IN2009KO01135A - - Google Patents

Download PDF

Info

Publication number
IN2009KO01135A
IN2009KO01135A IN1135KO2009A IN2009KO01135A IN 2009KO01135 A IN2009KO01135 A IN 2009KO01135A IN 1135KO2009 A IN1135KO2009 A IN 1135KO2009A IN 2009KO01135 A IN2009KO01135 A IN 2009KO01135A
Authority
IN
India
Prior art keywords
cryptographic
request
key
access
rule
Prior art date
Application number
Other languages
English (en)
Inventor
Paul Ducharme
Norman Vernon Douglas Stewart
Original Assignee
Vixs Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vixs Systems Inc filed Critical Vixs Systems Inc
Publication of IN2009KO01135A publication Critical patent/IN2009KO01135A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4181External card to be used in combination with the client device, e.g. for conditional access for conditional access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2123Dummy operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
IN1135KO2009 2008-09-05 2009-09-07 IN2009KO01135A (ja)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US9454108P 2008-09-05 2008-09-05
US12/490,777 US8781127B2 (en) 2008-09-05 2009-06-24 Device with privileged memory and applications thereof

Publications (1)

Publication Number Publication Date
IN2009KO01135A true IN2009KO01135A (ja) 2015-08-14

Family

ID=41396078

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1135KO2009 IN2009KO01135A (ja) 2008-09-05 2009-09-07

Country Status (4)

Country Link
US (2) US8781127B2 (ja)
EP (1) EP2161671A3 (ja)
CN (1) CN101673251B (ja)
IN (1) IN2009KO01135A (ja)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8811497B2 (en) * 2009-06-24 2014-08-19 Vixs Systems, Inc Processing system with register arbitration and methods for use therewith
US9432184B2 (en) 2008-09-05 2016-08-30 Vixs Systems Inc. Provisioning of secure storage for both static and dynamic rules for cryptographic key information
US9501429B2 (en) 2008-09-05 2016-11-22 Vixs Systems Inc. Dynamic key and rule storage protection
GB2471282B (en) * 2009-06-22 2015-02-18 Barclays Bank Plc Method and system for provision of cryptographic services
GB0915596D0 (en) * 2009-09-07 2009-10-07 St Microelectronics Res & Dev Encryption keys
US10122693B2 (en) * 2010-10-25 2018-11-06 International Business Machines Corporation Protocol based key management
US8924672B2 (en) 2011-02-08 2014-12-30 Infineon Technologies Ag Device with processing unit and information storage
US20130129095A1 (en) * 2011-11-18 2013-05-23 Comcast Cable Communications, Llc Key Delivery
CN104137466B (zh) * 2012-02-29 2018-03-30 黑莓有限公司 操作计算设备的方法及计算设备
CN104145446B (zh) 2012-02-29 2018-06-05 黑莓有限公司 操作计算设备的方法、计算设备及计算机程序
CN104145444B (zh) 2012-02-29 2018-07-06 黑莓有限公司 操作计算设备的方法、计算设备及计算机程序
KR101975027B1 (ko) * 2012-05-04 2019-05-03 삼성전자주식회사 시스템 온 칩, 이의 동작 방법, 이를 포함하는 장치들
US9436846B2 (en) 2012-05-30 2016-09-06 Freescale Semiconductor, Inc. Semiconductor device and a method of manufacturing a semiconductor device
US9223952B2 (en) * 2012-09-28 2015-12-29 Intel Corporation Allowing varied device access based on different levels of unlocking mechanisms
GB2514771B (en) * 2013-06-03 2015-10-21 Broadcom Corp Methods of securely changing the root key of a chip, and related electronic devices and chips
US20150113594A1 (en) * 2013-10-18 2015-04-23 Vixs Systems, Inc. Processing system with virtual clients and methods for use therewith
CN104125434B (zh) * 2014-07-31 2017-12-22 深圳锐取信息技术股份有限公司 一种长距离高清传输的系统
CN105373734A (zh) * 2014-09-01 2016-03-02 中兴通讯股份有限公司 应用数据的保护方法及装置
CN104317744B (zh) * 2014-10-23 2018-01-02 山东维固信息科技股份有限公司 一种嵌入式数据安全系统用soc芯片的密钥存储器
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
US9785783B2 (en) * 2015-07-23 2017-10-10 Ca, Inc. Executing privileged code in a process
US11063980B2 (en) * 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US20170344927A1 (en) * 2016-05-24 2017-11-30 Accenture Global Solutions Limited Skill proficiency system
CN108416220B (zh) * 2017-02-09 2021-02-09 深圳市中兴微电子技术有限公司 一种访问控制方法及装置
KR102432451B1 (ko) * 2018-01-10 2022-08-12 삼성전자주식회사 반도체 장치 및 반도체 장치의 동작 방법
EP3930254B1 (en) * 2020-06-23 2023-12-20 Nxp B.V. Method for setting permissions for cryptographic keys, computer program and cryptographic processing system
CN112233716B (zh) * 2020-09-27 2024-10-18 加特兰微电子科技(上海)有限公司 存储器、存储装置、集成电路、无线电器件和设备

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6295604B1 (en) * 1998-05-26 2001-09-25 Intel Corporation Cryptographic packet processing unit
US6289454B1 (en) * 1998-06-29 2001-09-11 Vlsi Technology, Inc. Memory configuration which support multiple cryptographical algorithms
JP3820777B2 (ja) * 1998-11-12 2006-09-13 富士ゼロックス株式会社 秘密鍵寄託システムおよび方法
US6757823B1 (en) * 1999-07-27 2004-06-29 Nortel Networks Limited System and method for enabling secure connections for H.323 VoIP calls
JP4352797B2 (ja) * 2003-07-07 2009-10-28 ソニー株式会社 受信装置および受信方法
US20050172132A1 (en) 2004-01-30 2005-08-04 Chen Sherman (. Secure key authentication and ladder system
US9094699B2 (en) * 2004-02-05 2015-07-28 Broadcom Corporation System and method for security key transmission with strong pairing to destination client
EP1662789A1 (fr) * 2004-11-29 2006-05-31 Nagracard S.A. Procédé de contrôle d'accès à des données à accès conditionnel
JP4341072B2 (ja) * 2004-12-16 2009-10-07 日本電気株式会社 データ配置管理方法及びシステムと装置およびプログラム
US9547708B2 (en) * 2005-04-01 2017-01-17 Schlumberger Technology Corporation Method and system for database licensing
US7913289B2 (en) * 2005-05-23 2011-03-22 Broadcom Corporation Method and apparatus for security policy and enforcing mechanism for a set-top box security processor
US8131995B2 (en) * 2006-01-24 2012-03-06 Vixs Systems, Inc. Processing feature revocation and reinvocation
US8291226B2 (en) * 2006-02-10 2012-10-16 Qualcomm Incorporated Method and apparatus for securely booting from an external storage device
WO2008008244A2 (en) 2006-07-07 2008-01-17 Sandisk Corporation Content control system and method using versatile control structure
US9860274B2 (en) * 2006-09-13 2018-01-02 Sophos Limited Policy management
US20080148001A1 (en) 2006-12-14 2008-06-19 Telefonaktiebolaget L M Ericsson (Publ) Virtual Secure On-Chip One Time Programming
US20080219449A1 (en) * 2007-03-09 2008-09-11 Ball Matthew V Cryptographic key management for stored data

Also Published As

Publication number Publication date
US8781127B2 (en) 2014-07-15
CN101673251A (zh) 2010-03-17
US20100061555A1 (en) 2010-03-11
US20150012756A1 (en) 2015-01-08
EP2161671A2 (en) 2010-03-10
EP2161671A3 (en) 2016-09-14
US9058297B2 (en) 2015-06-16
CN101673251B (zh) 2014-07-23

Similar Documents

Publication Publication Date Title
IN2009KO01135A (ja)
PH12014502304A1 (en) Abstracted and randomized one-time passwords for transactional authentication
MX2015015140A (es) Autentificacion de usuario.
WO2008042938A3 (en) Methods and systems for controlling access to custom objects in a database
WO2008060820A3 (en) System and method for authenticating remote server access
GB2476428A (en) Fingerprint sensor device and system with verification token and methods of using
WO2016166612A3 (en) Systems and methods for electronically sharing private documents using pointers
GB2458844A (en) Format-preserving cryptographic systems
JP2006072995A5 (ja)
WO2008094369A3 (en) Cryptographic key containers on a usb token
WO2010144301A3 (en) Key management in secure network enclaves
WO2013003265A3 (en) Persistent key access to a resources in a collection
WO2009154968A3 (en) Remote storage encryption system
GB2466751A (en) Hardware device interface supporting transaction authentication
MX2009002696A (es) Sistema de transaccion universal seguro.
GB201111252D0 (en) Mobile computing device
JP2008140197A5 (ja)
JP2006254423A5 (ja)
IN2012DN01770A (ja)
WO2006127359A3 (en) System and method for unlimited licensing to a fixed number of devices
WO2009013673A3 (en) Device with a secure virtual machine
WO2010144373A3 (en) Discovery of secure network enclaves
GB2484207A (en) Method and apparatus for medical information encryption
GB201223147D0 (en) Method and system for providing continued access to authentication and encryption services
WO2013130561A3 (en) Method of operating a computing device, computing device and computer program