Low-latency data decryption interface
    4.
    发明专利
    Low-latency data decryption interface 有权
    低数据数据分解接口

    公开(公告)号:JP2006074780A

    公开(公告)日:2006-03-16

    申请号:JP2005251301

    申请日:2005-08-31

    CPC classification number: G06F21/72 H04L9/06 H04L63/123 H04L2209/125

    Abstract: PROBLEM TO BE SOLVED: To provide a mechanism to minimize latency impact of data to be decrypted.
    SOLUTION: Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of encrypted data is validated (e.g., by checking for data transfer errors), the encrypted data may be pipelined to a decryption engine as it is received, thus allowing decryption to begin prior to validation. In some cases, the decryption engine may be notified of data transfer errors detected during the validation process, in order to prevent reporting false security violations.
    COPYRIGHT: (C)2006,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种最小化待解密数据的延迟影响的机制。 提供了用于减少与解密加密数据相关联的延迟的影响的方法和装置。 而不是等到整个加密数据包被验证(例如,通过检查数据传输错误),加密的数据可以在被接收时被流水线化到解密引擎,从而允许在验证之前开始解密。 在一些情况下,可以向解密引擎通知在验证过程期间检测到的数据传输错误,以防止报告错误的安全违规。 版权所有(C)2006,JPO&NCIPI

    INITIALIZING, MAINTAINING, UPDATING AND RECOVERING SECURE OPERATION WITHIN AN INTEGRATED SYSTEM EMPLOYING A DATA ACCESS CONTROL FUNCTION

    公开(公告)号:CA2638979C

    公开(公告)日:2017-06-06

    申请号:CA2638979

    申请日:2003-04-16

    Applicant: IBM

    Abstract: Techniques are provided for initializing, maintaining, updating and recovering secure operation within an integrated system. The techniques, which employ a data access control function within the integrated system, include authenticating by a current level of software a next level of software within an integrated system. The authenticating occurs before control is passed to the next level of software. Further, an ability of the next level of software to modify an operational characteristic of the integrated system can be selectively limited via the data access control function. Techniques are also provided for initializing secure operation of the integrated system, for migrating data encrypted using a first key set to data encrypted using a second key set, for updating software and keys within the integrated system, and for recovering integrated system functionality following a trigger event.

Patent Agency Ranking