-
公开(公告)号:US20220327184A1
公开(公告)日:2022-10-13
申请号:US17836587
申请日:2022-06-09
申请人: QuickVault, Inc.
发明人: Steven V. Bacastow
IPC分类号: G06F21/30 , G06F11/14 , G06F21/60 , G06F21/62 , G06F21/78 , H04L9/40 , H04W12/0431 , G06F21/12 , H04W12/06 , H04W12/08
摘要: A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
-
公开(公告)号:US20220318438A1
公开(公告)日:2022-10-06
申请号:US17301534
申请日:2021-04-06
发明人: James Hoelsworth , Christopher Zarcone , Sai Sreenath Adabala , Thomas Kilgallon , Anvesh Paidipala , Herbert Marti , Hugo Allexis Cardona Escalante
摘要: A mobile device may comprise a secure memory. The mobile device may receive a request from a mobile application executing on the mobile device to store data in the secure memory. The request may comprise the data and a group identifier associated with the mobile application. A primary symmetric key associated with the group identifier may be determined. The data may be encrypted, using the primary symmetric key, to produce first encrypted data. A secondary symmetric key associated with the group identifier may be determined. The first encrypted data may be encrypted, using the secondary symmetric key, to produce second encrypted data. The second encrypted data may be stored to the secure memory
-
公开(公告)号:US11461248B2
公开(公告)日:2022-10-04
申请号:US16648901
申请日:2018-11-09
申请人: ARM Limited
摘要: A realm management unit (RMU) manages ownership of memory regions by realms, each realm corresponding to at least a portion of a software process executed by processing circuitry. Memory access circuitry enforces ownership rights for the regions, with the owner realm having a right to exclude other realms from accessing data stored within its owned region. The memory access circuitry permits execution, from within a current realm, of program code stored in a target memory region having an owner realm other than the current realm, when the target memory region is owned by a code realm and a code realm authorisation table 908 stored in at least one memory region owned by the current realm indicates that execution of program code from the target memory region is permitted by the current realm.
-
公开(公告)号:US11461141B2
公开(公告)日:2022-10-04
申请号:US16899468
申请日:2020-06-11
摘要: This invention presents methods to utilize more regions for tasks than the number of slots in a memory protection unit and to efficiently distribute regions between multiple tasks within a partition.
-
公开(公告)号:US20220309193A1
公开(公告)日:2022-09-29
申请号:US17216568
申请日:2021-03-29
发明人: Matthew Harris KLAPMAN , Brian Edward MASTENBROOK , Pongsanat KARMPEERAPARPSONTORN , Thantham PANYAYODRAT , Suksan YAOWAPHAK
摘要: An in-line security device to transfer cryptographic key material, the device comprising: a first connector configured to connect, via wire, with a host device; a second connector configured to connect, via wire, with a data storage device; a pass-through circuit between the first connector and the second connector to facilitate data communication between the host device and the data storage device; and a communication interface to send cryptographic key material to the data storage device via the second connector.
-
公开(公告)号:US20220309185A1
公开(公告)日:2022-09-29
申请号:US17834607
申请日:2022-06-07
摘要: Systems and methods are provided for implementing stand-in network identities. One example computer-implemented method includes receiving, from a communication device associated with a user, an on-behalf-of (OBO) request from the user to share permission data with a relying party and, in response to the OBO request, generating a permission request for the permission data and transmitting the permission request to the communication device associated with the user. The method also includes receiving, from the communication device associated with the user, consent from the user to share the permission data with the relying party. The method then includes identifying, in a data structure, an OBO permission for the user with respect to the PII and in response to identifying the OBO permission for the user, transmitting the permission data identified in the OBO request to the relying party.
-
公开(公告)号:US11455413B2
公开(公告)日:2022-09-27
申请号:US16848265
申请日:2020-04-14
发明人: Yutaka Sakai
摘要: An information processing apparatus includes a processor configured to: obtain first authority information indicating possession of authority over a server, the first authority information being associated with user's identification information, and second authority information indicating possession of authority over the server that is different from authority indicated by the first authority information; accept a request for the server; in a case where the request is executable with authority based on the first authority information identified by the identification information, add the first authority information to the request and send the request with the first authority information to the server; and in a case where the request is not executable with authority based on the first authority information and is executable with authority based on the second authority information, add the second authority information to the request and send the request with the second authority information to the server.
-
公开(公告)号:US11455405B2
公开(公告)日:2022-09-27
申请号:US16987979
申请日:2020-08-07
发明人: Kfir Wolfson , Jehuda Shemer , Stav Sapir , Amos Zamir , Naor Radami
摘要: One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
-
公开(公告)号:US20220300330A1
公开(公告)日:2022-09-22
申请号:US17202447
申请日:2021-03-16
摘要: According to certain embodiments, a method comprises monitoring a request for use of memory requested by a container manager application on behalf of a given one of a plurality of containers during runtime of the given container. The method further comprises determining that the request for use of memory has caused an exception. The exception indicates that the request has requested an invalid operation on a memory table or that the request has requested a previously not seen memory table. In response, the method further comprises determining an action to perform. The action depends on both first trustworthiness information associated with the given container and second trustworthiness information associated with the given container. The first trustworthiness information is obtained from a Third Party Reputation Service (TPRS). The second trustworthiness information is obtained based on monitoring the runtime behavior of the given container.
-
公开(公告)号:US20220292187A1
公开(公告)日:2022-09-15
申请号:US17233230
申请日:2021-04-16
摘要: An information management system implements a method for securing a media agent from unauthorized access, where the method includes configuring a secondary storage computing device to initialize a filter driver at boot time and monitor process calls to a media agent, where the media agent provides read and write operations to a secondary storage device in communication with the secondary storage computing device. The filter driver may detect a process call to the media agent, and determine whether the process call is authorized. In response to a determination that the process call is authorized, the filter driver may allow the process call to request an operation be performed by the media agent, and the media agent may then perform the requested operation. If the filter driver determines that the process call is not authorized, the filter driver may ignore the process call for the requested operation.
-
-
-
-
-
-
-
-
-