JP5285075B2 - セキュア・カーネル設計による安全基準の差別化 - Google Patents
セキュア・カーネル設計による安全基準の差別化 Download PDFInfo
- Publication number
- JP5285075B2 JP5285075B2 JP2010527399A JP2010527399A JP5285075B2 JP 5285075 B2 JP5285075 B2 JP 5285075B2 JP 2010527399 A JP2010527399 A JP 2010527399A JP 2010527399 A JP2010527399 A JP 2010527399A JP 5285075 B2 JP5285075 B2 JP 5285075B2
- Authority
- JP
- Japan
- Prior art keywords
- application
- key
- secure kernel
- kernel
- encryption key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Description
Claims (7)
- コンピュータ実行のデータ処理の方法であって、
前記方法は、
コンピュータによって、初期化ハードウエアを使い、プロセッサ・データパスがアクセス可能なメモリに格納されるセキュア・カーネルの暗号化コピーを復号するステップと、
前記コンピュータによって、前記メモリから読み出された前記セキュア・カーネルを実行するステップと、
を含み、
前記セキュア・カーネルはセキュア・カーネル暗号キーを包含し、
前記セキュア・カーネルを実行するステップは、
前記セキュア・カーネル暗号キーを使って、供給元関連の暗号キーのデジタル署名の正当性確認をするステップと、
前記供給元関連の暗号キーを使って、アプリケーション関連の暗号キーのデジタル署名の正当性確認をするステップと、
を含み、
前記供給元関連の暗号キーはソフトウエア供給元に関連付けられており、
前記アプリケーション関連の暗号キーはソフトウエア・アプリケーションに関連付けられており、
前記アプリケーション関連の暗号キーが正当性確認に合格したかどうかを判定するステップと、
前記アプリケーション関連の暗号キーが正当性確認に合格したことの判定を受けて、前記セキュア・カーネルに関連付けられた暗号キーによる署名を使って、前記アプリケーション関連の暗号キーの署名を点検し、その正当性を確認するステップと、
前記アプリケーション関連の暗号キーの署名が正当性確認に合格したことの判定を受けて、前記セキュア・カーネルに関連付けられた暗号キーによる署名を使って、前記アプリケーション関連の暗号キーに再署名するステップを更に含み、
以って、その後、前記各アプリケーションのアプリケーション固有キーは、セキュア・カーネルの公開キーを直接使って正当性を確認される、
前記方法。 - 前記アプリケーション関連の暗号キーは、前記ソフトウエア・アプリケーションに併合して格納される、請求項1に記載の方法。
- 前記初期化ハードウエアは、前記プロセッサ・データパスから独立して作動する、請求項1または請求項2に記載の方法。
- 前記署名に使う暗号キーは、前記セキュア・カーネル暗号キーがその対応公開キーとなる、キー・ペアの秘密キーである、請求項1に記載の方法。
- 前記アプリケーション関連の暗号キーを使って前記ソフトウエア・アプリケーションのデジタル署名を検証するステップをさらに含む、請求項1から請求項4のいずれかに記載の方法。
- 前記供給元関連の暗号キーを使った、前記アプリケーション関連の暗号キーの前記デジタル署名の前記正当性確認が合格した場合においてだけ、前記ソフトウエア・アプリケーションを実行するステップをさらに含む、
請求項1から請求項5のいずれかに記載の方法。 - 初期化ハードウエアと、
プロセッサ・データパスと、
前記プロセッサ・データパスおよび前記初期化ハードウエアがアクセス可能なメモリと、
一つ以上のセンシティブな部分を有するセキュア・カーネルの暗号化されたコピーを包含する不揮発性記憶装置と、
を含むデータ処理システムであって、
前記初期化ハードウエアは前記暗号化コピーを前記メモリ中に復号し、前記プロセッサ・データパスは前記メモリ中の前記セキュア・カーネルを実行して、
前記セキュア・カーネル暗号キーを使って、供給元関連の暗号キーのデジタル署名の正当性確認をするステップと、
前記供給元関連の暗号キーを使って、アプリケーション関連の暗号キーのデジタル署名の正当性確認をするステップと、
を含む処置を遂行し、
前記供給元関連の暗号キーはソフトウエア供給元に関連付けられており、
前記アプリケーション関連の暗号キーはソフトウエア・アプリケーションに関連付けられており、
前記初期化ハードウエアは、
前記アプリケーション関連の暗号キーが正当性確認に合格したかどうかを判定するステップと、
前記アプリケーション関連の暗号キーが正当性確認に合格したことの判定を受けて、前記セキュア・カーネルに関連付けられた暗号キーによる署名を使って、前記アプリケーション関連の暗号キーの署名を点検し、その正当性を確認するステップと、
前記アプリケーション関連の暗号キーの署名が正当性確認に合格したことの判定を受けて、前記セキュア・カーネルに関連付けられた暗号キーによる署名を使って、前記アプリケーション関連の暗号キーに再署名するステップを更に実行し、
以って、その後、前記各アプリケーションのアプリケーション固有キーは、セキュア・カーネルの公開キーを直接使って正当性を確認される、
前記データ処理システム。
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/866,001 | 2007-10-02 | ||
| US11/866,001 US8332636B2 (en) | 2007-10-02 | 2007-10-02 | Secure policy differentiation by secure kernel design |
| PCT/EP2008/062590 WO2009043744A1 (en) | 2007-10-02 | 2008-09-22 | Secure policy differentiation by secure kernel design |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2010541084A JP2010541084A (ja) | 2010-12-24 |
| JP5285075B2 true JP5285075B2 (ja) | 2013-09-11 |
Family
ID=40086443
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010527399A Expired - Fee Related JP5285075B2 (ja) | 2007-10-02 | 2008-09-22 | セキュア・カーネル設計による安全基準の差別化 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US8332636B2 (ja) |
| JP (1) | JP5285075B2 (ja) |
| KR (1) | KR101231561B1 (ja) |
| CN (1) | CN101816004B (ja) |
| WO (1) | WO2009043744A1 (ja) |
Families Citing this family (41)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8422674B2 (en) * | 2007-05-29 | 2013-04-16 | International Business Machines Corporation | Application-specific secret generation |
| US8433927B2 (en) * | 2007-05-29 | 2013-04-30 | International Business Machines Corporation | Cryptographically-enabled privileged mode execution |
| US8332635B2 (en) * | 2007-05-29 | 2012-12-11 | International Business Machines Corporation | Updateable secure kernel extensions |
| US8826037B2 (en) * | 2008-03-13 | 2014-09-02 | Cyberlink Corp. | Method for decrypting an encrypted instruction and system thereof |
| US8205257B1 (en) * | 2009-07-28 | 2012-06-19 | Symantec Corporation | Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process |
| US8555059B2 (en) * | 2010-04-16 | 2013-10-08 | Microsoft Corporation | Secure local update of content management software |
| US8448169B2 (en) * | 2010-07-12 | 2013-05-21 | International Business Machines Corporation | Managing unique electronic identification for kernel extensions in isolated virtual space |
| US8527989B2 (en) | 2010-07-12 | 2013-09-03 | International Business Machines Corporation | Tracking loading and unloading of kernel extensions in isolated virtual space |
| US8397245B2 (en) | 2010-07-12 | 2013-03-12 | International Business Machines Corporation | Managing loading and unloading of shared kernel extensions in isolated virtual space |
| US8555369B2 (en) * | 2011-10-10 | 2013-10-08 | International Business Machines Corporation | Secure firewall rule formulation |
| US9646153B2 (en) * | 2012-08-08 | 2017-05-09 | Intel Corporation | Securing content from malicious instructions |
| US9092581B2 (en) * | 2012-10-09 | 2015-07-28 | Intel Corporation | Virtualized communication sockets for multi-flow access to message channel infrastructure within CPU |
| US20140208105A1 (en) * | 2013-01-23 | 2014-07-24 | GILBARCO, S.r.I. | Automated Content Signing for Point-of-Sale Applications in Fuel Dispensing Environments |
| US10073966B2 (en) * | 2013-04-29 | 2018-09-11 | Sri International | Operating system-independent integrity verification |
| EA201690882A1 (ru) | 2013-10-30 | 2016-11-30 | Джилбарко Инк. | Криптографическая отметка водяным знаком содержимого в топливораздаточном оборудовании |
| CN103793633A (zh) * | 2014-02-14 | 2014-05-14 | 宇龙计算机通信科技(深圳)有限公司 | 一种sdk校验方法及装置 |
| CN105022952B (zh) * | 2014-04-28 | 2018-03-16 | 深圳市茁壮网络股份有限公司 | 一种中间件授权认证方法及装置 |
| US9785577B2 (en) | 2014-05-28 | 2017-10-10 | Red Hat, Inc. | Kernel key handling |
| US10560440B2 (en) * | 2015-03-12 | 2020-02-11 | Fornetix Llc | Server-client PKI for applied key management system and process |
| US10630686B2 (en) | 2015-03-12 | 2020-04-21 | Fornetix Llc | Systems and methods for organizing devices in a policy hierarchy |
| US10965459B2 (en) | 2015-03-13 | 2021-03-30 | Fornetix Llc | Server-client key escrow for applied key management system and process |
| US10880281B2 (en) | 2016-02-26 | 2020-12-29 | Fornetix Llc | Structure of policies for evaluating key attributes of encryption keys |
| US10348485B2 (en) | 2016-02-26 | 2019-07-09 | Fornetix Llc | Linking encryption key management with granular policy |
| US10917239B2 (en) | 2016-02-26 | 2021-02-09 | Fornetix Llc | Policy-enabled encryption keys having ephemeral policies |
| US10860086B2 (en) | 2016-02-26 | 2020-12-08 | Fornetix Llc | Policy-enabled encryption keys having complex logical operations |
| US11063980B2 (en) | 2016-02-26 | 2021-07-13 | Fornetix Llc | System and method for associating encryption key management policy with device activity |
| US10931653B2 (en) | 2016-02-26 | 2021-02-23 | Fornetix Llc | System and method for hierarchy manipulation in an encryption key management system |
| US20180004931A1 (en) * | 2016-07-02 | 2018-01-04 | Intel Corporation | Process management |
| US10127160B2 (en) * | 2016-09-20 | 2018-11-13 | Alexander Gounares | Methods and systems for binary scrambling |
| US10642970B2 (en) * | 2017-12-12 | 2020-05-05 | John Almeida | Virus immune computer system and method |
| CN119356698B (zh) * | 2018-05-09 | 2025-07-01 | 斯追普公司 | 终端硬件配置系统 |
| WO2020055968A1 (en) * | 2018-09-11 | 2020-03-19 | Amari.Ai Incorporated | Secure communications gateway for trusted execution and secure communications |
| US11392687B2 (en) * | 2019-01-04 | 2022-07-19 | Baidu Usa Llc | Method and system for validating kernel objects to be executed by a data processing accelerator of a host system |
| KR102851783B1 (ko) | 2020-01-30 | 2025-08-27 | 삼성전자주식회사 | 보안 장치, 전자 장치, 보안 부트 관리 시스템, 부트 이미지 생성 방법 및 부트 체인 실행 방법 |
| US11941092B2 (en) * | 2020-02-06 | 2024-03-26 | Saturn Licensing Llc | Techniques for launching applications based on partial signature validation |
| US10747875B1 (en) * | 2020-03-19 | 2020-08-18 | Cyberark Software Ltd. | Customizing operating system kernels with secure kernel modules |
| CN113496011B (zh) * | 2020-04-03 | 2024-01-26 | 杭州海康威视数字技术股份有限公司 | 受保护智能应用的调用权限认证方法以及智能装置 |
| CN111756698B (zh) * | 2020-05-27 | 2022-11-18 | 浪潮电子信息产业股份有限公司 | 一种消息传递方法、装置、设备和计算机可读存储介质 |
| CN113553109A (zh) * | 2021-07-12 | 2021-10-26 | 华东师范大学 | 一种用于校验操作系统前置软件的方法 |
| CN114329479B (zh) * | 2021-12-08 | 2024-05-28 | 浙江大学 | 一种面向risc-v架构的启动验证方法 |
| CN114817931B (zh) * | 2022-04-22 | 2025-04-08 | 中国电力科学研究院有限公司 | 基于星型信任链的终端安全防护方法、装置、设备及介质 |
Family Cites Families (64)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5724425A (en) | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
| KR19990082665A (ko) | 1996-02-21 | 1999-11-25 | 오오노 도시오 | 공통키 통신방법 |
| US6704871B1 (en) | 1997-09-16 | 2004-03-09 | Safenet, Inc. | Cryptographic co-processor |
| US6307936B1 (en) | 1997-09-16 | 2001-10-23 | Safenet, Inc. | Cryptographic key management scheme |
| US6775778B1 (en) * | 1998-05-29 | 2004-08-10 | Texas Instruments Incorporated | Secure computing device having boot read only memory verification of program code |
| JP2000138917A (ja) * | 1998-05-29 | 2000-05-16 | Texas Instr Inc <Ti> | 安全計算システム及び方法 |
| US6401208B2 (en) | 1998-07-17 | 2002-06-04 | Intel Corporation | Method for BIOS authentication prior to BIOS execution |
| US6330670B1 (en) | 1998-10-26 | 2001-12-11 | Microsoft Corporation | Digital rights management operating system |
| US6327652B1 (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
| US7194092B1 (en) | 1998-10-26 | 2007-03-20 | Microsoft Corporation | Key-based secure storage |
| US6263431B1 (en) | 1998-12-31 | 2001-07-17 | Intle Corporation | Operating system bootstrap security mechanism |
| US7225333B2 (en) | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
| US6651171B1 (en) | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
| US6775779B1 (en) * | 1999-04-06 | 2004-08-10 | Microsoft Corporation | Hierarchical trusted code for content protection in computers |
| US7073069B1 (en) | 1999-05-07 | 2006-07-04 | Infineon Technologies Ag | Apparatus and method for a programmable security processor |
| US9213836B2 (en) | 2000-05-28 | 2015-12-15 | Barhon Mayer, Batya | System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages |
| US20010056533A1 (en) * | 2000-06-23 | 2001-12-27 | Peter Yianilos | Secure and open computer platform |
| US20030018892A1 (en) | 2001-07-19 | 2003-01-23 | Jose Tello | Computer with a modified north bridge, security engine and smart card having a secure boot capability and method for secure booting a computer |
| US7243340B2 (en) * | 2001-11-15 | 2007-07-10 | Pace Anti-Piracy | Method and system for obfuscation of computer program execution flow to increase computer program security |
| US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
| US6715085B2 (en) * | 2002-04-18 | 2004-03-30 | International Business Machines Corporation | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function |
| WO2003090074A2 (en) | 2002-04-18 | 2003-10-30 | Advanced Micro Devices, Inc. | Initialization of a computer system including a secure execution mode-capable processor |
| US6907522B2 (en) | 2002-06-07 | 2005-06-14 | Microsoft Corporation | Use of hashing in a secure boot loader |
| JP3847672B2 (ja) * | 2002-07-03 | 2006-11-22 | 松下電器産業株式会社 | コンパイラ装置及びコンパイル方法 |
| EP1401147B1 (en) * | 2002-09-16 | 2007-11-28 | Agilent Technologies, Inc. | Measuring network parameters as experienced by non synthetic network traffic |
| US7305564B2 (en) | 2002-12-19 | 2007-12-04 | International Business Machines Corporation | System and method to proactively detect software tampering |
| CN100440774C (zh) * | 2002-12-26 | 2008-12-03 | 成都卫士通信息产业股份有限公司 | 硬件加密卡与网络协议栈的绑定方法 |
| US7562214B2 (en) | 2003-03-31 | 2009-07-14 | International Business Machines Corporation | Data processing systems |
| CN1209705C (zh) * | 2003-09-28 | 2005-07-06 | 中国科学院计算技术研究所 | 支持软件安全在线升级的网络设备的产品映象设计方法 |
| US7188127B2 (en) | 2003-10-07 | 2007-03-06 | International Business Machines Corporation | Method, system, and program for processing a file request |
| US7516331B2 (en) | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
| JP4629416B2 (ja) * | 2003-11-28 | 2011-02-09 | パナソニック株式会社 | データ処理装置 |
| US7644278B2 (en) | 2003-12-31 | 2010-01-05 | International Business Machines Corporation | Method for securely creating an endorsement certificate in an insecure environment |
| TW200527870A (en) | 2004-01-14 | 2005-08-16 | Nec Corp | Encrypted communication method, encrypted communication system, node device and program |
| TW200529623A (en) | 2004-01-14 | 2005-09-01 | Nec Corp | Communication encryption method, communication encryption system, terminal device, DNS server and program |
| EP1714423B1 (en) | 2004-02-10 | 2017-03-29 | NTT Communications Corp. | Secret information management scheme based on secret sharing scheme |
| US7899184B2 (en) | 2004-09-02 | 2011-03-01 | Pisaramedia Oy | Ends-messaging protocol that recovers and has backward security |
| US7698744B2 (en) | 2004-12-03 | 2010-04-13 | Whitecell Software Inc. | Secure system for allowing the execution of authorized computer program code |
| JP2006203564A (ja) | 2005-01-20 | 2006-08-03 | Nara Institute Of Science & Technology | マイクロプロセッサ、ノード端末、コンピュータシステム及びプログラム実行証明方法 |
| US20060182124A1 (en) | 2005-02-15 | 2006-08-17 | Sytex, Inc. | Cipher Key Exchange Methodology |
| US8056138B2 (en) | 2005-02-26 | 2011-11-08 | International Business Machines Corporation | System, method, and service for detecting improper manipulation of an application |
| WO2006108181A2 (en) | 2005-04-06 | 2006-10-12 | Broadcom Corporation | Secure conditional access and digital rights management in multimedia processor |
| US7735136B2 (en) * | 2005-04-18 | 2010-06-08 | Vmware, Inc. | 0-touch and 1-touch techniques for improving the availability of computer programs under protection without compromising security |
| US20060282681A1 (en) | 2005-05-27 | 2006-12-14 | Scheidt Edward M | Cryptographic configuration control |
| US7565641B2 (en) * | 2005-06-24 | 2009-07-21 | Microsoft Corporation | Securely providing extensible third-party plug-ins |
| EP1909244A1 (en) * | 2005-07-22 | 2008-04-09 | Matsushita Electric Industrial Co., Ltd. | Execution device |
| JP4116024B2 (ja) * | 2005-07-29 | 2008-07-09 | 株式会社ソニー・コンピュータエンタテインメント | ペリフェラルの使用管理方法、電子システム及びその構成装置 |
| CN101238473B (zh) * | 2005-08-03 | 2011-10-26 | 意法爱立信有限公司 | 保护密钥的安全终端和方法 |
| US20070143223A1 (en) | 2005-12-16 | 2007-06-21 | Microsoft Corporation | Caching information for kernel and boot components |
| CN101346727A (zh) * | 2005-12-27 | 2009-01-14 | 日本电气株式会社 | 程序运行控制方法、其设备以及运行控制程序 |
| JP4795812B2 (ja) | 2006-02-22 | 2011-10-19 | 富士通セミコンダクター株式会社 | セキュアプロセッサ |
| US7770213B2 (en) | 2006-04-17 | 2010-08-03 | Oracle America, Inc. | Method and apparatus for securely forgetting secrets |
| US7424398B2 (en) * | 2006-06-22 | 2008-09-09 | Lexmark International, Inc. | Boot validation system and method |
| JP4767773B2 (ja) | 2006-06-29 | 2011-09-07 | 株式会社日立製作所 | コンピュータシステム及びコンピュータシステムの認証情報変更方法 |
| US20080072070A1 (en) | 2006-08-29 | 2008-03-20 | General Dynamics C4 Systems, Inc. | Secure virtual RAM |
| US7624276B2 (en) | 2006-10-16 | 2009-11-24 | Broadon Communications Corp. | Secure device authentication system and method |
| US8200961B2 (en) | 2006-11-19 | 2012-06-12 | Igware, Inc. | Securing a flash memory block in a secure device system and method |
| US20080148061A1 (en) | 2006-12-19 | 2008-06-19 | Hongxia Jin | Method for effective tamper resistance |
| US20080178256A1 (en) | 2007-01-23 | 2008-07-24 | Brian Perrone | System and method providing policy based control of interaction between client computer users and client computer software programs |
| US7886162B2 (en) | 2007-05-29 | 2011-02-08 | International Business Machines Corporation | Cryptographic secure program overlays |
| US8433927B2 (en) | 2007-05-29 | 2013-04-30 | International Business Machines Corporation | Cryptographically-enabled privileged mode execution |
| US8422674B2 (en) | 2007-05-29 | 2013-04-16 | International Business Machines Corporation | Application-specific secret generation |
| US8332635B2 (en) | 2007-05-29 | 2012-12-11 | International Business Machines Corporation | Updateable secure kernel extensions |
| US8166304B2 (en) | 2007-10-02 | 2012-04-24 | International Business Machines Corporation | Support for multiple security policies on a unified authentication architecture |
-
2007
- 2007-10-02 US US11/866,001 patent/US8332636B2/en not_active Expired - Fee Related
-
2008
- 2008-09-22 CN CN2008801100141A patent/CN101816004B/zh not_active Expired - Fee Related
- 2008-09-22 JP JP2010527399A patent/JP5285075B2/ja not_active Expired - Fee Related
- 2008-09-22 WO PCT/EP2008/062590 patent/WO2009043744A1/en not_active Ceased
- 2008-09-22 KR KR1020107009815A patent/KR101231561B1/ko not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US20090089579A1 (en) | 2009-04-02 |
| WO2009043744A1 (en) | 2009-04-09 |
| KR101231561B1 (ko) | 2013-02-12 |
| KR20100085956A (ko) | 2010-07-29 |
| CN101816004A (zh) | 2010-08-25 |
| JP2010541084A (ja) | 2010-12-24 |
| US8332636B2 (en) | 2012-12-11 |
| CN101816004B (zh) | 2013-11-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5285075B2 (ja) | セキュア・カーネル設計による安全基準の差別化 | |
| US8166304B2 (en) | Support for multiple security policies on a unified authentication architecture | |
| US8332635B2 (en) | Updateable secure kernel extensions | |
| US7886162B2 (en) | Cryptographic secure program overlays | |
| US8422674B2 (en) | Application-specific secret generation | |
| KR100996784B1 (ko) | 공개 키 암호화에 기초한 데이터의 저장 및 검색을 위한, 컴퓨팅 장치에서 구현되는 방법, 시스템 및 복수의 명령어를 저장하는 하나 이상의 컴퓨터 판독가능 매체 | |
| KR101067399B1 (ko) | 대칭 키 암호화에 기초한 데이터의 저장 및 검색을 위한, 컴퓨팅 장치에서 구현되는 방법, 시스템 및 복수의 명령어를 저장하는 하나 이상의 컴퓨터 판독가능 매체 | |
| KR100611687B1 (ko) | 멀티-토큰 실 및 실 해제 | |
| US7055029B2 (en) | Cryptographic system enabling ownership of a secure process | |
| CN101894224B (zh) | 保护客户端平台上的内容 | |
| US8433927B2 (en) | Cryptographically-enabled privileged mode execution | |
| JP4498735B2 (ja) | オペレーティングシステムおよびカスタマイズされた制御プログラムとインタフェースする安全なマシンプラットフォーム | |
| JP5636371B2 (ja) | 汎用コンピューティングデバイスにおけるコード実行制御および再帰的セキュリティプロトコルでのコード実行制御のための方法およびシステム | |
| AU2020244511B2 (en) | Balancing public and personal security needs | |
| US20070168669A1 (en) | Anti-tamper system | |
| US20070168680A1 (en) | Anti-tamper system | |
| AU2016429414B2 (en) | Balancing public and personal security needs | |
| Cryptographic | FIPS 140-2 Security Policy for INTEGRITY Security Services High Assurance Embedded Cryptographic Toolkit Module Version 1.0. 5 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20110805 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20130319 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130326 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130410 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20130507 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20130530 |
|
| LAPS | Cancellation because of no payment of annual fees |