Unlock instant, AI-driven research and patent intelligence for your innovation.

Mechanism for closing back door access mechanisms in personal computer

A technology for controlling logic and registers, which is applied in the field of computer systems and can solve problems such as destroying security software and devices

Inactive Publication Date: 2004-08-11
ADVANCED MICRO DEVICES INC
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] From a hardware point of view, the x86 operating environment is quite lacking for PSO. It allows the hardware to be easily and directly invaded through software, or by simply opening the case of the personal computer, thus allowing intruders or theft or compromise most security software and devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mechanism for closing back door access mechanisms in personal computer
  • Mechanism for closing back door access mechanisms in personal computer
  • Mechanism for closing back door access mechanisms in personal computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] A detailed description of an embodiment of the invention is now described below. For the sake of clarity, not all details of actual constructs are fully described in this particular case. Of course, it can be recognized that in the development process of similar real embodiments, there will be many special situations that need to be judged to achieve the special purpose of the original developer. For example, compliance with system-related and business-related constraints, and the like, may cause the implementation of an embodiment to vary from time to time and from place to place. Again, it should be recognized that the investment involved in such a development may be quite complicated and time-consuming, but for professionals in the field, it will in any case become a routine operation, and the content described in this article It will also be of great help to them. The letters used in association with a reference number are intended to represent an alternate embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, devices, and systems for closing back door access mechanisms. A processor includes a first register configured to store one or more hardware-debug-test (HDT) enable bits, a first control logic coupled to receive a plurality of HDT input signals, and a second control logic coupled to the first register. The first control logic is coupled to access the first register. The second control logic is configured to store one or more default values in the first register in response to a reset of the processor. Another processor includes a first control logic coupled to receive a plurality of microcode inputs, a first register coupled to the first control logic, and a second control logic coupled to the first register. The first register is configured to store one or more microcode loader enable bits. The second control logic is configured to store one or more default values in the first register in response to a reset of the processor.

Description

technical field [0001] The present invention relates broadly to computer systems and, more particularly, to methods and apparatus for protecting personal computer systems from unauthorized backdoor access. Background technique [0002] This application is a continuation-in-part of a related pending U.S. Patent Application Serial No. 09 / 852,372, entitled Secure Execution Box and Method, filed May 10, 2001, and named as Dale E. Gulick and Geoffrey S. Strongin. This application is also a continuation-in-part of related pending U.S. Patent Application Serial No. 09 / 852,942, entitled Computer System Architecture for Enhanced Security and Manageability, filed May 10, 2001, and The inventors are Geoffrey S. Strongin and Dale E. Gulick. [0003] 1 shows an exemplary computer system 100, which includes a processor 102, a north bridge 104, a memory 106, an advanced graphics port (Advanced Graphics Port, AGP) memory 108, and a peripheral device internal connection (Peripheral Compone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F1/00G06F9/24G06F9/30G06F11/22G06F11/30G06F12/14G06F13/24G06F21/62G06F21/79G06F21/85H04K1/00
CPCG06F9/24G06F1/00
Inventor G·S·斯特劳金
Owner ADVANCED MICRO DEVICES INC