Abstract:
A method to allow programs running within the application space of a device with a secure processor and a trusted computing base to flexibly use certificates that describe the required system state. An information processing device including PSC database (1112), Component and PSC Map (1202), and OS support (1200).
Abstract:
A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may not be present, not correctly authorized, or not correctly operating.
Abstract:
A device (110) according to an implementation of the present invention, having a plurality of virtual machines (1002, 1003, 1004, and 1005), includes a virtualization software (1001) which manages the virtual machines. The virtualization software includes an application VM creating unit (1300) which creates a virtual machine for executing a program. A first virtual machine (1002) determines whether a first program is to be executed on the first virtual machine or to be executed on a virtual machine other than the first virtual machine. When the first virtual machine determines that the first program is to be executed on the other virtual machine, the application VM creating unit creates a second virtual machine for executing the first program.
Abstract:
PROBLEM TO BE SOLVED: To provide a flexible setting method for a shared counter by sharing a counter with a tree structure between a plurality of security modules while suppressing the amount of secure memory usage. SOLUTION: The shared counter is achieved by making a node with a tree structure of a first counter group and a node with a tree structure of a second counter group shared between the first counter group with a tree structure managed by a first secure module and the second counter group with a tree structure managed by a second secure module. A sharing method by a tree structure flexibly makes an addition, elimination and access restriction setting of a module that uses the shared counter. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To prevent illegal action such as replacing information terminal software with a group of old modules if software is composed of a group of modules provided by more than one provider. SOLUTION: An information terminal includes: a first information processing section configured by executing a group of information processing modules of a first provider; a second information processing section configured by executing a group of information processing modules of a second provider; and a security module. The security module includes: a cumulating section for calculating a summarized cumulative value of a software module and storing the value in a register; a counter for holding a counter value indicating the version of the software module; and a configuration authentication section for authenticating the configuration of the software module. The first information processing section verifies configuration authentication data generated by the configuration authentication section and controls the activation of a software module in the group of information processing modules of the second provider. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a computing technology capable of securely correcting one rule element of complicated authentication rules in a reliable environment.SOLUTION: A security LSI with tamper resistance includes a nonvolatile memory, a volatile memory, a monotone counter region, a configuration register storing storage information related to a platform status, and an encryption section. The security LSI also includes an object rule correction ticket issue part that corrects a rule included in an object received from the outside. Only when the received object includes the same encryption hash as a stored encryption hash, the ticket issue part is activated. Therefore, a rule correction is performed by a method for which origin of the correction can be sufficiently checked.
Abstract:
PROBLEM TO BE SOLVED: To update certificates without making a customized set of updated certificates for each machine even if the machine has optional components. SOLUTION: The server 118 makes a set of updated certificates including all candidate pieces of software which can be activated in the device. A mobile device 110 receives the set from the server 118, and searches updated certificates corresponding to pieces of software which are being activated in the device 110. COPYRIGHT: (C)2010,JPO&INPIT