NL1034453A1 - Werkwijze voor het verschaffen van credentialen en softwarebeelden in veilige netwerkomgevingen. - Google Patents

Werkwijze voor het verschaffen van credentialen en softwarebeelden in veilige netwerkomgevingen.

Info

Publication number
NL1034453A1
NL1034453A1 NL1034453A NL1034453A NL1034453A1 NL 1034453 A1 NL1034453 A1 NL 1034453A1 NL 1034453 A NL1034453 A NL 1034453A NL 1034453 A NL1034453 A NL 1034453A NL 1034453 A1 NL1034453 A1 NL 1034453A1
Authority
NL
Netherlands
Prior art keywords
secure network
network environments
software images
boot image
providing credentials
Prior art date
Application number
NL1034453A
Other languages
English (en)
Other versions
NL1034453C2 (nl
Inventor
Karanvir Grewal
Vincent Zimmer
Hormuzd Khosravi
Alan Ross
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of NL1034453A1 publication Critical patent/NL1034453A1/nl
Application granted granted Critical
Publication of NL1034453C2 publication Critical patent/NL1034453C2/nl

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4416Network booting; Remote initial program loading [RIPL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
NL1034453A 2006-09-29 2007-10-01 Werkwijze voor het verschaffen van credentialen en softwarebeelden in veilige netwerkomgevingen. NL1034453C2 (nl)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US54035206 2006-09-29
US11/540,352 US20080082680A1 (en) 2006-09-29 2006-09-29 Method for provisioning of credentials and software images in secure network environments

Publications (2)

Publication Number Publication Date
NL1034453A1 true NL1034453A1 (nl) 2008-04-01
NL1034453C2 NL1034453C2 (nl) 2010-08-18

Family

ID=38702688

Family Applications (1)

Application Number Title Priority Date Filing Date
NL1034453A NL1034453C2 (nl) 2006-09-29 2007-10-01 Werkwijze voor het verschaffen van credentialen en softwarebeelden in veilige netwerkomgevingen.

Country Status (7)

Country Link
US (1) US20080082680A1 (nl)
KR (1) KR100966398B1 (nl)
CN (1) CN101197834A (nl)
DE (1) DE102007046476A1 (nl)
FR (1) FR2906661B1 (nl)
GB (1) GB2442348B (nl)
NL (1) NL1034453C2 (nl)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8254568B2 (en) 2007-01-07 2012-08-28 Apple Inc. Secure booting a computing device
US8239688B2 (en) 2007-01-07 2012-08-07 Apple Inc. Securely recovering a computing device
US9069990B2 (en) * 2007-11-28 2015-06-30 Nvidia Corporation Secure information storage system and method
US8661234B2 (en) * 2008-01-31 2014-02-25 Microsoft Corporation Individualized per device initialization of computing devices in avoidance of mass exploitation of vulnerabilities
US8719585B2 (en) * 2008-02-11 2014-05-06 Nvidia Corporation Secure update of boot image without knowledge of secure key
US9069706B2 (en) * 2008-02-11 2015-06-30 Nvidia Corporation Confidential information protection system and method
US20090204803A1 (en) * 2008-02-11 2009-08-13 Nvidia Corporation Handling of secure storage key in always on domain
US9158896B2 (en) * 2008-02-11 2015-10-13 Nvidia Corporation Method and system for generating a secure key
US20090204801A1 (en) * 2008-02-11 2009-08-13 Nvidia Corporation Mechanism for secure download of code to a locked system
US9613215B2 (en) 2008-04-10 2017-04-04 Nvidia Corporation Method and system for implementing a secure chain of trust
US8150039B2 (en) 2008-04-15 2012-04-03 Apple Inc. Single security model in booting a computing device
US8095799B2 (en) * 2008-07-28 2012-01-10 Apple Inc. Ticket authorized secure installation and boot
US20100122076A1 (en) 2008-09-30 2010-05-13 Aristocrat Technologies Australia Pty Limited Security method
EP2416244A4 (en) * 2009-03-30 2012-08-29 Fujitsu Ltd CONTROL SERVER, BOOT SERVER, NETWORK BOOT SYSTEM, NETWORK BOOT PROCESS, BOOT IMAGE SELECTION PROGRAM, AND BOOT IMAGE PROGRAM
US8799997B2 (en) 2011-04-18 2014-08-05 Bank Of America Corporation Secure network cloud architecture
FR2989197B1 (fr) * 2012-04-05 2014-05-02 Toucan System Procede de securisation d'acces a un dispositif informatique
US9489924B2 (en) 2012-04-19 2016-11-08 Nvidia Corporation Boot display device detection and selection techniques in multi-GPU devices
US10205750B2 (en) 2013-03-13 2019-02-12 Intel Corporation Policy-based secure web boot
US20150193620A1 (en) * 2014-01-07 2015-07-09 Dell Products, Lp System and Method for Managing UEFI Secure Boot Certificates
US10102008B2 (en) * 2015-09-02 2018-10-16 Dell Products L.P. Managed boot process system
WO2018132211A1 (en) 2017-01-12 2018-07-19 Google Llc Verified boot and key rotation
US10204241B2 (en) * 2017-06-30 2019-02-12 Microsoft Technology Licensing, Llc Theft and tamper resistant data protection

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6266809B1 (en) * 1997-08-15 2001-07-24 International Business Machines Corporation Methods, systems and computer program products for secure firmware updates
US6327660B1 (en) * 1998-09-18 2001-12-04 Intel Corporation Method for securing communications in a pre-boot environment
US20030027128A1 (en) * 2000-11-28 2003-02-06 Borman Richard Anthony Methods for the treatment of IBS
US7363376B2 (en) * 2001-07-31 2008-04-22 Arraycomm Llc Method and apparatus for generating an identifier to facilitate delivery of enhanced data services in a mobile computing environment
US7284042B2 (en) * 2001-08-14 2007-10-16 Endforce, Inc. Device plug-in system for configuring network device over a public network
EP1442388A2 (en) * 2001-10-03 2004-08-04 Shield One, LLC Remotely controlled failsafe boot mechanism and remote manager for a network device
US7281126B2 (en) * 2003-05-30 2007-10-09 Sun Microsystems, Inc. Method of installing an image on a client over a network securely using a wanboot binary and a kernel to install the image
US7299354B2 (en) * 2003-09-30 2007-11-20 Intel Corporation Method to authenticate clients and hosts to provide secure network boot
US7194763B2 (en) * 2004-08-02 2007-03-20 Cisco Technology, Inc. Method and apparatus for determining authentication capabilities
US20060056630A1 (en) * 2004-09-13 2006-03-16 Zimmer Vincent J Method to support secure network booting using quantum cryptography and quantum key distribution
US20060129797A1 (en) * 2004-12-15 2006-06-15 Palo Alto Research Center, Inc. Hardware-supported secure network boot

Also Published As

Publication number Publication date
KR100966398B1 (ko) 2010-06-28
GB2442348B (en) 2009-03-18
GB0719016D0 (en) 2007-11-07
GB2442348A (en) 2008-04-02
DE102007046476A1 (de) 2008-05-29
US20080082680A1 (en) 2008-04-03
FR2906661A1 (fr) 2008-04-04
FR2906661B1 (fr) 2012-07-13
NL1034453C2 (nl) 2010-08-18
KR20080029928A (ko) 2008-04-03
CN101197834A (zh) 2008-06-11

Similar Documents

Publication Publication Date Title
NL1034453A1 (nl) Werkwijze voor het verschaffen van credentialen en softwarebeelden in veilige netwerkomgevingen.
Bertino Data Security and Privacy in the IoT.
WO2016049636A3 (en) Remote server encrypted data provisioning system and methods
US20160277933A1 (en) Secure Data Communication system between IoT smart devices and a Network gateway under Internet of Thing environment
WO2007096871A3 (en) Device, system and method of accessing a security token
MY166564A (en) A system and method for privacy management for internet of things services
WO2008124515A3 (en) A system and method for binding a subscription-based computing system to an internet service provider
KR101883816B1 (ko) 클라이언트 디바이스 상에서의 다수의 디지털 저작권 관리 프로토콜 지원 기술
WO2010011731A3 (en) Methods and systems for secure key entry via communication networks
WO2010144815A3 (en) System and method for providing security aboard a moving platform
WO2012015615A3 (en) Device, system, and method forlocation-based payment authorization
WO2007067188A3 (en) Mobile phone age verification system and method for age-restricted promotions
WO2008058095A3 (en) Method and apparatus for enabling content to be shared among multiple devices in a secure environment
TW200640217A (en) System and method for mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server
EA201200084A1 (ru) Способ удалённого контроля и мониторинга данных на десктопе
CN105320535A (zh) 一种安装包的校验方法、客户端、服务器及系统
BR112012023474A2 (pt) sistema, dispositivo de comunicação móvel, software e método para operar dispositivo de comunicação móvel para comunicar-se com servidor remoto.
US20130191897A1 (en) Field Provisioning a Device to a Secure Enclave
US20170061164A1 (en) Two-device scrambled display
JP5112924B2 (ja) アプリケーション移動システム、アプリケーションの移動方法、プログラムおよび携帯端末
GB201306126D0 (en) Method, secure device, system and computer program product for security managing access to a file system
EP3123623B1 (en) Electronic device and communication method for nfc
US20150007347A1 (en) Apparatus and Method to Secure an Electronic Storage Using a Secure Element
WO2010119427A3 (en) Method and system for deployment of software applications to mobile computing devices
GB201305600D0 (en) Security

Legal Events

Date Code Title Description
AD1A A request for search or an international type search has been filed
MM Lapsed because of non-payment of the annual fee

Effective date: 20151101