MANAGING FIRMWARE UPDATE ATTEMPTS
    91.
    发明申请
    MANAGING FIRMWARE UPDATE ATTEMPTS 有权
    管理固件更新测试

    公开(公告)号:US20150199519A1

    公开(公告)日:2015-07-16

    申请号:US14671933

    申请日:2015-03-27

    Abstract: Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state.

    Abstract translation: 可以使用安全计数器监视硬件设备的更新确认信息或固件的尝试,该计数器被配置为对每次更新或更新尝试单调地调整安全计数器的当前值。 每次确认固件的有效性时,可以确定计数器的值,并将该值存储到安全位置。 在随后的时间,例如在引导过程期间,可以确定计数器的实际值并将其与预期值进行比较。 如果值不匹配,使得固件可能处于意外状态,则可以采取措施,例如防止访问或隔离硬件,直到固件可以被验证或更新为预期的时间 州。

    FIRMWARE UPDATES DURING LIMITED TIME PERIOD
    92.
    发明申请
    FIRMWARE UPDATES DURING LIMITED TIME PERIOD 有权
    有限时间内的固件更新

    公开(公告)号:US20150160948A1

    公开(公告)日:2015-06-11

    申请号:US14537786

    申请日:2014-11-10

    Abstract: When providing a user with native access to at least a portion of device hardware, the user can be prevented from modifying firmware and other configuration information by controlling the mechanisms used to update that information. In some embodiments, an asymmetric keying approach can be used to encrypt or sign the firmware. In other cases access can be controlled by enabling firmware updates only through a channel or port that is not exposed to the customer, or by mapping only those portions of the hardware that are to be accessible to the user. In other embodiments, the user can be prevented from modifying firmware by only provisioning the user on a machine after an initial mutability period wherein firmware can be modified, such that the user never has access to a device when firmware can be updated. Combinations and variations of the above also can be used.

    Abstract translation: 当向用户提供对至少一部分设备硬件的本地访问时,可以通过控制用于更新该信息的机制来阻止用户修改固件和其他配置信息。 在一些实施例中,可以使用非对称密钥方法来加密或签名固件。 在其他情况下,只能通过不暴露给客户的通道或端口启用固件更新,或仅映射用户可访问的硬件部分来控制访问。 在其他实施例中,可以通过在可修改固件的初始可变性周期之后仅在机器上提供用户来防止用户修改固件,使得当固件可以被更新时,用户永远不能访问设备。 上述的组合和变化也可​​以使用。

    Managing firmware update attempts
    93.
    发明授权
    Managing firmware update attempts 有权
    管理固件更新尝试

    公开(公告)号:US08996744B1

    公开(公告)日:2015-03-31

    申请号:US14094642

    申请日:2013-12-02

    Abstract: Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state.

    Abstract translation: 可以使用安全计数器监视硬件设备的更新确认信息或固件的尝试,该计数器被配置为对每次更新或更新尝试单调地调整安全计数器的当前值。 每次确认固件的有效性时,可以确定计数器的值,并将该值存储到安全位置。 在随后的时间,例如在引导过程期间,可以确定计数器的实际值并将其与预期值进行比较。 如果值不匹配,使得固件可能处于意外状态,则可以采取措施,例如防止访问或隔离硬件,直到固件可以被验证或更新为预期的时间 州。

    REMOTE ATTESTATION OF HOST DEVICES
    94.
    发明申请
    REMOTE ATTESTATION OF HOST DEVICES 有权
    主机设备远程监控

    公开(公告)号:US20140310510A1

    公开(公告)日:2014-10-16

    申请号:US13863296

    申请日:2013-04-15

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

    Abstract translation: 描述了使主计算设备能够存储用于在主计算设备上的安全存储(诸如可信平台模块(TPM))中恢复主计算设备的状态的凭证和其他安全信息的方法。 在主机计算设备发生故障(例如断电,网络故障等)时,主机计算设备可以从安全存储中获得必要的凭证,并使用这些凭据来启动各种服务,恢复状态 的主机,并执行各种其他功能。 此外,安全存储(例如,TPM)可以将主机计算设备的引导固件测量和远程认证提供给网络上的其他设备,例如当恢复的主机需要与网络上的其他设备进行通信时。

    HOST RECOVERY USING A SECURE STORE
    95.
    发明申请
    HOST RECOVERY USING A SECURE STORE 有权
    使用安全存储的主机恢复

    公开(公告)号:US20140310509A1

    公开(公告)日:2014-10-16

    申请号:US13862923

    申请日:2013-04-15

    CPC classification number: G06F11/1417 G06F21/57

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

    Abstract translation: 描述了使主计算设备能够存储用于在主计算设备上的安全存储(诸如可信平台模块(TPM))中恢复主计算设备的状态的凭证和其他安全信息的方法。 在主机计算设备发生故障(例如断电,网络故障等)时,主机计算设备可以从安全存储中获得必要的凭证,并使用这些凭据来启动各种服务,恢复状态 的主机,并执行各种其他功能。 此外,安全存储(例如,TPM)可以将主机计算设备的引导固件测量和远程认证提供给网络上的其他设备,例如当恢复的主机需要与网络上的其他设备进行通信时。

    NETWORK POLICY IMPLEMENTATION WITH MULTIPLE INTERFACES

    公开(公告)号:US20210349744A1

    公开(公告)日:2021-11-11

    申请号:US17303948

    申请日:2021-06-10

    Abstract: The transmission of data on computer networks according to one or more policies is disclosed. A policy may specify, among other things, various parameters which are to be followed when transmitting initiating network traffic. Multiple network interfaces may be installed on a server to enable transmission of data from the single server according a number of discrete configuration settings implicated by the various policies. The multiple network interfaces may correspond to separate physical components, with each component configured independently to implement a feature of a policy. The multiple network interfaces may also correspond to a single physical component that exposes multiple network interfaces, both to the network and to the server on which it is installed.

    Live data center test framework
    98.
    发明授权

    公开(公告)号:US10409699B1

    公开(公告)日:2019-09-10

    申请号:US15236686

    申请日:2016-08-15

    Abstract: Systems and methods are described for testing computing resources. In one embodiment, a search space of computing settings is analyzed in accordance with weighted data that maps computing performance parameters with the computing settings. A subset of the computing settings is selected to generate a test population to optimize at least one computing performance parameter. One or more computing devices in a computing environment are configured in accordance with the test population, and the test conditions are iteratively updated based on test results in accordance with the test population and a fitness function.

    Remote attestation of host devices
    99.
    发明授权

    公开(公告)号:US10241804B2

    公开(公告)日:2019-03-26

    申请号:US15483227

    申请日:2017-04-10

    Abstract: Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network.

    Layered datacenter components
    100.
    发明授权

    公开(公告)号:US10153937B1

    公开(公告)日:2018-12-11

    申请号:US13693851

    申请日:2012-12-04

    Abstract: Systems and methods for handling resources in a computer system differently in certain situations, such as catastrophic events, based upon an assigned layer of the resource in the system. The layer can be based, for example, on criticality of the resource to the system. Services or devices can be assigned a criticality level representing a layer. The different layers can be treated differently in the case of an event, such as fire, a power outage, an overheating situation and so forth. In response to receiving information about such an event, the different layers can be handled in accordance with their criticality.

Patent Agency Ranking