Method and apparatus for cloud-assisted cryptography
    91.
    发明授权
    Method and apparatus for cloud-assisted cryptography 有权
    云辅助加密技术的方法与装置

    公开(公告)号:US09503433B2

    公开(公告)日:2016-11-22

    申请号:US14227319

    申请日:2014-03-27

    Abstract: In an embodiment, a system includes a processor that includes private key decryption logic to decrypt an encrypted private key received from a consuming device to produce a private key, and symmetric key decryption logic to receive the private key from the private key decryption logic and to decrypt an encrypted symmetric key received from the consuming device using the private key. The system also includes a dynamic random access memory (DRAM) coupled to the processor. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,系统包括处理器,其包括私钥解密逻辑,用于解密从消费设备接收的加密专用密钥以产生私钥,以及对称密钥解密逻辑,用于从私钥解密逻辑接收专用密钥, 使用私钥对从消费设备接收的加密对称密钥进行解密。 该系统还包括耦合到处理器的动态随机存取存储器(DRAM)。 描述和要求保护其他实施例。

    Detection of unauthorized memory modification and access using transactional memory
    92.
    发明授权
    Detection of unauthorized memory modification and access using transactional memory 有权
    使用事务性存储器检测未经授权的内存修改和访问

    公开(公告)号:US09384148B2

    公开(公告)日:2016-07-05

    申请号:US14367989

    申请日:2013-12-17

    Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a code segment identified as suspicious and detects a transactional abort during execution of the code segment. The computing device may execute a security support thread concurrently with the code segment that reads one or more monitored memory locations. A transactional abort may be caused by a read of the security support thread conflicting with a write from the code segment. The computing device may set a breakpoint within the code segment, and a transactional abort may be caused by execution of the code segment reaching the breakpoint. An abort handler determines whether a security event has occurred and reports the security event. The abort handler may determine whether the security event has occurred based on the cause of the transactional abort. Other embodiments are described and claimed.

    Abstract translation: 用于检测未经授权的存储器访问的技术包括具有事务存储器支持的计算设备。 计算设备执行标识为可疑的代码段,并且在执行代码段期间检测事务中止。 计算设备可以与读取一个或多个监视的存储器位置的代码段同时执行安全支持线程。 事务中止可能是由安全支持线程读取与代码段的写入冲突引起的。 计算设备可以在代码段内设置断点,并且可能由执行到达断点的代码段引起事务中止。 中止处理程序确定是否发生安全事件并报告安全事件。 中止处理程序可以基于事务中止的原因来确定安全事件是否已经发生。 描述和要求保护其他实施例。

    METHODS AND APPARATUS TO SECURELY SHARE DATA
    93.
    发明申请
    METHODS AND APPARATUS TO SECURELY SHARE DATA 有权
    安全分享数据的方法和装置

    公开(公告)号:US20150278531A1

    公开(公告)日:2015-10-01

    申请号:US14230618

    申请日:2014-03-31

    Abstract: Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file representative of a drive of the first device; encrypting, via a processor, the archive file to form an encrypted archive file; and conveying the encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of a second user of the cloud services, the decrypted archive file to be mounted to an operating system of the second device.

    Abstract translation: 公开了安全地共享数据的方法和装置。 一个示例包括在云服务的第一用户的第一设备处生成代表第一设备的驱动器的归档文件; 通过处理器加密存档文件以形成加密的存档文件; 以及将加密的存档文件传送到云服务提供商,由云服务的第二用户的第二设备解密的加密存档文件,将被安装到第二设备的操作系统的解密归档文件。

Patent Agency Ranking