Patents by Inventor David W. Grawrock

David W. Grawrock has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040003288
    Abstract: An apparatus may include a root of trust for measurement (RTM) module coupled to a verified platform security property policy module and a comparison module. The comparison module may operate to prevent transfer of control to an operating system (and/or halt the boot process) if a policy included in the platform security property policy module is violated. A system may include a memory coupled to a processor, a platform security property policy module, and a comparison module. The memory may include an RTM. A method may include beginning execution at an entry point within an RTM, determining that the RTM is trustworthy, determining that a main initialization code associated with a platform is trustworthy and transferring control to the main initialization code, and otherwise, refraining from transferring control to the main initialization code.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Applicant: Intel Corporation
    Inventors: Willard M. Wiseman, David W. Grawrock
  • Publication number: 20040003273
    Abstract: Methods, apparatus and machine-readable medium are described that attempt to protect secrets from sleep attacks. In some embodiments, the secrets are encrypted and a security enhanced environment dismantled prior to entering a sleep state. Some embodiments further re-establish a security enhanced environment and decrypt the secrets in response to a wake event.
    Type: Application
    Filed: June 26, 2002
    Publication date: January 1, 2004
    Inventors: David W. Grawrock, David I. Poisner
  • Publication number: 20040003321
    Abstract: A system is initialized for operation in a protected operating environment by executing authenticated code that prepares various portions of the hardware for protection from non-trusted software. In one embodiment, initialization includes identifying and locking down specified areas of memory for protected processing, then placing trusted software into the specified areas of memory and validating the trusted software. In a particular embodiment, initialization may also include deriving and protectively storing identifying characteristics of the trusted software.
    Type: Application
    Filed: June 27, 2002
    Publication date: January 1, 2004
    Inventors: Andrew F. Glew, James A. Sutton, Lawrence O. Smith, David W. Grawrock, Gilbert Neiger, Michael A. Kozuch
  • Publication number: 20030229794
    Abstract: A system and method for permitting the execution of system management mode (SMM) code during secure operations in a microprocessor system is described. In one embodiment, the system management interrupt (SMI) may be first directed to a handler in a secured virtual machine monitor (SVMM). The SMI may then be re-directed to SMM code located in a virtual machine (VM) that is under the security control of the SVMM. This redirection may be accomplished by allowing the SVMM to read and write the system management (SM) base register in the processor.
    Type: Application
    Filed: June 7, 2002
    Publication date: December 11, 2003
    Inventors: James A. Sutton, David W. Grawrock, Richard A. Uhlig, David I. Poisner, Andrew F. Glew, Clifford D. Hall, Lawrence O. Smith, Gilbert Neiger, Michael A. Kozuch, Robert T. George, Bradley G. Burgess
  • Publication number: 20030196083
    Abstract: In one embodiment, a method comprises generating a cryptographic key pair associated with a data center. The method also includes storing a private key of the cryptographic key pair within a platform. The private key is used to sign a value stored in the platform for validation of inclusion of the platform into the data center. In an embodiment, the private key is revoked upon determining that the platform has been compromised. In one embodiment, the private key may be revoked in each of the platforms of the data center.
    Type: Application
    Filed: April 15, 2002
    Publication date: October 16, 2003
    Inventors: David W. Grawrock, James A. Sutton
  • Publication number: 20030196088
    Abstract: A method and apparatus to communicate with a token using a previously reserved binary number in the start field of a cycle, wherein the cycle is not echoed on any bus other than the bus through which the communication is received.
    Type: Application
    Filed: April 15, 2002
    Publication date: October 16, 2003
    Inventors: David I. Poisner, David W. Grawrock, James A. Sutton
  • Publication number: 20030196100
    Abstract: Methods, apparatus and computer readable medium are described that attempt to protect secrets from system reset attacks. In some embodiments, the memory is locked after a system reset and secrets removed from the memory before the memory is unlocked.
    Type: Application
    Filed: April 15, 2002
    Publication date: October 16, 2003
    Inventors: David W. Grawrock, David I. Poisner, James A. Sutton
  • Publication number: 20030191943
    Abstract: Methods and arrangements to register code are described. Many embodiments may comprise determining an identity such as a hashed identity, digest value, digital signature, or the like, and registering resident code that defines a secure environment, to provide a basis for a system trustworthiness evaluation by another secure environment within the system, a secure environment within another system, a remote system, or the like. Some embodiments comprise transmitting an instruction to store the identity in a repository or memory inaccessible to insecure or untrustworthy hardware and/or software. Several embodiments may comprise verifying a request to access the identity. Other embodiments may comprise storing the identity in a temporary register, such as a register in a hub and/or in memory coupled with an input/output (I/O) hub or within a memory controller hub.
    Type: Application
    Filed: April 5, 2002
    Publication date: October 9, 2003
    Inventors: David I. Poisner, James A. Sutton, David W. Grawrock
  • Publication number: 20030188113
    Abstract: A method and apparatus for resetting and modifying special registers in a security token is described. In one embodiment, a register may be reset when a reset flag is true when a special transmission on a bus demonstrates the mutual locality of the associated processor and chipset. A modify flag may also be used to indicate whether the register contents may be modified. Modifications may also be dependent upon demonstration of mutual locality.
    Type: Application
    Filed: March 29, 2002
    Publication date: October 2, 2003
    Inventors: David W. Grawrock, James A. Sutton
  • Publication number: 20030188165
    Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.
    Type: Application
    Filed: March 29, 2002
    Publication date: October 2, 2003
    Inventors: James A. Sutton, David W. Grawrock
  • Publication number: 20030163711
    Abstract: Methods, apparatus and computer readable medium are described for sealing objects to two or more tokens. Further, methods, apparatus and computer readable medium are described for unsealing objects that have been sealed to two or more tokens.
    Type: Application
    Filed: February 22, 2002
    Publication date: August 28, 2003
    Inventor: David W. Grawrock
  • Publication number: 20030126453
    Abstract: A processor loads, authenticates, and/or initiates execution of authenticated code modules in response to executing launch authenticated code instructions.
    Type: Application
    Filed: December 31, 2001
    Publication date: July 3, 2003
    Inventors: Andrew F. Glew, James A. Sutton, Lawrence O. Smith, David W. Grawrock, Gilbert Neiger, Michael A. Kozuch
  • Publication number: 20030126454
    Abstract: Apparatus and method load, authenticate, and/or execute authenticated code modules stored in a private memory.
    Type: Application
    Filed: December 28, 2001
    Publication date: July 3, 2003
    Inventors: Andrew F. Glew, James A. Sutton, Lawrence O. Smith, David W. Grawrock, Gilbert Neiger, Michael A. Kozuch
  • Publication number: 20030126442
    Abstract: An authenticated code module comprises a value that attests to the authenticity of the module. The value is encrypted with a key corresponding to a key of a computing device that is to execute the module.
    Type: Application
    Filed: December 31, 2001
    Publication date: July 3, 2003
    Inventors: Andrew F. Glew, James A. Sutton, Lawrence O. Smith, David W. Grawrock, Gilbert Neiger, Michael A. Kozuch
  • Publication number: 20030115453
    Abstract: Credentials may by issued to virtual tokens of a computing device based upon a credential issued to physical token of the computing device thus tying the virtual token credential to the physical token credential.
    Type: Application
    Filed: December 17, 2001
    Publication date: June 19, 2003
    Inventor: David W. Grawrock
  • Publication number: 20030061494
    Abstract: A method and system for protecting data on a computer is presented. A computer is provided that has a pre-operating system (pre-OS) space and an operating system-present (OS-present) space. Protected storage is accessed from pre-OS space via a trusted platform module (TPM). Similarly, protected storage is accessed from OS-present space via the TPM. As such, from both pre-OS space and OS-present space, a computer may prevent unauthorized users from gaining access to data stored in protected storage.
    Type: Application
    Filed: September 26, 2001
    Publication date: March 27, 2003
    Inventors: Luke E. Girard, David W. Grawrock
  • Publication number: 20020087877
    Abstract: In general, a method of securely transmitting data features an operation of authenticating a user of a platform during a Basic Input/Output System (BIOS) boot process. In response to authenticating the user, a first keying material is released from a token communicatively coupled to the platform. The first keying material is combined with a second keying material internally stored within the platform in order to produce a combination key. This combination key is used to decrypt a second BIOS area to recover a second segment of BIOS code.
    Type: Application
    Filed: December 28, 2000
    Publication date: July 4, 2002
    Inventor: David W. Grawrock
  • Publication number: 20020083332
    Abstract: In general, one embodiment of the invention features a method comprising operations performed internally within a device. A first operation involves generating data for permanent storage in a protected area of internal memory of the device. This prevents subsequent modification of the data. A second operation involves producing a secret value being a combination of both the data and a short term value generated in response to a periodic event such as a power-up sequence of a platform employing the device.
    Type: Application
    Filed: December 22, 2000
    Publication date: June 27, 2002
    Inventor: David W. Grawrock
  • Publication number: 20020080974
    Abstract: In one embodiment, a platform comprises a processor, an input/output control hub (ICH), and a trusted platform module (TPM). Coupled to the ICH, the TPM comprises an internal memory, and an asymmetric key generation unit. The symmetric key generation unit produces an ephemeral asymmetric key pair including an ephemeral asymmetric public key and an ephemeral asymmetric private key. Both the ephemeral asymmetric public key and the ephemeral asymmetric.
    Type: Application
    Filed: December 27, 2000
    Publication date: June 27, 2002
    Inventor: David W. Grawrock