Abstract:
PROBLEM TO BE SOLVED: To enable specific one or more target programs to decrypt encrypted data.SOLUTION: A computer recording medium encrypts data using a public key such as a symmetric key, seals an identifier of a target program for encryption in encrypted data, determines whether the target program (a program whose identifier is shown by a secret) can decrypt the encrypted data and allows the target program to decrypt it.
Abstract:
PROBLEM TO BE SOLVED: To provide reliable side band communication between components in a computer system so as to avoid the use of a system bus. SOLUTION: Two components can be connected to each other through a means (an infrared port, a wire, an unused pin or the like) other than a bus; and thereby those kinds of components can communicate with each other without using the system bus. This non-bus communication channel can be called as a side band. By using the side band channel, information (public key or the like) allowing hardware of a user to be identified or other information which the user does not want to be easily intercepted by general public can be communicated. The communication via the side band channel can be used for confirming that things related to the communication are mutually present in a positional relationship with a range limited. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To make a data storage resource identifiable by physical addresses and optionally by a virtual address. SOLUTION: A policy defines which resources are accessible and which resources are not accessible. A request to access a resource is allowed if access to the resource is permitted by the policy, and if carrying out the access will not cause virtual addresses to be assigned to the resources to which the policy disallows access. Since resources to which access is disallowed do not have virtual addresses, certain types of access requests that identify a resource by a virtual address can be allowed without consulting the policy. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a mechanism for a protected operating system boot which prevents rogue components from being loaded with an operating system, and thus prevents divulgence of a system key under inappropriate circumstances. SOLUTION: After a portion of a machine startup procedure has occurred, the operating system loader is run, the loader is validated by a validator, and a correct machine state is either verified to exist and/or created. Once the loader has been verified to be a legitimate loader, and the machine state under which it is running is verified to be correct, the loader is carried out. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a mechanism for projecting the trustworthiness of entities in a trusted environment to entities in an untrusted environment. SOLUTION: In a single machine that has entities running in an untrusted environment and entities running in a trusted environment, the trustworthiness of the entities in the trusted environment is projected to the entities in the untrusted environment. This hosts an operating system (for example, the nexus) in which a normal operating system is protected by security. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system by which failure software can not illegally acquire data. SOLUTION: The code breaking of data is performed by a point where program access is disabled in a pixel data processing chain. COPYRIGHT: (C)2004,JPO
Abstract:
Various technologies and techniques are disclosed for detecting and handling blocking events. A user mode thread is assigned a dedicated backing thread. System calls are made on the dedicated backing thread. The kernel detects when a system call results in a blocking event. A core that the dedicated backing thread is currently running on is observed. An entry in a per process table that maps cores to a currently associated primary thread waiting to be woken is consulted. The currently associated primary thread for the core is woken with a special result code to indicate that it was woken due to the blocking system call. The primary thread is released back to the application. A user mode scheduler is notified of the blocking event so a core can continue to be utilized.
Abstract:
PROBLEM TO BE SOLVED: To execute, in parallel with each other, a large-scale system having advanced features and a small-scale system for providing high-level security. SOLUTION: An application's functionality is partitioned into two groups depending on whether or not a specific operation like processing of secret data is executed. Separate software objects (processors) are created to perform these two groups of operations. A trusted processor handles secure data and runs in a high-assurance environment. When another processor detects secure data, that data are sent to the trusted processor. The data are wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes the objects to the correct processor, and allows their integrity to be attested through a chain of trust leading back to a base component that is known to be trustworthy. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To prolong the life by performing increment by a flash memory and reducing erasure frequency. SOLUTION: A counter is implemented by using a method for minimizing bit transition from 1 to 50 and implemented by m+n bit. Bits of the counter are grouped into a binary section of an m-bit counter and a unary section of an n-bit counter. The unary section of the counter is first incremented and when the unary section reaches a specific value, the binary section of the counter is incremented. Thus, since the bit transition from 1 to 50 is restricted, unique values in a wide range is read from the counter. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a method for protecting data by a general-purpose computing device. SOLUTION: An encryption text including the data is generated in a form that only one or a plurality of target programs can obtain the data from the encryption text by using symmetrical encryption. A program on the calling side is allowed to access the data and only when maintainability of the data is successfully verified, the data are returned to the program on the calling side. COPYRIGHT: (C)2004,JPO