |
| EP1829274A4 (en) | 2012-01-18 |
| MX2007006143A (es) | 2007-07-19 |
| RU2007123617A (ru) | 2008-12-27 |
| CN101116070B (zh) | 2010-06-09 |
| JP2008525892A (ja) | 2008-07-17 |
| JP4945454B2 (ja) | 2012-06-06 |
| US7360253B2 (en) | 2008-04-15 |
| KR101213807B1 (ko) | 2012-12-18 |
| US20060143446A1 (en) | 2006-06-29 |
| KR20070097031A (ko) | 2007-10-02 |
| WO2006071630A2 (en) | 2006-07-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BRPI0519080A2 (pt) | sistema e mÉtodo para bloquear um tpm sempre ligado usando um monitor | |
| ATE402450T1 (de) | Sicherheitsverfahren das auf der prüfung basiert ist | |
| Wang et al. | Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters | |
| Azab et al. | Hypersentry: enabling stealthy in-context measurement of hypervisor integrity | |
| Brasser et al. | TyTAN: Tiny trust anchor for tiny devices | |
| EP3364297B1 (en) | Systems and methods involving features of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, rootkit detection prevention, and/or other features | |
| Amit et al. | The design and implementation of hyperupcalls | |
| Christodorescu et al. | Cloud security is not (just) virtualization security: a short paper | |
| WO2012135192A3 (en) | System and method for virtual machine monitor based anti-malware security | |
| BRPI0404095A (pt) | Entrada e saìda segura para um agente confiável em um sistema com um ambiente de execução de alta segurança | |
| WO2006014554A3 (en) | Method and system for monitoring system memory integrity | |
| WO2008048665A3 (en) | Method, system, and computer program product for malware detection analysis, and response | |
| AR046351A1 (es) | Sistema para invocar una funcion de privilegio en un dispositivo. | |
| BRPI0511151A (pt) | sistema e método para o gerenciamento de acesso a conteúdo protegido por aplicações não-confiáveis | |
| BRPI0518914A2 (pt) | modo especial de pc iniciado pela detecÇço de um estado indesejado | |
| BRPI0916193A2 (pt) | Método para permitir uma localização do dispositivo de computação do usuário a ser monitorado a partir de uma localização remota, meio legível por computador e sistema para a proteção de dados privados enquanto monitorando um dispositivo eletrônico | |
| TW201337628A (zh) | 用於硬體加速運行時間完整性量測之設備 | |
| NO20043285L (no) | Projisering av troverdighet fra et klarert miljo til et ikke-klarert miljo | |
| WO2017052947A1 (en) | Hardware-assisted software verification and secure execution | |
| TW200634620A (en) | Mechanism to determine trust of out-of-band management agents | |
| BR112015018459A2 (pt) | mecanismo para fornecer suporte para fluxos de confiabilidade, disponibilidade e capacidade de serviço (ras) em monitor de ponto | |
| Stewin | A primitive for revealing stealthy peripheral-based attacks on the computing platform’s main memory | |
| GB2413880A (en) | A method and system of securely enforcing a computer policy | |
| Moon et al. | Detecting and preventing kernel rootkit attacks with bus snooping | |
| CN101226571B (zh) | 一种信息安全计算机 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B08F | Application fees: application dismissed [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 9A ANUIDADE. |
|
| B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2285 DE 21/10/2014. |