JP2013251016A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2013251016A5 JP2013251016A5 JP2013194105A JP2013194105A JP2013251016A5 JP 2013251016 A5 JP2013251016 A5 JP 2013251016A5 JP 2013194105 A JP2013194105 A JP 2013194105A JP 2013194105 A JP2013194105 A JP 2013194105A JP 2013251016 A5 JP2013251016 A5 JP 2013251016A5
- Authority
- JP
- Japan
- Prior art keywords
- master
- processor
- authenticated code
- code module
- entry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 17
- 230000003466 anti-cipated effect Effects 0.000 description 1
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/650,579 US9202015B2 (en) | 2009-12-31 | 2009-12-31 | Entering a secured computing environment using multiple authenticated code modules |
| US12/650,579 | 2009-12-31 |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010277703A Division JP5373753B2 (ja) | 2009-12-31 | 2010-12-14 | 複数の認証済みコードモジュールを利用するプロセッサ、方法、及びシステム |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2013251016A JP2013251016A (ja) | 2013-12-12 |
| JP2013251016A5 true JP2013251016A5 (enExample) | 2014-01-30 |
| JP5752767B2 JP5752767B2 (ja) | 2015-07-22 |
Family
ID=44188915
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010277703A Expired - Fee Related JP5373753B2 (ja) | 2009-12-31 | 2010-12-14 | 複数の認証済みコードモジュールを利用するプロセッサ、方法、及びシステム |
| JP2013194105A Expired - Fee Related JP5752767B2 (ja) | 2009-12-31 | 2013-09-19 | 複数の認証済みコードモジュールを利用するプロセッサ、方法、及びシステム |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2010277703A Expired - Fee Related JP5373753B2 (ja) | 2009-12-31 | 2010-12-14 | 複数の認証済みコードモジュールを利用するプロセッサ、方法、及びシステム |
Country Status (6)
| Country | Link |
|---|---|
| US (2) | US9202015B2 (enExample) |
| JP (2) | JP5373753B2 (enExample) |
| CN (1) | CN102122327B (enExample) |
| BR (1) | BRPI1005586A2 (enExample) |
| DE (1) | DE102010054614A1 (enExample) |
| TW (1) | TWI582632B (enExample) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9202015B2 (en) * | 2009-12-31 | 2015-12-01 | Intel Corporation | Entering a secured computing environment using multiple authenticated code modules |
| WO2012023050A2 (en) | 2010-08-20 | 2012-02-23 | Overtis Group Limited | Secure cloud computing system and method |
| US9596082B2 (en) | 2011-12-15 | 2017-03-14 | Intel Corporation | Secure debug trace messages for production authenticated code modules |
| US9930066B2 (en) | 2013-02-12 | 2018-03-27 | Nicira, Inc. | Infrastructure level LAN security |
| US20150082006A1 (en) * | 2013-09-06 | 2015-03-19 | Futurewei Technologies, Inc. | System and Method for an Asynchronous Processor with Asynchronous Instruction Fetch, Decode, and Issue |
| US9734313B2 (en) | 2014-06-16 | 2017-08-15 | Huawei Technologies Co., Ltd. | Security mode prompt method and apparatus |
| CN105335672B (zh) * | 2014-06-16 | 2020-12-04 | 华为技术有限公司 | 一种安全模式提示方法及装置 |
| US9613218B2 (en) | 2014-06-30 | 2017-04-04 | Nicira, Inc. | Encryption system in a virtualized environment |
| US10181027B2 (en) * | 2014-10-17 | 2019-01-15 | Intel Corporation | Interface between a device and a secure processing environment |
| US10079880B2 (en) * | 2015-06-07 | 2018-09-18 | Apple Inc. | Automatic identification of invalid participants in a secure synchronization system |
| US10798073B2 (en) | 2016-08-26 | 2020-10-06 | Nicira, Inc. | Secure key management protocol for distributed network encryption |
| EP3788528B1 (en) * | 2018-04-30 | 2022-12-14 | Google LLC | Enclave interactions |
| CN112005237B (zh) | 2018-04-30 | 2024-04-30 | 谷歌有限责任公司 | 安全区中的处理器与处理加速器之间的安全协作 |
| DE102018120347A1 (de) * | 2018-08-21 | 2020-02-27 | Pilz Gmbh & Co. Kg | Automatisierungssystem zur Überwachung eines sicherheitskritischen Prozesses |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS62126451A (ja) * | 1985-11-27 | 1987-06-08 | Mitsubishi Electric Corp | 分散処理装置のイニシヤルプログラムロ−ド方式 |
| JPS62128354A (ja) | 1985-11-29 | 1987-06-10 | Fuji Electric Co Ltd | マルチプロセツサシステムの起動方式 |
| US6948070B1 (en) * | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
| JP2000215093A (ja) * | 1999-01-27 | 2000-08-04 | Fuji Photo Film Co Ltd | 画像ファイル装置および方法 |
| US7360076B2 (en) | 2001-06-13 | 2008-04-15 | Itt Manufacturing Enterprises, Inc. | Security association data cache and structure |
| TW583568B (en) | 2001-08-27 | 2004-04-11 | Dataplay Inc | A secure access method and system |
| US20030126454A1 (en) | 2001-12-28 | 2003-07-03 | Glew Andrew F. | Authenticated code method and apparatus |
| US7627753B2 (en) | 2002-03-19 | 2009-12-01 | Microsoft Corporation | Secure digital data format and code enforced policy |
| US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| KR20040099253A (ko) * | 2002-04-23 | 2004-11-26 | 마쯔시다덴기산교 가부시키가이샤 | 서버 장치 및 프로그램 관리 시스템 |
| US20040117318A1 (en) * | 2002-12-16 | 2004-06-17 | Grawrock David W. | Portable token controlling trusted environment launch |
| US7103779B2 (en) * | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
| US7698552B2 (en) | 2004-06-03 | 2010-04-13 | Intel Corporation | Launching a secure kernel in a multiprocessor system |
| JP4447977B2 (ja) * | 2004-06-30 | 2010-04-07 | 富士通マイクロエレクトロニクス株式会社 | セキュアプロセッサ、およびセキュアプロセッサ用プログラム。 |
| JP4522372B2 (ja) | 2005-02-07 | 2010-08-11 | 株式会社ソニー・コンピュータエンタテインメント | プロセッサと外部のデバイスとの間にセキュアセッションを実現する方法および装置 |
| US7752428B2 (en) * | 2005-03-31 | 2010-07-06 | Intel Corporation | System and method for trusted early boot flow |
| US7831778B2 (en) | 2006-03-30 | 2010-11-09 | Silicon Image, Inc. | Shared nonvolatile memory architecture |
| US8458726B2 (en) * | 2007-12-03 | 2013-06-04 | Intel Corporation | Bios routine avoidance |
| FR2918830B1 (fr) | 2007-07-13 | 2009-10-30 | Viaccess Sa | Verification de code mac sans revelation. |
| US20090204823A1 (en) * | 2008-02-07 | 2009-08-13 | Analog Devices, Inc. | Method and apparatus for controlling system access during protected modes of operation |
| US9202015B2 (en) * | 2009-12-31 | 2015-12-01 | Intel Corporation | Entering a secured computing environment using multiple authenticated code modules |
-
2009
- 2009-12-31 US US12/650,579 patent/US9202015B2/en not_active Expired - Fee Related
-
2010
- 2010-12-13 TW TW099143486A patent/TWI582632B/zh not_active IP Right Cessation
- 2010-12-14 JP JP2010277703A patent/JP5373753B2/ja not_active Expired - Fee Related
- 2010-12-15 DE DE102010054614A patent/DE102010054614A1/de not_active Withdrawn
- 2010-12-23 BR BRPI1005586-0A patent/BRPI1005586A2/pt not_active Application Discontinuation
- 2010-12-24 CN CN201010625143.3A patent/CN102122327B/zh not_active Expired - Fee Related
-
2013
- 2013-03-15 US US13/837,837 patent/US9208292B2/en not_active Expired - Fee Related
- 2013-09-19 JP JP2013194105A patent/JP5752767B2/ja not_active Expired - Fee Related
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2013251016A5 (enExample) | ||
| ES2652255T3 (es) | Descubrimiento punto a punto | |
| CN104995629B (zh) | 用于平台引导固件的信任继续的方法、设备和系统 | |
| US10129018B2 (en) | Hybrid SM3 and SHA acceleration processors | |
| US9009480B1 (en) | Techniques for handshake-free encrypted communication using public key bootstrapping | |
| JP5752767B2 (ja) | 複数の認証済みコードモジュールを利用するプロセッサ、方法、及びシステム | |
| US10635404B2 (en) | Mixed-coordinate point multiplication | |
| US8954754B2 (en) | Method and apparatus to process SHA-1 secure hashing algorithm | |
| WO2016048496A1 (en) | Encryption integrity check in memory | |
| WO2017058408A3 (en) | Protect non-memory encryption engine (non-mee) metadata in trusted execution environment | |
| JP2016512675A5 (enExample) | ||
| GB2520859A (en) | Instruction set for SHA1 round processing on 128-BIT data paths | |
| FI3489835T3 (fi) | Osoitteen vahvistaminen allekirjoitusten avulla | |
| WO2014140818A3 (en) | Method, system and device for generating, storing, using, and validating tags and data | |
| NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
| RU2012101207A (ru) | Способ управления работой шинной системы, прежде всего шины can | |
| BRPI0915412A2 (pt) | sistema e método de gerenciamento de memória seguro | |
| US10140458B2 (en) | Parallelized authentication encoding | |
| TW201626219A (zh) | 韌體映像之作業系統未知驗證 | |
| GB2580275A (en) | Memory access broker system with application-controlled early write acknowledgment support | |
| US20210374497A1 (en) | Genuine product multi-layered security and authentication | |
| US10198600B2 (en) | Transparent execution of secret content | |
| RU2014138912A (ru) | Установление взаимного физического местоположения защищенных сред выполнения | |
| EP3057027B1 (en) | Method for secure data reading, computer program product and data handling system | |
| US11356367B2 (en) | Secure preloading of serverless function sequences |