摘要:
In a central system for receiving reports of utility usage from a number of remote meters, a provision is made for assuring that a received report has actually been transmitted from a meter that has been registered with the central system. During the registration process, the meter transmits its public cryptographic code to the central system. With each report of utility usage, the meter sends a version of a message encrypted with its private cryptographic key. The central system decrypts this message with the meter's public key. If it matches an unencrypted version of the message it is known that the meter sent the report. The unencrypted message may be generated by the central system and transmitted to the meter in a request for a report, or it may be generated by the meter and sent along with the encrypted version.
摘要:
In a central system for receiving reports of utility usage from a number of remote meters, a provision is made for assuring that a received report has actually been transmitted from a meter that has been registered with the central system. During the registration process, the meter transmits its public cryptographic code to the central system. With each report of utility usage, the meter sends a version of a message encrypted with its private cryptographic key. The central system decrypts this message with the meter's public key. If it matches an unencrypted version of the message it is known that the meter sent the report. The unencrypted message may be generated by the central system and transmitted to the meter in a request for a report, or it may be generated by the meter and sent along with the encrypted version.
摘要:
A method for preventing malicious software from execution within a computer system is disclosed. Before any actual execution of an application program on a computer system, the application program needs to be cross-compiled to yield a set of cross-compiled code of the application program. The set of cross-compiled code of the application program can then be executed in an execution module that is capable of recognizing and translating the set of cross-compiled code of the application program to the actual machine code of the processor.
摘要:
A method and system for backup and restore of a context encryption key (CEK) for a trusted device within a secured processing system maintains security of virtualized trusted device contexts, providing for replacement of a trusted device in the field. The CEK is encrypted along with a system identifier by a random number to yield a first result. The first result is again encrypted with a manufacturer public key. The resulting blob is stored along with the random number. To restore, the system sends the blob and the device ID to a server. The server obtains the first result by decrypting with the manufacturer private key, re-encrypts with the device public key and sends the new result back. The system sends the new result to the device along with the associated random number. The device decrypts the new result using its private key and decrypts the CEK using the random number.
摘要:
A method for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network.