Noise injected virtual timer
    2.
    发明授权
    Noise injected virtual timer 有权
    噪声注入虚拟计时器

    公开(公告)号:US09378363B1

    公开(公告)日:2016-06-28

    申请号:US14509984

    申请日:2014-10-08

    Abstract: Techniques are described for injecting noise in a timer value provided to an instruction requesting the timer value. A plurality of tasks may execute on a processor, wherein the processor may comprise one or more processing cores and each task may include a plurality of computer executable instructions. In accordance with one technique for injecting noise in the timer value, a request for a first timer value is received by one or more computer executable instructions belonging to a first task from the plurality of tasks, and in response, a second timer value is provided to the first task instead of the first timer value, wherein the second timer value is derived from the first timer value and a random number.

    Abstract translation: 描述了用于在提供给请求定时器值的指令的定时器值中注入噪声的技术。 多个任务可以在处理器上执行,其中处理器可以包括一个或多个处理核心,并且每个任务可以包括多个计算机可执行指令。 根据用于在定时器值中注入噪声的一种技术,通过属于来自多个任务的第一任务的一个或多个计算机可执行指令来接收对第一定时器值的请求,并且作为响应,提供第二定时器值 到第一任务而不是第一定时器值,其中从第一定时器值和随机数导出第二定时器值。

    Multi-tenant trusted platform modules

    公开(公告)号:US10303879B1

    公开(公告)日:2019-05-28

    申请号:US14535056

    申请日:2014-11-06

    Abstract: A multi-tenant trusted platform module (MTTPM) is attached to a communication bus of a virtualization host. The MTTPM includes a plurality of per-guest-virtual-machine (per-GVM) memory location sets. In response to an indication of a first trusted computing request (TCR) associated with a first GVM of a plurality of GVMs instantiated at the virtualization host, a first memory location of a first per-GVM memory location set is accessed to generate a first response indicative of a configuration of the first GVM. In response to an indication of a second TCR associated with a second GVM, a second memory location of a second-per-GVM memory location set is accessed to generate a second response, wherein the second response is indicative of a different configuration of the second GVM.

    Controlling use of encryption keys
    7.
    发明授权
    Controlling use of encryption keys 有权
    控制加密密钥的使用

    公开(公告)号:US09479340B1

    公开(公告)日:2016-10-25

    申请号:US14673585

    申请日:2015-03-30

    Abstract: A computing device includes a processor and a persistent memory for storing information about a first public key associated with a first asymmetric key pair for authenticating the source of a digital certificate. The computing device also includes a second memory for storing one or more current key version indicators. Each of the current key version indicators is associated with a corresponding secondary public key, and the one or more current key version indicators are used by the processor to determine the trust of the corresponding secondary public key.

    Abstract translation: 计算设备包括处理器和持久存储器,用于存储关于与用于认证数字证书的来源的第一非对称密钥对相关联的第一公共密钥的信息。 计算设备还包括用于存储一个或多个当前密钥版本指示符的第二存储器。 当前密钥版本指示符中的每一个与相应的次级公钥相关联,并且处理器使用一个或多个当前密钥版本指示符来确定对应的次级公钥的信任。

    Controlling use of encryption keys

    公开(公告)号:US10116645B1

    公开(公告)日:2018-10-30

    申请号:US15299183

    申请日:2016-10-20

    Abstract: A computing device includes a processor and a persistent memory for storing information about a first public key associated with a first asymmetric key pair for authenticating the source of a digital certificate. The computing device also includes a second memory for storing one or more current key version indicators. Each of the current key version indicators is associated with a corresponding secondary public key, and the one or more current key version indicators are used by the processor to determine the trust of the corresponding secondary public key.

Patent Agency Ranking