JP6695885B2 - ハッキング耐性のあるコンピュータ設計 - Google Patents
ハッキング耐性のあるコンピュータ設計 Download PDFInfo
- Publication number
- JP6695885B2 JP6695885B2 JP2017538238A JP2017538238A JP6695885B2 JP 6695885 B2 JP6695885 B2 JP 6695885B2 JP 2017538238 A JP2017538238 A JP 2017538238A JP 2017538238 A JP2017538238 A JP 2017538238A JP 6695885 B2 JP6695885 B2 JP 6695885B2
- Authority
- JP
- Japan
- Prior art keywords
- partition
- cpu
- address range
- data
- computer system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1433—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a module or a part of a module
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
- G06F3/0659—Command handling arrangements, e.g. command buffers, queues, command scheduling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/031—Protect user input by software means
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/032—Protect output to user by software means
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/841,469 | 2015-08-31 | ||
| US14/841,469 US9578054B1 (en) | 2015-08-31 | 2015-08-31 | Hacking-resistant computer design |
| PCT/US2016/049523 WO2017040542A1 (en) | 2015-08-31 | 2016-08-30 | Hacking-resistant computer design |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2018526691A JP2018526691A (ja) | 2018-09-13 |
| JP2018526691A5 JP2018526691A5 (https=) | 2018-12-13 |
| JP6695885B2 true JP6695885B2 (ja) | 2020-05-20 |
Family
ID=58017755
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017538238A Expired - Fee Related JP6695885B2 (ja) | 2015-08-31 | 2016-08-30 | ハッキング耐性のあるコンピュータ設計 |
Country Status (6)
| Country | Link |
|---|---|
| US (8) | US9578054B1 (https=) |
| EP (1) | EP3345095B1 (https=) |
| JP (1) | JP6695885B2 (https=) |
| CN (1) | CN107924365B (https=) |
| SG (1) | SG11201705227RA (https=) |
| WO (1) | WO2017040542A1 (https=) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12401619B2 (en) | 2010-01-26 | 2025-08-26 | Frampton E. Ellis | Computer or microchip with a secure system bios having a separate private network connection to a separate private network |
| US8429735B2 (en) * | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
| US10241706B2 (en) * | 2016-05-20 | 2019-03-26 | Renesas Electronics Corporation | Semiconductor device and its memory access control method |
| KR101997254B1 (ko) | 2017-05-10 | 2019-07-08 | 김덕우 | 고립된 사용자컴퓨팅부를 갖는 컴퓨터 |
| US10061923B1 (en) * | 2017-06-26 | 2018-08-28 | Pritam Nath | Safe and secure internet or network connected computing machine providing means for processing, manipulating, receiving, transmitting and storing information free from hackers, hijackers, virus, malware etc. |
| US10991255B2 (en) | 2018-04-05 | 2021-04-27 | Ge Aviation Systems Llc | Providing an open interface to a flight management system |
| FR3087548A1 (fr) * | 2018-08-24 | 2020-04-24 | Societe D'innovation Du Mûrier | Dispositif de securite pour un moyen de stockage de donnees numeriques |
| US11444919B2 (en) | 2019-05-20 | 2022-09-13 | Woodward, Inc. | Mission critical security zone |
| CN114758707A (zh) * | 2020-05-19 | 2022-07-15 | 长江存储科技有限责任公司 | 用于存储器的程序暂停和恢复的控制方法与控制器 |
| FI4227842T3 (fi) * | 2021-03-24 | 2025-09-17 | Woori Tech Corporation | Ohjausjärjestelmä, joka sisältää eristetyn käyttäjän tietokoneyksikkön ja sen ohjausmenetelmä |
| CN113505362B (zh) * | 2021-07-16 | 2023-09-22 | 长鑫存储技术有限公司 | 系统权限管控方法、数据中心、管控装置和存储介质 |
Family Cites Families (58)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2156554B (en) * | 1984-03-10 | 1987-07-29 | Rediffusion Simulation Ltd | Processing system with shared data |
| US5210854A (en) * | 1989-06-14 | 1993-05-11 | Digital Equipment Corporation | System for updating program stored in eeprom by storing new version into new location and updating second transfer vector to contain starting address of new version |
| JP3417065B2 (ja) * | 1994-07-04 | 2003-06-16 | 富士通株式会社 | ウイルス対応型外部記憶装置、データ処理装置およびデータ処理方法 |
| US6651171B1 (en) * | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
| US6643751B2 (en) * | 2000-03-20 | 2003-11-04 | Texas Instruments Incorporated | System and method for limited access to system memory |
| US6507904B1 (en) * | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
| US6725317B1 (en) * | 2000-04-29 | 2004-04-20 | Hewlett-Packard Development Company, L.P. | System and method for managing a computer system having a plurality of partitions |
| US6986052B1 (en) | 2000-06-30 | 2006-01-10 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US20020083362A1 (en) * | 2000-12-22 | 2002-06-27 | Objectsoft Corp. | System and method for providing unattended personality acquisition, self-recovery and remote maintenance to internet-based end-user devices |
| US7313705B2 (en) * | 2002-01-22 | 2007-12-25 | Texas Instrument Incorporated | Implementation of a secure computing environment by using a secure bootloader, shadow memory, and protected memory |
| US6763441B2 (en) * | 2002-01-23 | 2004-07-13 | International Business Machines Corporation | System and method for using ancillary processors and storage to speed time critical data capture |
| GB0226874D0 (en) * | 2002-11-18 | 2002-12-24 | Advanced Risc Mach Ltd | Switching between secure and non-secure processing modes |
| GB2396034B (en) * | 2002-11-18 | 2006-03-08 | Advanced Risc Mach Ltd | Technique for accessing memory in a data processing apparatus |
| JP2004234053A (ja) * | 2003-01-28 | 2004-08-19 | Internatl Business Mach Corp <Ibm> | コンピュータシステム、コンピュータ装置、記憶装置のデータ保護方法、およびプログラム |
| US7509644B2 (en) | 2003-03-04 | 2009-03-24 | Secure 64 Software Corp. | Operating system capable of supporting a customized execution environment |
| US20070067366A1 (en) * | 2003-10-08 | 2007-03-22 | Landis John A | Scalable partition memory mapping system |
| US7072211B2 (en) * | 2004-05-19 | 2006-07-04 | L-3 Integrated Systems Company | Systems and methods for write protection of non-volatile memory devices |
| US7818574B2 (en) * | 2004-09-10 | 2010-10-19 | International Business Machines Corporation | System and method for providing dynamically authorized access to functionality present on an integrated circuit chip |
| US8619971B2 (en) * | 2005-04-01 | 2013-12-31 | Microsoft Corporation | Local secure service partitions for operating system security |
| WO2007011001A1 (ja) | 2005-07-22 | 2007-01-25 | Matsushita Electric Industrial Co., Ltd. | 実行装置 |
| US8381297B2 (en) | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
| US7845005B2 (en) * | 2006-02-07 | 2010-11-30 | International Business Machines Corporation | Method for preventing malicious software installation on an internet-connected computer |
| CN100464314C (zh) * | 2006-03-23 | 2009-02-25 | 联想(北京)有限公司 | 一种数据透明保护的安全写系统和方法 |
| JP2007304954A (ja) | 2006-05-12 | 2007-11-22 | Sharp Corp | メモリ保護機能を有するコンピュータシステム |
| US7984301B2 (en) | 2006-08-17 | 2011-07-19 | Inside Contactless S.A. | Bi-processor architecture for secure systems |
| US20160248588A1 (en) * | 2006-09-07 | 2016-08-25 | Altera Corporation | Security ram block with multiple partitions |
| US8571598B2 (en) | 2006-12-18 | 2013-10-29 | Intel Corporation | Method and apparatus for location-based wireless connection and pairing |
| JP2010514028A (ja) * | 2006-12-22 | 2010-04-30 | バーチャルロジックス エスエイ | 単一データ処理を共有するために複数の実行環境を有効化するシステム |
| WO2008138653A1 (en) | 2007-05-09 | 2008-11-20 | International Business Machines Corporation | A method and data processing system to prevent manipulation of computer systems |
| ATE518191T1 (de) | 2007-12-17 | 2011-08-15 | Continental Teves Ag & Co Ohg | Speicherabbildungssystem, anforderungssteuerung, mehrfach-verarbeitungsanordnung, zentrale interrput-request-steuerung, vorrichtung, verfahren zur steuerung des speicherzugriffs und computerprogrammprodukt |
| US7743375B2 (en) * | 2008-06-27 | 2010-06-22 | International Business Machines Corporation | Information handling system including dynamically merged physical partitions |
| US7657941B1 (en) | 2008-12-26 | 2010-02-02 | Kaspersky Lab, Zao | Hardware-based anti-virus system |
| US8380909B2 (en) * | 2009-04-08 | 2013-02-19 | Google Inc. | Multiple command queues having separate interrupts |
| US9152200B2 (en) * | 2009-06-23 | 2015-10-06 | Hewlett-Packard Development Company, L.P. | Resource and power management using nested heterogeneous hypervisors |
| US20110154023A1 (en) * | 2009-12-21 | 2011-06-23 | Smith Ned M | Protected device management |
| WO2011094616A1 (en) * | 2010-01-29 | 2011-08-04 | Ellis Frampton E | The basic architecture for secure internet computers |
| US20110225645A1 (en) * | 2010-01-26 | 2011-09-15 | Ellis Frampton E | Basic architecture for secure internet computers |
| US8429735B2 (en) * | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
| JP2011215879A (ja) | 2010-03-31 | 2011-10-27 | Sharp Corp | 操作用通信装置、非操作用通信装置、操作用通信装置の制御方法、非操作用通信装置の制御方法、通信システム、操作用通信プログラム、非操作用通信プログラム及び記録媒体 |
| US20110314075A1 (en) * | 2010-06-18 | 2011-12-22 | Nokia Corporation | Method and apparatus for managing distributed computations within a computation space |
| US8082585B1 (en) | 2010-09-13 | 2011-12-20 | Raymond R. Givonetti | Protecting computers from malware using a hardware solution that is not alterable by any software |
| US8561066B2 (en) * | 2010-12-08 | 2013-10-15 | International Business Machines Corporation | Simplified DMA mappings for self-virtualizing input/output device virtual functions |
| TWI432987B (zh) * | 2011-03-15 | 2014-04-01 | Phison Electronics Corp | 記憶體儲存裝置、其記憶體控制器與病毒掃描方法 |
| KR20120119092A (ko) * | 2011-04-20 | 2012-10-30 | 삼성전자주식회사 | 반도체 메모리 시스템 및 이의 구동 방법 |
| WO2013063484A1 (en) | 2011-10-28 | 2013-05-02 | The Regents Of The University Of California | Multiple-core computer processor |
| KR101365083B1 (ko) * | 2012-03-06 | 2014-02-21 | 모젼스랩(주) | 모션 인식을 통한 인터페이스 장치 및 이의 제어방법 |
| US9043559B2 (en) | 2012-10-23 | 2015-05-26 | Oracle International Corporation | Block memory engine with memory corruption detection |
| GB2513850B (en) * | 2013-05-03 | 2017-06-14 | Rosberg System As | Access control system |
| BR112016000972A2 (pt) * | 2013-07-18 | 2017-08-22 | Benjamin A Gittins | Computing architecture with peripherals |
| US9692789B2 (en) * | 2013-12-13 | 2017-06-27 | Oracle International Corporation | Techniques for cloud security monitoring and threat intelligence |
| US11228427B2 (en) | 2014-02-11 | 2022-01-18 | Ericsson Ab | System and method for securing content keys delivered in manifest files |
| US9686077B2 (en) * | 2014-03-06 | 2017-06-20 | Microsoft Technology Licensing, Llc | Secure hardware for cross-device trusted applications |
| US20160044136A1 (en) * | 2014-05-27 | 2016-02-11 | Nimbus 9, Inc. | Virtual gateway |
| US9479331B2 (en) | 2014-08-20 | 2016-10-25 | Apple Inc. | Managing security in a system on a chip (SOC) that powers down a secure processor |
| US20160070656A1 (en) * | 2014-09-05 | 2016-03-10 | Qualcomm Incorporated | Write protection management systems |
| US9444849B2 (en) * | 2014-10-06 | 2016-09-13 | The Boeing Company | Enforcing policy compliance on a device |
| US9749323B2 (en) * | 2015-03-27 | 2017-08-29 | Intel Corporation | Technologies for secure server access using a trusted license agent |
| US10063375B2 (en) | 2015-04-20 | 2018-08-28 | Microsoft Technology Licensing, Llc | Isolation of trusted input/output devices |
-
2015
- 2015-08-31 US US14/841,469 patent/US9578054B1/en not_active Expired - Fee Related
-
2016
- 2016-08-30 JP JP2017538238A patent/JP6695885B2/ja not_active Expired - Fee Related
- 2016-08-30 CN CN201680043460.XA patent/CN107924365B/zh not_active Expired - Fee Related
- 2016-08-30 SG SG11201705227RA patent/SG11201705227RA/en unknown
- 2016-08-30 WO PCT/US2016/049523 patent/WO2017040542A1/en not_active Ceased
- 2016-08-30 EP EP16842830.8A patent/EP3345095B1/en active Active
-
2017
- 2017-01-05 US US15/399,654 patent/US10002245B2/en active Active
- 2017-02-20 US US15/437,056 patent/US10089248B2/en active Active
-
2018
- 2018-05-07 US US15/973,392 patent/US10311226B2/en active Active
- 2018-10-01 US US16/148,944 patent/US10606768B2/en active Active
-
2019
- 2019-05-15 US US16/413,446 patent/US11030301B2/en active Active
-
2020
- 2020-03-27 US US16/833,355 patent/US11061832B2/en active Active
-
2021
- 2021-06-14 US US17/346,864 patent/US20220043905A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| WO2017040542A1 (en) | 2017-03-09 |
| EP3345095A4 (en) | 2019-04-24 |
| CN107924365B (zh) | 2022-01-04 |
| SG11201705227RA (en) | 2017-07-28 |
| US20180330076A1 (en) | 2018-11-15 |
| CN107924365A (zh) | 2018-04-17 |
| JP2018526691A (ja) | 2018-09-13 |
| US20170063877A1 (en) | 2017-03-02 |
| US20170235944A1 (en) | 2017-08-17 |
| US20190278718A1 (en) | 2019-09-12 |
| US9578054B1 (en) | 2017-02-21 |
| EP3345095B1 (en) | 2021-07-07 |
| US20220043905A1 (en) | 2022-02-10 |
| US11061832B2 (en) | 2021-07-13 |
| US20200134170A1 (en) | 2020-04-30 |
| US20170169222A1 (en) | 2017-06-15 |
| US11030301B2 (en) | 2021-06-08 |
| US10089248B2 (en) | 2018-10-02 |
| HK1251673A1 (zh) | 2019-02-01 |
| US10002245B2 (en) | 2018-06-19 |
| EP3345095A1 (en) | 2018-07-11 |
| US10606768B2 (en) | 2020-03-31 |
| US10311226B2 (en) | 2019-06-04 |
| US20200301853A1 (en) | 2020-09-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6695885B2 (ja) | ハッキング耐性のあるコンピュータ設計 | |
| US11507654B2 (en) | Secure environment in a non-secure microcontroller | |
| US10061928B2 (en) | Security-enhanced computer systems and methods | |
| JP7213879B2 (ja) | 間接アクセスメモリコントローラ用のメモリ保護装置 | |
| CN107743625B (zh) | 由受控制的加密密钥管理进行的软件模块的分离 | |
| US20150074820A1 (en) | Security enhancement apparatus | |
| US20180239912A1 (en) | Data security method and local device with switch(es) | |
| US20050033979A1 (en) | Method and system for secure direct memory access | |
| JP7027664B2 (ja) | ハッキング耐性のあるコンピュータ設計 | |
| HK1251673B (zh) | 防黑客計算機設計 | |
| CN106845296A (zh) | 一种保护密码的方法、系统及一种主板、连接器 | |
| CN106919856B (zh) | 安全移动终端 | |
| HK40015076A (zh) | 防黑客计算机设计 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20181031 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20181031 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20190627 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190709 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190906 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20200225 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20200326 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20200422 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 6695885 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
| S631 | Written request for registration of reclamation of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313631 |
|
| S633 | Written request for registration of reclamation of name |
Free format text: JAPANESE INTERMEDIATE CODE: R313633 |
|
| R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |