Computer recording medium for sealing secret for calling program, and method for unsealing secret
    1.
    发明专利
    Computer recording medium for sealing secret for calling program, and method for unsealing secret 有权
    计算机记录密码用于呼叫程序的秘密记录和解密密码的方法

    公开(公告)号:JP2011204284A

    公开(公告)日:2011-10-13

    申请号:JP2011158404

    申请日:2011-07-19

    CPC classification number: G06F21/6218

    Abstract: PROBLEM TO BE SOLVED: To enable specific one or more target programs to decrypt encrypted data.SOLUTION: A computer recording medium encrypts data using a public key such as a symmetric key, seals an identifier of a target program for encryption in encrypted data, determines whether the target program (a program whose identifier is shown by a secret) can decrypt the encrypted data and allows the target program to decrypt it.

    Abstract translation: 要解决的问题:使特定的一个或多个目标程序能够解密加密的数据。解决方案:计算机记录介质使用诸如对称密钥的公共密钥来加密数据,在加密数据中密封用于加密的目标程序的标识符,确定 目标程序(其标识符是否由秘密显示)可以解密加密数据,并允许目标程序对其进行解密。

    Using limits on address translation to control access to addressable entity
    3.
    发明专利
    Using limits on address translation to control access to addressable entity 有权
    使用地址转换的限制来控制对可寻址实体的访问

    公开(公告)号:JP2003330799A

    公开(公告)日:2003-11-21

    申请号:JP2003112225

    申请日:2003-04-16

    CPC classification number: G06F12/145

    Abstract: PROBLEM TO BE SOLVED: To make a data storage resource identifiable by physical addresses and optionally by a virtual address. SOLUTION: A policy defines which resources are accessible and which resources are not accessible. A request to access a resource is allowed if access to the resource is permitted by the policy, and if carrying out the access will not cause virtual addresses to be assigned to the resources to which the policy disallows access. Since resources to which access is disallowed do not have virtual addresses, certain types of access requests that identify a resource by a virtual address can be allowed without consulting the policy. COPYRIGHT: (C)2004,JPO

    Abstract translation: 要解决的问题:使数据存储资源可以通过物理地址和可选的虚拟地址来标识。 解决方案:策略定义哪些资源是可访问的,哪些资源不可访问。 如果策略允许对资源的访问,则允许访问资源的请求,并且如果执行访问不会导致将虚拟地址分配给策略不允许访问的资源。 由于不允许访问的资源没有虚拟地址,因此可以允许在不咨询策略的情况下识别虚拟地址的资源的某些类型的访问请求。 版权所有(C)2004,JPO

    Projection of trustworthiness from trusted environment to untrusted environment
    5.
    发明专利
    Projection of trustworthiness from trusted environment to untrusted environment 有权
    从信息环境到非侵入环境的信任投射

    公开(公告)号:JP2005056429A

    公开(公告)日:2005-03-03

    申请号:JP2004232729

    申请日:2004-08-09

    CPC classification number: G06F21/552 G06F21/57

    Abstract: PROBLEM TO BE SOLVED: To provide a mechanism for projecting the trustworthiness of entities in a trusted environment to entities in an untrusted environment. SOLUTION: In a single machine that has entities running in an untrusted environment and entities running in a trusted environment, the trustworthiness of the entities in the trusted environment is projected to the entities in the untrusted environment. This hosts an operating system (for example, the nexus) in which a normal operating system is protected by security. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种用于将可信环境中的实体的可信度投影到不可信环境中的实体的机制。 解决方案:在具有在不受信任环境中运行的实体和运行在受信任环境中的实体的单个机器中,可信环境中的实体的可信度将投影到不受信任环境中的实体。 这是一个操作系统(例如,连接),其中正常的操作系统受到安全保护。 版权所有(C)2005,JPO&NCIPI

    NOTIFYING USER MODE SCHEDULER OF BLOCKING EVENTS
    7.
    发明申请
    NOTIFYING USER MODE SCHEDULER OF BLOCKING EVENTS 审中-公开
    通知用户模式调度器的阻塞事件

    公开(公告)号:WO2008157455A3

    公开(公告)日:2009-03-05

    申请号:PCT/US2008067052

    申请日:2008-06-15

    Applicant: MICROSOFT CORP

    CPC classification number: G06F9/485 G06F9/524

    Abstract: Various technologies and techniques are disclosed for detecting and handling blocking events. A user mode thread is assigned a dedicated backing thread. System calls are made on the dedicated backing thread. The kernel detects when a system call results in a blocking event. A core that the dedicated backing thread is currently running on is observed. An entry in a per process table that maps cores to a currently associated primary thread waiting to be woken is consulted. The currently associated primary thread for the core is woken with a special result code to indicate that it was woken due to the blocking system call. The primary thread is released back to the application. A user mode scheduler is notified of the blocking event so a core can continue to be utilized.

    Abstract translation: 公开了用于检测和处理阻塞事件的各种技术和技术。 用户模式线程被分配一个专用的背衬线程。 系统调用在专用后备线上进行。 内核检测系统调用何时导致阻塞事件。 观察到专用背衬线程正在运行的核心。 在每个进程表中将核心映射到等待被唤醒的当前关联的主线程的一个条目。 用于核心的当前关联的主线程用特殊结果代码唤醒,以指示由于阻塞系统调用而唤醒它。 主线程被释放回应用程序。 通知用户模式调度器阻塞事件,以便核心可以继续被利用。

    Integration of high-assurance feature into application through application factoring
    8.
    发明专利
    Integration of high-assurance feature into application through application factoring 有权
    通过应用因素将高保真特征集成到应用中

    公开(公告)号:JP2005129033A

    公开(公告)日:2005-05-19

    申请号:JP2004278411

    申请日:2004-09-24

    CPC classification number: G06F21/53

    Abstract: PROBLEM TO BE SOLVED: To execute, in parallel with each other, a large-scale system having advanced features and a small-scale system for providing high-level security. SOLUTION: An application's functionality is partitioned into two groups depending on whether or not a specific operation like processing of secret data is executed. Separate software objects (processors) are created to perform these two groups of operations. A trusted processor handles secure data and runs in a high-assurance environment. When another processor detects secure data, that data are sent to the trusted processor. The data are wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes the objects to the correct processor, and allows their integrity to be attested through a chain of trust leading back to a base component that is known to be trustworthy. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:并行执行具有高级特征的大型系统和用于提供高级安全性的小规模系统。 解决方案:根据是否执行特定操作(如处理秘密数据),将应用程序的功能划分为两组。 创建独立的软件对象(处理器)来执行这两组操作。 值得信赖的处理器处理安全数据并在高保证环境中运行。 当另一个处理器检测到安全数据时,该数据被发送到可信处理器。 数据被包装成允许其被路由到可信处理器的方式,并且防止数据被除了可信处理器之外的任何实体解密。 提供了一个基础设施,用于包装对象,将对象路由到正确的处理器,并通过一个信任链来验证其完整性,并将其引导回已知可靠的基础组件。 版权所有(C)2005,JPO&NCIPI

Patent Agency Ranking