Ruan, 2014 - Google Patents
Building blocks of the security and management engineRuan, 2014
View HTML- Document ID
- 17839780536105130997
- Author
- Ruan X
- Publication year
- Publication venue
- Platform Embedded Security Technology Revealed
External Links
Snippet
Building Blocks of the Security and Management Engine | SpringerLink Skip to main content
Advertisement Springer Nature Link Account Menu Find a journal Publish with us Track your
research Search Cart 1.Home 2.Platform Embedded Security Technology Revealed 3.Chapter …
- 238000004422 calculation algorithm 0 description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12375304B2 (en) | Mutual authentication of confidential communication | |
EP4176563B1 (en) | Tls integration of post quantum cryptographic algorithms | |
CN110214440B (en) | Computing system, method for transmitting protected data and readable storage medium | |
RU2718689C2 (en) | Confidential communication control | |
US20240356730A1 (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
US10367637B2 (en) | Modular exponentiation with transparent side channel attack countermeasures | |
US11575501B2 (en) | Preserving aggregation using homomorphic encryption and trusted execution environment, secure against malicious aggregator | |
US7516321B2 (en) | Method, system and device for enabling delegation of authority and access control methods based on delegated authority | |
CN114095170B (en) | Data processing method, device, system and computer readable storage medium | |
JP2017517979A (en) | Common method RSA key pair for signature generation and encryption / decryption | |
CN109951276B (en) | Embedded equipment remote identity authentication method based on TPM | |
US11496287B2 (en) | Privacy preserving fully homomorphic encryption with circuit verification | |
KR20090083440A (en) | Combining data and encrypting public keys and verifying them | |
US9800410B1 (en) | Data encryption system and method | |
US11108552B1 (en) | Data encryption method and system | |
Kalka et al. | A Comprehensive Review of TLSNotary Protocol | |
JP4937921B2 (en) | A secure interface for generic key derivation function support | |
Ruan | Building blocks of the security and management engine | |
Ramesh et al. | Cha-Cha 20: stream cipher based encryption for cloud data centre | |
Arvin S. Lat et al. | SOUL System: secure online USB login system | |
Wu | Fundamentals of cryptography | |
WO2024197405A1 (en) | Systems and methods for trustless distributed symmetric encyption | |
CN119232415A (en) | Anonymous authentication method, third-party authentication center, user node and edge server | |
Simpson et al. | High-Assurance Cryptography for Web-Based Enterprises | |
HK40020610A (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data |