[go: up one dir, main page]

Ruan, 2014 - Google Patents

Building blocks of the security and management engine

Ruan, 2014

View HTML
Document ID
17839780536105130997
Author
Ruan X
Publication year
Publication venue
Platform Embedded Security Technology Revealed

External Links

Snippet

Building Blocks of the Security and Management Engine | SpringerLink Skip to main content Advertisement Springer Nature Link Account Menu Find a journal Publish with us Track your research Search Cart 1.Home 2.Platform Embedded Security Technology Revealed 3.Chapter …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Similar Documents

Publication Publication Date Title
US12375304B2 (en) Mutual authentication of confidential communication
EP4176563B1 (en) Tls integration of post quantum cryptographic algorithms
CN110214440B (en) Computing system, method for transmitting protected data and readable storage medium
RU2718689C2 (en) Confidential communication control
US20240356730A1 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
US10367637B2 (en) Modular exponentiation with transparent side channel attack countermeasures
US11575501B2 (en) Preserving aggregation using homomorphic encryption and trusted execution environment, secure against malicious aggregator
US7516321B2 (en) Method, system and device for enabling delegation of authority and access control methods based on delegated authority
CN114095170B (en) Data processing method, device, system and computer readable storage medium
JP2017517979A (en) Common method RSA key pair for signature generation and encryption / decryption
CN109951276B (en) Embedded equipment remote identity authentication method based on TPM
US11496287B2 (en) Privacy preserving fully homomorphic encryption with circuit verification
KR20090083440A (en) Combining data and encrypting public keys and verifying them
US9800410B1 (en) Data encryption system and method
US11108552B1 (en) Data encryption method and system
Kalka et al. A Comprehensive Review of TLSNotary Protocol
JP4937921B2 (en) A secure interface for generic key derivation function support
Ruan Building blocks of the security and management engine
Ramesh et al. Cha-Cha 20: stream cipher based encryption for cloud data centre
Arvin S. Lat et al. SOUL System: secure online USB login system
Wu Fundamentals of cryptography
WO2024197405A1 (en) Systems and methods for trustless distributed symmetric encyption
CN119232415A (en) Anonymous authentication method, third-party authentication center, user node and edge server
Simpson et al. High-Assurance Cryptography for Web-Based Enterprises
HK40020610A (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data