Abstract:
In one embodiment, a method of remote attestation for a special mode of operation. The method comprises storing an audit log within protected memory of a platform. The audit log is a listing of data representing each of a plurality of IsoX software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.
Abstract:
Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting-encrypted data structure is stored on a removable storage medium (such as a CD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the removable storage medium. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.
Abstract:
The invention is directed to a formula (I): or a pharmaceutically acceptable salt thereof, wherein R1, R2a, R2b and R3-R7 are herein. The invention is also directed to compositions containing a compound of formula (I) and to the use of such compounds in the inhibition of mutant IDH proteins having a neomorphic activity. The invention is further directed to the use of a compound of formula (I) in the treatment of diseases or disorders associated with such mutant IDH proteins including, but not limited to, cell-proliferation disorders, such as cancer.
Abstract:
The present invention provides a compound of formula (I): and pharmaceutically acceptable salts, enantiomers, stereoisomers, rotamers, tautomers, diastereomers, or racemates thereof. Also provided is a method of treating a disease or condition mediated by CDK9.
Abstract:
Benzoxazole and benzothiazole compounds and their oxides, esters, prodrugs, solvates, and pharmaceutically acceptable salts thereof are disclosed. Compositions of the compounds, either alone or in combination with at least one additional therapeutic agent, with a pharmaceutically acceptable carrier, and uses of the compounds, either alone or in combination with at least one additional therapeutic agent are also disclosed. The embodiments are useful for inhibiting cellular proliferation, inhibiting the growth and/or metathesis of tumors, treating or preventing cancer, treating or preventing degenerating bone diseases such as rheumatoid arthritis, and/or inhibiting molecules such as CSF 1R.
Abstract:
Disclosed herein are compounds and their oxides, esters, prodrugs, solvates, and pharmaceutically acceptable salts thereof, compositions of the compounds, either alone or in combination with at least one additional therapeutic agent, with a pharmaceutically acceptable carrier, and uses of the compounds, either alone or in combination with at least one additional therapeutic agent. The embodiments are useful for inhibiting cellular proliferation, inhibiting the growth and/or metathesis of tumors, treating or preventing cancer, treating or preventing degenerating bone diseases such as rheumatoid arthritis, and/or inhibiting molecules such as CSF-1R.
Abstract:
In one embodiment of the present invention, a method includes verifying an initiating logical processor of a system; validating a trusted agent with the initiating logical processor if the initiating logical processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
Abstract:
In one embodiment of the present invention, a method includes verifying an initiating logical processor of a system; validating a trusted agent with the initiating logical processor if the initiating logical processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
Abstract:
A processing system has a processor that can operate in a normal ring 0 operating mode and one or more higher ring operating modes above the normal ring 0 operating mode. In addition, the processor can operate in an isolated execution mode. A memory in the processing system may include an ordinary memory area that can be accessed from the normal ring 0 operating mode, as well as an isolated memory area that can be accessed from the isolated execution mode but not from the normal ring 0 operating mode. The processing system may also include an operating system (OS) nub, as well as a key generator. The key generator may generate an OS nub key (OSNK) based at least in part on an identification of the OS nub and a master binding key (BK0) of the platform. Other embodiments are described and claimed.
Abstract:
Techniques for determining a characteristic of a flame are provided by the present invention. Provided are methods as well as devices. A flame is monitored across a contiguous spectral range to detect light emitted by the monitored flame. The contiguous spectral range is segmented into a plurality of discrete ranges, and detected light across each of the one or more of the plurality of discrete ranges is respectively processed to determine at least one characteristic of the flame.