Movatterモバイル変換


[0]ホーム

URL:


US20090034734A1 - Multi-Level Key Manager - Google Patents

Multi-Level Key Manager
Download PDF

Info

Publication number
US20090034734A1
US20090034734A1US12/184,062US18406208AUS2009034734A1US 20090034734 A1US20090034734 A1US 20090034734A1US 18406208 AUS18406208 AUS 18406208AUS 2009034734 A1US2009034734 A1US 2009034734A1
Authority
US
United States
Prior art keywords
key
keys
classification
cryptographic
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/184,062
Inventor
John R. Owens
John C. Andolina
Stuart N. Shanken
Richard L. Quintana
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Viasat Inc
Original Assignee
Viasat Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Viasat IncfiledCriticalViasat Inc
Priority to US12/184,062priorityCriticalpatent/US20090034734A1/en
Assigned to VIASAT, INC.reassignmentVIASAT, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ANDOLINA, JOHN C., SHANKEN, STUART N., QUINTANA, RICHARD L., OWENS, JOHN R.
Publication of US20090034734A1publicationCriticalpatent/US20090034734A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cryptographic device and method are disclosed for processing different levels of classified information. A memory caches keys for use in a cryptographic processor. The cryptographic processor requests a key associated with a particular classification level when processing a packet of the particular classification level. The cryptographic device confirms that the key and the packet are of the same classification level in a high-assurance manner. Checking header information of the keys one or more times is performed in one embodiment. Some embodiments authenticate the stored key in a high-assurance manner prior to providing the key to the cryptographic device.

Description

Claims (20)

1. A cryptographic device for processing classified information having a plurality of different classification levels, the cryptographic device comprising:
a memory holding a plurality of keys outside of an integrated circuit, wherein the plurality of keys are for the plurality of different classification levels;
a cryptographic processor that is part of the integrated circuit, wherein the cryptographic processor uses the plurality of keys to process packets of information that are categorized according to the plurality of different classification levels; and
a key manager, wherein:
the key manager can access a plurality of rules associated with the plurality of different classification levels,
the plurality of rules regulate interaction with the plurality of keys,
a first rule of the plurality of rules is used by the key manager in a first classification level of the plurality of different classification levels, and
a second rule of the plurality of rules is used by the key manager in a second classification level of the plurality of different classification levels.
7. A method for processing classified information in a high-assurance manner, the method comprising steps of:
receiving a request for a first key by a cryptographic processor;
choosing a first rule from a plurality of rules;
retrieving a first sterile key from a memory;
checking the first sterile key with the first rule;
decrypting the first sterile key with a first protection key to produce the first key;
checking the first key with the first rule;
providing the first key to the cryptographic processor if the checking the first sterile key step and the checking the first key step are completed successfully;
receiving a request for a second key by a cryptographic processor;
choosing a second rule from the plurality of rules;
retrieving the second sterile key from the memory;
checking the second sterile key with the second rule;
decrypting the second sterile key with a second protection key to produce a second key;
checking the second key with the second rule; and
providing the second key to the cryptographic processor if the checking the second sterile key step and the checking the second key step are completed successfully.
12. A cryptographic device for processing information with a plurality of classification levels, the cryptographic device comprising:
a memory holding a plurality of keys;
a cryptographic processor that uses the plurality of keys to process packets of information that are correlated to the plurality of classification levels; and
a key manager that comprises a rule enforcement circuit and a key decryption circuit, wherein:
the key manager retrieves a first key for a first packet being processed by the cryptographic processor,
the first packet is of a first classification level,
the first key is associated with the first classification level,
the rule enforcement circuit checks that the first key is designated for the first classification level before providing the first key to the cryptographic processor for processing the first packet,
the key manager retrieves a second key for a second packet being processed by the cryptographic processor,
the second packet is of a second classification level,
the second key is associated with the second classification level, and
the rule enforcement circuit checks that the second key is designated for the second classification level before providing the second key to the cryptographic processor for processing the second packet.
US12/184,0622007-07-312008-07-31Multi-Level Key ManagerAbandonedUS20090034734A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/184,062US20090034734A1 (en)2007-07-312008-07-31Multi-Level Key Manager

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
US96282107P2007-07-312007-07-31
US96284807P2007-07-312007-07-31
US96282207P2007-07-312007-07-31
US2643808P2008-02-052008-02-05
US12/184,062US20090034734A1 (en)2007-07-312008-07-31Multi-Level Key Manager

Publications (1)

Publication NumberPublication Date
US20090034734A1true US20090034734A1 (en)2009-02-05

Family

ID=39832694

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US12/184,079Active2031-01-15US8312292B2 (en)2007-07-312008-07-31Input output access controller
US12/184,062AbandonedUS20090034734A1 (en)2007-07-312008-07-31Multi-Level Key Manager
US12/184,048Active2031-01-25US8392983B2 (en)2007-07-312008-07-31Trusted labeler

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US12/184,079Active2031-01-15US8312292B2 (en)2007-07-312008-07-31Input output access controller

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/184,048Active2031-01-25US8392983B2 (en)2007-07-312008-07-31Trusted labeler

Country Status (2)

CountryLink
US (3)US8312292B2 (en)
WO (3)WO2009018481A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090158050A1 (en)*2007-07-312009-06-18Viasat, Inc.Trusted Labeler
US20120066509A1 (en)*2010-09-102012-03-15Douglas Edward LappMulti-level security software architecture
US20120069995A1 (en)*2010-09-222012-03-22Seagate Technology LlcController chip with zeroizable root key
US20120170750A1 (en)*2007-09-142012-07-05Security First Corp.Systems and methods for managing cryptographic keys
US8494168B1 (en)*2008-04-282013-07-23Netapp, Inc.Locating cryptographic keys stored in a cache
US9449180B2 (en)1999-09-202016-09-20Security First Corp.Secure data parser method and system
US20170041138A1 (en)*2015-08-042017-02-09Ge Aviation Systems LlcCryptographic key server embedded in data transfer system
US20170075821A1 (en)*2013-04-012017-03-16Secturion Systems, Inc.Multi-level independent security architecture
US9798899B1 (en)2013-03-292017-10-24Secturion Systems, Inc.Replaceable or removable physical interface input/output module
US9858442B1 (en)2013-03-292018-01-02Secturion Systems, Inc.Multi-tenancy architecture
US10013580B2 (en)2013-03-292018-07-03Secturion Systems, Inc.Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
CN110233723A (en)*2019-04-282019-09-13新大陆(福建)公共服务有限公司A kind of secondary key management method and safety chip
US10708236B2 (en)2015-10-262020-07-07Secturion Systems, Inc.Multi-independent level secure (MILS) storage encryption
US11063914B1 (en)2013-03-292021-07-13Secturion Systems, Inc.Secure end-to-end communication system
US11283774B2 (en)2015-09-172022-03-22Secturion Systems, Inc.Cloud storage using encryption gateway with certificate authority identification
US20220209947A1 (en)*2020-12-282022-06-30Stmicroelectronics (Rousset) SasElectronic system comprising a plurality of microprocessors
US20220286439A1 (en)*2020-10-232022-09-08Secturion Systems, Inc.Multi-independent level security for high performance computing and data storage systems

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100132047A1 (en)*2008-11-242010-05-27Honeywell International Inc.Systems and methods for tamper resistant memory devices
US8275996B1 (en)2010-04-122012-09-25Stephen Waller MelvinIncremental encryption of stored information
US8812875B1 (en)*2010-04-122014-08-19Stephen MelvinVirtual self-destruction of stored information
WO2013055872A2 (en)*2011-10-122013-04-18Raytheon CompanyAn integrated circuit for cyber security processing
DE102017202787A1 (en)*2017-02-212018-08-23Siemens Aktiengesellschaft Method and validation unit for controlling the loading of cryptographic keys that can be used in IT systems, in particular embedded systems, in particular "key blobs"
US11310198B2 (en)2017-05-312022-04-19Crypto4A Technologies Inc.Integrated multi-level or cross-domain network security management appliance, platform and system, and remote management method and system therefor
US11321493B2 (en)*2017-05-312022-05-03Crypto4A Technologies Inc.Hardware security module, and trusted hardware network interconnection device and resources
US11288404B2 (en)*2019-06-142022-03-29Infineon Technologies AgResource protection

Citations (59)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4442484A (en)*1980-10-141984-04-10Intel CorporationMicroprocessor memory management and protection mechanism
US4683532A (en)*1984-12-031987-07-28Honeywell Inc.Real-time software monitor and write protect controller
US5495533A (en)*1994-04-291996-02-27International Business Machines CorporationPersonal key archive
US5905725A (en)*1996-12-161999-05-18Juniper NetworksHigh speed switching device
US5991519A (en)*1997-10-031999-11-23Atmel CorporationSecure memory having multiple security levels
US6408001B1 (en)*1998-10-212002-06-18Lucent Technologies Inc.Method for determining label assignments for a router
US20030084309A1 (en)*2001-10-222003-05-01Sun Microsystems, Inc.Stream processor with cryptographic co-processor
US6604147B1 (en)*2000-05-092003-08-05Lucent Technologies Inc.Scalable IP edge router
US20040008685A1 (en)*2002-07-032004-01-15Nec CorporationMulti-protocol label switching device and multi-protocol switching method
US6704871B1 (en)*1997-09-162004-03-09Safenet, Inc.Cryptographic co-processor
US20040066781A1 (en)*2002-10-072004-04-08Broadcom CorporationFast-path implementation for an uplink double tagging engine
US6751729B1 (en)*1998-07-242004-06-15Spatial Adventures, Inc.Automated operation and security system for virtual private networks
US20040258062A1 (en)*2003-01-272004-12-23Paolo NarvaezMethod and device for the classification and redirection of data packets in a heterogeneous network
US6836548B1 (en)*1991-10-292004-12-28The Commonwealth Of AustraliaCommunications security and trusted path method and means
US6854061B2 (en)*1999-12-312005-02-08International Business Machines CorporationInstalling and controlling trial software
US20050031119A1 (en)*2003-08-042005-02-10Yuying DingMethod and communications device for secure group communication
US20050044252A1 (en)*2002-12-192005-02-24Floyd Geoffrey E.Packet classifier
US20050094643A1 (en)*2003-11-052005-05-05Xiaolin WangMethod of and apparatus for variable length data packet transmission with configurable adaptive output scheduling enabling transmission on the same transmission link(s) of differentiated services for various traffic types
US20050102546A1 (en)*2003-11-072005-05-12Patchen Paul J.System and method for handling state change conditions by a program status register
US20050198412A1 (en)*2003-08-192005-09-08General Dynamics Advanced Information Systems, Inc.Trusted interface unit (TIU) and method of making and using the same
US20060039335A1 (en)*2004-08-202006-02-23Fujitsu LimitedCommunication device simultaneously using plurality of routes corresponding to application characteristics
US20060075311A1 (en)*2004-09-232006-04-06Prashant RanjanTechniques to perform error detection
US7055029B2 (en)*1998-02-032006-05-30Hewlett-Packard Development Company, L.P.Cryptographic system enabling ownership of a secure process
US20060114914A1 (en)*2004-11-302006-06-01Broadcom CorporationPipeline architecture of a network device
US20060146706A1 (en)*2005-01-062006-07-06Enigma SemiconductorMethod and apparatus for scheduling packets and/or cells
US20060190987A1 (en)*2005-02-042006-08-24Ntt Docomo, Inc.Client apparatus, device verification apparatus, and verification method
US20060251078A1 (en)*2005-04-122006-11-09Samsung Electronics Co., Ltd.Message transmission method and device in mixture of private network and public network
US20060294596A1 (en)*2005-06-272006-12-28Priya GovindarajanMethods, systems, and apparatus to detect unauthorized resource accesses
US20070014399A1 (en)*2005-07-152007-01-18Scheidt Edward MHigh assurance key management overlay
US20070067826A1 (en)*2005-09-192007-03-22Texas Instruments IncorporatedMethod and system for preventing unsecure memory accesses
US7213147B2 (en)*2000-05-122007-05-01Microsoft CorporationMethods and apparatus for managing secure collaborative transactions
US20070101142A1 (en)*2003-02-032007-05-03Sony CorporationWireless adhoc communication system, terminal, authentication method for use in terminal, encryption method, terminal management method, and program for enabling terminal to perform those methods
US20070110069A1 (en)*2005-11-122007-05-17Electronics And Telecommunications Research InstituteMethod of blocking network attacks using packet information and apparatus thereof
US20070130458A1 (en)*2002-06-172007-06-07Digitalnet Government Solutions, LlcTrusted computer system
US20070157287A1 (en)*2005-12-292007-07-05Blue JungleTechniques and System for Specifying Policies Using Abstractions
US20070156999A1 (en)*2005-12-302007-07-05David DurhamIdentifier associated with memory locations for managing memory accesses
US20070156987A1 (en)*2006-01-052007-07-05Chen Iue-Shuenn ISystem and method for partitioning multiple logical memory regions with access control by a central control agent
US20070220500A1 (en)*2006-03-202007-09-20Louisa SaunierComputer security method and computer system
US7274696B1 (en)*2002-10-212007-09-25Force10 Networks, Inc.Scalable redundant switch fabric architecture
US20070226795A1 (en)*2006-02-092007-09-27Texas Instruments IncorporatedVirtual cores and hardware-supported hypervisor integrated circuits, systems, methods and processes of manufacture
US20070250904A1 (en)*2006-04-192007-10-25Thales Holdings Uk PlcPrivacy protection system
US7322043B2 (en)*2002-06-202008-01-22Hewlett-Packard Development Company, L.P.Allowing an electronic device accessing a service to be authenticated
US20080019358A1 (en)*2005-10-122008-01-24Juniper Networks, Inc.Spoof checking within a label switching computer network
US20080077794A1 (en)*2006-09-222008-03-27International Business Machines CorporationMethod for controlling security function execution with a flexible, entendable, and non-forgable block
US7356147B2 (en)*2002-04-182008-04-08International Business Machines CorporationMethod, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
US20080130534A1 (en)*2006-11-302008-06-05Kabushiki Kaisha ToshibaData transmitting apparatus, data receiving apparatus, and data communication system
US20080215897A1 (en)*2003-07-312008-09-04International Business Machines CorporationSecurity Containers for Document Components
US7441262B2 (en)*2002-07-112008-10-21Seaway Networks Inc.Integrated VPN/firewall system
US20090037631A1 (en)*2007-07-312009-02-05Viasat, Inc.Input Output Access Controller
US20090214044A1 (en)*2008-02-212009-08-27Hitachi, Ltd.Data archiving technique for encrypted data
US20090249080A1 (en)*2008-03-272009-10-01General Instrument CorporationMethods, apparatus and system for authenticating a programmable hardware device and for authenticating commands received in the programmable hardware device from a secure processor
US20090282263A1 (en)*2003-12-112009-11-12Khan Moinul HMethod and apparatus for a trust processor
US7636858B2 (en)*2003-12-112009-12-22Intel CorporationManagement of a trusted cryptographic processor
US20100008499A1 (en)*2007-04-062010-01-14Lee Adam YMethod and apparatus for generating random data-encryption keys
US7660986B1 (en)*1999-06-082010-02-09General Instrument CorporationSecure control of security mode
US7715565B2 (en)*2004-07-292010-05-11Infoassure, Inc.Information-centric security
US7764672B2 (en)*2003-03-192010-07-27Hitachi, Ltd.Packet communication device
US7773754B2 (en)*2002-07-082010-08-10Broadcom CorporationKey management system and method
US7774619B2 (en)*2004-11-172010-08-10Broadcom CorporationSecure code execution using external memory

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6101255A (en)*1997-04-302000-08-08Motorola, Inc.Programmable cryptographic processing system and method
JP4522548B2 (en)*2000-03-102010-08-11富士通フロンテック株式会社 Access monitoring device and access monitoring method
US6615329B2 (en)*2001-07-112003-09-02Intel CorporationMemory access control system, apparatus, and method
US7178033B1 (en)2001-12-122007-02-13Pss Systems, Inc.Method and apparatus for securing digital assets
US7089419B2 (en)*2002-04-182006-08-08International Business Machines CorporationControl function with multiple security states for facilitating secure operation of an integrated system
US7322042B2 (en)*2003-02-072008-01-22Broadon Communications Corp.Secure and backward-compatible processor and secure software execution thereon
JP4130799B2 (en)*2003-12-242008-08-06三星電子株式会社 Multi-beam semiconductor laser
US7542567B2 (en)*2004-06-102009-06-02Freescale Semiconductor, Inc.Method and apparatus for providing security in a data processing system
US7681226B2 (en)*2005-01-282010-03-16Cisco Technology, Inc.Methods and apparatus providing security for multiple operational states of a computerized device
US20070245413A1 (en)2005-07-052007-10-18Viasat, Inc.Trusted Cryptographic Switch
US8190877B2 (en)*2005-07-052012-05-29Viasat, Inc.Trusted cryptographic processor
DE112006001751B4 (en)2005-07-062010-04-08International Rectifier Corporation, El Segundo Power semiconductor device and method for manufacturing a semiconductor device
US8041947B2 (en)*2006-03-232011-10-18Harris CorporationComputer architecture for an electronic device providing SLS access to MLS file system with trusted loading and protection of program execution memory

Patent Citations (60)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4442484A (en)*1980-10-141984-04-10Intel CorporationMicroprocessor memory management and protection mechanism
US4683532A (en)*1984-12-031987-07-28Honeywell Inc.Real-time software monitor and write protect controller
US6836548B1 (en)*1991-10-292004-12-28The Commonwealth Of AustraliaCommunications security and trusted path method and means
US5495533A (en)*1994-04-291996-02-27International Business Machines CorporationPersonal key archive
US5905725A (en)*1996-12-161999-05-18Juniper NetworksHigh speed switching device
US6704871B1 (en)*1997-09-162004-03-09Safenet, Inc.Cryptographic co-processor
US5991519A (en)*1997-10-031999-11-23Atmel CorporationSecure memory having multiple security levels
US7055029B2 (en)*1998-02-032006-05-30Hewlett-Packard Development Company, L.P.Cryptographic system enabling ownership of a secure process
US6751729B1 (en)*1998-07-242004-06-15Spatial Adventures, Inc.Automated operation and security system for virtual private networks
US6408001B1 (en)*1998-10-212002-06-18Lucent Technologies Inc.Method for determining label assignments for a router
US7660986B1 (en)*1999-06-082010-02-09General Instrument CorporationSecure control of security mode
US6854061B2 (en)*1999-12-312005-02-08International Business Machines CorporationInstalling and controlling trial software
US6604147B1 (en)*2000-05-092003-08-05Lucent Technologies Inc.Scalable IP edge router
US7213147B2 (en)*2000-05-122007-05-01Microsoft CorporationMethods and apparatus for managing secure collaborative transactions
US20030084309A1 (en)*2001-10-222003-05-01Sun Microsystems, Inc.Stream processor with cryptographic co-processor
US7356147B2 (en)*2002-04-182008-04-08International Business Machines CorporationMethod, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
US20070130458A1 (en)*2002-06-172007-06-07Digitalnet Government Solutions, LlcTrusted computer system
US7322043B2 (en)*2002-06-202008-01-22Hewlett-Packard Development Company, L.P.Allowing an electronic device accessing a service to be authenticated
US20040008685A1 (en)*2002-07-032004-01-15Nec CorporationMulti-protocol label switching device and multi-protocol switching method
US7773754B2 (en)*2002-07-082010-08-10Broadcom CorporationKey management system and method
US7441262B2 (en)*2002-07-112008-10-21Seaway Networks Inc.Integrated VPN/firewall system
US20040066781A1 (en)*2002-10-072004-04-08Broadcom CorporationFast-path implementation for an uplink double tagging engine
US7274696B1 (en)*2002-10-212007-09-25Force10 Networks, Inc.Scalable redundant switch fabric architecture
US20050044252A1 (en)*2002-12-192005-02-24Floyd Geoffrey E.Packet classifier
US20040258062A1 (en)*2003-01-272004-12-23Paolo NarvaezMethod and device for the classification and redirection of data packets in a heterogeneous network
US20070101142A1 (en)*2003-02-032007-05-03Sony CorporationWireless adhoc communication system, terminal, authentication method for use in terminal, encryption method, terminal management method, and program for enabling terminal to perform those methods
US7764672B2 (en)*2003-03-192010-07-27Hitachi, Ltd.Packet communication device
US20080215897A1 (en)*2003-07-312008-09-04International Business Machines CorporationSecurity Containers for Document Components
US20050031119A1 (en)*2003-08-042005-02-10Yuying DingMethod and communications device for secure group communication
US20050198412A1 (en)*2003-08-192005-09-08General Dynamics Advanced Information Systems, Inc.Trusted interface unit (TIU) and method of making and using the same
US20050094643A1 (en)*2003-11-052005-05-05Xiaolin WangMethod of and apparatus for variable length data packet transmission with configurable adaptive output scheduling enabling transmission on the same transmission link(s) of differentiated services for various traffic types
US20050102546A1 (en)*2003-11-072005-05-12Patchen Paul J.System and method for handling state change conditions by a program status register
US20090282263A1 (en)*2003-12-112009-11-12Khan Moinul HMethod and apparatus for a trust processor
US7636858B2 (en)*2003-12-112009-12-22Intel CorporationManagement of a trusted cryptographic processor
US7715565B2 (en)*2004-07-292010-05-11Infoassure, Inc.Information-centric security
US20060039335A1 (en)*2004-08-202006-02-23Fujitsu LimitedCommunication device simultaneously using plurality of routes corresponding to application characteristics
US20060075311A1 (en)*2004-09-232006-04-06Prashant RanjanTechniques to perform error detection
US7774619B2 (en)*2004-11-172010-08-10Broadcom CorporationSecure code execution using external memory
US20060114914A1 (en)*2004-11-302006-06-01Broadcom CorporationPipeline architecture of a network device
US20060146706A1 (en)*2005-01-062006-07-06Enigma SemiconductorMethod and apparatus for scheduling packets and/or cells
US20060190987A1 (en)*2005-02-042006-08-24Ntt Docomo, Inc.Client apparatus, device verification apparatus, and verification method
US20060251078A1 (en)*2005-04-122006-11-09Samsung Electronics Co., Ltd.Message transmission method and device in mixture of private network and public network
US20060294596A1 (en)*2005-06-272006-12-28Priya GovindarajanMethods, systems, and apparatus to detect unauthorized resource accesses
US20070014399A1 (en)*2005-07-152007-01-18Scheidt Edward MHigh assurance key management overlay
US20070067826A1 (en)*2005-09-192007-03-22Texas Instruments IncorporatedMethod and system for preventing unsecure memory accesses
US20080019358A1 (en)*2005-10-122008-01-24Juniper Networks, Inc.Spoof checking within a label switching computer network
US20070110069A1 (en)*2005-11-122007-05-17Electronics And Telecommunications Research InstituteMethod of blocking network attacks using packet information and apparatus thereof
US20070157287A1 (en)*2005-12-292007-07-05Blue JungleTechniques and System for Specifying Policies Using Abstractions
US20070156999A1 (en)*2005-12-302007-07-05David DurhamIdentifier associated with memory locations for managing memory accesses
US20070156987A1 (en)*2006-01-052007-07-05Chen Iue-Shuenn ISystem and method for partitioning multiple logical memory regions with access control by a central control agent
US20070226795A1 (en)*2006-02-092007-09-27Texas Instruments IncorporatedVirtual cores and hardware-supported hypervisor integrated circuits, systems, methods and processes of manufacture
US20070220500A1 (en)*2006-03-202007-09-20Louisa SaunierComputer security method and computer system
US20070250904A1 (en)*2006-04-192007-10-25Thales Holdings Uk PlcPrivacy protection system
US20080077794A1 (en)*2006-09-222008-03-27International Business Machines CorporationMethod for controlling security function execution with a flexible, entendable, and non-forgable block
US20080130534A1 (en)*2006-11-302008-06-05Kabushiki Kaisha ToshibaData transmitting apparatus, data receiving apparatus, and data communication system
US20100008499A1 (en)*2007-04-062010-01-14Lee Adam YMethod and apparatus for generating random data-encryption keys
US20090037631A1 (en)*2007-07-312009-02-05Viasat, Inc.Input Output Access Controller
US20090158050A1 (en)*2007-07-312009-06-18Viasat, Inc.Trusted Labeler
US20090214044A1 (en)*2008-02-212009-08-27Hitachi, Ltd.Data archiving technique for encrypted data
US20090249080A1 (en)*2008-03-272009-10-01General Instrument CorporationMethods, apparatus and system for authenticating a programmable hardware device and for authenticating commands received in the programmable hardware device from a secure processor

Cited By (38)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9449180B2 (en)1999-09-202016-09-20Security First Corp.Secure data parser method and system
US9613220B2 (en)1999-09-202017-04-04Security First Corp.Secure data parser method and system
US20090158050A1 (en)*2007-07-312009-06-18Viasat, Inc.Trusted Labeler
US8312292B2 (en)2007-07-312012-11-13Viasat, Inc.Input output access controller
US8392983B2 (en)2007-07-312013-03-05Viasat, Inc.Trusted labeler
US9397827B2 (en)*2007-09-142016-07-19Security First Corp.Systems and methods for managing cryptographic keys
US20120170750A1 (en)*2007-09-142012-07-05Security First Corp.Systems and methods for managing cryptographic keys
US8494168B1 (en)*2008-04-282013-07-23Netapp, Inc.Locating cryptographic keys stored in a cache
US9129121B2 (en)2008-04-282015-09-08Netapp, Inc.Locating cryptographic keys stored in a cache
US9430659B2 (en)2008-04-282016-08-30Netapp, Inc.Locating cryptographic keys stored in a cache
US8478997B2 (en)*2010-09-102013-07-02Raytheon CompanyMulti-level security software architecture
EP2428910A3 (en)*2010-09-102016-06-08Raytheon Cyber Products, LLCMulti-level security data processing architecture
US20120066509A1 (en)*2010-09-102012-03-15Douglas Edward LappMulti-level security software architecture
US20120069995A1 (en)*2010-09-222012-03-22Seagate Technology LlcController chip with zeroizable root key
US11288402B2 (en)2013-03-292022-03-29Secturion Systems, Inc.Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US10902155B2 (en)2013-03-292021-01-26Secturion Systems, Inc.Multi-tenancy architecture
US9798899B1 (en)2013-03-292017-10-24Secturion Systems, Inc.Replaceable or removable physical interface input/output module
US9858442B1 (en)2013-03-292018-01-02Secturion Systems, Inc.Multi-tenancy architecture
US11921906B2 (en)2013-03-292024-03-05Secturion Systems, Inc.Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US10013580B2 (en)2013-03-292018-07-03Secturion Systems, Inc.Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US11783089B2 (en)2013-03-292023-10-10Secturion Systems, Inc.Multi-tenancy architecture
US11063914B1 (en)2013-03-292021-07-13Secturion Systems, Inc.Secure end-to-end communication system
US10114766B2 (en)*2013-04-012018-10-30Secturion Systems, Inc.Multi-level independent security architecture
US11429540B2 (en)*2013-04-012022-08-30Secturion Systems, Inc.Multi-level independent security architecture
US20190050348A1 (en)*2013-04-012019-02-14Secturion Systems, Inc.Multi-level independent security architecture
US20170075821A1 (en)*2013-04-012017-03-16Secturion Systems, Inc.Multi-level independent security architecture
US20230049021A1 (en)*2013-04-012023-02-16Secturion Systems, Inc.Multi-level independent security architecture
US9990503B2 (en)*2015-08-042018-06-05Ge Aviation Systems, LlcCryptographic key server embedded in data transfer system
US20170041138A1 (en)*2015-08-042017-02-09Ge Aviation Systems LlcCryptographic key server embedded in data transfer system
US11283774B2 (en)2015-09-172022-03-22Secturion Systems, Inc.Cloud storage using encryption gateway with certificate authority identification
US11792169B2 (en)2015-09-172023-10-17Secturion Systems, Inc.Cloud storage using encryption gateway with certificate authority identification
US11750571B2 (en)2015-10-262023-09-05Secturion Systems, Inc.Multi-independent level secure (MILS) storage encryption
US10708236B2 (en)2015-10-262020-07-07Secturion Systems, Inc.Multi-independent level secure (MILS) storage encryption
CN110233723A (en)*2019-04-282019-09-13新大陆(福建)公共服务有限公司A kind of secondary key management method and safety chip
US20220286439A1 (en)*2020-10-232022-09-08Secturion Systems, Inc.Multi-independent level security for high performance computing and data storage systems
US11968187B2 (en)*2020-10-232024-04-23Secturion Systems, Inc.Multi-independent level security for high performance computing and data storage systems
US20220209947A1 (en)*2020-12-282022-06-30Stmicroelectronics (Rousset) SasElectronic system comprising a plurality of microprocessors
US12058255B2 (en)*2020-12-282024-08-06STMicroelectro cs (Rousset) SASElectronic system comprising a plurality of microprocessors

Also Published As

Publication numberPublication date
WO2009018481A1 (en)2009-02-05
US8392983B2 (en)2013-03-05
WO2009018479A1 (en)2009-02-05
WO2009018483A1 (en)2009-02-05
US8312292B2 (en)2012-11-13
US20090037631A1 (en)2009-02-05
US20090158050A1 (en)2009-06-18
WO2009018479A4 (en)2009-04-30

Similar Documents

PublicationPublication DateTitle
US20090034734A1 (en)Multi-Level Key Manager
US9483664B2 (en)Address dependent data encryption
US8839001B2 (en)Infinite key memory transaction unit
CN101673251B (en)Device with privileged memory and applications thereof
CN102117387B (en)Safe key access Apparatus and method for
US5224166A (en)System for seamless processing of encrypted and non-encrypted data and instructions
US11658808B2 (en)Re-encryption following an OTP update event
US7774622B2 (en)CRPTO envelope around a CPU with DRAM for image protection
US8127145B2 (en)Computer architecture for an electronic device providing a secure file system
CN106383790A (en)Bus management unit and high safety system on chip
KR20080100673A (en) Encryption-based processor security method and device
US9152576B2 (en)Mode-based secure microcontroller
US11019098B2 (en)Replay protection for memory based on key refresh
EP2228988B1 (en)Circuit for restricting data access
TW201933169A (en)Managing a set of cryptographic keys in an encrypted system
EP2990953B1 (en)Periodic memory refresh in a secure computing system
US8612774B2 (en)Secure OTP using external memory
JP2017526220A (en) Inferential cryptographic processing for out-of-order data
US20210011994A1 (en)Device and method for managing an encrypted software application
US20240080193A1 (en)Counter integrity tree
US20240333473A1 (en)Memory controller cryptographic data quantization using a cache
US12248409B2 (en)Apparatus and method of controlling access to data stored in a non-trusted memory
US20230418603A1 (en)System and Method for Securing Nonvolatile Memory for Execute-in-Place
US20120148047A1 (en)Detecting key corruption
CN114237492A (en) Non-volatile memory protection method and device

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:VIASAT, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OWENS, JOHN R.;ANDOLINA, JOHN C.;SHANKEN, STUART N.;AND OTHERS;REEL/FRAME:021499/0783;SIGNING DATES FROM 20080813 TO 20080828

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp