CN108475237B - 存储器操作加密 - Google Patents
存储器操作加密 Download PDFInfo
- Publication number
- CN108475237B CN108475237B CN201680078576.7A CN201680078576A CN108475237B CN 108475237 B CN108475237 B CN 108475237B CN 201680078576 A CN201680078576 A CN 201680078576A CN 108475237 B CN108475237 B CN 108475237B
- Authority
- CN
- China
- Prior art keywords
- memory
- interface
- key
- encrypted
- copy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1466—Key-lock mechanism
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/993,455 US10382410B2 (en) | 2016-01-12 | 2016-01-12 | Memory operation encryption |
| US14/993,455 | 2016-01-12 | ||
| PCT/US2016/052839 WO2017123285A1 (en) | 2016-01-12 | 2016-09-21 | Memory operation encryption |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108475237A CN108475237A (zh) | 2018-08-31 |
| CN108475237B true CN108475237B (zh) | 2021-07-13 |
Family
ID=59275977
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201680078576.7A Active CN108475237B (zh) | 2016-01-12 | 2016-09-21 | 存储器操作加密 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US10382410B2 (enExample) |
| EP (1) | EP3403185B1 (enExample) |
| JP (2) | JP2019502211A (enExample) |
| KR (1) | KR102430042B1 (enExample) |
| CN (1) | CN108475237B (enExample) |
| WO (1) | WO2017123285A1 (enExample) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10230762B2 (en) * | 2012-08-31 | 2019-03-12 | Jpmorgan Chase Bank, N.A. | System and method for sharing information in a private ecosystem |
| US10585809B2 (en) | 2016-04-01 | 2020-03-10 | Intel Corporation | Convolutional memory integrity |
| US10198349B2 (en) * | 2016-09-19 | 2019-02-05 | Advanced Micro Devices, Inc. | Programming in-memory accelerators to improve the efficiency of datacenter operations |
| US10642963B2 (en) * | 2016-12-08 | 2020-05-05 | Ati Technologies Ulc | Digital rights management for a GPU |
| US10643006B2 (en) * | 2017-06-14 | 2020-05-05 | International Business Machines Corporation | Semiconductor chip including integrated security circuit |
| KR102411884B1 (ko) * | 2017-09-28 | 2022-06-22 | 삼성전자주식회사 | 전자 장치 및 그의 제어 방법 |
| KR20190075363A (ko) | 2017-12-21 | 2019-07-01 | 삼성전자주식회사 | 반도체 메모리 장치, 이를 포함하는 메모리 시스템 및 메모리 모듈 |
| US10871983B2 (en) * | 2018-05-31 | 2020-12-22 | Intel Corporation | Process-based multi-key total memory encryption |
| SG11202011748WA (en) | 2018-06-06 | 2020-12-30 | Argosoperem Llc | Blockchain structure for an intellectual property exchange including a pointer to an oracle and user interface therefor |
| US11431475B2 (en) * | 2018-06-15 | 2022-08-30 | Dynatrace Llc | Method and system for log data analytics based on SuperMinHash signatures |
| US10922439B2 (en) * | 2018-06-29 | 2021-02-16 | Intel Corporation | Technologies for verifying memory integrity across multiple memory regions |
| US10636030B1 (en) | 2018-11-06 | 2020-04-28 | Capital One Services, Llc | System and method for creating a secure mesh network utilizing the blockchain |
| US10579994B1 (en) * | 2018-11-06 | 2020-03-03 | Capital One Services, Llc | Method for routing to mesh network content utilizing blockchain technology |
| KR102689645B1 (ko) | 2019-01-29 | 2024-07-30 | 삼성전자주식회사 | 해시 솔루션을 위한 반도체 메모리 장치 및 이의 구동방법 |
| US11645043B2 (en) | 2019-02-11 | 2023-05-09 | Dynatrace Llc | Method and system for calculating minwise hash signatures from weighted sets |
| US11163912B2 (en) | 2019-03-25 | 2021-11-02 | Micron Technology, Inc. | Data attestation in memory |
| KR102660388B1 (ko) * | 2019-05-09 | 2024-04-26 | 에스케이하이닉스 주식회사 | 메모리 모듈, 메모리 모듈의 동작 방법, 메모리 시스템 및 메모리 모듈의 동작 방법 |
| CN118606971A (zh) * | 2019-07-15 | 2024-09-06 | 美光科技公司 | 密码密钥管理 |
| US11436342B2 (en) | 2019-12-26 | 2022-09-06 | Intel Corporation | TDX islands with self-contained scope enabling TDX KeyID scaling |
| US11645428B1 (en) | 2020-02-11 | 2023-05-09 | Wells Fargo Bank, N.A. | Quantum phenomenon-based obfuscation of memory |
| US12189792B2 (en) | 2020-09-26 | 2025-01-07 | Intel Corporation | Scalable multi-key memory encryption |
| US11651810B2 (en) * | 2020-12-14 | 2023-05-16 | SK Hynix Inc. | Memory system and memory module including memory chips sharing channel |
| US20210319143A1 (en) * | 2021-06-25 | 2021-10-14 | Intel Corporation | Memory bus link authentication and encryption mechanisms for hardware-based replay protection |
| CN113449347B (zh) * | 2021-09-01 | 2021-12-17 | 飞腾信息技术有限公司 | 微处理器、数据处理方法、电子设备和存储介质 |
| US12147354B2 (en) * | 2022-04-26 | 2024-11-19 | Dell Products, L.P. | Methods and systems for processor agnostic encryption management |
| US20240004801A1 (en) * | 2022-06-29 | 2024-01-04 | Advanced Micro Devices, Inc. | Data encryption suitable for use in systems with processing-in-memory |
| KR102453343B1 (ko) * | 2022-07-26 | 2022-10-11 | (주)나래데이터 | 데이터 이관 작업에 대한 스케줄링을 통해 빠른 데이터 이관을 가능하게 하는 전자 장치 및 그 동작 방법 |
| US20250225256A1 (en) * | 2023-08-30 | 2025-07-10 | Intel Corporation | Concept for Generating a Cryptographic Address of a Field of an Object |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1242120A (zh) * | 1996-10-25 | 2000-01-19 | 英特尔公司 | 保证多芯片集成电路封装中互连接安全的电路和方法 |
| US8234505B2 (en) * | 2006-01-20 | 2012-07-31 | Seagate Technology Llc | Encryption key in a storage system |
| CN104298937A (zh) * | 2013-07-15 | 2015-01-21 | 英飞凌科技股份有限公司 | 用于存储器地址加密的装置和方法 |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7184549B2 (en) * | 2000-01-14 | 2007-02-27 | Mitsubishi Denki Kabushiki Kaisha | Method and apparatus for encryption, method and apparatus for decryption, and computer-readable medium storing program |
| JP2002091828A (ja) * | 2000-09-18 | 2002-03-29 | Sharp Corp | データ処理装置および記憶装置、並びに、それらを使用したデータ転送システム |
| JP2002328845A (ja) * | 2001-05-07 | 2002-11-15 | Fujitsu Ltd | 半導体集積回路及びicカードのセキュリティー保護方法 |
| US7313239B2 (en) | 2003-04-15 | 2007-12-25 | Broadcom Corporation | Method and system for data encryption/decryption key generation and distribution |
| US7511466B2 (en) | 2006-04-19 | 2009-03-31 | System General Corp. | Method and apparatus for predicting discharge time of magnetic device for power converter |
| US7519830B2 (en) | 2006-08-03 | 2009-04-14 | Motorola, Inc. | Secure storage of data |
| DE102007016170A1 (de) * | 2007-04-02 | 2008-10-09 | Francotyp-Postalia Gmbh | Sicherheitsmodul für eine Frankiermaschine |
| US20110145016A1 (en) * | 2008-05-22 | 2011-06-16 | Idatamap Pty. Ltd. | Secure data card |
| US8836475B2 (en) * | 2011-04-18 | 2014-09-16 | Cubic Corporation | Monitoring unit configuration management |
| US8943313B2 (en) * | 2011-07-19 | 2015-01-27 | Elwha Llc | Fine-grained security in federated data sets |
| US9128876B2 (en) | 2011-12-06 | 2015-09-08 | Honeywell International Inc. | Memory location specific data encryption key |
| KR101975027B1 (ko) * | 2012-05-04 | 2019-05-03 | 삼성전자주식회사 | 시스템 온 칩, 이의 동작 방법, 이를 포함하는 장치들 |
| US9742559B2 (en) * | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
| US10171240B2 (en) * | 2015-11-17 | 2019-01-01 | Successfactors, Inc. | Accessing resources in private networks |
-
2016
- 2016-01-12 US US14/993,455 patent/US10382410B2/en active Active
- 2016-09-21 WO PCT/US2016/052839 patent/WO2017123285A1/en not_active Ceased
- 2016-09-21 CN CN201680078576.7A patent/CN108475237B/zh active Active
- 2016-09-21 EP EP16885374.5A patent/EP3403185B1/en active Active
- 2016-09-21 KR KR1020187022779A patent/KR102430042B1/ko active Active
- 2016-09-21 JP JP2018536461A patent/JP2019502211A/ja active Pending
-
2020
- 2020-09-25 JP JP2020161026A patent/JP6998435B2/ja active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1242120A (zh) * | 1996-10-25 | 2000-01-19 | 英特尔公司 | 保证多芯片集成电路封装中互连接安全的电路和方法 |
| US8234505B2 (en) * | 2006-01-20 | 2012-07-31 | Seagate Technology Llc | Encryption key in a storage system |
| CN104298937A (zh) * | 2013-07-15 | 2015-01-21 | 英飞凌科技股份有限公司 | 用于存储器地址加密的装置和方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP6998435B2 (ja) | 2022-01-18 |
| EP3403185A4 (en) | 2019-11-20 |
| CN108475237A (zh) | 2018-08-31 |
| KR102430042B1 (ko) | 2022-08-05 |
| US10382410B2 (en) | 2019-08-13 |
| EP3403185A1 (en) | 2018-11-21 |
| JP2019502211A (ja) | 2019-01-24 |
| EP3403185B1 (en) | 2022-01-26 |
| JP2021002067A (ja) | 2021-01-07 |
| US20170201503A1 (en) | 2017-07-13 |
| WO2017123285A1 (en) | 2017-07-20 |
| KR20180094118A (ko) | 2018-08-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108475237B (zh) | 存储器操作加密 | |
| US9954826B2 (en) | Scalable and secure key management for cryptographic data processing | |
| CN102138300B (zh) | 消息认证码预计算在安全存储器中的应用 | |
| TWI715619B (zh) | 用於硬體強制單向密碼學的處理器、方法及系統 | |
| EP3355232B1 (en) | Input/output data encryption | |
| US10097349B2 (en) | Systems and methods for protecting symmetric encryption keys | |
| US10313128B2 (en) | Address-dependent key generator by XOR tree | |
| CN103150524B (zh) | 一种安全存储器芯片、系统及其认证方法 | |
| CN101309138A (zh) | 用于处理器的基于加密的安全保护方法及其设备 | |
| CN112088376B (zh) | 一种文件存储方法、装置及存储介质 | |
| EP2990953B1 (en) | Periodic memory refresh in a secure computing system | |
| US9602281B2 (en) | Parallelizable cipher construction | |
| TWI549020B (zh) | 運算裝置、方法與系統 | |
| US20160299854A1 (en) | Techniques for preventing physical attacks on contents of memory | |
| US20230208821A1 (en) | Method and device for protecting and managing keys | |
| CN106326690A (zh) | 密钥保护装置及密钥保护方法 | |
| CN110837627A (zh) | 一种基于硬盘序列号的软件版权认证方法、系统和设备 | |
| US12423410B2 (en) | Data processing system with secure memory sharing |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |