Futral et al., 2013 - Google Patents
Fundamental principles of intel® txtFutral et al., 2013
View HTML- Document ID
- 2927567322997414769
- Author
- Futral W
- Greene J
- Publication year
- Publication venue
- Intel® Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
External Links
Snippet
The first step to more secure computing is improved hardware. So before we discuss how to use the technology, let's define what constitutes an Intel® TXT–capable platform and the underlying principles behind the technology. We will take a look at the unique components …
- 238000005516 engineering process 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tomlinson | Introduction to the TPM | |
| US12105806B2 (en) | Securing communications with security processors using platform keys | |
| EP2207121B1 (en) | Protecting content on virtualized client platforms | |
| CN110199286B (en) | Method and system for data sealing using sealed enclave | |
| KR101662618B1 (en) | Measuring platform components with a single trusted platform module | |
| KR100930218B1 (en) | Method, apparatus and processing system for providing a software-based security coprocessor | |
| Anati et al. | Innovative technology for CPU based attestation and sealing | |
| US10803175B2 (en) | Device attestation through security hardened management agent | |
| US10664599B2 (en) | Portable executable and non-portable executable boot file security | |
| JP7695011B2 (en) | Protecting commercial off-the-shelf program binaries from theft using hardware enclaves | |
| US9405912B2 (en) | Hardware rooted attestation | |
| AU2011271088B2 (en) | System and method for n-ary locality in a security co-processor | |
| Futral et al. | Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters | |
| Fuchs et al. | Advanced remote firmware upgrades using TPM 2.0 | |
| Gallery et al. | Trusted computing: Security and applications | |
| Fernandez et al. | A cluster of patterns for trusted computing | |
| Lee et al. | Secure mobile device structure for trust IoT | |
| Song et al. | Tz-ima: Supporting integrity measurement for applications with arm trustzone | |
| Futral et al. | Fundamental principles of intel® txt | |
| Sisinni | Verification of software integrity in distributed systems | |
| US20250190235A1 (en) | Mechanism allowing a host software stack to prove its identity and build trust to a guest | |
| Kelly | Project Cerberus Security Architecture Overview Specification | |
| Akram et al. | An introduction to the trusted platform module and mobile trusted module | |
| Manferdelli et al. | The cloudproxy tao for trusted computing | |
| WO2025086129A1 (en) | Methods and mechanisms for unified remote attestation for confidential applications in the cloud |