KR20020079349A - 컴퓨터 디바이스 인증을 위한 방법 및 시스템 - Google Patents
컴퓨터 디바이스 인증을 위한 방법 및 시스템 Download PDFInfo
- Publication number
- KR20020079349A KR20020079349A KR1020010074846A KR20010074846A KR20020079349A KR 20020079349 A KR20020079349 A KR 20020079349A KR 1020010074846 A KR1020010074846 A KR 1020010074846A KR 20010074846 A KR20010074846 A KR 20010074846A KR 20020079349 A KR20020079349 A KR 20020079349A
- Authority
- KR
- South Korea
- Prior art keywords
- key
- application
- encryption
- cryptographic
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (25)
- 마스터 암호화 키를 사용하여 마스터 암호화 키로의 액세스를 보호하기 위한 시스템에 있어서,비휘발성 기억장치;시스템 초기화 과정동안 비휘발성 기억장치로부터 마스터 키를 읽고, 마스터 키로부터 유래한 기밀값을 숨은 기억 위치에 쓰고, 시스텀 초기화 과정의 다음 개시시까지 상기 시스템에서 실행되는 어떤 프로그램에 의해 비휘발성 기억장치로의 액세스를 디스에이블하는 시스템 초기화 과정;상기 시스템의 정상 작동 모드에서 실행되는 프로그램에 의해 숨은 기억 위치로의 액세스를 방지하는 수단; 및상기 시스템의 제한된 작동 모드에서 실행되는 프로그램에 의해 숨은 기억 위치로의 액세스를 허용하는 수단;을 포함하는 것을 특징으로 하는 시스템.
- 제 1 항에 있어서, 기밀 데이터는 마스터 키인 것을 특징으로 하는 시스템.
- 제 1 항에 있어서, 기밀 데이터는 마스터 키로부터 유래한 것을 특징으로 하는 시스템.
- 제 3 항에 있어서, 기밀 데이터는 마스터 키로 암호화되어 디스크상에 기억된 암호화 데이터로부터 검색된 제2 키인 것을 특징으로 하는 시스템.
- 제 1 항에 있어서, BIOS ROM내의 소프트웨어가 파워-온 또는 리셋 신호에 응답하여 시작되는 시스템 초기화 과정동안 상기 시스템을 제어하는 것을 특징으로 하는 시스템.
- 제 1 항에 있어서,상기 비휘발성 기억장치는 래치에 의해 제어되는 읽기 및 쓰기 액세스를 구비하는 비휘발성 랜덤 액세스 메모리이고,상기 래치는 파워-온 또는 리셋 이벤트에 응하는 하드웨어 함수로 인하여 시스템 초기화 과정의 개시시에 개방되어, 비휘발성 랜덤 액세스 메모리로의 시스템 액세스를 가능하게 하고,상기 래치는 시스템 초기화 과정동안 폐쇄되어, 시스템 초기화의 다음 개시시까지 비휘발성 랜덤 액세스 메모리로의 시스템 액세스를 거부하는 것을 특징으로 하는 시스템.
- 제 1 항에 있어서,상기 숨은 기억 장치는 상기 시스템의 정상 작동 모드에서 실행되는 어떠한 프로그램에 의해서도 액세스될 수 없는 시스템 관리 랜덤 액세스 메모리이며,상기 제한된 작동 모드는 시스템 관리 랜덤 액세스 메모리로의 액세스가 허용되는 시스템 관리 모드인 것을 특징으로 하는 시스템.
- 제 1 항에 있어서,상기 숨은 기억 장치는 다만 운영 시스템에 의한 액세스에 대해 제한되고, 상기 시스템의 정상 작동 모드에서 실행되는 어떠한 애플리케이션 프로그램에 의해서도 액세스될 수 없으며,상기 제한된 작동 모드는 운영 시스템 소프트웨어에 의한 사용을 위해 보류된 CPU 보호 링에 의해 제어되는 것을 특징으로 하는 시스템.
- 마스터 암호화 키를 기억장치내에 숨기는 시스템에 있어서,비휘발성 기억장치로부터 마스터 키를 읽고, 다음 시스템 리셋시까지 액세스가 다시 가능하지 않도록 비휘발성 기억장치로의 액세스를 폐쇄하고, 마스터 키로부터 유래한 기밀 데이터를 숨은 어드레스 공간에 쓰기하는 파워-온 소프트웨어를 포함하고,상기 시스템의 제한된 작동 모드에서 실행되는 프로그램만이 숨은 어드레스 공간내의 기밀 데이터로 액세스할 수 있는 것을 특징으로 하는 시스템.
- 암호화 키의 가용성을 애플리케이션에 제한함으로써, 애플리케이션에 대한 데이터로의 읽기 및 쓰기 액세스를 제어하는 방법에 있어서,마스터 키;상기 애플리케이션이 액세스하기를 원하는 데이터의 밀봉 또는 개봉된 형식을 보유하는 애플리케이션 컨테이너;암호화 변환을 컴퓨팅하기 위하여 호출 애플리케이션을 구성하는 일부 바이트의 암호화 다이제스트를 수행하는 암호화 게이트키핑 모듈; 및데이터를 밀봉하는 것이 완전성 체크 정보를 언제 추가하는지 또는 애플리케이션이 주어진 애플리케이션 컨테이너내의 데이터를 개봉하도록 허용하는지 여부를 결정하기 위하여 마스터 키, 및 애플리케이션 컨테이너와 암호화 변환을 조사하는 완전성-체크를 포함하는 암호화 프로세싱 모듈;을 포함하는 것을 특징으로 하는 방법.
- 제 10 항에 있어서,암호화 프로세싱 모듈에 의해 수행되고 적어도 마스터 키 및 암호화 변환으로부터 유래하는 키를 사용하여 애플리케이션 컨테이너내의 데이터를 복호화하는 프라이버시 방법을 포함하는 것을 특징으로 하는 방법.
- 제 10 항에 있어서,암호화 프로세싱 모듈에 의해 수행되고 적어도 마스터 키 및 암호화 변환으로부터 유래하는 키를 사용하여 애플리케이션 컨테이너내의 데이터를 암호화하는 프라이버시 방법을 더 포함하는 것을 특징으로 하는 방법.
- 제 12 항에 있어서, 상기 프라이버시 방법은 암호화가 수행되기전에 암호화 변환을 애플리케이션 컨테이너에 추가하는 것을 특징으로 하는 방법.
- 암호화 키의 가용성을 특정 디바이스상의 애플리케이션에 제한함으로써, 애플리케이션에 대한 데이터로의 액세스를 제어하는 방법에 있어서,암호화 프로세싱 모듈에 알려진 키;애플리케이션이 액세스하기를 원하는 데이터의 암호화적으로 밀봉된 형식을 포함하는 애플리케이션 컨테이너 데이터 구조;애플리케이션-레벨 프로그램과 암호화 프로세싱 모듈사이의 모든 액세스를 인터셉터하고, 암호화 서비스 또는 데이터를 액세스하기 위하여 시도하는 프로그램의 실행가능한 인-메모리 이미지의 일부 바이트를 조사하는 수단을 포함하고, 상기 애플리케이션의 암호화 변환을 컴퓨팅하기 위하여 호출 애플리케이션의 인-메모리 이미지의 일부 바이트의 암호화 다이제스트를 컴퓨팅하는 암호화 게이트키핑 함수; 및데이터를 밀봉하는 것이 완전성 체크 정보를 언제 추가하는지 또는 상기 애플리케이션이 주어진 애플리케이션 컨테이너 데이터 구조내의 데이터를 개봉하도록 허용되는지 여부를 결정하기 위하여 마스터 키, 및 애플리케이션 컨테이너 데이터 구조와 암호화 변환을 조사하는 암호화 프로세싱 모듈에 의해 수행되는 완전성-체크 방법;을 포함하는 것을 특징으로 하는 방법.
- 제 14 항에 있어서, 적어도 마스터 키와 암호화 변환으로부터 유래하는 키를 사용하여 애플리케이션 컨테이너 데이터 구조내의 데이터를 암호화 또는 복호화하는 암호화 프로세싱 모듈에 의해 수행되는 프라이버시 방법을 더 포함하고, 데이터가 암호화될 때 암호화가 수행되기전에 암호화 변환을 애플리케이션 컨테이너 데이터 구조에 선택적으로 추가하는 것을 특징으로 하는 방법.
- 제 14 항에 있어서, 상기 암호화 게이트키핑 함수는 상기 애플리케이션에 대하여 허용된 작동을 특정하는 권한 버퍼를 동시에 또는 이전에 부여받고, 요청 작동이 허용된 것을 확인하는 것을 특징으로 하는 방법.
- 제 14 항에 있어서, 상기 완전성-체크 방법은 암호화 변환 및 마스터 키로부터 암호화 변수를 유도하는 단계 또는 애플리케이션의 구성요소에 의해 선택된 암호화 변수, 암호화 변환 및 마스터키로부터 제2 암호화 변수를 유도하는 단계를 포함하고, 이러한 유도된 키는 애플리케이션 컨테이너 데이터 구조내에 기억된 메시지 인증 코드를 체크하기 위하여 사용되는 것을 특징으로 하는 방법.
- 제 14 항에 있어서, 상기 완전성-체크 방법은 마스터 키로부터 유래한 키를 사용하여 상기 애플리케이션 컨테이너 데이터 구조의 일부를 복호화하고, 그 결과값의 일부를 암호화 변환의 일부와 비교하는 단계 및 만약 그 두 부분이 같하면 액세스를 허용하는 단계를 포함하는 것을 특징으로 하는 방법.
- 제 14 항에 있어서, 프라이버시 단계는 암호화 변환, 마스터 키 및 선택적으로 다른 정보로부터 암호화 변수를 유도하는 단계 또는 암호화 변환, 마스터 키, 애플리케이션의 구성요소에 의해 선택된 암호화 변수, 및 선택적으로 다른 정보로부터 제2 암호화 변수를 유도하는 단계를 포함하고, 이러한 유도된 키는 애플리케이션 컨테이너 데이터 구조의 일부를 암호화 또는 복호화하기 위하여 사용되는 것을 특징으로 하는 방법.
- 제 19 항에 있어서, 키 유도는 종속값을 어떠한 순서로 연결시킴으로써 MD5, SHA1 또는 SHA-256 해시 함수의 하나 또는 그 이상의 애플리케이션으로 수행되는 것을 특징으로 하는 방법.
- 제 14 항에 있어서, 상기 암호화 프로세싱 모듈의 일부는 시스템 관리 인터럽트중에 실행되는 것을 특징으로 하는 방법.
- 디바이스 인증기관을 포함하는 또 다른 컴퓨팅 머신의 도움과 함께, 식별된 디바이스상의 식별된 애플리케이션을 인종 서버를 포함하는 또 다른 컴퓨팅 장치에 인증하는 방법은,(a)디바이스 인증기관으로 전송된 결과를 생성하는 디바이스상에서의 시스템 관리 인터럽션(SMI)동안 수행되는 제1 암호화 작동 단계, 및(b)디바이스 인증기관에 의해 발생되고 디바이스에 의해 수신되는 값을 프로세싱하는 디바이스상에서의 SMI 인터럽트동안 수행되는 제2 암호화 작동 단계를 포함하는 가입 프로세스;(a)인증 서버에 전송된 결과를 생성하는 디바이스에서의 SMI 인터럽션동안 수행되는 제1 암호화 작동 단계,(b)인증 서버에 의해 수행되고 인증 방법동안의 사용을 위해 기억된 암호화 변수를 생성하는 제2 암호화 작동 단계, 및(c)인증 서버에 의해 발생되고 디바이스에 의해 수신된 값을 프로세싱하는 디바이스에서의 SMI 인터럽트동안 수행되는 선택적 제3 암호화 작동 단계를 포함하는 등록 프로세스;(a)디바이스상의 SMI 인터럽션동안 수행되고, 인증 서버에 전송된 인증 데이터를 생성하는 제1 암호화 작동 단계, 및(b)인증의 결과를 결정하기 위하여 상기 등록 방법동안 기억된 암호화 변수를 적어도 사용하는 디바이스로부터 수신된 인증 데이터에 근거하여 인증 서버에 의해 수행되는 제2 암호화 작동 단계를 포함하는 인증 프로세스;를 포함하는 것을 특징으로 하는 방법.
- 식별된 디바이스상의 식별된 애플리케이션을 인증하기 위한 방법 또는 식별된 디바이스의 유저를 PASS 서버를 포함하는 또 다른 컴퓨팅 장치에 식별시키기 위한 제2 팩터를 제공하기 위한 방법에 있어서,(a)디바이스상에서 상기 애플리케이션과 암호적으로 관련된 애플리케이션 컨테이너 데이터 구조를 생성하기 위하여 디바이스 인증기관 및 인증 서버와의 통신을 수반하는 가입 방법을 수행하고,(b)인증 서버가 애플리케이션 컨테이너 데이터 구조용 암호화 변수를 기억하며 신용 정보를 기억하는 애플리케이션;(a)상기 신용 정보를 기억하는 애플리케이션 컨테이너 데이터 구조를 개봉하는 단계,(b)상기 신용 정보를 변경하는 단계,(c)상기 애플리케이션 컨테이너 데이터 구조를 재밀봉하는 단계,(d)식별하는 정보 및 적어도 재밀봉된 애플리케이션 컨테이너의 일부를 인증 서버에 전송하는 단계를 포함하는 인증 방법을 수행하는, 식별된 디바이스상에서 실행되는 애플리케이션;을 포함하고,적어도 상기 재밀봉 작동 부분은 상기 애플리케이션의 코드를 실행하는 동일한 CPU에서의 SMI동안 일어나며,인증 서버는,(a)식별하는 정보 및 적어도 애플리케이션 컨테이너 데이터 구조의 일부를 수신하고,(b)애플리케이션 컨테이너 데이터 구조를 개봉하기 위하여, 암호화 변수를 룩업 또는 컴퓨팅하는데 동일 정보를 사용하고,(c)개봉된 애플리케이션 컨테이너가 수용할 수 있는 값을 가지면, 특정 디바이스상의 특정 애플리케이션이 인증된 것으로 간주되고,(d)애플리케이션 컨테이너 데이터 구조와 관련된 키를 기억하는 것을 특징으로 하는 방법.
- 인증, 프라이버시, 완전성, 권한인정, 감사, 또는 디지털 권리 관리를 위한 디바이스상에서 하나 이상의 가상 토큰을 생성하여 이용하는 방법에 있어서,각 종류의 가상 토큰을 위한 애플리케이션;특정한 종류의 각 가상 토큰을 위한 애플리케이션 컨테이너;암호화 프로세싱 구성 요소의 암호화 서비스를 요청하는 호출 애플리케이션의 암호화 변환을 컴퓨팅하는 암호화 게이트키핑 구성요소;를 포함하고,여기서, 상기 암호화 게이트키핑 구성요소는 하나 이상의 수명이 긴 대칭 키를 인지하고,상기 암호화 프로세싱 구성요소는 상기 암호화 게이트키핑 구성요소를 경유하여 액세스되며,상기 암호화 프로세싱 구성요소는 하나 이상의 수명이 긴 대칭 키 및 하나 이상의 수명이 긴 공개키를 인지하고,상기 암호화 프로세싱 구성요소는 애플리케이션 켄테이너 데이터 구조의 암호화 밀봉 및 개봉을 수행하며, 이러한 암호화 작동의 일부는 시스템 관리 인터럽트(SMI)동안 수행되며;여기서, 상기 암호화 프로세싱 구성요소는 암호화 프로세싱 및 암호화 변환값으로 로딩된 공개키를 사용하여, 애플리케이션 코드 또는 정적 데이터의 일부의 디지털 서명을 체킹함으로써 호출 애플리케이션의 완전성을 체크하고,암호화 변환값은 호출 애플리케이션의 인-메모리 이미지 일부의 최근 컴퓨팅된 암호화 해시를 포함하고,상기 암호화 게이트키핑 및 암호화 프로세싱 구성요소는(a)마스터 키와 암호화 변환으로부터 애플리케이션 컨테이너 데이터 구조를 개봉하기 위한 키를 유도하고,(b)애플리케이션 컨테이너 데이터 구조상의 메시지 인증 코드를 체크하기 위하여 상기 유도된 키를 사용하며, 상기 메시지 인증 코드가 정확하면 에러를 리턴하고,(c)애플리케이션 컨테이너 데이터 구조내의 데이터를 복호화하기 위하여 상기 유도 키를 사용하며, 그것을 상기 애플리케이션으로 리턴하는 것을 특징으로 하는 방법.
- 비밀키와 디바이스와 관련된 애플리케이션을 안전하게 연결시키는 방법에 있어서,상기 디바이스와 관련된 대칭 키에 의해 보증된 비밀 키를 포함하는 애플리케이션 컨테이너를 생성하는 단계를 포함하는 것을 특징으로 하는 방법.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/829,074 US20030037237A1 (en) | 2001-04-09 | 2001-04-09 | Systems and methods for computer device authentication |
| US09/829,074 | 2001-04-09 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20020079349A true KR20020079349A (ko) | 2002-10-19 |
| KR100879907B1 KR100879907B1 (ko) | 2009-01-21 |
Family
ID=25253451
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020010074846A Expired - Fee Related KR100879907B1 (ko) | 2001-04-09 | 2001-11-29 | 컴퓨팅 디바이스의 보안을 위한 방법 및 시스템 |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US20030037237A1 (ko) |
| JP (1) | JP2002312242A (ko) |
| KR (1) | KR100879907B1 (ko) |
| CN (2) | CN101114326A (ko) |
| TW (1) | TW589569B (ko) |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030087873A (ko) * | 2002-05-10 | 2003-11-15 | 주식회사 마이엔진 | 컴퓨팅 장치의 인증/접근 제어에 사용되는 중요 상수값의보안 방법 및 그를 이용한 인증/접근 제어 방법 |
| KR100767153B1 (ko) * | 2005-09-05 | 2007-10-15 | 캐논 가부시끼가이샤 | 복수의 유저가 동시에 로그인 가능한 정보 처리 장치 및 그제어 방법 |
| KR100843701B1 (ko) * | 2006-11-07 | 2008-07-04 | 소프트캠프(주) | 콜 스택에 기록된 정보를 이용한 에이피아이 확인방법 |
| US8181040B2 (en) | 2003-08-26 | 2012-05-15 | Panasonic Corporation | Program execution device |
| WO2013066016A1 (ko) * | 2011-11-04 | 2013-05-10 | 주식회사 케이티 | 신뢰관계 형성 방법 및 이를 위한 내장 uⅰcc |
| KR20130049726A (ko) * | 2011-11-04 | 2013-05-14 | 주식회사 케이티 | 신뢰관계 형성 방법 및 이를 위한 내장 uⅰcc |
| KR101524387B1 (ko) * | 2010-11-15 | 2015-05-29 | 제말토 에스에이 | 데이터를 휴대용 보안 토큰에 로딩하는 방법 |
| KR20160147903A (ko) * | 2014-04-28 | 2016-12-23 | 에이알엠 아이피 리미티드 | 액세스 제어 및 코드 스케줄링 |
| KR101878682B1 (ko) * | 2011-11-14 | 2018-07-18 | 삼성전자주식회사 | 컨텐츠를 보호하기 위한 방법 및 저장 매체 |
| KR20190007572A (ko) * | 2017-07-12 | 2019-01-23 | 덕성여자대학교 산학협력단 | 사물인터넷 환경에서의 비밀키 설정 및 상호 기기 인증 방법 |
| CN113904848A (zh) * | 2021-10-09 | 2022-01-07 | 天翼物联科技有限公司 | 物联网终端的证书与密钥下载方法及系统 |
| CN114282250A (zh) * | 2021-12-28 | 2022-04-05 | 航天科工智能运筹与信息安全研究院(武汉)有限公司 | 一种模型容器加密与部署系统 |
| CN115686647A (zh) * | 2022-09-27 | 2023-02-03 | 深圳市智微智能科技股份有限公司 | 一种间接访问spi存储设备的方法、终端及存储介质 |
| CN116055032A (zh) * | 2022-05-11 | 2023-05-02 | 荣耀终端有限公司 | 一种密钥生成方法及电子设备 |
Families Citing this family (426)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
| US7103574B1 (en) * | 1999-03-27 | 2006-09-05 | Microsoft Corporation | Enforcement architecture and method for digital rights management |
| EP1056010A1 (en) | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | Data integrity monitoring in trusted computing entity |
| EP1055990A1 (en) | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | Event logging in a computing platform |
| US6629822B2 (en) * | 2000-11-10 | 2003-10-07 | Parker Hannifin Corporation | Internally supercharged axial piston pump |
| GB2376763B (en) * | 2001-06-19 | 2004-12-15 | Hewlett Packard Co | Demonstrating integrity of a compartment of a compartmented operating system |
| GB2372594B (en) * | 2001-02-23 | 2004-10-06 | Hewlett Packard Co | Trusted computing environment |
| GB2372595A (en) * | 2001-02-23 | 2002-08-28 | Hewlett Packard Co | Method of and apparatus for ascertaining the status of a data processing environment. |
| GB2372592B (en) | 2001-02-23 | 2005-03-30 | Hewlett Packard Co | Information system |
| US7068998B2 (en) * | 2001-04-13 | 2006-06-27 | Northrop Grumman Corp. | Methodology for the detection of intrusion into radio frequency (RF) based networks including tactical data links and the tactical internet |
| US8218555B2 (en) * | 2001-04-24 | 2012-07-10 | Nvidia Corporation | Gigabit ethernet adapter |
| KR100813944B1 (ko) * | 2001-07-11 | 2008-03-14 | 삼성전자주식회사 | 디지털 권리 운영을 수행하기 위하여 휴대용 기기와컴퓨터 사이의 통신을 제어하는 방법 |
| GB2378013A (en) * | 2001-07-27 | 2003-01-29 | Hewlett Packard Co | Trusted computer platform audit system |
| US7181530B1 (en) * | 2001-07-27 | 2007-02-20 | Cisco Technology, Inc. | Rogue AP detection |
| EP1282023A1 (en) * | 2001-07-30 | 2003-02-05 | Hewlett-Packard Company | Trusted platform evaluation |
| GB2378272A (en) * | 2001-07-31 | 2003-02-05 | Hewlett Packard Co | Method and apparatus for locking an application within a trusted environment |
| FR2829645A1 (fr) * | 2001-09-10 | 2003-03-14 | St Microelectronics Sa | Protocole d'authentification a verification d'integrite de memoire |
| US20030053630A1 (en) * | 2001-09-20 | 2003-03-20 | International Business Machines Corporation | Method and system for key usage control in an embedded security system |
| US7844683B2 (en) * | 2001-10-10 | 2010-11-30 | Juniper Networks, Inc. | String matching method and device |
| US20030144970A1 (en) * | 2001-12-10 | 2003-07-31 | Coyne Patrick J. | Project management database and method of managing project related information |
| US8935297B2 (en) * | 2001-12-10 | 2015-01-13 | Patrick J. Coyne | Method and system for the management of professional services project information |
| US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
| US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
| US7565683B1 (en) * | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
| US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
| US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
| US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
| US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
| US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
| US7921288B1 (en) * | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
| US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
| US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
| US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
| US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
| US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
| US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
| US7562232B2 (en) * | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
| US7478418B2 (en) | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
| USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
| US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
| US20030126453A1 (en) * | 2001-12-31 | 2003-07-03 | Glew Andrew F. | Processor supporting execution of an authenticated code instruction |
| CA2369304A1 (en) * | 2002-01-30 | 2003-07-30 | Cloakware Corporation | A protocol to hide cryptographic private keys |
| US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
| US7535913B2 (en) | 2002-03-06 | 2009-05-19 | Nvidia Corporation | Gigabit ethernet adapter supporting the iSCSI and IPSEC protocols |
| US20030177364A1 (en) * | 2002-03-15 | 2003-09-18 | Walsh Robert E. | Method for authenticating users |
| AUPS169002A0 (en) | 2002-04-11 | 2002-05-16 | Tune, Andrew Dominic | An information storage system |
| US7487365B2 (en) * | 2002-04-17 | 2009-02-03 | Microsoft Corporation | Saving and retrieving data based on symmetric key encryption |
| US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
| US7748045B2 (en) * | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
| US20070253430A1 (en) * | 2002-04-23 | 2007-11-01 | Minami John S | Gigabit Ethernet Adapter |
| US7366915B2 (en) * | 2002-04-30 | 2008-04-29 | Microsoft Corporation | Digital license with referral information |
| US8438392B2 (en) * | 2002-06-20 | 2013-05-07 | Krimmeni Technologies, Inc. | Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol |
| US7203844B1 (en) | 2002-06-20 | 2007-04-10 | Oxford William V | Method and system for a recursive security protocol for digital copyright control |
| JP4007873B2 (ja) * | 2002-07-09 | 2007-11-14 | 富士通株式会社 | データ保護プログラムおよびデータ保護方法 |
| US7512810B1 (en) * | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
| US7426382B2 (en) * | 2002-10-09 | 2008-09-16 | Motorola, Inc. | Contact validation and trusted contact updating in mobile wireless communications devices |
| US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
| US7698550B2 (en) * | 2002-11-27 | 2010-04-13 | Microsoft Corporation | Native wi-fi architecture for 802.11 networks |
| US20040117318A1 (en) * | 2002-12-16 | 2004-06-17 | Grawrock David W. | Portable token controlling trusted environment launch |
| US7577838B1 (en) | 2002-12-20 | 2009-08-18 | Alain Rossmann | Hybrid systems for securing digital assets |
| US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
| US20040139198A1 (en) * | 2003-01-15 | 2004-07-15 | Jose Costa-Requena | Method and apparatus for manipulating data with session initiation protocol |
| US7210034B2 (en) * | 2003-01-30 | 2007-04-24 | Intel Corporation | Distributed control of integrity measurement using a trusted fixed token |
| AU2003292428A1 (en) * | 2003-01-31 | 2004-08-23 | Nds Limited | Virtual smart card device, method and system |
| US7379548B2 (en) * | 2003-01-31 | 2008-05-27 | Nds Limited | Virtual smart card device, method and system |
| US7017051B2 (en) * | 2003-02-24 | 2006-03-21 | Bea Systems, Inc. | System and method for enterprise authentication |
| US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
| US7574604B2 (en) * | 2003-03-04 | 2009-08-11 | Sony Corporation | Network device registration |
| US20040257219A1 (en) * | 2003-04-16 | 2004-12-23 | Spiess David M. | Computer security alert system |
| GB0310411D0 (en) * | 2003-05-07 | 2003-06-11 | Koninkl Philips Electronics Nv | Electronic device provided with cryptographic circuit and method of establishing the same |
| US8095783B2 (en) | 2003-05-12 | 2012-01-10 | Phoenix Technologies Ltd. | Media boot loader |
| US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
| US7475254B2 (en) * | 2003-06-19 | 2009-01-06 | International Business Machines Corporation | Method for authenticating software using protected master key |
| US20050010752A1 (en) * | 2003-06-23 | 2005-01-13 | Nokia, Inc. | Method and system for operating system anti-tampering |
| US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
| WO2005006203A1 (ja) * | 2003-07-14 | 2005-01-20 | Sony Corporation | サービス利用方法及び管理方法 |
| US7555558B1 (en) | 2003-08-15 | 2009-06-30 | Michael Frederick Kenrich | Method and system for fault-tolerant transfer of files across a network |
| US7590837B2 (en) * | 2003-08-23 | 2009-09-15 | Softex Incorporated | Electronic device security and tracking system and method |
| US7703140B2 (en) * | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
| US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
| US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
| US20050091494A1 (en) * | 2003-10-23 | 2005-04-28 | Hyser Chris D. | Method and system for providing an external trusted agent for one or more computer systems |
| US8037515B2 (en) | 2003-10-29 | 2011-10-11 | Qualcomm Incorporated | Methods and apparatus for providing application credentials |
| CH716409B1 (de) * | 2003-11-12 | 2021-01-29 | Legic Identsystems Ag | Verfahren zum Einschreiben einer Datenorganisation in Identifikationsmedien und zum Einschreiben und Ausführen von Applikationen in der Datenorganisation. |
| US20050129244A1 (en) * | 2003-12-16 | 2005-06-16 | International Business Machines Corporation | System and method for mitigating denial of service attacks on trusted platform |
| US20050137889A1 (en) * | 2003-12-18 | 2005-06-23 | Wheeler David M. | Remotely binding data to a user device |
| US8176545B1 (en) * | 2003-12-19 | 2012-05-08 | Nvidia Corporation | Integrated policy checking system and method |
| US20050138371A1 (en) * | 2003-12-19 | 2005-06-23 | Pss Systems, Inc. | Method and system for distribution of notifications in file security systems |
| US7702909B2 (en) * | 2003-12-22 | 2010-04-20 | Klimenty Vainstein | Method and system for validating timestamps |
| US20050182971A1 (en) * | 2004-02-12 | 2005-08-18 | Ong Peng T. | Multi-purpose user authentication device |
| US20050182925A1 (en) * | 2004-02-12 | 2005-08-18 | Yoshihiro Tsukamura | Multi-mode token |
| US7802085B2 (en) * | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
| US20050232580A1 (en) * | 2004-03-11 | 2005-10-20 | Interdigital Technology Corporation | Control of device operation within an area |
| KR100636906B1 (ko) * | 2004-03-22 | 2006-10-19 | 엘지전자 주식회사 | 미디 재생 장치 그 방법 |
| US20050213768A1 (en) * | 2004-03-24 | 2005-09-29 | Durham David M | Shared cryptographic key in networks with an embedded agent |
| US7653727B2 (en) * | 2004-03-24 | 2010-01-26 | Intel Corporation | Cooperative embedded agents |
| US8539608B1 (en) * | 2004-03-25 | 2013-09-17 | Verizon Corporate Services Group Inc. | Integrity checking at high data rates |
| US9003548B2 (en) | 2004-04-13 | 2015-04-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
| US7330981B2 (en) * | 2004-04-23 | 2008-02-12 | Microsoft Corporation | File locker and mechanisms for providing and using same |
| US20060242406A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
| US7765600B2 (en) * | 2004-05-04 | 2010-07-27 | General Instrument Corporation | Methods and apparatuses for authorizing features of a computer program for use with a product |
| DE102004024648A1 (de) * | 2004-05-18 | 2005-12-22 | Siemens Ag | Verfahren zur Authentifizierung einer Kommunikationseinheit |
| US7526792B2 (en) * | 2004-06-09 | 2009-04-28 | Intel Corporation | Integration of policy compliance enforcement and device authentication |
| US7774824B2 (en) * | 2004-06-09 | 2010-08-10 | Intel Corporation | Multifactor device authentication |
| US7475431B2 (en) * | 2004-06-10 | 2009-01-06 | International Business Machines Corporation | Using security levels to improve permission checking performance and manageability |
| US20060005031A1 (en) * | 2004-06-15 | 2006-01-05 | Apostolopoulos John G | Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content |
| US20050289311A1 (en) | 2004-06-29 | 2005-12-29 | David Durham | System and method for secure inter-platform and intra-platform communications |
| US20060005015A1 (en) * | 2004-06-30 | 2006-01-05 | David Durham | System and method for secure inter-platform and intra-platform communications |
| US7571329B2 (en) * | 2004-07-14 | 2009-08-04 | Intel Corporation | Method of storing unique constant values |
| US7697691B2 (en) * | 2004-07-14 | 2010-04-13 | Intel Corporation | Method of delivering Direct Proof private keys to devices using an on-line service |
| US7792303B2 (en) * | 2004-07-14 | 2010-09-07 | Intel Corporation | Method of delivering direct proof private keys to devices using a distribution CD |
| US7693286B2 (en) * | 2004-07-14 | 2010-04-06 | Intel Corporation | Method of delivering direct proof private keys in signed groups to devices using a distribution CD |
| US7707427B1 (en) * | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
| US8661420B2 (en) * | 2004-08-03 | 2014-02-25 | Oracle International Corporation | System and method for runtime interface versioning |
| KR101328618B1 (ko) | 2004-08-12 | 2013-11-13 | 씨엠엘에이 엘엘씨 | 보안성을 향상시키는 순열 데이터 변환 |
| US7577250B2 (en) * | 2004-08-12 | 2009-08-18 | Cmla, Llc | Key derivation functions to enhance security |
| US7664109B2 (en) * | 2004-09-03 | 2010-02-16 | Microsoft Corporation | System and method for distributed streaming of scalable media |
| US7711952B2 (en) * | 2004-09-13 | 2010-05-04 | Coretrace Corporation | Method and system for license management |
| US7561515B2 (en) * | 2004-09-27 | 2009-07-14 | Intel Corporation | Role-based network traffic-flow rate control |
| JP4411173B2 (ja) * | 2004-09-30 | 2010-02-10 | 富士通株式会社 | コンピュータシステムの管理方法およびコンピュータ管理システムおよびコンピュータ管理プログラム |
| US8347078B2 (en) * | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
| US20060089917A1 (en) * | 2004-10-22 | 2006-04-27 | Microsoft Corporation | License synchronization |
| US7594269B2 (en) * | 2004-10-29 | 2009-09-22 | Intel Corporation | Platform-based identification of host software circumvention |
| US7502928B2 (en) * | 2004-11-12 | 2009-03-10 | Sony Computer Entertainment Inc. | Methods and apparatus for secure data processing and transmission |
| US8176564B2 (en) * | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
| US8464348B2 (en) * | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
| US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
| US20060107323A1 (en) * | 2004-11-16 | 2006-05-18 | Mclean Ivan H | System and method for using a dynamic credential to identify a cloned device |
| US20060137018A1 (en) * | 2004-11-29 | 2006-06-22 | Interdigital Technology Corporation | Method and apparatus to provide secured surveillance data to authorized entities |
| US8924728B2 (en) * | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
| US7457960B2 (en) * | 2004-11-30 | 2008-11-25 | Analog Devices, Inc. | Programmable processor supporting secure mode |
| US20060227640A1 (en) * | 2004-12-06 | 2006-10-12 | Interdigital Technology Corporation | Sensing device with activation and sensing alert functions |
| US7574220B2 (en) * | 2004-12-06 | 2009-08-11 | Interdigital Technology Corporation | Method and apparatus for alerting a target that it is subject to sensing and restricting access to sensed content associated with the target |
| TW200730836A (en) * | 2004-12-06 | 2007-08-16 | Interdigital Tech Corp | Method and apparatus for detecting portable electronic device functionality |
| US7818585B2 (en) * | 2004-12-22 | 2010-10-19 | Sap Aktiengesellschaft | Secure license management |
| US7895124B2 (en) * | 2004-12-23 | 2011-02-22 | International Business Machines Corporation | Method for protecting sensitive data during execution |
| US7480761B2 (en) * | 2005-01-10 | 2009-01-20 | Microsoft Corporation | System and methods for an overlay disk and cache using portable flash memory |
| US7770205B2 (en) * | 2005-01-19 | 2010-08-03 | Microsoft Corporation | Binding a device to a computer |
| US7600256B2 (en) * | 2005-02-04 | 2009-10-06 | Microsoft Corporation | Security critical data containers |
| MX2007009705A (es) * | 2005-02-11 | 2007-10-04 | Nokia Corp | Metodo y aparato para proporcionar procedimientos de carga inicial en una red de comunicacion. |
| US20060198515A1 (en) * | 2005-03-03 | 2006-09-07 | Seagate Technology Llc | Secure disc drive electronics implementation |
| US8086853B2 (en) * | 2005-03-18 | 2011-12-27 | Microsoft Corporation | Automatic centralized authentication challenge response generation |
| US7890634B2 (en) | 2005-03-18 | 2011-02-15 | Microsoft Corporation | Scalable session management |
| US20060218649A1 (en) * | 2005-03-22 | 2006-09-28 | Brickell Ernie F | Method for conditional disclosure of identity information |
| WO2006100522A1 (en) | 2005-03-22 | 2006-09-28 | Hewlett-Packard Development Company, L.P. | Methods, devices and data structures for trusted data |
| US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
| US7779462B2 (en) * | 2005-04-11 | 2010-08-17 | Microsoft Corporation | Switching an application, user and security context based on device orientation |
| US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
| US7469362B2 (en) * | 2005-04-15 | 2008-12-23 | Microsoft Corporation | Using a call stack hash to record the state of a process |
| KR101265887B1 (ko) * | 2005-04-22 | 2013-05-20 | 마이크로소프트 코포레이션 | 보호 컴퓨팅 환경을 제공하는 방법 및 장치 내에 보호 환경을 설정하는 방법 |
| US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
| US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
| US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
| CN100358050C (zh) * | 2005-05-25 | 2007-12-26 | 深圳兆日技术有限公司 | 一种防止存储器攻击的隐藏rom的方法 |
| US8353046B2 (en) * | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
| CA2510366C (en) * | 2005-06-14 | 2013-02-26 | Certicom Corp. | System and method for remote device registration |
| US8639946B2 (en) * | 2005-06-24 | 2014-01-28 | Sigmatel, Inc. | System and method of using a protected non-volatile memory |
| US7614082B2 (en) | 2005-06-29 | 2009-11-03 | Research In Motion Limited | System and method for privilege management and revocation |
| US7953980B2 (en) | 2005-06-30 | 2011-05-31 | Intel Corporation | Signed manifest for run-time verification of software program identity and integrity |
| US20070006307A1 (en) * | 2005-06-30 | 2007-01-04 | Hahn Scott D | Systems, apparatuses and methods for a host software presence check from an isolated partition |
| US7669242B2 (en) * | 2005-06-30 | 2010-02-23 | Intel Corporation | Agent presence monitor configured to execute in a secure environment |
| US8839450B2 (en) | 2007-08-02 | 2014-09-16 | Intel Corporation | Secure vault service for software components within an execution environment |
| US8677504B2 (en) | 2005-07-14 | 2014-03-18 | Qualcomm Incorporated | Method and apparatus for encrypting/decrypting multimedia content to allow random access |
| KR100736047B1 (ko) * | 2005-07-28 | 2007-07-06 | 삼성전자주식회사 | 무선 네트워크 장치 및 이를 이용한 인증 방법 |
| US20070028291A1 (en) * | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Parametric content control in a network security system |
| US8984636B2 (en) * | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
| US8272058B2 (en) * | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
| US7895651B2 (en) * | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
| US8966284B2 (en) * | 2005-09-14 | 2015-02-24 | Sandisk Technologies Inc. | Hardware driver integrity check of memory card controller firmware |
| US7748037B2 (en) * | 2005-09-22 | 2010-06-29 | Intel Corporation | Validating a memory type modification attempt |
| US20070067590A1 (en) * | 2005-09-22 | 2007-03-22 | Uday Savagaonkar | Providing protected access to critical memory regions |
| US8239682B2 (en) | 2005-09-28 | 2012-08-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
| US20070097934A1 (en) * | 2005-11-03 | 2007-05-03 | Jesse Walker | Method and system of secured direct link set-up (DLS) for wireless networks |
| EP2631679B1 (en) * | 2005-11-10 | 2014-07-09 | Halliburton Energy Services, Inc. | Displaced electrode amplifier |
| US7925801B2 (en) * | 2006-01-17 | 2011-04-12 | International Business Machines Corporation | Method and system for protection and security of IO devices using credentials |
| US7624283B2 (en) * | 2006-02-13 | 2009-11-24 | International Business Machines Corporation | Protocol for trusted platform module recovery through context checkpointing |
| US8214296B2 (en) * | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
| US8473754B2 (en) | 2006-02-22 | 2013-06-25 | Virginia Tech Intellectual Properties, Inc. | Hardware-facilitated secure software execution environment |
| EP1993243B1 (en) * | 2006-03-16 | 2012-06-06 | Panasonic Corporation | Terminal |
| US7779252B2 (en) * | 2006-03-21 | 2010-08-17 | Harris Corporation | Computer architecture for a handheld electronic device with a shared human-machine interface |
| US8014530B2 (en) | 2006-03-22 | 2011-09-06 | Intel Corporation | Method and apparatus for authenticated, recoverable key distribution with no database secrets |
| US8127145B2 (en) * | 2006-03-23 | 2012-02-28 | Harris Corporation | Computer architecture for an electronic device providing a secure file system |
| US8060744B2 (en) * | 2006-03-23 | 2011-11-15 | Harris Corporation | Computer architecture for an electronic device providing single-level secure access to multi-level secure file system |
| US8041947B2 (en) * | 2006-03-23 | 2011-10-18 | Harris Corporation | Computer architecture for an electronic device providing SLS access to MLS file system with trusted loading and protection of program execution memory |
| US20070226150A1 (en) * | 2006-03-27 | 2007-09-27 | Brent Pietrzak | Distribution of digital licenses and software via license tokens |
| US9313248B2 (en) | 2006-04-13 | 2016-04-12 | Johnny Stuart Epstein | Method and apparatus for delivering encoded content |
| DE602006014801D1 (de) * | 2006-04-24 | 2010-07-22 | Ericsson Telefon Ab L M | Prüfung der Berechtigung der Installation einer Softwareversion |
| FI20065288A7 (fi) * | 2006-05-03 | 2007-11-04 | Emillion Oy | Autentikointi |
| US8032761B2 (en) | 2006-05-09 | 2011-10-04 | Broadcom Corporation | Method and system for memory attack protection to achieve a secure interface |
| US8560829B2 (en) * | 2006-05-09 | 2013-10-15 | Broadcom Corporation | Method and system for command interface protection to achieve a secure interface |
| US8285988B2 (en) | 2006-05-09 | 2012-10-09 | Broadcom Corporation | Method and system for command authentication to achieve a secure interface |
| US7979714B2 (en) * | 2006-06-02 | 2011-07-12 | Harris Corporation | Authentication and access control device |
| US8826023B1 (en) * | 2006-06-30 | 2014-09-02 | Symantec Operating Corporation | System and method for securing access to hash-based storage systems |
| JP5047291B2 (ja) * | 2006-09-06 | 2012-10-10 | エスエスエルネクスト インコーポレイテッド | インターネットユーザに対して認証サービスを提供するための方法およびシステム |
| JP5186648B2 (ja) * | 2006-09-27 | 2013-04-17 | セキュアオース コーポレイション | 安全なオンライン取引を容易にするシステム及び方法 |
| US8127135B2 (en) * | 2006-09-28 | 2012-02-28 | Hewlett-Packard Development Company, L.P. | Changing of shared encryption key |
| US7882318B2 (en) * | 2006-09-29 | 2011-02-01 | Intel Corporation | Tamper protection of software agents operating in a vitual technology environment methods and apparatuses |
| US7802050B2 (en) * | 2006-09-29 | 2010-09-21 | Intel Corporation | Monitoring a target agent execution pattern on a VT-enabled system |
| US8099789B2 (en) * | 2006-09-29 | 2012-01-17 | Lenovo (Singapore) Pte. Ltd. | Apparatus and method for enabling applications on a security processor |
| US8245284B2 (en) * | 2006-10-05 | 2012-08-14 | Microsoft Corporation | Extensible network discovery |
| US8190918B2 (en) * | 2006-11-13 | 2012-05-29 | Disney Enterprises, Inc. | Interoperable digital rights management |
| US20080148046A1 (en) * | 2006-12-07 | 2008-06-19 | Bryan Glancey | Real-Time Checking of Online Digital Certificates |
| US8370261B2 (en) * | 2007-01-10 | 2013-02-05 | Amnon Nissim | System and a method for access management and billing |
| EP2122900A4 (en) | 2007-01-22 | 2014-07-23 | Spyrus Inc | PORTABLE DATA ENCRYPTION DEVICE WITH CONFIGURABLE SAFETY FUNCTIONS AND METHOD FOR FILING ENCRYPTION |
| EP2108145A4 (en) * | 2007-01-26 | 2011-12-07 | Safenet Inc | PROTECTING CONFIDENTIAL INFORMATION IN AN INVALIDATE RECIPIENT |
| US8254579B1 (en) * | 2007-01-31 | 2012-08-28 | Hewlett-Packard Development Company, L.P. | Cryptographic key distribution using a trusted computing platform |
| US7831051B2 (en) * | 2007-03-13 | 2010-11-09 | Aladdin Europe Gmbh | Secure communication between a hardware device and a computer |
| TWI402715B (zh) * | 2007-03-23 | 2013-07-21 | Via Tech Inc | 應用程式保護系統及方法 |
| US8457317B2 (en) | 2007-05-07 | 2013-06-04 | Hitachi Data Systems Corporation | Method for data privacy in a fixed content distributed data storage |
| JP5496880B2 (ja) * | 2007-05-22 | 2014-05-21 | イルデト・コーポレート・ビー・ヴイ | データセキュリティ |
| CA2590387A1 (en) * | 2007-05-29 | 2008-11-29 | Sal Khan | A system and method for creating a virtual private network (vpn) over a computer network using multi-layered permissions-based access control |
| KR101495535B1 (ko) * | 2007-06-22 | 2015-02-25 | 삼성전자주식회사 | 컨텐츠 디바이스의 폐기 여부를 확인하여 데이터를전송하는 전송 방법과 시스템, 데이터 서버 |
| US7657722B1 (en) * | 2007-06-30 | 2010-02-02 | Cirrus Logic, Inc. | Method and apparatus for automatically securing non-volatile (NV) storage in an integrated circuit |
| US8073139B2 (en) * | 2007-07-17 | 2011-12-06 | Certicom Corp. | Method of compressing a cryptographic value |
| WO2009014971A1 (en) * | 2007-07-20 | 2009-01-29 | Bigfoot Networks, Inc. | Client authentication device and methods thereof |
| US8769291B2 (en) * | 2007-07-23 | 2014-07-01 | Red Hat, Inc. | Certificate generation for a network appliance |
| CN100454324C (zh) * | 2007-09-21 | 2009-01-21 | 武汉大学 | 一种可信机制上的嵌入式平台引导方法 |
| EP2204008B1 (en) * | 2007-10-16 | 2019-03-27 | Nokia Technologies Oy | Credential provisioning |
| US8099718B2 (en) | 2007-11-13 | 2012-01-17 | Intel Corporation | Method and system for whitelisting software components |
| US8621027B2 (en) | 2007-11-16 | 2013-12-31 | Red Hat, Inc. | Automatically providing identity information for a network appliance |
| US8191123B2 (en) * | 2007-11-27 | 2012-05-29 | Red Hat, Inc. | Provisioning a network appliance |
| US8191122B2 (en) * | 2007-11-27 | 2012-05-29 | Red Hat, Inc. | Provisioning a network appliance |
| US8532303B2 (en) | 2007-12-14 | 2013-09-10 | Intel Corporation | Symmetric key distribution framework for the internet |
| US8474037B2 (en) | 2008-01-07 | 2013-06-25 | Intel Corporation | Stateless attestation system |
| US8266707B2 (en) | 2008-02-28 | 2012-09-11 | Intel Corporation | Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content |
| US8855318B1 (en) * | 2008-04-02 | 2014-10-07 | Cisco Technology, Inc. | Master key generation and distribution for storage area network devices |
| US8352740B2 (en) * | 2008-05-23 | 2013-01-08 | Microsoft Corporation | Secure execution environment on external device |
| US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| US20100031316A1 (en) * | 2008-07-30 | 2010-02-04 | International Business Machines Corporation | System access log monitoring and reporting system |
| US20100106977A1 (en) * | 2008-10-24 | 2010-04-29 | Jan Patrik Persson | Method and Apparatus for Secure Software Platform Access |
| US8510352B2 (en) * | 2008-10-24 | 2013-08-13 | Microsoft Corporation | Virtualized boot block with discovery volume |
| US8661056B1 (en) * | 2008-11-03 | 2014-02-25 | Salesforce.Com, Inc. | System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service |
| US20100153709A1 (en) * | 2008-12-10 | 2010-06-17 | Qualcomm Incorporated | Trust Establishment From Forward Link Only To Non-Forward Link Only Devices |
| US8364601B2 (en) * | 2008-12-31 | 2013-01-29 | Intel Corporation | Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain |
| US8768843B2 (en) * | 2009-01-15 | 2014-07-01 | Igt | EGM authentication mechanism using multiple key pairs at the BIOS with PKI |
| US8417969B2 (en) * | 2009-02-19 | 2013-04-09 | Microsoft Corporation | Storage volume protection supporting legacy systems |
| US8073886B2 (en) | 2009-02-20 | 2011-12-06 | Microsoft Corporation | Non-privileged access to data independent of filesystem implementation |
| US9037844B2 (en) | 2009-02-27 | 2015-05-19 | Itron, Inc. | System and method for securely communicating with electronic meters |
| US9588803B2 (en) | 2009-05-11 | 2017-03-07 | Microsoft Technology Licensing, Llc | Executing native-code applications in a browser |
| TWI401583B (zh) * | 2009-08-06 | 2013-07-11 | Phison Electronics Corp | 資料擾亂/解擾亂與資料處理方法及其控制器與儲存系統 |
| GB201000288D0 (en) * | 2010-01-11 | 2010-02-24 | Scentrics Information Security | System and method of enforcing a computer policy |
| US8924733B2 (en) * | 2010-06-14 | 2014-12-30 | International Business Machines Corporation | Enabling access to removable hard disk drives |
| US8874896B2 (en) * | 2010-06-18 | 2014-10-28 | Intertrust Technologies Corporation | Secure processing systems and methods |
| US9444620B1 (en) * | 2010-06-24 | 2016-09-13 | F5 Networks, Inc. | Methods for binding a session identifier to machine-specific identifiers and systems thereof |
| CN102436559B (zh) * | 2010-09-29 | 2016-06-01 | 联想(北京)有限公司 | 一种状态切换方法及系统 |
| JP2012084071A (ja) | 2010-10-14 | 2012-04-26 | Toshiba Corp | デジタルコンテンツの保護方法、復号方法、再生装置、記憶媒体、暗号装置 |
| US20120124659A1 (en) | 2010-11-17 | 2012-05-17 | Michael Craft | System and Method for Providing Diverse Secure Data Communication Permissions to Trusted Applications on a Portable Communication Device |
| US8776190B1 (en) * | 2010-11-29 | 2014-07-08 | Amazon Technologies, Inc. | Multifactor authentication for programmatic interfaces |
| US8943570B1 (en) * | 2010-12-02 | 2015-01-27 | Cellco Partnership | Techniques for providing enhanced network security |
| US11063920B2 (en) | 2011-02-03 | 2021-07-13 | mSignia, Inc. | Cryptographic security functions based on anticipated changes in dynamic minutiae |
| US8817984B2 (en) | 2011-02-03 | 2014-08-26 | mSignia, Inc. | Cryptographic security functions based on anticipated changes in dynamic minutiae |
| US9251337B2 (en) | 2011-04-27 | 2016-02-02 | International Business Machines Corporation | Scalable, highly available, dynamically reconfigurable cryptographic provider with quality-of-service control built from commodity backend providers |
| US9495183B2 (en) | 2011-05-16 | 2016-11-15 | Microsoft Technology Licensing, Llc | Instruction set emulation for guest operating systems |
| US20120303533A1 (en) * | 2011-05-26 | 2012-11-29 | Michael Collins Pinkus | System and method for securing, distributing and enforcing for-hire vehicle operating parameters |
| US9213829B2 (en) * | 2011-07-12 | 2015-12-15 | Hewlett-Packard Development Company, L.P. | Computing device including a port and a guest domain |
| US8949813B2 (en) * | 2011-07-29 | 2015-02-03 | Dell Products Lp | Systems and methods for facilitating activation of operating systems |
| US8661527B2 (en) | 2011-08-31 | 2014-02-25 | Kabushiki Kaisha Toshiba | Authenticator, authenticatee and authentication method |
| US20130060721A1 (en) | 2011-09-02 | 2013-03-07 | Frias Transportation Infrastructure, Llc | Systems and methods for pairing of for-hire vehicle meters and medallions |
| US9037852B2 (en) | 2011-09-02 | 2015-05-19 | Ivsc Ip Llc | System and method for independent control of for-hire vehicles |
| US9118686B2 (en) | 2011-09-06 | 2015-08-25 | Microsoft Technology Licensing, Llc | Per process networking capabilities |
| US8990561B2 (en) | 2011-09-09 | 2015-03-24 | Microsoft Technology Licensing, Llc | Pervasive package identifiers |
| US9773102B2 (en) | 2011-09-09 | 2017-09-26 | Microsoft Technology Licensing, Llc | Selective file access for applications |
| US9800688B2 (en) | 2011-09-12 | 2017-10-24 | Microsoft Technology Licensing, Llc | Platform-enabled proximity service |
| EP2777212B1 (en) * | 2011-11-11 | 2018-07-18 | Soprano Design Limited | Secure messaging |
| JP5275432B2 (ja) | 2011-11-11 | 2013-08-28 | 株式会社東芝 | ストレージメディア、ホスト装置、メモリ装置、及びシステム |
| US8953790B2 (en) * | 2011-11-21 | 2015-02-10 | Broadcom Corporation | Secure generation of a device root key in the field |
| JP5100884B1 (ja) | 2011-12-02 | 2012-12-19 | 株式会社東芝 | メモリ装置 |
| JP5112555B1 (ja) | 2011-12-02 | 2013-01-09 | 株式会社東芝 | メモリカード、ストレージメディア、及びコントローラ |
| JP5204290B1 (ja) * | 2011-12-02 | 2013-06-05 | 株式会社東芝 | ホスト装置、システム、及び装置 |
| JP5204291B1 (ja) | 2011-12-02 | 2013-06-05 | 株式会社東芝 | ホスト装置、装置、システム |
| US9413538B2 (en) | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
| US9389933B2 (en) | 2011-12-12 | 2016-07-12 | Microsoft Technology Licensing, Llc | Facilitating system service request interactions for hardware-protected applications |
| JP5275482B2 (ja) * | 2012-01-16 | 2013-08-28 | 株式会社東芝 | ストレージメディア、ホスト装置、メモリ装置、及びシステム |
| US9043878B2 (en) * | 2012-03-06 | 2015-05-26 | International Business Machines Corporation | Method and system for multi-tiered distributed security authentication and filtering |
| US9948695B2 (en) * | 2012-03-16 | 2018-04-17 | Alcatel Lucent | Enabling delivery of protected content using unprotected delivery services |
| KR20150011802A (ko) | 2012-03-20 | 2015-02-02 | 크림메니 테크놀로지스, 인크. | 프로세스 작업 세트 격리를 위한 방법 및 시스템 |
| US20130253999A1 (en) | 2012-03-22 | 2013-09-26 | Frias Transportation Infrastructure Llc | Transaction and communication system and method for vendors and promoters |
| US9773099B2 (en) * | 2012-04-06 | 2017-09-26 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
| US9378339B2 (en) * | 2012-04-06 | 2016-06-28 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
| US9590981B2 (en) * | 2012-04-06 | 2017-03-07 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
| US9628473B1 (en) * | 2012-04-06 | 2017-04-18 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
| US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
| US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
| US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
| US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
| US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
| US10084818B1 (en) | 2012-06-07 | 2018-09-25 | Amazon Technologies, Inc. | Flexibly configurable data modification services |
| US10075471B2 (en) | 2012-06-07 | 2018-09-11 | Amazon Technologies, Inc. | Data loss prevention techniques |
| US8995657B2 (en) * | 2012-06-14 | 2015-03-31 | Kabushiki Kaisha Toshiba | Device and method for certifying one's own authenticity |
| US8726024B2 (en) | 2012-06-14 | 2014-05-13 | Kabushiki Kaisha Toshiba | Authentication method |
| US20130336475A1 (en) * | 2012-06-14 | 2013-12-19 | Kabushiki Kaisha Toshiba | Device |
| US8938616B2 (en) * | 2012-06-14 | 2015-01-20 | Kabushiki Kaisha Toshiba | Authentication method |
| US8751814B2 (en) * | 2012-06-14 | 2014-06-10 | Kabushiki Kaisha Toshiba | Device |
| US8989374B2 (en) * | 2012-06-15 | 2015-03-24 | Kabushiki Kaisha Toshiba | Cryptographic device for secure authentication |
| US8762717B2 (en) * | 2012-06-15 | 2014-06-24 | Kabushiki Kaisha Toshiba | Authentication device |
| US8948400B2 (en) * | 2012-06-15 | 2015-02-03 | Kabushiki Kaisha Toshiba | Host device |
| US8898463B2 (en) * | 2012-06-15 | 2014-11-25 | Kabushiki Kaisha Toshiba | Device |
| US9166958B2 (en) * | 2012-07-17 | 2015-10-20 | Texas Instruments Incorporated | ID-based control unit-key fob pairing |
| US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| CN102843681A (zh) * | 2012-08-15 | 2012-12-26 | 腾讯科技(深圳)有限公司 | 信息交互方法和装置 |
| US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
| US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| GB2525742A (en) * | 2012-09-18 | 2015-11-04 | Cryptomathic Ltd | CRM Security core |
| WO2015055972A1 (en) * | 2013-10-14 | 2015-04-23 | Cryptomathic Ltd | Crm security core |
| US9275223B2 (en) * | 2012-10-19 | 2016-03-01 | Mcafee, Inc. | Real-time module protection |
| GB2507497B (en) * | 2012-10-30 | 2015-01-14 | Barclays Bank Plc | Device and method for secure memory access |
| DE102012220990B3 (de) * | 2012-11-16 | 2014-01-23 | Siemens Aktiengesellschaft | Verfahren und Anordnung zur sicheren Kommunikation zwischen Netzwerkeinrichtungen in einem Kommunikationsnetzwerk |
| US10356204B2 (en) | 2012-12-13 | 2019-07-16 | Microsoft Technology Licensing, Llc | Application based hardware identifiers |
| RU2541895C2 (ru) | 2012-12-25 | 2015-02-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ повышения защищенности данных организации путем создания изолированной среды |
| RU2535175C2 (ru) | 2012-12-25 | 2014-12-10 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ обнаружения вредоносного программного обеспечения путем создания изолированной среды |
| US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
| US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
| US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
| US9742559B2 (en) * | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
| US9367697B1 (en) * | 2013-02-12 | 2016-06-14 | Amazon Technologies, Inc. | Data security with a security module |
| US9705674B2 (en) | 2013-02-12 | 2017-07-11 | Amazon Technologies, Inc. | Federated key management |
| US10467422B1 (en) | 2013-02-12 | 2019-11-05 | Amazon Technologies, Inc. | Automatic key rotation |
| US9264228B2 (en) | 2013-02-14 | 2016-02-16 | BBPOS Limited | System and method for a secure display module |
| US9201811B2 (en) | 2013-02-14 | 2015-12-01 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
| US8984294B2 (en) | 2013-02-15 | 2015-03-17 | Kabushiki Kaisha Toshiba | System of authenticating an individual memory device via reading data including prohibited data and readable data |
| US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
| US9443107B2 (en) * | 2013-02-19 | 2016-09-13 | Qualcomm Incorporated | Method for protecting the integrity of a group of memory elements using an aggregate authentication code |
| US9838375B2 (en) * | 2013-02-28 | 2017-12-05 | Microsoft Technology Licensing, Llc | RESTlike API that supports a resilient and scalable distributed application |
| KR102015108B1 (ko) * | 2013-03-12 | 2019-10-22 | 한국전자통신연구원 | 이종 서비스 간 서비스 제공 방법과 사용자 단말 및 웹 서버 |
| US9858247B2 (en) | 2013-05-20 | 2018-01-02 | Microsoft Technology Licensing, Llc | Runtime resolution of content references |
| EP2808818B1 (en) * | 2013-05-29 | 2016-07-13 | Nxp B.V. | Processing system |
| US10181124B2 (en) * | 2013-05-30 | 2019-01-15 | Dell Products, L.P. | Verifying OEM components within an information handling system using original equipment manufacturer (OEM) identifier |
| JP2016513840A (ja) * | 2013-06-05 | 2016-05-16 | ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. | データセキュリティを保護するための方法、サーバ、ホスト、およびシステム |
| US9832171B1 (en) | 2013-06-13 | 2017-11-28 | Amazon Technologies, Inc. | Negotiating a session with a cryptographic domain |
| EP2854066B1 (en) * | 2013-08-21 | 2018-02-28 | Nxp B.V. | System and method for firmware integrity verification using multiple keys and OTP memory |
| CN104463006B (zh) * | 2013-09-25 | 2017-12-29 | 联想(北京)有限公司 | 一种分区访问方法及电子设备 |
| EP2854332A1 (en) * | 2013-09-27 | 2015-04-01 | Gemalto SA | Method for securing over-the-air communication between a mobile application and a gateway |
| US10013563B2 (en) * | 2013-09-30 | 2018-07-03 | Dell Products L.P. | Systems and methods for binding a removable cryptoprocessor to an information handling system |
| GB2519080B (en) | 2013-10-08 | 2021-04-14 | Arm Ip Ltd | Scheduling function calls |
| KR102183852B1 (ko) * | 2013-11-22 | 2020-11-30 | 삼성전자주식회사 | 전자 장치의 무결성 검증을 위한 방법, 저장 매체 및 전자 장치 |
| DE102013019870B4 (de) * | 2013-11-28 | 2019-08-08 | Friedrich Kisters | Authentifizierungs- und/oder Identifikationsverfahren in einem Kommunikationsnetzwerk |
| US20150156200A1 (en) * | 2013-11-29 | 2015-06-04 | Samsung Electronics Co., Ltd. | Apparatus and method for secure and silent confirmation-less presence for public identities |
| GB2512747B (en) | 2014-02-25 | 2015-04-01 | Cambridge Silicon Radio Ltd | Mesh relay |
| GB2515853B (en) | 2014-02-25 | 2015-08-19 | Cambridge Silicon Radio Ltd | Latency mitigation |
| GB2523759A (en) * | 2014-03-04 | 2015-09-09 | Ibm | Method for processing of restricted data |
| CN104951405B (zh) * | 2014-03-28 | 2019-09-06 | 三星电子株式会社 | 存储系统以及对存储系统执行和验证写保护的方法 |
| WO2015175942A1 (en) * | 2014-05-15 | 2015-11-19 | Carnegie Mellon University | Method and apparatus for on-demand i/o channels for secure applications |
| US9397835B1 (en) | 2014-05-21 | 2016-07-19 | Amazon Technologies, Inc. | Web of trust management in a distributed system |
| US9438421B1 (en) | 2014-06-27 | 2016-09-06 | Amazon Technologies, Inc. | Supporting a fixed transaction rate with a variably-backed logical cryptographic key |
| US10032029B2 (en) * | 2014-07-14 | 2018-07-24 | Lenovo (Singapore) Pte. Ltd. | Verifying integrity of backup file in a multiple operating system environment |
| US10606965B2 (en) * | 2014-07-18 | 2020-03-31 | Leviathan Security Group, Inc. | System and method for emulation of unprivileged code in a simulated environment |
| US10185669B2 (en) * | 2014-08-04 | 2019-01-22 | Oracle International Corporation | Secure key derivation functions |
| US9866392B1 (en) | 2014-09-15 | 2018-01-09 | Amazon Technologies, Inc. | Distributed system web of trust provisioning |
| US9626304B2 (en) * | 2014-10-21 | 2017-04-18 | Sandisk Technologies Llc | Storage module, host, and method for securing data with application information |
| US10769315B2 (en) * | 2014-12-01 | 2020-09-08 | T-Mobile Usa, Inc. | Anti-theft recovery tool |
| US10318762B1 (en) * | 2015-03-06 | 2019-06-11 | United Services Automobile Association (Usaa) | Third-party platform for tokenization and detokenization of network packet data |
| US9740492B2 (en) * | 2015-03-23 | 2017-08-22 | Intel Corporation | System management mode trust establishment for OS level drivers |
| US10505905B2 (en) | 2015-03-24 | 2019-12-10 | Global Data Sentinel, Inc. | Transport envelope |
| US9792229B2 (en) * | 2015-03-27 | 2017-10-17 | Intel Corporation | Protecting a memory |
| US10191914B2 (en) | 2015-03-31 | 2019-01-29 | EMC IP Holding Company LLC | De-duplicating distributed file system using cloud-based object store |
| US9916458B2 (en) * | 2015-03-31 | 2018-03-13 | EMC IP Holding Company LLC | Secure cloud-based storage of data shared across file system objects and clients |
| US20160292431A1 (en) * | 2015-04-02 | 2016-10-06 | defend7, Inc. | Management of encryption keys in an application container environment |
| US9954832B2 (en) | 2015-04-24 | 2018-04-24 | Encryptics, Llc | System and method for enhanced data protection |
| US10374802B2 (en) | 2015-04-24 | 2019-08-06 | Red Hat, Inc. | Multi-factor simple password exponential key exchange (SPEKE) authentication |
| US9773432B2 (en) * | 2015-06-27 | 2017-09-26 | Intel Corporation | Lightweight cryptographic engine |
| US9767318B1 (en) * | 2015-08-28 | 2017-09-19 | Frank Dropps | Secure controller systems and associated methods thereof |
| EP3356931B1 (en) * | 2015-09-30 | 2021-06-23 | Hewlett-Packard Development Company, L.P. | Bios runtime verification using external device |
| US10079684B2 (en) * | 2015-10-09 | 2018-09-18 | Intel Corporation | Technologies for end-to-end biometric-based authentication and platform locality assertion |
| GB2545250B (en) * | 2015-12-10 | 2019-06-12 | Advanced Risc Mach Ltd | Devices and method of operation thereof |
| EP3179690A1 (en) * | 2015-12-11 | 2017-06-14 | Gemalto Sa | Mobile device having trusted execution environment |
| US10594491B2 (en) * | 2015-12-24 | 2020-03-17 | Intel Corporation | Cryptographic system memory management |
| JP6700815B2 (ja) * | 2016-01-29 | 2020-05-27 | キヤノン株式会社 | ライセンス管理システム、クライアント装置、アプリケーションプログラム |
| WO2017142559A1 (en) | 2016-02-19 | 2017-08-24 | Hewlett-Packard Development Company, L.P. | Securely writing data to a secure data storage device during runtime |
| JP6656014B2 (ja) * | 2016-02-19 | 2020-03-04 | キヤノン株式会社 | ライセンスシステム、ライセンス管理サーバ、方法、およびプログラム |
| US10341309B1 (en) | 2016-06-13 | 2019-07-02 | Allstate Insurance Company | Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database |
| US10148444B2 (en) | 2016-08-04 | 2018-12-04 | Dell Products L.P. | Systems and methods for storing administrator secrets in management controller-owned cryptoprocessor |
| US11063758B1 (en) | 2016-11-01 | 2021-07-13 | F5 Networks, Inc. | Methods for facilitating cipher selection and devices thereof |
| US10331410B2 (en) * | 2016-11-09 | 2019-06-25 | Google Llc | Hardened random number generator with ring oscillator collapse time random truncation |
| US10387333B2 (en) * | 2017-01-05 | 2019-08-20 | Qualcomm Incorporated | Non-volatile random access memory with gated security access |
| US20180260556A1 (en) * | 2017-03-09 | 2018-09-13 | Meir Avganim | Secure data and password storage and recall system |
| US10749690B2 (en) * | 2017-03-10 | 2020-08-18 | Samsung Electronics Co., Ltd. | System and method for certificate authority for certifying accessors |
| TWI659640B (zh) * | 2017-11-16 | 2019-05-11 | 中華電信股份有限公司 | 結合區塊鏈技術之簽章系統、簽章方法及簽章驗證方法 |
| CN111865586B (zh) | 2017-11-23 | 2023-01-10 | 创新先进技术有限公司 | 一种产品信息的加密方法及装置 |
| US10346608B2 (en) * | 2017-12-12 | 2019-07-09 | John Almeida | Virus immune computer system and method |
| US10990371B2 (en) | 2018-01-17 | 2021-04-27 | Crowdstrike, Inc. | Device driver non-volatile backing-store installation |
| US11423186B2 (en) * | 2018-01-17 | 2022-08-23 | Crowdstrike, Inc. | Verified inter-module communications interface |
| US11301847B1 (en) | 2018-02-15 | 2022-04-12 | Wells Fargo Bank, N.A. | Systems and methods for an authorized identification system |
| JP7530294B2 (ja) * | 2018-03-15 | 2024-08-07 | ティーゼロ・アイピー,エルエルシー | 暗号化された鍵と、鍵を暗号化するために使用される暗号鍵とを、鍵コンポーネントに分割し、鍵コンポーネントのサブセットを備えたアセンブリが、暗号化された鍵を解読できるようにすること |
| CN110532766B (zh) * | 2018-05-25 | 2023-09-08 | 华为技术有限公司 | 一种基于多容器的可信应用程序的处理方法及相关设备 |
| CN109029254B (zh) * | 2018-07-03 | 2020-06-16 | 秦皇岛燕大燕软信息系统有限公司 | 一种基于点云数据处理的列车车厢载货体积及体密度质量检测方法 |
| KR20210066867A (ko) | 2018-10-12 | 2021-06-07 | 티제로 아이피, 엘엘씨 | 암호화된 자산 암호화 키 부분의 서브세트를 사용하여 자산 암호화 키의 어셈블리를 허용하는 암호화된 자산 암호화 키 부분 |
| EP3654578B1 (en) | 2018-11-16 | 2022-04-06 | SafeTech BV | Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information |
| TWI691858B (zh) * | 2018-12-26 | 2020-04-21 | 技嘉科技股份有限公司 | 應用程式的驗證方法、電腦裝置及其主機板 |
| US11349671B2 (en) * | 2019-01-24 | 2022-05-31 | Salesforce.Com, Inc. | Authenticating communication |
| US11218307B1 (en) | 2019-04-24 | 2022-01-04 | Wells Fargo Bank, N.A. | Systems and methods for generation of the last obfuscated secret using a seed |
| CN110163755B (zh) * | 2019-04-30 | 2020-11-24 | 创新先进技术有限公司 | 基于区块链的数据压缩、查询方法及装置和电子设备 |
| CN110177134B (zh) * | 2019-05-10 | 2021-12-07 | 东南大学 | 一种基于多云存储的安全密码管理器及其使用方法 |
| US11240024B2 (en) * | 2019-07-29 | 2022-02-01 | EMC IP Holding Company LLC | Cryptographic key management using key proxies and generational indexes |
| JP2022550983A (ja) | 2019-10-09 | 2022-12-06 | マイクロン テクノロジー,インク. | データ保護スキームを備えるメモリデバイス |
| US11356367B2 (en) * | 2019-11-22 | 2022-06-07 | Red Hat, Inc. | Secure preloading of serverless function sequences |
| CN111159726B (zh) * | 2019-12-10 | 2022-09-13 | 中国电子科技网络信息安全有限公司 | 一种基于uefi环境变量的全盘加解密方法及系统 |
| CN111212048A (zh) * | 2019-12-26 | 2020-05-29 | 北京安码科技有限公司 | https协议实时监控方法、系统、电子设备及存储介质 |
| DE102020001199A1 (de) * | 2020-02-25 | 2021-08-26 | Daimler Ag | Kommunikationsvorrichtung und Verfahren zur kryptografischen Absicherung der Kommunikation |
| US12052347B2 (en) | 2020-02-26 | 2024-07-30 | Tzero Ip, Llc | Secret splitting and metadata storage |
| WO2022025901A1 (en) | 2020-07-30 | 2022-02-03 | Hewlett-Packard Development Company, L.P. | Bios action request for authorized application |
| US12120225B2 (en) * | 2020-09-25 | 2024-10-15 | Renesas Electronics Corporation | Secure key generation and management in open and secure processor environments |
| US11522683B2 (en) | 2020-12-04 | 2022-12-06 | International Business Machines Corporation | Multi-phase protection for data-centric objects |
| US11659005B2 (en) * | 2020-12-16 | 2023-05-23 | Dell Products, L.P. | Systems and methods for self-protecting and self-refreshing workspaces |
| US11171964B1 (en) * | 2020-12-23 | 2021-11-09 | Citrix Systems, Inc. | Authentication using device and user identity |
| CN112948773B (zh) * | 2021-02-07 | 2024-05-24 | 深圳市大梦龙途文化传播有限公司 | 脚本加密与解密方法、终端设备及可读存储介质 |
| JP7612443B2 (ja) * | 2021-02-10 | 2025-01-14 | キヤノン株式会社 | 画像形成装置、その制御方法、およびプログラム |
| US11418331B1 (en) | 2021-02-25 | 2022-08-16 | EMC IP Holding Company LLC | Importing cryptographic keys into key vaults |
| CN113179513B (zh) * | 2021-04-16 | 2022-08-09 | 中国人民解放军国防科技大学 | 基于智能反射面相位辅助的无线信道密钥生成方法和设备 |
| US12267413B2 (en) * | 2021-05-03 | 2025-04-01 | InfoKeyVault Technology Co., Ltd. | Integrated circuit module functioning for information security |
| US11829482B2 (en) * | 2021-06-08 | 2023-11-28 | Dell Products L.P. | Pre-boot authentication for virtual machines using credentials stored in virtual trusted platform modules |
| US11994900B2 (en) * | 2021-07-28 | 2024-05-28 | Dell Products L.P. | System management mode emulation of the real-time clock |
| CN114840231B (zh) * | 2022-04-07 | 2025-02-25 | 赛力斯汽车有限公司 | 一种程序包的验算方法、系统、计算机设备和存储介质 |
| US11695772B1 (en) * | 2022-05-03 | 2023-07-04 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
| US11803432B1 (en) * | 2022-06-13 | 2023-10-31 | Snowflake Inc. | Data clean rooms using defined access |
| TWI829250B (zh) * | 2022-07-19 | 2024-01-11 | 群聯電子股份有限公司 | 簽章驗證方法、記憶體儲存裝置及記憶體控制電路單元 |
| US12235966B2 (en) * | 2022-07-22 | 2025-02-25 | Dell Products, L.P. | Secure motherboard replacement system and method |
| CN115344213B (zh) * | 2022-08-26 | 2025-08-19 | 济南浪潮数据技术有限公司 | 一种避免peering流程数据丢失的方法、装置、终端及介质 |
| CN115603907A (zh) * | 2022-10-13 | 2023-01-13 | 北京三快在线科技有限公司(Cn) | 加密存储数据的方法、装置、设备和存储介质 |
| TWI841124B (zh) * | 2022-12-19 | 2024-05-01 | 新唐科技股份有限公司 | 安全啟動裝置、方法與使用其的電子系統 |
| CN116702171B (zh) * | 2023-06-07 | 2025-03-18 | 四川公用信息产业有限责任公司 | 一种互联网电商平台用户隐私数据加密方法 |
| US20250287015A1 (en) * | 2024-03-11 | 2025-09-11 | Microsoft Technology Licensing, Llc | Video quality estimation with a machine learning model as an operating system service or cloud service |
| CN118573490B (zh) * | 2024-08-05 | 2024-10-01 | 上海景瑞阳实业有限公司 | 基于组合加密算法的通信验证方法、装置及介质 |
| CN119584111A (zh) * | 2025-01-25 | 2025-03-07 | 中国人民解放军军事科学院军事智能研究院 | 一种存储辅助的时敏信息隐蔽通信方法及系统 |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5022077A (en) * | 1989-08-25 | 1991-06-04 | International Business Machines Corp. | Apparatus and method for preventing unauthorized access to BIOS in a personal computer system |
| US5210795A (en) * | 1992-01-10 | 1993-05-11 | Digital Equipment Corporation | Secure user authentication from personal computer |
| US5675649A (en) * | 1995-11-30 | 1997-10-07 | Electronic Data Systems Corporation | Process for cryptographic key generation and safekeeping |
| US6157985A (en) * | 1997-10-16 | 2000-12-05 | Seagate Technology Llc | Single-cycle variable period buffer manager for disk controllers |
| US7174457B1 (en) * | 1999-03-10 | 2007-02-06 | Microsoft Corporation | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party |
| US6327652B1 (en) * | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
| US7194092B1 (en) * | 1998-10-26 | 2007-03-20 | Microsoft Corporation | Key-based secure storage |
| US6775779B1 (en) * | 1999-04-06 | 2004-08-10 | Microsoft Corporation | Hierarchical trusted code for content protection in computers |
| KR20020004128A (ko) * | 2000-07-03 | 2002-01-16 | 김월영 | 하드웨어락에 의한 보안 및 원격관리 시스템에서서버컴퓨터에서 클라이언트 컴퓨터의 하드웨어락에 저장된알고리즘을 제어하는 방법 |
-
2001
- 2001-04-09 US US09/829,074 patent/US20030037237A1/en not_active Abandoned
- 2001-11-20 JP JP2001355353A patent/JP2002312242A/ja active Pending
- 2001-11-23 CN CNA2006101074099A patent/CN101114326A/zh active Pending
- 2001-11-23 CN CNB011454628A patent/CN1273901C/zh not_active Expired - Fee Related
- 2001-11-29 TW TW090129539A patent/TW589569B/zh not_active IP Right Cessation
- 2001-11-29 KR KR1020010074846A patent/KR100879907B1/ko not_active Expired - Fee Related
-
2003
- 2003-01-14 US US10/342,709 patent/US20040039924A1/en not_active Abandoned
Cited By (32)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030087873A (ko) * | 2002-05-10 | 2003-11-15 | 주식회사 마이엔진 | 컴퓨팅 장치의 인증/접근 제어에 사용되는 중요 상수값의보안 방법 및 그를 이용한 인증/접근 제어 방법 |
| US8522053B2 (en) | 2003-08-26 | 2013-08-27 | Panasonic Corporation | Program execution device |
| US9524404B2 (en) | 2003-08-26 | 2016-12-20 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US8181040B2 (en) | 2003-08-26 | 2012-05-15 | Panasonic Corporation | Program execution device |
| US12019789B2 (en) | 2003-08-26 | 2024-06-25 | Panasonic Holdings Corporation | Program execution device |
| US11651113B2 (en) | 2003-08-26 | 2023-05-16 | Panasonic Holdings Corporation | Program execution device |
| US10108821B2 (en) | 2003-08-26 | 2018-10-23 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US8874938B2 (en) | 2003-08-26 | 2014-10-28 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US10318768B2 (en) | 2003-08-26 | 2019-06-11 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US9218485B2 (en) | 2003-08-26 | 2015-12-22 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US10970424B2 (en) | 2003-08-26 | 2021-04-06 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US9811691B2 (en) | 2003-08-26 | 2017-11-07 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| US10607036B2 (en) | 2003-08-26 | 2020-03-31 | Panasonic Intellectual Property Corporation Of America | Program execution device |
| KR100767153B1 (ko) * | 2005-09-05 | 2007-10-15 | 캐논 가부시끼가이샤 | 복수의 유저가 동시에 로그인 가능한 정보 처리 장치 및 그제어 방법 |
| KR100843701B1 (ko) * | 2006-11-07 | 2008-07-04 | 소프트캠프(주) | 콜 스택에 기록된 정보를 이용한 에이피아이 확인방법 |
| KR101524387B1 (ko) * | 2010-11-15 | 2015-05-29 | 제말토 에스에이 | 데이터를 휴대용 보안 토큰에 로딩하는 방법 |
| KR20130049726A (ko) * | 2011-11-04 | 2013-05-14 | 주식회사 케이티 | 신뢰관계 형성 방법 및 이를 위한 내장 uⅰcc |
| KR20190064546A (ko) * | 2011-11-04 | 2019-06-10 | 주식회사 케이티 | 신뢰관계 형성 방법 및 이를 위한 내장 uⅰcc |
| US10462668B2 (en) | 2011-11-04 | 2019-10-29 | Kt Corporation | Method for forming a trust relationship, and embedded UICC therefor |
| US9426654B2 (en) | 2011-11-04 | 2016-08-23 | Kt Corporation | Method for forming a trust relationship, and embedded UICC therefor |
| WO2013066016A1 (ko) * | 2011-11-04 | 2013-05-10 | 주식회사 케이티 | 신뢰관계 형성 방법 및 이를 위한 내장 uⅰcc |
| US10091653B2 (en) | 2011-11-04 | 2018-10-02 | Kt Corporation | Method for forming a trust relationship, and embedded UICC therefor |
| KR101878682B1 (ko) * | 2011-11-14 | 2018-07-18 | 삼성전자주식회사 | 컨텐츠를 보호하기 위한 방법 및 저장 매체 |
| KR20160147903A (ko) * | 2014-04-28 | 2016-12-23 | 에이알엠 아이피 리미티드 | 액세스 제어 및 코드 스케줄링 |
| KR20190007572A (ko) * | 2017-07-12 | 2019-01-23 | 덕성여자대학교 산학협력단 | 사물인터넷 환경에서의 비밀키 설정 및 상호 기기 인증 방법 |
| CN113904848B (zh) * | 2021-10-09 | 2023-08-04 | 天翼物联科技有限公司 | 物联网终端的证书与密钥下载方法及系统 |
| CN113904848A (zh) * | 2021-10-09 | 2022-01-07 | 天翼物联科技有限公司 | 物联网终端的证书与密钥下载方法及系统 |
| CN114282250A (zh) * | 2021-12-28 | 2022-04-05 | 航天科工智能运筹与信息安全研究院(武汉)有限公司 | 一种模型容器加密与部署系统 |
| CN114282250B (zh) * | 2021-12-28 | 2024-04-09 | 航天科工智能运筹与信息安全研究院(武汉)有限公司 | 一种模型容器加密与部署系统 |
| CN116055032A (zh) * | 2022-05-11 | 2023-05-02 | 荣耀终端有限公司 | 一种密钥生成方法及电子设备 |
| CN116055032B (zh) * | 2022-05-11 | 2023-09-22 | 荣耀终端有限公司 | 一种密钥生成方法及电子设备 |
| CN115686647A (zh) * | 2022-09-27 | 2023-02-03 | 深圳市智微智能科技股份有限公司 | 一种间接访问spi存储设备的方法、终端及存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20040039924A1 (en) | 2004-02-26 |
| CN1380610A (zh) | 2002-11-20 |
| TW589569B (en) | 2004-06-01 |
| CN101114326A (zh) | 2008-01-30 |
| JP2002312242A (ja) | 2002-10-25 |
| CN1273901C (zh) | 2006-09-06 |
| KR100879907B1 (ko) | 2009-01-21 |
| US20030037237A1 (en) | 2003-02-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR100879907B1 (ko) | 컴퓨팅 디바이스의 보안을 위한 방법 및 시스템 | |
| Barbosa et al. | Provable security analysis of FIDO2 | |
| CN113014539B (zh) | 一种物联网设备安全保护系统及方法 | |
| KR101067399B1 (ko) | 대칭 키 암호화에 기초한 데이터의 저장 및 검색을 위한, 컴퓨팅 장치에서 구현되는 방법, 시스템 및 복수의 명령어를 저장하는 하나 이상의 컴퓨터 판독가능 매체 | |
| KR100996784B1 (ko) | 공개 키 암호화에 기초한 데이터의 저장 및 검색을 위한, 컴퓨팅 장치에서 구현되는 방법, 시스템 및 복수의 명령어를 저장하는 하나 이상의 컴퓨터 판독가능 매체 | |
| Kostiainen et al. | On-board credentials with open provisioning | |
| US7568114B1 (en) | Secure transaction processor | |
| CN100566243C (zh) | 使用固定令牌和可移动令牌两者的计算设备及其方法 | |
| US20220114249A1 (en) | Systems and methods for secure and fast machine learning inference in a trusted execution environment | |
| US20110191574A1 (en) | Method and apparatus for binding tpm keys to execution entities | |
| KR20170129866A (ko) | 블록 체인을 사용하여 디바이스 무결성의 자동화된 입증 | |
| EP1763721A1 (en) | Systems and methods for performing secure communications between an authorized computing platform and a hardware component | |
| Pecholt et al. | Cocotpm: Trusted platform modules for virtual machines in confidential computing environments | |
| Zhang et al. | Trusttokenf: A generic security framework for mobile two-factor authentication using trustzone | |
| Cooijmans et al. | Secure key storage and secure computation in Android | |
| Barbosa et al. | Rogue key and impersonation attacks on FIDO2: From theory to practice | |
| DiLuoffo et al. | Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security | |
| Bugiel et al. | TruWalletM: Secure web authentication on mobile platforms | |
| Pop et al. | Secure migration of WebAssembly-based mobile agents between secure enclaves | |
| Hao et al. | Trusted block as a service: Towards sensitive applications on the cloud | |
| US20240283664A1 (en) | Authentication with Cloud-Based Secure Enclave | |
| Baghdasaryan et al. | FIDO UAF Authenticator Commands | |
| Sharma | Onboard credentials: Hardware assisted secure storage of credentials | |
| Petraglia | TLS-Monitor: An Intrusion Detection-based Monitoring Tool for countering TLS Attacks | |
| WO2025210819A1 (ja) | 処理装置、処理方法、およびプログラム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0109 | Patent application |
St.27 status event code: A-0-1-A10-A12-nap-PA0109 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| R15-X000 | Change to inventor requested |
St.27 status event code: A-3-3-R10-R15-oth-X000 |
|
| R16-X000 | Change to inventor recorded |
St.27 status event code: A-3-3-R10-R16-oth-X000 |
|
| A201 | Request for examination | ||
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| D13-X000 | Search requested |
St.27 status event code: A-1-2-D10-D13-srh-X000 |
|
| D14-X000 | Search report completed |
St.27 status event code: A-1-2-D10-D14-srh-X000 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| T11-X000 | Administrative time limit extension requested |
St.27 status event code: U-3-3-T10-T11-oth-X000 |
|
| T11-X000 | Administrative time limit extension requested |
St.27 status event code: U-3-3-T10-T11-oth-X000 |
|
| T11-X000 | Administrative time limit extension requested |
St.27 status event code: U-3-3-T10-T11-oth-X000 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| E701 | Decision to grant or registration of patent right | ||
| PE0701 | Decision of registration |
St.27 status event code: A-1-2-D10-D22-exm-PE0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U11-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 4 |
|
| FPAY | Annual fee payment |
Payment date: 20121211 Year of fee payment: 5 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 5 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-5-5-R10-R18-oth-X000 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R11-asn-PN2301 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R14-asn-PN2301 |
|
| FPAY | Annual fee payment |
Payment date: 20131227 Year of fee payment: 6 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 6 |
|
| FPAY | Annual fee payment |
Payment date: 20141226 Year of fee payment: 7 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 7 |
|
| FPAY | Annual fee payment |
Payment date: 20151228 Year of fee payment: 8 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 8 |
|
| LAPS | Lapse due to unpaid annual fee | ||
| PC1903 | Unpaid annual fee |
St.27 status event code: A-4-4-U10-U13-oth-PC1903 Not in force date: 20170116 Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE |
|
| PC1903 | Unpaid annual fee |
St.27 status event code: N-4-6-H10-H13-oth-PC1903 Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE Not in force date: 20170116 |