Method and apparatus for communicating securely with a token

A token and trusted technology, applied in computer security devices, instruments, calculations, etc., can solve problems such as damage to the security of tokens

Inactive Publication Date: 2010-05-26
INTEL CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Register mapping like traditional input / output (I / O) mapped registers is undesirable as devices on the same interface as tokens can be programmed to map to the same I / O address, compromising token security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for communicating securely with a token
  • Method and apparatus for communicating securely with a token
  • Method and apparatus for communicating securely with a token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Methods and apparatus for securely communicating with tokens are described below. In the following description, specific details are given, such as communication protocols, types, and interrelationships of system components, etc., in order to provide a complete understanding of one or more embodiments of the present invention. It will be apparent, however, to one skilled in the art that one or more embodiments of the invention may be practiced without these specific details. Additionally, well-known architectures, control structures, gate level circuits and full software instruction sequences and techniques are not shown in the present invention for clarity of description. Those skilled in the art will be able to implement the appropriate function from the description of the invention without undue experimentation.

[0016] "One embodiment", "an embodiment", "an example embodiment" and the like in the specification indicate that the described embodiment may include spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus to communicate with a token using a previously reserved binary number in the start field of a cycle, wherein the cycle is not echoed on any bus other than the bus through whichthe communication is received.

Description

technical field [0001] The present invention relates to computer security, and more particularly to methods and apparatus for securely communicating with tokens. Background technique [0002] In the Trusted Platform Computing Alliance's (TPCA) master specification (version 1.1a, December 1, 2001), TPCA describes a Trusted Platform Module (TPM) or provides improved trustworthiness and enhances existing services and tokens for new services. The token enables auditing and logging of software processes, platform boot integrity, file integrity, and software licensing. Tokens provide a protected store of information for a platform (such as a personal computer) and can be used to verify the identity of the platform as defined by the hardware (such as processor, chipset, firmware, etc.) present in the platform. The security features of the token will encourage third parties to allow the platform access to information that would otherwise be denied. [0003] The token contains an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F21/00
CPCG06F21/78G06F21/85G06F13/36G06F1/00
Inventor D·普斯纳D·格垃洛克J·萨顿二世
Owner INTEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products