JP2019122030A - コード署名の条件付き規定に基づくセキュアクライアント認証 - Google Patents
コード署名の条件付き規定に基づくセキュアクライアント認証 Download PDFInfo
- Publication number
- JP2019122030A JP2019122030A JP2018217068A JP2018217068A JP2019122030A JP 2019122030 A JP2019122030 A JP 2019122030A JP 2018217068 A JP2018217068 A JP 2018217068A JP 2018217068 A JP2018217068 A JP 2018217068A JP 2019122030 A JP2019122030 A JP 2019122030A
- Authority
- JP
- Japan
- Prior art keywords
- legal
- host
- boot process
- memory
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 78
- 230000008569 process Effects 0.000 claims abstract description 61
- 230000004044 response Effects 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Power Engineering (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
Description
システムの説明
メモリサブシステムによるプログラムコード署名の条件付き規定
24:セキュアクライアントデバイス
28:リモートサーバー
32:通信ネットワーク
36:ホストプロセッサ
40:不揮発性メモリ
44:メモリサブシステム
48:ホストインターフェース
56:プロセッサ
60:揮発性レジスタ
70、74、78、82、86、90、94、98、102:ステップ
Claims (12)
- 不揮発性メモリにアクセスするためのメモリインターフェースと、
ホストと通信するためのホストインターフェースと、
プロセッサと、
を含み、前記プロセッサが、
前記ホストによって使用され、前記不揮発性メモリに保存されたプログラムコードにより署名を計算し、
前記ホストが行ったブートプロセスを検出すると、前記ブートプロセスが合法であるかどうかを検証し、
前記ブートプロセスが合法であると検証された場合にのみ、前記ホストに前記署名を提供して、リモートサーバーに対して認証を行うよう構成されたメモリサブシステム。 - 前記プロセッサが、前記署名を揮発性レジスタに保存し、前記ブートプロセスが合法でないことが検出されると、それに応じて前記揮発性レジスタを消去するよう構成された請求項1に記載のメモリサブシステム。
- 前記プロセッサが、前記不揮発性メモリに対する前記ホストの1つまたはそれ以上の第1アクセスが合法であると事前に定義されたメモリアドレスの範囲にアドレス指定されているかどうかを検証することによって、前記ブートプロセスが合法であるかどうかを検証するよう構成された請求項1に記載のメモリサブシステム。
- 前記ブートプロセスが合法であると検証された時、前記プロセッサが、合法であると事前に定義された前記メモリアドレスの範囲を修正するよう構成された請求項3に記載のメモリサブシステム。
- 不揮発性メモリと、
ホストと、
メモリサブシステムと、
を含み、前記メモリサブシステムが、
前記ホストのために前記不揮発性メモリにアクセスし、
前記ホストによって使用され、前記不揮発性メモリに保存されたプログラムコードにより署名を計算し、
前記ホストが行ったブートプロセスを検出すると、前記ブートプロセスが合法であるかどうかを検証し、
前記ブートプロセスが合法であると検証された場合にのみ、前記ホストに前記署名を提供して、リモートサーバーに対して認証を行うよう構成されたセキュアクライアントデバイス。 - 前記メモリサブシステムが、前記署名を揮発性レジスタに保存し、前記ブートプロセスが合法でないことが検出されると、それに応じて前記揮発性レジスタを消去するよう構成された請求項5に記載のセキュアクライアントデバイス。
- 前記メモリサブシステムが、前記不揮発性メモリに対する前記ホストの1つまたはそれ以上の第1アクセスが合法であると事前に定義されたメモリアドレスの範囲にアドレス指定されているかどうかを検証することによって、前記ブートプロセスが合法であるかどうかを検証するよう構成された請求項5に記載のセキュアクライアントデバイス。
- 前記ブートプロセスが合法であると検証された時、前記メモリサブシステムが、合法であると事前に定義された前記メモリアドレスの範囲を修正するよう構成された請求項7に記載のセキュアクライアントデバイス。
- ホストによって使用され、不揮発性メモリに保存されたプログラムコードにより署名を計算することと、
前記ホストが行ったブートプロセスを検出すると、前記ブートプロセスが合法であるかどうかを検証することと、
前記ブートプロセスが合法であると検証された場合にのみ、前記ホストに前記署名を提供して、リモートサーバーに対して認証を行うことと、
を含む方法。 - 前記署名を揮発性レジスタに保存し、前記ブートプロセスが合法でないことが検出されると、それに応じて前記揮発性レジスタを消去することを含む請求項9に記載の方法。
- 前記ブートプロセスが合法であるかどうかを検証することが、前記不揮発性メモリに対する前記ホストの1つまたはそれ以上の第1アクセスが合法であると事前に定義されたメモリアドレスの範囲にアドレス指定されているかどうかを検証することを含む請求項9に記載の方法。
- 前記ブートプロセスが合法であると検証された時、合法であると事前に定義された前記メモリアドレスの範囲を修正することを含む請求項11に記載の方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/859,780 US10757087B2 (en) | 2018-01-02 | 2018-01-02 | Secure client authentication based on conditional provisioning of code signature |
US15/859,780 | 2018-01-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2019122030A true JP2019122030A (ja) | 2019-07-22 |
JP6639620B2 JP6639620B2 (ja) | 2020-02-05 |
Family
ID=67058631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2018217068A Active JP6639620B2 (ja) | 2018-01-02 | 2018-11-20 | コード署名の条件付き規定に基づくセキュアクライアント認証 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10757087B2 (ja) |
JP (1) | JP6639620B2 (ja) |
KR (1) | KR102132534B1 (ja) |
CN (1) | CN109992966B (ja) |
TW (1) | TWI687840B (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022028632A (ja) * | 2020-08-03 | 2022-02-16 | 新唐科技股▲ふん▼有限公司 | デバイス、及び方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019025384A1 (en) * | 2017-08-02 | 2019-02-07 | British Telecommunications Public Limited Company | MALICIOUS HOST DETECTION |
US11258772B2 (en) * | 2018-06-19 | 2022-02-22 | Cypress Semiconductor Corporation | Secured communication from within non-volatile memory device |
CN109492352B (zh) * | 2018-10-09 | 2021-01-29 | 华为技术有限公司 | 一种设备标识组合引擎的实现方法及装置 |
US11734458B2 (en) * | 2019-02-26 | 2023-08-22 | Intel Corporation | Extensible layered trusted computing base for computing devices |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004523015A (ja) * | 2000-06-30 | 2004-07-29 | インテル・コーポレーション | 安全なメモリ区分を使用した安全な実行のための方法および装置 |
JP2005523537A (ja) * | 2002-04-18 | 2005-08-04 | インターナショナル・ビジネス・マシーンズ・コーポレーション | データ・アクセス制御機能を使用した、統合システム内でのセキュア動作の初期化、維持、更新および回復 |
JP2009175923A (ja) * | 2008-01-23 | 2009-08-06 | Dainippon Printing Co Ltd | プラットフォーム完全性検証システムおよび方法 |
US20100082968A1 (en) * | 2008-09-30 | 2010-04-01 | Bigfoot Networks, Inc. | Processor boot security device and methods thereof |
JP2014098951A (ja) * | 2012-11-13 | 2014-05-29 | Kddi Corp | 端末装置、完全性検証システム、およびプログラム |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6651171B1 (en) * | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
CN1277219C (zh) | 2003-01-15 | 2006-09-27 | 泽浦科技股份有限公司 | 储存单元数据保护方法以及系统 |
US20080005797A1 (en) * | 2006-06-30 | 2008-01-03 | Microsoft Corporation | Identifying malware in a boot environment |
DE102008011925B4 (de) * | 2008-02-29 | 2018-03-15 | Globalfoundries Inc. | Sicheres Initialisieren von Computersystemen |
US8775618B2 (en) * | 2010-08-02 | 2014-07-08 | Ebay Inc. | Application platform with flexible permissioning |
CN102164138A (zh) * | 2011-04-18 | 2011-08-24 | 奇智软件(北京)有限公司 | 一种保证用户网络安全性的方法及客户端 |
CN102521101B (zh) | 2011-12-08 | 2015-05-13 | 曙光信息产业(北京)有限公司 | 一种基于进程扫描的非法作业监控方法 |
WO2013101083A1 (en) * | 2011-12-29 | 2013-07-04 | Intel Corporation | An apparatus for hardware accelerated runtime integrity measurement |
US9769154B2 (en) * | 2012-04-25 | 2017-09-19 | Rowem Inc. | Passcode operating system, passcode apparatus, and super-passcode generating method |
TWI531202B (zh) | 2012-11-02 | 2016-04-21 | Keypasco Ab | 藉由使用者位置檢驗身份的網路安全驗證方法 |
US20140281500A1 (en) | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Systems, methods and apparatuses for remote attestation |
US9680872B1 (en) * | 2014-03-25 | 2017-06-13 | Amazon Technologies, Inc. | Trusted-code generated requests |
CN104021011A (zh) * | 2014-05-09 | 2014-09-03 | 苏州汇川技术有限公司 | 嵌入式设备程序升级系统及方法 |
US11269984B2 (en) * | 2014-12-09 | 2022-03-08 | Janus Technologies, Inc. | Method and apparatus for securing user operation of and access to a computer system |
JP6659220B2 (ja) * | 2015-01-27 | 2020-03-04 | ルネサスエレクトロニクス株式会社 | 通信装置、半導体装置、プログラムおよび通信システム |
CN104636256B (zh) | 2015-02-17 | 2017-10-24 | 中国农业银行股份有限公司 | 一种内存访问异常的检测方法及装置 |
CN106940769B (zh) * | 2017-03-01 | 2020-04-28 | 广州大学 | 操作系统安全远程加载方法 |
-
2018
- 2018-01-02 US US15/859,780 patent/US10757087B2/en active Active
- 2018-08-14 TW TW107128381A patent/TWI687840B/zh active
- 2018-08-21 CN CN201810951808.6A patent/CN109992966B/zh active Active
- 2018-09-28 KR KR1020180115600A patent/KR102132534B1/ko active IP Right Grant
- 2018-11-20 JP JP2018217068A patent/JP6639620B2/ja active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004523015A (ja) * | 2000-06-30 | 2004-07-29 | インテル・コーポレーション | 安全なメモリ区分を使用した安全な実行のための方法および装置 |
JP2005523537A (ja) * | 2002-04-18 | 2005-08-04 | インターナショナル・ビジネス・マシーンズ・コーポレーション | データ・アクセス制御機能を使用した、統合システム内でのセキュア動作の初期化、維持、更新および回復 |
JP2009175923A (ja) * | 2008-01-23 | 2009-08-06 | Dainippon Printing Co Ltd | プラットフォーム完全性検証システムおよび方法 |
US20100082968A1 (en) * | 2008-09-30 | 2010-04-01 | Bigfoot Networks, Inc. | Processor boot security device and methods thereof |
JP2014098951A (ja) * | 2012-11-13 | 2014-05-29 | Kddi Corp | 端末装置、完全性検証システム、およびプログラム |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022028632A (ja) * | 2020-08-03 | 2022-02-16 | 新唐科技股▲ふん▼有限公司 | デバイス、及び方法 |
JP7113123B2 (ja) | 2020-08-03 | 2022-08-04 | 新唐科技股▲ふん▼有限公司 | デバイス、及び方法 |
Also Published As
Publication number | Publication date |
---|---|
KR102132534B1 (ko) | 2020-07-10 |
JP6639620B2 (ja) | 2020-02-05 |
KR20190082658A (ko) | 2019-07-10 |
CN109992966B (zh) | 2023-06-27 |
CN109992966A (zh) | 2019-07-09 |
TWI687840B (zh) | 2020-03-11 |
US10757087B2 (en) | 2020-08-25 |
TW201931191A (zh) | 2019-08-01 |
US20190207917A1 (en) | 2019-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6639620B2 (ja) | コード署名の条件付き規定に基づくセキュアクライアント認証 | |
EP2854066B1 (en) | System and method for firmware integrity verification using multiple keys and OTP memory | |
JP5500458B2 (ja) | プロセッサメインメモリのメモリコンテンツのセキュリティ保護 | |
TWI607376B (zh) | 用於處理改變依照統一可延伸韌體介面計算裝置中之系統安全資料庫及韌體儲存區請求的系統及方法 | |
CN111030822B (zh) | 用于保护固件的方法和系统,以及计算机可读介质 | |
US20210167960A1 (en) | Certifying Authenticity of Stored Code and Code Updates | |
WO2021249359A1 (zh) | 数据完整性保护的方法和装置 | |
US11960632B2 (en) | Data attestation in memory | |
US11683155B2 (en) | Validating data stored in memory using cryptographic hashes | |
US20220382874A1 (en) | Secure computation environment | |
US11816202B2 (en) | Run-time code execution validation | |
WO2009153387A1 (en) | Software loading method and apparatus | |
US20180025150A1 (en) | Authenticated access to manageability hardware components | |
US20220021544A1 (en) | Secure Serial Peripheral Interface (SPI) Flash | |
CN113515779A (zh) | 文件的完整性校验方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20181120 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20190807 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190820 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20191113 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20191203 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20191224 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6639620 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |