Inspection apparatus, inspection method and program

    公开(公告)号:US12130949B2

    公开(公告)日:2024-10-29

    申请号:US17795304

    申请日:2020-01-27

    CPC classification number: G06F21/64

    Abstract: An inspection device supports work related to ensuring security by including: a conversion unit that converts a regular expression of a first signature into a first representation by a nondeterministic finite automaton and converts a regular expression of a second signature into a second representation by a nondeterministic finite automaton; a determination unit that determines the presence or absence of an inclusive relationship between the first representation and the second representation; and an output unit that when a result of determination by the determination unit indicates that the first representation and the second representation have an inclusive relationship, outputs information indicating that the first signature and the second signature have the inclusive relationship.

    STORAGE DEVICE INCLUDING PROTECTED AREA AND DATA WRITE METHOD THEREOF

    公开(公告)号:US20240354448A1

    公开(公告)日:2024-10-24

    申请号:US18390736

    申请日:2023-12-20

    CPC classification number: G06F21/78 G06F21/602 G06F21/64

    Abstract: A method of writing data in a replay protected memory block (RPMB) area of a storage device in response to a request of a host device includes receiving a write request, including a message authentication code, data, and a bitmap index, from the host device and verifying the write request based on the message authentication code and the bitmap index. The verifying the write request may include calculating a message authentication code based on data and a bitmap index received from the host device, comparing a message authentication code, calculated in the storage device, with the message authentication code of the write request, and comparing the bitmap index of the write request with bitmap indexes, stored in the storage device, to check whether a replay attack has been made.

    Apparatus and methods for verifying a file origin

    公开(公告)号:US12124614B2

    公开(公告)日:2024-10-22

    申请号:US17109221

    申请日:2020-12-02

    CPC classification number: G06F21/64 G06F16/137 G06F21/602

    Abstract: Apparatus configured to obtain a hash of a file to be transmitted to a second apparatus and an indication of a file creator of the file; retrieve an identifier associated with the file creator; store the hash of the file, associated with the identifier of the file creator, in an immutable ledger; obtain the hash of the file from the second apparatus; verify that the hash of the file is stored in the immutable ledger; retrieve, from the immutable ledger, one or more assertions associated with the file; retrieve, from the immutable ledger, the associated identifier of the file creator using the hash of the file; and transmit, to the second apparatus: a confirmation that the file is from the file creator; and at least one of the one or more assertions associated with the file.

    Running a trusted application using a dynamic library

    公开(公告)号:US12118128B2

    公开(公告)日:2024-10-15

    申请号:US17682034

    申请日:2022-02-28

    Inventor: Jianxin Peng

    Abstract: A trusted application running method applied to a computer system on which a trusted execution environment (TEE) and a rich execution environment (REE) are deployed, where one or more trusted applications (TAs) run on the TEE operating system. The TEE operating system may start a target TA. Then, the target TA may send, to the TEE operating system, a loading request for a target dynamic library supporting the target service. The TEE operating system may load the target dynamic library to memory space of the target TA in response to the loading request. In this way, before the target TA runs the target service, a program module used to support the target service does not need to be loaded to the memory space of the TA, thereby reducing a waste of the memory space of the TA.

    ANTI-MALICIOUS METHOD, DEVICE AND MEDIUM FOR SECURE THREE-PARTY COMPUTATION

    公开(公告)号:US20240338489A1

    公开(公告)日:2024-10-10

    申请号:US18376722

    申请日:2023-10-04

    Abstract: The present disclosure provides an anti-malicious method, device and medium for secure three-party computation, and relates to the field of data security. The method includes the following: Respective private data matrices of three participants are determined; each participant receives a corresponding random matrix pair generated by a commodity server node; and based on the random matrix pair, a corresponding internal matrix is generated in a computational process of the three participants, and corresponding security constraints are separately added to a computational process in which a collusion behavior exists and no collusion behavior exists. The security constraints implement a constraint on a rank of an internal matrix, so that any participant in the computational process cannot predict private data matrices of another two participants. The present disclosure can improve data security of the secure three-party computation.

Patent Agency Ranking