Method and system for enterprise network single-sign-on by a manageability engine

A management and enterprise network technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as authentication user difficulties

Active Publication Date: 2015-05-13
INTEL CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Current practice relies on the operating system (OS) to perform the initial authentication,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for enterprise network single-sign-on by a manageability engine
  • Method and system for enterprise network single-sign-on by a manageability engine
  • Method and system for enterprise network single-sign-on by a manageability engine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] While the invention is described herein with reference to exemplary embodiments for particular applications, it should be understood that the invention is not limited to these exemplary embodiments. Those skilled in the relevant art, using the teachings provided herein, will recognize other modifications, applications, and implementations within the scope of the invention and in other fields in which embodiments of the invention have obvious application.

[0014] Reference in the specification to "one embodiment," "an embodiment," or "another embodiment" of the invention means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one implementation of the invention. example. Thus, appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout the specification are not necessarily referring to the same embodiment.

[0015] Embodiments of the present invention provide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has successfully authenticated to the PC. The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK). The KEK may later be used by the PC to obtain a credential used to establish secure access to Enterprise servers.

Description

technical field [0001] The present invention generally relates to user authentication. More specifically, the present invention relates to methods and systems for enterprise network single sign-on using a manageability engine. Background technique [0002] for data protection Anti-Theft TM Technology (AT-d) is a platform capability to add full disk encryption (FDE) to the chipset and its peripheral components. All data on drives protected by AT-d is encrypted, including OS (operating system) and user data. Areas that remain unencrypted include the manageability engine (ME) metadata and pre-boot authentication metadata areas. Fully encrypting the drive protects sensitive data contained in paging and configuration files, and it prevents offline attackers from manipulating system files through tool kits. [0003] Fully encrypting drives also presents challenges. For example, access to a disk drive is prohibited for a user until the user is authenticated. Current practic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F21/62H04L9/08
CPCG06F21/575H04L63/0807H04L63/0815G06F21/31G06F21/33G06F21/72G06F21/80G06F2221/2103H04L9/0822H04L9/083H04L9/3213G09G2358/00G06F21/335G06F21/41H04L9/32G06F2221/034
Inventor N·史密斯P·戈埃尔
Owner INTEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products