摘要:
In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
摘要:
In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
摘要:
In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor, so that it becomes possible for the microprocessor to protect processes that actually execute the program, without an intervention of the operating system, and it becomes possible to conceal secret information of the program not only from the other user program but also from the operating system.
摘要:
In the method for sharing encrypted data region among two or more processes on a tamper resistant processor, one process creates the encrypted data region to be shared according to the common key generated as a result of the safe key exchange, and the other process maps that region to its own address space or process space. The address information of the shared encrypted data region and the common key of each process are set in relation in the encrypted attribute register inside the tamper resistant processor, so that it is possible to share the encrypted data region safely.
摘要:
In the method for sharing encrypted data region among two or more processes on a tamper resistant processor, one process creates the encrypted data region to be shared according to the common key generated as a result of the safe key exchange, and the other process maps that region to its own address space or process space. The address information of the shared encrypted data region and the common key of each process are set in relation in the encrypted attribute register inside the tamper resistant processor, so that it is possible to share the encrypted data region safely.
摘要:
In a microprocessor that internally has a microprocessor specific secret key, a key management unit is provided to carry out a key registration for reading out from an external memory a distribution key that is obtained in advance by encrypting the instruction key by using a public key corresponding to the secret key, decrypting the distribution key by using the secret key to obtain the instruction key, and registering the instruction key in correspondence to a specific program identifier for identifying the program into a key table, and to notify a completion of the key registration to the processor core asynchronously by interruption when the key registration is completed.
摘要:
The program synthesizing device according to the embodiment of the present invention includes: a coupling unit configured to couple an information acquiring plug-in module, an information processing plug-in module, and a presentation plug-in module through their input interfaces and output interfaces based on a mashup scenario; a plug-in module driving unit configured to sequentially drive the coupled plug-in modules; an information acquiring unit configured to acquire information when the information acquiring plug-in module is driven; an information processing unit configured to perform a predetermined process on the information when the information processing plug-in module is driven; an object resolving unit configured to determine a value of object presented by a specified presentation scenario when the presentation plug-in module is driven; and a program output unit configured to output a program being a presentation scenario in which the object value is resolved.
摘要:
An apparatus includes unit storing scripts includes a tree structure, each of the scripts including at least one of a child-node script and content, unit selecting a parent-node script among the scripts, and acquiring to analyze a child-node script if the child-node script exists, unit acquiring content if content exists, unit retrieving substitute content if the acquisition of content ends in failure and if content indicates retrieving substitute content, unit retrieving the substitute-child-node script if the acquisition of the child-node script ends in failure and if the child-node script indicates retrieving the substitute-child-node script, and retrieving the substitute-parent-node script when content or the child-node script shows retrieving the substitute-parent-node script, unit acquiring substitute content when substitute content is found, unit acquiring the substitute-child-node script and the substitute-parent-node script when the substitute-child-node script and the substitute-parent-node script are found, respectively, and unit acquiring a change script.
摘要:
A first acquisition unit acquires each of the resources defined by the scenario, from locations depending on identifiers of the resources. A judging unit judge, when a resource having same identifier and structure as the resource acquired is existent in the cache storage, erases the resource, the identifier thereof, and the receipt time information from the cache storage, and when not existent, stores the acquired resource in association with the identifier thereof and the receipt time information of the bookmark instruction, in the cache storage. A second acquisition, when the identifiers of the resources specified by a first scenario are existent in the cache storage, acquires the resources from the cache storage according to the receipt time information corresponding to the first scenario and identifiers of the resources, and when not existent, acquires the resources from a location depending on the identifiers.
摘要:
An information processing apparatus has an information acquiring unit which acquires a plurality of pieces of information over a network in accordance with an acquisition script included in a scenario, an information converting unit which extracts portions represented to a user from the respective pieces of acquired information in accordance with a conversion script included in the scenario, a movement adding unit which processes all or part of the presented portion so that display contents can be presented in such a form as to change and/or be accompanied with the sound output in accordance with a movement adding script included in the scenario, a statistics recording unit which records processing cost for each of the information acquiring unit, the information converting unit and the movement adding unit, an extraction unit which extracts dependency information showing a dependency relationship between the processes from the scenario, and a control unit which determines the priority of the processes to be carried out on the basis of the scenario, the dependency information and the processing cost, and controls the information acquiring unit, the information converting unit and the movement adding unit.