Abstract:
The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.
Abstract:
A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents of the inputted data.
Abstract:
The invention relates to a method for transactional writing of data into a persistent memory comprising memory cells, the method comprising a transactional writing step and a transaction recovery step, - the transactional writing step comprising one or more memory cell writing steps, the memory cell writing steps comprising the sub-steps of - writing in a transaction buffer as transaction buffer entry the current data value and the corresponding address of the respective memory cell, - writing a first valid marker for the memory cell in the transaction buffer, - writing a new data value to the memory cell; - the transaction recovery step being performed in case of an abortion of the transactional writing step and being provided for restoring the current data values of the aborted transaction in the persistent memory, the transaction recovery step comprising the sub- step of : - writing a transaction recovery marker to the transaction buffer indicating the start of the transaction recovery.
Abstract:
Performing secure electronic transactions The invention relates to a method for performing electronic transactions between a server computer (110) and a client computer (120), the method comprising the steps of: - running a first communication protocol with encrypted data transmission and mutual authentication between the server computer (110) and a hardware device (130) via a communication network (160), - performing a decryption of encrypted server responses received from the server computer (110) in the hardware device (130), - forwarding the decrypted server responses from the hardware device (130) to the client computer (120), - displaying the decrypted server responses on a client computer display (121) of the client computer (120), - receiving client requests to be send from the client computer (120) to the server computer (110) by the hardware device (130), - parsing the client requests for predefined transaction information by the hardware device (130), - encrypting and forwarding client requests that do not contain any predefined transaction information to the server computer (110) by the hardware device (130), - displaying the predefined transaction information upon detection in a client request on a hardware device display (210) of the hardware device (130), - forwarding and encrypting the client request containing the predefined transaction information to the server computer (110) if a user confirmation is received, - canceling the electronic transaction if no user confirmation is received.
Abstract:
The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user, wherein the credential user is provided with a user device, wherein a first channel and a second channel are provided for communication between the user device and the credential issuer, the method comprising the steps of: - distributing a shared key between the user device and the credential issuer by means of the second channel, - generating a binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution, - encrypting the binary representation of the set of credentials by means of the shared key, - distributing the encrypted set of credentials via the first channel from the credential issuer to the user device, - decrypting the encrypted set of credentials by the user device by means of the shared key.
Abstract:
An authorization device (5) is provided for authorizing operations of a remote server (2) requested from user computers (3) via a data communications network (4). The device (5) has a computer interface (6) for connecting the device (5) to a local user computer (3) for communication with the remote server (2), and a user interface (7) for presenting information to a user. Control logic (11) of the device (5) is adapted to use security data to establish between the device (5) and server (2), via the local user computer (3), a mutually- authenticated connection for encrypted end-to-end communications between the device and server. The control logic (11) collects from the server (2) via this connection information indicative of any operations requested by user computers via other connections to the server (2) and requiring authorization by a user of the device (5). This information is presented to a user via the user interface (7) to prompt for authorization by the user. Server operations are controlled in accordance with rule data (18) defining operations requiring authorization by one or more authorizing users. Control logic (15) of the server control apparatus responds to an operation request from a user computer (3) by determining from the rule data (18) whether authorization by at least one authorizing user is required for that operation. If so, the operation is deferred. When a mutually-authenticated connection is established with an authorizing device (5), the control apparatus can supply information indicative of any deferred operations requested from user computers (3) and requiring authorization by the device user. A deferred operation is only performed on receipt of authorization from every authorizing user from whom authorization is required for that operation, providing secure multi-party authorization in a mobile computing environment.
Abstract:
A system and method comprise operating a solid state memory as a cache, where a chunk of data is added to or removed from the cache based on the frequency of occurrence h(X) of the chunk of data in the system. This may mean the number of times the chunk of data is found in the cache, the hard disk drives (HDD), or any collection of memories and storage of the computer. The solid state memory may be a NAND flash memory, and may be located between main memory (or a higher level cache) and the HDDs. The chunks of data may be pages or blocks. Whether a chunk is populated to or evicted from the cache may also depend on how frequently or how recently d(X) the data was accessed/used. The chunks of data may have associated metadata which gives relevant information about attributes of the chunks, and this may be maintained on a watch list.
Abstract:
La invención en forma notable se dirige a un dispositivo de generación táctil móvil (10) que tiene: una lógica (12); y un sistema generador táctil (15) que comprende uno o más elementos generadores táctiles (151 - 159), en donde el sistema generador táctil se acopla operativamente con la lógica para generar (S30) eventos táctiles mediante el uno o más elementos generadores táctiles, los eventos táctiles son detectables por una pantalla táctil, de preferencia una pantalla táctil de detección capacitiva. La invención además se refiere a un método de comunicación bidireccional entre un dispositivo generador táctil y un dispositivo de pantalla táctil.
Abstract:
An authorization device (5) is provided for authorizing operations of a remote server (2) requested from user computers (3) via a data communications network (4). The device (5) has a computer interface (6) for connecting the device (5) to a local user computer (3) for communication with the remote server (2), and a user interface (7) for presenting information to a user. Control logic (11) of the device (5) is adapted to use security data to establish between the device (5) and server (2), via the local user computer (3), a mutually- authenticated connection for encrypted end-to-end communications between the device and server. The control logic (11) collects from the server (2) via this connection information indicative of any operations requested by user computers via other connections to the server (2) and requiring authorization by a user of the device (5). This information is presented to a user via the user interface (7) to prompt for authorization by the user. Server operations are controlled in accordance with rule data (18) defining operations requiring authorization by one or more authorizing users. Control logic (15) of the server control apparatus responds to an operation request from a user computer (3) by determining from the rule data (18) whether authorization by at least one authorizing user is required for that operation. If so, the operation is deferred. When a mutually-authenticated connection is established with an authorizing device (5), the control apparatus can supply information indicative of any deferred operations requested from user computers (3) and requiring authorization by the device user. A deferred operation is only performed on receipt of authorization from every authorizing user from whom authorization is required for that operation, providing secure multi-party authorization in a mobile computing environment.