JP5670578B2 - 機密コードおよびデータを保護するためのアーキテクチャを含む方法および装置 - Google Patents
機密コードおよびデータを保護するためのアーキテクチャを含む方法および装置 Download PDFInfo
- Publication number
- JP5670578B2 JP5670578B2 JP2013535042A JP2013535042A JP5670578B2 JP 5670578 B2 JP5670578 B2 JP 5670578B2 JP 2013535042 A JP2013535042 A JP 2013535042A JP 2013535042 A JP2013535042 A JP 2013535042A JP 5670578 B2 JP5670578 B2 JP 5670578B2
- Authority
- JP
- Japan
- Prior art keywords
- samu
- code
- secure
- memory
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 35
- 238000004519 manufacturing process Methods 0.000 claims description 11
- 238000010200 validation analysis Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims 5
- 230000004913 activation Effects 0.000 claims 2
- 230000006870 function Effects 0.000 description 21
- 230000008569 process Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 11
- 238000012795 verification Methods 0.000 description 11
- 238000007726 management method Methods 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 7
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 5
- 230000001133 acceleration Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000013478 data encryption standard Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 229910052710 silicon Inorganic materials 0.000 description 3
- 239000010703 silicon Substances 0.000 description 3
- 238000013519 translation Methods 0.000 description 3
- 102100022523 Acetoacetyl-CoA synthetase Human genes 0.000 description 2
- 101000678027 Homo sapiens Acetoacetyl-CoA synthetase Proteins 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005530 etching Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 101100234002 Drosophila melanogaster Shal gene Proteins 0.000 description 1
- 235000015076 Shorea robusta Nutrition 0.000 description 1
- 244000166071 Shorea robusta Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Description
Claims (18)
- プログラムコードまたはデータのセキュアな実行環境を提供するための方法であって、
前記コードまたはデータの機密性を認証および維持するために、コードを暗号化フォーマットでホストプロセッサからセキュア資産管理ユニット(SAMU)にオフロードするステップと、
前記コードが、前記SAMUの外部消費向けであるか内部消費向けであるかを判定するステップと、
前記コードが前記SAMUの外部消費向けである場合に、機密データの高度暗号化標準(AES)を適用するステップと、
前記コードが前記SAMU内の消費向けである場合に、命令キャッシュまたはデータキャッシュ内へのメモリ読み出し動作において、変調したAES復号化を実行し、前記命令キャッシュまたは前記データキャッシュのラインがフラッシュしているときのメモリ書き込み動作において、変調したAES暗号化を実行するステップであって、前記変調したAES暗号化および前記変調したAES復号化は、標準AES動作の前後においてハードウェア内の専用スクランブリングを用いて変調されているステップと、
を含む、方法。 - 前記オフロードするステップは、前記SAMUによって用いられる署名ツールにおいて生成されたランダム鍵によって、暗号化2値ブートイメージを生成するステップを含む、請求項1に記載の方法。
- 前記暗号化2値ブートイメージは、前記SAMUのために暗号化され、前記SAMU用のセキュアなカーネルおよびセキュアなアプリケーションとして提供される、請求項2に記載の方法。
- ユーザは、前記暗号化2値ブートイメージをインストールし、前記暗号化2値ブートイメージをオンデマンドで前記SAMUに提供する、請求項3に記載の方法。
- 前記暗号化2値ブートイメージをインテグリティについて有効化した後に、前記SAMUと共に用いられる復号化鍵を、ブートリードオンリーメモリ(ROM)を用いて構成するステップ、
をさらに含む、請求項4に記載の方法。 - 前記SAMUと共に用いられる復号化鍵を、前記ブートROMによって生成するステップと、
肯定的な有効化に応じて、前記暗号化2値ブートイメージに制御を送るステップと、
をさらに含む、請求項5に記載の方法。 - 有効化が否定的な場合に応じてSAMUサービスがさらされず、前記アプリケーションはソフトウェアベースの保護スキームに戻る、請求項5に記載の方法。
- プログラムコードまたはデータのためのセキュアな実行環境を提供するためのシステムであって、
コードを含む少なくとも1つのアプリケーションをホストプロセッサ上で実行するように構成されたコンピュータと、
プログラムコードを実行するように構成されたセキュアな資産管理ユニット(SAMU)であって、前記SAMUは、前記コンピュータに接続されており、コードを、暗号化されたフォーマットで前記ホストプロセッサからオフロードして、前記コードの機密性を認証および維持するように構成されている、セキュアな資産管理ユニット(SAMU)と、
を含み、
前記SAMUは、
命令キャッシュと、
データキャッシュと、
メモリインターフェースと、
前記メモリインターフェース、前記命令キャッシュおよび前記データキャッシュに接続されたメモリ暗号化コンポーネントであって、前記コードが前記セキュアな実行環境内のみの消費向けである場合に、前記命令キャッシュまたは前記データキャッシュ内へのメモリ読み出し動作において、変調したAES復号化を実行し、前記命令キャッシュまたは前記データキャッシュのラインがフラッシュしているときのメモリ書き込み動作において、変調したAES暗号化を実行するように構成されたメモリ暗号化コンポーネントと、を備え、
前記変調したAES暗号化および前記変調したAES復号化は、標準AES動作の前後においてハードウェア内の専用スクランブリングを用いて変調されている、
システム。 - 前記SAMUは、前記オフロードすることの一部として、SAMUによって使用される署名ツールにおいて生成されたランダム鍵によって、暗号化2値ブートイメージを生成するようにさらに構成されている、請求項8に記載のシステム。
- 前記暗号化2値ブートイメージは、前記SAMUのために暗号化され、SAMUのためのセキュアなカーネルおよびセキュアなアプリケーションとして提供される、請求項9に記載のシステム。
- ユーザは、前記暗号化2値ブートイメージを前記システム上にインストールし、前記暗号化2値ブートイメージを前記SAMUへオンデマンドで提供する、請求項10に記載のシステム。
- 前記SAMUは、前記暗号化2値ブートイメージをインテグリティについて有効化した後、前記SAMUと共に用いられる復号化鍵をブートリードオンリーメモリ(ROM)を用いて構成するようにさらに構成されている、請求項11に記載のシステム。
- 前記ブートROMは、前記SAMUと共に用いられる復号化鍵の生成と、肯定的な有効化に応じて前記暗号化2値ブートイメージへの制御送りとを行うようにさらに構成されている、請求項12に記載のシステム。
- 有効化が否定的な場合に応じてSAMUサービスはさらされず、前記アプリケーションは認証のためにソフトウェアベースの保護スキームに後退する、請求項12に記載のシステム。
- 1つ以上のプロセッサによって実行される1組の命令を記憶するコンピュータ可読記憶媒体であって、前記1組の命令は、セキュアな資産管理ユニット(SAMU)の製造を容易にするためのものであり、前記SAMUは、
プログラムコードを実行することと、
機密プログラムコードを暗号化フォーマットでプロセッサからオフロードして、前記機密プログラムコードの機密性を認証および維持することと、
前記機密プログラムコードが、前記SAMUの外部消費向けであるか内部消費向けであるかを判定し、前記機密プログラムコードがセキュアな実行環境内のみの消費向けである場合に、命令キャッシュまたはデータキャッシュ内へのメモリ読み出し動作において、変調したAES復号化を実行し、前記命令キャッシュまたは前記データキャッシュのラインがフラッシュしているときのメモリ書き込み動作において、変調したAES暗号化を実行することと、
を行うように構成されており、
前記変調したAES暗号化および前記変調したAES復号化は、標準AES動作の前後においてハードウェア内の専用スクランブリングを用いて変調されている
コンピュータ可読記憶媒体。 - 前記命令はハードウェア記述言語(HDL)命令であり、デバイスの製造に用いられる、請求項15に記載のコンピュータ可読記憶媒体。
- メモリ管理ユニットのハードウェアレジスタに記憶され、前記SAMUのプロセッサコアにのみアクセス可能な仮想アドレスページテーブルを用いるステップであって、前記セキュアなカーネルの機密プログラムコードがユーザコードまたはデータを保護する暗号鍵と独立した鍵で保護されるように、異なるページ入力が異なる暗号鍵と関連付けられており、読み出しおよび書き込み制御がページごとに定義されている、ステップと、
前記ページへの読み出しまたは書き込みアクセスが許可される前に、コード実行中の最小保護リングを指定するステップと、
をさらに含む、請求項3に記載の方法。 - 前記メモリ暗号化コンポーネントは、暗号化フラグに応じてオン・オフされる、請求項1に記載の方法。
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US40504510P | 2010-10-20 | 2010-10-20 | |
US40505410P | 2010-10-20 | 2010-10-20 | |
US61/405,045 | 2010-10-20 | ||
US61/405,054 | 2010-10-20 | ||
US12/964,278 US8904190B2 (en) | 2010-10-20 | 2010-12-09 | Method and apparatus including architecture for protecting sensitive code and data |
US12/964,278 | 2010-12-09 | ||
US12/975,555 | 2010-12-22 | ||
US12/975,555 US8489898B2 (en) | 2010-10-20 | 2010-12-22 | Method and apparatus for including architecture for protecting multi-user sensitive code and data |
PCT/US2011/056895 WO2012054609A1 (en) | 2010-10-20 | 2011-10-19 | Method and apparatus including architecture for protecting sensitive code and data |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2013545182A JP2013545182A (ja) | 2013-12-19 |
JP2013545182A5 JP2013545182A5 (ja) | 2014-12-04 |
JP5670578B2 true JP5670578B2 (ja) | 2015-02-18 |
Family
ID=45973980
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2013535046A Active JP5537742B2 (ja) | 2010-10-20 | 2011-10-19 | 多ユーザ機密コードおよびデータを保護するためのアーキテクチャを含む方法および装置 |
JP2013535042A Active JP5670578B2 (ja) | 2010-10-20 | 2011-10-19 | 機密コードおよびデータを保護するためのアーキテクチャを含む方法および装置 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2013535046A Active JP5537742B2 (ja) | 2010-10-20 | 2011-10-19 | 多ユーザ機密コードおよびデータを保護するためのアーキテクチャを含む方法および装置 |
Country Status (6)
Country | Link |
---|---|
US (2) | US8904190B2 (ja) |
EP (2) | EP2630608B1 (ja) |
JP (2) | JP5537742B2 (ja) |
KR (2) | KR101397637B1 (ja) |
CN (2) | CN103210396B (ja) |
WO (2) | WO2012054615A1 (ja) |
Families Citing this family (175)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8904190B2 (en) * | 2010-10-20 | 2014-12-02 | Advanced Micro Devices, Inc. | Method and apparatus including architecture for protecting sensitive code and data |
US10511630B1 (en) | 2010-12-10 | 2019-12-17 | CellSec, Inc. | Dividing a data processing device into separate security domains |
US9569633B2 (en) * | 2012-06-29 | 2017-02-14 | Intel Corporation | Device, system, and method for processor-based data protection |
WO2014022755A2 (en) * | 2012-08-02 | 2014-02-06 | Cellsec Limited | Automated multi-level federation and enforcement of information management policies in a device network |
US10305937B2 (en) | 2012-08-02 | 2019-05-28 | CellSec, Inc. | Dividing a data processing device into separate security domains |
US9294508B2 (en) | 2012-08-02 | 2016-03-22 | Cellsec Inc. | Automated multi-level federation and enforcement of information management policies in a device network |
US9703945B2 (en) | 2012-09-19 | 2017-07-11 | Winbond Electronics Corporation | Secured computing system with asynchronous authentication |
US9507540B1 (en) * | 2013-03-14 | 2016-11-29 | Amazon Technologies, Inc. | Secure virtual machine memory allocation management via memory usage trust groups |
US11669441B1 (en) | 2013-03-14 | 2023-06-06 | Amazon Technologies, Inc. | Secure virtual machine reboot via memory allocation recycling |
US9323552B1 (en) | 2013-03-14 | 2016-04-26 | Amazon Technologies, Inc. | Secure virtual machine memory allocation management via dedicated memory pools |
US9247316B2 (en) * | 2013-04-23 | 2016-01-26 | Microsoft Technology Licensing, Llc | Protected media decoding using a secure operating system |
US9495544B2 (en) | 2013-06-27 | 2016-11-15 | Visa International Service Association | Secure data transmission and verification with untrusted computing devices |
KR101471589B1 (ko) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | 공통중간언어 기반 프로그램을 위한 보안 제공 방법 |
US9455962B2 (en) | 2013-09-22 | 2016-09-27 | Winbond Electronics Corporation | Protecting memory interface |
US9343162B2 (en) | 2013-10-11 | 2016-05-17 | Winbond Electronics Corporation | Protection against side-channel attacks on non-volatile memory |
US9830456B2 (en) * | 2013-10-21 | 2017-11-28 | Cisco Technology, Inc. | Trust transference from a trusted processor to an untrusted processor |
US20150121054A1 (en) * | 2013-10-31 | 2015-04-30 | Advanced Micro Devices, Inc. | Platform Secure Boot |
EP3087520A4 (en) * | 2013-12-24 | 2017-08-16 | Intel Corporation | Content protection for data as a service (daas) |
US9318221B2 (en) | 2014-04-03 | 2016-04-19 | Winbound Electronics Corporation | Memory device with secure test mode |
WO2015154066A1 (en) | 2014-04-04 | 2015-10-08 | David Goldschlag | Method for authentication and assuring compliance of devices accessing external services |
US9438627B2 (en) | 2014-06-11 | 2016-09-06 | International Business Machines Corporation | Shared security utility appliance for secure application and data processing |
US9430619B2 (en) | 2014-09-10 | 2016-08-30 | Microsoft Technology Licensing, Llc | Media decoding control with hardware-protected digital rights management |
US9830289B2 (en) | 2014-09-16 | 2017-11-28 | Apple Inc. | Methods and apparatus for aggregating packet transfer over a virtual bus interface |
US9715402B2 (en) | 2014-09-30 | 2017-07-25 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
US9323556B2 (en) | 2014-09-30 | 2016-04-26 | Amazon Technologies, Inc. | Programmatic event detection and message generation for requests to execute program code |
US9830193B1 (en) | 2014-09-30 | 2017-11-28 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
US9678773B1 (en) | 2014-09-30 | 2017-06-13 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
US9146764B1 (en) | 2014-09-30 | 2015-09-29 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
US10048974B1 (en) | 2014-09-30 | 2018-08-14 | Amazon Technologies, Inc. | Message-based computation request scheduling |
US9600312B2 (en) | 2014-09-30 | 2017-03-21 | Amazon Technologies, Inc. | Threading as a service |
IL234956A (en) | 2014-10-02 | 2017-10-31 | Kaluzhny Uri | Data bus protection with enhanced key entropy |
US9971397B2 (en) | 2014-10-08 | 2018-05-15 | Apple Inc. | Methods and apparatus for managing power with an inter-processor communication link between independently operable processors |
CN104331470B (zh) * | 2014-10-31 | 2017-12-05 | 深圳市东信时代信息技术有限公司 | 基于缓存机制的数据处理方法及系统 |
EP3224759B8 (en) | 2014-11-26 | 2019-06-19 | Hewlett-Packard Development Company, L.P. | In-memory attack prevention |
US9858429B2 (en) * | 2014-12-01 | 2018-01-02 | Samsung Electronics Co., Ltd. | Methods of data transfer in electronic devices |
US9413626B2 (en) | 2014-12-05 | 2016-08-09 | Amazon Technologies, Inc. | Automatic management of resource sizing |
US9400674B2 (en) | 2014-12-11 | 2016-07-26 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing a virtual offload device |
US9886297B2 (en) | 2014-12-11 | 2018-02-06 | Amazon Technologies, Inc. | Systems and methods for loading a virtual machine monitor during a boot process |
US9424067B2 (en) | 2014-12-11 | 2016-08-23 | Amazon Technologies, Inc. | Managing virtual machine instances utilizing an offload device |
US9292332B1 (en) | 2014-12-11 | 2016-03-22 | Amazon Technologies, Inc. | Live updates for virtual machine monitor |
US9535798B1 (en) | 2014-12-19 | 2017-01-03 | Amazon Technologies, Inc. | Systems and methods for maintaining virtual component checkpoints on an offload device |
US10706182B2 (en) * | 2014-12-19 | 2020-07-07 | Private Machines Inc. | Systems and methods for using extended hardware security modules |
US9733967B2 (en) | 2015-02-04 | 2017-08-15 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
US9588790B1 (en) | 2015-02-04 | 2017-03-07 | Amazon Technologies, Inc. | Stateful virtual compute system |
KR102324336B1 (ko) * | 2015-03-20 | 2021-11-11 | 한국전자통신연구원 | 사용자 장치 및 그것에 대한 무결성 검증 방법 |
US10211985B1 (en) * | 2015-03-30 | 2019-02-19 | Amazon Technologies, Inc. | Validating using an offload device security component |
US9667414B1 (en) | 2015-03-30 | 2017-05-30 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10243739B1 (en) | 2015-03-30 | 2019-03-26 | Amazon Technologies, Inc. | Validating using an offload device security component |
JP6895666B2 (ja) | 2015-04-07 | 2021-06-30 | ランセーフ セキュリティー,インク. | バイナリ及びメモリ多様性による難読化システム及び方法関連出願の相互参照 |
US9785476B2 (en) | 2015-04-08 | 2017-10-10 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
US9930103B2 (en) | 2015-04-08 | 2018-03-27 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
JP2018514868A (ja) * | 2015-04-30 | 2018-06-07 | マイクロチップ テクノロジー インコーポレイテッドMicrochip Technology Incorporated | 改良された命令セットを有する中央処理ユニット |
KR101658641B1 (ko) * | 2015-06-12 | 2016-09-22 | 서울대학교산학협력단 | 하드웨어 기반의 커널 코드 삽입 공격 탐지 장치 및 그 방법 |
US10042794B2 (en) | 2015-06-12 | 2018-08-07 | Apple Inc. | Methods and apparatus for synchronizing uplink and downlink transactions on an inter-device communication link |
US10089500B2 (en) * | 2015-09-25 | 2018-10-02 | Intel Corporation | Secure modular exponentiation processors, methods, systems, and instructions |
US10142101B2 (en) * | 2015-09-29 | 2018-11-27 | Intel Corporation | Hardware enforced one-way cryptography |
US9928108B1 (en) | 2015-09-29 | 2018-03-27 | Amazon Technologies, Inc. | Metaevent handling for on-demand code execution environments |
US10042660B2 (en) | 2015-09-30 | 2018-08-07 | Amazon Technologies, Inc. | Management of periodic requests for compute capacity |
US9894061B2 (en) | 2015-10-16 | 2018-02-13 | International Business Machines Corporation | Method for booting and dumping a confidential image on a trusted computer system |
US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
US10013267B1 (en) | 2015-12-16 | 2018-07-03 | Amazon Technologies, Inc. | Pre-triggers for code execution environments |
US9811434B1 (en) | 2015-12-16 | 2017-11-07 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
US9910713B2 (en) | 2015-12-21 | 2018-03-06 | Amazon Technologies, Inc. | Code execution request routing |
US10002026B1 (en) | 2015-12-21 | 2018-06-19 | Amazon Technologies, Inc. | Acquisition and maintenance of dedicated, reserved, and variable compute capacity |
US10067801B1 (en) | 2015-12-21 | 2018-09-04 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
US10085214B2 (en) | 2016-01-27 | 2018-09-25 | Apple Inc. | Apparatus and methods for wake-limiting with an inter-device communication link |
US10191852B2 (en) | 2016-02-29 | 2019-01-29 | Apple Inc. | Methods and apparatus for locking at least a portion of a shared memory resource |
US10019571B2 (en) | 2016-03-13 | 2018-07-10 | Winbond Electronics Corporation | Protection from side-channel attacks by varying clock delays |
US10097606B2 (en) | 2016-03-14 | 2018-10-09 | Amazon Technologies, Inc. | Application streaming using access and execution environments |
EP3436927B1 (en) * | 2016-03-30 | 2023-12-13 | Amazon Technologies Inc. | Processing pre-existing data sets at an on-demand code execution environment |
US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
US10162672B2 (en) | 2016-03-30 | 2018-12-25 | Amazon Technologies, Inc. | Generating data streams from pre-existing data sets |
US10198364B2 (en) | 2016-03-31 | 2019-02-05 | Apple Inc. | Memory access protection apparatus and methods for memory mapped access between independently operable processors |
US10282229B2 (en) | 2016-06-28 | 2019-05-07 | Amazon Technologies, Inc. | Asynchronous task management in an on-demand network code execution environment |
US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
US10277708B2 (en) | 2016-06-30 | 2019-04-30 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
US10203990B2 (en) | 2016-06-30 | 2019-02-12 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
US10270598B2 (en) | 2016-08-26 | 2019-04-23 | Intel Corporation | Secure elliptic curve cryptography instructions |
CN106445808A (zh) * | 2016-08-29 | 2017-02-22 | 北京中电华大电子设计有限责任公司 | 一种具有控制程序单步调试功能的仿真器 |
US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
US10061613B1 (en) | 2016-09-23 | 2018-08-28 | Amazon Technologies, Inc. | Idempotent task execution in on-demand network code execution systems |
US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
US10551902B2 (en) | 2016-11-10 | 2020-02-04 | Apple Inc. | Methods and apparatus for providing access to peripheral sub-system registers |
US10775871B2 (en) | 2016-11-10 | 2020-09-15 | Apple Inc. | Methods and apparatus for providing individualized power control for peripheral sub-systems |
US10402273B2 (en) | 2016-12-14 | 2019-09-03 | Microsoft Technology Licensing, Llc | IoT device update failure recovery |
US10715526B2 (en) | 2016-12-14 | 2020-07-14 | Microsoft Technology Licensing, Llc | Multiple cores with hierarchy of trust |
US10416991B2 (en) * | 2016-12-14 | 2019-09-17 | Microsoft Technology Licensing, Llc | Secure IoT device update |
US10367639B2 (en) * | 2016-12-29 | 2019-07-30 | Intel Corporation | Graphics processor with encrypted kernels |
KR102617354B1 (ko) | 2017-01-05 | 2023-12-26 | 삼성전자주식회사 | 보안 부트 시퀀서 및 보안 부트 장치 |
US10404470B2 (en) * | 2017-01-13 | 2019-09-03 | Microsoft Technology Licensing, Llc | Signature verification of field-programmable gate array programs |
US10467416B2 (en) | 2017-06-16 | 2019-11-05 | International Business Machines Corporation | Securing operating system configuration using hardware |
US10567359B2 (en) | 2017-07-18 | 2020-02-18 | International Business Machines Corporation | Cluster of secure execution platforms |
US10346226B2 (en) | 2017-08-07 | 2019-07-09 | Time Warner Cable Enterprises Llc | Methods and apparatus for transmitting time sensitive data over a tunneled bus interface |
CN107563224B (zh) * | 2017-09-04 | 2020-07-28 | 浪潮集团有限公司 | 一种多用户物理隔离方法及装置 |
US10528768B2 (en) * | 2017-09-15 | 2020-01-07 | Intel Corporation | Methods and apparatus to provide user-level access authorization for cloud-based field-programmable gate arrays |
US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10303492B1 (en) | 2017-12-13 | 2019-05-28 | Amazon Technologies, Inc. | Managing custom runtimes in an on-demand code execution system |
US10331612B1 (en) | 2018-01-09 | 2019-06-25 | Apple Inc. | Methods and apparatus for reduced-latency data transmission with an inter-processor communication link between independently operable processors |
US10353678B1 (en) | 2018-02-05 | 2019-07-16 | Amazon Technologies, Inc. | Detecting code characteristic alterations due to cross-service calls |
US10572375B1 (en) | 2018-02-05 | 2020-02-25 | Amazon Technologies, Inc. | Detecting parameter validity in code including cross-service calls |
US10831898B1 (en) | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
US11792307B2 (en) | 2018-03-28 | 2023-10-17 | Apple Inc. | Methods and apparatus for single entity buffer pool management |
US10430352B1 (en) | 2018-05-18 | 2019-10-01 | Apple Inc. | Methods and apparatus for reduced overhead data transfer with a shared ring buffer |
US11714910B2 (en) * | 2018-06-13 | 2023-08-01 | Hewlett Packard Enterprise Development Lp | Measuring integrity of computing system |
EP3811264A4 (en) * | 2018-06-24 | 2022-03-02 | Hex Five Security, Inc. | CONFIGURATION, ENFORCEMENT AND MONITORING THE SEPARATION OF TRUSTED EXECUTION ENVIRONMENTS |
US10853115B2 (en) | 2018-06-25 | 2020-12-01 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
US10649749B1 (en) | 2018-06-26 | 2020-05-12 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
US11146569B1 (en) * | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
US11443072B2 (en) | 2018-06-29 | 2022-09-13 | Microsoft Technology Licensing, Llc | Peripheral device with resource isolation |
EP3595256A1 (de) * | 2018-07-13 | 2020-01-15 | Siemens Aktiengesellschaft | Vorrichtung und verfahren zum betreiben einer durch software gestalteten verarbeitungseinheit für ein gerät |
US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
US10585699B2 (en) | 2018-07-30 | 2020-03-10 | Apple Inc. | Methods and apparatus for verifying completion of groups of data transactions between processors |
US10846224B2 (en) | 2018-08-24 | 2020-11-24 | Apple Inc. | Methods and apparatus for control of a jointly shared memory-mapped region |
US10719376B2 (en) | 2018-08-24 | 2020-07-21 | Apple Inc. | Methods and apparatus for multiplexing data flows via a single data structure |
US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
US10789110B2 (en) | 2018-09-28 | 2020-09-29 | Apple Inc. | Methods and apparatus for correcting out-of-order data transactions between processors |
US10838450B2 (en) | 2018-09-28 | 2020-11-17 | Apple Inc. | Methods and apparatus for synchronization of time between independently operable processors |
US11126757B2 (en) * | 2018-10-19 | 2021-09-21 | Microsoft Technology Licensing, Llc | Peripheral device |
US11163701B2 (en) * | 2018-11-15 | 2021-11-02 | Intel Corporation | System, apparatus and method for integrity protecting tenant workloads in a multi-tenant computing environment |
US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
CN111562916B (zh) * | 2019-02-13 | 2023-04-21 | 百度在线网络技术(北京)有限公司 | 共享算法的方法和装置 |
US11206128B2 (en) | 2019-03-08 | 2021-12-21 | International Business Machines Corporation | Secure paging with page change detection |
US11403409B2 (en) | 2019-03-08 | 2022-08-02 | International Business Machines Corporation | Program interruptions for page importing/exporting |
US11347869B2 (en) * | 2019-03-08 | 2022-05-31 | International Business Machines Corporation | Secure interface control high-level page management |
US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
US11829303B2 (en) | 2019-09-26 | 2023-11-28 | Apple Inc. | Methods and apparatus for device driver operation in non-kernel space |
US11558348B2 (en) | 2019-09-26 | 2023-01-17 | Apple Inc. | Methods and apparatus for emerging use case support in user space networking |
US11416628B2 (en) | 2019-09-27 | 2022-08-16 | Amazon Technologies, Inc. | User-specific data manipulation system for object storage service based on user-submitted code |
US11550944B2 (en) | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
US11656892B1 (en) | 2019-09-27 | 2023-05-23 | Amazon Technologies, Inc. | Sequential execution of user-submitted code and native functions |
US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
US11360948B2 (en) | 2019-09-27 | 2022-06-14 | Amazon Technologies, Inc. | Inserting owner-specified data processing pipelines into input/output path of object storage service |
US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
KR20210125330A (ko) * | 2020-04-08 | 2021-10-18 | 삼성전자주식회사 | 보안 데이터 처리 방법 및 이를 지원하는 전자 장치 |
US11606302B2 (en) | 2020-06-12 | 2023-03-14 | Apple Inc. | Methods and apparatus for flow-based batching and processing |
US11775359B2 (en) | 2020-09-11 | 2023-10-03 | Apple Inc. | Methods and apparatuses for cross-layer processing |
US11954540B2 (en) | 2020-09-14 | 2024-04-09 | Apple Inc. | Methods and apparatus for thread-level execution in non-kernel space |
US11799986B2 (en) | 2020-09-22 | 2023-10-24 | Apple Inc. | Methods and apparatus for thread level execution in non-kernel space |
US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
CN112906015B (zh) * | 2021-01-26 | 2023-11-28 | 浙江大学 | 一种基于硬件标签的内存敏感数据加密保护系统 |
US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
US11876719B2 (en) | 2021-07-26 | 2024-01-16 | Apple Inc. | Systems and methods for managing transmission control protocol (TCP) acknowledgements |
US11882051B2 (en) | 2021-07-26 | 2024-01-23 | Apple Inc. | Systems and methods for managing transmission control protocol (TCP) acknowledgements |
US11968280B1 (en) | 2021-11-24 | 2024-04-23 | Amazon Technologies, Inc. | Controlling ingestion of streaming data to serverless function executions |
CN114329479B (zh) * | 2021-12-08 | 2024-05-28 | 浙江大学 | 一种面向risc-v架构的启动验证方法 |
US12015603B2 (en) | 2021-12-10 | 2024-06-18 | Amazon Technologies, Inc. | Multi-tenant mode for serverless code execution |
US12013970B2 (en) | 2022-05-16 | 2024-06-18 | Bank Of America Corporation | System and method for detecting and obfuscating confidential information in task logs |
CN116861411B (zh) * | 2023-06-05 | 2024-06-25 | 北京连山科技股份有限公司 | 基于Seccomp机制的安全沙箱数据保护方法及系统 |
CN117056983B (zh) * | 2023-10-13 | 2024-01-02 | 中国移动紫金(江苏)创新研究院有限公司 | 多级可控数据共享授权方法、装置及区块链系统 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US964278A (en) | 1910-04-08 | 1910-07-12 | Clifford J Larkin | Method of making coats. |
EP0842471A4 (en) | 1995-07-31 | 2006-11-08 | Hewlett Packard Co | METHOD AND APPARATUS FOR MANAGING RESOURCES UNDER THE CONTROL OF A PROTECTED MODULE OR OTHER PROTECTED PROCESSOR |
JP2002229447A (ja) * | 2001-01-30 | 2002-08-14 | Nippon Telegr & Teleph Corp <Ntt> | デジタルコンテンツ流通における著作権保護システム |
JP2002353960A (ja) * | 2001-05-30 | 2002-12-06 | Fujitsu Ltd | コード実行装置およびコード配布方法 |
EP1593015B1 (en) * | 2003-02-03 | 2018-05-30 | Nokia Technologies Oy | Architecture for encrypted application installation |
EP1548537A1 (en) | 2003-12-23 | 2005-06-29 | STMicroelectronics Limited | Secure processor arrangement |
JP4447977B2 (ja) | 2004-06-30 | 2010-04-07 | 富士通マイクロエレクトロニクス株式会社 | セキュアプロセッサ、およびセキュアプロセッサ用プログラム。 |
JP2008505385A (ja) * | 2004-07-02 | 2008-02-21 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | セキュリティユニットおよびそのようなセキュリティユニットを備える保護システムならびにデータを保護するための方法 |
US8332653B2 (en) * | 2004-10-22 | 2012-12-11 | Broadcom Corporation | Secure processing environment |
JP4596247B2 (ja) * | 2005-01-31 | 2010-12-08 | ソニー株式会社 | データ処理回路、データ処理装置、データ処理方法、データ処理制御方法、データ処理プログラム及びデータ処理制御プログラム |
WO2006082988A2 (en) | 2005-02-07 | 2006-08-10 | Sony Computer Entertainment Inc. | Methods and apparatus for facilitating a secure processor functional transition |
US7386775B2 (en) * | 2005-08-18 | 2008-06-10 | International Business Machines Corporation | Scan verification for a scan-chain device under test |
JP4795812B2 (ja) | 2006-02-22 | 2011-10-19 | 富士通セミコンダクター株式会社 | セキュアプロセッサ |
US8135959B2 (en) * | 2006-04-07 | 2012-03-13 | Honeywell International Inc. | External key to provide protection to devices |
US7660769B2 (en) | 2006-09-12 | 2010-02-09 | International Business Machines Corporation | System and method for digital content player with secure processing vault |
US20080152142A1 (en) | 2006-12-20 | 2008-06-26 | Mark Buer | Memory scrambler unit (msu) |
JP4912921B2 (ja) * | 2007-02-27 | 2012-04-11 | 富士通セミコンダクター株式会社 | セキュアプロセッサシステム、セキュアプロセッサ及びセキュアプロセッサシステムの制御方法 |
US20080229117A1 (en) * | 2007-03-07 | 2008-09-18 | Shin Kang G | Apparatus for preventing digital piracy |
EP2164020B1 (en) * | 2007-05-11 | 2014-02-26 | Nagrastar L.L.C. | Apparatus for controlling processor execution in a secure environment |
US8010763B2 (en) * | 2007-08-02 | 2011-08-30 | International Business Machines Corporation | Hypervisor-enforced isolation of entities within a single logical partition's virtual address space |
US8526616B2 (en) * | 2008-03-18 | 2013-09-03 | Christopher V. FEUDO | Method for payload encryption of digital voice or data communications |
WO2009120301A2 (en) * | 2008-03-25 | 2009-10-01 | Square Products Corporation | System and method for simultaneous media presentation |
US8644499B2 (en) | 2009-09-14 | 2014-02-04 | Broadcom Corporation | Method and system for securely protecting a semiconductor chip without compromising test and debug capabilities |
US8904190B2 (en) * | 2010-10-20 | 2014-12-02 | Advanced Micro Devices, Inc. | Method and apparatus including architecture for protecting sensitive code and data |
-
2010
- 2010-12-09 US US12/964,278 patent/US8904190B2/en active Active
- 2010-12-22 US US12/975,555 patent/US8489898B2/en active Active
-
2011
- 2011-10-19 EP EP11776054.6A patent/EP2630608B1/en active Active
- 2011-10-19 KR KR1020137011763A patent/KR101397637B1/ko active IP Right Grant
- 2011-10-19 KR KR1020137012783A patent/KR101735023B1/ko active IP Right Grant
- 2011-10-19 JP JP2013535046A patent/JP5537742B2/ja active Active
- 2011-10-19 WO PCT/US2011/056902 patent/WO2012054615A1/en active Application Filing
- 2011-10-19 EP EP11776053.8A patent/EP2630607B1/en active Active
- 2011-10-19 CN CN201180054724.9A patent/CN103210396B/zh active Active
- 2011-10-19 WO PCT/US2011/056895 patent/WO2012054609A1/en active Application Filing
- 2011-10-19 JP JP2013535042A patent/JP5670578B2/ja active Active
- 2011-10-19 CN CN201180054122.3A patent/CN103221961B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
KR20130142135A (ko) | 2013-12-27 |
CN103221961B (zh) | 2015-10-14 |
KR101397637B1 (ko) | 2014-05-22 |
KR20130080046A (ko) | 2013-07-11 |
JP2013545182A (ja) | 2013-12-19 |
JP5537742B2 (ja) | 2014-07-02 |
CN103221961A (zh) | 2013-07-24 |
JP2013541783A (ja) | 2013-11-14 |
EP2630608B1 (en) | 2016-01-20 |
US8904190B2 (en) | 2014-12-02 |
US8489898B2 (en) | 2013-07-16 |
EP2630608A1 (en) | 2013-08-28 |
EP2630607A1 (en) | 2013-08-28 |
WO2012054609A1 (en) | 2012-04-26 |
EP2630607B1 (en) | 2016-11-30 |
KR101735023B1 (ko) | 2017-05-12 |
US20120102307A1 (en) | 2012-04-26 |
WO2012054615A1 (en) | 2012-04-26 |
US20120102333A1 (en) | 2012-04-26 |
CN103210396A (zh) | 2013-07-17 |
CN103210396B (zh) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5670578B2 (ja) | 機密コードおよびデータを保護するためのアーキテクチャを含む方法および装置 | |
CN103069428B (zh) | 不可信云基础设施中的安全虚拟机引导 | |
KR100823374B1 (ko) | 휴면 보호 | |
KR100792287B1 (ko) | 자체 생성한 암호화키를 이용한 보안방법 및 이를 적용한보안장치 | |
KR101091465B1 (ko) | 프로세서의 가상 머신 내 기밀 콘텐츠의 보안 처리를 위한 방법 및 장치 | |
JP2013545182A5 (ja) | ||
JP2004038939A (ja) | 対称鍵暗号化に基づくデータの保存および検索 | |
JP2004005595A (ja) | 公開鍵暗号化に基づくデータの保存および検索 | |
KR20040094724A (ko) | 멀티-토큰 실 및 실 해제 | |
JP2005227995A (ja) | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム | |
JP2014191509A (ja) | 情報処理装置、情報処理プログラム | |
JP2009199530A (ja) | 情報処理装置及びその制御方法 | |
TW201314492A (zh) | 未知安全金鑰下開機影像之安全更新 | |
JP6930884B2 (ja) | Bios管理装置、bios管理システム、bios管理方法、及び、bios管理プログラム | |
EP2270707B1 (en) | Loading secure code into a memory | |
KR20210089486A (ko) | 키를 안전하게 관리하기 위한 장치 및 방법 | |
CN114296873B (zh) | 一种虚拟机镜像保护方法、相关器件、芯片及电子设备 | |
CN114816549B (zh) | 一种保护bootloader及其环境变量的方法及系统 | |
KR101604892B1 (ko) | 안드로이드 기반 어플리케이션의 부정사용 방지 방법 및 장치 | |
Kim et al. | CAFE: A virtualization-based approach to protecting sensitive cloud application logic confidentiality | |
JP2004280678A (ja) | データ処理装置、およびデータ処理方法 | |
JP2007272923A (ja) | サーバ | |
JP2010044792A (ja) | セキュアデバイス、集積回路および暗号化方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20141020 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20141020 |
|
A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20141020 |
|
TRDD | Decision of grant or rejection written | ||
A975 | Report on accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A971005 Effective date: 20141121 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20141202 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20141217 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5670578 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |