LOCATION DEPENDENCE FOR ASSURING THE SECURITY OF SYSTEM-CONTROL ATIONS

    公开(公告)号:CA1078526A

    公开(公告)日:1980-05-27

    申请号:CA279128

    申请日:1977-05-25

    Applicant: IBM

    Abstract: LOCATION DEPENDENCE FOR ASSURING THE SECURITY OF SYSTEM-CONTROL OPERATIONS of the Invention A computer operating system security mechanism employing a non-penetrable hardware means for storing privileged instruction identification data for preventing direct unauthorized access to certain privileged instructions forming a part of the computer operating system; and further including memory address data boundary storage means for each said privileged instruction for preventing indirect access to such privileged instructions in memory by unauthorized branch instructions. The mechanism includes means associated with the computing system instruction register for recognizing privileged instruction and branch instructions. Storage means are included for each privileged instruction it is desired to protect for storing the address of the privileged instruction itself in memory, and both the upper and lower boundary address in memory relating to each such privileged instruction. Whenever a privileged instruction is recognized its address as specified in the running program is compared with the present security mechanism address for said privileged instruction and if there is "no match" a security violation signal and interrupt will be produced, Similarly when any branch instruction is recognized, its address is checked with all privileged instruction boundaries and if found to lie within any stored boundary a security violation and interrupt will similarly be signaled.

    2.
    发明专利
    未知

    公开(公告)号:FR2322406A1

    公开(公告)日:1977-03-25

    申请号:FR7620693

    申请日:1976-07-01

    Applicant: IBM

    Abstract: An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification code are respectively stored. A hash function, which is a function of the operating system being loaded and the identification code, is generated by the authenticator. After the operating system is loaded, the hash function is used as an authenticating value and compared with the verifier value for determining the authenticity of the loaded operating system.

    OPERATING SYSTEM AUTHENTICATOR
    3.
    发明专利

    公开(公告)号:CA1071771A

    公开(公告)日:1980-02-12

    申请号:CA258910

    申请日:1976-08-11

    Applicant: IBM

    Abstract: OPERATING SYSTEM AUTHENTICATOR of The Disclosure An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification code are respectively stored. A hash function, which is a function of the operating system being loaded and the identification code, is generated by the authenticator. After the operating system is loaded, the hash function is used as an authenticating value and compared with the verifier value for determining the authenticity of the loaded operating system.

Patent Agency Ranking