JP2008525892A - モニタを用いてtpmを常に“オン”にロックする方法及びシステム - Google Patents
モニタを用いてtpmを常に“オン”にロックする方法及びシステム Download PDFInfo
- Publication number
- JP2008525892A JP2008525892A JP2007548385A JP2007548385A JP2008525892A JP 2008525892 A JP2008525892 A JP 2008525892A JP 2007548385 A JP2007548385 A JP 2007548385A JP 2007548385 A JP2007548385 A JP 2007548385A JP 2008525892 A JP2008525892 A JP 2008525892A
- Authority
- JP
- Japan
- Prior art keywords
- computer
- monitor
- watchdog circuit
- signal
- tpm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (20)
- モニタのオペレーションを行使するための信頼されたコンピューティングベースを実施するコンピュータであって、
前記モニタを実行するプロセッサと、
前記プロセッサに接続され、前記モニタの実行を確実にする信頼された環境であって、前記モニタからメッセージを受信するようになっている前記信頼された環境と、
前記信頼された環境に接続されたウォッチドッグ回路であって、前記信頼された環境がある期間内にメッセージを受信しない限り、前記期間後に前記コンピュータを妨害するウォッチドッグ回路と、
を備えたことを特徴とするコンピュータ。 - 前記信頼された環境は暗号によって前記モニタを識別することを特徴とする、請求項1に記載のコンピュータ。
- 前記信頼された環境は汎用入出力をさらに備え、前記モニタは暗号によって識別された後に、前記汎用入出力へのアクセス権を与えられることを特徴とする、請求項2に記載のコンピュータ。
- 前記ウォッチドッグ回路は、前記期間を判断するタイマを有し、
前記ウォッチドッグ回路は、署名されたリスタート信号が検証されると、前記タイマをリスタートするための前記署名されたリスタート信号を受信することを特徴とする、請求項1に記載のコンピュータ。 - 前記信頼された環境は前記ウォッチドッグ回路に専用通信線を介して接続されていることを特徴とする、請求項1に記載のコンピュータ。
- 前記ウォッチドッグ回路は、前記コンピュータを妨害するとき、前記コンピュータをリブートさせることを特徴とする、請求項1に記載のコンピュータ。
- コンピュータをリブートさせるための信号はコンダクタに搭載され、前記コンダクタは改ざんに対して抵抗力を持つことを特徴とする、請求項6に記載のコンピュータ。
- 前記モニタは、前記メッセージ送信と共に、少なくとも一回トークンを検証することを特徴とする、請求項1に記載のコンピュータ。
- 前記トークンは、前記モニタが最新バージョンであるかを判断するために前記モニタによって用いられるバージョン番号を含むことを特徴とする、請求項9に記載のコンピュータ。
- コンピュータにおいて知られた操作状態を奨励する方法であって、
知られたモニタを実行するステップと、
前記知られたモニタからウォッチドッグ回路に信号を送るステップと、
前記ウォッチドッグ回路が前記コンピュータのオペレーションを妨害するのを前記信号に応じて防ぐステップと
を有することを特徴とする方法。 - 前記知られたモニタの信頼性を検証するステップをさらに有することを特徴とする、請求項10に記載の方法。
- 前記信号を前記モニタから送るステップは、前記信号を前記ウォッチドッグ回路に送る前に前記信号を前記モニタから信頼された環境に送るステップをさらに有することを特徴とする、請求項10に記載の方法。
- 前記信号に署名し、前記ウォッチドッグが前記信号の信頼性を検証するステップをさらに有することを特徴とする、請求項10に記載の方法。
- 前記信号が所定期間内に受信されないとき、前記コンピュータのオペレーションを妨害するステップをさらに有することを特徴とする、請求項10に記載の方法。
- ある期間を判断するタイマと、
前記タイマをリスタートするための信号を受信する入力と、
前記期間の間に前記信号が受信されないときに前記コンピュータのオペレーションを妨害する出力と、
を備えたことを特徴とするコンピュータ用ウォッチドッグ回路。 - 暗号能力であって、前記信号がデジタル署名されており暗号回路が前記信号の信頼性を判断する、暗号能力をさらに備えたことを特徴とする、請求項15に記載のコンピュータ用ウォッチドッグ回路。
- 前記入力は、信頼された環境と接続されていることを特徴とする、請求項15に記載のコンピュータ用ウォッチドッグ回路。
- 前記信頼された環境は前記ウォッチドッグ回路への前記信号を規制することを特徴とする、請求項17に記載のコンピュータ用ウォッチドッグ回路。
- 前記出力は、リセット回路とバスドライバ回路とのいずれか一方に接続されていることを特徴とする、請求項15に記載のコンピュータ用ウォッチドッグ回路。
- 前記ウォッチドッグ回路は、前記タイマと、前記入力と、前記出力とのいずれか1つへのアクセスを制限するよう、前記コンピュータ内に配置されていることを特徴とする、請求項15に記載のコンピュータ用ウォッチドッグ回路。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/021,021 US7360253B2 (en) | 2004-12-23 | 2004-12-23 | System and method to lock TPM always ‘on’ using a monitor |
US11/021,021 | 2004-12-23 | ||
PCT/US2005/046091 WO2006071630A2 (en) | 2004-12-23 | 2005-12-20 | System and method to lock tpm always 'on' using a monitor |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2008525892A true JP2008525892A (ja) | 2008-07-17 |
JP2008525892A5 JP2008525892A5 (ja) | 2009-02-12 |
JP4945454B2 JP4945454B2 (ja) | 2012-06-06 |
Family
ID=36613166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2007548385A Expired - Fee Related JP4945454B2 (ja) | 2004-12-23 | 2005-12-20 | モニタを用いてtpmを常に“オン”にロックする方法及びシステム |
Country Status (9)
Country | Link |
---|---|
US (1) | US7360253B2 (ja) |
EP (1) | EP1829274A4 (ja) |
JP (1) | JP4945454B2 (ja) |
KR (1) | KR101213807B1 (ja) |
CN (1) | CN101116070B (ja) |
BR (1) | BRPI0519080A2 (ja) |
MX (1) | MX2007006143A (ja) |
RU (1) | RU2007123617A (ja) |
WO (1) | WO2006071630A2 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012519325A (ja) * | 2009-02-27 | 2012-08-23 | マイクロソフト コーポレーション | 信頼済エンティティベース不正対策機構 |
JP2015072683A (ja) * | 2013-09-25 | 2015-04-16 | マックス プランク ゲゼルシャフト ツール フォーデルング デル ヴィッセンシャフテン | 匿名データの第三者の監視を実行するためのシステム及び方法 |
JP2020003957A (ja) * | 2018-06-26 | 2020-01-09 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及び改ざん検知方法 |
JP2022087195A (ja) * | 2018-06-26 | 2022-06-09 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及び改ざん検知方法 |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US20060242406A1 (en) | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
US8176564B2 (en) | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
US8464348B2 (en) | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US8353046B2 (en) | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
US20070168574A1 (en) * | 2005-09-28 | 2007-07-19 | Dell Products L.P. | System and method for securing access to general purpose input/output ports in a computer system |
JP2007242207A (ja) * | 2006-03-13 | 2007-09-20 | Fujitsu Ltd | ディスク装置の媒体スキャン方法 |
JP4769608B2 (ja) * | 2006-03-22 | 2011-09-07 | 富士通株式会社 | 起動検証機能を有する情報処理装置 |
US7984283B2 (en) * | 2006-05-22 | 2011-07-19 | Hewlett-Packard Development Company, L.P. | System and method for secure operating system boot |
US8122258B2 (en) * | 2006-05-22 | 2012-02-21 | Hewlett-Packard Development Company, L.P. | System and method for secure operating system boot |
JP4048382B1 (ja) * | 2006-09-01 | 2008-02-20 | 富士ゼロックス株式会社 | 情報処理システムおよびプログラム |
US20080077420A1 (en) * | 2006-09-27 | 2008-03-27 | Daryl Cromer | System and Method for Securely Updating Remaining Time or Subscription Data for a Rental Computer |
US7971056B2 (en) * | 2006-12-18 | 2011-06-28 | Microsoft Corporation | Direct memory access for compliance checking |
US20080147555A1 (en) * | 2006-12-18 | 2008-06-19 | Daryl Carvis Cromer | System and Method for Using a Hypervisor to Control Access to a Rental Computer |
US7631169B2 (en) * | 2007-02-02 | 2009-12-08 | International Business Machines Corporation | Fault recovery on a massively parallel computer system to handle node failures without ending an executing job |
US8522043B2 (en) * | 2007-06-21 | 2013-08-27 | Microsoft Corporation | Hardware-based computer theft deterrence |
US20100212021A1 (en) * | 2009-02-18 | 2010-08-19 | Harris Technology, Llc | Decrement software |
JP4743297B2 (ja) * | 2009-03-16 | 2011-08-10 | コニカミノルタビジネステクノロジーズ株式会社 | 画像形成装置、機能拡張方法およびユーザ認証システム |
ES2415832T3 (es) | 2010-06-03 | 2013-07-29 | Telefonaktiebolaget L M Ericsson Ab (Publ) | Dispositivo de procesamiento |
CN101984575B (zh) * | 2010-10-14 | 2015-06-03 | 中兴通讯股份有限公司 | 一种保护移动终端软件的方法和装置 |
CN102063593B (zh) * | 2011-01-07 | 2013-01-09 | 北京工业大学 | 主动控制功能的可信设备及其认证方法 |
US8375221B1 (en) | 2011-07-29 | 2013-02-12 | Microsoft Corporation | Firmware-based trusted platform module for arm processor architectures and trustzone security extensions |
US9256734B2 (en) * | 2012-04-27 | 2016-02-09 | Broadcom Corporation | Security controlled multi-processor system |
US9426127B2 (en) * | 2012-05-02 | 2016-08-23 | Visa International Service Association | Small form-factor cryptographic expansion device |
US9633210B2 (en) | 2013-09-13 | 2017-04-25 | Microsoft Technology Licensing, Llc | Keying infrastructure |
WO2015047258A1 (en) * | 2013-09-25 | 2015-04-02 | Intel Corporation | Method, apparatus and system for providing transaction indemnification |
EP2955872B1 (en) * | 2014-06-12 | 2016-10-12 | Nxp B.V. | Method for configuring a secure element, key derivation program, computer program product and configurable secure element |
US10097513B2 (en) | 2014-09-14 | 2018-10-09 | Microsoft Technology Licensing, Llc | Trusted execution environment extensible computing device interface |
US20170116432A1 (en) * | 2015-01-22 | 2017-04-27 | Daniel Minoli | System and methods for cyber-and-physically-secure high grade weaponry |
CN105989283B (zh) | 2015-02-06 | 2019-08-09 | 阿里巴巴集团控股有限公司 | 一种识别病毒变种的方法及装置 |
US9612893B2 (en) | 2015-05-11 | 2017-04-04 | Silicon Laboratories Inc. | Peripheral watchdog timer |
EP3270321B1 (en) * | 2016-07-14 | 2020-02-19 | Kontron Modular Computers SAS | Technique for securely performing an operation in an iot environment |
US10402566B2 (en) * | 2016-08-01 | 2019-09-03 | The Aerospace Corporation | High assurance configuration security processor (HACSP) for computing devices |
WO2019035825A1 (en) | 2017-08-16 | 2019-02-21 | Hewlett-Packard Development Company, L.P. | MONITORING MEMORY |
US10659054B2 (en) * | 2018-02-23 | 2020-05-19 | Nxp B.V. | Trusted monotonic counter using internal and external non-volatile memory |
US10965551B2 (en) * | 2018-11-21 | 2021-03-30 | Microsoft Technology Licensing, Llc | Secure count in cloud computing networks |
US11232217B2 (en) * | 2018-12-06 | 2022-01-25 | Oracle International Corporation | Managing a security policy for a device |
US11316694B2 (en) | 2019-03-27 | 2022-04-26 | Microsoft Technology Licensing, Llc | Cryptographic hardware watchdog |
DE102020114199A1 (de) | 2020-05-27 | 2021-12-02 | Basler Aktiengesellschaft | Absicherung von Computersystemen gegen Manipulationen und Funktionsanomalien |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0635718A (ja) * | 1992-07-15 | 1994-02-10 | Matsushita Electric Works Ltd | システム異常時のシステム縮退方式 |
JP2001051742A (ja) * | 1999-07-13 | 2001-02-23 | Internatl Business Mach Corp <Ibm> | 実行可能モジュールおよび関連する保護サービス・プロバイダ・モジュールの完全性検査方法および装置 |
JP2001101033A (ja) * | 1999-09-27 | 2001-04-13 | Hitachi Ltd | オペレーティングシステム及びアプリケーションプログラムの障害監視方法 |
JP2003507785A (ja) * | 1999-08-13 | 2003-02-25 | ヒューレット・パッカード・カンパニー | コンピュータ・プラットフォームおよびその運用方法 |
JP2003208314A (ja) * | 2002-01-15 | 2003-07-25 | Mitsubishi Electric Corp | オペレーティングシステムの自動入れ替え可能な計算機システムおよびそのシステムを利用したオペレーションシステムの自動入れ替え方法 |
Family Cites Families (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4817094A (en) * | 1986-12-31 | 1989-03-28 | International Business Machines Corporation | Fault tolerant switch with selectable operating modes |
US4855922A (en) * | 1987-03-20 | 1989-08-08 | Scientific-Atlanta, Inc. | Apparatus and method for monitoring an energy management system |
US6507909B1 (en) * | 1990-02-13 | 2003-01-14 | Compaq Information Technologies Group, L.P. | Method for executing trusted-path commands |
DE4039355C2 (de) * | 1990-12-10 | 1998-07-30 | Bosch Gmbh Robert | Vorrichtung zur Funktionsüberprüfung einer Watchdog-Schaltung |
US5563799A (en) * | 1994-11-10 | 1996-10-08 | United Technologies Automotive, Inc. | Low cost/low current watchdog circuit for microprocessor |
CN1153348A (zh) * | 1995-12-25 | 1997-07-02 | 合泰半导体股份有限公司 | 微处理器旗标设定电路 |
DE19712375A1 (de) * | 1997-03-25 | 1998-10-01 | Bosch Gmbh Robert | Watchdog-Schaltung |
DE19744375A1 (de) * | 1997-10-08 | 1999-04-15 | Philips Patentverwaltung | Steuerschaltung für einen Microcontroller |
US6385727B1 (en) * | 1998-09-25 | 2002-05-07 | Hughes Electronics Corporation | Apparatus for providing a secure processing environment |
CN1107920C (zh) * | 1998-11-27 | 2003-05-07 | 中国科学院空间科学与应用研究中心 | 一种通用的数据采集装置及其数据采集方法 |
DE60044844D1 (de) * | 1999-02-15 | 2010-09-30 | Hewlett Packard Co | Kommunikation zwischen modulen in einer rechenvorrichtung |
GB0020488D0 (en) * | 2000-08-18 | 2000-10-11 | Hewlett Packard Co | Trusted status rollback |
GB0020441D0 (en) * | 2000-08-18 | 2000-10-04 | Hewlett Packard Co | Performance of a service on a computing platform |
US7000100B2 (en) * | 2001-05-31 | 2006-02-14 | Hewlett-Packard Development Company, L.P. | Application-level software watchdog timer |
AU2002337809A1 (en) | 2001-10-03 | 2003-04-14 | Shield One, Llc | Remotely controlled failsafe boot mechanism and remote manager for a network device |
US7490250B2 (en) * | 2001-10-26 | 2009-02-10 | Lenovo (Singapore) Pte Ltd. | Method and system for detecting a tamper event in a trusted computing environment |
US6744616B2 (en) * | 2001-12-28 | 2004-06-01 | General Electric Company | Method and apparatus for controlling an electronic control |
US7013384B2 (en) * | 2002-01-15 | 2006-03-14 | Lenovo (Singapore) Pte. Ltd. | Computer system with selectively available immutable boot block code |
US7127579B2 (en) * | 2002-03-26 | 2006-10-24 | Intel Corporation | Hardened extended firmware interface framework |
US7069442B2 (en) * | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
US7028149B2 (en) * | 2002-03-29 | 2006-04-11 | Intel Corporation | System and method for resetting a platform configuration register |
US7130951B1 (en) * | 2002-04-18 | 2006-10-31 | Advanced Micro Devices, Inc. | Method for selectively disabling interrupts on a secure execution mode-capable processor |
EP1519775B1 (en) * | 2002-07-05 | 2013-03-20 | Mudalla Technology, Inc. | Secure game download |
US7000829B1 (en) * | 2002-07-16 | 2006-02-21 | Diebold, Incorporated | Automated banking machine key loading system and method |
US7121460B1 (en) * | 2002-07-16 | 2006-10-17 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Automated banking machine component authentication system and method |
EP1429224A1 (en) | 2002-12-10 | 2004-06-16 | Texas Instruments Incorporated | Firmware run-time authentication |
DE10235564A1 (de) * | 2002-08-03 | 2004-02-12 | Robert Bosch Gmbh | Verfahren zum Überwachen eines Mikroprozessors und Schaltungsanordnung mit einem Mikroprozessor |
US7171539B2 (en) * | 2002-11-18 | 2007-01-30 | Arm Limited | Apparatus and method for controlling access to a memory |
CN2599652Y (zh) * | 2002-12-04 | 2004-01-14 | 华为技术有限公司 | 一种看门狗清狗电路 |
GB2400461B (en) * | 2003-04-07 | 2006-05-31 | Hewlett Packard Development Co | Control of access to of commands to computing apparatus |
TWI319147B (en) * | 2003-04-10 | 2010-01-01 | Lenovo Singapore Pte Ltd | Apparatus, motherboard, method and computer-readable storage medium recording instructions capable of determinging physical presence in a trusted platform in a computer system |
US7444667B2 (en) * | 2003-07-28 | 2008-10-28 | Intel Corporation | Method and apparatus for trusted blade device computing |
US7275263B2 (en) * | 2003-08-11 | 2007-09-25 | Intel Corporation | Method and system and authenticating a user of a computer system that has a trusted platform module (TPM) |
US7533274B2 (en) * | 2003-11-13 | 2009-05-12 | International Business Machines Corporation | Reducing the boot time of a TCPA based computing system when the core root of trust measurement is embedded in the boot block code |
US7222062B2 (en) * | 2003-12-23 | 2007-05-22 | Intel Corporation | Method and system to support a trusted set of operational environments using emulated trusted hardware |
US20050138389A1 (en) * | 2003-12-23 | 2005-06-23 | International Business Machines Corporation | System and method for making password token portable in trusted platform module (TPM) |
US7207039B2 (en) * | 2003-12-24 | 2007-04-17 | Intel Corporation | Secure booting and provisioning |
US7421588B2 (en) * | 2003-12-30 | 2008-09-02 | Lenovo Pte Ltd | Apparatus, system, and method for sealing a data repository to a trusted computing platform |
US20050166051A1 (en) * | 2004-01-26 | 2005-07-28 | Mark Buer | System and method for certification of a secure platform |
US7653727B2 (en) * | 2004-03-24 | 2010-01-26 | Intel Corporation | Cooperative embedded agents |
US20050221766A1 (en) * | 2004-03-31 | 2005-10-06 | Brizek John P | Method and apparatus to perform dynamic attestation |
US8271783B2 (en) * | 2004-04-19 | 2012-09-18 | Hewlett-Packard Development Company, L.P. | Subordinate trusted platform module |
US7480804B2 (en) * | 2004-04-29 | 2009-01-20 | International Business Machines Corporation | Method and system for hierarchical platform boot measurements in a trusted computing environment |
US7380119B2 (en) * | 2004-04-29 | 2008-05-27 | International Business Machines Corporation | Method and system for virtualization of trusted platform modules |
US7484091B2 (en) * | 2004-04-29 | 2009-01-27 | International Business Machines Corporation | Method and system for providing a trusted platform module in a hypervisor environment |
US7664965B2 (en) * | 2004-04-29 | 2010-02-16 | International Business Machines Corporation | Method and system for bootstrapping a trusted server having redundant trusted platform modules |
US20060010326A1 (en) * | 2004-07-08 | 2006-01-12 | International Business Machines Corporation | Method for extending the CRTM in a trusted platform |
US7716494B2 (en) * | 2004-07-15 | 2010-05-11 | Sony Corporation | Establishing a trusted platform in a digital processing system |
US7552326B2 (en) * | 2004-07-15 | 2009-06-23 | Sony Corporation | Use of kernel authorization data to maintain security in a digital processing system |
US20060015732A1 (en) * | 2004-07-15 | 2006-01-19 | Sony Corporation | Processing system using internal digital signatures |
US20060026418A1 (en) * | 2004-07-29 | 2006-02-02 | International Business Machines Corporation | Method, apparatus, and product for providing a multi-tiered trust architecture |
US20060026422A1 (en) * | 2004-07-29 | 2006-02-02 | International Business Machines Corporation | Method, apparatus, and product for providing a backup hardware trusted platform module in a hypervisor environment |
US7478246B2 (en) * | 2004-07-29 | 2009-01-13 | International Business Machines Corporation | Method for providing a scalable trusted platform module in a hypervisor environment |
US8160244B2 (en) * | 2004-10-01 | 2012-04-17 | Broadcom Corporation | Stateless hardware security module |
US20060072748A1 (en) * | 2004-10-01 | 2006-04-06 | Mark Buer | CMOS-based stateless hardware security module |
US7653819B2 (en) * | 2004-10-01 | 2010-01-26 | Lenovo Singapore Pte Ltd. | Scalable paging of platform configuration registers |
US7516326B2 (en) * | 2004-10-15 | 2009-04-07 | Hewlett-Packard Development Company, L.P. | Authentication system and method |
US8166296B2 (en) * | 2004-10-20 | 2012-04-24 | Broadcom Corporation | User authentication system |
US8332653B2 (en) * | 2004-10-22 | 2012-12-11 | Broadcom Corporation | Secure processing environment |
US20060112267A1 (en) * | 2004-11-23 | 2006-05-25 | Zimmer Vincent J | Trusted platform storage controller |
US7987356B2 (en) * | 2004-11-29 | 2011-07-26 | Broadcom Corporation | Programmable security platform |
US20060129824A1 (en) * | 2004-12-15 | 2006-06-15 | Hoff James P | Systems, methods, and media for accessing TPM keys |
US20060136717A1 (en) * | 2004-12-20 | 2006-06-22 | Mark Buer | System and method for authentication via a proximate device |
US7373551B2 (en) * | 2004-12-21 | 2008-05-13 | Intel Corporation | Method to provide autonomic boot recovery |
-
2004
- 2004-12-23 US US11/021,021 patent/US7360253B2/en not_active Expired - Fee Related
-
2005
- 2005-12-20 RU RU2007123617/09A patent/RU2007123617A/ru not_active Application Discontinuation
- 2005-12-20 EP EP05854752A patent/EP1829274A4/en not_active Ceased
- 2005-12-20 BR BRPI0519080-0A patent/BRPI0519080A2/pt not_active IP Right Cessation
- 2005-12-20 JP JP2007548385A patent/JP4945454B2/ja not_active Expired - Fee Related
- 2005-12-20 KR KR1020077012294A patent/KR101213807B1/ko active IP Right Grant
- 2005-12-20 WO PCT/US2005/046091 patent/WO2006071630A2/en active Application Filing
- 2005-12-20 MX MX2007006143A patent/MX2007006143A/es active IP Right Grant
- 2005-12-20 CN CN2005800407642A patent/CN101116070B/zh not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0635718A (ja) * | 1992-07-15 | 1994-02-10 | Matsushita Electric Works Ltd | システム異常時のシステム縮退方式 |
JP2001051742A (ja) * | 1999-07-13 | 2001-02-23 | Internatl Business Mach Corp <Ibm> | 実行可能モジュールおよび関連する保護サービス・プロバイダ・モジュールの完全性検査方法および装置 |
JP2003507785A (ja) * | 1999-08-13 | 2003-02-25 | ヒューレット・パッカード・カンパニー | コンピュータ・プラットフォームおよびその運用方法 |
JP2001101033A (ja) * | 1999-09-27 | 2001-04-13 | Hitachi Ltd | オペレーティングシステム及びアプリケーションプログラムの障害監視方法 |
JP2003208314A (ja) * | 2002-01-15 | 2003-07-25 | Mitsubishi Electric Corp | オペレーティングシステムの自動入れ替え可能な計算機システムおよびそのシステムを利用したオペレーションシステムの自動入れ替え方法 |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012519325A (ja) * | 2009-02-27 | 2012-08-23 | マイクロソフト コーポレーション | 信頼済エンティティベース不正対策機構 |
US9805196B2 (en) | 2009-02-27 | 2017-10-31 | Microsoft Technology Licensing, Llc | Trusted entity based anti-cheating mechanism |
JP2015072683A (ja) * | 2013-09-25 | 2015-04-16 | マックス プランク ゲゼルシャフト ツール フォーデルング デル ヴィッセンシャフテン | 匿名データの第三者の監視を実行するためのシステム及び方法 |
JP2017050023A (ja) * | 2013-09-25 | 2017-03-09 | マックス プランク ゲゼルシャフト ツール フォーデルング デル ヴィッセンシャフテン エー ファオ | 匿名データの第三者の監視を実行するためのシステム及び方法 |
JP2020003957A (ja) * | 2018-06-26 | 2020-01-09 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及び改ざん検知方法 |
JP7059127B2 (ja) | 2018-06-26 | 2022-04-25 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及びその制御方法 |
JP2022087195A (ja) * | 2018-06-26 | 2022-06-09 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及び改ざん検知方法 |
JP7322233B2 (ja) | 2018-06-26 | 2023-08-07 | キヤノン株式会社 | 起動時に実行されるソフトウェアの改ざんを検知する情報処理装置及び改ざん検知方法 |
Also Published As
Publication number | Publication date |
---|---|
EP1829274A2 (en) | 2007-09-05 |
EP1829274A4 (en) | 2012-01-18 |
KR101213807B1 (ko) | 2012-12-18 |
US7360253B2 (en) | 2008-04-15 |
WO2006071630A2 (en) | 2006-07-06 |
MX2007006143A (es) | 2007-07-19 |
RU2007123617A (ru) | 2008-12-27 |
WO2006071630A3 (en) | 2007-08-02 |
BRPI0519080A2 (pt) | 2008-12-23 |
US20060143446A1 (en) | 2006-06-29 |
CN101116070B (zh) | 2010-06-09 |
JP4945454B2 (ja) | 2012-06-06 |
KR20070097031A (ko) | 2007-10-02 |
CN101116070A (zh) | 2008-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4945454B2 (ja) | モニタを用いてtpmを常に“オン”にロックする方法及びシステム | |
US7322042B2 (en) | Secure and backward-compatible processor and secure software execution thereon | |
US7984283B2 (en) | System and method for secure operating system boot | |
JP4883459B2 (ja) | ポイントツーポイント相互接続システム上のセキュアな環境初期化命令の実行 | |
JP4981051B2 (ja) | ライセンスに従う製品の挙動変更 | |
JP4278327B2 (ja) | コンピュータ・プラットフォームおよびその運用方法 | |
US8122258B2 (en) | System and method for secure operating system boot | |
RU2385483C2 (ru) | Система и способ использования гипервизора, чтобы управлять доступом к предоставляемой в аренду вычислительной машине | |
US7614087B2 (en) | Apparatus, method and computer program for controlling use of a content | |
US8438621B2 (en) | Method and apparatus for secure management of debugging processes within communication devices | |
US8255988B2 (en) | Direct peripheral communication for restricted mode operation | |
US9832230B2 (en) | IC chip, information processing apparatus, system, method, and program | |
KR20070084257A (ko) | Cpu 및 마더보드에 고정된 고립형 컴퓨팅 환경 | |
US20080005560A1 (en) | Independent Computation Environment and Provisioning of Computing Device Functionality | |
KR20070084258A (ko) | 원하지 않은 상태의 검출시에 진입되는 특수한 pc 모드 | |
US7890756B2 (en) | Verification system and method for accessing resources in a computing environment | |
US20230010319A1 (en) | Deriving independent symmetric encryption keys based upon a type of secure boot using a security processor | |
US11977639B2 (en) | Indicating a type of secure boot to endpoint devices by a security processor | |
US11816252B2 (en) | Managing control of a security processor in a supply chain | |
US20230015334A1 (en) | Deriving dependent symmetric encryption keys based upon a type of secure boot using a security processor | |
WO2024078159A1 (zh) | 完整性度量方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Written amendment |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20081218 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20081218 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110909 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20110914 |
|
A521 | Written amendment |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20111209 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120228 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120305 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 4945454 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150309 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |