-
公开(公告)号:JPH01228038A
公开(公告)日:1989-09-12
申请号:JP31965988
申请日:1988-12-20
Applicant: IBM
Inventor: RICHIYAADO IIUIN BAAMU , TERII RII BOODEN , JIYASUTEIN RARUFU BATSUTOUERU , KAARU EDOWAADO KURAAKU , AREN JIYOOJI GANEKU , JIEEMUZU RAMU , MAIKERU JIERAADO MAARU , KENESU AANESUTO PURAMUBETSUKU , KIYASUPAA ANSONII SUKARUZUI , RICHIYAADO JIYON SHIYAMARUZU , RONARUDO MOOTON SUMISU , JIYURIAN TOOMASU
Abstract: PURPOSE: To block undesired access to an address space by performing the user management of address space corresponding to a token applied from a system for space identification. CONSTITUTION: An access register transform(ART) operation 10 uses contents in an access register for providing a segment table describer(STD) to be used for dynamic address translation(DAT). An instruction 12 contains an OP code, B field for designating a general-purpose register 14 containing a base address, and displacement D for generating the logical address of a storage area operand while being combined with the base address in the general-purpose register 14 through an adder 15. The STD from the ART 10 is combined with the logical address from the adder 15 and translated together by a DAT 18, and the real address of an operand to be used for the system is generated.
-
公开(公告)号:JPH02101491A
公开(公告)日:1990-04-13
申请号:JP21080289
申请日:1989-08-17
Applicant: IBM
Inventor: SUTEIBUN EMU MACHIIISU , DENISU JIII ABURAHAMU , DONARUDO BIII JIYONSON , RAMESHIYU KEI KAAN , AN BUI RI , ROSUTEISUROO PURAIMATSUKU , JIYURIAN TOOMASU , JIYON DEII UIRUKINZU , FUIRII SHIII JIEI
Abstract: PURPOSE: To completely cipher a part of data and to cause a permitted receiver to decode the other part by combining control vectors giving the permission of the use of a data ciphering key and a key that the transmitter of the key intends for the ciphering of data. CONSTITUTION: A cipher mechanism 4 is characterized by a safety protection boundary 6. An example for restoring the cipher key from a cipher key storage mechanism 22 is to permit a control vector inspection mechanism 14 to output a permission signal for restoring the cipher key to a cipher processing mechanism 16 through a line 20 when a cipher instruction storage device receives a cipher service request obtaining the restoration of the cipher key through an input/output route 8. Thus, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 in response to the permission key in the line 20 and restores the cipher key ciphered under a stored key being the AND of a related control vector and a master key stored in a master key storage mechanism 18.
-
公开(公告)号:JPH02105192A
公开(公告)日:1990-04-17
申请号:JP21154689
申请日:1989-08-18
Applicant: IBM
Inventor: SUTEIBUN EMU MATEIISU , DENIIZU JIII ABARAHAMU , DONARUDO BIII JIYONSON , RAMESHIYU KEI KAAN , AN BUI RI , ROOSUTEISUROO PURAIMAKU , JIYURIAN TOOMASU , JIYON DEII UIRUKINZU , FUIRU SHIII II , RONARUDO EMU SUMISU
Abstract: PURPOSE: To provide a flexible method for key-connecting a format, use and processing permission by correlating a control vector permitting key use, which the setter of the key intends, to the generation key of a personal identification number(PIN) and the ciphering key of PIN. CONSTITUTION: Restriction for the permission of the related key is contained in use designated by the control vector with several PIN processing instructions such as the generation, verification and conversion of PIN and PIN block generation. The control vector restricts the permission of the several instructions for processing clear sentence PIN input at the time of PIN verification and the like. Furthermore, the control vector identifies the PIN processing for specified PIN format or specified processing algorithm and contains information for restriction according to circumstances. Thus, the flexible method for connecting the format, use and processing permission to the key is obtained by introducing such control vector.
-
公开(公告)号:JPH0299984A
公开(公告)日:1990-04-11
申请号:JP20711289
申请日:1989-08-11
Applicant: IBM
Inventor: SUTEIBUN EMU MACHIIISU , DENISU JIII ABURAHAMU , DONARUDO BIII JIYONSON , RAMESHIYU KEI KAAN , AN BUI RI , ROSUTEISUROO PURAIMATSUKU , JIYURIAN TOOMASU , JIYON DEII UIRUKINZU , FUIRII SHIII JIEI
Abstract: PURPOSE: To protect the cipher function and the safety of a stored or distributed key by permitting a cipher instruction storage device to execute a key management function with a cipher key, permitting a control vector inspection means to judge that the key management function is permitted, and permitting a cipher processing means to execute the requested key management function with the cipher key. CONSTITUTION: When a cipher instruction storage mechanism 10 receives a cipher service request for obtaining the restoration of the cipher key from a cipher key storage mechanism 22, the control vector inspection mechanism 14 outputs a permission signal showing that the function for restoring the cipher key is permitted to the cipher processing mechanism 16 through a line 20. Then, the cipher processing mechanism 16 receives the cipher key ciphered from the cipher key storage mechanism 22 and operates not to cipher the cipher key ciphered under a stored key being AND with a related control vector and a master key stored in a master key storage mechanism 18. Thus, practical and highly flexible key management technology can be obtained.
-
5.
公开(公告)号:JPH07191944A
公开(公告)日:1995-07-28
申请号:JP19860892
申请日:1992-07-24
Applicant: IBM
IPC: G06F15/16 , G06F9/46 , G06F9/52 , G06F15/177
Abstract: PURPOSE: To provide a system and method for preventing dead lock in a multiprocessor computer system which requests many resources. CONSTITUTION: This system detects a latent dead lock situation in which a multiresource instruction is interrupted from capturing one of resources. Multiresource instruction global lock which can be held by at most one processor is applied. At the time of detecting competition, the processor tries to capture this multiresource instruction global lock, and when it succeeds, resource capture is resumed. The usage of the global lock guarantees that many resource requests are serialized, and the processor holding the lock can substantially capture all the requested resources without being accompanied by any dead lock with another processor. In a preferable execution example, the global lock is captured with an exception as a base for minimizing the influence of the overhead. However, a synonym detection logic is applied for detecting a situation in which competition occurs due to address resolution to synonym lock by the processor so that the other execution examples using the global lock can be executed in each multiresource instruction.
-
公开(公告)号:JPH0619392A
公开(公告)日:1994-01-28
申请号:JP16707991
申请日:1991-07-08
Applicant: IBM
Inventor: RUSHINA RIINIEN GURIIN , MAIKERU JIEEMUZU KERII , RONARUDO MOOTON SUMISU , JIYURIAN TOOMASU , FUIRU CHIICHIYUN IEE
Abstract: PURPOSE: To dynamically change the cryptographic master key of a system without stopping the system or spoiling the integrity of cipher processing operation that is being executed. CONSTITUTION: A cipher processing mechanism 102 and a cipher processing support program 111 are used. Individual master keys are given characteristic version numbers. When an inputted master key is used as a new current master key, the current master key used so far is changed into an old master key. When it is found from a version number attached to a received cipher processing request that the key used for the received request is a key ciphered with the old master key, the key is reciphered and converted from the key ciphered with the old master key into a key ciphered with the current master key, and the converted key is used thereafter.
-
公开(公告)号:JPS6010358A
公开(公告)日:1985-01-19
申请号:JP9579184
申请日:1984-05-15
Applicant: IBM
Inventor: JIYON HENRII ERUBAATO , AASAA RUISU REBUIN , JIYURIAN TOOMASU
IPC: G06F11/34
-
-
-
-
-
-