Abstract:
Die Erfindung betrifft ein Verfahren zum Steuern einer Systemkonfiguration eines Hardwaresystems (100) mit einer Mehrzahl von Hardwarekomponenten (102, 106) unter Verwendung einer dem Hardwaresystem (100) zugeordneten Blockchain (120). Das Verfahren umfasst: ∙ Erstellen und Senden einer Änderungsanfrage zu einer Änderung der Systemkonfiguration des Hardwaresystems (100) durch eine erste Hardwarekomponente (106) der Mehrzahl von Hardwarekomponenten (102, 106), ∙ Empfangen der Änderungsanfrage durch die weiteren Hardwarekomponenten (102) der Mehrzahl von Hardwarekomponenten (102, 106), ∙ Prüfen der Änderungsanfrage durch die weiteren Hardwarekomponenten (102) auf ihre Kompatibilität mit der Konfiguration der jeweiligen empfangenden Hardwarekomponente (102) unter Verwendung von Konfigurationsdaten (118) der empfangenden Hardwarekomponente (102), ∙ im Falle, dass die angefragte Änderung der Systemkonfiguration kompatible mit der Konfiguration der empfangenden Hardwarekomponente (102) ist, Erzeugen und Senden einer Zustimmung zu der Änderung der Systemkonfiguration durch die empfangende Hardwarekomponente (102), und im Falle, dass ein für einen Konsens notwendiges Zustimmungsquorum der Hardwarekomponenten (102, 106) erreicht wird: ∙ Eintragen der angefragten Änderung der Systemkonfiguration des Hardwaresystems (100) in die Blockchain (120), ∙ Implementieren der angefragten Änderung der Systemkonfiguration in dem Hardwaresystem (100).
Abstract:
A system includes a data storage device containing encrypted data to be decrypted, and a VZ storage device containing a key material for decrypting data, wherein the VZ storage device decrypts the encrypted data by consuming a portion of the key material and stores the decrypted data in the consumed portion of the key material.
Abstract:
Providing secure software defined storage includes identifying data directed to be stored in a software defined storage location, intercepting the data, performing a security operation on the intercepted data, and transmitting the data to the software defined storage.
Abstract:
Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields; segmenting a first value in the first subset; instructing a first computing device to store a first subset of segments among the plurality of segments in memory; and instructing a second computing device to store a second subset of segments among the plurality of segments in memory.
Abstract:
According to some embodiments, an overall chain-of-trust may be established for an industrial control system. Secure hardware may be provided, including a hardware security module coupled to or integrated with a processor of the industrial control system to provide a hardware root-of-trust. Similarly, secure firmware associated with a secure boot mechanism such that the processor executes a trusted operating system, wherein the secure boot mechanism includes one or more of a measured boot, a trusted boot, and a protected boot. Objects may be accessed via secure data storage, and data may be exchanged via secure communications in accordance with information stored in the hardware security model.
Abstract:
An apparatus comprises 2 processing circuitry 4 for accessing data in a physically- indexed cache 20, 22. Set indicator recording circuitry 100 is provided to record a set indicator corresponding to a target physical address, where the set indicator depends on which set of one or more storage locations 50 of the cache 20 corresponds to the target physical address. The set indicator is insufficient to identify the target physical address itself. This enables performance issues caused by contention of data items for individual sets in a physically- indexed set-associative or direct-mapped cache to be identified without needing to expose the physical address itself to potentially insecure processes or devices.
Abstract:
A system for "horizontal" salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the "Key Character") and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field to represent a binary 0 or 1, with the value of the Key Character identifying the bit position of the binary 0 or 1 within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.