Patent application number | Description | Published |
20080276086 | Method of controlling the processing of data - A method of controlling the processing of data, is provided comprising defining security controls for a plurality of data items, and applying individualised security rules to each of the data items based on a measurement of integrity of a computing entity to which the data items are to be made available. | 11-06-2008 |
20080282348 | Methods, Devices and Data Structures for Trusted Data - A data structure has within it the following elements: an identification of a data structure type; and a proof that two or more instances of the data structure type are as trustworthy as each other. Methods and devices using such data structures are described. | 11-13-2008 |
20100115625 | POLICY ENFORCEMENT IN TRUSTED PLATFORMS - Embodiments of the invention relate to a trusted entity ( | 05-06-2010 |
20100146295 | Trusted Computing Entities - The present invention relates to trust in computing platforms and the like. In particular, embodiments of the invention provide a trusted computing entity ( | 06-10-2010 |
20100241836 | REMOTE CONFIGURATION OF COMPUTING PLATFORMS - An embodiment of the invention relates to a computing platform ( | 09-23-2010 |
20110093693 | BINDING A CRYPTOGRAPHIC MODULE TO A PLATFORM - One embodiment is a computer system having firmware that shares a secret with a cryptographic co-processor to determine if the cryptographic co-processor has been tampered with or removed from the computer system. | 04-21-2011 |
20110099627 | COMPUTING PLATFORM - The present application describes a computing platform incorporating a trusted entity and storing, in non-volatile memory, one or more indicators, which indicate a current update status of an executable program code, and one or more expected values associated with measurement of the program code, the trusted entity being programmed to update the one or more indicators, by reference to the expected values, in response to a measured change in a current update status of the program code. | 04-28-2011 |
20110131420 | COMPUTING ENTITIES, PLATFORMS AND METHODS OPERABLE TO PERFORM OPERATIONS SELECTIVELY USING DIFFERENT CRYPTOGRAPHIC ALGORITHMS - Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms and associated parameters, the entity being programmed to record mode of operation information, which is characterised by the algorithms and associated parameters that are selected to perform an operation. | 06-02-2011 |
20120159157 | REMOTE CONFIGURATION OF COMPUTING PLATFORMS - An embodiment of the invention relates to a computing platform ( | 06-21-2012 |
20130047261 | Data Access Control - A set of data is provided to an application executed in an environment within which the application is restricted from making its output available outside the environment. An operation performed on the set of data by the application is inspected. A determination of whether an output of the application is satisfactory is reached based on the inspection. If the output is determined satisfactory, the output of the application is made available outside the environment. | 02-21-2013 |
20130061056 | EXTENDING AN INTEGRITY MEASUREMENT - A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers (PCRs) for the device and the current values of the listed PCRs and an integrity value identifying the integrity measurement into a policy register, verify a signature over the integrity value extended into the policy register, and, if verification succeeds, extend a verification key of the trusted platform, plus an indication that it is a verification key, into the policy register, compare the integrity value extended into the policy register with a value stored in the trusted platform, and, if they are the same: extend the stored value, plus an indication that it is a stored value, into the policy register, and extend the integrity measurement in the trusted device if the value in the policy register matches a value stored with the integrity measurement. | 03-07-2013 |
20130212391 | ELLIPTIC CURVE CRYPTOGRAPHIC SIGNATURE - A method includes generating a randomized base point and causing the randomized base point and a private key to be loaded into a signature engine device. The method also includes signing a message using the randomized base point and the private key as a base point as well as the private key in an elliptic curve cryptographic (ECC) signature. | 08-15-2013 |
20130239222 | METHODS, DEVICES AND DATA STRUCTURES FOR TRUSTED DATA - An apparatus includes a processor and a memory to implement a method to provide a proof that two or more instances of a data structure type are as trustworthy as each other. | 09-12-2013 |
20140173274 | CREDENTIAL VALIDATION - A message to be signed and a base name point derived from a direct anonymous attestation (DAA) credential may be provided to a device. A signed version of the message and a public key value associated with the base name point may be received in response. Thereafter, the DAA credential may be determined to be valid based on the signed version of the message. | 06-19-2014 |