会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • RUNTIME PLATFORM FIRMWARE VERIFICATION
    • 运行平台固件验证
    • US20120167205A1
    • 2012-06-28
    • US12976523
    • 2010-12-22
    • Sergiu D. GhetieShahrokh ShahidzadehMichael Neve de MevergniesAdil KarrarVincent J. Zimmer
    • Sergiu D. GhetieShahrokh ShahidzadehMichael Neve de MevergniesAdil KarrarVincent J. Zimmer
    • G06F21/00
    • G06F21/572
    • Embodiments of the invention are directed towards logic and/or modules stored in processor secure storage to determine whether a first platform firmware image (e.g., basic input/output system (BIOS), device read-only memory (ROM), manageability engine firmware) loaded onto a processor cache is valid. The processor executes the first platform firmware image if it is determined to be valid. If the first platform image is determined to be invalid, a second platform firmware image is located. If this platform firmware image is determined to be valid, the processor will execute said second platform image.In some embodiments of the invention, the determination of whether the first platform firmware image is valid is based, at least in part, on verification of a digital signature associated with the first platform firmware image. The digital signature may be created, for example, from a private key, wherein the digital signature is verified via a public key.
    • 本发明的实施例针对存储在处理器安全存储器中的逻辑和/或模块来确定第一平台固件映像(例如,基本输入/输出系统(BIOS),设备只读存储器(ROM),可管理性引擎固件) 加载到处理器缓存中是有效的。 如果判定为有效,则处理器执行第一平台固件映像。 如果第一平台图像被确定为无效,则定位第二平台固件图像。 如果该平台固件图像被确定为有效,则处理器将执行所述第二平台图像。 在本发明的一些实施例中,确定第一平台固件图像是否有效是至少部分地基于与第一平台固件图像相关联的数字签名的验证。 可以例如从私钥来创建数字签名,其中通过公钥验证数字签名。
    • 2. 发明授权
    • Protecting system management mode (SMM) spaces against cache attacks
    • 保护系统管理模式(SMM)空间,防止缓存攻击
    • US07698507B2
    • 2010-04-13
    • US11712804
    • 2007-02-28
    • Sergiu D. Ghetie
    • Sergiu D. Ghetie
    • G06F13/00
    • G06F21/79
    • A computing system may comprise a processor and a memory controller hub coupled by an external bus such as the front side bus. The processor may also comprise a cache. The processor may operate in SMM and the memory coupled to the memory controller hub may comprise SMM spaces such as compatible, HSEG, and TSEG areas. A software-based attack may write malicious instructions into the cache at an address corresponding to the SMM spaces. The illegal processor memory accesses that occur entirely inside the processor caches due to the cache attack may be forced to occur on the external bus. The memory controller hub may be capable of handling the memory accesses occurring on the external bus thus, protecting the SMM spaces against cache attack.
    • 计算系统可以包括通过外部总线(例如前端总线)耦合的处理器和存储器控制器集线器。 处理器还可以包括高速缓存。 处理器可以在SMM中操作,并且耦合到存储器控制器集线器的存储器可以包括诸如兼容的HSEG和TSEG区域之类的SMM空间。 基于软件的攻击可以将写入恶意指令写入与SMM空间相对应的地址的缓存中。 由于高速缓存攻击,处理器高速缓存内完全发生的非法处理器存储器访问可能被迫在外部总线上发生。 存储器控制器集线器可能能够处理在外部总线上发生的存储器访问,从而保护SMM空间免受高速缓存攻击。
    • 4. 发明授权
    • Runtime platform firmware verification
    • 运行时平台固件验证
    • US08590040B2
    • 2013-11-19
    • US12976523
    • 2010-12-22
    • Sergiu D. GhetieShahrokh ShahidzadehMichael Neve de MevergniesAdil KarrarVincent J. Zimmer
    • Sergiu D. GhetieShahrokh ShahidzadehMichael Neve de MevergniesAdil KarrarVincent J. Zimmer
    • G06F21/00
    • G06F21/572
    • Embodiments of the invention are directed towards logic and/or modules stored in processor secure storage to determine whether a first platform firmware image (e.g., basic input/output system (BIOS), device read-only memory (ROM), manageability engine firmware) loaded onto a processor cache is valid. The processor executes the first platform firmware image if it is determined to be valid. If the first platform image is determined to be invalid, a second platform firmware image is located. If this platform firmware image is determined to be valid, the processor will execute said second platform image.In some embodiments of the invention, the determination of whether the first platform firmware image is valid is based, at least in part, on verification of a digital signature associated with the first platform firmware image. The digital signature may be created, for example, from a private key, wherein the digital signature is verified via a public key.
    • 本发明的实施例针对存储在处理器安全存储器中的逻辑和/或模块来确定第一平台固件映像(例如,基本输入/输出系统(BIOS),设备只读存储器(ROM),可管理性引擎固件) 加载到处理器缓存中是有效的。 如果判定为有效,则处理器执行第一平台固件映像。 如果第一平台图像被确定为无效,则定位第二平台固件图像。 如果该平台固件图像被确定为有效,则处理器将执行所述第二平台图像。 在本发明的一些实施例中,确定第一平台固件图像是否有效是至少部分地基于与第一平台固件图像相关联的数字签名的验证。 可以例如从私钥来创建数字签名,其中通过公钥验证数字签名。