-
1.
公开(公告)号:MY152148A
公开(公告)日:2014-08-15
申请号:MYPI20084590
申请日:2008-11-14
Applicant: MIMOS BERHAD
Inventor: YAAKOB WIRA FIRDAUS BIN HAJI , TALIB AZHAR BIN ABU , BEG AHMAD RAIF BIN MOHAMED NOOR , AZIZ RAJA MOHD FUAD TENGKU
IPC: H04L9/12
Abstract: THE PRESENT INVENTION DISCLOSES A METHOD AND SYSTEM FOR PROVIDING OR ENSURING SYNCHRONIZATION OF CRYPTOGRAPHIC DEVICES FOR TRANSMISSION OF DATA WITHIN A VOICE CHANNEL, PARTICULARLY THE GSM VOICE CHANNEL NETWORK. THE TRANSMISSION SOURCE (100) IS CONFIGURED TO GENERATE SEVERAL CYCLES OF 32-BIT DIGITAL ZEROS DATA PRIOR TO TRANSMITTING THE ENCRYPTED DATA TO THE RECEPTION SOURCE (200). ACCORDINGLY, THE TRANSMISSION OF DIGITAL ZEROS DATA PROVIDES SUFFICIENT TIME FOR THE RECEPTION SOURCE (200) TO PREPARE FOR RECEIVING THE ENCRYPTED DATA FROM THE TRANSMISSION SOURCE (100) AND THEREBY ASSISTING IN SYNCHRONIZATION OF DEVICES INITIALIZATION FOR DATA TRANSMISSION. FIG 3
-
公开(公告)号:MY145949A
公开(公告)日:2012-05-31
申请号:MYPI20071578
申请日:2007-09-20
Applicant: MIMOS BERHAD
Inventor: KEONG WONG HAU , HARON GALOH RASHIDAH , BEE TAN FUI , SEAK SEA CHONG , SIONG NG KANG , TALIB AZHAR BIN ABU
Abstract: A TRUSTED COMPUTER PLATFORM (140) METHOD AND SYSTEM IS DISCLOSED FOR A SECURE COMPUTER SYSTEM WITHOUT A TRUST CREDENTIAL. THE PLATFORM (140) PROVIDES A FUNCTIONALITY OF A SECURE OR "TRUSTED COMPUTING" (TC) ENVIRONMENT TO PREVENT OR BLOCK UNAUTHORIZED COMPUTER PROGRAMS OR APPLICATIONS FROM RUNNING WITHIN THE COMPUTER SYSTEM AND PROVIDE A FULLY TRUSTED COMPUTER SYSTEM (140) HAVING 1) ENDORSEMENT KEY (118); 2) SECURE INPUT AND OUTPUT (102); 3) MEMORY CURTAINING / PROTECTED EXECUTION (104); 4) SEALED STORAGE; AND 5) REMOTE ATTESTATION (108). THE TRUSTED COMPUTER PLATFORM (140) IS AN IMPLEMENTATION THAT ACHIEVES AT LEAST A MECHANISM TO PROACTIVELY ESTABLISH MORE TRUSTED RELATIONSHIPS FOR REMOTE OR LOCAL ACCESS THROUGH SECURE USER AUTHENTICATION AND MACHINE ATTESTATION, PROTECT ENCRYPTION KEYS AND DIGITAL SIGNATURE KEYS TO MAINTAIN DATA CONFIDENTIALITY AND INTEGRITY, PROTECT KEY OPERATIONS AND OTHER SECURITY TASKS THAT WOULD OTHERWISE BE PERFORMED ON UNPROTECTED INTERFACES IN UNPROTECTED COMMUNICATIONS, OR PROTECT PLATFORM AND USER AUTHENTICATION INFORMATION FROM SOFTWARE- BASED ATTACKS.
-