Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for execution of a secured environment initialization instruction

An instruction and security technology, applied in the field of microprocessor systems, which can solve the problems of not allowing the use of common operating systems and application software at the same time, and limiting the degree of approval of trusted systems.

Inactive Publication Date: 2013-10-16
INTEL CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is relatively simple to implement, but the disadvantage is that it does not allow the use of common operating systems and application software available on the market at the same time
This shortcoming limits the degree of acceptance of the above-mentioned trusted systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for execution of a secured environment initialization instruction
  • System and method for execution of a secured environment initialization instruction
  • System and method for execution of a secured environment initialization instruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The following description describes techniques for initializing a trusted or secure environment within a microprocessor system. In the following description, numerous specific details are set forth, such as logical implementations, software module allocation, encryption techniques, bus signaling techniques, and operational details, in order to provide a more thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without the above specific details. In other instances, control structures, gate level circuits and full software instruction sequences have not been shown in detail in order not to obscure the invention. Those of ordinary skill in the art, armed with the descriptions contained herein, will be able to achieve proper functionality without more than routine experimentation. The invention is disclosed in the form of a microprocessor system. However, the invention may ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.

Description

[0001] This application is an application of PCT International Application No. PCT / US03 / 08762, International Application Date March 20, 2003, China National Application No. 03811454.2, entitled "System and Method for Executing Security Environment Initialization Instructions" Divisional application. technical field [0002] The present invention relates generally to microprocessor systems, and more particularly to microprocessor systems that can operate in a trusted or secure environment. Background technique [0003] The increasing volume of financial and personal transactions performed on local or remote microcomputers has prompted the creation of "trusted" or "secure" microprocessor environments. The problem these environments try to solve is the leakage of personal privacy or the destruction or misuse of data. Users do not want to expose their private data. They also don't want inappropriate transactions altering or using their data. Examples of this include the inadv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F12/14G06F1/00G06F21/24
CPCG06F21/57G06F9/4403G06F9/44505G06F12/1458G06F2221/034G06F13/4282G06F21/00G06F9/06G01N23/223G01N33/502G01N33/6872G01N2223/076G06F21/572G06F2221/033H04L9/32G06F12/0802G06F2212/1052G06F2212/60G06F12/145G06F2213/0026H04L9/3247
Inventor 詹姆斯·萨顿二世戴维·格劳罗克
Owner INTEL CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More