SG11202007308SA - Clearance of bare metal resource to trusted state usable in cloud computing - Google Patents

Clearance of bare metal resource to trusted state usable in cloud computing

Info

Publication number
SG11202007308SA
SG11202007308SA SG11202007308SA SG11202007308SA SG11202007308SA SG 11202007308S A SG11202007308S A SG 11202007308SA SG 11202007308S A SG11202007308S A SG 11202007308SA SG 11202007308S A SG11202007308S A SG 11202007308SA SG 11202007308S A SG11202007308S A SG 11202007308SA
Authority
SG
Singapore
Prior art keywords
clearance
cloud computing
bare metal
trusted state
metal resource
Prior art date
Application number
SG11202007308SA
Other languages
English (en)
Inventor
Bryan W Tuttle
Carlos Jose Cela
Ho-Yuen Chau
Melur K Raghuraman
Saurabh M Kulkarni
Yimin Deng
Original Assignee
Microsoft Technology Licensing Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing Llc filed Critical Microsoft Technology Licensing Llc
Publication of SG11202007308SA publication Critical patent/SG11202007308SA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)
  • Solid-Sorbent Or Filter-Aiding Compositions (AREA)
  • Emergency Alarm Devices (AREA)
SG11202007308SA 2018-02-14 2019-01-04 Clearance of bare metal resource to trusted state usable in cloud computing SG11202007308SA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862630534P 2018-02-14 2018-02-14
US16/235,771 US11163887B2 (en) 2018-02-14 2018-12-28 Clearance of bare metal resource to trusted state usable in cloud computing
PCT/US2019/012412 WO2019160618A1 (en) 2018-02-14 2019-01-04 Clearance of bare metal resource to trusted state usable in cloud computing

Publications (1)

Publication Number Publication Date
SG11202007308SA true SG11202007308SA (en) 2020-08-28

Family

ID=67541707

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202007308SA SG11202007308SA (en) 2018-02-14 2019-01-04 Clearance of bare metal resource to trusted state usable in cloud computing

Country Status (15)

Country Link
US (1) US11163887B2 (ru)
EP (1) EP3752951B1 (ru)
JP (1) JP7299903B2 (ru)
KR (1) KR102607127B1 (ru)
CN (1) CN111742317B (ru)
AU (1) AU2019220460B2 (ru)
BR (1) BR112020013998A2 (ru)
CA (1) CA3088634A1 (ru)
IL (1) IL276465B2 (ru)
MX (1) MX2020008426A (ru)
PH (1) PH12020551245A1 (ru)
RU (1) RU2020129947A (ru)
SG (1) SG11202007308SA (ru)
WO (1) WO2019160618A1 (ru)
ZA (1) ZA202004081B (ru)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11829478B2 (en) * 2019-01-08 2023-11-28 Oracle International Corporation Full server recovery architecture for cloud bare metal instances
WO2020231418A1 (en) * 2019-05-15 2020-11-19 Hewlett-Packard Development Company, L.P. Update signals
CN110795738B (zh) 2019-09-19 2022-05-13 超聚变数字技术有限公司 一种计算机的启动方法和控制器、存储介质以及系统
CN113965530B (zh) * 2020-07-01 2023-10-13 中移(苏州)软件技术有限公司 一种服务启动方法、装置和存储介质
CN112036828B (zh) * 2020-08-28 2022-06-07 北京浪潮数据技术有限公司 一种裸金属的管理方法、装置、设备及介质
CN112434278B (zh) * 2020-11-20 2024-07-02 北京浪潮数据技术有限公司 一种裸机认证方法、装置、设备及介质
US11593490B2 (en) * 2021-07-28 2023-02-28 Dell Products, L.P. System and method for maintaining trusted execution in an untrusted computing environment using a secure communication channel
CN113986358B (zh) * 2021-09-26 2023-12-26 阿里巴巴(中国)有限公司 裸金属实例装机方法、装置及设备
CN114024853B (zh) * 2021-10-27 2024-05-28 广东浪潮智慧计算技术有限公司 一种裸金属节点的硬件信息收集方法、系统及相关组件
US20230325534A1 (en) * 2022-04-06 2023-10-12 Dell Products L.P. Secure wipe of data processing unit using firmware capsule

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002073438A1 (en) 2001-03-13 2002-09-19 Izorch Systems Method and system for management of remote devices
JP2005535003A (ja) 2001-11-19 2005-11-17 セルフ リペアリング コンピューターズ インコーポレイテッド 複数の独立コンピューティング環境をサポートすることができるコンピュータシステム
JP2009506399A (ja) 2005-06-24 2009-02-12 シンクソート インコーポレイテッド バックアップイメージを仮想化するシステム及び方法
US20080147555A1 (en) * 2006-12-18 2008-06-19 Daryl Carvis Cromer System and Method for Using a Hypervisor to Control Access to a Rental Computer
US8621460B2 (en) 2009-11-02 2013-12-31 International Business Machines Corporation Endpoint-hosted hypervisor management
US8381021B2 (en) 2010-08-25 2013-02-19 Itron, Inc. System and method for automated unattended recovery for remotely deployed intelligent communication devices
US9015455B2 (en) 2011-07-07 2015-04-21 Intel Corporation Processsor integral technologies for BIOS flash attack protection and notification
US9292312B2 (en) * 2012-03-22 2016-03-22 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Simulated network boot environment for bootstrap redirection
US8925066B2 (en) * 2012-11-15 2014-12-30 Red Hat Israel, Ltd. Provisioning proxy for provisioning data on hardware resources
US9275248B1 (en) * 2013-02-13 2016-03-01 Amazon Technologies, Inc. Updating processor microcode
US9230112B1 (en) 2013-02-23 2016-01-05 Xilinx, Inc. Secured booting of a field programmable system-on-chip including authentication of a first stage boot loader to mitigate against differential power analysis
US9594910B2 (en) 2014-03-28 2017-03-14 Intel Corporation In-system provisioning of firmware for a hardware platform
CN104079434A (zh) * 2014-07-07 2014-10-01 用友软件股份有限公司 云计算系统中物理设备管理的装置及方法
WO2016089411A1 (en) * 2014-12-04 2016-06-09 Hewlett-Packard Development Company, L.P. Access to network-based storage resource based on hardware identifier
US9424389B2 (en) * 2014-12-18 2016-08-23 International Business Machines Corporation Implementing enhanced performance dynamic evaluation circuit by combining precharge and delayed keeper
CN107003864B (zh) 2015-01-29 2021-08-20 惠普发展公司,有限责任合伙企业 恢复片上系统设备
US9846617B2 (en) * 2015-05-07 2017-12-19 Dell Products, Lp System and method for self-healing basic input/output system boot image and secure recovery
CN107025223B (zh) * 2016-01-29 2019-11-22 华为技术有限公司 一种面向多租户的缓冲区管理方法及服务器
US20170310700A1 (en) 2016-04-20 2017-10-26 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. System failure event-based approach to addressing security breaches
US10171445B2 (en) * 2016-06-30 2019-01-01 International Business Machines Corporation Secure virtualized servers
US10395039B2 (en) * 2016-09-12 2019-08-27 Dell Products, L.P. Customer-owned trust of device firmware
US10691803B2 (en) * 2016-12-13 2020-06-23 Amazon Technologies, Inc. Secure execution environment on a server
CN107391260A (zh) * 2017-07-27 2017-11-24 郑州云海信息技术有限公司 一种交付裸机资源的方法和装置
US11050635B2 (en) * 2019-02-05 2021-06-29 International Business Machines Corporation Managing bare metal networking in a cloud computing environment

Also Published As

Publication number Publication date
MX2020008426A (es) 2020-09-21
CN111742317B (zh) 2023-07-21
EP3752951B1 (en) 2023-08-23
RU2020129947A (ru) 2022-03-14
KR102607127B1 (ko) 2023-11-27
US11163887B2 (en) 2021-11-02
EP3752951A1 (en) 2020-12-23
CA3088634A1 (en) 2019-08-22
WO2019160618A1 (en) 2019-08-22
KR20200119814A (ko) 2020-10-20
AU2019220460B2 (en) 2023-07-27
JP2021513711A (ja) 2021-05-27
CN111742317A (zh) 2020-10-02
JP7299903B2 (ja) 2023-06-28
PH12020551245A1 (en) 2021-05-17
IL276465A (en) 2020-09-30
US20190251266A1 (en) 2019-08-15
IL276465B1 (en) 2023-10-01
AU2019220460A1 (en) 2020-07-23
IL276465B2 (en) 2024-02-01
BR112020013998A2 (pt) 2020-12-01
ZA202004081B (en) 2021-09-29

Similar Documents

Publication Publication Date Title
IL276465A (en) Certification of an exposed metal resource to a trusted state usable in cloud computing
EP3427150A4 (en) METHODS AND APPARATUS FOR IMPROVING THE USE OF CALCULATION RESOURCES
EP3669494A4 (en) DYNAMIC ALLOCATION OF EDGE COMPUTING RESOURCES IN EDGE COMPUTING CENTERS
HK1251991A1 (zh) 支持網絡功能虛擬化生命週期管理的網絡資源模型
SG10201609756TA (en) Trusted deployment of application containers in cloud data centers
HK1258301A1 (zh) 抗變體fc區抗體及使用方法
IL250149A0 (en) Devices and methods for verifying threats to access computing resources
GB201721486D0 (en) Modification of audio-based computer program output
EP3111329A4 (en) Techniques to allocate configurable computing resources
SG11201707091TA (en) Opportunistic resource migration to optimize resource placement
GB201614550D0 (en) High performance distributed computing environment particularly suited for reservoir modelling and simulation
GB202018128D0 (en) Internet of things resource optimization
EP3111593A4 (en) Techniques for computing resource discovery and management
HK1255250A1 (zh) 對pd-l1具有親和力的新的多肽
EP3320433A4 (en) METHOD AND DEVICE FOR CALCULATING RESOURCE PLANNING
EP2951679A4 (en) DETERMINING THE TRANSFERABILITY OF A CALCULATION RESOURCE TO A COMPUTER CLOUD ENVIRONMENT
ZA201600603B (en) Method for coating metal surfaces of substrates, and objects coated according to said method
SG10201605120SA (en) Resource planning system for cloud computing
EP3491526A4 (en) DETECTION OF RESOURCE LEAKS IN CLOUD COMPUTING ARCHITECTURES
EP3374961A4 (en) ENABLING EFFICIENT CENTRALIZED PRESENTATION OF VIEWPOINT AGNOSTIC GRAPHIC WORKLOADS IN COMPUTER DEVICES
GB201721456D0 (en) Balance modifications of audio-based computer program output
IL252229A0 (en) Techniques for converting network resource requests into free network requests
GB2569270B (en) Parallel computing
EP2908465A4 (en) METHOD FOR HIGH AVAILABILITY AND SYSTEM FOR IMPROVING THE UTILITY OF PHYSICAL SERVERS IN A POOL OF COMPUTING CLOUD RESOURCES
DK3133176T3 (da) Sortering af aluminiumslegeringer ved hjælp af elektriske ledeevneværdier