Futral et al., 2013 - Google Patents
Fundamental principles of intel® txtFutral et al., 2013
View HTML- Document ID
- 2927567322997414769
- Author
- Futral W
- Greene J
- Publication year
- Publication venue
- Intel® Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
External Links
Snippet
The first step to more secure computing is improved hardware. So before we discuss how to use the technology, let's define what constitutes an Intel® TXT–capable platform and the underlying principles behind the technology. We will take a look at the unique components …
- 238000005516 engineering process 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tomlinson | Introduction to the TPM | |
| US12105806B2 (en) | Securing communications with security processors using platform keys | |
| KR101662618B1 (en) | Measuring platform components with a single trusted platform module | |
| CN110199286B (en) | Method and system for data sealing using a seal enclosure | |
| EP2207121B1 (en) | Protecting content on virtualized client platforms | |
| Anati et al. | Innovative technology for CPU based attestation and sealing | |
| KR100930218B1 (en) | Method, apparatus and processing system for providing a software-based security coprocessor | |
| US10803175B2 (en) | Device attestation through security hardened management agent | |
| JP7695011B2 (en) | Protecting commercial off-the-shelf program binaries from theft using hardware enclaves | |
| US9405912B2 (en) | Hardware rooted attestation | |
| AU2011271088B2 (en) | System and method for n-ary locality in a security co-processor | |
| Futral et al. | Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters | |
| US9015454B2 (en) | Binding data to computers using cryptographic co-processor and machine-specific and platform-specific keys | |
| CN107077560B (en) | System for establishing ownership of secure workspace | |
| Fuchs et al. | Advanced remote firmware upgrades using TPM 2.0 | |
| Lee et al. | Secure mobile device structure for trust IoT | |
| Fernandez et al. | A cluster of patterns for trusted computing | |
| Song et al. | Tz-ima: Supporting integrity measurement for applications with arm trustzone | |
| Sisinni | Verification of software integrity in distributed systems | |
| Futral et al. | Fundamental principles of intel® txt | |
| Hao et al. | Trusted block as a service: Towards sensitive applications on the cloud | |
| Kelly | Project Cerberus Security Architecture Overview Specification | |
| Akram et al. | An introduction to the trusted platform module and mobile trusted module | |
| Manferdelli et al. | The cloudproxy tao for trusted computing | |
| WO2025086129A1 (en) | Methods and mechanisms for unified remote attestation for confidential applications in the cloud |