Smith, 2008 - Google Patents
Storage Protection with Intel Anti-Theft Technology-Data Protection (Intel AT-d).Smith, 2008
- Document ID
- 15350043602841193914
- Author
- Smith N
- Publication year
- Publication venue
- Intel Technology Journal
External Links
Snippet
Abstract Data-at-rest (DAR) encryption, embedded in peripheral controller hardware, combines the security, reliability, and performance benefits of storage device encryption, but it doesn't impact the enterprise services necessary for low-cost operation and worker …
- 238000003860 storage 0 title abstract description 86
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9426147B2 (en) | Protected device management | |
| US8103883B2 (en) | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption | |
| Wright et al. | NCryptfs: A Secure and Convenient Cryptographic File System. | |
| US8261320B1 (en) | Systems and methods for securely managing access to data | |
| JP5592565B2 (en) | Control of platform resources using domain authentication | |
| US20190238323A1 (en) | Key managers for distributed computing systems using key sharing techniques | |
| EP1953669A2 (en) | System and method of storage device data encryption and data access via a hardware key | |
| US20100037296A1 (en) | Client Authentication And Data Management System | |
| CN102948114A (en) | Single-use authentication method for accessing encrypted data | |
| JP2017537381A (en) | Multi-level security system and method for enabling secure file sharing across multiple security levels | |
| JP4087149B2 (en) | Disk device sharing system and computer | |
| Nolte et al. | Secure HPC: A workflow providing a secure partition on an HPC system | |
| Smith et al. | Security issues in on-demand grid and cluster computing | |
| Smith | Storage Protection with Intel Anti-Theft Technology-Data Protection (Intel AT-d). | |
| James et al. | Securing data at rest | |
| Luna | Product overview | |
| HK1181146A (en) | Protected device management | |
| HK1181146B (en) | Protected device management | |
| Ming-wei et al. | A trusted portable computing device | |
| Wynne et al. | Securing Data at Rest. | |
| Deng et al. | A new architecture of sensitive file management based on Dual-Core and EFI |