Method and apparatus for distinguishing reachable objects and non-reachable objects in an object-based application
    1.
    发明授权
    Method and apparatus for distinguishing reachable objects and non-reachable objects in an object-based application 失效
    用于在基于对象的应用程序中区分可达对象和不可达对象的方法和装置

    公开(公告)号:US06889303B2

    公开(公告)日:2005-05-03

    申请号:US10240840

    申请日:2001-03-09

    IPC分类号: G06F12/02

    摘要: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.

    摘要翻译: 本发明涉及一种用于在具有易失性存储器和非易失性存储器的系统中的基于对象的应用中区分可到达对象和不可达对象的方法。 基于对象的应用程序在对象上的非易失性存储器中运行,其中至少一个是根对象。 每个根对象通过写入从根对象可达到的每个对象来处理,将可达性信息传递到易失性存储器中,并将非易失性存储器中的这些对象标记为可重用存储器,在该存储器中不存在正面的可达性信息 易失性存储器

    Method and device for carrying out a function assigned to an instruction code
    2.
    发明授权
    Method and device for carrying out a function assigned to an instruction code 有权
    用于执行分配给指令代码的功能的方法和设备

    公开(公告)号:US06339820B1

    公开(公告)日:2002-01-15

    申请号:US09302153

    申请日:1999-04-29

    IPC分类号: G06F930

    摘要: A space-efficient and flexible mechanism for implementing a virtual machine in a resource-constrained environment such as a smartcard is proposed. The virtual machine is designed for interpreting or carrying out instructions which are identified by an instruction code, also called opcode. Both, the addresses, respectively identifiers, of the functions implementing the instruction codes, respectively opcodes, which the virtual machine interprets, as well as parameters to those functions are kept within lookup tables.

    摘要翻译: 提出了一种在资源有限的环境(如智能卡)中实现虚拟机的节省空间的灵活机制。 虚拟机设计用于解释或执行由指令代码(也称为操作码)标识的指令。 执行指令代码的功能,虚拟机解释的各个操作码的地址,分别标识符以及这些功能的参数都保存在查找表中。

    Device and method with reduced information leakage
    3.
    发明授权
    Device and method with reduced information leakage 失效
    减少信息泄漏的装置和方法

    公开(公告)号:US07543159B2

    公开(公告)日:2009-06-02

    申请号:US10495345

    申请日:2002-11-05

    IPC分类号: G06F12/14

    摘要: Provides a data processing system comprising a processor and encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. The second persistent memory stores a cryptographic key for decrypting the encrypted information, generating therefrom unencrypted information that is usable by the processor for executing an operation. The cryptographic key may be used for encrypting the unencrypted information, generating the encrypted information. Also provided is a method of processing such a data-processing system with an operating system, comprising writing unencrypted information into the first persistent memory, encrypting the unencrypted information under use of the first cryptographic key, creating therefrom encrypted information in the first persistent memory, and setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system.

    摘要翻译: 提供包括处理器和加密信息的数据处理系统,其中第一持久存储器的信息泄漏级别高于第二持久存储器。 第二持久存储器存储用于对加密信息进行解密的加密密钥,从而生成由处理器可用于执行操作的未加密信息。 加密密钥可以用于加密未加密的信息,生成加密的信息。 还提供了一种处理具有操作系统的这种数据处理系统的方法,包括将未加密的信息写入到第一持久存储器中,对使用第一加密密钥的未加密信息进行加密,从而在第一永久存储器中创建加密信息, 并且将数据处理系统设置为由操作系统控制对第一永久存储器的写入的状态。

    PROVIDING A USER DEVICE WITH A SET OF ACCESS CODES
    4.
    发明申请
    PROVIDING A USER DEVICE WITH A SET OF ACCESS CODES 失效
    用一组访问代码提供用户设备

    公开(公告)号:US20080226076A1

    公开(公告)日:2008-09-18

    申请号:US12125247

    申请日:2008-05-22

    摘要: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.

    摘要翻译: 一种向用户设备提供一组接入码的方法,包括在用户设备中存储加密密钥和识别码,以及经由通信网络向服务器发送包含识别码的消息。 在服务器中,对应于存储在用户设备中的密钥存储加密密钥,在从用户设备接收到识别码时分配一组接入码。 基于在消息中接收到的识别码执行查找功能,以从存储中检索密钥。 使用检索到的密钥对访问代码集进行加密以产生加密集。 包含加密集的消息经由网络发送到用户设备。 在用户装置中,使用存储器中的密钥对从服务器接收到的加密集进行解密,并且存储解密的一组访问码以供用户装置的用户使用。

    Method and device for creating an object in a non-persistent memory and/or keeping accessibility to said object
    5.
    发明授权
    Method and device for creating an object in a non-persistent memory and/or keeping accessibility to said object 有权
    用于在非持久存储器中创建对象和/或保持对所述对象的可访问性的方法和设备

    公开(公告)号:US06772171B1

    公开(公告)日:2004-08-03

    申请号:US09302152

    申请日:1999-04-29

    IPC分类号: G06F1700

    摘要: A method for creating an object in a non-persistent memory is proposed. From an instruction code sequence, a first instruction code is read out which effects the execution of a first function which effects the choice of a non-persistent memory as the location for the next object to be created. This object creation is effected by the execution of a second function which is effected by reading out a second instruction code. Furthermore it is proposed to store a pointer to a transient object in the stack memory and to provide a mechanism for writing this pointer to and reading it from a persistent memory.

    摘要翻译: 提出了一种用于在非持久存储器中创建对象的方法。 从指令代码序列读出第一指令代码,该第一指令代码影响执行非永久存储器的第一功能的执行作为要创建的下一个对象的位置。 通过执行通过读出第二指令代码来实现的第二函数来实现该对象创建。 此外,建议将指针存储到堆栈存储器中的瞬态对象,并且提供用于将该指针写入并从永久存储器读取它的机制。

    Method and apparatus for transactional writing of data into a persistent memory
    6.
    发明授权
    Method and apparatus for transactional writing of data into a persistent memory 有权
    用于将数据事务写入持久存储器的方法和装置

    公开(公告)号:US06272607B1

    公开(公告)日:2001-08-07

    申请号:US09382100

    申请日:1999-08-24

    IPC分类号: G06F1216

    CPC分类号: G06K1/128 G06F12/023

    摘要: A method for transactional writing of data into a data space in a persistent memory. The data space has a data space header which signals that the data space is free. A data header is generated when there is a writing transaction in the data space. After successful completion of the transactional writing, the data header signals that the data space is occupied by the written data. The data is written directly to the persistent memory, and in the case the transactional writing is not successfully completed, the data space header is valid for the data space. If the transactional writing is successfully completed, the data header is valid for the written data in the data space. A persistent buffer serves for storing validity information for ensuring the validity of the data header or the data space header as appropriate.

    摘要翻译: 一种将数据事务写入持久存储器中的数据空间的方法。 数据空间具有数据空间标题,表示数据空间是空闲的。 当在数据空间中存在写入事务时,生成数据头。 在成功完成事务写入之后,数据头表示数据空间被写入的数据占用。 将数据直接写入持久存储器,在事务写入未成功完成的情况下,数据空间头对数据空间有效。 如果事务写入成功完成,则数据头对数据空间中的写入数据有效。 持久缓冲器用于存储用于确保数据头或数据空间头的合法性的有效性信息。

    Providing a user device with a set of a access codes
    7.
    发明申请
    Providing a user device with a set of a access codes 审中-公开
    向用户设备提供一组访问代码

    公开(公告)号:US20060168657A1

    公开(公告)日:2006-07-27

    申请号:US10532195

    申请日:2003-10-24

    IPC分类号: G06F12/14

    摘要: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.

    摘要翻译: 一种向用户设备提供一组接入码的方法,包括在用户设备中存储加密密钥和识别码,以及经由通信网络向服务器发送包含识别码的消息。 在服务器中,对应于存储在用户设备中的密钥存储加密密钥,在从用户设备接收到识别码时分配一组接入码。 基于在消息中接收到的识别码执行查找功能,以从存储中检索密钥。 使用检索到的密钥对访问代码集进行加密以产生加密集。 包含加密集的消息经由网络发送到用户设备。 在用户装置中,使用存储器中的密钥对从服务器接收到的加密集进行解密,并且存储解密的一组访问码以供用户装置的用户使用。

    Device and method with reduced information leakage
    8.
    发明申请
    Device and method with reduced information leakage 失效
    减少信息泄漏的装置和方法

    公开(公告)号:US20060090081A1

    公开(公告)日:2006-04-27

    申请号:US10495345

    申请日:2002-11-05

    IPC分类号: G06F12/14 H04L9/32 G06F11/30

    摘要: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.

    摘要翻译: 本发明涉及一种数据处理系统,包括处理器和第一持久存储器中的第一加密信息,其信息泄漏级别高于第二持久存储器。 在第二持久存储器中存储用于解密第一加密信息的第一密码密钥,从而由处理器可用于执行操作的第一未加密信息生成。 相同的加密密钥也可以用于加密第一未加密信息,从而生成第一加密信息。 还涉及一种使用操作系统处理这种数据处理系统的方法,包括用于将第一未加密信息写入第一持久存储器的写入步骤,用于在使用第一密码的情况下加密第一未加密信息的加密步骤 密钥,从第一永久存储器中创建第一加密信息,以及访问限制步骤,用于将数据处理系统设置为由操作系统控制对第一永久存储器的写入的状态。 它还涉及对这种数据处理系统执行操作的方法,包括解密步骤,用于在使用第一加密密钥的情况下对第一加密信息进行解密,由此产生第一未加密信息,以及执行步骤,用于执行操作, 处理器,使用第一个未加密的信息。

    Flexibly deleting objects in a resource constrained environment
    9.
    发明授权
    Flexibly deleting objects in a resource constrained environment 有权
    灵活地删除资源约束环境中的对象

    公开(公告)号:US06272504B1

    公开(公告)日:2001-08-07

    申请号:US09289530

    申请日:1999-04-09

    IPC分类号: G06F1730

    摘要: Scheme for the distinguishing of reachable objects and non-reachable objects used by an object-based application in a system with volatile memory of limited size. The object-based application operates on n objects whereby Z objects thereof are root objects. The following steps are carried out for each root object: (a) traversing from said root object to any other object that can be reached from said root object; (b) marking all objects that were reached from said root object and storing, while marking, in said volatile memory a description of the path from said root object to the currently visited object; if the marking phase reaches an object and the respective path does not fit into said volatile memory, then this object is not marked but identified as an object which has to be processed later; and continuing the marking phase until all root objects identified as objects which have to be processed later are processed.

    摘要翻译: 用于区分由具有有限大小的易失性存储器的系统中的基于对象的应用程序使用的可达对象和不可达对象的方案。 基于对象的应用程序对n个对象进行操作,其中Z对象是根对象。 对每个根对象执行以下步骤:(a)从所述根对象遍历到可以从所述根对象到达的任何其他对象; (b)标记从所述根对象到达的所有对象,并且在所述易失性存储器中标记从所述根对象到当前访问对象的路径的描述的同时存储; 如果标记阶段到达对象并且相应的路径不适合所述易失性存储器,则该对象未被标记,但被标识为必须稍后处理的对象; 并继续标记阶段,直到所有被识别为稍后处理的对象的根对象被处理。

    Providing a user device with a set of access codes
    10.
    发明授权
    Providing a user device with a set of access codes 失效
    向用户设备提供一组访问代码

    公开(公告)号:US08302173B2

    公开(公告)日:2012-10-30

    申请号:US12125247

    申请日:2008-05-22

    IPC分类号: G06F7/04 G06F15/16

    摘要: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.

    摘要翻译: 一种向用户设备提供一组接入码的方法,包括在用户设备中存储加密密钥和识别码,以及经由通信网络向服务器发送包含识别码的消息。 在服务器中,对应于存储在用户设备中的密钥存储加密密钥,在从用户设备接收到识别码时分配一组接入码。 基于在消息中接收到的识别码执行查找功能,以从存储中检索密钥。 使用检索到的密钥对访问代码集进行加密以产生加密集。 包含加密集的消息经由网络发送到用户设备。 在用户装置中,使用存储器中的密钥对从服务器接收到的加密集进行解密,并且存储解密的一组访问码以供用户装置的用户使用。