IN2013CH00583A - - Google Patents

Download PDF

Info

Publication number
IN2013CH00583A
IN2013CH00583A IN583CH2013A IN2013CH00583A IN 2013CH00583 A IN2013CH00583 A IN 2013CH00583A IN 583CH2013 A IN583CH2013 A IN 583CH2013A IN 2013CH00583 A IN2013CH00583 A IN 2013CH00583A
Authority
IN
India
Prior art keywords
sub
designed
systems
architecture
interconnect
Prior art date
Application number
Other languages
English (en)
Inventor
Chen-Hua Wang
Sofin Raskin
Leonid Rozenboim
Original Assignee
Janus Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Janus Technologies Inc filed Critical Janus Technologies Inc
Publication of IN2013CH00583A publication Critical patent/IN2013CH00583A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
IN583CH2013 2012-02-14 2013-02-12 IN2013CH00583A (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/396,582 US8813218B2 (en) 2012-02-14 2012-02-14 Security-enhanced computer systems and methods

Publications (1)

Publication Number Publication Date
IN2013CH00583A true IN2013CH00583A (zh) 2015-08-14

Family

ID=47739101

Family Applications (1)

Application Number Title Priority Date Filing Date
IN583CH2013 IN2013CH00583A (zh) 2012-02-14 2013-02-12

Country Status (8)

Country Link
US (3) US8813218B2 (zh)
EP (1) EP2629234B1 (zh)
JP (1) JP5976564B2 (zh)
KR (1) KR102092299B1 (zh)
CN (1) CN103353931B (zh)
AU (1) AU2013200681B2 (zh)
CA (1) CA2804726C (zh)
IN (1) IN2013CH00583A (zh)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9171170B2 (en) 2012-08-17 2015-10-27 Broadcom Corporation Data and key separation using a secure central processing unit
US8931082B2 (en) 2012-08-17 2015-01-06 Broadcom Corporation Multi-security-CPU system
US9183402B2 (en) 2012-08-17 2015-11-10 Broadcom Corporation Protecting secure software in a multi-security-CPU system
US9460283B2 (en) * 2012-10-09 2016-10-04 Dell Products L.P. Adaptive integrity validation for portable information handling systems
US9268797B2 (en) * 2012-12-21 2016-02-23 Zetta Inc. Systems and methods for on-line backup and disaster recovery
US9471793B2 (en) * 2013-01-07 2016-10-18 Infineon Technologies Ag System on chip with embedded security module
US9930139B2 (en) * 2013-01-31 2018-03-27 International Business Machines Corporation Enabling access to user-chosen and/or preferred content via remote trusted third-party systems
US9232176B2 (en) 2013-03-04 2016-01-05 Janus Technologies, Inc. Method and apparatus for securing computer video and audio subsystems
US8996889B2 (en) * 2013-03-29 2015-03-31 Dropbox, Inc. Portable computing device with methodologies for client-side analytic data collection
US9660961B2 (en) * 2013-05-03 2017-05-23 Dell Products L.P. Virtual desktop accelerator with enhanced bandwidth usage
US9076003B2 (en) 2013-08-20 2015-07-07 Janus Technologies, Inc. Method and apparatus for transparently encrypting and decrypting computer interface data
US9215250B2 (en) * 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices
US9231921B2 (en) 2013-08-20 2016-01-05 Janus Technologies, Inc. System and architecture for secure computer devices
US9424443B2 (en) 2013-08-20 2016-08-23 Janus Technologies, Inc. Method and apparatus for securing computer mass storage data
US9384150B2 (en) 2013-08-20 2016-07-05 Janus Technologies, Inc. Method and apparatus for performing transparent mass storage backups and snapshots
US9684805B2 (en) 2013-08-20 2017-06-20 Janus Technologies, Inc. Method and apparatus for securing computer interfaces
US11210432B2 (en) 2013-08-20 2021-12-28 Janus Technologies, Inc. Method and apparatus for selectively snooping and capturing data for secure computer interfaces
EP2899667B1 (en) * 2014-01-23 2020-03-11 Alcatel Lucent System for controlling access to peripheral devices
WO2015144764A1 (de) * 2014-03-26 2015-10-01 Continental Teves Ag & Co. Ohg Verfahren und system zur verbesserung der datensicherheit bei einem kommunikationsvorgang
US10838378B2 (en) * 2014-06-02 2020-11-17 Rovio Entertainment Ltd Control of a computer program using media content
CN105528538B (zh) * 2014-09-28 2019-06-11 酷派软件技术(深圳)有限公司 终端系统的启动方法及启动装置
US11269984B2 (en) 2014-12-09 2022-03-08 Janus Technologies, Inc. Method and apparatus for securing user operation of and access to a computer system
WO2016099481A1 (en) * 2014-12-17 2016-06-23 Hewlett-Packard Development Company, L.P. Host a conference call
US10360051B2 (en) * 2014-12-22 2019-07-23 International Business Machines Corporation Emulated device firmware testable by native operating system tools
US9614666B2 (en) * 2014-12-23 2017-04-04 Intel Corporation Encryption interface
US10063375B2 (en) * 2015-04-20 2018-08-28 Microsoft Technology Licensing, Llc Isolation of trusted input/output devices
EP3531321B1 (en) * 2015-09-15 2020-08-19 Gatekeeper Ltd. System and method for securely connecting to a peripheral device
US10140493B1 (en) 2016-04-22 2018-11-27 Janus Technologies, Inc. Method and apparatus for taking action based on coded graphical object in video content
US11010475B1 (en) 2016-10-07 2021-05-18 Janus Technologies Inc. Secure computer with multiple operating systems
CN111241588B (zh) * 2016-10-08 2020-11-10 创新先进技术有限公司 一种在应用中实现辅助功能的方法及装置
CN107071764B (zh) * 2016-12-30 2019-12-31 Oppo广东移动通信有限公司 一种直连通信控制方法、装置及移动终端
TWI644229B (zh) * 2017-05-04 2018-12-11 慧榮科技股份有限公司 採加密技術之數據中心與數據中心操作方法
US11481521B2 (en) * 2017-11-13 2022-10-25 High Sec Labs Ltd. Secure red-black air-gapped portable computer
EP3719688B1 (en) * 2017-12-01 2023-02-08 Nec Corporation Operation authentication relay device, method, and program
US20190294777A1 (en) * 2018-03-26 2019-09-26 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Systems and methods for managing access to host computing devices by external devices
US11182509B2 (en) * 2018-04-29 2021-11-23 Trilicon Llc Hardware-based system for cybersecurity protection of microprocessor systems
JP2021131772A (ja) * 2020-02-20 2021-09-09 富士通株式会社 情報処理装置及びディスクイメージ管理プログラム
CN114385524B (zh) * 2020-10-20 2024-05-31 北京梆梆安全科技有限公司 嵌入式固件仿真系统及其方法、装置和电子设备
CN113050485B (zh) * 2021-03-12 2023-07-04 山西国惠光电科技有限公司 一种用于智能控制系统的核心控制平台
DE102021110766B3 (de) 2021-04-27 2022-06-23 Wincor Nixdorf International Gmbh Forensik-Modul und eingebettetes System
US11392705B1 (en) 2021-07-29 2022-07-19 Netskope, Inc. Disk encryption key management for booting of a device
CN114143056B (zh) * 2021-11-24 2024-04-05 上海派拉软件股份有限公司 一种终端访问方法、装置、电子设备及存储介质
US12093355B2 (en) 2022-09-07 2024-09-17 Bank Of America Corporation Secure data transfer in a virtual environment using blockchain

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5946469A (en) * 1995-11-15 1999-08-31 Dell Computer Corporation Computer system having a controller which emulates a peripheral device during initialization
US5896499A (en) * 1997-02-21 1999-04-20 International Business Machines Corporation Embedded security processor
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
JP2000285025A (ja) * 1999-03-31 2000-10-13 Nippon Computer:Kk セキュリティ管理用電子デバイス
WO2001093002A2 (en) * 2000-05-30 2001-12-06 Dataplay, Incorporated Method of decrypting data stored on a storage device using an embedded encryption/decryption means
US6480932B1 (en) * 2001-01-31 2002-11-12 Western Digital Technologies, Inc. Computer system having a host computer coupled to a disk drive with a drive-selected-application partition for storing data for execution by the host computer in response to drive-determined conditions
JP2003122640A (ja) * 2001-10-11 2003-04-25 Fujitsu Frontech Ltd 秘密情報保護システム
US6993649B2 (en) * 2002-12-17 2006-01-31 John Alan Hensley Method of altering a computer operating system to boot and run from protected media
US8627457B2 (en) * 2003-06-30 2014-01-07 Verizon Business Global Llc Integrated security system
US7987497B1 (en) * 2004-03-05 2011-07-26 Microsoft Corporation Systems and methods for data encryption using plugins within virtual systems and subsystems
CN1331017C (zh) * 2005-03-23 2007-08-08 联想(北京)有限公司 安全芯片
US8291226B2 (en) * 2006-02-10 2012-10-16 Qualcomm Incorporated Method and apparatus for securely booting from an external storage device
US8011010B2 (en) * 2007-04-17 2011-08-30 Microsoft Corporation Using antimalware technologies to perform offline scanning of virtual machine images
US8402529B1 (en) * 2007-05-30 2013-03-19 M86 Security, Inc. Preventing propagation of malicious software during execution in a virtual machine
GB2459097B (en) * 2008-04-08 2012-03-28 Advanced Risc Mach Ltd A method and apparatus for processing and displaying secure and non-secure data
FR2934395B1 (fr) * 2008-07-23 2013-01-04 Trusted Logic Systeme et procede pour la securisation d'une interface utilisateur
US20100125741A1 (en) * 2008-11-20 2010-05-20 Seagate Technology Llc Optical disc emulator
US9065812B2 (en) 2009-01-23 2015-06-23 Microsoft Technology Licensing, Llc Protecting transactions
US20110102443A1 (en) 2009-11-04 2011-05-05 Microsoft Corporation Virtualized GPU in a Virtual Machine Environment
US8605044B2 (en) 2010-02-12 2013-12-10 Maxim Integrated Products, Inc. Trusted display based on display device emulation
US20110208963A1 (en) * 2010-02-24 2011-08-25 Aviv Soffer Secured kvm system having remote controller-indicator
CN103109294B (zh) * 2010-05-20 2016-02-03 高赛科实验室公司 具有外围保护功能的计算机母板
CN107608755A (zh) * 2010-07-01 2018-01-19 纽戴纳公司 为了优化群集特定配置的使用而按进程类型在群集之间分割进程
CN102118393B (zh) * 2011-01-21 2013-09-18 成都卫士通信息产业股份有限公司 一种物联网安全感知汇聚设备

Also Published As

Publication number Publication date
EP2629234A2 (en) 2013-08-21
US8813218B2 (en) 2014-08-19
KR20130093565A (ko) 2013-08-22
US20140359753A1 (en) 2014-12-04
US9342711B2 (en) 2016-05-17
AU2013200681A1 (en) 2013-08-29
US20130212671A1 (en) 2013-08-15
JP2013178764A (ja) 2013-09-09
EP2629234A3 (en) 2013-10-02
AU2013200681B2 (en) 2015-08-13
CN103353931B (zh) 2017-10-24
US10061928B2 (en) 2018-08-28
CA2804726C (en) 2020-07-07
EP2629234B1 (en) 2019-09-04
KR102092299B1 (ko) 2020-03-24
US20160259940A1 (en) 2016-09-08
CA2804726A1 (en) 2013-08-14
CN103353931A (zh) 2013-10-16
JP5976564B2 (ja) 2016-08-23

Similar Documents

Publication Publication Date Title
IN2013CH00583A (zh)
EP2558949A4 (en) FAST COMPLETE BACKUP OF A VIRTUAL MACHINE SHARED BY A GROUP
GB2514286A (en) Augmented screen sharing in an electonic meeting
EP2529288A4 (en) GESTURES OF EDGE
GB2483167B (en) Storage device with separate application and interface processors
WO2014134104A3 (en) System and method for virtual displays
MX2016006107A (es) Agregado y presentacion de informacion de evento.
TW201211897A (en) Programmable device, hierarchical parallel machines, methods for providing state information
PH12014502633A1 (en) Network based management of protected data sets
GB2508529A (en) Bios network access
GB2509647A (en) Testing transaction applications
MX2013013922A (es) Acceso de articulo con intermediarios para aplicaciones aisladas.
AR090922A1 (es) Computadoras de flujo que tienen interfaces de protocolo de comunicaciones inalambricas, y metodos relacionados
NZ701152A (en) System and method for unlimited multi-user computer desktop environment
PH12014501547B1 (en) System, method and computer program arranged to facilitate a transaction
MX2015017684A (es) Habilitación de acceso de datos.
TW201714049A (en) Display devices with virtual representations of electronic devices
Bhardwaj et al. Contribution of charge pions elliptic flow in relativistic heavy ion collisions
DE202011103665U8 (de) Halterung für elektronische Eingabe-, Ausgabe- und Lesegeräte, insbesondere für Tablet-Computer und eBook-Lesegeräte
Snyder Climate education across the spectrum
Maysami Sadr Decomposition of functions between Banach spaces in the orthogonality equation
UA64546U (ru) Квантовое нечеткое вычислительное средство второго рода
UA89646U (uk) Пристрій для обробки знань
UA79673U (ru) Устройство для контроля данных компьютерных устройств телекоммуникационной системы, которые функционируют в классе остатков
González Arenas et al. Nonlinear inhomogeneous Fokker-Planck equation within a generalized Stratonovich prescription