摘要:
A method for creating entropy in a virtualized computing environment includes waking one or more samplers, each sampler having a sampling frequency; sampling a sample source with each of the one or more samplers; placing each of the samplers in an inactive state when not sampling; determining a difference between an expected value and a sampled value at each sampler; and providing a function of the difference from each of the one or more samplers to an aggregator.
摘要:
A system and method for providing non-deterministic data for processes executed by non-synchronized processor elements of a fault resilient system is discussed. The steps of the method comprise receiving a request for getting non-deterministic data from a requesting processor element; assigning non-deterministic data generated by an entropy source to the request; and supplying the non-deterministic data assigned to the request, to the requesting processor element.
摘要:
A color-based content encoding system is provided that includes providing a color-containing image from an electronic device display including a fixed pixel grid, wherein the color-containing image includes a plurality of color pixels on the fixed pixel grid, each of the color pixels having sub-pixels correlating to encoded binary data; reading the color-containing image with a scanner; and decoding the encoded binary data. In one embodiment, the plurality of sub-pixels includes three sub-pixels, wherein each sub-pixel of the three sub-pixels corresponds to a binary data value of “1” or “0”.
摘要:
A method and computer processor system with anti-tamper capability and thermal packaging structure for implementing enhanced heat removal from processor circuitry, such as, a high-performance cell processor complex, and a design structure on which the subject circuit resides are provided. The computer system includes predefined processor circuits including anti-tamper logic. A volume container substantially contains the predefined processor circuits including the anti-tamper logic. A heat spreader is provided with the predefined processor circuits within the volume container. An external heatsink structure is attached to an outside cover above the volume container. The heatsink structure includes a heatsink base and a plurality of parallel fins extending outwardly from the heatsink base. A heat pipe extending through a folded mesh is attached to the heat spreader within the volume container and is attached to the external heatsink base providing an effective heat removal path for the processor circuits.
摘要:
A method and computer processor system with anti-tamper capability and thermal packaging structure for implementing enhanced heat removal from processor circuitry, such as, a high-performance cell processor complex, and a design structure on which the subject circuit resides are provided. The computer system includes predefined processor circuits including anti-tamper logic. A volume container substantially contains the predefined processor circuits including the anti-tamper logic. A heat spreader is provided with the predefined processor circuits within the volume container. An external heatsink structure is attached to an outside cover above the volume container. The heatsink structure includes a heatsink base and a plurality of parallel fins extending outwardly from the heatsink base. A heat pipe extending through a folded mesh is attached to the heat spreader within the volume container and is attached to the external heatsink base providing an effective heat removal path for the processor circuits.
摘要:
A data processing system, which is particularly useful for carrying out modular multiplication, especially for cryptographic purposes, comprises a plurality of independent, serially connected processing elements which are provided with data in a cyclical fashion via a control mechanism that is capable of transferring data from a set of registers to earlier ones in the series of the serially connected processing elements, at the end of a predetermined number of cycles.
摘要:
In a communications channel coupled to multiple duplicated subsystems, a method, interposer and program product are provided for verifying integrity of subsystem responses. Within the communications channel, a first checksum is calculated with receipt of a first response from a first subsystem responsive to a common request, and a second checksum is calculated for a second response of a second subsystem received responsive to the common request. The first checksum and the second checksum are compared, and if matching, only one of the first response and the second response is forwarded from the communications channel as the response to the common request, with the other of the first response and the second response being discarded by the communications channel.
摘要:
A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.
摘要:
A computer method, computer system, and article for enabling digital signature auditing. The method includes the steps of: receiving at least one signature request issued by at least one application, forwarding a first data corresponding to the received at least one signature request to at least one signing entity for subsequent signature of the first data, storing an updated system state that is computed using a function of: i) a reference system state and ii) a second data corresponding to the received at least one signature request, where the reference system state and the updated system state attest to the at least one signature request, and repeating the above steps, using the updated system state as a new reference system state, where the steps of the method are executed at a server of a computerized system.
摘要:
Tamper detection circuitry includes a first surface layer surrounding a protected memory, the first surface layer comprising a first plurality of conductive sections; a second surface layer surrounding the protected memory, the second surface layer comprising a second plurality of conductive sections; a programmable interconnect located inside the first surface layer, the programmable interconnect being connected to each conductive section by a plurality of conductive traces, the programmable interconnect being configured to group the conductive section of the first and second plurality of conductive sections into a plurality of circuits, each of the plurality of circuits having a different respective voltage; and a tamper detection module, the tamper detection module configured to detect tampering in the event that a conductive section that is part of a first circuit comes into physical contact with a conductive section that is part of a second circuit.