METHOD FOR CONTROLLING ACCESS TO A DISK DEVICE CONNECTED TO AN EXECUTION PLATFORM AND EXECUTION PLATFORM FOR CONTROLLING AN ACCESS TO A DISK DEVICE

    公开(公告)号:WO2023028282A1

    公开(公告)日:2023-03-02

    申请号:PCT/US2022/041616

    申请日:2022-08-26

    Abstract: The present invention provides a method for controlling access to a disk device (7) connected to an execution platform (1), the method comprising - reserving a first region (9) of the disk device (7) and storing an unique disk label (11) in said first region (9), wherein said first region (9) is not encrypted, - encrypting a second region (10) of the disk device (7), wherein the second region (10) includes user data and file information, said method further comprises providing a cipher agent (12) running on said execution platform (1) and carrying out the following steps in case an opening of the disk device (7) is requested, - reading the unique disk label (11) stored in the first region (9), - retrieving a protection policy for the disk device (7) based on the unique disk label (11) and - handling the further access to the disk device (7) based on the protection policy.

    一种数据管理的方法、设备及系统

    公开(公告)号:WO2022156588A1

    公开(公告)日:2022-07-28

    申请号:PCT/CN2022/071757

    申请日:2022-01-13

    Abstract: 本申请公开了一种数据管理的方法,该方法包括客户端可以根据明文数据的信息确定密文索引值,并将该密文索引值发送给云设备,云设备可以在索引结构(如:B-tree)中建立密文索引值与该明文数据对应的密文数据的存储位置的信息之间的对应关系,或者根据密文索引值从索引结构中查找该密文数据的存储位置,进而执行对密文数据的操作。本申请中,以密文索引值代替数据列中的字段作为常规有序索引中的键值实现对密文数据的查找,无需增加数据表字段就可以对表格中存储的密文数据进行基于顺序的查询,从而减少因用于存储密文数据的表格膨胀而占用的空间,提高了云设备中对存储数据的可扩展性。

    REPLICATING DATA FROM ISOLATED NETWORK
    5.
    发明申请

    公开(公告)号:WO2022067168A1

    公开(公告)日:2022-03-31

    申请号:PCT/US2021/052168

    申请日:2021-09-27

    Abstract: Systems and methods include a computer-implemented method: A number of process information (PI) tags are mapped to data elements of a local PI server of an isolated network. At a first time, a first application is executed at the isolated network to read and concatenate data on the isolated network corresponding to the tags and to replicate the data elements corresponding to temporary storage on the local PI server. A replicated data package is generated by the first application using the temporary storage. The replicated data package is transmissible through a firewall of a corporate network different from the isolated network. At a second time after the first time, a second application is executed at the corporate network to read data elements from the replicated data package corresponding to counterpart tags of the tags and to replicate the data elements according to instructions in the counterpart tags.

    一种密钥存取方法、装置、系统、设备和存储介质

    公开(公告)号:WO2021164167A1

    公开(公告)日:2021-08-26

    申请号:PCT/CN2020/098033

    申请日:2020-06-24

    Inventor: 邢希双

    Abstract: 一种密钥存取方法、装置、系统、设备和存储介质,当接收到业务数据时,按照预先设定的密钥生成规则,生成与业务数据相对应的应用标识和密钥数据;按照设定的算法对密钥数据进行格式转换。将应用标识和格式转换后的密钥数据保存至内核内存以及设定的物理硬盘中,实现了密钥数据的持久性保存;当获取到业务应用程序发送的携带有目标应用标识的密钥获取请求时,从内核内存中获取相对应的目标密钥数据。操作系统启动时,内核空间的启动先于所有应用程序启动,通过将密钥数据保存至内核内存,能够很好的保护密钥数据不被破坏。无需借助额外的硬件设备,在保证密钥数据的机密性和可用性的同时,降低了对密钥数据进行安全保护的成本。

    CRYPTOGRAPHIC COMPUTING IN MULTITENANT ENVIRONMENTS

    公开(公告)号:WO2021162792A1

    公开(公告)日:2021-08-19

    申请号:PCT/US2020/067072

    申请日:2020-12-26

    Abstract: A processor, a system, a machine readable medium, and a method. The processor comprises first circuitry to: encrypt a first code image using a first code key; load the encrypted first code image into a memory area allocated in memory for the first code image by an operating system running on the processor; and send to the operating system a substitute key that corresponds to the first code key, wherein the first code key is concealed from the operating system; and an instruction cache including control circuitry; and second circuitry coupled to the instruction cache, the second circuitry to: receive the substitute key from the operating system; in response to a first request from the operating system to execute the first code image to instantiate a first process, perform a first cryptographic function using a hardware key to generate the first code key from the substitute key; and program the control circuitry of the instruction cache with the first code key to enable the first code image to be decrypted using the first code key.

Patent Agency Ranking