Доверенная загрузка (аппаратные средства) — Википедия
Программы Софт - скачать через торрент

Intel txe driver

Драйвер механизма доверенного исполнения Intel® для Intel® NUC DN2820FY и DE3815TY

Intel Trusted Execution Technology Intel TXT , formerly known as LaGrande Technology is a computer hardware technology whose primary goals are:.

Intel txe driver

Intel TXT uses a Trusted Platform Module TPM and cryptographic techniques to provide measurements of software and platform components so that system software as well as local and remote management applications may use those measurements to make trust decisions. This technology is based on an industry initiative by the Trusted Computing Group TCG to promote safer computing.

The Trusted Platform Module TPM as specified by the TCG provides many security functions including special registers called Platform Configuration Registers — PCRs which hold various measurements in a shielded location in a manner that prevents spoofing. Measurements consist of a cryptographic hash using a Secure Hashing Algorithm SHA ; the TPM v1. A desired characteristic of a cryptographic hash algorithm is that for all practical purposes the hash result referred to as a hash digest or a hash of any two modules will produce the same hash value only if the modules are identical.

Measurements can be of code, data structures, configuration, information, or anything that can be loaded into memory. TCG requires that code not be executed until after it has been measured. To further protect the integrity of the measurements, hash measurements are not written to PCRs, but rather a PCR is "extended" with a measurement. This means that the TPM takes the current value of the PCR and the measurement to be extended, hashes them together, and replaces the content of the PCR with that hash result. The effect is that the only way to arrive at a particular measurement in a PCR is to extend exactly the same measurements in exactly the same order.

Therefore, if any module being measured has been modified, the resulting PCR measurement will be different and thus it is easy to detect if any code, configuration, data, etc.

Intel txe driver

The technology supports both a static chain of trust and a dynamic chain of trust. The static chain of trust starts when the platform powers on or the platform is reset , which resets all PCRs to their default value. For server platforms, the first measurement is made by hardware i. The processor validates the signature and integrity of the signed module before executing it.

The ACM then measures the first BIOS code module, which can make additional measurements. The measurements of the ACM and BIOS code modules are extended to PCR0, which is said to hold the static core root of trust measurement CRTM as well as the measurement of the BIOS Trusted Computing Base TCB.

The BIOS measures additional components into PCRs as follows:. The dynamic chain of trust starts when the operating system invokes a special security instruction, which resets dynamic PCRs PCR17—22 to their default value and starts the measured launch. The first dynamic measurement is made by hardware i. This is known as the Dynamic Root of Trust Measurement DRTM. The SINIT ACM then measures the first operating system code module referred to as the measured launch environment — MLE.

Before the MLE is allowed to execute, the SINIT ACM verifies that the platform meets the requirements of the Launch Control Policy LCP set by the platform owner. The integrity of the LCP and its lists of known-good measurements are protected by storing a hash measurement of the policy in the TPM in a protected non-volatile location that can only be modified by the platform owner. Once the LCP is satisfied, the SINIT ACM allows the MLE to execute as a Trusted OS by enabling access to special security registers and enabling TPM Locality 2 level access.

The MLE is now able to make additional measurements to the dynamic PCRs. The dynamic PCRs contain measurement of:. The technology also provides a more secure way for the operating system to initialize the platform.

Intel® Trusted Execution Engine (Intel® TXE) Driver for Intel® NUC DN2820FY and DE3815TY

In contrast to the normal processor initialization [which involved the boot-strap-processor BSP sending a Start-up Inter-Processor Interrupt SIPI to each Application Processor, thus starting each processor in "real mode" and then transitioning to "virtual mode" and finally to "protected mode"], the operating system avoids that vulnerability by performing a secure launch a.

PCR values are available both locally and remotely. Furthermore, the TPM has the capability to digitally sign the PCR values i. Additionally, those values can be used to identify the execution environment the particular BIOS version, OS level, configuration, etc. This ability to evaluate and assign trust levels to platforms is known as Trusted Compute Pools. Numerous server platforms include Intel TXT, and TXT functionality is leveraged by software vendors including HyTrust , PrivateCore , Citrix , Cloud Raxak, and VMware.

Open-source projects also utilize the TXT functionality; for example, tboot provides a TXT-based integrity system for the Linux kernel and Xen hypervisor. From Wikipedia, the free encyclopedia. For the city, see La Grande, Oregon. This article has multiple issues.

Please help improve it or discuss these issues on the talk page.

Intel® Trusted Execution Engine (Intel® TXE) Driver for Intel® NUC Kit NUC6CAYS, NUC6CAYH

Learn how and when to remove these template messages. ASIP CISC RISC EDGE TRIPS VLIW EPIC MISC OISC NISC ZISC Comparison. Instruction pipelining Bubble Operand forwarding Out-of-order execution Register renaming Speculative execution Branch predictor Memory dependence prediction Hazards. Bit Bit-serial Word Instruction Pipelining Scalar Superscalar Task Thread Process Data Vector Memory.

Temporal Simultaneous SMT Hyper-threading Speculative SpMT Preemptive Cooperative Clustered Multi-Thread CMT Hardware scout. SISD SIMD SWAR SIMT MISD MIMD SPMD Addressing mode. Instructions per second IPS Instructions per clock IPC Cycles per instruction CPI Floating-point operations per second FLOPS Transactions per second TPS SUPS Performance per watt Orders of magnitude computing Cache performance measurement and metric. Single-core processor Multi-core processor Manycore processor.

APM ACPI Dynamic frequency scaling Dynamic voltage scaling Clock gating. Non-executable memory NX bit Bounds checking Intel MPX Intel Secure Key Hardware restriction firmware Software Guard Extensions Intel SGX Trusted Execution Technology OmniShield Trusted Platform Module TPM Secure cryptoprocessor Hardware security module Hengzhi chip. History of general-purpose CPUs. X86 architecture Trusted computing. Articles lacking reliable references from May All articles lacking reliable references Articles needing additional references from July All articles needing additional references All articles with unsourced statements Articles with unsourced statements from January Navigation menu Personal tools Not logged in Talk Contributions Create account Log in.

Navigation Main page Contents Featured content Current events Random article Donate to Wikipedia Wikipedia store. Interaction Help About Wikipedia Community portal Recent changes Contact page. Tools What links here Related changes Upload file Special pages Permanent link Page information Wikidata item Cite this page.

This page was last edited on 29 June , at Text is available under the Creative Commons Attribution-ShareAlike License ; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.

Privacy policy About Wikipedia Disclaimers Contact Wikipedia Developers Cookie statement Mobile view. This article relies too much on references to primary sources. Please improve this by adding secondary or tertiary sources.

Intel txe driver

May Learn how and when to remove this template message. This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. July Learn how and when to remove this template message.

Опубликовано в рубрике Driver
Twitter Delicious Facebook Digg Stumbleupon Favorites More
  • Прикрепленное видео

Все права защищены. © 2015 romantic-in-love.ru