IN2013CH00583A - - Google Patents

Download PDF

Info

Publication number
IN2013CH00583A
IN2013CH00583A IN583CH2013A IN2013CH00583A IN 2013CH00583 A IN2013CH00583 A IN 2013CH00583A IN 583CH2013 A IN583CH2013 A IN 583CH2013A IN 2013CH00583 A IN2013CH00583 A IN 2013CH00583A
Authority
IN
India
Prior art keywords
sub
designed
systems
architecture
interconnect
Prior art date
Application number
Other languages
English (en)
Inventor
Chen-Hua Wang
Sofin Raskin
Leonid Rozenboim
Original Assignee
Janus Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Janus Technologies Inc filed Critical Janus Technologies Inc
Publication of IN2013CH00583A publication Critical patent/IN2013CH00583A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
IN583CH2013 2012-02-14 2013-02-12 IN2013CH00583A (https=)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/396,582 US8813218B2 (en) 2012-02-14 2012-02-14 Security-enhanced computer systems and methods

Publications (1)

Publication Number Publication Date
IN2013CH00583A true IN2013CH00583A (https=) 2015-08-14

Family

ID=47739101

Family Applications (1)

Application Number Title Priority Date Filing Date
IN583CH2013 IN2013CH00583A (https=) 2012-02-14 2013-02-12

Country Status (8)

Country Link
US (3) US8813218B2 (https=)
EP (1) EP2629234B1 (https=)
JP (1) JP5976564B2 (https=)
KR (1) KR102092299B1 (https=)
CN (1) CN103353931B (https=)
AU (1) AU2013200681B2 (https=)
CA (1) CA2804726C (https=)
IN (1) IN2013CH00583A (https=)

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9183402B2 (en) 2012-08-17 2015-11-10 Broadcom Corporation Protecting secure software in a multi-security-CPU system
US9171170B2 (en) 2012-08-17 2015-10-27 Broadcom Corporation Data and key separation using a secure central processing unit
US8931082B2 (en) 2012-08-17 2015-01-06 Broadcom Corporation Multi-security-CPU system
US9460283B2 (en) * 2012-10-09 2016-10-04 Dell Products L.P. Adaptive integrity validation for portable information handling systems
US9268797B2 (en) * 2012-12-21 2016-02-23 Zetta Inc. Systems and methods for on-line backup and disaster recovery
US9471793B2 (en) * 2013-01-07 2016-10-18 Infineon Technologies Ag System on chip with embedded security module
US9930139B2 (en) * 2013-01-31 2018-03-27 International Business Machines Corporation Enabling access to user-chosen and/or preferred content via remote trusted third-party systems
US9232176B2 (en) 2013-03-04 2016-01-05 Janus Technologies, Inc. Method and apparatus for securing computer video and audio subsystems
US8996889B2 (en) * 2013-03-29 2015-03-31 Dropbox, Inc. Portable computing device with methodologies for client-side analytic data collection
US9313297B2 (en) * 2013-05-03 2016-04-12 Dell Products L.P. Virtual desktop accelerator with support for dynamic proxy thread management
US9684805B2 (en) 2013-08-20 2017-06-20 Janus Technologies, Inc. Method and apparatus for securing computer interfaces
US9076003B2 (en) 2013-08-20 2015-07-07 Janus Technologies, Inc. Method and apparatus for transparently encrypting and decrypting computer interface data
US9215250B2 (en) * 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices
US11210432B2 (en) 2013-08-20 2021-12-28 Janus Technologies, Inc. Method and apparatus for selectively snooping and capturing data for secure computer interfaces
US9424443B2 (en) 2013-08-20 2016-08-23 Janus Technologies, Inc. Method and apparatus for securing computer mass storage data
US9384150B2 (en) 2013-08-20 2016-07-05 Janus Technologies, Inc. Method and apparatus for performing transparent mass storage backups and snapshots
US9231921B2 (en) 2013-08-20 2016-01-05 Janus Technologies, Inc. System and architecture for secure computer devices
EP2899667B1 (en) * 2014-01-23 2020-03-11 Alcatel Lucent System for controlling access to peripheral devices
CN114710351B (zh) * 2014-03-26 2025-05-20 大陆汽车科技有限公司 用于在通信过程中改进数据安全性的方法和系统
US10838378B2 (en) * 2014-06-02 2020-11-17 Rovio Entertainment Ltd Control of a computer program using media content
CN105528538B (zh) * 2014-09-28 2019-06-11 酷派软件技术(深圳)有限公司 终端系统的启动方法及启动装置
US10657262B1 (en) * 2014-09-28 2020-05-19 Red Balloon Security, Inc. Method and apparatus for securing embedded device firmware
US11269984B2 (en) 2014-12-09 2022-03-08 Janus Technologies, Inc. Method and apparatus for securing user operation of and access to a computer system
CN107078917B (zh) 2014-12-17 2021-03-19 惠普发展公司,有限责任合伙企业 托管电话会议
US10360051B2 (en) * 2014-12-22 2019-07-23 International Business Machines Corporation Emulated device firmware testable by native operating system tools
US9614666B2 (en) * 2014-12-23 2017-04-04 Intel Corporation Encryption interface
US10063375B2 (en) * 2015-04-20 2018-08-28 Microsoft Technology Licensing, Llc Isolation of trusted input/output devices
EP3742324B1 (en) * 2015-09-15 2024-11-27 Gatekeeper Ltd. System and method for securely connecting to a peripheral device
US10140493B1 (en) 2016-04-22 2018-11-27 Janus Technologies, Inc. Method and apparatus for taking action based on coded graphical object in video content
US11010475B1 (en) 2016-10-07 2021-05-18 Janus Technologies Inc. Secure computer with multiple operating systems
CN106886721B (zh) * 2016-10-08 2020-03-13 阿里巴巴集团控股有限公司 一种在应用中实现辅助功能的方法及装置
CN107071764B (zh) * 2016-12-30 2019-12-31 Oppo广东移动通信有限公司 一种直连通信控制方法、装置及移动终端
TWI644229B (zh) * 2017-05-04 2018-12-11 慧榮科技股份有限公司 採加密技術之數據中心與數據中心操作方法
EP3710975B1 (en) * 2017-11-13 2024-09-11 High Sec Labs Ltd. Secure red-black air-gapped portable computer
JP6969613B2 (ja) * 2017-12-01 2021-11-24 日本電気株式会社 操作認証中継装置、方法、プログラム
US20190294777A1 (en) * 2018-03-26 2019-09-26 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Systems and methods for managing access to host computing devices by external devices
US11182509B2 (en) * 2018-04-29 2021-11-23 Trilicon Llc Hardware-based system for cybersecurity protection of microprocessor systems
JP2021131772A (ja) * 2020-02-20 2021-09-09 富士通株式会社 情報処理装置及びディスクイメージ管理プログラム
CN114385524B (zh) * 2020-10-20 2024-05-31 北京梆梆安全科技有限公司 嵌入式固件仿真系统及其方法、装置和电子设备
CN113050485B (zh) * 2021-03-12 2023-07-04 山西国惠光电科技有限公司 一种用于智能控制系统的核心控制平台
DE102021110766B3 (de) 2021-04-27 2022-06-23 Wincor Nixdorf International Gmbh Forensik-Modul und eingebettetes System
US11392705B1 (en) 2021-07-29 2022-07-19 Netskope, Inc. Disk encryption key management for booting of a device
CN114143056B (zh) * 2021-11-24 2024-04-05 上海派拉软件股份有限公司 一种终端访问方法、装置、电子设备及存储介质
US12301561B2 (en) 2022-08-29 2025-05-13 Bank Of America Corporation Secure access to devices in a virtual environment using security tokens
US12093355B2 (en) 2022-09-07 2024-09-17 Bank Of America Corporation Secure data transfer in a virtual environment using blockchain
CN115795459A (zh) * 2022-11-14 2023-03-14 北京威努特技术有限公司 一种涉密环境下审计移动存储介质数据的方法及系统

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5946469A (en) * 1995-11-15 1999-08-31 Dell Computer Corporation Computer system having a controller which emulates a peripheral device during initialization
US5896499A (en) * 1997-02-21 1999-04-20 International Business Machines Corporation Embedded security processor
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
JP2000285025A (ja) * 1999-03-31 2000-10-13 Nippon Computer:Kk セキュリティ管理用電子デバイス
AU2001268102A1 (en) * 2000-05-30 2001-12-11 Dataplay, Incorporated Method of decrypting data stored on a storage device using an embedded encryption/decryption means
US6480932B1 (en) * 2001-01-31 2002-11-12 Western Digital Technologies, Inc. Computer system having a host computer coupled to a disk drive with a drive-selected-application partition for storing data for execution by the host computer in response to drive-determined conditions
JP2003122640A (ja) * 2001-10-11 2003-04-25 Fujitsu Frontech Ltd 秘密情報保護システム
US6993649B2 (en) * 2002-12-17 2006-01-31 John Alan Hensley Method of altering a computer operating system to boot and run from protected media
US8627457B2 (en) * 2003-06-30 2014-01-07 Verizon Business Global Llc Integrated security system
US7987497B1 (en) * 2004-03-05 2011-07-26 Microsoft Corporation Systems and methods for data encryption using plugins within virtual systems and subsystems
CN1331017C (zh) * 2005-03-23 2007-08-08 联想(北京)有限公司 安全芯片
US8291226B2 (en) * 2006-02-10 2012-10-16 Qualcomm Incorporated Method and apparatus for securely booting from an external storage device
US8011010B2 (en) * 2007-04-17 2011-08-30 Microsoft Corporation Using antimalware technologies to perform offline scanning of virtual machine images
US8321936B1 (en) * 2007-05-30 2012-11-27 M86 Security, Inc. System and method for malicious software detection in multiple protocols
GB2459097B (en) * 2008-04-08 2012-03-28 Advanced Risc Mach Ltd A method and apparatus for processing and displaying secure and non-secure data
FR2934395B1 (fr) * 2008-07-23 2013-01-04 Trusted Logic Systeme et procede pour la securisation d'une interface utilisateur
US20100125741A1 (en) * 2008-11-20 2010-05-20 Seagate Technology Llc Optical disc emulator
US9065812B2 (en) 2009-01-23 2015-06-23 Microsoft Technology Licensing, Llc Protecting transactions
US20110102443A1 (en) 2009-11-04 2011-05-05 Microsoft Corporation Virtualized GPU in a Virtual Machine Environment
US8605044B2 (en) * 2010-02-12 2013-12-10 Maxim Integrated Products, Inc. Trusted display based on display device emulation
US20110208963A1 (en) * 2010-02-24 2011-08-25 Aviv Soffer Secured kvm system having remote controller-indicator
WO2011145095A2 (en) * 2010-05-20 2011-11-24 High Sec Labs Ltd. Computer motherboard having peripheral security functions
TWI480738B (zh) * 2010-07-01 2015-04-11 Neodana Inc 藉由最佳化叢集特定組態之使用的處理種類來分割叢集間之處理
CN102118393B (zh) * 2011-01-21 2013-09-18 成都卫士通信息产业股份有限公司 一种物联网安全感知汇聚设备

Also Published As

Publication number Publication date
EP2629234A3 (en) 2013-10-02
AU2013200681A1 (en) 2013-08-29
US8813218B2 (en) 2014-08-19
US9342711B2 (en) 2016-05-17
CA2804726C (en) 2020-07-07
CN103353931A (zh) 2013-10-16
US20130212671A1 (en) 2013-08-15
US10061928B2 (en) 2018-08-28
EP2629234B1 (en) 2019-09-04
CA2804726A1 (en) 2013-08-14
JP2013178764A (ja) 2013-09-09
JP5976564B2 (ja) 2016-08-23
US20140359753A1 (en) 2014-12-04
KR102092299B1 (ko) 2020-03-24
AU2013200681B2 (en) 2015-08-13
KR20130093565A (ko) 2013-08-22
US20160259940A1 (en) 2016-09-08
CN103353931B (zh) 2017-10-24
EP2629234A2 (en) 2013-08-21

Similar Documents

Publication Publication Date Title
IN2013CH00583A (https=)
GB2514286A (en) Augmented screen sharing in an electonic meeting
EP2558949A4 (en) FAST COMPLETE BACKUP OF A VIRTUAL MACHINE SHARED BY A GROUP
EP2529288A4 (en) GESTURES OF EDGE
EP3614273A3 (en) Multiprocessor system with improved secondary interconnection network
GB2483167B (en) Storage device with separate application and interface processors
WO2014134104A3 (en) System and method for virtual displays
TW201211897A (en) Programmable device, hierarchical parallel machines, methods for providing state information
MX2016006107A (es) Agregado y presentacion de informacion de evento.
WO2014058706A3 (en) Orchestration framework for connected devices
MY189174A (en) Network based management of protected data sets
GB2509647A (en) Testing transaction applications
AR090922A1 (es) Computadoras de flujo que tienen interfaces de protocolo de comunicaciones inalambricas, y metodos relacionados
NZ701152A (en) System and method for unlimited multi-user computer desktop environment
TW201714049A (en) Display devices with virtual representations of electronic devices
PH12014501547A1 (en) System, method and computer program arranged to facilitate a transaction
MX2015017684A (es) Habilitación de acceso de datos.
DE202011103665U8 (de) Halterung für elektronische Eingabe-, Ausgabe- und Lesegeräte, insbesondere für Tablet-Computer und eBook-Lesegeräte
Chin Development of interactive software module (shear stress in beams)
Dyadichenko et al. Social Networks in Higher Education System: World Educational Space
UA64546U (ru) Квантовое нечеткое вычислительное средство второго рода
Choden Konigsmark et al. System-of-pufs: Multilevel security for embedded systems
UA89644U (uk) Пристрій баз знань
Zhou Parallel processing using Raspberry Pi
UA89646U (uk) Пристрій для обробки знань