Abstract:
In an embodiment of the present invention, a technique is provided for remote attestation. An interface maps a device via a bus to an address space of a chipset in a secure environment for an isolated execution mode. The secure environment is associated with an isolated memory area accessible by at least one processor. The at least one processor operates in one of a normal execution mode and the isolated execution mode. A communication storage corresponding to the address space allows the device to exchange security information with the at least one processor in the isolated execution mode in a remote attestation.
Abstract:
In one embodiment, a method of remote attestation for a special mode of operation. The method comprises storing an audit log within protected memory of a platform. The audit log is a listing of data representing each of a plurality of IsoX software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.
Abstract:
A processing system has a processor that can operate in a normal ring 0 operating mode and one or more higher ring operating modes above the normal ring 0 operating mode. In addition, the processor can operate in an isolated execution mode. A memory in the processing system may include an ordinary memory area that can be accessed from the normal ring 0 operating mode, as well as an isolated memory area that can be accessed from the isolated execution mode but not from the normal ring 0 operating mode. The processing system may also include an operating system (OS) nub, as well as a key generator. The key generator may generate an OS nub key (OSNK) based at least in part on an identification of the OS nub and a master binding key (BK0) of the platform. Other embodiments are described and claimed.
Abstract:
In one embodiment, a method for utilizing a pseudonym to protect the identity of a platform and its user is described. The method comprises producing a pseudonym that includes a public pseudonym key. The public pseudonym key is placed in a certificate template. Hash operations are performed on the certificate template to produce a certificate hash value, which is transformed from the platform. Thereafter, a signed result is returned to the platform. The signed result is a digital signature for the transformed certificate hash value. Upon performing an inverse transformation of the signed result, a digital signature of the certificate hash value is recovered. This digital signature may be used for data integrity checks for subsequent communications using the pseudonym.
Abstract:
An example processing system comprises a processor to execute in an isolated execution mode in a ring 0 operating mode. The processor also supports one or more higher ring operating modes, as well as a normal execution mode. The processing system also comprises memory, as well as a machine-accessible medium having instructions. When the processing system executes the instructions, the processing system configures the processor to run in the isolated execution mode, configures the processing system to establish an isolated memory area in the memory, and loads initialization software into the isolated memory area. The processing system may provide a manifest that represents the initialization software. The initialization software may be verified, based at least in part on the manifest.
Abstract:
The present invention provides a compound of formula (II): where R1 is a substituted alkyl, heterocyclic, or cycloalkyl, group, and pharmaceutically acceptable salts, enantiomers, stereoisomers, rotamers, tautomers, diastereomers, or racemates thereof, and pharmaceutical compositions comprising these compounds. Also provided are methods of using these compounds to treat a disease or condition mediated by CDK9, such as cancers and other conditions described herein.
Abstract:
Benzoxazole and benzothiazole compounds and their oxides, esters, prodrugs, solvates, and pharmaceutically acceptable salts thereof are disclosed. Compositions of the compounds, either alone or in combination with at least one additional therapeutic agent, with a pharmaceutically acceptable carrier, and uses of the compounds, either alone or in combination with at least one additional therapeutic agent are also disclosed. The embodiments are useful for inhibiting cellular proliferation, inhibiting the growth and/or metathesis of tumors, treating or preventing cancer, treating or preventing degenerating bone diseases such as rheumatoid arthritis, and/or inhibiting molecules such as CSF 1R.
Abstract:
The present invention provides novel urea mimics and analogues of Formula (I): or a stereoisomer, tautomer, pharmaceutically acceptable salt or solvate form thereof, wherein the variables A, B, W, and R6 are as defined herein. These compounds are selective inhibitors of the human P2Y1 receptor which can be used as medicaments.
Abstract:
The present invention provides novel ureas containing N-aryl or N-heteroaryl substituted heterocycles of Formula (I): or a stereoisomer, tautomer, pharmaceutically acceptable salt or solvate form thereof, wherein the variables A, B, D and W are as defined herein. These compounds are selective inhibitors of the human P2Y1 receptor which can be used as medicaments.
Abstract:
One embodiment of the invention includes a method of monitoring behavior of a group of casino game players. The method includes identifying a group of casino game players for profiling; profiling the game players based upon their actions in a gaming establishment; and providing options for game play and service to the game players based upon their profile.