Abstract:
A system for secure key management including a secondary device comprising a programmable hardware component and an associated secure data storage, wherein the secondary device comprises a one-way communications link to receive input unilaterally from a computing device, an encryption key generator to generate and store encryption keys on the secure data storage, and an encryption key distribution module to distribute encryption keys to one or more destinations on a computer network through a communications interface component, wherein the distribution is adapted to bypass a central processor of the computing device. A method is also provided.
Abstract:
A standard two terminal battery package is configured to communicate with an external charger or load, without requiring modification to the battery mechanics and/or high current circuit components integral with the battery. A transmitter and receiver (transceiver) are incorporated into the battery housing. An associated battery charger and/or load, e.g., tool, appliance, vacuum, etc., has a corresponding transceiver configured to communicate with the battery transceiver. A microcontroller may be coupled to the transceiver. Serial number verification between the battery and tool load can be verified. Sensors for temperature, voltage, pressure and pH may be coupled between the battery and microcontroller for monitoring battery temperature, voltage charge and condition during operation or charging thereof. Information from these sensors and more may be communicated from the battery to the load or battery charger. Furthermore, the battery charger may communicate over the Internet for battery operational history collection and theft identification.
Abstract:
A circuit arrangement and method for securing an integrated electronic circuit against scans of an address space, wherein the circuit arrangement has at least one master unit and at least one slave unit interconnected via a bus system for access of the master unit to the slave unit, and addresses are used from an address space that is allocated and used in accordance with functionalities of the integrated electronic circuit, where a defense slave unit is connected to the bus system, access to unused address regions of the address space are forwarded to the defense slave unit, the access is analyzed and evaluated by the defense slave unit and depending on an analysis result and the respective access type, defensive measures are triggered, such that address space scans are interrupted or a potential scan result is rendered useless in a simple manner.
Abstract:
A 3D graphics system uses encryption keys to decrypt received and stored texture tiles of a texture in accordance with received and stored texture tile status data which indicates whether a texture tiles is encrypted or not and which one of the encryption keys is used. The decrypted texture tiles are rendered and at least a plurality of the rendered tiles is encrypted. The encrypted rendered tiles are stored in a frame buffer. Buffer tile status data is stored which indicates whether a rendered tile is encrypted or not before storage in the frame buffer, and which one of the encryption keys has been used. The encrypted rendered tiles stored in the frame buffer are decrypted in accordance with the buffer tile status data.
Abstract:
Techniques and logic are presented for encrypting and decrypting applications and related data within a multi-processor system to prevent tampering. The decryption and encryption may be performed either between a system bus and a processor's individual L1 cache memory or between a processor's instruction and execution unit and their respective L1 caches. The logic may include one or more linear feedback shift registers (LFSRs) that may be used for generation of unique sequential address related codes to perform the decryption of instructions and transformation logic that may be used for generation of equivalent offset address related codes to perform decryption and encryption of data. The logic may also be programmable and may be used for test purposes.
Abstract:
Two endpoint devices communicate with one another in a secure session by negotiating encrypted communications at initial establishment of the session. Each endpoint device communicates its available security profiles to the other endpoint. A specific security profile is then selected that defines the data encryption and authentication used during the secure session between the two endpoint devices.
Abstract:
A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator Processor Interface (CAPI) adapter. An Application Client requests authorization to a File from a system processor file system. The file system validates the request, determines the location of each Extent that comprises the File, and requests authorization to each Extent from a System CAPI Authorization manager. The System CAPI Authorization manager requests the CAPI Client manager to assign a Child Client ID and CAPI Server Register range to the requesting Application Client and requests a previously authorized CAPI Parent Client to authorize the Child ID to the list of Extents. The CAPI Parent Client sends a Create Authorizations command to the CAPI Adapter via the Parent's CAPI Server Registers. The CAPI Adapter validates the Parent Authorization Handle and CPI Server Register range for the specific Extent/Command/Resource, and creates an Authorization List by assigning a new Child Authorization Handle for each requested, validated Extent/Command/Resource. The Authorization List and the Child Client ID are returned to the File System.
Abstract:
A method, system and computer program product are provided for implementing block extent granularity authorization initialization processing in Coherent Accelerator Processor Interface (CAPI) adapters. A master owning client and CAPI Server Register space assigned to the Master Owning Client are identified. Address mapping is created for the Master Owning Client to access the assigned CAPI Server Register space. The Master Owning Client is enabled to send commands to the CAPI adapter, other CAPI clients are prevented from sending commands to the CAPI adapter via the CAPI Server Register space assigned to the Master Owning Client.
Abstract:
An intrusion detection apparatus and method using a load balancer responsive to traffic conditions between a central processing unit (CPU) and a graphics processing unit (GPU) are provided. The intrusion detection apparatus includes a packet acquisition unit, a character string check task allocation unit, a CPU character string check unit, and a GPU character string check unit. The packet acquisition unit receives packets, and stores the packets in a single task queue. The character string check task allocation unit determines the number of packets in the packet acquisition unit, and allocates character string check tasks to the CPU or the GPU. The CPU character string check unit compares the character strings of the packets with a character string defined in at least one detection rule inside the CPU. The GPU character string check unit compares the character strings of the packets with the character string inside the GPU.
Abstract:
A method for storing and transmitting data across a computer network to one or more destinations is disclosed including storing source data on a secure data storage of a secondary device connected to a computing device. The computing device is configured to operate via an operating system and the secure data storage is adapted to receive input unilaterally from the computing device and store it as source data. Receiving one or more of routing, scheduling, and prioritization information for one or more destinations including other network-connected storage mediums or network-connected computing or peripheral devices, and transferring the source data from the secure data storage to the one or more destinations through a communications interface component connected to the computer network are also performed. The transferring is implemented via the secondary device while bypassing the central processor and in accordance with the one or more of routing, scheduling, and prioritization information.