KR100745430B1 - 인사이퍼링 또는 디사이퍼링 방법, 장치 및 컴퓨터 판독 가능 기록 매체 - Google Patents
인사이퍼링 또는 디사이퍼링 방법, 장치 및 컴퓨터 판독 가능 기록 매체 Download PDFInfo
- Publication number
- KR100745430B1 KR100745430B1 KR1020057018960A KR20057018960A KR100745430B1 KR 100745430 B1 KR100745430 B1 KR 100745430B1 KR 1020057018960 A KR1020057018960 A KR 1020057018960A KR 20057018960 A KR20057018960 A KR 20057018960A KR 100745430 B1 KR100745430 B1 KR 100745430B1
- Authority
- KR
- South Korea
- Prior art keywords
- bit
- instruction
- operand
- delete delete
- deciphering
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 17
- 239000003607 modifier Substances 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims 1
- 230000006870 function Effects 0.000 description 44
- 238000006073 displacement reaction Methods 0.000 description 28
- 238000010586 diagram Methods 0.000 description 25
- 230000007774 longterm Effects 0.000 description 10
- OTZZZISTDGMMMX-UHFFFAOYSA-N 2-(3,5-dimethylpyrazol-1-yl)-n,n-bis[2-(3,5-dimethylpyrazol-1-yl)ethyl]ethanamine Chemical compound N1=C(C)C=C(C)N1CCN(CCN1C(=CC(C)=N1)C)CCN1C(C)=CC(C)=N1 OTZZZISTDGMMMX-UHFFFAOYSA-N 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 4
- 239000004519 grease Substances 0.000 description 2
- 230000005055 memory storage Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/34—Addressing or accessing the instruction operand or the result ; Formation of operand address; Addressing modes
- G06F9/355—Indexed addressing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/76—Architectures of general purpose stored program computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/30018—Bit or string instructions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30094—Condition code generation, e.g. Carry, Zero flag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/3017—Runtime instruction translation, e.g. macros
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30181—Instruction operation extension or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/34—Addressing or accessing the instruction operand or the result ; Formation of operand address; Addressing modes
- G06F9/342—Extension of operand address space
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Mathematical Physics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
- Executing Machine-Instructions (AREA)
- Debugging And Monitoring (AREA)
- Medicines That Contain Protein Lipid Enzymes And Other Medicines (AREA)
- Peptides Or Proteins (AREA)
- Computer And Data Communications (AREA)
- Stored Programmes (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (18)
- 컴퓨팅 환경의 저장 장치를 인사이퍼링(enciphering) 또는 디사이퍼링(deciphering)하는 방법에 있어서,마이크로프로세서 인스트럭션을 통해서 인사이퍼링되거나 디사이퍼링될 저장 장치의 유닛을 지정하는 단계와,상기 저장 장치의 유닛을 인사이퍼링 또는 디사이퍼링하는 단계를 포함하되,상기 인스트럭션은 기능 코드 값(function code value)을 식별하는 필드 및 변경자 비트 값(modifier bit value)을 식별하는 다른 필드와 관련되고, 상기 인스트럭션을 수행하는 프로세서는 상기 기능 코드 값 및 상기 변경자 비트 값에 기초해서 인사이퍼 또는 디사이퍼 동작을 수행할지 여부를 인식하며,하나의 추가 기능 코드 값이 상태 워드가 파라미터 블록에 저장되게 하는 퀴리 동작에 대응하며, 상기 상태 워드는 복수의 비트를 구비하되, 상기 상태 워드의 하나의 비트가 이진값 "1"을 가지면 상기 비트는 인스톨된 기능에 대응하는 기능 코드 값에 대응하고, 상기 상태 워드의 하나의 비트가 이진값 "0"을 가지면 상기 비트는 언인스톨된 기능에 대응하는 기능 코드 값에 대응하는인사이퍼링 또는 디사이퍼링 방법.
- 제 1 항에 있어서,상기 인스트럭션은 상기 프로세서에 의해 수행될 때, 상기 인사이퍼링 또는 디사이퍼링 결과를 제 1 오퍼랜드에 저장하는인사이퍼링 또는 디사이퍼링 방법.
- 삭제
- 삭제
- 제 1 항에 있어서,상기 기능 코드 값은 퀴리 동작에 대응하고,상기 인스트럭션은 오피코드를 포함하고 다른 필드는 포함하지 않는인사이퍼링 또는 디사이퍼링 방법.
- 제 1 항에 있어서,상기 기능 코드 값은 KM-퀴리 동작, KM-DEA 64 비트 키 암호화 동작, KM-트리플 DEA 2개의 64 비트 키 암호화 동작 또는 KM-트리플 DEA 3개의 64 비트 키 암호화 동작 중 임의의 하나에 대응하는인사이퍼링 또는 디사이퍼링 방법.
- 제 1 항에 있어서,상기 인스트럭션은 상기 프로세서의 상기 인스트럭션 아키텍쳐의 본래의 형식인인사이퍼링 또는 디사이퍼링 방법.
- 제 1, 2, 5 내지 7 항 중 어느 한 항에 따른 방법의 각각의 단계를 수행하는 컴퓨터 프로그램을 구비한 컴퓨터 판독 가능 기록 매체.
- 제 1, 2, 5 내지 7 항 중 어느 한 항에 따른 방법의 각각의 단계를 수행하는 각각의 수단을 포함하는, 컴퓨팅 환경의 저장 장치를 인사이퍼링 또는 디사이퍼링하는 장치.
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/435,916 | 2003-05-12 | ||
US10/435,916 US7257718B2 (en) | 2003-05-12 | 2003-05-12 | Cipher message assist instructions |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20060009247A KR20060009247A (ko) | 2006-01-31 |
KR100745430B1 true KR100745430B1 (ko) | 2007-08-02 |
Family
ID=33417043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020057018960A KR100745430B1 (ko) | 2003-05-12 | 2004-05-04 | 인사이퍼링 또는 디사이퍼링 방법, 장치 및 컴퓨터 판독 가능 기록 매체 |
Country Status (15)
Country | Link |
---|---|
US (6) | US7257718B2 (ko) |
EP (1) | EP1623294B1 (ko) |
KR (1) | KR100745430B1 (ko) |
CN (1) | CN100394348C (ko) |
AT (1) | ATE355552T1 (ko) |
AU (1) | AU2004236861A1 (ko) |
CA (1) | CA2523241C (ko) |
DE (1) | DE602004005025T2 (ko) |
ES (1) | ES2279366T3 (ko) |
GB (1) | GB2413878B (ko) |
IL (1) | IL171906A (ko) |
PL (1) | PL1623294T3 (ko) |
RU (1) | RU2334268C2 (ko) |
TW (1) | TWI279692B (ko) |
WO (1) | WO2004099950A1 (ko) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7802108B1 (en) * | 2002-07-18 | 2010-09-21 | Nvidia Corporation | Secure storage of program code for an embedded system |
US20040230813A1 (en) * | 2003-05-12 | 2004-11-18 | International Business Machines Corporation | Cryptographic coprocessor on a general purpose microprocessor |
KR100604828B1 (ko) * | 2004-01-09 | 2006-07-28 | 삼성전자주식회사 | 펌웨어 암호화 방법 및 해독 방법과 그 처리 장치 |
KR101123742B1 (ko) * | 2005-12-23 | 2012-03-16 | 삼성전자주식회사 | 사용자 인터페이스와 소프트웨어 간의 신뢰 경로 설정 방법및 장치 |
US20100169637A1 (en) * | 2008-06-28 | 2010-07-01 | Visisoft, Llc | Palette for real-time display of previously accessed documents |
US20100250965A1 (en) * | 2009-03-31 | 2010-09-30 | Olson Christopher H | Apparatus and method for implementing instruction support for the advanced encryption standard (aes) algorithm |
US8654970B2 (en) * | 2009-03-31 | 2014-02-18 | Oracle America, Inc. | Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm |
US20100246815A1 (en) * | 2009-03-31 | 2010-09-30 | Olson Christopher H | Apparatus and method for implementing instruction support for the kasumi cipher algorithm |
US8832464B2 (en) * | 2009-03-31 | 2014-09-09 | Oracle America, Inc. | Processor and method for implementing instruction support for hash algorithms |
US9317286B2 (en) * | 2009-03-31 | 2016-04-19 | Oracle America, Inc. | Apparatus and method for implementing instruction support for the camellia cipher algorithm |
US8356185B2 (en) * | 2009-10-08 | 2013-01-15 | Oracle America, Inc. | Apparatus and method for local operand bypassing for cryptographic instructions |
US9851969B2 (en) | 2010-06-24 | 2017-12-26 | International Business Machines Corporation | Function virtualization facility for function query of a processor |
US10521231B2 (en) | 2010-06-24 | 2019-12-31 | International Business Machines Corporation | Function virtualization facility for blocking instruction function of a multi-function instruction of a virtual processor |
US9179303B2 (en) * | 2010-11-17 | 2015-11-03 | Qualcomm Incorporated | Methods and apparatus for transmitting and receiving secure and non-secure data |
US8737604B2 (en) | 2011-05-09 | 2014-05-27 | Advanced Micro Devices, Inc. | Processor with architecture implementing the advanced encryption standard |
US8873750B2 (en) | 2013-03-14 | 2014-10-28 | International Business Machines Corporation | Instruction for performing a pseudorandom number generate operation |
US9201629B2 (en) | 2013-03-14 | 2015-12-01 | International Business Machines Corporation | Instruction for performing a pseudorandom number seed operation |
US9411600B2 (en) * | 2013-12-08 | 2016-08-09 | Intel Corporation | Instructions and logic to provide memory access key protection functionality |
US20150234750A1 (en) * | 2014-02-18 | 2015-08-20 | Aspeed Technology Inc. | Method and apparatus for addressing a memory containing different bit-length field variables |
US10642987B2 (en) * | 2017-01-19 | 2020-05-05 | Ebay Inc. | Cryptography based fraud tracking |
US11121856B2 (en) * | 2018-06-15 | 2021-09-14 | Intel Corporation | Unified AES-SMS4—Camellia symmetric key block cipher acceleration |
US11706039B2 (en) | 2020-12-26 | 2023-07-18 | Intel Corporation | ISA accessible physical unclonable function |
EP4020182A1 (en) * | 2020-12-26 | 2022-06-29 | Intel Corporation | Isa accessible physical unclonable function |
US11700135B2 (en) | 2020-12-26 | 2023-07-11 | Intel Corporation | ISA accessible physical unclonable function |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2458331A1 (de) | 1973-12-13 | 1975-06-19 | Honeywell Inf Systems | Datenverarbeitungssystem zur adressierung eines in einem sekundaerspeicher abgelegten datensatzes |
JPS56121138A (en) | 1980-02-28 | 1981-09-22 | Nippon Telegr & Teleph Corp <Ntt> | Buffer memory controlling system |
JPS56149645A (en) * | 1980-04-21 | 1981-11-19 | Nec Corp | Instruction word deciphering device of information processor |
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
DE68926200T2 (de) | 1988-08-11 | 1996-10-17 | Ibm | Geheime Datenübertragung mittels Steuervektoren |
US5058164A (en) * | 1990-05-03 | 1991-10-15 | National Semiconductor Corp. | Encryption of streams of addressed information to be used for program code protection |
JP3086507B2 (ja) | 1991-10-02 | 2000-09-11 | 旭化成工業株式会社 | 熱可塑性合成樹脂成形品 |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
US5673319A (en) | 1995-02-06 | 1997-09-30 | International Business Machines Corporation | Block cipher mode of operation for secure, length-preserving encryption |
US5765030A (en) * | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution |
US5787302A (en) | 1996-05-15 | 1998-07-28 | Philips Electronic North America Corporation | Software for producing instructions in a compressed format for a VLIW processor |
US20010025337A1 (en) | 1996-06-10 | 2001-09-27 | Frank Worrell | Microprocessor including a mode detector for setting compression mode |
US6226680B1 (en) * | 1997-10-14 | 2001-05-01 | Alacritech, Inc. | Intelligent network interface system method for protocol processing |
JPH11249873A (ja) | 1998-03-02 | 1999-09-17 | Mitsubishi Electric Corp | ドライバ機能の動的管理方式及び動的管理方法 |
ATE370490T1 (de) * | 1998-06-03 | 2007-09-15 | Cryptography Res Inc | Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen |
AU6381799A (en) * | 1998-06-03 | 2000-01-10 | Cryptography Research, Inc. | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems |
KR20020026370A (ko) | 1999-08-09 | 2002-04-09 | 러셀 비. 밀러 | 메시지 인증 코드를 발생시키기 위한 방법 및 장치 |
US6675298B1 (en) * | 1999-08-18 | 2004-01-06 | Sun Microsystems, Inc. | Execution of instructions using op code lengths longer than standard op code lengths to encode data |
US7278016B1 (en) * | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
US6542981B1 (en) * | 1999-12-28 | 2003-04-01 | Intel Corporation | Microcode upgrade and special function support by executing RISC instruction to invoke resident microcode |
CA2305078A1 (en) * | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Tamper resistant software - mass data encoding |
JP4098478B2 (ja) * | 2001-01-31 | 2008-06-11 | 株式会社東芝 | マイクロプロセッサ |
JP2002353960A (ja) * | 2001-05-30 | 2002-12-06 | Fujitsu Ltd | コード実行装置およびコード配布方法 |
US7360076B2 (en) * | 2001-06-13 | 2008-04-15 | Itt Manufacturing Enterprises, Inc. | Security association data cache and structure |
US7266703B2 (en) * | 2001-06-13 | 2007-09-04 | Itt Manufacturing Enterprises, Inc. | Single-pass cryptographic processor and method |
US20030002666A1 (en) | 2001-06-13 | 2003-01-02 | Takahashi Richard J. | Method and apparatus for creating a message digest using a parallel, one-way hash algorithm |
US20030028765A1 (en) | 2001-07-31 | 2003-02-06 | Cromer Daryl Carvis | Protecting information on a computer readable medium |
JP2003051819A (ja) * | 2001-08-08 | 2003-02-21 | Toshiba Corp | マイクロプロセッサ |
US6996725B2 (en) * | 2001-08-16 | 2006-02-07 | Dallas Semiconductor Corporation | Encryption-based security protection for processors |
US6765030B2 (en) | 2002-03-22 | 2004-07-20 | The University Of North Carolina At Chapel Hill | Methods of forming polymeric structures using carbon dioxide and polymeric structures formed therapy |
US7254696B2 (en) * | 2002-12-12 | 2007-08-07 | Alacritech, Inc. | Functional-level instruction-set computer architecture for processing application-layer content-service requests such as file-access requests |
CN100539289C (zh) | 2006-05-23 | 2009-09-09 | 索尼株式会社 | 电池 |
-
2003
- 2003-05-12 US US10/435,916 patent/US7257718B2/en active Active
-
2004
- 2004-05-04 DE DE602004005025T patent/DE602004005025T2/de not_active Expired - Lifetime
- 2004-05-04 ES ES04731048T patent/ES2279366T3/es not_active Expired - Lifetime
- 2004-05-04 AT AT04731048T patent/ATE355552T1/de active
- 2004-05-04 AU AU2004236861A patent/AU2004236861A1/en not_active Abandoned
- 2004-05-04 WO PCT/GB2004/001928 patent/WO2004099950A1/en active IP Right Grant
- 2004-05-04 CA CA2523241A patent/CA2523241C/en not_active Expired - Lifetime
- 2004-05-04 CN CNB2004800078072A patent/CN100394348C/zh not_active Expired - Lifetime
- 2004-05-04 KR KR1020057018960A patent/KR100745430B1/ko active IP Right Grant
- 2004-05-04 GB GB0516236A patent/GB2413878B/en not_active Expired - Lifetime
- 2004-05-04 RU RU2005121915/09A patent/RU2334268C2/ru active
- 2004-05-04 EP EP04731048A patent/EP1623294B1/en not_active Expired - Lifetime
- 2004-05-04 PL PL04731048T patent/PL1623294T3/pl unknown
- 2004-05-06 TW TW093112742A patent/TWI279692B/zh active
-
2005
- 2005-11-10 IL IL171906A patent/IL171906A/en unknown
-
2007
- 2007-03-28 US US11/692,382 patent/US8103860B2/en active Active
-
2009
- 2009-02-27 US US12/394,579 patent/US7720220B2/en not_active Expired - Lifetime
-
2011
- 2011-12-13 US US13/324,396 patent/US8261048B2/en not_active Expired - Lifetime
-
2012
- 2012-06-04 US US13/487,929 patent/US8661231B2/en not_active Expired - Lifetime
-
2013
- 2013-12-31 US US14/144,830 patent/US9424055B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
Title |
---|
IBM PCI Cryptographic Coprocessor CCA Basic Services Reference and Guide for IBM 4758 Models 002 and 023 with Release 2.40 |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100745430B1 (ko) | 인사이퍼링 또는 디사이퍼링 방법, 장치 및 컴퓨터 판독 가능 기록 매체 | |
JP4817185B2 (ja) | 埋め込み符号を持ったコンピュータ命令値フィールド | |
US7770024B2 (en) | Security message authentication instruction | |
EP1684167A2 (en) | Method of processing signed displacement computer instruction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20130627 Year of fee payment: 7 |
|
FPAY | Annual fee payment |
Payment date: 20140627 Year of fee payment: 8 |
|
FPAY | Annual fee payment |
Payment date: 20150625 Year of fee payment: 9 |
|
FPAY | Annual fee payment |
Payment date: 20160628 Year of fee payment: 10 |
|
FPAY | Annual fee payment |
Payment date: 20170628 Year of fee payment: 11 |
|
FPAY | Annual fee payment |
Payment date: 20180628 Year of fee payment: 12 |