Movatterモバイル変換


[0]ホーム

URL:


US20110154023A1 - Protected device management - Google Patents

Protected device management
Download PDF

Info

Publication number
US20110154023A1
US20110154023A1US12/653,796US65379609AUS2011154023A1US 20110154023 A1US20110154023 A1US 20110154023A1US 65379609 AUS65379609 AUS 65379609AUS 2011154023 A1US2011154023 A1US 2011154023A1
Authority
US
United States
Prior art keywords
audit
secure partition
credentials
host operating
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/653,796
Inventor
Ned M. Smith
Victoria C. Moore
Steven L. Grobman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US12/653,796priorityCriticalpatent/US20110154023A1/en
Assigned to INTEL CORPORATIONreassignmentINTEL CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GROBMAN, STEVEN L., MOORE, VICTORIA C., SMITH, NED M.
Priority to RU2012127390/08Aprioritypatent/RU2557756C2/en
Priority to EP10842436.7Aprioritypatent/EP2517144A4/en
Priority to KR1020127016069Aprioritypatent/KR101434069B1/en
Priority to AU2010340222Aprioritypatent/AU2010340222B2/en
Priority to CN201080058803.2Aprioritypatent/CN102884535B/en
Priority to JP2012544564Aprioritypatent/JP5724118B2/en
Priority to PCT/US2010/058228prioritypatent/WO2011084265A2/en
Publication of US20110154023A1publicationCriticalpatent/US20110154023A1/en
Priority to US14/466,447prioritypatent/US9426147B2/en
Priority to US15/218,978prioritypatent/US20160342798A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.

Description

Claims (24)

20. An apparatus comprising:
at least one processor;
a secure partition isolated from a host operating system executing on the processor; and
a memory comprising instructions for firmware executing in the secure partition to perform the following:
authenticating first credentials of a user of a system before access is allowed to any device of a plurality of devices attached to the system;
intercepting an event indicating attachment of a new device to the system, wherein the intercepting is performed by the secure partition;
requesting second credentials to access the new device, wherein the second credentials are requested without booting the system;
authenticating the second credentials;
enabling access to the new device after authenticating the second credentials; and
delivering a hot plug event for the new device to the host operating system.
21. A computer program product comprising:
a computer-readable storage medium; and
instructions in the computer-readable storage medium, wherein the instructions, when executed in a secure partition of a processing system, cause the secure partition to perform operations comprising:
authenticating first credentials of a user of a system before access is allowed to any device of a plurality of devices attached to the system;
intercepting an event indicating attachment of a new device to the system, wherein the intercepting is performed by the secure partition, and the secure partition is isolated from a host operating system of the system;
requesting second credentials to access the new device, wherein the second credentials are requested without booting the system;
authenticating the second credentials;
enabling access to the new device after authenticating the second credentials; and
delivering a hot plug event for the new device to the host operating system.
23. The method ofclaim 22 wherein
the audit log is a first audit log of a plurality of audit logs,
the plurality of audit logs is accessible only from within the secure partition, and
each audit log of the plurality of audit logs is isolated from the host operating system;
and the method further comprises:
determining whether the first audit log is available;
sending the audit event record to a first audit subsystem associated with the first audit log if the first audit log is available, wherein the first audit subsystem performs writing the audit event record to the first audit log; and
sending the audit event record to a second audit subsystem associated with a second audit log of the plurality of audit logs if the first audit log is not available, wherein the second audit subsystem performs writing the audit event record to the second audit log.
US12/653,7962009-12-212009-12-21Protected device managementAbandonedUS20110154023A1 (en)

Priority Applications (10)

Application NumberPriority DateFiling DateTitle
US12/653,796US20110154023A1 (en)2009-12-212009-12-21Protected device management
PCT/US2010/058228WO2011084265A2 (en)2009-12-212010-11-29Protected device management
AU2010340222AAU2010340222B2 (en)2009-12-212010-11-29Protected device management
EP10842436.7AEP2517144A4 (en)2009-12-212010-11-29Protected device management
KR1020127016069AKR101434069B1 (en)2009-12-212010-11-29Protected device management
RU2012127390/08ARU2557756C2 (en)2009-12-212010-11-29Administration of secure devices
CN201080058803.2ACN102884535B (en)2009-12-212010-11-29Protected device manages
JP2012544564AJP5724118B2 (en)2009-12-212010-11-29 Protection device management
US14/466,447US9426147B2 (en)2009-12-212014-08-22Protected device management
US15/218,978US20160342798A1 (en)2009-12-212016-07-25Protected device management

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US12/653,796US20110154023A1 (en)2009-12-212009-12-21Protected device management

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/466,447DivisionUS9426147B2 (en)2009-12-212014-08-22Protected device management

Publications (1)

Publication NumberPublication Date
US20110154023A1true US20110154023A1 (en)2011-06-23

Family

ID=44152808

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US12/653,796AbandonedUS20110154023A1 (en)2009-12-212009-12-21Protected device management
US14/466,447Active2030-01-24US9426147B2 (en)2009-12-212014-08-22Protected device management
US15/218,978AbandonedUS20160342798A1 (en)2009-12-212016-07-25Protected device management

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US14/466,447Active2030-01-24US9426147B2 (en)2009-12-212014-08-22Protected device management
US15/218,978AbandonedUS20160342798A1 (en)2009-12-212016-07-25Protected device management

Country Status (8)

CountryLink
US (3)US20110154023A1 (en)
EP (1)EP2517144A4 (en)
JP (1)JP5724118B2 (en)
KR (1)KR101434069B1 (en)
CN (1)CN102884535B (en)
AU (1)AU2010340222B2 (en)
RU (1)RU2557756C2 (en)
WO (1)WO2011084265A2 (en)

Cited By (86)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110191599A1 (en)*2010-02-022011-08-04Broadcom CorporationApparatus and method for providing hardware security
US20110202916A1 (en)*2010-02-172011-08-18Microsoft CorporationDistribution control and tracking mechanism of virtual machine appliances
US20110271279A1 (en)*2010-04-292011-11-03High Cloud Security, Inc.Secure Virtual Machine
US20110289306A1 (en)*2010-05-212011-11-24Khosravi Hormuzd MMethod and apparatus for secure scan of data storage device from remote server
US20110296409A1 (en)*2010-05-282011-12-01Dell Products, LpSystem and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System
US20120017271A1 (en)*2010-07-142012-01-19Smith Ned MDomain-authenticated control of platform resources
US20120051228A1 (en)*2010-08-272012-03-01Qualcomm IncorporatedAdaptive automatic detail diagnostic log collection in a wireless communication system
US20120159137A1 (en)*2010-12-162012-06-21Khosravi Hormuzd MSecure local boot using third party data store (3pds) based iso image
US20120222124A1 (en)*2011-02-252012-08-30Wyse Technology Inc.System and method for facilitating unlocking a device connected locally to a client
US20130027537A1 (en)*2011-03-112013-01-31Steelmate Co., Ltd.Car video recorder
US20130055382A1 (en)*2011-08-312013-02-28International Business Machines CorporationManaging Access to Storage Media
US20130275769A1 (en)*2011-12-152013-10-17Hormuzd M. KhosraviMethod, device, and system for protecting and securely delivering media content
CN103403732A (en)*2012-10-152013-11-20华为技术有限公司Processing method and device for input and output opeartion
US8639923B2 (en)2010-05-282014-01-28Dell Products, LpSystem and method for component authentication of a secure client hosted virtualization in an information handling system
US8646054B1 (en)*2012-03-232014-02-04Western Digital Technologies, Inc.Mechanism to manage access to user data area with bridged direct-attached storage devices
US8756696B1 (en)*2010-10-302014-06-17Sra International, Inc.System and method for providing a virtualized secure data containment service with a networked environment
US20140237299A1 (en)*2011-12-292014-08-21Intel CorporationSecure error handling
US20140281447A1 (en)*2013-03-122014-09-18Green Hills Software, Inc.Single-Chip Virtualizing and Obfuscating Communications System for Portable Computing Devices
US20140282969A1 (en)*2013-03-132014-09-18Ting YeSystems and methods for account recovery using a platform attestation credential
US20140298041A1 (en)*2013-03-292014-10-02Dropbox, Inc.Portable computing device with methodologies for client-side analytic data collection
US20140373182A1 (en)*2013-06-142014-12-18Salesforce.Com, Inc.Systems and methods of automated compliance with data privacy laws
US8990584B2 (en)2010-05-282015-03-24Dell Products, LpSystem and method for supporting task oriented devices in a client hosted virtualization system
US9134990B2 (en)2010-05-282015-09-15Dell Products, LpSystem and method for implementing a secure client hosted virtualization service layer in an information handling system
US20150270956A1 (en)*2014-03-202015-09-24Microsoft CorporationRapid Data Protection for Storage Devices
US20150350214A1 (en)*2014-05-282015-12-03Conjur, Inc.Individualized audit log access control for virtual machines
EP2795513A4 (en)*2011-12-222015-12-16Intel CorpSystems and methods for providing anti-malware protection on storage devices
US20160004885A1 (en)*2011-05-202016-01-07Citrix Systems, Inc.Securing Encrypted Virtual Hard Disks
US9270657B2 (en)2011-12-222016-02-23Intel CorporationActivation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure
CN105373724A (en)*2014-08-182016-03-02银灿科技股份有限公司Wireless Authentication System and Method for USB Storage Device
US20160078224A1 (en)*2011-07-122016-03-17Hewlett-Packard Development Company, L.P.Validating a type of a peripheral device
US9336357B2 (en)2012-09-282016-05-10Intel CorporationSecure access management of devices
CN105636036A (en)*2015-05-292016-06-01宇龙计算机通信科技(深圳)有限公司Wi-Fi connection control method, terminal and Wi-Fi device
US20160204931A1 (en)*2014-02-272016-07-14Mangstor, Inc.Self-encrypting flash drive
US20160217099A1 (en)*2015-01-262016-07-28Western Digital Technologies, Inc.Data storage device and method for integrated bridge firmware to be retrieved from a storage system on chip (soc)
US9411975B2 (en)2014-03-312016-08-09Intel CorporationMethods and apparatus to securely share data
US9430664B2 (en)2013-05-202016-08-30Microsoft Technology Licensing, LlcData protection for organizations on computing devices
US20160283702A1 (en)*2015-03-232016-09-29Abb Technology AgMethod and device providing secure vendor service access
US9477614B2 (en)2011-08-302016-10-25Microsoft Technology Licensing, LlcSector map-based rapid data encryption policy compliance
US9497171B2 (en)2011-12-152016-11-15Intel CorporationMethod, device, and system for securely sharing media content from a source device
US20170024569A1 (en)*2015-07-202017-01-26Intel CorporationTechnologies for secure trusted i/o access control
US9560014B2 (en)2013-01-232017-01-31Mcafee, Inc.System and method for an endpoint hardware assisted network firewall in a security environment
US9565169B2 (en)*2015-03-302017-02-07Microsoft Technology Licensing, LlcDevice theft protection associating a device identifier and a user identifier
US20170063832A1 (en)*2015-08-282017-03-02Dell Products L.P.System and method to redirect hardware secure usb storage devices in high latency vdi environments
US20170142080A1 (en)*2015-11-122017-05-18Facebook, Inc.Systems and methods for user account recovery
US9680821B2 (en)2014-05-282017-06-13Conjur, Inc.Resource access control for virtual machines
US9705869B2 (en)2013-06-272017-07-11Intel CorporationContinuous multi-factor authentication
US20170200010A1 (en)*2014-09-262017-07-13Huawei Technologies Co., Ltd.Security control method and network device
US9760730B2 (en)2015-08-282017-09-12Dell Products L.P.System and method to redirect and unlock software secure disk devices in a high latency environment
WO2017160471A1 (en)2016-03-182017-09-21Ozzie Raymond EProviding low risk exceptional access
US9825945B2 (en)2014-09-092017-11-21Microsoft Technology Licensing, LlcPreserving data protection with policy
US9853820B2 (en)2015-06-302017-12-26Microsoft Technology Licensing, LlcIntelligent deletion of revoked data
US9853812B2 (en)2014-09-172017-12-26Microsoft Technology Licensing, LlcSecure key management for roaming protected content
US20180011751A1 (en)*2016-07-052018-01-11Matias KleinUnmanned Ground and Aerial Vehicle Attachment System
US9887838B2 (en)2011-12-152018-02-06Intel CorporationMethod and device for secure communications over a network using a hardware security engine
US9900325B2 (en)2015-10-092018-02-20Microsoft Technology Licensing, LlcPassive encryption of organization data
US9900295B2 (en)2014-11-052018-02-20Microsoft Technology Licensing, LlcRoaming content wipe actions across devices
US20180103018A1 (en)*2016-10-102018-04-12Citrix Systems, Inc.Systems and methods for executing cryptographic operations across different types of processing hardware
US9953168B1 (en)*2017-06-262018-04-24Bracket Computing, Inc.Secure boot of virtualized computing instances
US20180225253A1 (en)*2014-04-282018-08-09Qualcomm IncorporatedSensors global bus
US10067770B2 (en)2015-12-212018-09-04Hewlett-Packard Development Company, L.P.Platform key hierarchy
US10073964B2 (en)2015-09-252018-09-11Intel CorporationSecure authentication protocol systems and methods
US10078748B2 (en)2015-11-132018-09-18Microsoft Technology Licensing, LlcUnlock and recovery for encrypted devices
US20180330116A1 (en)*2015-12-092018-11-15Intel CorporationMethods and apparatus using human electrocardiogram to protect electronic data
US10191818B2 (en)*2016-11-142019-01-29Sap SeFiltered replication of data in distributed system of data centers
US20190034620A1 (en)*2017-07-312019-01-31Dell Products, L.P.System shipment lock
CN109407971A (en)*2018-09-132019-03-01新华三云计算技术有限公司The method and device of staging disk lock
US10262130B2 (en)*2015-09-152019-04-16Data Assurance & Communication Security Center, Chinese Academy Of SciencesSystem and method for providing cryptographic operation service in virtualization environment
US20190245689A1 (en)*2018-02-082019-08-08Micron Technology, Inc.Key encryption handling
US10397213B2 (en)2014-05-282019-08-27Conjur, Inc.Systems, methods, and software to provide access control in cloud computing environments
US10417172B2 (en)2014-04-282019-09-17Qualcomm IncorporatedSensors global bus
US10459751B2 (en)*2017-06-302019-10-29ATI Technologies ULC.Varying firmware for virtualized device
US10503914B2 (en)*2011-05-312019-12-10Micro Focus Software Inc.Techniques for security auditing of cloud resources
US10678708B2 (en)2018-02-072020-06-09Seagate Technology LlcEncrypted raid drive management
US10820198B2 (en)2016-03-182020-10-27Raymond Edward OzzieProviding low risk exceptional access with verification of device possession
US20210192090A1 (en)*2017-04-102021-06-24Nyquist Semiconductor LimitedSecure data storage device with security function implemented in a data security bridge
US11115208B2 (en)*2016-11-102021-09-07Ernest BrickellProtecting sensitive information from an authorized device unlock
EP3766206A4 (en)*2018-03-232021-11-17Nanolock Security Inc. REMOTE ACCESS CONTROL FOR DIGITAL HARDWARE
US20220006792A1 (en)*2020-07-012022-01-06Vmware, Inc.Protection of authentication data of a server cluster
US11438171B2 (en)*2020-03-052022-09-06Micron Technology, Inc.Virtualized authentication device
US20220377054A1 (en)*2021-05-192022-11-24Western Digital Technologies, Inc.Data storage device data recovery using remote network storage
US11568039B2 (en)*2018-06-032023-01-31Apple Inc.Credential manager integration
US20230055285A1 (en)*2021-08-192023-02-23Lenovo (Singapore) Pte. Ltd.Secure erase of user data using storage regions
US11841960B1 (en)*2019-11-262023-12-12Gobeep, Inc.Systems and processes for providing secure client controlled and managed exchange of data between parties
US20240354208A1 (en)*2023-04-212024-10-24Dell Products L.P.Method and system for pairing computing devices for offloading actions during data migration from degrading computing devices
US12293092B2 (en)2022-12-162025-05-06Advanced Micro Devices, Inc.Method and apparatus for managing memory
US12399983B1 (en)2020-02-192025-08-26Amazon Technologies, Inc.Stateful authenticated event communication

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10181055B2 (en)2007-09-272019-01-15Clevx, LlcData security system with encryption
US10778417B2 (en)2007-09-272020-09-15Clevx, LlcSelf-encrypting module with embedded wireless user authentication
US11190936B2 (en)2007-09-272021-11-30Clevx, LlcWireless authentication system
US20110154023A1 (en)*2009-12-212011-06-23Smith Ned MProtected device management
US9232176B2 (en)2013-03-042016-01-05Janus Technologies, Inc.Method and apparatus for securing computer video and audio subsystems
CN103345453B (en)*2013-06-272016-02-24清华大学Based on supporting the method that the fixed disk data enciphering card of SATA interface is encrypted
US9076003B2 (en)2013-08-202015-07-07Janus Technologies, Inc.Method and apparatus for transparently encrypting and decrypting computer interface data
US9424443B2 (en)2013-08-202016-08-23Janus Technologies, Inc.Method and apparatus for securing computer mass storage data
US11210432B2 (en)2013-08-202021-12-28Janus Technologies, Inc.Method and apparatus for selectively snooping and capturing data for secure computer interfaces
US9684805B2 (en)2013-08-202017-06-20Janus Technologies, Inc.Method and apparatus for securing computer interfaces
US9384150B2 (en)2013-08-202016-07-05Janus Technologies, Inc.Method and apparatus for performing transparent mass storage backups and snapshots
US9215250B2 (en)2013-08-202015-12-15Janus Technologies, Inc.System and method for remotely managing security and configuration of compute devices
US9231921B2 (en)2013-08-202016-01-05Janus Technologies, Inc.System and architecture for secure computer devices
CN103530581A (en)*2013-10-092014-01-22中国联合网络通信集团有限公司Hard disk encrypting method and operation system
US10645064B2 (en)*2015-04-232020-05-05Alcatel LucentVirtualized application performance through disabling of unnecessary functions
US9578054B1 (en)*2015-08-312017-02-21Newman H-R Computer Design, LLCHacking-resistant computer design
TWI566103B (en)*2015-11-162017-01-11宇瞻科技股份有限公司Pcie bridge transformation device and method thereof
US10037418B2 (en)*2015-11-252018-07-31Dell Products L.P.Pre-boot authentication credential sharing system
WO2017123433A1 (en)*2016-01-042017-07-20Clevx, LlcData security system with encryption
US9965313B2 (en)*2016-01-052018-05-08Bitdefender IPR Management Ltd.Systems and methods for auditing a virtual machine
US10303899B2 (en)*2016-08-112019-05-28Intel CorporationSecure public cloud with protected guest-verified host control
US10251060B2 (en)*2016-09-272019-04-02Intel CorporationModifying access to a service based on configuration data
US10558812B2 (en)2017-06-212020-02-11Microsoft Technology Licensing, LlcMutual authentication with integrity attestation
US12256024B2 (en)2017-06-212025-03-18Microsoft Technology Licensing, LlcDevice provisioning
US10440006B2 (en)2017-06-212019-10-08Microsoft Technology Licensing, LlcDevice with embedded certificate authority
US10938560B2 (en)2017-06-212021-03-02Microsoft Technology Licensing, LlcAuthorization key escrow
GB2564430C (en)*2017-07-072021-02-17Gurulogic Microsystems OyData communication system and method
WO2019013775A1 (en)2017-07-122019-01-17Hewlett-Packard Development Company, L.P.Migration of memory devices
US11374760B2 (en)2017-09-132022-06-28Microsoft Technology Licensing, LlcCyber physical key
CN109308170B (en)*2018-09-112021-11-30北京北信源信息安全技术有限公司Data processing method and device
CN109543475B (en)*2018-10-292020-07-07北京博衍思创信息科技有限公司External terminal protection device and protection system
CN110445756B (en)*2019-07-042021-07-09中国电子科技集团公司第三十研究所 Implementation method of searchable encrypted audit log in cloud storage
US11201749B2 (en)2019-09-112021-12-14International Business Machines CorporationEstablishing a security association and authentication to secure communication between an initiator and a responder
US11188659B2 (en)2019-09-112021-11-30International Business Machines CorporationConcurrent enablement of encryption on an operational path at a host port
US11308243B2 (en)2019-09-112022-04-19International Business Machines CorporationMaintenance of access for security enablement in a storage device
US11206144B2 (en)2019-09-112021-12-21International Business Machines CorporationEstablishing a security association and authentication to secure communication between an initiator and a responder
US11354455B2 (en)2019-09-112022-06-07International Business Machines CorporationMaintenance of access for security enablement on a host system
US11188658B2 (en)2019-09-112021-11-30International Business Machines CorporationConcurrent enablement of encryption on an operational path at a storage port
US11245521B2 (en)2019-09-252022-02-08International Business Machines CorporationReverting from a new security association to a previous security association in response to an error during a rekey operation
US11303441B2 (en)2019-09-252022-04-12International Business Machines CorporationReverting from a new security association to a previous security association in response to an error during a rekey operation
US11088832B2 (en)*2020-01-092021-08-10Western Digital Technologies, Inc.Secure logging of data storage device events
CN111723376A (en)*2020-06-102020-09-29苏州浪潮智能科技有限公司 A monitoring and control method, circuit and device for an in-board trusted platform
KR20220124452A (en)2021-03-032022-09-14삼성전자주식회사 storage device
US12236271B2 (en)2021-09-242025-02-25Dell Products L.P.Method and system for performing state management services for composed information handling systems
US11966782B2 (en)*2021-09-242024-04-23Dell Products L.P.Method and system for performing historical state management services for composed information handling systems
US12309179B2 (en)*2022-02-012025-05-20Sap SeLog entry buffer extension network

Citations (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US682346A (en)*1901-03-021901-09-10David P SimsLeakage-guard for water-motors.
US20030120918A1 (en)*2001-12-212003-06-26Intel CorporationHard drive security for fast boot
US20030188179A1 (en)*2002-03-282003-10-02International Business Machines CorporationEncrypted file system using TCPA
US20040059907A1 (en)*2002-09-202004-03-25Rainbow Technologies, Inc.Boot-up and hard drive protection using a USB-compliant token
US6823463B1 (en)*2000-05-162004-11-23International Business Machines CorporationMethod for providing security to a computer on a computer network
US20040268113A1 (en)*2003-06-302004-12-30Rothman Michael A.Virtual out-of-band management controller
US20050125648A1 (en)*2003-12-052005-06-09Luciani Luis E.Jr.System for establishing hardware-based remote console sessions and software-based remote console sessions
US20050262574A1 (en)*2000-09-142005-11-24Duane AllenBIOS lock encode/decode driver
US20060259782A1 (en)*2005-05-162006-11-16Lan WangComputer security system and method
US20070005951A1 (en)*2005-06-292007-01-04Davis Mark CSystem and method for secure O.S. boot from password-protected HDD
US20070038856A1 (en)*2005-08-102007-02-15Ali Valiuddin YMethods and systems that selectively permit changes to a cryptographic hardware unit's state
US20070112772A1 (en)*2005-11-122007-05-17Dennis MorganMethod and apparatus for securely accessing data
US20070180449A1 (en)*2006-01-242007-08-02Citrix Systems, Inc.Methods and systems for providing remote access to a computing environment provided by a virtual machine
US20080060068A1 (en)*2006-08-312008-03-06Mabayoje Bukie OMethods and arrangements for remote communications with a trusted platform module
US20080077986A1 (en)*2006-09-262008-03-27David RiveraMethod and Apparatus for Providing a Secure Single Sign-On to a Computer System
US20080104701A1 (en)*2006-05-222008-05-01Eric PeacockSystem and method for secure operating system boot
US20080130901A1 (en)*2002-08-072008-06-05Radoslav DanilakSystem and method for transparent disk encryption
US20080162809A1 (en)*2006-12-282008-07-03Rothman Michael AOperating system-independent remote accessibility to disk storage
US20080288782A1 (en)*2007-05-182008-11-20Technology Properties LimitedMethod and Apparatus of Providing Security to an External Attachment Device
US20090070467A1 (en)*2007-09-072009-03-12Hormuzd KhosraviEnabling access to remote entities in access controlled networks
US20090222909A1 (en)*2008-02-292009-09-03Lenovo (Singapore) Pte. LtdPassword Management Outside of a Bios
US20100042710A1 (en)*2008-08-152010-02-18Asustek Computer Inc.Remote management of computer system
US20100082898A1 (en)*2008-09-302010-04-01Mangold Richard PMethods to securely bind an encryption key to a storage device
US7779220B1 (en)*2007-03-152010-08-17Quantum CorporationPassword-based media cartridge authentication

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPS62241040A (en)*1986-04-111987-10-21Nec CorpHardware action tracing device
US6009527A (en)*1995-11-131999-12-28Intel CorporationComputer system security
US5919257A (en)*1997-08-081999-07-06Novell, Inc.Networked workstation intrusion detection system
US6263441B1 (en)*1998-10-062001-07-17International Business Machines CorporationReal-time alert mechanism for signaling change of system configuration
US20010011947A1 (en)*1999-05-242001-08-09Muhammed JaberSystem and method for securing a computer system
JP2002055891A (en)*2000-08-152002-02-20Hitachi Ltd Computer management equipment
GB2366691B (en)*2000-08-312002-11-06F Secure OyjWireless device management
US6823464B2 (en)*2001-02-262004-11-23International Business Machines CorporationMethod of providing enhanced security in a remotely managed computer system
US6701464B2 (en)*2001-03-012004-03-02International Business Machines CorporationMethod and system for reporting error logs within a logical partition environment
US7043587B2 (en)*2001-09-202006-05-09Lenovo (Singapore) Pte. Ltd.System and method for connecting a universal serial bus device to a host computer system
US20030070099A1 (en)*2001-10-052003-04-10Schwartz Jeffrey D.System and methods for protection of data stored on a storage medium device
US6633835B1 (en)*2002-01-102003-10-14Networks Associates Technology, Inc.Prioritized data capture, classification and filtering in a network monitoring environment
JP4039660B2 (en)*2002-05-312008-01-30株式会社東芝 Information processing device
TWI253567B (en)2002-08-062006-04-21Quanta Comp IncMethod of remote controlling computers via network and architecture thereof
US7367063B1 (en)*2002-09-172008-04-29Cisco Technology, Inc.Methods and apparatus for providing security to a computerized device
US8065717B2 (en)*2002-11-272011-11-22ActivcardAutomated security token administrative services
US7437763B2 (en)*2003-06-052008-10-14Microsoft CorporationIn-context security advisor in a computing environment
US20050114686A1 (en)*2003-11-212005-05-26International Business Machines CorporationSystem and method for multiple users to securely access encrypted data on computer system
RU2263950C2 (en)*2003-11-282005-11-10Федеральное Государственное Унитарное Предприятие "Концерн "Системпром"Device for preventing unsanctioned access to information, stored on personal computer
US8281114B2 (en)*2003-12-232012-10-02Check Point Software Technologies, Inc.Security system with methodology for defending against security breaches of peripheral devices
US7840763B2 (en)*2004-03-122010-11-23Sca Technica, Inc.Methods and systems for achieving high assurance computing using low assurance operating systems and processes
US20050262361A1 (en)*2004-05-242005-11-24Seagate Technology LlcSystem and method for magnetic storage disposal
US20060037074A1 (en)*2004-08-162006-02-16Inventec CorporationComputer platform external communication port access authorization method and interface
JP4562464B2 (en)*2004-09-072010-10-13富士通株式会社 Information processing device
US8619971B2 (en)*2005-04-012013-12-31Microsoft CorporationLocal secure service partitions for operating system security
US20070006307A1 (en)*2005-06-302007-01-04Hahn Scott DSystems, apparatuses and methods for a host software presence check from an isolated partition
US20070061879A1 (en)*2005-09-152007-03-15Dailey James ESystem and method for managing information handling system hard disk drive password protection
US20070180167A1 (en)*2006-02-022007-08-02Seagate Technology LlcDynamic partition mapping in a hot-pluggable data storage apparatus
US8205238B2 (en)*2006-03-302012-06-19Intel CorporationPlatform posture and policy information exchange method and apparatus
US7703126B2 (en)*2006-03-312010-04-20Intel CorporationHierarchical trust based posture reporting and policy enforcement
US7900252B2 (en)*2006-08-282011-03-01Lenovo (Singapore) Pte. Ltd.Method and apparatus for managing shared passwords on a multi-user computer
JP2008108227A (en)2006-09-252008-05-08Hitachi Ltd Storage system and audit log management method
US9158920B2 (en)*2007-06-282015-10-13Intel CorporationSystem and method for out-of-band assisted biometric secure boot
US8056127B2 (en)*2007-10-312011-11-08International Business Machines CorporationAccessing password protected devices
US8341430B2 (en)*2008-10-032012-12-25Microsoft CorporationExternal encryption and recovery management with hardware encrypted storage devices
US8103883B2 (en)*2008-12-312012-01-24Intel CorporationMethod and apparatus for enforcing use of danbury key management services for software applied full volume encryption
US8161260B2 (en)*2009-02-092012-04-17Oracle International CorporationOptimal memory allocation for guested virtual machine(s)
US8935382B2 (en)*2009-03-162015-01-13Microsoft CorporationFlexible logging, such as for a web server
US8955108B2 (en)*2009-06-172015-02-10Microsoft CorporationSecurity virtual machine for advanced auditing
US20110040980A1 (en)*2009-08-122011-02-17Apple Inc.File Management Safe Deposit Box
US20110154023A1 (en)2009-12-212011-06-23Smith Ned MProtected device management

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US682346A (en)*1901-03-021901-09-10David P SimsLeakage-guard for water-motors.
US6823463B1 (en)*2000-05-162004-11-23International Business Machines CorporationMethod for providing security to a computer on a computer network
US20050262574A1 (en)*2000-09-142005-11-24Duane AllenBIOS lock encode/decode driver
US20030120918A1 (en)*2001-12-212003-06-26Intel CorporationHard drive security for fast boot
US20030188179A1 (en)*2002-03-282003-10-02International Business Machines CorporationEncrypted file system using TCPA
US20080130901A1 (en)*2002-08-072008-06-05Radoslav DanilakSystem and method for transparent disk encryption
US20040059907A1 (en)*2002-09-202004-03-25Rainbow Technologies, Inc.Boot-up and hard drive protection using a USB-compliant token
US20040268113A1 (en)*2003-06-302004-12-30Rothman Michael A.Virtual out-of-band management controller
US20050125648A1 (en)*2003-12-052005-06-09Luciani Luis E.Jr.System for establishing hardware-based remote console sessions and software-based remote console sessions
US20060259782A1 (en)*2005-05-162006-11-16Lan WangComputer security system and method
US20070005951A1 (en)*2005-06-292007-01-04Davis Mark CSystem and method for secure O.S. boot from password-protected HDD
US20070038856A1 (en)*2005-08-102007-02-15Ali Valiuddin YMethods and systems that selectively permit changes to a cryptographic hardware unit's state
US20070112772A1 (en)*2005-11-122007-05-17Dennis MorganMethod and apparatus for securely accessing data
US20070180449A1 (en)*2006-01-242007-08-02Citrix Systems, Inc.Methods and systems for providing remote access to a computing environment provided by a virtual machine
US20080104701A1 (en)*2006-05-222008-05-01Eric PeacockSystem and method for secure operating system boot
US20080060068A1 (en)*2006-08-312008-03-06Mabayoje Bukie OMethods and arrangements for remote communications with a trusted platform module
US20080077986A1 (en)*2006-09-262008-03-27David RiveraMethod and Apparatus for Providing a Secure Single Sign-On to a Computer System
US20080162809A1 (en)*2006-12-282008-07-03Rothman Michael AOperating system-independent remote accessibility to disk storage
US7779220B1 (en)*2007-03-152010-08-17Quantum CorporationPassword-based media cartridge authentication
US20080288782A1 (en)*2007-05-182008-11-20Technology Properties LimitedMethod and Apparatus of Providing Security to an External Attachment Device
US20090070467A1 (en)*2007-09-072009-03-12Hormuzd KhosraviEnabling access to remote entities in access controlled networks
US20090222909A1 (en)*2008-02-292009-09-03Lenovo (Singapore) Pte. LtdPassword Management Outside of a Bios
US20100042710A1 (en)*2008-08-152010-02-18Asustek Computer Inc.Remote management of computer system
US20100082898A1 (en)*2008-09-302010-04-01Mangold Richard PMethods to securely bind an encryption key to a storage device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Perez, Ronald, et al. "Virtualization and Hardware-Based Security", 2008 IEEE.*

Cited By (156)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8826039B2 (en)*2010-02-022014-09-02Broadcom CorporationApparatus and method for providing hardware security
US20110191599A1 (en)*2010-02-022011-08-04Broadcom CorporationApparatus and method for providing hardware security
US20110202916A1 (en)*2010-02-172011-08-18Microsoft CorporationDistribution control and tracking mechanism of virtual machine appliances
US9703586B2 (en)*2010-02-172017-07-11Microsoft Technology Licensing, LlcDistribution control and tracking mechanism of virtual machine appliances
US8555377B2 (en)*2010-04-292013-10-08High Cloud SecuritySecure virtual machine
US20110271279A1 (en)*2010-04-292011-11-03High Cloud Security, Inc.Secure Virtual Machine
US20150019864A1 (en)*2010-04-292015-01-15High Cloud Security, Inc.Secure Virtual Machine
US9300640B2 (en)*2010-04-292016-03-29Hytrust, Inc.Secure virtual machine
US20110289306A1 (en)*2010-05-212011-11-24Khosravi Hormuzd MMethod and apparatus for secure scan of data storage device from remote server
US8856534B2 (en)*2010-05-212014-10-07Intel CorporationMethod and apparatus for secure scan of data storage device from remote server
US8589702B2 (en)*2010-05-282013-11-19Dell Products, LpSystem and method for pre-boot authentication of a secure client hosted virtualization in an information handling system
US9569608B2 (en)2010-05-282017-02-14Dell Products, LpSystem and method for component authentication of a secure client hosted virtualization in an information handling system
US8990584B2 (en)2010-05-282015-03-24Dell Products, LpSystem and method for supporting task oriented devices in a client hosted virtualization system
US20110296409A1 (en)*2010-05-282011-12-01Dell Products, LpSystem and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System
US9134990B2 (en)2010-05-282015-09-15Dell Products, LpSystem and method for implementing a secure client hosted virtualization service layer in an information handling system
US9984236B2 (en)2010-05-282018-05-29Dell Products, LpSystem and method for pre-boot authentication of a secure client hosted virtualization in an information handling system
US8639923B2 (en)2010-05-282014-01-28Dell Products, LpSystem and method for component authentication of a secure client hosted virtualization in an information handling system
US20120017271A1 (en)*2010-07-142012-01-19Smith Ned MDomain-authenticated control of platform resources
US10482254B2 (en)*2010-07-142019-11-19Intel CorporationDomain-authenticated control of platform resources
US11366906B2 (en)2010-07-142022-06-21Intel CorporationDomain-authenticated control of platform resources
US9294946B2 (en)*2010-08-272016-03-22Qualcomm IncorporatedAdaptive automatic detail diagnostic log collection in a wireless communication system
US20120051228A1 (en)*2010-08-272012-03-01Qualcomm IncorporatedAdaptive automatic detail diagnostic log collection in a wireless communication system
US8756696B1 (en)*2010-10-302014-06-17Sra International, Inc.System and method for providing a virtualized secure data containment service with a networked environment
US20120159137A1 (en)*2010-12-162012-06-21Khosravi Hormuzd MSecure local boot using third party data store (3pds) based iso image
US8751782B2 (en)*2010-12-162014-06-10Intel CorporationSecure local boot using third party data store (3PDS) based ISO image
US20120222124A1 (en)*2011-02-252012-08-30Wyse Technology Inc.System and method for facilitating unlocking a device connected locally to a client
US8572754B2 (en)*2011-02-252013-10-29Wyse Technology Inc.System and method for facilitating unlocking a device connected locally to a client
US20130027537A1 (en)*2011-03-112013-01-31Steelmate Co., Ltd.Car video recorder
US9690954B2 (en)*2011-05-202017-06-27Citrix Systems, Inc.Securing encrypted virtual hard disks
US20160004885A1 (en)*2011-05-202016-01-07Citrix Systems, Inc.Securing Encrypted Virtual Hard Disks
US10503914B2 (en)*2011-05-312019-12-10Micro Focus Software Inc.Techniques for security auditing of cloud resources
US20160078224A1 (en)*2011-07-122016-03-17Hewlett-Packard Development Company, L.P.Validating a type of a peripheral device
US9547765B2 (en)*2011-07-122017-01-17Hewlett-Packard Development Company, L.P.Validating a type of a peripheral device
US9740639B2 (en)2011-08-302017-08-22Microsoft Technology Licensing, LlcMap-based rapid data encryption policy compliance
US9477614B2 (en)2011-08-302016-10-25Microsoft Technology Licensing, LlcSector map-based rapid data encryption policy compliance
US20130055382A1 (en)*2011-08-312013-02-28International Business Machines CorporationManaging Access to Storage Media
US8918862B2 (en)*2011-08-312014-12-23International Business Machines CorporationManaging access to storage media
US9887838B2 (en)2011-12-152018-02-06Intel CorporationMethod and device for secure communications over a network using a hardware security engine
US20130275769A1 (en)*2011-12-152013-10-17Hormuzd M. KhosraviMethod, device, and system for protecting and securely delivering media content
US9497171B2 (en)2011-12-152016-11-15Intel CorporationMethod, device, and system for securely sharing media content from a source device
EP2795513A4 (en)*2011-12-222015-12-16Intel CorpSystems and methods for providing anti-malware protection on storage devices
US9270657B2 (en)2011-12-222016-02-23Intel CorporationActivation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure
CN104115125A (en)*2011-12-292014-10-22英特尔公司Secure error handling
US9342394B2 (en)*2011-12-292016-05-17Intel CorporationSecure error handling
US20140237299A1 (en)*2011-12-292014-08-21Intel CorporationSecure error handling
US8646054B1 (en)*2012-03-232014-02-04Western Digital Technologies, Inc.Mechanism to manage access to user data area with bridged direct-attached storage devices
US9336357B2 (en)2012-09-282016-05-10Intel CorporationSecure access management of devices
US10049234B2 (en)2012-09-282018-08-14Intel CorporationSecure access management of devices
CN103403732A (en)*2012-10-152013-11-20华为技术有限公司Processing method and device for input and output opeartion
CN103403732B (en)*2012-10-152015-07-08华为技术有限公司 Processing method and device for input and output operations
US9560014B2 (en)2013-01-232017-01-31Mcafee, Inc.System and method for an endpoint hardware assisted network firewall in a security environment
US10103892B2 (en)2013-01-232018-10-16Mcafee, LlcSystem and method for an endpoint hardware assisted network firewall in a security environment
US20140281447A1 (en)*2013-03-122014-09-18Green Hills Software, Inc.Single-Chip Virtualizing and Obfuscating Communications System for Portable Computing Devices
US9378371B2 (en)*2013-03-132016-06-28Intel CorporationSystems and methods for account recovery using a platform attestation credential
US20140282969A1 (en)*2013-03-132014-09-18Ting YeSystems and methods for account recovery using a platform attestation credential
US9600671B2 (en)*2013-03-132017-03-21Intel CorporationSystems and methods for account recovery using a platform attestation credential
US20140298041A1 (en)*2013-03-292014-10-02Dropbox, Inc.Portable computing device with methodologies for client-side analytic data collection
US8996889B2 (en)*2013-03-292015-03-31Dropbox, Inc.Portable computing device with methodologies for client-side analytic data collection
US9813393B2 (en)2013-03-292017-11-07Dropbox, Inc.System and method for client-side analytic data collection
US9430664B2 (en)2013-05-202016-08-30Microsoft Technology Licensing, LlcData protection for organizations on computing devices
US20140373182A1 (en)*2013-06-142014-12-18Salesforce.Com, Inc.Systems and methods of automated compliance with data privacy laws
US10430608B2 (en)*2013-06-142019-10-01Salesforce.Com, Inc.Systems and methods of automated compliance with data privacy laws
US9705869B2 (en)2013-06-272017-07-11Intel CorporationContinuous multi-factor authentication
US10091184B2 (en)2013-06-272018-10-02Intel CorporationContinuous multi-factor authentication
US9811478B2 (en)*2014-02-272017-11-07Mangstor, Inc.Self-encrypting flash drive
US20160204931A1 (en)*2014-02-272016-07-14Mangstor, Inc.Self-encrypting flash drive
US10615967B2 (en)*2014-03-202020-04-07Microsoft Technology Licensing, LlcRapid data protection for storage devices
US20150270956A1 (en)*2014-03-202015-09-24Microsoft CorporationRapid Data Protection for Storage Devices
US9411975B2 (en)2014-03-312016-08-09Intel CorporationMethods and apparatus to securely share data
US9912645B2 (en)2014-03-312018-03-06Intel CorporationMethods and apparatus to securely share data
US10482057B2 (en)*2014-04-282019-11-19Qualcomm IncorporatedMulti-protocol dynamic address allocation
US20180225253A1 (en)*2014-04-282018-08-09Qualcomm IncorporatedSensors global bus
US10452603B2 (en)2014-04-282019-10-22Qualcomm IncorporatedSensors global bus
US10417172B2 (en)2014-04-282019-09-17Qualcomm IncorporatedSensors global bus
US9680821B2 (en)2014-05-282017-06-13Conjur, Inc.Resource access control for virtual machines
US10397213B2 (en)2014-05-282019-08-27Conjur, Inc.Systems, methods, and software to provide access control in cloud computing environments
US9985970B2 (en)*2014-05-282018-05-29Conjur, Inc.Individualized audit log access control for virtual machines
US20150350214A1 (en)*2014-05-282015-12-03Conjur, Inc.Individualized audit log access control for virtual machines
CN105373724A (en)*2014-08-182016-03-02银灿科技股份有限公司Wireless Authentication System and Method for USB Storage Device
US9825945B2 (en)2014-09-092017-11-21Microsoft Technology Licensing, LlcPreserving data protection with policy
US9853812B2 (en)2014-09-172017-12-26Microsoft Technology Licensing, LlcSecure key management for roaming protected content
US20170200010A1 (en)*2014-09-262017-07-13Huawei Technologies Co., Ltd.Security control method and network device
US9900295B2 (en)2014-11-052018-02-20Microsoft Technology Licensing, LlcRoaming content wipe actions across devices
US20160217099A1 (en)*2015-01-262016-07-28Western Digital Technologies, Inc.Data storage device and method for integrated bridge firmware to be retrieved from a storage system on chip (soc)
US9734117B2 (en)*2015-01-262017-08-15Western Digital Technologies, Inc.Data storage device and method for integrated bridge firmware to be retrieved from a storage system on chip (SOC)
US11109231B2 (en)*2015-03-232021-08-31Abb Schweiz AgMethod and device providing secure vendor service access
US20160283702A1 (en)*2015-03-232016-09-29Abb Technology AgMethod and device providing secure vendor service access
US9565169B2 (en)*2015-03-302017-02-07Microsoft Technology Licensing, LlcDevice theft protection associating a device identifier and a user identifier
US9762396B2 (en)*2015-03-302017-09-12Microsoft Technology Licensing, LlcDevice theft protection associating a device identifier and a user identifier
US20170085386A1 (en)*2015-03-302017-03-23Microsoft Technology Licensing, LlcDevice Theft Protection Associating A Device Identifier And A User Identifier
CN105636036A (en)*2015-05-292016-06-01宇龙计算机通信科技(深圳)有限公司Wi-Fi connection control method, terminal and Wi-Fi device
US9853820B2 (en)2015-06-302017-12-26Microsoft Technology Licensing, LlcIntelligent deletion of revoked data
US20170024569A1 (en)*2015-07-202017-01-26Intel CorporationTechnologies for secure trusted i/o access control
US10552619B2 (en)*2015-07-202020-02-04Intel CorporationTechnologies for secure trusted I/O access control
US10097534B2 (en)*2015-08-282018-10-09Dell Products L.P.System and method to redirect hardware secure USB storage devices in high latency VDI environments
US9760730B2 (en)2015-08-282017-09-12Dell Products L.P.System and method to redirect and unlock software secure disk devices in a high latency environment
US20170063832A1 (en)*2015-08-282017-03-02Dell Products L.P.System and method to redirect hardware secure usb storage devices in high latency vdi environments
US10262130B2 (en)*2015-09-152019-04-16Data Assurance & Communication Security Center, Chinese Academy Of SciencesSystem and method for providing cryptographic operation service in virtualization environment
US10073964B2 (en)2015-09-252018-09-11Intel CorporationSecure authentication protocol systems and methods
US10255425B2 (en)2015-09-252019-04-09Intel CorporationSecure authentication protocol systems and methods
US9900325B2 (en)2015-10-092018-02-20Microsoft Technology Licensing, LlcPassive encryption of organization data
US10362007B2 (en)*2015-11-122019-07-23Facebook, Inc.Systems and methods for user account recovery
US20170142080A1 (en)*2015-11-122017-05-18Facebook, Inc.Systems and methods for user account recovery
US10078748B2 (en)2015-11-132018-09-18Microsoft Technology Licensing, LlcUnlock and recovery for encrypted devices
US20180330116A1 (en)*2015-12-092018-11-15Intel CorporationMethods and apparatus using human electrocardiogram to protect electronic data
US10853516B2 (en)*2015-12-092020-12-01Intel CorporationMethods and apparatus using human electrocardiogram to protect electronic data
US10067770B2 (en)2015-12-212018-09-04Hewlett-Packard Development Company, L.P.Platform key hierarchy
US10644886B2 (en)2016-03-182020-05-05Raymond Edward OzzieProviding low risk exceptional access
WO2017160471A1 (en)2016-03-182017-09-21Ozzie Raymond EProviding low risk exceptional access
EP3437322A4 (en)*2016-03-182019-08-14Raymond E. OzzieProviding low risk exceptional access
US10826701B2 (en)2016-03-182020-11-03Raymond Edward OzzieProviding low risk exceptional access
US10505734B2 (en)2016-03-182019-12-10Raymond Edward OzzieProviding low risk exceptional access
US10819521B2 (en)2016-03-182020-10-27Raymond Edward OzzieProviding low risk exceptional access
US10820198B2 (en)2016-03-182020-10-27Raymond Edward OzzieProviding low risk exceptional access with verification of device possession
US20180011751A1 (en)*2016-07-052018-01-11Matias KleinUnmanned Ground and Aerial Vehicle Attachment System
US10713102B2 (en)*2016-07-052020-07-14Matias KleinUnmanned ground and aerial vehicle attachment system
US20180103018A1 (en)*2016-10-102018-04-12Citrix Systems, Inc.Systems and methods for executing cryptographic operations across different types of processing hardware
US10520110B2 (en)*2016-10-102019-12-31Citrix Systems, Inc.Systems and methods for executing cryptographic operations across different types of processing hardware
US11115208B2 (en)*2016-11-102021-09-07Ernest BrickellProtecting sensitive information from an authorized device unlock
US10191818B2 (en)*2016-11-142019-01-29Sap SeFiltered replication of data in distributed system of data centers
US20210192090A1 (en)*2017-04-102021-06-24Nyquist Semiconductor LimitedSecure data storage device with security function implemented in a data security bridge
US9953168B1 (en)*2017-06-262018-04-24Bracket Computing, Inc.Secure boot of virtualized computing instances
US10896257B2 (en)2017-06-262021-01-19Vmware, Inc.Secure boot of virtualized computing instances
US11194614B2 (en)2017-06-302021-12-07Ati Technologies UlcVarying firmware for virtualized device
US12169729B2 (en)2017-06-302024-12-17Ati Technologies UlcVarying firmware for virtualized device
US10459751B2 (en)*2017-06-302019-10-29ATI Technologies ULC.Varying firmware for virtualized device
US20190034620A1 (en)*2017-07-312019-01-31Dell Products, L.P.System shipment lock
US10853474B2 (en)*2017-07-312020-12-01Dell Products, L.P.System shipment lock
US10678708B2 (en)2018-02-072020-06-09Seagate Technology LlcEncrypted raid drive management
US20210328790A1 (en)*2018-02-082021-10-21Micron Technology, Inc.Key encryption handling
US11070375B2 (en)*2018-02-082021-07-20Micron Technology, Inc.Key encryption handling
WO2019156887A1 (en)*2018-02-082019-08-15Micron Technology, Inc.Key encryption handling
CN111819562A (en)*2018-02-082020-10-23美光科技公司Key encryption processing
US20190245689A1 (en)*2018-02-082019-08-08Micron Technology, Inc.Key encryption handling
TWI736837B (en)*2018-02-082021-08-21美商美光科技公司Memory apparatuses, non-volatile dual in-line memory modules, memory systems, and encryption methods
US12137162B2 (en)*2018-02-082024-11-05Lodestar Licensing Group, LlcKey encryption handling
EP3766206A4 (en)*2018-03-232021-11-17Nanolock Security Inc. REMOTE ACCESS CONTROL FOR DIGITAL HARDWARE
US11880436B2 (en)*2018-03-232024-01-23Nanolock Security Inc.Remote access control for digital hardware
US20230177141A1 (en)*2018-06-032023-06-08Apple Inc.Credential manager integration
US11568039B2 (en)*2018-06-032023-01-31Apple Inc.Credential manager integration
US11775632B2 (en)*2018-06-032023-10-03Apple Inc.Credential manager integration
CN109407971A (en)*2018-09-132019-03-01新华三云计算技术有限公司The method and device of staging disk lock
US11841960B1 (en)*2019-11-262023-12-12Gobeep, Inc.Systems and processes for providing secure client controlled and managed exchange of data between parties
US12321471B1 (en)*2019-11-262025-06-03Gobeep, Inc.Systems and processes for providing secure client controlled and managed exchange of data between parties
US12399983B1 (en)2020-02-192025-08-26Amazon Technologies, Inc.Stateful authenticated event communication
US11997217B2 (en)2020-03-052024-05-28Micron Technology, Inc.Virtualized authentication device
US11438171B2 (en)*2020-03-052022-09-06Micron Technology, Inc.Virtualized authentication device
US20220006792A1 (en)*2020-07-012022-01-06Vmware, Inc.Protection of authentication data of a server cluster
US11611540B2 (en)*2020-07-012023-03-21Vmware, Inc.Protection of authentication data of a server cluster
US20220377054A1 (en)*2021-05-192022-11-24Western Digital Technologies, Inc.Data storage device data recovery using remote network storage
US12081526B2 (en)*2021-05-192024-09-03Western Digital Technologies, Inc.Data storage device data recovery using remote network storage
US12367300B2 (en)*2021-08-192025-07-22Lenovo (Singapore) Pte. Ltd.Secure erase of user data using storage regions
US20230055285A1 (en)*2021-08-192023-02-23Lenovo (Singapore) Pte. Ltd.Secure erase of user data using storage regions
US12293092B2 (en)2022-12-162025-05-06Advanced Micro Devices, Inc.Method and apparatus for managing memory
US12386716B2 (en)*2023-04-212025-08-12Dell Products L.P.Method and system for pairing computing devices for offloading actions during data migration from degrading computing devices
US20240354208A1 (en)*2023-04-212024-10-24Dell Products L.P.Method and system for pairing computing devices for offloading actions during data migration from degrading computing devices

Also Published As

Publication numberPublication date
EP2517144A4 (en)2017-02-15
KR101434069B1 (en)2014-09-22
WO2011084265A3 (en)2011-12-01
RU2557756C2 (en)2015-07-27
CN102884535B (en)2016-08-24
AU2010340222A1 (en)2012-05-24
JP5724118B2 (en)2015-05-27
RU2012127390A (en)2014-01-10
EP2517144A2 (en)2012-10-31
US9426147B2 (en)2016-08-23
CN102884535A (en)2013-01-16
AU2010340222B2 (en)2014-07-03
JP2013515296A (en)2013-05-02
US20160342798A1 (en)2016-11-24
US20140366116A1 (en)2014-12-11
KR20120096019A (en)2012-08-29
WO2011084265A2 (en)2011-07-14

Similar Documents

PublicationPublication DateTitle
US9426147B2 (en)Protected device management
US10902128B2 (en)Methods for creating a computer-implemented virtual machine manager
KR101471379B1 (en)Domain-authenticated control of platform resources
US8103883B2 (en)Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
US8909940B2 (en)Extensible pre-boot authentication
US9300640B2 (en)Secure virtual machine
US8201239B2 (en)Extensible pre-boot authentication
US8745386B2 (en)Single-use authentication methods for accessing encrypted data
US20220147634A1 (en)Client authentication and data management system
HK1181146B (en)Protected device management
HK1181146A (en)Protected device management
SmithStorage Protection with Intel Anti-Theft Technology-Data Protection (Intel AT-d).

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTEL CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SMITH, NED M.;MOORE, VICTORIA C.;GROBMAN, STEVEN L.;SIGNING DATES FROM 20091215 TO 20091217;REEL/FRAME:023923/0599

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp