[图书][B] Trusted computing platforms: design and applications

SW Smith - 2013 - books.google.com
How can one trust computation taking place at a remote site, particularly if a party at that site
might have motivation to subvert this trust? In recent years, industrial efforts have advanced …

Programming non-volatile memory in a secure processor

P Srinivasan, J Princen - US Patent 8,601,247, 2013 - Google Patents
An improved secure programming technique involves reducing the size of bits programmed
in on-chip secret non-volatile memory, at the same time enabling the typical secure …

Trusted storage systems and methods

U Maheshwari, R Vingralek, WO Sibert - US Patent 8,464,071, 2013 - Google Patents
Abstract Systems and methods are disclosed for providing a trusted database system that
leverages a small amount of trusted storage to secure a larger amount of untrusted storage …

Certificate verification

P Srinivasan, J Princen - US Patent 8,621,188, 2013 - Google Patents
5,867,223. A 2f1999 Schindler et al. 6,873,975 B1 3/2005 Hatakeyama et al. 5,892.900 A
4/1999 Ginter et al. 6,892,301 B1 5/2005 Hansmann et al. 500s, 733 A 5, 1999 Becket al …

Saving and retrieving data based on public key encryption

P England, M Peinado - US Patent 8,589,701, 2013 - Google Patents
In accordance with certain aspects, bound key operations on ciphertext and/or data are
implemented. A bound key opera tion can receive both data to be signed and a bound key …

Saving and retrieving data based on public key encryption

P England, M Peinado - US Patent 8,601,286, 2013 - Google Patents
In accordance with certain aspects, data is received and a digital signature is generated and
output. The digital signature can be a digital signature of the data and one or more condi …

Saving and retrieving data based on public key encryption

P England, M Peinado - US Patent 8,621,243, 2013 - Google Patents
In accordance with certain aspects, data is received from a calling program. Ciphertext that
includes the data is gener ated, using public key encryption, in a manner that allows the data …