$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Processor with non-volatile mode enable register entering secure execution mode and encrypting secure program for storage in secure memory via private bus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0263221 (2008-10-31)
등록번호 US-8209763 (2012-06-26)
발명자 / 주소
  • Henry, G. Glenn
  • Parks, Terry
출원인 / 주소
  • VIA Technologies, Inc.
대리인 / 주소
    Huffman, Richard K.
인용정보 피인용 횟수 : 0  인용 특허 : 42

초록

An apparatus including a microprocessor and a secure non-volatile memory. The microprocessor is a single integrated circuit disposed on a single die, and executes non-secure application programs and a secure application program. The secure application program is executed in a secure execution mode.

대표청구항

1. An apparatus providing for a secure execution mode of operation, comprising: a microprocessor, comprising a single integrated circuit disposed on a single die, configured to execute non-secure application programs and a secure application program, wherein said secure application program is execut

이 특허에 인용된 특허 (42)

  1. Watt,Simon Charles, Apparatus and method for controlling access to a memory unit.
  2. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  3. Mazzagatte, Craig; Slick, Royce E.; Iwamoto, Neil, Authenticated secure printing.
  4. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  5. Kaplan, Michael M.; Ober, Timothy; Reed, Peter; Doud, Robert W., Cryptographic co-processor.
  6. Takahashi Richard J. (Phoenix AZ), Dual purpose security architecture with protected internal operating system.
  7. Henry G. Glenn ; Martin-de-Nicolas Arturo ; Miner Daniel G., Fuse array control for smart function enable.
  8. Goss, Steven C., Hybrid cryptographic accelerator and method of operation thereof.
  9. Curiger Andreas ; Little Wendell L., Integrated circuit having hardware circuitry to prevent electrical or thermal stressing of the silicon circuitry.
  10. Sibigtroth James M. (Round Rock TX) Rhoades Michael W. (Austin TX) Grimmer ; Jr. George G. (Austin TX) Longwell Susan W. (Austin TX), Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securin.
  11. Goss, Steven; Conti, Gregory, Interrupt morphing and configuration, circuits, systems and processes.
  12. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  13. Sundby, James Toner, Means to detect a missing pulse and reduce the associated PLL phase bump.
  14. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  15. Brownlee Paul M. (Gilbert AZ) Bills Jeffery E. (Chandler AZ), Method and apparatus for enhanced security of a data processor.
  16. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  17. Mittal,Millind, Method and apparatus for secure execution using a secure memory partition.
  18. Bulusu,Mallik; Zimmer,Vincent J., Method and apparatus for trusted blade device computing.
  19. Brannock, Kirk D.; Cheng, Antonio S., Method and apparatus for verifying authenticity of initial boot code.
  20. Wolfe Robert L. ; Pinals Jeffrey, Method and system for using a communication network to supply targeted streaming advertising in interactive media.
  21. Angelo, Michael F.; Michels, Peter J., Method for securely creating, storing and using encryption keys in a computer system.
  22. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method for selectively disabling interrupts on a secure execution mode-capable processor.
  23. McDevitt,Hugh W.; Spanel,Carol; Walls,Andrew D., Method, apparatus and program storage device for providing clocks to multiple frequency domains using a single input clock of variable frequency.
  24. Little Wendell L. ; Curry Stephen M. ; Grider Steven N. ; Thrower Mark L. ; Hass Steven N. ; Bolan Michael L. ; Fieseler Ricky D. ; Harrington Bradley M., Microcircuit with memory that is protected by both hardware and software.
  25. Michael C. Fischer ; Josh Hogan ; Terril Hurst ; Daniel Y. Abramovitch ; Carl Taussig, Missing pulse detector using synchronous detection.
  26. Ducharme,Paul, Monolithic semiconductor device for preventing external access to an encryption key.
  27. Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
  28. Kablotsky,Joshua, Programmable processor supporting secure mode.
  29. Pombo Raul (Plantation FL) Borras Jaime (Hialeah FL) Bron Michel (Lausanne CHX), Protection circuit for a microprocessor.
  30. Victor, Alan, Quality of phase lock and loss of lock detector.
  31. May, Marcus W., SOC with low power and performance modes.
  32. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  33. Dahan,Franck; Roussel,Christian; Chateau,Alain; Cumming,Peter, Secure mode for processors supporting interrupts.
  34. Sibert,W. Olin, Secure processing unit systems and methods.
  35. Fujiwara,Makoto; Nemoto,Yusuke; Yasui,Junichi; Maeda,Takuji; Ito,Takayuki; Yamada,Yasushi; Inoue,Shinji, Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method.
  36. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  37. Cooney Henry G. (Kettering OH), System and method for providing for secure encryptor key management.
  38. Sibigtroth James M. (Round Rock TX), System for securing a data processing system and method of operation.
  39. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  40. Hashimoto,Mikio; Teramoto,Keiichi; Saito,Takeshi; Shirakawa,Kenji; Fujimoto,Kensaku, Tamper resistant microprocessor.
  41. Watt, Simon Charles; Dornan, Christopher Bentley; Orion, Luc; Chaussade, Nicolas; Belnet, Lionel; Brochier, Stephane Eric Sebastian; Mansell, David Hennah; Symes, Dominic Hugo, Task following between multiple operating systems.
  42. Watt,Simon Charles; Dornan,Christopher Bentley; Orion,Luc; Chaussade,Nicolas; Belnet,Lionel; Brochier,Stephane Eric Sebastien; Mansell,David Hennah; Callan,Jonathan Sean, Vectored interrupt control within a system having a secure domain and a non-secure domain.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로