IN2013CH00583A - - Google Patents
Download PDFInfo
- Publication number
- IN2013CH00583A IN2013CH00583A IN583CH2013A IN2013CH00583A IN 2013CH00583 A IN2013CH00583 A IN 2013CH00583A IN 583CH2013 A IN583CH2013 A IN 583CH2013A IN 2013CH00583 A IN2013CH00583 A IN 2013CH00583A
- Authority
- IN
- India
- Prior art keywords
- sub
- designed
- systems
- architecture
- interconnect
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/396,582 US8813218B2 (en) | 2012-02-14 | 2012-02-14 | Security-enhanced computer systems and methods |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2013CH00583A true IN2013CH00583A (zh) | 2015-08-14 |
Family
ID=47739101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN583CH2013 IN2013CH00583A (zh) | 2012-02-14 | 2013-02-12 |
Country Status (8)
Country | Link |
---|---|
US (3) | US8813218B2 (zh) |
EP (1) | EP2629234B1 (zh) |
JP (1) | JP5976564B2 (zh) |
KR (1) | KR102092299B1 (zh) |
CN (1) | CN103353931B (zh) |
AU (1) | AU2013200681B2 (zh) |
CA (1) | CA2804726C (zh) |
IN (1) | IN2013CH00583A (zh) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9171170B2 (en) | 2012-08-17 | 2015-10-27 | Broadcom Corporation | Data and key separation using a secure central processing unit |
US8931082B2 (en) | 2012-08-17 | 2015-01-06 | Broadcom Corporation | Multi-security-CPU system |
US9183402B2 (en) | 2012-08-17 | 2015-11-10 | Broadcom Corporation | Protecting secure software in a multi-security-CPU system |
US9460283B2 (en) * | 2012-10-09 | 2016-10-04 | Dell Products L.P. | Adaptive integrity validation for portable information handling systems |
US9268797B2 (en) * | 2012-12-21 | 2016-02-23 | Zetta Inc. | Systems and methods for on-line backup and disaster recovery |
US9471793B2 (en) * | 2013-01-07 | 2016-10-18 | Infineon Technologies Ag | System on chip with embedded security module |
US9930139B2 (en) * | 2013-01-31 | 2018-03-27 | International Business Machines Corporation | Enabling access to user-chosen and/or preferred content via remote trusted third-party systems |
US9232176B2 (en) | 2013-03-04 | 2016-01-05 | Janus Technologies, Inc. | Method and apparatus for securing computer video and audio subsystems |
US8996889B2 (en) * | 2013-03-29 | 2015-03-31 | Dropbox, Inc. | Portable computing device with methodologies for client-side analytic data collection |
US9660961B2 (en) * | 2013-05-03 | 2017-05-23 | Dell Products L.P. | Virtual desktop accelerator with enhanced bandwidth usage |
US9076003B2 (en) | 2013-08-20 | 2015-07-07 | Janus Technologies, Inc. | Method and apparatus for transparently encrypting and decrypting computer interface data |
US9215250B2 (en) * | 2013-08-20 | 2015-12-15 | Janus Technologies, Inc. | System and method for remotely managing security and configuration of compute devices |
US9231921B2 (en) | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
US9424443B2 (en) | 2013-08-20 | 2016-08-23 | Janus Technologies, Inc. | Method and apparatus for securing computer mass storage data |
US9384150B2 (en) | 2013-08-20 | 2016-07-05 | Janus Technologies, Inc. | Method and apparatus for performing transparent mass storage backups and snapshots |
US9684805B2 (en) | 2013-08-20 | 2017-06-20 | Janus Technologies, Inc. | Method and apparatus for securing computer interfaces |
US11210432B2 (en) | 2013-08-20 | 2021-12-28 | Janus Technologies, Inc. | Method and apparatus for selectively snooping and capturing data for secure computer interfaces |
EP2899667B1 (en) * | 2014-01-23 | 2020-03-11 | Alcatel Lucent | System for controlling access to peripheral devices |
WO2015144764A1 (de) * | 2014-03-26 | 2015-10-01 | Continental Teves Ag & Co. Ohg | Verfahren und system zur verbesserung der datensicherheit bei einem kommunikationsvorgang |
US10838378B2 (en) * | 2014-06-02 | 2020-11-17 | Rovio Entertainment Ltd | Control of a computer program using media content |
CN105528538B (zh) * | 2014-09-28 | 2019-06-11 | 酷派软件技术(深圳)有限公司 | 终端系统的启动方法及启动装置 |
US11269984B2 (en) | 2014-12-09 | 2022-03-08 | Janus Technologies, Inc. | Method and apparatus for securing user operation of and access to a computer system |
WO2016099481A1 (en) * | 2014-12-17 | 2016-06-23 | Hewlett-Packard Development Company, L.P. | Host a conference call |
US10360051B2 (en) * | 2014-12-22 | 2019-07-23 | International Business Machines Corporation | Emulated device firmware testable by native operating system tools |
US9614666B2 (en) * | 2014-12-23 | 2017-04-04 | Intel Corporation | Encryption interface |
US10063375B2 (en) * | 2015-04-20 | 2018-08-28 | Microsoft Technology Licensing, Llc | Isolation of trusted input/output devices |
EP3531321B1 (en) * | 2015-09-15 | 2020-08-19 | Gatekeeper Ltd. | System and method for securely connecting to a peripheral device |
US10140493B1 (en) | 2016-04-22 | 2018-11-27 | Janus Technologies, Inc. | Method and apparatus for taking action based on coded graphical object in video content |
US11010475B1 (en) | 2016-10-07 | 2021-05-18 | Janus Technologies Inc. | Secure computer with multiple operating systems |
CN111241588B (zh) * | 2016-10-08 | 2020-11-10 | 创新先进技术有限公司 | 一种在应用中实现辅助功能的方法及装置 |
CN107071764B (zh) * | 2016-12-30 | 2019-12-31 | Oppo广东移动通信有限公司 | 一种直连通信控制方法、装置及移动终端 |
TWI644229B (zh) * | 2017-05-04 | 2018-12-11 | 慧榮科技股份有限公司 | 採加密技術之數據中心與數據中心操作方法 |
US11481521B2 (en) * | 2017-11-13 | 2022-10-25 | High Sec Labs Ltd. | Secure red-black air-gapped portable computer |
EP3719688B1 (en) * | 2017-12-01 | 2023-02-08 | Nec Corporation | Operation authentication relay device, method, and program |
US20190294777A1 (en) * | 2018-03-26 | 2019-09-26 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Systems and methods for managing access to host computing devices by external devices |
US11182509B2 (en) * | 2018-04-29 | 2021-11-23 | Trilicon Llc | Hardware-based system for cybersecurity protection of microprocessor systems |
JP2021131772A (ja) * | 2020-02-20 | 2021-09-09 | 富士通株式会社 | 情報処理装置及びディスクイメージ管理プログラム |
CN114385524B (zh) * | 2020-10-20 | 2024-05-31 | 北京梆梆安全科技有限公司 | 嵌入式固件仿真系统及其方法、装置和电子设备 |
CN113050485B (zh) * | 2021-03-12 | 2023-07-04 | 山西国惠光电科技有限公司 | 一种用于智能控制系统的核心控制平台 |
DE102021110766B3 (de) | 2021-04-27 | 2022-06-23 | Wincor Nixdorf International Gmbh | Forensik-Modul und eingebettetes System |
US11392705B1 (en) | 2021-07-29 | 2022-07-19 | Netskope, Inc. | Disk encryption key management for booting of a device |
CN114143056B (zh) * | 2021-11-24 | 2024-04-05 | 上海派拉软件股份有限公司 | 一种终端访问方法、装置、电子设备及存储介质 |
US12093355B2 (en) | 2022-09-07 | 2024-09-17 | Bank Of America Corporation | Secure data transfer in a virtual environment using blockchain |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5946469A (en) * | 1995-11-15 | 1999-08-31 | Dell Computer Corporation | Computer system having a controller which emulates a peripheral device during initialization |
US5896499A (en) * | 1997-02-21 | 1999-04-20 | International Business Machines Corporation | Embedded security processor |
US7225333B2 (en) * | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
JP2000285025A (ja) * | 1999-03-31 | 2000-10-13 | Nippon Computer:Kk | セキュリティ管理用電子デバイス |
WO2001093002A2 (en) * | 2000-05-30 | 2001-12-06 | Dataplay, Incorporated | Method of decrypting data stored on a storage device using an embedded encryption/decryption means |
US6480932B1 (en) * | 2001-01-31 | 2002-11-12 | Western Digital Technologies, Inc. | Computer system having a host computer coupled to a disk drive with a drive-selected-application partition for storing data for execution by the host computer in response to drive-determined conditions |
JP2003122640A (ja) * | 2001-10-11 | 2003-04-25 | Fujitsu Frontech Ltd | 秘密情報保護システム |
US6993649B2 (en) * | 2002-12-17 | 2006-01-31 | John Alan Hensley | Method of altering a computer operating system to boot and run from protected media |
US8627457B2 (en) * | 2003-06-30 | 2014-01-07 | Verizon Business Global Llc | Integrated security system |
US7987497B1 (en) * | 2004-03-05 | 2011-07-26 | Microsoft Corporation | Systems and methods for data encryption using plugins within virtual systems and subsystems |
CN1331017C (zh) * | 2005-03-23 | 2007-08-08 | 联想(北京)有限公司 | 安全芯片 |
US8291226B2 (en) * | 2006-02-10 | 2012-10-16 | Qualcomm Incorporated | Method and apparatus for securely booting from an external storage device |
US8011010B2 (en) * | 2007-04-17 | 2011-08-30 | Microsoft Corporation | Using antimalware technologies to perform offline scanning of virtual machine images |
US8402529B1 (en) * | 2007-05-30 | 2013-03-19 | M86 Security, Inc. | Preventing propagation of malicious software during execution in a virtual machine |
GB2459097B (en) * | 2008-04-08 | 2012-03-28 | Advanced Risc Mach Ltd | A method and apparatus for processing and displaying secure and non-secure data |
FR2934395B1 (fr) * | 2008-07-23 | 2013-01-04 | Trusted Logic | Systeme et procede pour la securisation d'une interface utilisateur |
US20100125741A1 (en) * | 2008-11-20 | 2010-05-20 | Seagate Technology Llc | Optical disc emulator |
US9065812B2 (en) | 2009-01-23 | 2015-06-23 | Microsoft Technology Licensing, Llc | Protecting transactions |
US20110102443A1 (en) | 2009-11-04 | 2011-05-05 | Microsoft Corporation | Virtualized GPU in a Virtual Machine Environment |
US8605044B2 (en) | 2010-02-12 | 2013-12-10 | Maxim Integrated Products, Inc. | Trusted display based on display device emulation |
US20110208963A1 (en) * | 2010-02-24 | 2011-08-25 | Aviv Soffer | Secured kvm system having remote controller-indicator |
CN103109294B (zh) * | 2010-05-20 | 2016-02-03 | 高赛科实验室公司 | 具有外围保护功能的计算机母板 |
CN107608755A (zh) * | 2010-07-01 | 2018-01-19 | 纽戴纳公司 | 为了优化群集特定配置的使用而按进程类型在群集之间分割进程 |
CN102118393B (zh) * | 2011-01-21 | 2013-09-18 | 成都卫士通信息产业股份有限公司 | 一种物联网安全感知汇聚设备 |
-
2012
- 2012-02-14 US US13/396,582 patent/US8813218B2/en active Active
-
2013
- 2013-02-05 CA CA2804726A patent/CA2804726C/en active Active
- 2013-02-08 CN CN201310121238.5A patent/CN103353931B/zh not_active Expired - Fee Related
- 2013-02-08 AU AU2013200681A patent/AU2013200681B2/en not_active Ceased
- 2013-02-12 IN IN583CH2013 patent/IN2013CH00583A/en unknown
- 2013-02-12 EP EP13154870.3A patent/EP2629234B1/en active Active
- 2013-02-14 JP JP2013026487A patent/JP5976564B2/ja not_active Expired - Fee Related
- 2013-02-14 KR KR1020130015816A patent/KR102092299B1/ko active IP Right Grant
-
2014
- 2014-08-19 US US14/463,400 patent/US9342711B2/en not_active Expired - Fee Related
-
2016
- 2016-05-16 US US15/156,210 patent/US10061928B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2629234A2 (en) | 2013-08-21 |
US8813218B2 (en) | 2014-08-19 |
KR20130093565A (ko) | 2013-08-22 |
US20140359753A1 (en) | 2014-12-04 |
US9342711B2 (en) | 2016-05-17 |
AU2013200681A1 (en) | 2013-08-29 |
US20130212671A1 (en) | 2013-08-15 |
JP2013178764A (ja) | 2013-09-09 |
EP2629234A3 (en) | 2013-10-02 |
AU2013200681B2 (en) | 2015-08-13 |
CN103353931B (zh) | 2017-10-24 |
US10061928B2 (en) | 2018-08-28 |
CA2804726C (en) | 2020-07-07 |
EP2629234B1 (en) | 2019-09-04 |
KR102092299B1 (ko) | 2020-03-24 |
US20160259940A1 (en) | 2016-09-08 |
CA2804726A1 (en) | 2013-08-14 |
CN103353931A (zh) | 2013-10-16 |
JP5976564B2 (ja) | 2016-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2013CH00583A (zh) | ||
EP2558949A4 (en) | FAST COMPLETE BACKUP OF A VIRTUAL MACHINE SHARED BY A GROUP | |
GB2514286A (en) | Augmented screen sharing in an electonic meeting | |
EP2529288A4 (en) | GESTURES OF EDGE | |
GB2483167B (en) | Storage device with separate application and interface processors | |
WO2014134104A3 (en) | System and method for virtual displays | |
MX2016006107A (es) | Agregado y presentacion de informacion de evento. | |
TW201211897A (en) | Programmable device, hierarchical parallel machines, methods for providing state information | |
PH12014502633A1 (en) | Network based management of protected data sets | |
GB2508529A (en) | Bios network access | |
GB2509647A (en) | Testing transaction applications | |
MX2013013922A (es) | Acceso de articulo con intermediarios para aplicaciones aisladas. | |
AR090922A1 (es) | Computadoras de flujo que tienen interfaces de protocolo de comunicaciones inalambricas, y metodos relacionados | |
NZ701152A (en) | System and method for unlimited multi-user computer desktop environment | |
PH12014501547B1 (en) | System, method and computer program arranged to facilitate a transaction | |
MX2015017684A (es) | Habilitación de acceso de datos. | |
TW201714049A (en) | Display devices with virtual representations of electronic devices | |
Bhardwaj et al. | Contribution of charge pions elliptic flow in relativistic heavy ion collisions | |
DE202011103665U8 (de) | Halterung für elektronische Eingabe-, Ausgabe- und Lesegeräte, insbesondere für Tablet-Computer und eBook-Lesegeräte | |
Snyder | Climate education across the spectrum | |
Maysami Sadr | Decomposition of functions between Banach spaces in the orthogonality equation | |
UA64546U (ru) | Квантовое нечеткое вычислительное средство второго рода | |
UA89646U (uk) | Пристрій для обробки знань | |
UA79673U (ru) | Устройство для контроля данных компьютерных устройств телекоммуникационной системы, которые функционируют в классе остатков | |
González Arenas et al. | Nonlinear inhomogeneous Fokker-Planck equation within a generalized Stratonovich prescription |