Movatterモバイル変換


[0]ホーム

URL:


US20090292931A1 - Apparatus and method for isolating a secure execution mode in a microprocessor - Google Patents

Apparatus and method for isolating a secure execution mode in a microprocessor
Download PDF

Info

Publication number
US20090292931A1
US20090292931A1US12/263,199US26319908AUS2009292931A1US 20090292931 A1US20090292931 A1US 20090292931A1US 26319908 AUS26319908 AUS 26319908AUS 2009292931 A1US2009292931 A1US 2009292931A1
Authority
US
United States
Prior art keywords
secure
microprocessor
execution mode
logic
recited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/263,199
Inventor
G. Glenn Henry
Terry Parks
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Via Technologies Inc
Original Assignee
Via Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Via Technologies IncfiledCriticalVia Technologies Inc
Priority to US12/263,199priorityCriticalpatent/US20090292931A1/en
Assigned to VIA TECHNOLOGIES, INC.reassignmentVIA TECHNOLOGIES, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HENRY, G GLENN, PARKS, TERRY
Priority to TW098112991Aprioritypatent/TWI581183B/en
Priority to CN2009101377517Aprioritypatent/CN101533446B/en
Priority to CN201210075865.5Aprioritypatent/CN102722675B/en
Publication of US20090292931A1publicationCriticalpatent/US20090292931A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An apparatus providing for a secure execution environment, including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure application program, where the non-secure application programs are accessed from a system memory via a system bus. The microprocessor has secure execution mode logic that is configured to provide for a secure execution mode within the microprocessor for execution of the secure application program. The secure execution mode logic records the state of the microprocessor in a non-volatile indicator register upon entry into the secure execution mode and upon exit from the secure execution mode. The secure non-volatile memory is coupled to the microprocessor via a private bus and is configured to store the secure application program. Transactions over the private bus between the microprocessor and the secure non-volatile memory are isolated from the system bus and corresponding system bus resources within the microprocessor.

Description

Claims (36)

1. An apparatus providing for a secure execution environment, comprising:
a microprocessor, configured to execute non-secure application programs and a secure application program, wherein said non-secure application programs are accessed from a system memory via a system bus, said microprocessor comprising:
secure execution mode logic, configured to provide for a secure execution mode within said microprocessor for execution of said secure application program, wherein said secure execution mode logic records the state of said microprocessor in a non-volatile indicator register upon entry into said secure execution mode and upon exit from said secure execution mode; and
a secure non-volatile memory, coupled to said microprocessor via a private bus, configured to store said secure application program, wherein transactions over said private bus between said microprocessor and said secure non-volatile memory are isolated from said system bus and corresponding system bus resources within said microprocessor.
13. A microprocessor apparatus, for executing secure code within a secure execution environment, the microprocessor apparatus comprising:
a secure non-volatile memory, configured to store a secure application program; and
a microprocessor, coupled to said secure non-volatile memory via a private bus, configured to execute non-secure application programs and said secure application program, said microprocessor comprising:
a bus interface unit, configured to accomplish system bus transactions over a system bus to access said non-secure applications in system memory;
a secure non-volatile memory interface unit, configured to couple said microprocessor to said secure non-volatile memory via a private bus, wherein private bus transactions over said private bus to access said secure non-volatile memory are hidden from observation by system bus resources within said microprocessor and to any device coupled to said system bus; and
secure execution mode logic, configured to provide for a secure execution mode within said microprocessor for execution of said secure application program, wherein said secure execution mode logic records the state of said microprocessor in a non-volatile indicator register upon entry into said secure execution mode and upon exit from said secure execution mode.
25. A method for executing secure code within a secure execution environment, the method comprising:
providing a secure non-volatile memory for storage of the secure code;
storing the secure code within the secure non-volatile memory via private transactions accomplished over a private bus that is coupled to the secure non-volatile memory;
entering a secure execution mode within a microprocessor for execution of the secure code, said entering comprising:
upon entry into the secure execution mode, recording the state of the microprocessor in a non-volatile indicator register;
fetching the secure code from the secure non-volatile memory over the private bus for execution by a microprocessor; and
within the secure execution mode, executing the secure code;
wherein the private bus is isolated from all system bus resources within the microprocessor and external to the microprocessor, and wherein the private bus is observable and accessible exclusively by secure execution logic within the microprocessor.
US12/263,1992008-05-242008-10-31Apparatus and method for isolating a secure execution mode in a microprocessorAbandonedUS20090292931A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US12/263,199US20090292931A1 (en)2008-05-242008-10-31Apparatus and method for isolating a secure execution mode in a microprocessor
TW098112991ATWI581183B (en)2008-05-242009-04-20Apparatus and method for isolating a secure execution mode in a microprocessor
CN2009101377517ACN101533446B (en)2008-05-242009-04-29 Microprocessor providing a secure execution environment and method for executing secure coding
CN201210075865.5ACN102722675B (en)2008-05-242009-04-29 Apparatus for providing a secure execution environment and method for executing secure coding

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US5598008P2008-05-242008-05-24
US12/263,199US20090292931A1 (en)2008-05-242008-10-31Apparatus and method for isolating a secure execution mode in a microprocessor

Publications (1)

Publication NumberPublication Date
US20090292931A1true US20090292931A1 (en)2009-11-26

Family

ID=41104037

Family Applications (13)

Application NumberTitlePriority DateFiling Date
US12/263,131Active2030-06-07US8615799B2 (en)2008-05-242008-10-31Microprocessor having secure non-volatile storage access
US12/263,168Active2031-08-02US8522354B2 (en)2008-05-242008-10-31Microprocessor apparatus for secure on-die real-time clock
US12/263,177Active2031-05-16US9002014B2 (en)2008-05-242008-10-31On-die cryptographic apparatus in a secure microprocessor
US12/263,230Active2030-03-23US8793803B2 (en)2008-05-242008-10-31Termination of secure execution mode in a microprocessor providing for execution of secure code
US12/263,244Active2030-02-18US8607034B2 (en)2008-05-242008-10-31Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US12/263,263Active2029-12-17US8910276B2 (en)2008-05-242008-10-31Apparatus and method for precluding execution of certain instructions in a secure execution mode microprocessor
US12/263,214Active2030-10-11US8370641B2 (en)2008-05-242008-10-31Initialization of a microprocessor providing for execution of secure code
US12/263,206Active2029-06-26US8762687B2 (en)2008-05-242008-10-31Microprocessor providing isolated timers and counters for execution of secure code
US12/263,221Active2029-11-02US8209763B2 (en)2008-05-242008-10-31Processor with non-volatile mode enable register entering secure execution mode and encrypting secure program for storage in secure memory via private bus
US12/263,199AbandonedUS20090292931A1 (en)2008-05-242008-10-31Apparatus and method for isolating a secure execution mode in a microprocessor
US12/263,154Active2029-03-03US7788433B2 (en)2008-05-242008-10-31Microprocessor apparatus providing for secure interrupts and exceptions
US12/263,143Active2030-07-11US8838924B2 (en)2008-05-242008-10-31Microprocessor having internal secure memory
US12/263,238Active2029-06-27US8978132B2 (en)2008-05-242008-10-31Apparatus and method for managing a microprocessor providing for a secure execution mode

Family Applications Before (9)

Application NumberTitlePriority DateFiling Date
US12/263,131Active2030-06-07US8615799B2 (en)2008-05-242008-10-31Microprocessor having secure non-volatile storage access
US12/263,168Active2031-08-02US8522354B2 (en)2008-05-242008-10-31Microprocessor apparatus for secure on-die real-time clock
US12/263,177Active2031-05-16US9002014B2 (en)2008-05-242008-10-31On-die cryptographic apparatus in a secure microprocessor
US12/263,230Active2030-03-23US8793803B2 (en)2008-05-242008-10-31Termination of secure execution mode in a microprocessor providing for execution of secure code
US12/263,244Active2030-02-18US8607034B2 (en)2008-05-242008-10-31Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US12/263,263Active2029-12-17US8910276B2 (en)2008-05-242008-10-31Apparatus and method for precluding execution of certain instructions in a secure execution mode microprocessor
US12/263,214Active2030-10-11US8370641B2 (en)2008-05-242008-10-31Initialization of a microprocessor providing for execution of secure code
US12/263,206Active2029-06-26US8762687B2 (en)2008-05-242008-10-31Microprocessor providing isolated timers and counters for execution of secure code
US12/263,221Active2029-11-02US8209763B2 (en)2008-05-242008-10-31Processor with non-volatile mode enable register entering secure execution mode and encrypting secure program for storage in secure memory via private bus

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US12/263,154Active2029-03-03US7788433B2 (en)2008-05-242008-10-31Microprocessor apparatus providing for secure interrupts and exceptions
US12/263,143Active2030-07-11US8838924B2 (en)2008-05-242008-10-31Microprocessor having internal secure memory
US12/263,238Active2029-06-27US8978132B2 (en)2008-05-242008-10-31Apparatus and method for managing a microprocessor providing for a secure execution mode

Country Status (3)

CountryLink
US (13)US8615799B2 (en)
CN (15)CN101533446B (en)
TW (13)TWI395137B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100250943A1 (en)*2009-03-272010-09-30International Business Machines CorporationMethod for security in electronically fused encryption keys
US8615799B2 (en)*2008-05-242013-12-24Via Technologies, Inc.Microprocessor having secure non-volatile storage access
US20140047245A1 (en)*2012-06-012014-02-13Sergei GoffmanIdentification and execution of subsets of a plurality of instructions in a more secure execution environment
TWI560575B (en)*2015-10-152016-12-01Via Tech IncMicroprocessor and method for securely executing instructions therein
US20170235956A1 (en)*2016-02-162017-08-17Atmel CorporationControlled secure code authentication
US20170235957A1 (en)*2016-02-162017-08-17Atmel CorporationControlled secure code authentication
US10013551B2 (en)2015-08-242018-07-03Accenture Global Services LimitedIsolated memory space
CN109753821A (en)*2017-11-012019-05-14瑞昱半导体股份有限公司 Data access device and method
US10616197B2 (en)2016-04-182020-04-07Atmel CorporationMessage authentication with secure code verification
US20230177143A1 (en)*2021-12-032023-06-08International Business Machines CorporationOperating a secure code segment on a processor core of a processing unit
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US12314755B2 (en)2021-12-032025-05-27International Business Machines CorporationScheduling a secure code segment on a processor core of a processing unit

Families Citing this family (186)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7747733B2 (en)2004-10-252010-06-29Electro Industries/Gauge TechPower meter having multiple ethernet ports
US20080276302A1 (en)2005-12-132008-11-06Yoggie Security Systems Ltd.System and Method for Providing Data and Device Security Between External and Host Devices
US8381297B2 (en)2005-12-132013-02-19Yoggie Security Systems Ltd.System and method for providing network security to mobile devices
US8869270B2 (en)2008-03-262014-10-21Cupp Computing AsSystem and method for implementing content and network security inside a chip
US20070237325A1 (en)*2006-02-012007-10-11Gershowitz Michael NMethod and apparatus to improve security of cryptographic systems
US8239688B2 (en)2007-01-072012-08-07Apple Inc.Securely recovering a computing device
US8254568B2 (en)2007-01-072012-08-28Apple Inc.Secure booting a computing device
US8365272B2 (en)2007-05-302013-01-29Yoggie Security Systems Ltd.System and method for providing network and computer firewall protection with dynamic address isolation to a device
JP2009059005A (en)*2007-08-292009-03-19Panasonic Corp DEBUG SYSTEM, DEBUG DEVICE AND METHOD
KR20090059602A (en)*2007-12-072009-06-11한국전자통신연구원 Encryption device with session memory bus
US8150039B2 (en)*2008-04-152012-04-03Apple Inc.Single security model in booting a computing device
US8631488B2 (en)2008-08-042014-01-14Cupp Computing AsSystems and methods for providing security services during power management mode
US8484486B2 (en)*2008-08-062013-07-09Silver Spring Networks, Inc.Integrated cryptographic security module for a network node
US8789202B2 (en)2008-11-192014-07-22Cupp Computing AsSystems and methods for providing real time access monitoring of a removable media device
US8756439B1 (en)*2009-08-282014-06-17Physical Optics CorporationEncryption key management for secured access
GB2482811B (en)*2009-12-162017-07-05Intel CorpProviding integrity verification and attestation in a hidden execution environment
US8510569B2 (en)2009-12-162013-08-13Intel CorporationProviding integrity verification and attestation in a hidden execution environment
US9087200B2 (en)*2009-12-222015-07-21Intel CorporationMethod and apparatus to provide secure application execution
US8543838B1 (en)*2009-12-232013-09-24Marvell International Ltd.Cryptographic module with secure processor
GB2476683A (en)*2010-01-052011-07-06St MicroelectronicsDetection of clock tampering by comparison of the clock with a trusted clock signal
DE102010006572A1 (en)2010-02-022011-08-04Giesecke & Devrient GmbH, 81677 Method for executing an application
JP2011232801A (en)*2010-04-232011-11-17Renesas Electronics CorpInformation processing system and ic card
US8671285B2 (en)*2010-05-252014-03-11Via Technologies, Inc.Microprocessor that fetches and decrypts encrypted instructions in same time as plain text instructions
US8856504B2 (en)*2010-06-072014-10-07Cisco Technology, Inc.Secure virtual machine bootstrap in untrusted cloud infrastructures
US8407783B2 (en)*2010-06-172013-03-26Mediatek Inc.Computing system providing normal security and high security services
US8590038B2 (en)*2010-08-202013-11-19Via Technologies, Inc.Revokeable MSR password protection
US8468365B2 (en)*2010-09-242013-06-18Intel CorporationTweakable encryption mode for memory encryption with protection against replay attacks
US8479042B1 (en)*2010-11-012013-07-02Xilinx, Inc.Transaction-level lockstep
US8554797B2 (en)*2010-12-172013-10-08Sap AgSystem and method for modular business applications
FR2970099B1 (en)*2010-12-292013-01-11Viaccess Sa METHOD FOR LOADING A CODE OF AT LEAST ONE SOFTWARE MODULE
DE102011012227A1 (en)*2011-02-242012-08-30Giesecke & Devrient Gmbh Method for exchanging data in a secure runtime environment
US8769305B2 (en)*2011-03-212014-07-01Moncana CorporationSecure execution of unsecured apps on a device
US9396325B2 (en)2011-03-212016-07-19Mocana CorporationProvisioning an app on a device and implementing a keystore
US9473485B2 (en)2011-03-212016-10-18Blue Cedar Networks, Inc.Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
US8812868B2 (en)2011-03-212014-08-19Mocana CorporationSecure execution of unsecured apps on a device
US8955142B2 (en)2011-03-212015-02-10Mocana CorporationSecure execution of unsecured apps on a device
DE102011018431A1 (en)2011-04-212012-10-25Giesecke & Devrient Gmbh Method for displaying information on a display device of a terminal
TWI465952B (en)*2011-05-052014-12-21Univ Nat Taipei TechnologyMacro file execution platform applied for smart phone
CN103620617B (en)*2011-06-292016-08-17英特尔公司For the method and apparatus with integrity checking He the memory encryption of the protection preventing Replay Attack
US20140149729A1 (en)2011-07-182014-05-29Ted A. HadleyReset vectors for boot instructions
US8661527B2 (en)2011-08-312014-02-25Kabushiki Kaisha ToshibaAuthenticator, authenticatee and authentication method
US12260078B2 (en)2011-10-042025-03-25Ei Electronics LlcDynamic webpage interface for an intelligent electronic device
US10275840B2 (en)2011-10-042019-04-30Electro Industries/Gauge TechSystems and methods for collecting, analyzing, billing, and reporting data from intelligent electronic devices
US10771532B2 (en)2011-10-042020-09-08Electro Industries/Gauge TechIntelligent electronic devices, systems and methods for communicating messages over a network
US10862784B2 (en)2011-10-042020-12-08Electro Industries/Gauge TechSystems and methods for processing meter information in a network of intelligent electronic devices
US20150356104A9 (en)2011-10-042015-12-10Electro Industries/Gauge TechSystems and methods for collecting, analyzing, billing, and reporting data from intelligent electronic devices
US10303860B2 (en)*2011-10-042019-05-28Electro Industries/Gauge TechSecurity through layers in an intelligent electronic device
DE102011115135A1 (en)2011-10-072013-04-11Giesecke & Devrient Gmbh Microprocessor system with secure runtime environment
EP2798557A4 (en)*2011-12-292015-09-23Intel Corp SECURE ERROR MANAGEMENT
US8458804B1 (en)2011-12-292013-06-04Elwha LlcSystems and methods for preventing data remanence in memory
JP5275482B2 (en)*2012-01-162013-08-28株式会社東芝 Storage medium, host device, memory device, and system
JP5990927B2 (en)*2012-02-172016-09-14富士電機株式会社 Control system, control device, and program execution control method
JP5900143B2 (en)*2012-05-152016-04-06富士電機株式会社 Control system, control device, and program execution control method
FR2993682B1 (en)*2012-07-202014-08-22Oberthur Technologies UPDATE OF AN OPERATING SYSTEM FOR SECURE ELEMENT
US8938796B2 (en)2012-09-202015-01-20Paul Case, SR.Case secure computer architecture
US9047471B2 (en)2012-09-252015-06-02Apple Inc.Security enclave processor boot control
US9043632B2 (en)2012-09-252015-05-26Apple Inc.Security enclave processor power control
US8775757B2 (en)2012-09-252014-07-08Apple Inc.Trust zone support in system on a chip having security enclave processor
US8873747B2 (en)2012-09-252014-10-28Apple Inc.Key management using security enclave processor
US9292712B2 (en)*2012-09-282016-03-22St-Ericsson SaMethod and apparatus for maintaining secure time
WO2014059037A2 (en)2012-10-092014-04-17Cupp Computing AsTransaction security systems and methods
JP2014089652A (en)*2012-10-312014-05-15Toshiba CorpInformation processing apparatus
US9886595B2 (en)*2012-12-072018-02-06Samsung Electronics Co., Ltd.Priority-based application execution method and apparatus of data processing device
US20140184411A1 (en)*2012-12-312014-07-03Alcatel LucentAlarm condition processing in network element
KR20140105343A (en)*2013-02-222014-09-01삼성전자주식회사Device and method for securing datausing a plurality of mode in the device
CN104038469B (en)*2013-03-072017-12-29中国银联股份有限公司Equipment for safety information interaction
US8959576B2 (en)*2013-03-142015-02-17Intel CorporationMethod, apparatus, system for qualifying CPU transactions with security attributes
US11816465B2 (en)2013-03-152023-11-14Ei Electronics LlcDevices, systems and methods for tracking and upgrading firmware in intelligent electronic devices
US9058494B2 (en)2013-03-152015-06-16Intel CorporationMethod, apparatus, system, and computer readable medium to provide secure operation
CN104077155B (en)2013-03-282018-09-21中国银联股份有限公司The startup of application program in mobile device
US9330035B2 (en)*2013-05-232016-05-03Arm LimitedMethod and apparatus for interrupt handling
WO2014204363A1 (en)*2013-06-192014-12-24Telefonaktiebolaget L M Ericsson (Publ)Method and an integrated circuit for executing a trusted application within a trusted runtime environment
US11157976B2 (en)2013-07-082021-10-26Cupp Computing AsSystems and methods for providing digital content marketplace security
US20150052603A1 (en)*2013-08-132015-02-19Arxan Technologies, Inc.Anti-tamper system with self-adjusting guards
JP6117068B2 (en)*2013-09-202017-04-19株式会社東芝 Information processing apparatus and program
US9767044B2 (en)2013-09-242017-09-19Intel CorporationSecure memory repartitioning
WO2015060858A1 (en)*2013-10-242015-04-30Intel CorporationMethods and apparatus for protecting software from unauthorized copying
US10095868B2 (en)*2013-11-132018-10-09Via Technologies, Inc.Event-based apparatus and method for securing bios in a trusted computing system during execution
US9507942B2 (en)2013-11-132016-11-29Via Technologies, Inc.Secure BIOS mechanism in a trusted computing system
US10055588B2 (en)2013-11-132018-08-21Via Technologies, Inc.Event-based apparatus and method for securing BIOS in a trusted computing system during execution
US9779242B2 (en)2013-11-132017-10-03Via Technologies, Inc.Programmable secure bios mechanism in a trusted computing system
US9767288B2 (en)2013-11-132017-09-19Via Technologies, Inc.JTAG-based secure BIOS mechanism in a trusted computing system
US9547767B2 (en)2013-11-132017-01-17Via Technologies, Inc.Event-based apparatus and method for securing bios in a trusted computing system during execution
US9367689B2 (en)*2013-11-132016-06-14Via Technologies, Inc.Apparatus and method for securing BIOS in a trusted computing system
US9779243B2 (en)2013-11-132017-10-03Via Technologies, Inc.Fuse-enabled secure BIOS mechanism in a trusted computing system
US9798880B2 (en)2013-11-132017-10-24Via Technologies, Inc.Fuse-enabled secure bios mechanism with override feature
US10049217B2 (en)2013-11-132018-08-14Via Technologies, Inc.Event-based apparatus and method for securing bios in a trusted computing system during execution
DE102014020142B4 (en)*2013-12-052024-05-02Deutsche Post Ag Access authorization with time window
US9311508B2 (en)2013-12-272016-04-12Intel CorporationProcessors, methods, systems, and instructions to change addresses of pages of secure enclaves
US10431024B2 (en)2014-01-232019-10-01Apple Inc.Electronic device operation using remote user biometrics
WO2015123611A2 (en)2014-02-132015-08-20Cupp Computing AsSystems and methods for providing network security using a secure digital device
ES2545974B1 (en)*2014-03-172016-04-27Bankinter, S.A. Automatic and customized protection system for mobile applications
US9268970B2 (en)*2014-03-202016-02-23Analog Devices, Inc.System and method for security-aware master
US9268972B2 (en)2014-04-062016-02-23Freescale Semiconductor, Inc.Tamper detector power supply with wake-up
US11734396B2 (en)2014-06-172023-08-22El Electronics LlcSecurity through layers in an intelligent electronic device
US10192062B2 (en)*2014-06-202019-01-29Cypress Semiconductor CorporationEncryption for XIP and MMIO external memories
US10691838B2 (en)2014-06-202020-06-23Cypress Semiconductor CorporationEncryption for XIP and MMIO external memories
US10169618B2 (en)2014-06-202019-01-01Cypress Semiconductor CorporationEncryption method for execute-in-place memories
US9703733B2 (en)*2014-06-272017-07-11Intel CorporationInstructions and logic to interrupt and resume paging in a secure enclave page cache
US9747967B2 (en)2014-09-262017-08-29Intel CorporationMagnetic field-assisted memory operation
US9547778B1 (en)2014-09-262017-01-17Apple Inc.Secure public key acceleration
US9928102B2 (en)*2014-12-162018-03-27Kyndi, Inc.Method and apparatus for randomizing computer instruction sets, memory registers and pointers
US20160188495A1 (en)*2014-12-262016-06-30Intel CorporationEvent triggered erasure for data security
US10063569B2 (en)*2015-03-242018-08-28Intel CorporationCustom protection against side channel attacks
GB2537115B (en)*2015-04-022021-08-25Advanced Risc Mach LtdEvent monitoring in a multi-threaded data processing apparatus
CN104914815A (en)*2015-04-152015-09-16北汽福田汽车股份有限公司Processor monitoring method, device and system
US9875189B2 (en)2015-06-122018-01-23Intel CorporationSupporting secure memory intent
US10230529B2 (en)*2015-07-312019-03-12Microsft Technology Licensing, LLCTechniques to secure computation data in a computing environment
US10129035B2 (en)2015-08-102018-11-13Data I/O CorporationDevice birth certificate
GB2541400B (en)*2015-08-172017-11-15Advanced Risc Mach LtdTracing of exception handling events
US9998284B2 (en)2015-09-242018-06-12Intel CorporationMethods and apparatus to provide isolated execution environments
US10142101B2 (en)*2015-09-292018-11-27Intel CorporationHardware enforced one-way cryptography
GB2543520B (en)*2015-10-202019-06-19Advanced Risc Mach LtdMemory access instructions
US20170109526A1 (en)*2015-10-202017-04-20Intel CorporationSystems and methods for providing anti-malware protection and malware forensics on storage devices
FR3043228B1 (en)*2015-11-032018-03-30Proton World International N.V. STARTING THE CONTROL OF AN ELECTRONIC CIRCUIT
KR102415388B1 (en)*2015-11-132022-07-01삼성전자주식회사System on chip and secure debugging method thereof
US10095631B2 (en)*2015-12-102018-10-09Arm LimitedSystem address map for hashing within a chip and between chips
US10185633B2 (en)2015-12-152019-01-22Intel CorporationProcessor state integrity protection using hash verification
US10958435B2 (en)2015-12-212021-03-23Electro Industries/ Gauge TechProviding security in an intelligent electronic device
US10129359B2 (en)*2016-01-202018-11-13Google LlcMethods and apparatus to selectively provide cached and presently compiled applications
US11424931B2 (en)2016-01-272022-08-23Blackberry LimitedTrusted execution environment
US10430263B2 (en)2016-02-012019-10-01Electro Industries/Gauge TechDevices, systems and methods for validating and upgrading firmware in intelligent electronic devices
US10599409B2 (en)*2016-02-022020-03-24Blackberry LimitedApplication lifecycle operation queueing
CN108701193B (en)*2016-02-122022-08-30汉阳大学校产学协力团Secure semiconductor chip and method for operating the same
CN105790927B (en)*2016-02-262019-02-01华为技术有限公司A kind of bus graded encryption system
KR20180135940A (en)*2016-08-092018-12-21후아웨이 테크놀러지 컴퍼니 리미티드 System-on-Chip and Processing Devices
US10678924B2 (en)2016-08-102020-06-09Qualcomm IncorporatedHardware-based software-resilient user privacy exploiting ephemeral data retention of volatile memory
US10248486B2 (en)2016-09-292019-04-02Intel CorporationMemory monitor
CN107273770B (en)*2016-10-312020-08-11威盛电子股份有限公司 Protection device and method for basic input output system
TWI655555B (en)*2016-10-312019-04-01威盛電子股份有限公司Apparatus and method for securing bios
KR102802837B1 (en)*2016-12-202025-05-07삼성전자주식회사User terminal apparatus and controlling method of thereof
US10068068B2 (en)*2016-12-302018-09-04Intel CorporationTrusted timer service
EP3364329B1 (en)*2017-02-212023-07-26Mastercard International IncorporatedSecurity architecture for device applications
CN106970678B (en)*2017-03-102020-01-21武汉融卡智能信息科技有限公司Control method of safety clock under RPC mechanism under TEE
CN109756442B (en)*2017-11-012020-04-24清华大学Data statistics method, device and equipment based on garbled circuit
US10642970B2 (en)*2017-12-122020-05-05John AlmeidaVirus immune computer system and method
US10614254B2 (en)*2017-12-122020-04-07John AlmeidaVirus immune computer system and method
CN109945911A (en)*2017-12-152019-06-28富泰华工业(深圳)有限公司 Electronic device, disassembly monitoring device and method
JP6584487B2 (en)*2017-12-202019-10-02キヤノン株式会社 Information processing apparatus, control method thereof, and program
KR20190075363A (en)*2017-12-212019-07-01삼성전자주식회사Semiconductor memory device, memory system and memory module including the same
US11754997B2 (en)2018-02-172023-09-12Ei Electronics LlcDevices, systems and methods for predicting future consumption values of load(s) in power distribution systems
US11686594B2 (en)2018-02-172023-06-27Ei Electronics LlcDevices, systems and methods for a cloud-based meter management system
US11734704B2 (en)2018-02-172023-08-22Ei Electronics LlcDevices, systems and methods for the collection of meter data in a common, globally accessible, group of servers, to provide simpler configuration, collection, viewing, and analysis of the meter data
EP4246405B1 (en)2018-04-132025-01-29Mastercard International IncorporatedMethod and system for contactless transmission using off-the-shelf devices
TWI698769B (en)*2018-04-182020-07-11新唐科技股份有限公司Secure access to peripheral devices over a bus
GB201806465D0 (en)2018-04-202018-06-06Nordic Semiconductor AsaMemory-access controll
GB201807257D0 (en)*2018-05-022018-06-13Nordic Semiconductor AsaCryptographic key distribution
EP3579135B1 (en)*2018-06-062021-08-11Secure-IC SASMethods and devices for hardware characterization of computing devices
GB201810659D0 (en)2018-06-282018-08-15Nordic Semiconductor AsaSecure-Aware Bus System
GB201810662D0 (en)2018-06-282018-08-15Nordic Semiconductor AsaPeripheral Access On A Secure-Aware Bus System
GB201810653D0 (en)2018-06-282018-08-15Nordic Semiconductor AsaSecure peripheral interconnect
DE102018120347A1 (en)*2018-08-212020-02-27Pilz Gmbh & Co. Kg Automation system for monitoring a safety-critical process
DE102018120344B4 (en)*2018-08-212024-11-21Pilz Gmbh & Co. Kg Automation system for monitoring a safety-critical process
US10713163B2 (en)2018-09-112020-07-14Toshiba Memory CorporationSet aware system data and mapping tables
US10909030B2 (en)*2018-09-112021-02-02Toshiba Memory CorporationEnhanced trim command support for solid state drives
US12288058B2 (en)2018-09-202025-04-29Ei Electronics LlcDevices, systems and methods for tracking and upgrading firmware in intelligent electronic devices
US11429753B2 (en)*2018-09-272022-08-30Citrix Systems, Inc.Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications
GB2577878B (en)*2018-10-082020-11-11Advanced Risc Mach LtdTransition disable indicator
US11308215B2 (en)2019-03-082022-04-19International Business Machines CorporationSecure interface control high-level instruction interception for interruption enablement
US10956188B2 (en)2019-03-082021-03-23International Business Machines CorporationTransparent interpretation of guest instructions in secure virtual machine environment
US11347529B2 (en)2019-03-082022-05-31International Business Machines CorporationInject interrupts and exceptions into secure virtual machine
TWI791244B (en)*2019-04-072023-02-01新唐科技股份有限公司Monitor system booting security device and method thereof
TWI751962B (en)*2019-04-072022-01-01新唐科技股份有限公司Secured device, secured method, secured system, and secured apparatus
US11863589B2 (en)2019-06-072024-01-02Ei Electronics LlcEnterprise security in meters
US11429751B2 (en)2019-07-012022-08-30Rajant CorporationMethod and apparatus for encrypting and decrypting data on an integrated circuit
FR3098613A1 (en)2019-07-092021-01-15STMicroelectronics (Grand Ouest) SAS PROCESS FOR MANAGING THE OPERATION OF AT LEAST ONE NUMBER APPLICATION SOFTWARE AND CORRESPONDING INTEGRATED CIRCUIT
CN110659458A (en)*2019-10-102020-01-07陈昶宇Central processor design method supporting software code data secret credible execution
US11507702B2 (en)2019-11-052022-11-22Apple Inc.Secure mode switching in neural processor circuit
US11907411B2 (en)*2019-12-092024-02-20Hewlett-Packard Development Company, L.P.Secure operating modes for computing devices
CN113139175B (en)*2020-01-192024-12-06阿里巴巴集团控股有限公司 Processing unit, electronic device and safety control method
US12086076B2 (en)2020-02-212024-09-10Hewlett-Packard Development Company, L.P.Computing devices for encryption and decryption of data
US11327904B2 (en)*2020-03-112022-05-10Denso International America, Inc.Systems and methods for securing protected items in memory
FR3111441B1 (en)2020-06-102022-08-05Proton World Int Nv Secure start of an electronic circuit
CN114153637B (en)*2020-08-172025-07-08昆达电脑科技(昆山)有限公司Servo system
CA3191973A1 (en)2020-09-082022-03-17Jason GAGNE-KEATSMobile device with secure private memory
TWI797521B (en)*2020-12-182023-04-01新唐科技股份有限公司Method and system for protecting data in external memory using isolatled execution enviroment
CN114721717B (en)*2020-12-222023-09-19成都鼎桥通信技术有限公司Dual-system-based mobile phone management system mdm instruction calling method and device
US11677560B2 (en)*2021-03-092023-06-13Micron Technology, Inc.Utilization of a memory device as security token
TWI829138B (en)2022-04-082024-01-11信驊科技股份有限公司Electronic device and data transmission protection device thereof
EP4276633A1 (en)*2022-05-132023-11-15Thales Dis France SASSecured semiconductor device and method
EP4357957A1 (en)*2022-10-182024-04-24Thales Dis France SasMethod for securing against physical or logical attacks an execution of a machine language instructions code
JP2024066819A (en)*2022-11-022024-05-16キオクシア株式会社 Memory system and information processing system
US12254091B2 (en)*2022-11-022025-03-18VMware LLCEndpoint incident response from a secure enclave through dynamic insertion of an interrupt
TWI860605B (en)2023-01-042024-11-01熵碼科技股份有限公司Anti-tampering detector and method for detecting physical attack
US12190177B2 (en)2023-05-302025-01-07Microsoft Technology Licensing, LlcProcessor restart using firmware boot from volatile memory
CN116702129B (en)*2023-06-082024-07-05合芯科技有限公司Safe calling method and device for power architecture running service code

Citations (120)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4590552A (en)*1982-06-301986-05-20Texas Instruments IncorporatedSecurity bit for designating the security status of information stored in a nonvolatile memory
US4908796A (en)*1988-05-241990-03-13Dallas Semiconductor CorporationRegistered outputs for a memory device
US5014191A (en)*1988-05-021991-05-07Padgaonkar Ajay JSecurity for digital signal processor program memory
US5057999A (en)*1988-08-051991-10-15Nippon Motorola, Ltd.Microprocessor having a protection circuit to insure proper instruction fetching
US5067077A (en)*1983-09-221991-11-19Fujitsu LimitedSingle chip microcomputer having unauthorized memory space access protection
US5134700A (en)*1987-09-181992-07-28General Instrument CorporationMicrocomputer with internal ram security during external program mode
US5293424A (en)*1992-10-141994-03-08Bull Hn Information Systems Inc.Secure memory card
US5293610A (en)*1989-08-041994-03-08Motorola, Inc.Memory system having two-level security system for enhanced protection against unauthorized access
US5432950A (en)*1990-09-281995-07-11Motorola Inc.System for securing a data processing system and method of operation
US5446864A (en)*1991-11-121995-08-29Microchip Technology, Inc.System and method for protecting contents of microcontroller memory by providing scrambled data in response to an unauthorized read access without alteration of the memory contents
US5533123A (en)*1994-06-281996-07-02National Semiconductor CorporationProgrammable distributed personal security
US5557743A (en)*1994-04-051996-09-17Motorola, Inc.Protection circuit for a microprocessor
US5615263A (en)*1995-01-061997-03-25Vlsi Technology, Inc.Dual purpose security architecture with protected internal operating system
US5642480A (en)*1995-09-281997-06-24Motorola, Inc.Method and apparatus for enhanced security of a data processor
US5889679A (en)*1997-07-151999-03-30Integrated Device Technology, Inc.Fuse array control for smart function enable
US5892900A (en)*1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5953502A (en)*1997-02-131999-09-14Helbig, Sr.; Walter AMethod and apparatus for enhancing computer system security
US6115816A (en)*1996-12-182000-09-05Intel CorporationOptimized security functionality in an electronic system
US6122701A (en)*1997-12-112000-09-19Compaq Computer CorporationDevice volume control in multimode computer systems
US6260111B1 (en)*1997-08-152001-07-10International Business Machines CorporationSystem and method for network power management incorporating user identity and preferences via a power managed smart card
US6289455B1 (en)*1999-09-022001-09-11Crypotography Research, Inc.Method and apparatus for preventing piracy of digital content
US6314409B2 (en)*1996-01-112001-11-06Veridian Information SolutionsSystem for controlling access and distribution of digital property
US6378072B1 (en)*1998-02-032002-04-23Compaq Computer CorporationCryptographic system
US6393596B1 (en)*1998-10-302002-05-21Hewlett-Packard CompanyMissing pulse detector using synchronous detection
US20030061496A1 (en)*2001-09-262003-03-27Mohan AnandaMethod and apparatus for performing secure communications
US6581162B1 (en)*1996-12-312003-06-17Compaq Information Technologies Group, L.P.Method for securely creating, storing and using encryption keys in a computer system
US20030126442A1 (en)*2001-12-312003-07-03Glew Andrew F.Authenticated code module
US20030140205A1 (en)*2002-01-162003-07-24Franck DahanSecure mode for processors supporting interrupts
US20040030615A1 (en)*2002-08-122004-02-12Ling Marvin T.Systems and methods for distributing on-line content
US6704872B1 (en)*1998-05-192004-03-09International Business Machines CorporationProcessor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program
US6704871B1 (en)*1997-09-162004-03-09Safenet, Inc.Cryptographic co-processor
US6735696B1 (en)*1998-08-142004-05-11Intel CorporationDigital content protection using a secure booting method and apparatus
US20040123118A1 (en)*2002-01-162004-06-24Dahan Franck B.Secure mode indicator for smart phone or PDA
US6775778B1 (en)*1998-05-292004-08-10Texas Instruments IncorporatedSecure computing device having boot read only memory verification of program code
US20040177260A1 (en)*2003-03-062004-09-09International Business Machines CorporationSystem and method for remote code integrity in distributed systems
US20040208318A1 (en)*2003-04-182004-10-21Via Technologies Inc.Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
US20040250063A1 (en)*2003-05-022004-12-09Advanced Micro Devices, Inc.Computer system including a bus bridge for connection to a security services processor
US20050021944A1 (en)*2003-06-232005-01-27International Business Machines CorporationSecurity architecture for system on chip
US20050033969A1 (en)*2002-08-132005-02-10Nokia CorporationSecure execution architecture
US6862583B1 (en)*1999-10-042005-03-01Canon Kabushiki KaishaAuthenticated secure printing
US20050066355A1 (en)*2003-09-192005-03-24International Business Machines CorporationSystem and method for satellite broadcasting and receiving encrypted television data signals
US20050091652A1 (en)*2003-10-282005-04-28Ross Jonathan K.Processor-architecture for facilitating a virtual machine monitor
US20050160210A1 (en)*2002-11-182005-07-21Arm LimitedVectored interrupt control within a system having a secure domain and a non-secure domain
US20050278549A1 (en)*2004-06-102005-12-15Torla Michael JMethod and apparatus for providing security in a data processing system
US6983374B2 (en)*2000-02-142006-01-03Kabushiki Kaisha ToshibaTamper resistant microprocessor
US6986052B1 (en)*2000-06-302006-01-10Intel CorporationMethod and apparatus for secure execution using a secure memory partition
US20060015947A1 (en)*2004-07-012006-01-19Conti Gregory R PSystem and method for secure mode for processors and memories on multiple semiconductor dies within a single semiconductor package
US20060015748A1 (en)*2004-06-302006-01-19Fujitsu LimitedSecure processor and a program for a secure processor
US20060021035A1 (en)*2004-07-232006-01-26Conti Gregory R PSystem and method of identifying and preventing security violations within a computing system
US20060047800A1 (en)*2004-08-242006-03-02Panduit CorporationSystems and methods for network management
US20060053080A1 (en)*2003-02-032006-03-09Brad EdmonsonCentralized management of digital rights licensing
US20060051749A1 (en)*2001-11-282006-03-09Mj Bioworks IncorporatedPolymorphism and haplotype scoring by differential amplification of polymorphisms
US7013484B1 (en)*2000-03-312006-03-14Intel CorporationManaging a secure environment using a chipset in isolated execution mode
US20060072762A1 (en)*2004-10-012006-04-06Mark BuerStateless hardware security module
US20060072748A1 (en)*2004-10-012006-04-06Mark BuerCMOS-based stateless hardware security module
US20060075236A1 (en)*2004-09-302006-04-06Marek James AMethod and apparatus for high assurance processing
US20060085710A1 (en)*2004-09-302006-04-20Michael SpicaTesting memories
US20060090084A1 (en)*2004-10-222006-04-27Mark BuerSecure processing environment
US20060123184A1 (en)*2004-12-022006-06-08Mondal Sanjoy KMethod and apparatus for accessing physical memory from a CPU or processing element in a high performance manner
US20060129845A1 (en)*2004-11-192006-06-15Takanobu NakashimaMemory information protection system and methods
US7065654B1 (en)*2001-05-102006-06-20Advanced Micro Devices, Inc.Secure execution box
US20060151990A1 (en)*2002-09-102006-07-13Ingenia Technology LimitedSecurity device and system
US20060173701A1 (en)*2002-05-222006-08-03Gurvey Amy RElectronic system and method coupling live event ticketing and interactive entries with the sale, distribution and transmission of event recordings, mastering system and intelligent terminal designs
US20060179324A1 (en)*2005-02-072006-08-10Sony Computer Entertainment Inc.Methods and apparatus for facilitating a secure session between a processor and an external device
US20070006150A9 (en)*2002-12-022007-01-04Walmsley Simon RMulti-level boot hierarchy for software development on an integrated circuit
US7165180B1 (en)*2001-11-272007-01-16Vixs Systems, Inc.Monolithic semiconductor device for preventing external access to an encryption key
US20070016766A1 (en)*2005-06-282007-01-18Richmond Michael SLow cost trusted platform
US20070016832A1 (en)*2005-07-042007-01-18Yoav WeissSystem, device and method of verifying that a code is executed by a processor
US7171576B2 (en)*2003-04-092007-01-30International Business Machines CorporationMethod, apparatus and program storage device for providing clocks to multiple frequency domains using a single input clock of variable frequency
US20070033419A1 (en)*2003-07-072007-02-08Cryptography Research, Inc.Reprogrammable security for controlling piracy and enabling interactive content
US20070061597A1 (en)*2005-09-142007-03-15Micky HoltzmanSecure yet flexible system architecture for secure devices with flash mass storage memory
US20070069875A1 (en)*2005-09-282007-03-29Corrent CorporationTamper monitor circuit
US20070074276A1 (en)*2005-09-292007-03-29Harrison Keith AMethod of operating a one-time pad system and a system for implementing this method
US20070113079A1 (en)*2003-11-282007-05-17Takayuki ItoData processing apparatus
US20070130377A1 (en)*2005-10-262007-06-07Piwonka Mark ASMM-dependent GPIO lock for enhanced computer security
US20070136570A1 (en)*2005-12-092007-06-14Microsoft CorporationComputing device limiting mechanism
US20070172053A1 (en)*2005-02-112007-07-26Jean-Francois PoirierMethod and system for microprocessor data security
US20070186117A1 (en)*2003-09-252007-08-09Klein Dean ASecure processor-based system and method
US20070182575A1 (en)*2005-12-062007-08-09Infineon Technologies AgDetector circuit for detecting an external manipulation of an electrical circuit, circuit arrangement comprising a plurality of detector circuits, memory device and method for operating a detector circuit
US20070198851A1 (en)*2006-02-222007-08-23Fujitsu Limited Of Kawasaki, Japan.Secure processor
US20070213028A1 (en)*1998-06-012007-09-13Broadcom CorporationCommunication Device with a Self-Calibration Sleep Timer
US20070226795A1 (en)*2006-02-092007-09-27Texas Instruments IncorporatedVirtual cores and hardware-supported hypervisor integrated circuits, systems, methods and processes of manufacture
US20080034350A1 (en)*2006-04-052008-02-07Conti Gregory RSystem and Method for Checking the Integrity of Computer Program Code
US7340573B2 (en)*2002-11-182008-03-04Arm LimitedApparatus and method for controlling access to a memory unit
US7340614B2 (en)*2002-09-042008-03-04Matsushita Electric Industrial Co., Ltd.Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
US20080100224A1 (en)*2006-10-312008-05-01Felder Matthew DSystem on a chip with backlight controller
US20080130893A1 (en)*2006-11-302008-06-05Ibrahim Wael MMethods and systems for utilizing cryptographic functions of a cryptographic co-processor
US20080133931A1 (en)*2006-11-222008-06-05Fujitsu LimitedFailure diagnosis method
US7389427B1 (en)*2000-09-282008-06-17Intel CorporationMechanism to secure computer output from software attack using isolated execution
US7424612B2 (en)*2002-04-172008-09-09Microsoft CorporationSaving and retrieving data based on symmetric key encryption
US7430670B1 (en)*1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
US20080238612A1 (en)*2007-03-282008-10-02Microsoft CorporationDirect Peripheral Communication for Restricted Mode Operation
US20080250250A1 (en)*2007-04-042008-10-09Microsoft CorporationMethod and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing
US7447898B2 (en)*2005-11-162008-11-04Hon Hai Precision Industry Co., Ltd.System and method for bios setup
US7457960B2 (en)*2004-11-302008-11-25Analog Devices, Inc.Programmable processor supporting secure mode
US20090049220A1 (en)*2007-05-102009-02-19Texas Instruments IncorporatedInterrupt-related circuits, systems, and processes
US20090055612A1 (en)*1999-08-202009-02-26Intertrust Technologies Corp.Secure processing unit systems and methods
US7500098B2 (en)*2004-03-192009-03-03Nokia CorporationSecure mode controlled memory
US20090083372A1 (en)*1999-07-022009-03-26Time Certain LlcSystem and methods for distributing trusted time
US7519830B2 (en)*2006-08-032009-04-14Motorola, Inc.Secure storage of data
US7543158B2 (en)*2004-03-232009-06-02Texas Instruments IncorporatedHybrid cryptographic accelerator and method of operation thereof
US20090157936A1 (en)*2007-12-132009-06-18Texas Instruments IncorporatedInterrupt morphing and configuration, circuits, systems, and processes
US20090164800A1 (en)*2007-12-212009-06-25Petri Mikael JohanssonSecure End-of-Life Handling of Electronic Devices
US20090164961A1 (en)*2007-12-192009-06-25International Business Machines CorporationDesign Structure for a System For Controlling Access to Addressable Integrated Circuits
US20090172393A1 (en)*2007-12-312009-07-02Haluk Kent TanikMethod And System For Transferring Data And Instructions Through A Host File System
US20090177877A1 (en)*2008-01-092009-07-09International Business Machines CorporationRemote bios for servers and blades
US20090177826A1 (en)*2008-01-092009-07-09Texas Instruments IncorporatedSystem and method for preemptive masking and unmasking of non-secure processor interrupts
US7646224B2 (en)*2007-05-042010-01-12Exar CorporationMeans to detect a missing pulse and reduce the associated PLL phase bump
US7649421B2 (en)*2007-06-192010-01-19Harris Stratex Networks Operating CorporationQuality of phase lock and loss of lock detector
US20100023782A1 (en)*2007-12-212010-01-28Intel CorporationCryptographic key-to-policy association and enforcement for secure key-management and policy execution
US7661104B2 (en)*2002-11-182010-02-09Arm LimitedTask following between multiple operating systems
US20100057960A1 (en)*2008-08-262010-03-04Atmel CorporationSecure information processing
US7681046B1 (en)*2003-09-262010-03-16Andrew MorganSystem with secure cryptographic capabilities using a hardware specific digital secret
US7694151B1 (en)*2003-11-202010-04-06Johnson Richard CArchitecture, system, and method for operating on encrypted and/or hidden information
US7757098B2 (en)*2006-06-272010-07-13Intel CorporationMethod and apparatus for verifying authenticity of initial boot code
US20100241839A1 (en)*2009-03-202010-09-23Phoenix Technologies LtdLoading operating systems using memory segmentation and ACPI based context switch
US7917788B2 (en)*2006-11-012011-03-29Freescale Semiconductor, Inc.SOC with low power and performance modes
US20110098075A1 (en)*2008-07-112011-04-28Infineon Technologies AgMobile radio communication devices having a trusted processing environment and method for processing a computer program therein
US20110142236A1 (en)*2008-08-212011-06-16Elvis Gabriel NicaSecurity key generator
US8479014B1 (en)*2007-09-042013-07-02Guoan HuSymmetric key based secure microprocessor and its applications

Family Cites Families (56)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US15748A (en)*1856-09-16Improvement in harvesting-machines
US711284A (en)*1902-05-231902-10-14Wilson W CareyCompression shaft-coupling.
US766104A (en)*1904-04-191904-07-26Arthur C EastwoodSystem of motor control.
US4558176A (en)1982-09-201985-12-10Arnold Mark GComputer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
US4713792A (en)1985-06-061987-12-15Altera CorporationProgrammable macrocell using eprom or eeprom transistors for architecture control in programmable logic circuits
US4744062A (en)1985-04-231988-05-10Hitachi, Ltd.Semiconductor integrated circuit with nonvolatile memory
US5175840A (en)1985-10-021992-12-29Hitachi, Ltd.Microcomputer having a PROM including data security and test circuitry
US4888802A (en)1988-06-171989-12-19Ncr CorporationSystem and method for providing for secure encryptor key management
US5274778A (en)1990-06-011993-12-28National Semiconductor CorporationEPROM register providing a full time static output signal
US5147000A (en)*1990-06-191992-09-15Norvic S.A.Disc drill bit
US5446868A (en)*1992-09-111995-08-29R. J. Reynolds Tobacco CompanyNetwork bridge method and apparatus
US5465341A (en)*1992-10-231995-11-07Vlsi Technology, Inc.Verifiable security circuitry for preventing unauthorized access to programmed read only memory
US5657470A (en)*1994-11-091997-08-12Ybm Technologies, Inc.Personal computer hard disk protection system
US5998858A (en)1995-07-201999-12-07Dallas Semiconductor CorporationMicrocircuit with memory that is protected by both hardware and software
US5931901A (en)1996-12-091999-08-03Robert L. WolfeProgrammed music on demand from the internet
US5883679A (en)*1997-02-201999-03-16C-Cube Microsystems, Inc.Scanning scheme for images stored in dynamic random access memory
SE9701536L (en)*1997-04-241998-02-02Isaberg Rapid Ab Stapler with internal control of staple legs
US6330668B1 (en)1998-08-142001-12-11Dallas Semiconductor CorporationIntegrated circuit having hardware circuitry to prevent electrical or thermal stressing of the silicon circuitry
US7131001B1 (en)*1999-10-292006-10-31Broadcom CorporationApparatus and method for secure filed upgradability with hard wired public key
JP2001175606A (en)*1999-12-202001-06-29Sony CorpData processor, and data processing equipment and its method
CA2395645A1 (en)*1999-12-232001-06-28General Instrument CorporationDual-mode processor
EP1249010B1 (en)*2000-01-182003-09-10Infineon Technologies AGMicroprocessor system with encryption
US7047338B1 (en)*2000-07-182006-05-16IgtConfigurable hot-swap communication
DE10101956A1 (en)*2001-01-172002-07-25Infineon Technologies AgMethod for increasing the security of a CPU by prevention of differential power analysis by insertion of a random placeholder code in a CPU pipeline decode stage that does not, however, affect the CPU state
US6925570B2 (en)*2001-05-152005-08-02International Business Machines CorporationMethod and system for setting a secure computer environment
US7130951B1 (en)2002-04-182006-10-31Advanced Micro Devices, Inc.Method for selectively disabling interrupts on a secure execution mode-capable processor
US7974416B2 (en)*2002-11-272011-07-05Intel CorporationProviding a secure execution mode in a pre-boot environment
JP2004287590A (en)*2003-03-192004-10-14Matsushita Electric Ind Co Ltd Debug system, microprocessor and debugger
US7444667B2 (en)2003-07-282008-10-28Intel CorporationMethod and apparatus for trusted blade device computing
EP1870814B1 (en)*2006-06-192014-08-13Texas Instruments FranceMethod and apparatus for secure demand paging for processor devices
FR2872933B1 (en)2004-07-062008-01-25Trusted Logic Sa TIME SHARING METHOD OF A PROCESSOR
US20060059369A1 (en)*2004-09-102006-03-16International Business Machines CorporationCircuit chip for cryptographic processing having a secure interface to an external memory
US7171284B2 (en)*2004-09-212007-01-30Timbre Technologies, Inc.Optical metrology model optimization based on goals
US7610631B2 (en)*2004-11-152009-10-27Alexander FrankMethod and apparatus for provisioning software
US7613924B2 (en)2005-03-082009-11-03Texas Instruments IncorporatedEncrypted and other keys in public and private battery memories
CN1878055B (en)*2005-06-072010-11-03北京握奇数据系统有限公司Separation type mass data encryption/decryption device and implementing method therefor
US8353046B2 (en)*2005-06-082013-01-08Microsoft CorporationSystem and method for delivery of a modular operating system
US7444687B2 (en)*2005-08-292008-11-043M Innovative Properties CompanyHearing protective device that includes cellular earmuffs
US20070237325A1 (en)2006-02-012007-10-11Gershowitz Michael NMethod and apparatus to improve security of cryptographic systems
US8214296B2 (en)*2006-02-142012-07-03Microsoft CorporationDisaggregated secure execution environment
US20070192824A1 (en)*2006-02-142007-08-16Microsoft CorporationComputer hosting multiple secure execution environments
EP1870813B1 (en)2006-06-192013-01-30Texas Instruments FrancePage processing circuits, devices, methods and systems for secure demand paging and other operations
US20070297606A1 (en)2006-06-272007-12-27Tkacik Thomas EMultiple key security and method for electronic devices
US20080015748A1 (en)*2006-07-142008-01-17David NagySystem for monitoring, controlling, and reporting vehicle operation through onboard diagnostic port
CN200941211Y (en)*2006-08-232007-08-29北京同方微电子有限公司Microprocessor kernal for cryptography calculation
US20090319793A1 (en)*2006-09-112009-12-24John Joseph ZicPortable device for use in establishing trust
GB2442023B (en)*2006-09-132011-03-02Advanced Risc Mach LtdMemory access security management
CN100419776C (en)*2006-12-042008-09-17中国科学院计算技术研究所 A Programmable Security Processor
CN201054140Y (en)*2007-04-272008-04-30北京华大恒泰科技有限责任公司Information security control chip
US20080294951A1 (en)2007-05-012008-11-27Ahmad Mustafa SMethods and devices for testing computer memory
US20080307240A1 (en)2007-06-082008-12-11Texas Instruments IncorporatedPower management electronic circuits, systems, and methods and processes of manufacture
US8375219B2 (en)*2007-10-242013-02-12Microsoft CorporationProgram and operation verification
US9137015B2 (en)2008-01-042015-09-15Arcsoft, Inc.Protection scheme for AACS keys
US8127131B2 (en)2008-04-102012-02-28Telefonaktiebolaget Lm Ericsson (Publ)System and method for efficient security domain translation and data transfer
US8615799B2 (en)*2008-05-242013-12-24Via Technologies, Inc.Microprocessor having secure non-volatile storage access
US8726364B2 (en)2008-06-302014-05-13Intel CorporationAuthentication and access protection of computer boot modules in run-time environments

Patent Citations (125)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4590552A (en)*1982-06-301986-05-20Texas Instruments IncorporatedSecurity bit for designating the security status of information stored in a nonvolatile memory
US5067077A (en)*1983-09-221991-11-19Fujitsu LimitedSingle chip microcomputer having unauthorized memory space access protection
US5134700A (en)*1987-09-181992-07-28General Instrument CorporationMicrocomputer with internal ram security during external program mode
US5014191A (en)*1988-05-021991-05-07Padgaonkar Ajay JSecurity for digital signal processor program memory
US4908796A (en)*1988-05-241990-03-13Dallas Semiconductor CorporationRegistered outputs for a memory device
US5057999A (en)*1988-08-051991-10-15Nippon Motorola, Ltd.Microprocessor having a protection circuit to insure proper instruction fetching
US5293610A (en)*1989-08-041994-03-08Motorola, Inc.Memory system having two-level security system for enhanced protection against unauthorized access
US5432950A (en)*1990-09-281995-07-11Motorola Inc.System for securing a data processing system and method of operation
US5446864A (en)*1991-11-121995-08-29Microchip Technology, Inc.System and method for protecting contents of microcontroller memory by providing scrambled data in response to an unauthorized read access without alteration of the memory contents
US5293424A (en)*1992-10-141994-03-08Bull Hn Information Systems Inc.Secure memory card
US5557743A (en)*1994-04-051996-09-17Motorola, Inc.Protection circuit for a microprocessor
US5533123A (en)*1994-06-281996-07-02National Semiconductor CorporationProgrammable distributed personal security
US5615263A (en)*1995-01-061997-03-25Vlsi Technology, Inc.Dual purpose security architecture with protected internal operating system
US5642480A (en)*1995-09-281997-06-24Motorola, Inc.Method and apparatus for enhanced security of a data processor
US20090222673A1 (en)*1996-01-112009-09-03Verifides Technology CorporationSystem for controlling access and distribution of digital property
US6314409B2 (en)*1996-01-112001-11-06Veridian Information SolutionsSystem for controlling access and distribution of digital property
US5892900A (en)*1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6115816A (en)*1996-12-182000-09-05Intel CorporationOptimized security functionality in an electronic system
US6581162B1 (en)*1996-12-312003-06-17Compaq Information Technologies Group, L.P.Method for securely creating, storing and using encryption keys in a computer system
US5953502A (en)*1997-02-131999-09-14Helbig, Sr.; Walter AMethod and apparatus for enhancing computer system security
US5889679A (en)*1997-07-151999-03-30Integrated Device Technology, Inc.Fuse array control for smart function enable
US6260111B1 (en)*1997-08-152001-07-10International Business Machines CorporationSystem and method for network power management incorporating user identity and preferences via a power managed smart card
US6704871B1 (en)*1997-09-162004-03-09Safenet, Inc.Cryptographic co-processor
US6122701A (en)*1997-12-112000-09-19Compaq Computer CorporationDevice volume control in multimode computer systems
US6378072B1 (en)*1998-02-032002-04-23Compaq Computer CorporationCryptographic system
US6704872B1 (en)*1998-05-192004-03-09International Business Machines CorporationProcessor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program
US6775778B1 (en)*1998-05-292004-08-10Texas Instruments IncorporatedSecure computing device having boot read only memory verification of program code
US20070213028A1 (en)*1998-06-012007-09-13Broadcom CorporationCommunication Device with a Self-Calibration Sleep Timer
US6735696B1 (en)*1998-08-142004-05-11Intel CorporationDigital content protection using a secure booting method and apparatus
US6393596B1 (en)*1998-10-302002-05-21Hewlett-Packard CompanyMissing pulse detector using synchronous detection
US20090083372A1 (en)*1999-07-022009-03-26Time Certain LlcSystem and methods for distributing trusted time
US7430670B1 (en)*1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
US20090055612A1 (en)*1999-08-202009-02-26Intertrust Technologies Corp.Secure processing unit systems and methods
US6289455B1 (en)*1999-09-022001-09-11Crypotography Research, Inc.Method and apparatus for preventing piracy of digital content
US6862583B1 (en)*1999-10-042005-03-01Canon Kabushiki KaishaAuthenticated secure printing
US6983374B2 (en)*2000-02-142006-01-03Kabushiki Kaisha ToshibaTamper resistant microprocessor
US7013484B1 (en)*2000-03-312006-03-14Intel CorporationManaging a secure environment using a chipset in isolated execution mode
US6986052B1 (en)*2000-06-302006-01-10Intel CorporationMethod and apparatus for secure execution using a secure memory partition
US7389427B1 (en)*2000-09-282008-06-17Intel CorporationMechanism to secure computer output from software attack using isolated execution
US7065654B1 (en)*2001-05-102006-06-20Advanced Micro Devices, Inc.Secure execution box
US20030061496A1 (en)*2001-09-262003-03-27Mohan AnandaMethod and apparatus for performing secure communications
US7165180B1 (en)*2001-11-272007-01-16Vixs Systems, Inc.Monolithic semiconductor device for preventing external access to an encryption key
US20060051749A1 (en)*2001-11-282006-03-09Mj Bioworks IncorporatedPolymorphism and haplotype scoring by differential amplification of polymorphisms
US20030126442A1 (en)*2001-12-312003-07-03Glew Andrew F.Authenticated code module
US7237081B2 (en)*2002-01-162007-06-26Texas Instruments IncorporatedSecure mode for processors supporting interrupts
US7120771B2 (en)*2002-01-162006-10-10Texas Instruments IncorporatedSecure mode for processors supporting MMU
US20040123118A1 (en)*2002-01-162004-06-24Dahan Franck B.Secure mode indicator for smart phone or PDA
US20030140205A1 (en)*2002-01-162003-07-24Franck DahanSecure mode for processors supporting interrupts
US7424612B2 (en)*2002-04-172008-09-09Microsoft CorporationSaving and retrieving data based on symmetric key encryption
US20060173701A1 (en)*2002-05-222006-08-03Gurvey Amy RElectronic system and method coupling live event ticketing and interactive entries with the sale, distribution and transmission of event recordings, mastering system and intelligent terminal designs
US20040030615A1 (en)*2002-08-122004-02-12Ling Marvin T.Systems and methods for distributing on-line content
US20050033969A1 (en)*2002-08-132005-02-10Nokia CorporationSecure execution architecture
US7340614B2 (en)*2002-09-042008-03-04Matsushita Electric Industrial Co., Ltd.Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
US20060151990A1 (en)*2002-09-102006-07-13Ingenia Technology LimitedSecurity device and system
US7661104B2 (en)*2002-11-182010-02-09Arm LimitedTask following between multiple operating systems
US7340573B2 (en)*2002-11-182008-03-04Arm LimitedApparatus and method for controlling access to a memory unit
US20050160210A1 (en)*2002-11-182005-07-21Arm LimitedVectored interrupt control within a system having a secure domain and a non-secure domain
US20070006150A9 (en)*2002-12-022007-01-04Walmsley Simon RMulti-level boot hierarchy for software development on an integrated circuit
US20060053080A1 (en)*2003-02-032006-03-09Brad EdmonsonCentralized management of digital rights licensing
US20040177260A1 (en)*2003-03-062004-09-09International Business Machines CorporationSystem and method for remote code integrity in distributed systems
US7171576B2 (en)*2003-04-092007-01-30International Business Machines CorporationMethod, apparatus and program storage device for providing clocks to multiple frequency domains using a single input clock of variable frequency
US20040208318A1 (en)*2003-04-182004-10-21Via Technologies Inc.Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
US20040250063A1 (en)*2003-05-022004-12-09Advanced Micro Devices, Inc.Computer system including a bus bridge for connection to a security services processor
US20050021944A1 (en)*2003-06-232005-01-27International Business Machines CorporationSecurity architecture for system on chip
US20070033419A1 (en)*2003-07-072007-02-08Cryptography Research, Inc.Reprogrammable security for controlling piracy and enabling interactive content
US20050066355A1 (en)*2003-09-192005-03-24International Business Machines CorporationSystem and method for satellite broadcasting and receiving encrypted television data signals
US20070186117A1 (en)*2003-09-252007-08-09Klein Dean ASecure processor-based system and method
US7681046B1 (en)*2003-09-262010-03-16Andrew MorganSystem with secure cryptographic capabilities using a hardware specific digital secret
US20050091652A1 (en)*2003-10-282005-04-28Ross Jonathan K.Processor-architecture for facilitating a virtual machine monitor
US7694151B1 (en)*2003-11-202010-04-06Johnson Richard CArchitecture, system, and method for operating on encrypted and/or hidden information
US20070113079A1 (en)*2003-11-282007-05-17Takayuki ItoData processing apparatus
US7500098B2 (en)*2004-03-192009-03-03Nokia CorporationSecure mode controlled memory
US7543158B2 (en)*2004-03-232009-06-02Texas Instruments IncorporatedHybrid cryptographic accelerator and method of operation thereof
US20050278549A1 (en)*2004-06-102005-12-15Torla Michael JMethod and apparatus for providing security in a data processing system
US20060015748A1 (en)*2004-06-302006-01-19Fujitsu LimitedSecure processor and a program for a secure processor
US20060015947A1 (en)*2004-07-012006-01-19Conti Gregory R PSystem and method for secure mode for processors and memories on multiple semiconductor dies within a single semiconductor package
US20060021035A1 (en)*2004-07-232006-01-26Conti Gregory R PSystem and method of identifying and preventing security violations within a computing system
US20060047800A1 (en)*2004-08-242006-03-02Panduit CorporationSystems and methods for network management
US20060075236A1 (en)*2004-09-302006-04-06Marek James AMethod and apparatus for high assurance processing
US20060085710A1 (en)*2004-09-302006-04-20Michael SpicaTesting memories
US20060072748A1 (en)*2004-10-012006-04-06Mark BuerCMOS-based stateless hardware security module
US20060072762A1 (en)*2004-10-012006-04-06Mark BuerStateless hardware security module
US20060090084A1 (en)*2004-10-222006-04-27Mark BuerSecure processing environment
US20060129845A1 (en)*2004-11-192006-06-15Takanobu NakashimaMemory information protection system and methods
US7457960B2 (en)*2004-11-302008-11-25Analog Devices, Inc.Programmable processor supporting secure mode
US20060123184A1 (en)*2004-12-022006-06-08Mondal Sanjoy KMethod and apparatus for accessing physical memory from a CPU or processing element in a high performance manner
US20060179324A1 (en)*2005-02-072006-08-10Sony Computer Entertainment Inc.Methods and apparatus for facilitating a secure session between a processor and an external device
US20070172053A1 (en)*2005-02-112007-07-26Jean-Francois PoirierMethod and system for microprocessor data security
US20070016766A1 (en)*2005-06-282007-01-18Richmond Michael SLow cost trusted platform
US20070016832A1 (en)*2005-07-042007-01-18Yoav WeissSystem, device and method of verifying that a code is executed by a processor
US20070061597A1 (en)*2005-09-142007-03-15Micky HoltzmanSecure yet flexible system architecture for secure devices with flash mass storage memory
US20070069875A1 (en)*2005-09-282007-03-29Corrent CorporationTamper monitor circuit
US20070074276A1 (en)*2005-09-292007-03-29Harrison Keith AMethod of operating a one-time pad system and a system for implementing this method
US20070130377A1 (en)*2005-10-262007-06-07Piwonka Mark ASMM-dependent GPIO lock for enhanced computer security
US7447898B2 (en)*2005-11-162008-11-04Hon Hai Precision Industry Co., Ltd.System and method for bios setup
US20070182575A1 (en)*2005-12-062007-08-09Infineon Technologies AgDetector circuit for detecting an external manipulation of an electrical circuit, circuit arrangement comprising a plurality of detector circuits, memory device and method for operating a detector circuit
US20070136570A1 (en)*2005-12-092007-06-14Microsoft CorporationComputing device limiting mechanism
US20070226795A1 (en)*2006-02-092007-09-27Texas Instruments IncorporatedVirtual cores and hardware-supported hypervisor integrated circuits, systems, methods and processes of manufacture
US8468364B2 (en)*2006-02-222013-06-18Fujitsu Semiconductor LimitedSecure processor
US20070198851A1 (en)*2006-02-222007-08-23Fujitsu Limited Of Kawasaki, Japan.Secure processor
US20080034350A1 (en)*2006-04-052008-02-07Conti Gregory RSystem and Method for Checking the Integrity of Computer Program Code
US7757098B2 (en)*2006-06-272010-07-13Intel CorporationMethod and apparatus for verifying authenticity of initial boot code
US7519830B2 (en)*2006-08-032009-04-14Motorola, Inc.Secure storage of data
US20080100224A1 (en)*2006-10-312008-05-01Felder Matthew DSystem on a chip with backlight controller
US7917788B2 (en)*2006-11-012011-03-29Freescale Semiconductor, Inc.SOC with low power and performance modes
US20080133931A1 (en)*2006-11-222008-06-05Fujitsu LimitedFailure diagnosis method
US20080130893A1 (en)*2006-11-302008-06-05Ibrahim Wael MMethods and systems for utilizing cryptographic functions of a cryptographic co-processor
US20080238612A1 (en)*2007-03-282008-10-02Microsoft CorporationDirect Peripheral Communication for Restricted Mode Operation
US20080250250A1 (en)*2007-04-042008-10-09Microsoft CorporationMethod and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing
US7646224B2 (en)*2007-05-042010-01-12Exar CorporationMeans to detect a missing pulse and reduce the associated PLL phase bump
US20090049220A1 (en)*2007-05-102009-02-19Texas Instruments IncorporatedInterrupt-related circuits, systems, and processes
US7649421B2 (en)*2007-06-192010-01-19Harris Stratex Networks Operating CorporationQuality of phase lock and loss of lock detector
US8479014B1 (en)*2007-09-042013-07-02Guoan HuSymmetric key based secure microprocessor and its applications
US7730248B2 (en)*2007-12-132010-06-01Texas Instruments IncorporatedInterrupt morphing and configuration, circuits, systems and processes
US20090157936A1 (en)*2007-12-132009-06-18Texas Instruments IncorporatedInterrupt morphing and configuration, circuits, systems, and processes
US20090164961A1 (en)*2007-12-192009-06-25International Business Machines CorporationDesign Structure for a System For Controlling Access to Addressable Integrated Circuits
US20090164800A1 (en)*2007-12-212009-06-25Petri Mikael JohanssonSecure End-of-Life Handling of Electronic Devices
US20100023782A1 (en)*2007-12-212010-01-28Intel CorporationCryptographic key-to-policy association and enforcement for secure key-management and policy execution
US20090172393A1 (en)*2007-12-312009-07-02Haluk Kent TanikMethod And System For Transferring Data And Instructions Through A Host File System
US20090177826A1 (en)*2008-01-092009-07-09Texas Instruments IncorporatedSystem and method for preemptive masking and unmasking of non-secure processor interrupts
US20090177877A1 (en)*2008-01-092009-07-09International Business Machines CorporationRemote bios for servers and blades
US20110098075A1 (en)*2008-07-112011-04-28Infineon Technologies AgMobile radio communication devices having a trusted processing environment and method for processing a computer program therein
US20110142236A1 (en)*2008-08-212011-06-16Elvis Gabriel NicaSecurity key generator
US20100057960A1 (en)*2008-08-262010-03-04Atmel CorporationSecure information processing
US20100241839A1 (en)*2009-03-202010-09-23Phoenix Technologies LtdLoading operating systems using memory segmentation and ACPI based context switch

Cited By (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8615799B2 (en)*2008-05-242013-12-24Via Technologies, Inc.Microprocessor having secure non-volatile storage access
US20100250943A1 (en)*2009-03-272010-09-30International Business Machines CorporationMethod for security in electronically fused encryption keys
US8230495B2 (en)*2009-03-272012-07-24International Business Machines CorporationMethod for security in electronically fused encryption keys
US20140047245A1 (en)*2012-06-012014-02-13Sergei GoffmanIdentification and execution of subsets of a plurality of instructions in a more secure execution environment
US9465946B2 (en)*2012-06-012016-10-11Intel CorporationIdentification and execution of subsets of a plurality of instructions in a more secure execution environment
US10013551B2 (en)2015-08-242018-07-03Accenture Global Services LimitedIsolated memory space
TWI560575B (en)*2015-10-152016-12-01Via Tech IncMicroprocessor and method for securely executing instructions therein
US20170235956A1 (en)*2016-02-162017-08-17Atmel CorporationControlled secure code authentication
US20170235957A1 (en)*2016-02-162017-08-17Atmel CorporationControlled secure code authentication
US10474823B2 (en)*2016-02-162019-11-12Atmel CorporationControlled secure code authentication
US10482255B2 (en)*2016-02-162019-11-19Atmel CorporationControlled secure code authentication
US10616197B2 (en)2016-04-182020-04-07Atmel CorporationMessage authentication with secure code verification
US11876791B2 (en)2016-04-182024-01-16Amtel CorporationMessage authentication with secure code verification
CN109753821A (en)*2017-11-012019-05-14瑞昱半导体股份有限公司 Data access device and method
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US12061677B2 (en)2018-11-152024-08-13The Research Foundation For The State University Of New YorkSecure processor for detecting and preventing exploits of software vulnerability
US20230177143A1 (en)*2021-12-032023-06-08International Business Machines CorporationOperating a secure code segment on a processor core of a processing unit
US12314755B2 (en)2021-12-032025-05-27International Business Machines CorporationScheduling a secure code segment on a processor core of a processing unit

Also Published As

Publication numberPublication date
TW200949686A (en)2009-12-01
CN101533448B (en)2012-05-23
CN101533450A (en)2009-09-16
TW200949679A (en)2009-12-01
CN101533446A (en)2009-09-16
CN102722675A (en)2012-10-10
TW200949680A (en)2009-12-01
CN101533439A (en)2009-09-16
US20090292853A1 (en)2009-11-26
TW200949682A (en)2009-12-01
CN101533443A (en)2009-09-16
US8838924B2 (en)2014-09-16
TWI405123B (en)2013-08-11
TWI405124B (en)2013-08-11
US8370641B2 (en)2013-02-05
CN101533447A (en)2009-09-16
TW200949601A (en)2009-12-01
US20090293129A1 (en)2009-11-26
CN101533449A (en)2009-09-16
TWI385574B (en)2013-02-11
CN101533439B (en)2011-06-15
US20090292902A1 (en)2009-11-26
US20090290712A1 (en)2009-11-26
TW200949687A (en)2009-12-01
TW200949685A (en)2009-12-01
TWI394076B (en)2013-04-21
CN101533440B (en)2011-11-30
TWI397856B (en)2013-06-01
TW200949683A (en)2009-12-01
CN101533446B (en)2012-05-30
CN101533438B (en)2011-09-21
CN101533445A (en)2009-09-16
TW200949678A (en)2009-12-01
US8607034B2 (en)2013-12-10
TW200949681A (en)2009-12-01
US8910276B2 (en)2014-12-09
TWI520057B (en)2016-02-01
US8209763B2 (en)2012-06-26
CN101533448A (en)2009-09-16
US9002014B2 (en)2015-04-07
CN101533449B (en)2010-09-15
CN101533441B (en)2010-12-01
TWI489378B (en)2015-06-21
US20090292903A1 (en)2009-11-26
CN102722675B (en)2015-12-16
CN101533442B (en)2011-11-30
TWI385555B (en)2013-02-11
US20090292847A1 (en)2009-11-26
US8522354B2 (en)2013-08-27
US20090292901A1 (en)2009-11-26
US20090293132A1 (en)2009-11-26
CN101533451A (en)2009-09-16
CN101533444B (en)2010-12-01
TWI394060B (en)2013-04-21
US8762687B2 (en)2014-06-24
CN101533447B (en)2010-12-01
US20090292929A1 (en)2009-11-26
US7788433B2 (en)2010-08-31
TW200949602A (en)2009-12-01
TWI407367B (en)2013-09-01
TW200949702A (en)2009-12-01
TWI395137B (en)2013-05-01
CN101533438A (en)2009-09-16
CN101533445B (en)2013-04-10
TW200949677A (en)2009-12-01
US8793803B2 (en)2014-07-29
TWI397859B (en)2013-06-01
CN101533451B (en)2012-01-11
US8615799B2 (en)2013-12-24
US20090292894A1 (en)2009-11-26
US20090292893A1 (en)2009-11-26
CN101533450B (en)2010-10-13
US8978132B2 (en)2015-03-10
CN101533442A (en)2009-09-16
CN101533440A (en)2009-09-16
CN101533444A (en)2009-09-16
CN101533443B (en)2010-10-13
US20090292904A1 (en)2009-11-26
CN101533441A (en)2009-09-16
TWI581183B (en)2017-05-01

Similar Documents

PublicationPublication DateTitle
US8838924B2 (en)Microprocessor having internal secure memory
US8819839B2 (en)Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:VIA TECHNOLOGIES, INC., TAIWAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HENRY, G GLENN;PARKS, TERRY;REEL/FRAME:021880/0944

Effective date:20081120

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp