Abstract:
PROBLEM TO BE SOLVED: To provide a system and a method, which obfuscates a database to a software application with a database function. SOLUTION: The system and the method that obfuscate the database preserving its functionality by modifying an original table name, a column name, a table order, a column order, and/or data character set such that a standard order of the original characters is maintained. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for secure communication. SOLUTION: In an embodiment of the method and system for secure communication, a computer system includes a primary system protocol stack operative in kernel space and interfacing with an external network. A secondary system protocol stack, security software, and at least one application program operate in user space, and may be provided on a portable storage medium by a user who does not have privileges to install programs in kernel space. The application program 52 interfaces with the secondary system protocol stack. The secondary system protocol stack interfaces with the primary system protocol stack. The security software operates on communications through the secondary system protocol stack. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To prevent reset of a state or alteration of a code as a result of takeover of a privileged position by a hacker or a malicious program.SOLUTION: A hypervisor operates on a host computer system and defines at least one virtual machine. An address space of the virtual machine exists on physical memory of the host computer system under control of the hypervisor. A guest operating system operates on the virtual machine. At least one of the hypervisor and the host operating system sets the part of an address space of the host computer system which corresponds to the part of the address space of the virtual machine to a lock state in which the part is readable but not writable.
Abstract:
PROBLEM TO BE SOLVED: To eliminate the risk of a breach of security of a subject virtual machine, down to and including the loss or theft of a copy of the entire virtual machine.SOLUTION: A host computer cloud 22 has a processor 26 and supports a virtual machine. An agent 42 under control of a user is in communication with the cloud 22 over a network 40. A key management server is in communication with the cloud 22 over the network 40. The cloud 22 stores the virtual machine in the form of a virtual encrypted disk 52 on a non-volatile storage medium 36. When commanded by the agent 42, the cloud 22 requests a disk-wrapping key from the key management server. The cloud 22 decrypts the encrypted disk 52 using the disk-wrapping key.
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus for automatically selecting routines for protection, a computer readable medium and a method.SOLUTION: An apparatus for protecting application, a computer readable medium, and a method are disclosed. The method includes the steps of: responding to receiving a security level for the application by evaluating each of a plurality of routines of the application to generate an evaluation for each of the plurality of routines of the application; selecting some routines among the plurality of routines to perform protection based on the evaluation for each of the plurality of routines and the received security level; and protecting the some selected routines among the plurality of routines.
Abstract:
PROBLEM TO BE SOLVED: To provide a token having multiple user security domains.SOLUTION: A security token has multiple independent application enclaves, on which different application providers can install encryption keys and/or other data to authenticate a user of the token to the respective applications of the enclaves.
Abstract:
PROBLEM TO BE SOLVED: To provide a system, method and computer program for encrypting disk images of a plurality of physical machines or virtual machines to permit deduplication between different machines.SOLUTION: A computer system includes a first region containing a fundamental image in the form of a mechanically readable code stored on a nonvolatile storage medium, a second region containing a machine image in the form of a mechanically readable code stored on the nonvolatile storage medium, and a deduplication device. The machine image in the second region includes a fundamental portion sufficiently similar to the fundamental image for the purpose of deduplication and a portion specific for the machine image in the second region. The fundamental image in the first region and the machine image in the second region are deduplicated by the deduplication device, and full disk encryption is performed on the portion specific for the second region by using a key that the first region cannot use.
Abstract:
PROBLEM TO BE SOLVED: To provide a compact and self-contained personal key. SOLUTION: The compact, self-contained, personal key is disclosed. The personal key includes a USB-compliant interface (206) releasably coupleable to: a host processing device (102); a memory (214); and a processor (212). The processor (212) requires the host processing device (102) conditional access to data storable in the memory (214) as well as the management of files stored by the personal key, and provides computation functionality that is performed based on the data in the files. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To disturb, prevent or detect reverse engineering or hacking of a computer code. SOLUTION: In an embodiment of a method of making a conditional jump in a computer running a program, an input is provided, conditional on which a substantive conditional branch is to be made. An obfuscatory unpredictable datum is provided. Code is executed that causes an obfuscatory branch conditional on the unpredictable datum. At a point in the computer program determined by the obfuscatory conditional branch, a substantive branch is made that is conditional on the input. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for detecting locking of a free-running oscillator (fro). SOLUTION: The output of an FRO sampler 110 is coupled with the input of a sample storage medium 120, and a pattern detection logic couples the sample storage medium with one or more pattern detectors 130, in terms of the operation for accessing a sample or acquire the sample. The pattern detector compares storage samples 1-N with storage samples (N+1)-2N, to investigate equivalence properties thereof; and, when finding that the samples 1 and 4 include identical values, the samples 2 and 5 include identical values, and the samples 3 and 6 include identical values, the samples 1, 2, 3 are taken as repetition of patterns identical to those of the samples 4, 5 and 6. COPYRIGHT: (C)2010,JPO&INPIT