MX2021010585A - Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo. - Google Patents
Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo.Info
- Publication number
- MX2021010585A MX2021010585A MX2021010585A MX2021010585A MX2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A
- Authority
- MX
- Mexico
- Prior art keywords
- operating system
- system image
- secure operating
- page
- secure
- Prior art date
Links
- 238000012795 verification Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45575—Starting, stopping, suspending or resuming virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
Se proporciona un procesamiento seguro dentro de un entorno informático al desencriptar gradualmente una imagen del sistema operativo segura, que incluye recibir, para una página de la imagen del sistema operativo segura, una dirección de página y un valor de ajuste utilizado durante la encriptación de la página. El procesamiento determina que el valor de ajuste no se haya utilizado previamente durante la desencriptación de otra página de la imagen del sistema operativo segura, y desencriptar el contenido de la página de memoria en la dirección de página utilizando una clave de encriptación de imagen y el valor de ajuste para facilitar la obtención de una imagen del sistema operativo segura desencriptada. Además, la integridad de la imagen del sistema operativo segura se verifica y con base en la verificación de la integridad de la imagen del sistema operativo segura, se inicia la ejecución de la imagen del sistema operativo segura desencriptada.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/296,334 US11354418B2 (en) | 2019-03-08 | 2019-03-08 | Incremental decryption and integrity verification of a secure operating system image |
PCT/EP2020/054101 WO2020182420A1 (en) | 2019-03-08 | 2020-02-17 | Incremental decryption and integrity verification of a secure operating system image |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2021010585A true MX2021010585A (es) | 2021-10-13 |
Family
ID=69593703
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2021010585A MX2021010585A (es) | 2019-03-08 | 2020-02-17 | Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo. |
Country Status (17)
Country | Link |
---|---|
US (1) | US11354418B2 (es) |
EP (1) | EP3935545B1 (es) |
JP (1) | JP7388802B2 (es) |
KR (1) | KR102551935B1 (es) |
CN (1) | CN113544679A (es) |
AU (1) | AU2020236629B2 (es) |
BR (1) | BR112021017438A2 (es) |
CA (1) | CA3132735A1 (es) |
ES (1) | ES2969160T3 (es) |
HU (1) | HUE065398T2 (es) |
IL (1) | IL285161B2 (es) |
MX (1) | MX2021010585A (es) |
PL (1) | PL3935545T3 (es) |
SG (1) | SG11202105427YA (es) |
TW (1) | TWI737172B (es) |
WO (1) | WO2020182420A1 (es) |
ZA (1) | ZA202106315B (es) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12008087B2 (en) * | 2020-10-26 | 2024-06-11 | Apple Inc. | Secure reduced power mode |
CN112989440B (zh) * | 2021-04-21 | 2021-09-14 | 北京芯愿景软件技术股份有限公司 | 芯片、处理器驱动方法及电子设备 |
CN114547630B (zh) * | 2022-04-25 | 2022-08-09 | 宁波均联智行科技股份有限公司 | 一种基于车机多操作系统的验证方法及装置 |
US20240249000A1 (en) * | 2023-01-25 | 2024-07-25 | Qualcomm Incorporated | Encryption with enhanced tweak generation |
CN116956364B (zh) * | 2023-09-21 | 2024-02-09 | 中航国际金网(北京)科技有限公司 | 虚拟化产品完整性校验方法、装置、系统及电子设备 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4245302A (en) | 1978-10-10 | 1981-01-13 | Magnuson Computer Systems, Inc. | Computer and method for executing target instructions |
US7162635B2 (en) | 1995-01-17 | 2007-01-09 | Eoriginal, Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US6138236A (en) | 1996-07-01 | 2000-10-24 | Sun Microsystems, Inc. | Method and apparatus for firmware authentication |
JP2007508623A (ja) | 2003-10-08 | 2007-04-05 | ユニシス コーポレーション | 複数のノードにわたってシステムリソースを割り当てて管理する仮想データセンタ |
US7984103B2 (en) | 2008-11-25 | 2011-07-19 | International Business Machines Corporation | System and method for managing data transfers between information protocols |
US9086913B2 (en) | 2008-12-31 | 2015-07-21 | Intel Corporation | Processor extensions for execution of secure embedded containers |
US8387114B2 (en) | 2009-01-02 | 2013-02-26 | International Business Machines Corporation | Secure workload partitioning in a server environment |
JP2011048661A (ja) | 2009-08-27 | 2011-03-10 | Nomura Research Institute Ltd | 仮想サーバ暗号化システム |
US8639783B1 (en) | 2009-08-28 | 2014-01-28 | Cisco Technology, Inc. | Policy based configuration of interfaces in a virtual machine environment |
US8856504B2 (en) | 2010-06-07 | 2014-10-07 | Cisco Technology, Inc. | Secure virtual machine bootstrap in untrusted cloud infrastructures |
US20120179904A1 (en) | 2011-01-11 | 2012-07-12 | Safenet, Inc. | Remote Pre-Boot Authentication |
US9092644B2 (en) * | 2011-12-28 | 2015-07-28 | Intel Corporation | Method and system for protecting memory information in a platform |
US9594927B2 (en) | 2014-09-10 | 2017-03-14 | Intel Corporation | Providing a trusted execution environment using a processor |
GB2532415A (en) | 2014-11-11 | 2016-05-25 | Ibm | Processing a guest event in a hypervisor-controlled system |
US10599458B2 (en) | 2015-01-23 | 2020-03-24 | Unisys Corporation | Fabric computing system having an embedded software defined network |
US10303899B2 (en) * | 2016-08-11 | 2019-05-28 | Intel Corporation | Secure public cloud with protected guest-verified host control |
US12063309B2 (en) * | 2018-04-26 | 2024-08-13 | The Assay Depot, Inc. | Decentralized data verification |
US11003537B2 (en) * | 2018-05-29 | 2021-05-11 | Micron Technology, Inc. | Determining validity of data read from memory by a controller |
US11520611B2 (en) * | 2018-08-20 | 2022-12-06 | Intel Corporation | Secure public cloud using extended paging and memory integrity |
-
2019
- 2019-03-08 US US16/296,334 patent/US11354418B2/en active Active
-
2020
- 2020-02-13 TW TW109104544A patent/TWI737172B/zh active
- 2020-02-17 WO PCT/EP2020/054101 patent/WO2020182420A1/en active Application Filing
- 2020-02-17 CA CA3132735A patent/CA3132735A1/en active Pending
- 2020-02-17 PL PL20705701.9T patent/PL3935545T3/pl unknown
- 2020-02-17 BR BR112021017438A patent/BR112021017438A2/pt unknown
- 2020-02-17 SG SG11202105427YA patent/SG11202105427YA/en unknown
- 2020-02-17 JP JP2021546786A patent/JP7388802B2/ja active Active
- 2020-02-17 ES ES20705701T patent/ES2969160T3/es active Active
- 2020-02-17 MX MX2021010585A patent/MX2021010585A/es unknown
- 2020-02-17 KR KR1020217025552A patent/KR102551935B1/ko active IP Right Grant
- 2020-02-17 IL IL285161A patent/IL285161B2/en unknown
- 2020-02-17 HU HUE20705701A patent/HUE065398T2/hu unknown
- 2020-02-17 EP EP20705701.9A patent/EP3935545B1/en active Active
- 2020-02-17 CN CN202080019498.XA patent/CN113544679A/zh active Pending
- 2020-02-17 AU AU2020236629A patent/AU2020236629B2/en active Active
-
2021
- 2021-08-30 ZA ZA2021/06315A patent/ZA202106315B/en unknown
Also Published As
Publication number | Publication date |
---|---|
US20200285753A1 (en) | 2020-09-10 |
KR20210121087A (ko) | 2021-10-07 |
AU2020236629B2 (en) | 2023-01-19 |
BR112021017438A2 (pt) | 2021-11-16 |
HUE065398T2 (hu) | 2024-05-28 |
CN113544679A (zh) | 2021-10-22 |
PL3935545T3 (pl) | 2024-03-25 |
IL285161A (en) | 2021-09-30 |
JP7388802B2 (ja) | 2023-11-29 |
SG11202105427YA (en) | 2021-06-29 |
IL285161B2 (en) | 2024-03-01 |
US11354418B2 (en) | 2022-06-07 |
ES2969160T3 (es) | 2024-05-16 |
EP3935545C0 (en) | 2023-12-20 |
ZA202106315B (en) | 2023-03-29 |
TW202101263A (zh) | 2021-01-01 |
IL285161B1 (en) | 2023-11-01 |
KR102551935B1 (ko) | 2023-07-06 |
JP2022522627A (ja) | 2022-04-20 |
AU2020236629A1 (en) | 2021-06-10 |
EP3935545A1 (en) | 2022-01-12 |
EP3935545B1 (en) | 2023-12-20 |
WO2020182420A1 (en) | 2020-09-17 |
CA3132735A1 (en) | 2020-09-17 |
TWI737172B (zh) | 2021-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2021010585A (es) | Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo. | |
US8281115B2 (en) | Security method using self-generated encryption key, and security apparatus using the same | |
TW200604798A (en) | Method and system for bootstrapping a trusted server having redundant trusted platform modules | |
RU2018141237A (ru) | Использование аппаратно-обеспечиваемой защищенной изолированной области для предотвращения пиратства и мошенничества в электронных устройствах | |
KR101284676B1 (ko) | 암호화 기반 사용자 인증 및 안드로이드 앱 불법복제 방지시스템 및 그 방법 | |
WO2015121806A3 (en) | System and method for securing content keys delivered in manifest files | |
US20140237255A1 (en) | Decryption and Encryption of Application Data | |
WO2018213744A3 (en) | REDUCTION OF SENSITIVE DATA COMPROMISE IN A VIRTUAL MACHINE | |
GB2544672A (en) | PUF and address dependent data encryption | |
RU2004113566A (ru) | Безопасная связь с клавиатурой или родственным устройством | |
CA2585987A1 (en) | System and method for protecting master encryption keys | |
US20120102323A1 (en) | Data security protection method | |
JP2009501470A5 (es) | ||
WO2013130555A3 (en) | Method of operating a computing device, computing device and computer program | |
KR20120072011A (ko) | 무결성 검증이 가능한 데이터 암호장치, 복호장치 및 방법 | |
RU2010114241A (ru) | Многофакторная защита контента | |
JP2019517080A5 (es) | ||
RU2019117050A (ru) | Управление шифрованием данных посредством множества органов управления | |
GB2587957A (en) | Method for provisioning device certificates for electronic processors in untrusted environments | |
CN110096849A (zh) | 一种License授权认证方法、装置、设备及可读存储介质 | |
US8577024B2 (en) | Concealing plain text in scrambled blocks | |
CN108199827B (zh) | 客户端代码完整性校验方法、存储介质、电子设备及系统 | |
BR112022000995A2 (pt) | Sistema de criptografia e descriptografia segura aperfeiçoado | |
US20230418911A1 (en) | Systems and methods for securely processing content | |
JP5043421B2 (ja) | 情報処理装置およびその方法 |