-
公开(公告)号:US08375440B2
公开(公告)日:2013-02-12
申请号:US11872220
申请日:2007-10-15
Applicant: Kenneth D. Ray , Kevin M. Litwack , David R. Wooten
Inventor: Kenneth D. Ray , Kevin M. Litwack , David R. Wooten
IPC: G06F21/00
CPC classification number: G06F15/177 , G06F9/4418 , G06F21/31 , G06F21/81
Abstract: Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file.
Abstract translation: 讨论从低活动条件恢复的程序。 在实现中,经由加密算法来保护持久状态文件或其一部分,其中解密密钥通过操作系统(OS)登录用户凭证得到保护。 一旦用户通过OS登录认证,持久状态文件可以被解密并插入到OS引导路径中,并通过持久状态文件进行恢复。
-
公开(公告)号:US07913074B2
公开(公告)日:2011-03-22
申请号:US11864418
申请日:2007-09-28
Applicant: Kevin M Litwack , Kenneth D. Ray , David R Wooten , Nathan T. Lewis
Inventor: Kevin M Litwack , Kenneth D. Ray , David R Wooten , Nathan T. Lewis
CPC classification number: G06F15/16
Abstract: Tools and techniques for securely launching encrypted operating systems are described herein. The tools may provide computing systems that include operating systems (OSs) that define boot paths for the systems. This boot path may include first and second OS loader components. The first loader may include instructions for retrieving a list of disk sectors from a first store, and for retrieving these specified sectors from an encrypted second store. The first loader may also store the sectors in a third store that is accessible to both the first and the second loader components, and may invoke the second loader to try launching the OS using these sectors. In turn, the second loader may include instructions for retrieving these sectors from the third store, and for unsealing a key for decrypting these sectors. The second loader may then decrypt these sectors, and attempt to launch the OS from these sectors.
Abstract translation: 本文描述了用于安全启动加密操作系统的工具和技术。 这些工具可以提供包括为系统定义引导路径的操作系统(OS)的计算系统。 该引导路径可以包括第一和第二OS加载器组件。 第一加载器可以包括用于从第一存储检索磁盘扇区列表的指令,并且用于从加密的第二存储中检索这些指定的扇区。 第一加载器还可以将扇区存储在第一和第二加载器组件可访问的第三个存储区中,并且可以调用第二加载器来尝试使用这些扇区启动操作系统。 反过来,第二装载器可以包括用于从第三商店检索这些扇区的指令,以及用于解密用于对这些扇区进行解密的密钥。 然后,第二加载器可以解密这些扇区,并尝试从这些扇区启动OS。
-
公开(公告)号:US20090089568A1
公开(公告)日:2009-04-02
申请号:US11864418
申请日:2007-09-28
Applicant: Kevin M. Litwack , Kenneth D. Ray , David R. Wooten , Nathan T. Lewis
Inventor: Kevin M. Litwack , Kenneth D. Ray , David R. Wooten , Nathan T. Lewis
IPC: G06F15/177
CPC classification number: G06F15/16
Abstract: Tools and techniques for securely launching encrypted operating systems are described herein. The tools may provide computing systems that include operating systems (OSs) that define boot paths for the systems. This boot path may include first and second OS loader components. The first loader may include instructions for retrieving a list of disk sectors from a first store, and for retrieving these specified sectors from an encrypted second store. The first loader may also store the sectors in a third store that is accessible to both the first and the second loader components, and may invoke the second loader to try launching the OS using these sectors. In turn, the second loader may include instructions for retrieving these sectors from the third store, and for unsealing a key for decrypting these sectors. The second loader may then decrypt these sectors, and attempt to launch the OS from these sectors.
Abstract translation: 本文描述了用于安全启动加密操作系统的工具和技术。 这些工具可以提供包括为系统定义引导路径的操作系统(OS)的计算系统。 该引导路径可以包括第一和第二OS加载器组件。 第一加载器可以包括用于从第一存储检索磁盘扇区列表的指令,并且用于从加密的第二存储中检索这些指定的扇区。 第一加载器还可以将扇区存储在第一和第二加载器组件可访问的第三个存储区中,并且可以调用第二加载器来尝试使用这些扇区启动操作系统。 反过来,第二装载器可以包括用于从第三商店检索这些扇区的指令,以及用于解密用于对这些扇区进行解密的密钥。 然后,第二加载器可以解密这些扇区,并尝试从这些扇区启动OS。
-
公开(公告)号:US08607065B2
公开(公告)日:2013-12-10
申请号:US12249042
申请日:2008-10-10
Applicant: Stefan Thom , Kevin M. Litwack , Shon Eizenhoefer , Erik L. Holt , Yash Gandhi
Inventor: Stefan Thom , Kevin M. Litwack , Shon Eizenhoefer , Erik L. Holt , Yash Gandhi
CPC classification number: H04L63/0853 , G06F21/57 , G06F21/575 , H04L9/3234 , H04L9/3236 , H04L63/029 , H04L63/0428 , H04L2209/127
Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.
Abstract translation: 提供技术以允许远程初始化可信平台模块。 即使目标设备具有恶意操作系统或其他软件运行,结果也可能被信任和保密。
-
公开(公告)号:US20090100516A1
公开(公告)日:2009-04-16
申请号:US11872220
申请日:2007-10-15
Applicant: Kenneth D. Ray , Kevin M. Litwack , David R. Wooten
Inventor: Kenneth D. Ray , Kevin M. Litwack , David R. Wooten
IPC: H04L9/32 , G06F15/177
CPC classification number: G06F15/177 , G06F9/4418 , G06F21/31 , G06F21/81
Abstract: Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file.
Abstract translation: 讨论从低活动条件恢复的程序。 在实现中,经由加密算法来保护持久状态文件或其一部分,其中解密密钥通过操作系统(OS)登录用户凭证得到保护。 一旦用户通过OS登录认证,持久状态文件可以被解密并插入到OS引导路径中,并通过持久状态文件进行恢复。
-
公开(公告)号:US20100095120A1
公开(公告)日:2010-04-15
申请号:US12249042
申请日:2008-10-10
Applicant: Stefan Thom , Kevin M. Litwack , Shon Eizenhoefer , Erik L. Holt , Yash Gandhi
Inventor: Stefan Thom , Kevin M. Litwack , Shon Eizenhoefer , Erik L. Holt , Yash Gandhi
IPC: H04L9/00
CPC classification number: H04L63/0853 , G06F21/57 , G06F21/575 , H04L9/3234 , H04L9/3236 , H04L63/029 , H04L63/0428 , H04L2209/127
Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.
Abstract translation: 提供技术以允许远程初始化可信平台模块。 即使目标设备具有恶意操作系统或其他软件运行,结果也可能被信任和保密。
-
-
-
-
-