Method and apparatus for protecting memory stacks
    1.
    发明授权
    Method and apparatus for protecting memory stacks 有权
    用于保护存储器堆栈的方法和装置

    公开(公告)号:US06996677B2

    公开(公告)日:2006-02-07

    申请号:US10368596

    申请日:2003-02-20

    IPC分类号: G06F12/00

    摘要: Method and apparatus for protecting processing elements from buffer overflow attacks are provided. The apparatus includes a memory stack for, upon execution of a jump to subroutine, storing a return address in a first location in a stack memory. A second location separate from the stack memory for storing an address of the first location and a third location separate from the stack memory for storing the return address itself are included. A first comparator upon completion of the subroutine, compares the address stored in the second location to the first location in the stack memory and a first interrupt generator provides an interrupt signal if locations are not the same. A second comparator looks at the return address stored in the third location and the return address stored in the first location in the stack memory and has a second interrupt generator for generating an interrupt signal if addresses are not the same. A further method and apparatus for protecting processing elements from buffer overflow attacks includes a memory stack for, upon execution of a jump to subroutine in a first processor, storing a return address in a first location in a stack memory and a second location separate from the stack memory for storing results for the subroutine operation. Also included is a second processor including routines for data manipulation associated with the subroutine, separate from the first processor and for storing any resultant data in the second location, which is readable by the first processor separate from the stack memory.

    摘要翻译: 提供了用于保护处理元件免受缓冲器溢出攻击的方法和装置。 该装置包括一个存储器堆栈,用于在执行跳转到子程序时,将返回地址存储在栈存储器中的第一位置。 包括与用于存储第一位置的地址的堆栈存储器分离的第二位置和与用于存储返回地址本身的堆栈存储器分离的第三位置。 在子程序完成时,第一比较器将存储在第二位置的地址与堆栈存储器中的第一位置进行比较,如果位置不相同,则第一中断发生器提供中断信号。 第二比较器查看存储在第三位置的返回地址和存储在堆栈存储器中的第一位置的返回地址,并且具有用于在地址不相同时产生中断信号的第二中断产生器。 用于保护处理元件免受缓冲器溢出攻击的另一种方法和装置包括一个存储器堆栈,用于在执行第一处理器中的子程序的跳转时,将返回地址存储在堆栈存储器中的第一位置,以及与第 用于存储子程序运算结果的堆栈存储器。 还包括第二处理器,其包括用于与子程序相关联的用于数据操作的例程,与第一处理器分离并用于存储第二位置中的任何结果数据,该第二位置可由第一处理器与堆栈存储器分开读取。

    Method and system for encryption of streamed data
    2.
    发明申请
    Method and system for encryption of streamed data 有权
    流数据加密方法和系统

    公开(公告)号:US20050232424A1

    公开(公告)日:2005-10-20

    申请号:US10681158

    申请日:2003-10-09

    摘要: Method and system for encrypting streamed data employing fast set-up single use keys and self-synchronization. A transmitting handset produces a bitstream of voice data containing the session key and encrypted by an encryption signal based upon the session key. A receiving handset decrypts the incoming bitstream using the encryption signal and recognizes the session key, thereby establishing synchronization. The session key is derived from a seed by applying a first function to the seed. Following the call, the session key is converted into a new seed by application of a second function and the new seed is stored for use in the next call.

    摘要翻译: 使用快速设置单用键和自同步来加密流数据的方法和系统。 发送手机产生包含会话密钥的语音数据的比特流,并且基于会话密钥通过加密信号加密。 接收手机使用加密信号来解密输入比特流并识别会话密钥,从而建立同步。 会话密钥是通过向种子应用第一个函数从种子派生的。 在通话之后,通过应用第二个功能将会话密钥转换成新的种子,并且存储新的种子以用于下一个呼叫。

    Technique for preventing illegal invocation of software programs
    3.
    发明申请
    Technique for preventing illegal invocation of software programs 有权
    防止非法援引软件程序的技术

    公开(公告)号:US20060064593A1

    公开(公告)日:2006-03-23

    申请号:US10944945

    申请日:2004-09-21

    CPC分类号: G06F21/54 H04L9/3247

    摘要: A technique for preventing illegal invocation of software programs is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for preventing illegal invocation of software programs in a computer system having a first program that invokes a second program. The method may comprise generating a first digital signature for the first program. The method may also comprise making one or more permitted digital signatures available to the second program. The method may further comprise generating a first parameter for the first program, wherein the first parameter is cryptographically computed based on the first digital signature, a memory address for storing the first parameter, and a first system code that is unique to the computer system. The method may additionally comprise making the first parameter available to the second program.

    摘要翻译: 公开了一种防止非法调用软件程序的技术。 在一个特定的示例性实施例中,该技术可以被实现为用于防止在具有调用第二程序的第一程序的计算机系统中的非法调用软件程序的方法。 该方法可以包括为第一程序生成第一数字签名。 该方法还可以包括使一个或多个允许的数字签名可用于第二程序。 该方法还可以包括为第一程序生成第一参数,其中基于第一数字签名,用于存储第一参数的存储器地址和计算机系统唯一的第一系统代码对密码计算第一参数。 该方法可以另外包括使第一参数可用于第二程序。