VERIFYING DEVICE AND VERIFYING METHOD

    公开(公告)号:JPH02101491A

    公开(公告)日:1990-04-13

    申请号:JP21080289

    申请日:1989-08-17

    Applicant: IBM

    Abstract: PURPOSE: To completely cipher a part of data and to cause a permitted receiver to decode the other part by combining control vectors giving the permission of the use of a data ciphering key and a key that the transmitter of the key intends for the ciphering of data. CONSTITUTION: A cipher mechanism 4 is characterized by a safety protection boundary 6. An example for restoring the cipher key from a cipher key storage mechanism 22 is to permit a control vector inspection mechanism 14 to output a permission signal for restoring the cipher key to a cipher processing mechanism 16 through a line 20 when a cipher instruction storage device receives a cipher service request obtaining the restoration of the cipher key through an input/output route 8. Thus, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 in response to the permission key in the line 20 and restores the cipher key ciphered under a stored key being the AND of a related control vector and a master key stored in a master key storage mechanism 18.

    INDIVIDUAL IDENTIFYING NUMBER PROCESSING METHOD

    公开(公告)号:JPH02105192A

    公开(公告)日:1990-04-17

    申请号:JP21154689

    申请日:1989-08-18

    Applicant: IBM

    Abstract: PURPOSE: To provide a flexible method for key-connecting a format, use and processing permission by correlating a control vector permitting key use, which the setter of the key intends, to the generation key of a personal identification number(PIN) and the ciphering key of PIN. CONSTITUTION: Restriction for the permission of the related key is contained in use designated by the control vector with several PIN processing instructions such as the generation, verification and conversion of PIN and PIN block generation. The control vector restricts the permission of the several instructions for processing clear sentence PIN input at the time of PIN verification and the like. Furthermore, the control vector identifies the PIN processing for specified PIN format or specified processing algorithm and contains information for restriction according to circumstances. Thus, the flexible method for connecting the format, use and processing permission to the key is obtained by introducing such control vector.

    CERTIFYING DEVICE AND CERTIFYING METHOD

    公开(公告)号:JPH0299984A

    公开(公告)日:1990-04-11

    申请号:JP20711289

    申请日:1989-08-11

    Applicant: IBM

    Abstract: PURPOSE: To protect the cipher function and the safety of a stored or distributed key by permitting a cipher instruction storage device to execute a key management function with a cipher key, permitting a control vector inspection means to judge that the key management function is permitted, and permitting a cipher processing means to execute the requested key management function with the cipher key. CONSTITUTION: When a cipher instruction storage mechanism 10 receives a cipher service request for obtaining the restoration of the cipher key from a cipher key storage mechanism 22, the control vector inspection mechanism 14 outputs a permission signal showing that the function for restoring the cipher key is permitted to the cipher processing mechanism 16 through a line 20. Then, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 and operates not to cipher the cipher key ciphered under a stored key being AND with a related control vector and a master key stored in a master key storage mechanism 18. Thus, practical and highly flexible key management technology can be obtained.

    SYSTEM AND METHOD FOR PREVENTION OF DEADLOCK IN INSTRUCTION TO MANY RESOURCES BY MULTIPORCESSOR

    公开(公告)号:JPH07191944A

    公开(公告)日:1995-07-28

    申请号:JP19860892

    申请日:1992-07-24

    Applicant: IBM

    Abstract: PURPOSE: To provide a system and method for preventing dead lock in a multiprocessor computer system which requests many resources. CONSTITUTION: This system detects a latent dead lock situation in which a multiresource instruction is interrupted from capturing one of resources. Multiresource instruction global lock which can be held by at most one processor is applied. At the time of detecting competition, the processor tries to capture this multiresource instruction global lock, and when it succeeds, resource capture is resumed. The usage of the global lock guarantees that many resource requests are serialized, and the processor holding the lock can substantially capture all the requested resources without being accompanied by any dead lock with another processor. In a preferable execution example, the global lock is captured with an exception as a base for minimizing the influence of the overhead. However, a synonym detection logic is applied for detecting a situation in which competition occurs due to address resolution to synonym lock by the processor so that the other execution examples using the global lock can be executed in each multiresource instruction.

    CONTROL MECHANISM FOR CONTROL OF VERSION OF CODE KEY

    公开(公告)号:JPH0619392A

    公开(公告)日:1994-01-28

    申请号:JP16707991

    申请日:1991-07-08

    Applicant: IBM

    Abstract: PURPOSE: To dynamically change the cryptographic master key of a system without stopping the system or spoiling the integrity of cipher processing operation that is being executed. CONSTITUTION: A cipher processing mechanism 102 and a cipher processing support program 111 are used. Individual master keys are given characteristic version numbers. When an inputted master key is used as a new current master key, the current master key used so far is changed into an old master key. When it is found from a version number attached to a received cipher processing request that the key used for the received request is a key ciphered with the old master key, the key is reciphered and converted from the key ciphered with the old master key into a key ciphered with the current master key, and the converted key is used thereafter.

Patent Agency Ranking