TAMPER RESISTANT METHODS AND APPARATUS
    1.
    发明授权
    TAMPER RESISTANT METHODS AND APPARATUS 失效
    反对干预方法安全性和装置

    公开(公告)号:EP0900488B1

    公开(公告)日:2006-01-11

    申请号:EP97931181.8

    申请日:1997-06-12

    申请人: INTEL CORPORATION

    IPC分类号: H04K1/00 G06F1/00

    CPC分类号: G06F21/57 G06F21/14

    摘要: In accordance with a first aspect of the present invention, a security sensitive program (100) that operates with a secret (101) is made tamper resistant by distributing the secret in space as well as in time. In accordance with a second aspect of the present invention, a security sensitive program is made tamper resistant by obfuscating the program. In accordance with a third aspect of the present invention, a security sensitive application is made tamper resistant by isolating its security sensitive functions, and making the isolated security sensitive functions tamper resistant by distributing the secrets of the security sensitive functions in time as well as in space, and/or obfuscating the security sensitive functions. In one embodiment where obfuscation is employed, the pseudo-randomly selected pattern(s) of mutations is (are) unique for each installation. In accordance with a fourth aspect of the present invention, a security sensitive system with security sensitive applications is made further tamper resistant by deploying an interlocking trust mechanism. In accordance with a fifth aspect of the present invention, a content industry association, in conjunction with content manufacturers, content reader manufacturers, and content player manufacturers of the industry jointly implement a coordinated encryption/decryption scheme, with the player apparatus manufactured by the content player manufacturers employing playing software that include tamper resistant decryption functions.

    DETECTING INTRUSIONS IN A NETWORK
    2.
    发明公开
    DETECTING INTRUSIONS IN A NETWORK 审中-公开
    检测不正确输入中的网络的

    公开(公告)号:EP1451999A1

    公开(公告)日:2004-09-01

    申请号:EP02794049.3

    申请日:2002-11-26

    申请人: INTEL CORPORATION

    IPC分类号: H04L29/06

    摘要: Detecting intrusions includes detecting a possible security problem at a client location, transmitting notice of the possible security problem across a network in real time to a home location remotely located from the client location, determining at the home location an anomaly based on at least the possible security problem, and transmitting notice of the anomaly in real time to the client location.

    TAMPER RESISTANT METHODS AND APPARATUS
    3.
    发明公开
    TAMPER RESISTANT METHODS AND APPARATUS 失效
    反对干预方法安全性和装置

    公开(公告)号:EP0900488A1

    公开(公告)日:1999-03-10

    申请号:EP97931181.0

    申请日:1997-06-12

    申请人: INTEL CORPORATION

    IPC分类号: G06F1 G06F21

    CPC分类号: G06F21/57 G06F21/14

    摘要: In accordance with a first aspect of the present invention, a security sensitive program (100) that operates with a secret (101) is made tamper resistant by distributing the secret in space as well as in time. In accordance with a second aspect of the present invention, a security sensitive program is made tamper resistant by obfuscating the program. In accordance with a third aspect of the present invention, a security sensitive application is made tamper resistant by isolating its security sensitive functions, and making the isolated security sensitive functions tamper resistant by distributing the secrets of the security sensitive functions in time as well as in space, and/or obfuscating the security sensitive functions. In one embodiment where obfuscation is employed, the pseudo-randomly selected pattern(s) of mutations is (are) unique for each installation. In accordance with a fourth aspect of the present invention, a security sensitive system with security sensitive applications is made further tamper resistant by deploying an interlocking trust mechanism. In accordance with a fifth aspect of the present invention, a content industry association, in conjunction with content manufacturers, content reader manufacturers, and content player manufacturers of the industry jointly implement a coordinated encryption/decryption scheme, with the player apparatus manufactured by the content player manufacturers employing playing software that include tamper resistant decryption functions.