会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • System and method for using address lines to control memory usage
    • 使用地址线控制内存使用的系统和方法
    • US07653802B2
    • 2010-01-26
    • US10928786
    • 2004-08-27
    • Dinarte R. MoraisJeffrey A. Andrews
    • Dinarte R. MoraisJeffrey A. Andrews
    • G06F9/32
    • G06F12/10G06F12/1027G06F12/145
    • A computing environment maintains the integrity of data stored in system memory. The system has a memory management unit that maintains a plurality of real page numbers. The system also comprises an address bus in communication with the memory management unit. The address bus comprises a plurality of address lines, wherein a value of at least one address line is set by a real page number from the memory management unit. The system has an operating system that controls memory usage by controlling the real page numbers stored in said page table that is accessed by the memory management unit. At least one security feature such as data encryption is selectively applied to data stored in a page of said memory as enabled by a value of said address line set by said real page number.
    • 计算环境维护存储在系统存储器中的数据的完整性。 该系统具有维持多个真实页码的存储器管理单元。 该系统还包括与存储器管理单元通信的地址总线。 地址总线包括多个地址线,其中至少一个地址线的值由来自存储器管理单元的实际页号设置。 该系统具有通过控制由存储器管理单元访问的存储在所述页表中的真实页码来控制存储器使用的操作系统。 至少一个诸如数据加密的安全特征被选择性地应用于由所述真实页码设置的所述地址线的值所启用的存储在所述存储器的页面中的数据。
    • 4. 发明授权
    • System and method for using address bits to signal security attributes of data in the address space
    • 使用地址位来表示地址空间中数据的安全属性的系统和方法
    • US07444523B2
    • 2008-10-28
    • US10928970
    • 2004-08-27
    • Dinarte R. MoraisJeffrey A. Andrews
    • Dinarte R. MoraisJeffrey A. Andrews
    • H04L9/32H04L9/00
    • G06F21/85G06F21/78
    • A integrity control system uses the address bits to enable encryption and/or protection of data stored in a system memory. The encryption and protection mechanisms are coupled to the CPU by way of a data bus and to the memory by way of a data bus. An address bus that determines the location of data to be stored or retrieved from system memory has a plurality of address lines. At least one of the address lines enabling the encryption mechanism to encrypt data before storage in the memory and to decrypt data after retrieval from memory. Another address line enables the protection mechanism to generate a hash of the data. The hash is stored and used to determine whether data has been altered while stored in system memory.
    • 完整性控制系统使用地址位来启用对存储在系统存储器中的数据的加密和/或保护。 加密和保护机制通过数据总线和数据总线连接到CPU。 确定要从系统存储器存储或检索的数据的位置的地址总线具有多个地址线。 至少一个地址线使加密机制能够在存储器中存储之前对数据进行加密,并且在从存储器检索之后解密数据。 另一个地址线使得保护机制能够生成数据的散列。 哈希存储并用于确定在存储在系统内存中数据是否已更改。
    • 5. 发明申请
    • TAMPER RESISTANT MEMORY PROTECTION
    • 防篡改记忆保护
    • US20090222675A1
    • 2009-09-03
    • US12040654
    • 2008-02-29
    • Sebastian LangeDinarte R. MoraisVictor TanAdam G. Poulos
    • Sebastian LangeDinarte R. MoraisVictor TanAdam G. Poulos
    • G06F12/14G06F12/00
    • G06F21/64
    • Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing layer that can dynamically encrypt and then dynamically hash sensitive information, as it is being loaded to dynamic memory of a computing device. For example, a memory unit that can correspond to a memory page can be processed by the security layer, and header data, code, and protect-worthy data can be secured, while other non-sensitive data can be left alone. Once such information is secured and stored in dynamic memory, it can be accessed at a later time by a processor and unencrypted and hash checked. Then, it can be loaded back onto the dynamic memory, thereby preventing direct memory access attacks.
    • 公开了用于在计算环境中保护存储器的安全性的各种机制。 安全层可以具有加密层和散列层,其可以在被加载到计算设备的动态存储器时动态加密然后动态地散列敏感信息。 例如,可以由安全层处理可对应于存储器页面的存储单元,并且可以确保头数据,代码和保护值数据,而其他非敏感数据可以单独存在。 一旦这样的信息被保护并存储在动态存储器中,它可以在稍后的时间被处理器访问,并且进行未加密和散列检查。 然后,它可以加载回动态内存,从而防止直接的内存访问攻击。
    • 6. 发明授权
    • System and method for secure execution of program code
    • 用于安全执行程序代码的系统和方法
    • US07802110B2
    • 2010-09-21
    • US10925657
    • 2004-08-25
    • Dinarte R. Morais
    • Dinarte R. Morais
    • G06F12/14
    • G06F21/51
    • A system comprises a memory and a processor that supports different privilege levels. Only program code executing at a certain privilege level is permitted to map memory and to assign access permission to the mapped memory, such as read-only, writable, and executable. Control code executing on the processor at that privilege level, in response to a request from other code executing at a different privilege level, maps a portion of memory for loading an executable file. After the executable file has been loaded into the mapped memory, the control code then verifies a signature associated with the executable file. If the signature is verified, the control code permits the executable file to be executed by the processor at a privilege level other than the one at which the control code executes. Otherwise, the control code prevents the executable file from being executed on the processor.
    • 系统包括支持不同权限级别的存储器和处理器。 仅允许在特定权限级别执行的程序代码映射存储器并为映射的存储器分配访问权限,例如只读,可写和可执行。 响应于在不同权限级别执行的其他代码的请求,在该特权级别处理器上执行的控制代码映射用于加载可执行文件的一部分存储器。 在将可执行文件加载到映射的存储器中之后,控制代码然后验证与可执行文件相关联的签名。 如果签名被验证,则控制代码允许处理器以除控制代码执行的特权级别之外的特权级别执行可执行文件。 否则,控制代码防止可执行文件在处理器上执行。
    • 10. 发明授权
    • Tamper resistant memory protection
    • 防篡改内存保护
    • US08726042B2
    • 2014-05-13
    • US12040654
    • 2008-02-29
    • Sebastian LangeDinarte R. MoraisVictor TanAdam G. Poulos
    • Sebastian LangeDinarte R. MoraisVictor TanAdam G. Poulos
    • G06F12/14
    • G06F21/64
    • Various mechanisms are disclosed for protecting the security of memory in a computing environment. A security layer can have an encryption layer and a hashing layer that can dynamically encrypt and then dynamically hash sensitive information, as it is being loaded to dynamic memory of a computing device. For example, a memory unit that can correspond to a memory page can be processed by the security layer, and header data, code, and protect-worthy data can be secured, while other non-sensitive data can be left alone. Once such information is secured and stored in dynamic memory, it can be accessed at a later time by a processor and unencrypted and hash checked. Then, it can be loaded back onto the dynamic memory, thereby preventing direct memory access attacks.
    • 公开了用于在计算环境中保护存储器的安全性的各种机制。 安全层可以具有加密层和散列层,其可以在被加载到计算设备的动态存储器时动态加密然后动态地散列敏感信息。 例如,可以由安全层处理可对应于存储器页面的存储单元,并且可以确保头数据,代码和保护值数据,而其他非敏感数据可以单独存在。 一旦这样的信息被保护并存储在动态存储器中,它可以在稍后的时间被处理器访问,并且进行未加密和散列检查。 然后,它可以加载回动态内存,从而防止直接的内存访问攻击。