AU4216997A - Method and apparatus for operating resources under control of a security module or other secure processor - Google Patents
Method and apparatus for operating resources under control of a security module or other secure processorInfo
- Publication number
- AU4216997A AU4216997A AU42169/97A AU4216997A AU4216997A AU 4216997 A AU4216997 A AU 4216997A AU 42169/97 A AU42169/97 A AU 42169/97A AU 4216997 A AU4216997 A AU 4216997A AU 4216997 A AU4216997 A AU 4216997A
- Authority
- AU
- Australia
- Prior art keywords
- under control
- security module
- secure processor
- resources under
- operating resources
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Multi Processors (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB1996/001507 WO1998003903A2 (en) | 1996-07-23 | 1996-07-23 | Method and apparatus for operating resources under control of a security module or other secure processor |
Publications (1)
Publication Number | Publication Date |
---|---|
AU4216997A true AU4216997A (en) | 1998-02-10 |
Family
ID=11004512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU42169/97A Abandoned AU4216997A (en) | 1996-07-23 | 1996-07-23 | Method and apparatus for operating resources under control of a security module or other secure processor |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU4216997A (en) |
WO (1) | WO1998003903A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9922665D0 (en) * | 1999-09-25 | 1999-11-24 | Hewlett Packard Co | A method of enforcing trusted functionality in a full function platform |
WO2013074631A2 (en) * | 2011-11-14 | 2013-05-23 | Vasco Data Security, Inc. | A smart card reader with a secure logging feature |
IT201700050086A1 (en) | 2017-05-09 | 2018-11-09 | St Microelectronics Srl | SAFETY HARDWARE MODULE, ITS PROCESSING SYSTEM, INTEGRATED CIRCUIT, DEVICE AND PROCEDURE |
CN110825534B (en) * | 2019-09-18 | 2023-11-28 | 深圳云盈网络科技有限公司 | Method for realizing inter-module communication MSG command set |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5048085A (en) * | 1989-10-06 | 1991-09-10 | International Business Machines Corporation | Transaction system security method and apparatus |
JPH0821024B2 (en) * | 1989-12-06 | 1996-03-04 | 富士通株式会社 | Command file creation processing method and execution right grant processing method |
CA2078020C (en) * | 1992-09-11 | 2000-12-12 | Rodney G. Denno | Combination pin pad and terminal |
EP0842471A4 (en) * | 1995-07-31 | 2006-11-08 | Hewlett Packard Co | Method and apparatus for operating resources under control of a security module or other secure processor |
-
1996
- 1996-07-23 AU AU42169/97A patent/AU4216997A/en not_active Abandoned
- 1996-07-23 WO PCT/IB1996/001507 patent/WO1998003903A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO1998003903A3 (en) | 1998-04-30 |
WO1998003903A2 (en) | 1998-01-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU7572998A (en) | Gaming device security system: apparatus and method | |
EP0850523B8 (en) | Document authentication system and method | |
AU1905395A (en) | Method and control device for authentication | |
GB2329542B (en) | Security control system and method of operation | |
AU5471398A (en) | Natural language meta-search system and method | |
AU3982797A (en) | Program guide system and method of operation | |
SG43259A1 (en) | System and method for data security | |
AU8398998A (en) | System and method for automatically verifying identity of a subject | |
AU4273497A (en) | Method and system for integrating additional functionality into a login system | |
AU3837595A (en) | Security apparatus and method | |
AU6390196A (en) | Method and apparatus for enhancing performance of a processor | |
AU4667497A (en) | Software release control system and method | |
EP0825511A3 (en) | Method and apparatus for trusted processing | |
GB2303721B (en) | Personal computer having security function,security method therefor,security device installation and detachment methods | |
AU6646298A (en) | Data security system and method | |
GB9523922D0 (en) | Method of authenticating an application program and a system therefor | |
AU4262797A (en) | Method and system for electronic document certification | |
AU9129198A (en) | Method and apparatus for concurrent execution of operating systems | |
AU4503596A (en) | A method and apparatus for arteriotomy closure | |
AU4568299A (en) | Method and apparatus for assessing the security of a computer system | |
AU2019897A (en) | Method, apparatus and system for verification of patterns | |
AU2245397A (en) | Method and system for implementing data transfers | |
AU6850798A (en) | Antivirus system and method | |
AU2651497A (en) | Method and system for transmitting data | |
AU6448896A (en) | Method and apparatus for preventing agglomeration |