Malware and tamper resistant computer architecture
    1.
    发明授权
    Malware and tamper resistant computer architecture 有权
    恶意软件和防篡改计算机体系结构

    公开(公告)号:US09208353B2

    公开(公告)日:2015-12-08

    申请号:US13766401

    申请日:2013-02-13

    CPC classification number: G06F21/71 G06F21/79 G06F2221/2107

    Abstract: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated data. An instruction memory that is physically separate from the data memory can be configured to receive the separated instructions. The system can include one or more computer processors that can be configured to execute the separated instructions and data. The system can include one or more encryptors or decryptors to help thwart injection based attacks.

    Abstract translation: 这里通常描述了用于增强篡改和防恶意软件的计算机体系结构的方法和系统。 用于增强篡改和恶意软件阻力的系统可以包括被配置为接收附带的指令和数据并产生分离的指令和数据的哈佛器。 可以将数据存储器配置为接收分离的数据。 物理上与数据存储器分离的指令存储器可以被配置为接收分离的指令。 该系统可以包括一个或多个可配置为执行分离的指令和数据的计算机处理器。 该系统可以包括一个或多个加密器或解密器,以帮助阻止基于注射的攻击。

    MALWARE AND TAMPER RESISTANT COMPUTER ARCHITECTURE
    2.
    发明申请
    MALWARE AND TAMPER RESISTANT COMPUTER ARCHITECTURE 有权
    恶意和防篡改计算机架构

    公开(公告)号:US20140229743A1

    公开(公告)日:2014-08-14

    申请号:US13766401

    申请日:2013-02-13

    CPC classification number: G06F21/71 G06F21/79 G06F2221/2107

    Abstract: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated data. An instruction memory that is physically separate from the data memory can be configured to receive the separated instructions. The system can include one or more computer processors that can be configured to execute the separated instructions and data. The system can include one or more encryptors or decryptors to help thwart injection based attacks.

    Abstract translation: 这里通常描述了用于增强篡改和防恶意软件的计算机体系结构的方法和系统。 用于增强篡改和恶意软件阻力的系统可以包括被配置为接收附带的指令和数据并产生分离的指令和数据的哈佛器。 可以将数据存储器配置为接收分离的数据。 物理上与数据存储器分离的指令存储器可以被配置为接收分离的指令。 该系统可以包括一个或多个可配置为执行分离的指令和数据的计算机处理器。 该系统可以包括一个或多个加密器或解密器,以帮助阻止基于注射的攻击。

Patent Agency Ranking