MX2021010585A - Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo. - Google Patents

Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo.

Info

Publication number
MX2021010585A
MX2021010585A MX2021010585A MX2021010585A MX2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A MX 2021010585 A MX2021010585 A MX 2021010585A
Authority
MX
Mexico
Prior art keywords
operating system
system image
secure operating
page
secure
Prior art date
Application number
MX2021010585A
Other languages
English (en)
Inventor
Lisa Heller
Jonathan Bradbury
Reinhard Buendgen
Fadi Busaba
Christian Borntraeger
Viktor Mihajlovski
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Publication of MX2021010585A publication Critical patent/MX2021010585A/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45575Starting, stopping, suspending or resuming virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Se proporciona un procesamiento seguro dentro de un entorno informático al desencriptar gradualmente una imagen del sistema operativo segura, que incluye recibir, para una página de la imagen del sistema operativo segura, una dirección de página y un valor de ajuste utilizado durante la encriptación de la página. El procesamiento determina que el valor de ajuste no se haya utilizado previamente durante la desencriptación de otra página de la imagen del sistema operativo segura, y desencriptar el contenido de la página de memoria en la dirección de página utilizando una clave de encriptación de imagen y el valor de ajuste para facilitar la obtención de una imagen del sistema operativo segura desencriptada. Además, la integridad de la imagen del sistema operativo segura se verifica y con base en la verificación de la integridad de la imagen del sistema operativo segura, se inicia la ejecución de la imagen del sistema operativo segura desencriptada.
MX2021010585A 2019-03-08 2020-02-17 Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo. MX2021010585A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/296,334 US11354418B2 (en) 2019-03-08 2019-03-08 Incremental decryption and integrity verification of a secure operating system image
PCT/EP2020/054101 WO2020182420A1 (en) 2019-03-08 2020-02-17 Incremental decryption and integrity verification of a secure operating system image

Publications (1)

Publication Number Publication Date
MX2021010585A true MX2021010585A (es) 2021-10-13

Family

ID=69593703

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2021010585A MX2021010585A (es) 2019-03-08 2020-02-17 Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo.

Country Status (17)

Country Link
US (1) US11354418B2 (es)
EP (1) EP3935545B1 (es)
JP (1) JP7388802B2 (es)
KR (1) KR102551935B1 (es)
CN (1) CN113544679A (es)
AU (1) AU2020236629B2 (es)
BR (1) BR112021017438A2 (es)
CA (1) CA3132735A1 (es)
ES (1) ES2969160T3 (es)
HU (1) HUE065398T2 (es)
IL (1) IL285161B2 (es)
MX (1) MX2021010585A (es)
PL (1) PL3935545T3 (es)
SG (1) SG11202105427YA (es)
TW (1) TWI737172B (es)
WO (1) WO2020182420A1 (es)
ZA (1) ZA202106315B (es)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12008087B2 (en) * 2020-10-26 2024-06-11 Apple Inc. Secure reduced power mode
CN112989440B (zh) * 2021-04-21 2021-09-14 北京芯愿景软件技术股份有限公司 芯片、处理器驱动方法及电子设备
CN114547630B (zh) * 2022-04-25 2022-08-09 宁波均联智行科技股份有限公司 一种基于车机多操作系统的验证方法及装置
US20240249000A1 (en) * 2023-01-25 2024-07-25 Qualcomm Incorporated Encryption with enhanced tweak generation
CN116956364B (zh) * 2023-09-21 2024-02-09 中航国际金网(北京)科技有限公司 虚拟化产品完整性校验方法、装置、系统及电子设备

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4245302A (en) 1978-10-10 1981-01-13 Magnuson Computer Systems, Inc. Computer and method for executing target instructions
US7162635B2 (en) 1995-01-17 2007-01-09 Eoriginal, Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US6138236A (en) 1996-07-01 2000-10-24 Sun Microsystems, Inc. Method and apparatus for firmware authentication
JP2007508623A (ja) 2003-10-08 2007-04-05 ユニシス コーポレーション 複数のノードにわたってシステムリソースを割り当てて管理する仮想データセンタ
US7984103B2 (en) 2008-11-25 2011-07-19 International Business Machines Corporation System and method for managing data transfers between information protocols
US9086913B2 (en) 2008-12-31 2015-07-21 Intel Corporation Processor extensions for execution of secure embedded containers
US8387114B2 (en) 2009-01-02 2013-02-26 International Business Machines Corporation Secure workload partitioning in a server environment
JP2011048661A (ja) 2009-08-27 2011-03-10 Nomura Research Institute Ltd 仮想サーバ暗号化システム
US8639783B1 (en) 2009-08-28 2014-01-28 Cisco Technology, Inc. Policy based configuration of interfaces in a virtual machine environment
US8856504B2 (en) 2010-06-07 2014-10-07 Cisco Technology, Inc. Secure virtual machine bootstrap in untrusted cloud infrastructures
US20120179904A1 (en) 2011-01-11 2012-07-12 Safenet, Inc. Remote Pre-Boot Authentication
US9092644B2 (en) * 2011-12-28 2015-07-28 Intel Corporation Method and system for protecting memory information in a platform
US9594927B2 (en) 2014-09-10 2017-03-14 Intel Corporation Providing a trusted execution environment using a processor
GB2532415A (en) 2014-11-11 2016-05-25 Ibm Processing a guest event in a hypervisor-controlled system
US10599458B2 (en) 2015-01-23 2020-03-24 Unisys Corporation Fabric computing system having an embedded software defined network
US10303899B2 (en) * 2016-08-11 2019-05-28 Intel Corporation Secure public cloud with protected guest-verified host control
US12063309B2 (en) * 2018-04-26 2024-08-13 The Assay Depot, Inc. Decentralized data verification
US11003537B2 (en) * 2018-05-29 2021-05-11 Micron Technology, Inc. Determining validity of data read from memory by a controller
US11520611B2 (en) * 2018-08-20 2022-12-06 Intel Corporation Secure public cloud using extended paging and memory integrity

Also Published As

Publication number Publication date
US20200285753A1 (en) 2020-09-10
KR20210121087A (ko) 2021-10-07
AU2020236629B2 (en) 2023-01-19
BR112021017438A2 (pt) 2021-11-16
HUE065398T2 (hu) 2024-05-28
CN113544679A (zh) 2021-10-22
PL3935545T3 (pl) 2024-03-25
IL285161A (en) 2021-09-30
JP7388802B2 (ja) 2023-11-29
SG11202105427YA (en) 2021-06-29
IL285161B2 (en) 2024-03-01
US11354418B2 (en) 2022-06-07
ES2969160T3 (es) 2024-05-16
EP3935545C0 (en) 2023-12-20
ZA202106315B (en) 2023-03-29
TW202101263A (zh) 2021-01-01
IL285161B1 (en) 2023-11-01
KR102551935B1 (ko) 2023-07-06
JP2022522627A (ja) 2022-04-20
AU2020236629A1 (en) 2021-06-10
EP3935545A1 (en) 2022-01-12
EP3935545B1 (en) 2023-12-20
WO2020182420A1 (en) 2020-09-17
CA3132735A1 (en) 2020-09-17
TWI737172B (zh) 2021-08-21

Similar Documents

Publication Publication Date Title
MX2021010585A (es) Desencriptado incremental y verificacion de integridad de una imagen segura de sistema operativo.
US8281115B2 (en) Security method using self-generated encryption key, and security apparatus using the same
TW200604798A (en) Method and system for bootstrapping a trusted server having redundant trusted platform modules
RU2018141237A (ru) Использование аппаратно-обеспечиваемой защищенной изолированной области для предотвращения пиратства и мошенничества в электронных устройствах
KR101284676B1 (ko) 암호화 기반 사용자 인증 및 안드로이드 앱 불법복제 방지시스템 및 그 방법
WO2015121806A3 (en) System and method for securing content keys delivered in manifest files
US20140237255A1 (en) Decryption and Encryption of Application Data
WO2018213744A3 (en) REDUCTION OF SENSITIVE DATA COMPROMISE IN A VIRTUAL MACHINE
GB2544672A (en) PUF and address dependent data encryption
RU2004113566A (ru) Безопасная связь с клавиатурой или родственным устройством
CA2585987A1 (en) System and method for protecting master encryption keys
US20120102323A1 (en) Data security protection method
JP2009501470A5 (es)
WO2013130555A3 (en) Method of operating a computing device, computing device and computer program
KR20120072011A (ko) 무결성 검증이 가능한 데이터 암호장치, 복호장치 및 방법
RU2010114241A (ru) Многофакторная защита контента
JP2019517080A5 (es)
RU2019117050A (ru) Управление шифрованием данных посредством множества органов управления
GB2587957A (en) Method for provisioning device certificates for electronic processors in untrusted environments
CN110096849A (zh) 一种License授权认证方法、装置、设备及可读存储介质
US8577024B2 (en) Concealing plain text in scrambled blocks
CN108199827B (zh) 客户端代码完整性校验方法、存储介质、电子设备及系统
BR112022000995A2 (pt) Sistema de criptografia e descriptografia segura aperfeiçoado
US20230418911A1 (en) Systems and methods for securely processing content
JP5043421B2 (ja) 情報処理装置およびその方法