Protecting software environment in isolated execution
    3.
    发明申请
    Protecting software environment in isolated execution 有权
    在孤立执行中保护软件环境

    公开(公告)号:US20060206943A1

    公开(公告)日:2006-09-14

    申请号:US11386269

    申请日:2006-03-21

    Abstract: A processing system has a processor that can operate in a normal ring 0 operating mode and one or more higher ring operating modes above the normal ring 0 operating mode. In addition, the processor can operate in an isolated execution mode. A memory in the processing system may include an ordinary memory area that can be accessed from the normal ring 0 operating mode, as well as an isolated memory area that can be accessed from the isolated execution mode but not from the normal ring 0 operating mode. The processing system may also include an operating system (OS) nub, as well as a key generator. The key generator may generate an OS nub key (OSNK) based at least in part on an identification of the OS nub and a master binding key (BK0) of the platform. Other embodiments are described and claimed.

    Abstract translation: 处理系统具有处理器,该处理器可以在正常环0操作模式和高于正常环0操作模式的一个或多个较高环操作模式下操作。 此外,处理器可以在隔离的执行模式下操作。 处理系统中的存储器可以包括可以从正常环0操作模式访问的普通存储器区域以及可以从隔离执行模式而不是从正常环0操作模式访问的隔离存储器区域。 处理系统还可以包括操作系统(OS)nub以及密钥生成器。 密钥生成器可以至少部分地基于OS nub的标识和平台的主绑定密钥(BK 0)来生成OS nub密钥(OSNK)。 描述和要求保护其他实施例。

    Platform and method for establishing provable identities while maintaining privacy

    公开(公告)号:US20060080528A1

    公开(公告)日:2006-04-13

    申请号:US11289747

    申请日:2005-11-29

    CPC classification number: H04L9/3265 H04L9/3271 H04L2209/42

    Abstract: In one embodiment, a method for utilizing a pseudonym to protect the identity of a platform and its user is described. The method comprises producing a pseudonym that includes a public pseudonym key. The public pseudonym key is placed in a certificate template. Hash operations are performed on the certificate template to produce a certificate hash value, which is transformed from the platform. Thereafter, a signed result is returned to the platform. The signed result is a digital signature for the transformed certificate hash value. Upon performing an inverse transformation of the signed result, a digital signature of the certificate hash value is recovered. This digital signature may be used for data integrity checks for subsequent communications using the pseudonym.

Patent Agency Ranking