CO2018012253A2 - Uso de región aislada segura basada en hardware para prevenir la piratería y el engaño en dispositivos electrónicos - Google Patents

Uso de región aislada segura basada en hardware para prevenir la piratería y el engaño en dispositivos electrónicos

Info

Publication number
CO2018012253A2
CO2018012253A2 CONC2018/0012253A CO2018012253A CO2018012253A2 CO 2018012253 A2 CO2018012253 A2 CO 2018012253A2 CO 2018012253 A CO2018012253 A CO 2018012253A CO 2018012253 A2 CO2018012253 A2 CO 2018012253A2
Authority
CO
Colombia
Prior art keywords
secure
application
hardware
cryptically
deception
Prior art date
Application number
CONC2018/0012253A
Other languages
English (en)
Inventor
Ling Tony Chen
Original Assignee
Microsoft Technology Licensing Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing Llc filed Critical Microsoft Technology Licensing Llc
Publication of CO2018012253A2 publication Critical patent/CO2018012253A2/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Pinball Game Machines (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Se describen sistemas y métodos para utilizar tecnología aislada segura para evitar la piratería y el engaño en dispositivos electrónicos. En algunos ejemplos, un dispositivo electrónico puede usar tecnología aislada segura basada en hardware para almacenar una primera porción de una aplicación en una memoria de computadora y almacenar una segunda porción de la aplicación en una región aislada segura basada en hardware de la memoria de computadora, la segunda porción de la aplicación incluyendo una porción codificada crípticamente y una porción de texto sin formatear. El dispositivo electrónico además puede utilizar la tecnología aislada segura basada en hardware para establecer un canal de comunicación codificada crípticamente segura con un servidor, enviar datos al servidor a través del canal de comunicación codificada críticamente segura, recibir una clave de descodificación críptica del servidor a través del canal de comunicación codificada crípticamente segura y descodificar crípticamente la porción codificada críticamente utilizando la clave de descodificación críptica. El dispositivo electrónico entonces puede ejecutar la aplicación utilizando la primera porción de la aplicación y la segunda porción de la aplicación
CONC2018/0012253A 2016-05-24 2018-11-13 Uso de región aislada segura basada en hardware para prevenir la piratería y el engaño en dispositivos electrónicos CO2018012253A2 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/163,443 US10257189B2 (en) 2016-05-24 2016-05-24 Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
PCT/US2017/033198 WO2017205155A1 (en) 2016-05-24 2017-05-18 Using hardware based secure isolated region to prevent piracy and cheating on electronic devices

Publications (1)

Publication Number Publication Date
CO2018012253A2 true CO2018012253A2 (es) 2018-11-22

Family

ID=58773002

Family Applications (1)

Application Number Title Priority Date Filing Date
CONC2018/0012253A CO2018012253A2 (es) 2016-05-24 2018-11-13 Uso de región aislada segura basada en hardware para prevenir la piratería y el engaño en dispositivos electrónicos

Country Status (18)

Country Link
US (1) US10257189B2 (es)
EP (1) EP3465530B1 (es)
JP (1) JP7009393B2 (es)
KR (1) KR102361884B1 (es)
CN (1) CN109154972B (es)
AU (1) AU2017269163B2 (es)
BR (1) BR112018071634A2 (es)
CA (1) CA3021094C (es)
CL (1) CL2018003279A1 (es)
CO (1) CO2018012253A2 (es)
IL (1) IL262894B (es)
MX (1) MX2018014312A (es)
NZ (1) NZ746952A (es)
PH (1) PH12018550176A1 (es)
RU (1) RU2744849C2 (es)
SG (1) SG11201809872TA (es)
WO (1) WO2017205155A1 (es)
ZA (1) ZA201806649B (es)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10311217B2 (en) 2016-12-09 2019-06-04 Microsoft Technology Licensing, Llc Application piracy prevention with secure enclave protection of automatically modularized functions
US11120140B2 (en) * 2018-06-27 2021-09-14 International Business Machines Corporation Secure operations on encrypted data
US11251942B2 (en) * 2019-01-09 2022-02-15 Alibaba Group Holding Limited Secure communication channel between encryption/decryption component and trusted execution environment
US11295008B2 (en) * 2019-02-13 2022-04-05 Nec Corporation Graphics processing unit accelerated trusted execution environment
CN110457925B (zh) * 2019-08-12 2023-05-09 深圳市网心科技有限公司 内外部存储中应用数据隔离方法、装置、终端及存储介质
CN111143857B (zh) * 2019-12-27 2022-04-22 达闼机器人有限公司 一种数据分享方法、机器人控制器及存储介质
CN113139175A (zh) * 2020-01-19 2021-07-20 阿里巴巴集团控股有限公司 处理单元、电子设备以及安全控制方法
JP7337763B2 (ja) 2020-09-11 2023-09-04 株式会社東芝 通信システム、通信方法およびプログラム
US11266911B1 (en) 2020-09-21 2022-03-08 Nintendo Co., Ltd. Systems and method for identifying modified program data
CN112463720A (zh) * 2020-12-18 2021-03-09 中国计量大学上虞高等研究院有限公司 一种嵌入式SoC软件的在线保护系统和在线保护方法
CN115391845B (zh) * 2022-10-28 2023-01-06 摩尔线程智能科技(北京)有限责任公司 密钥管理设备和方法

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5182770A (en) 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
EP0880840A4 (en) 1996-01-11 2002-10-23 Mrj Inc DEVICE FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY
US20020087883A1 (en) 2000-11-06 2002-07-04 Curt Wohlgemuth Anti-piracy system for remotely served computer applications
JP2002251326A (ja) * 2001-02-22 2002-09-06 Hitachi Ltd 耐タンパ計算機システム
KR100361869B1 (ko) 2001-03-02 2002-11-22 정지혜 암호화키를 이용한 소프트웨어 설치 및 실행방법
US20030233547A1 (en) 2001-09-25 2003-12-18 Global Anti-Piracy Systems, Inc. Systems and methods for preventing and detecting unauthorized copying of software
US20040025033A1 (en) 2002-08-02 2004-02-05 Todd Luke B. System and method for preventing unauthorized installation, use and reproduction of software
CA2415334C (en) 2002-12-31 2012-04-24 Protexis Inc. System for persistently encrypting critical software data to control operation of an executable software program
US8266710B2 (en) 2004-08-09 2012-09-11 Jasim Saleh Al-Azzawi Methods for preventing software piracy
US7552341B2 (en) 2004-09-01 2009-06-23 Microsoft Corporation Licensing the use of software on a particular CPU
JP2008269088A (ja) * 2007-04-17 2008-11-06 Toshiba Corp プログラム情報提供システム、プログラム情報提供方法、プログラム情報提供方法に用いられる記録媒体
US8433927B2 (en) 2007-05-29 2013-04-30 International Business Machines Corporation Cryptographically-enabled privileged mode execution
US8578510B2 (en) 2008-06-26 2013-11-05 Valve Corporation Anti-piracy measures for a video game using hidden secrets
US20100119068A1 (en) 2008-11-11 2010-05-13 Harris Scott C Digital File Anti pirating
RU84594U1 (ru) * 2009-03-10 2009-07-10 Федеральное государственное унитарное предприятие "18 Центральный научно-исследовательский институт" Министерства обороны Российской Федерации Накопитель с защитой от несанкционированного доступа к памяти
JP2010217975A (ja) * 2009-03-13 2010-09-30 Nec System Technologies Ltd 情報処理装置、アプリケーションプログラム、及びアプリケーションプログラムの実行方法
EP2543215A2 (en) 2010-03-05 2013-01-09 InterDigital Patent Holdings, Inc. Method and apparatus for providing security to devices
US8972746B2 (en) * 2010-12-17 2015-03-03 Intel Corporation Technique for supporting multiple secure enclaves
US9230091B2 (en) * 2012-06-20 2016-01-05 Microsoft Technology Licensing, Llc Managing use of a field programmable gate array with isolated components
JP6343869B2 (ja) * 2013-02-20 2018-06-20 凸版印刷株式会社 携帯端末装置及び復号処理プログラム
US20150026483A1 (en) 2013-07-17 2015-01-22 Marvell World Trade Ltd. Systems and Methods for Mobile Application Protection
KR20150032970A (ko) * 2013-09-23 2015-04-01 삼성전자주식회사 보안 기능을 제공하는 저장 매체 및 그 보안 방법
EP3084667A4 (en) 2013-12-19 2017-07-26 Intel Corporation Policy-based trusted inspection of rights managed content

Also Published As

Publication number Publication date
BR112018071634A2 (pt) 2019-02-19
RU2018141237A3 (es) 2020-08-20
MX2018014312A (es) 2019-03-14
PH12018550176A1 (en) 2019-03-25
EP3465530A1 (en) 2019-04-10
JP7009393B2 (ja) 2022-01-25
CA3021094A1 (en) 2017-11-30
IL262894A (en) 2018-12-31
CN109154972A (zh) 2019-01-04
US20170346814A1 (en) 2017-11-30
EP3465530B1 (en) 2020-12-23
CA3021094C (en) 2024-05-21
CL2018003279A1 (es) 2019-03-01
NZ746952A (en) 2022-05-27
KR20190009755A (ko) 2019-01-29
AU2017269163B2 (en) 2021-08-12
US10257189B2 (en) 2019-04-09
RU2018141237A (ru) 2020-05-25
ZA201806649B (en) 2019-12-18
WO2017205155A1 (en) 2017-11-30
KR102361884B1 (ko) 2022-02-10
CN109154972B (zh) 2022-01-11
SG11201809872TA (en) 2018-12-28
JP2019517080A (ja) 2019-06-20
IL262894B (en) 2021-09-30
RU2744849C2 (ru) 2021-03-16
AU2017269163A1 (en) 2018-10-25

Similar Documents

Publication Publication Date Title
CO2018012253A2 (es) Uso de región aislada segura basada en hardware para prevenir la piratería y el engaño en dispositivos electrónicos
CL2019002026A1 (es) Direccionamiento de un entorno de ejecución confiable utilizando clave de firma.
PH12018502160A1 (en) Systems and methods for secure storage of user information in a user profile
BR112016029856A2 (pt) sistemas e métodos para sinalizar parâmetros de decodificador de referência hipotética em um conjunto de parâmetros
PH12018502196A1 (en) System and methods for validating and performing operations on homomorphically encrypted data
BR112017014632A2 (pt) ?método implementado por computador, e, sistema de computador?
MX2019013495A (es) Sistema y metodo para identificación biometrica.
CL2016001351A1 (es) Método y sistema para la transmision segura de mensajes del servicio de transmision a distancia a dispositivos moviles sin elementos de seguridad
BR112017003018A2 (pt) fornecimento seguro de uma credencial de autenticação
CL2016001353A1 (es) Métodos y sistemas para la autentificación segura de un usuario y un dispositivo móvil sin elementos de seguridad y que generan credenciales de pago en una transacción de pago.
AR097524A1 (es) Encriptación de datos y tarjeta inteligente que almacena datos encriptados
RU2018125244A (ru) Устройство с безопасным хранением и извлечением данных
BR112017002747A2 (pt) método implementado por computador, e, sistema de computador.
BR112014004858A2 (pt) método para um backup seguro e recuperação de dados de configuração de um dispositivo de usuário em uma extremidade, e dispositivo utilizando o método
SG10201810140QA (en) Remote server encrypted data provisioning system and methods
MX369234B (es) Metodo y dispositivo de administracion de datos confidenciales, y metodo y sistema de autenticacion de seguridad.
BR112016029787A2 (pt) faixas de valor para elementos de sintaxe em criptografia de vídeo
GB2544672A (en) PUF and address dependent data encryption
EP4236203A3 (en) Data security using request-supplied keys
NZ714230A (en) System and methods for encrypting data
CL2017000822A1 (es) Canales de señalizacion para codificación escalable de datos de audio ambisónicos de orden superior
MX356939B (es) Metodo y sistema para generar una llave de almacenamiento avanzada en un dispositivo movil sin elementos de seguridad.
PH12018500778A1 (en) Message authentication
PH12017550127A1 (en) Privacy enhanced personal search index
BR112018000325A2 (pt) separação de módulos de software por gerenciamento de chave de criptografia controlado