Method of protecting programs and data in a computer against una

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395725, 380 4, 364DIG1, 365195, G06F 1214, H04L 932, G11C 700

Patent

active

053966090

ABSTRACT:
A method of protecting programs and data in computers against unauthorized access and modifications employs a programmable hardware circuit to monitor memory regions of a computer. The memory regions are divided into different access levels, and the circuit is programmed to permit access only to predetermined regions. If an unauthorized access is attempted by a program, an address corresponding to the program location initiating the unauthorized access is detected and the program is stopped. This ensures that the procedures for protecting the operating system cannot be circumvented to gain unauthorized access to data of any type. After programming of the circuit is completed, the programming cannot be changed except by actuation of a hardware switch or by re-starting the computer. Removal of the circuit will cause short circuits, thus making it impossible to shut the circuit off without being detected.

REFERENCES:
patent: 4104721 (1978-08-01), Markstein
patent: 4118789 (1978-10-01), Casto et al.
patent: 4665506 (1987-05-01), Cline et al.
patent: 4811293 (1989-03-01), Knothe et al.
patent: 4951249 (1990-08-01), McClung et al.
patent: 4954982 (1990-09-01), Tateishi et al.
patent: 4979098 (1990-12-01), Baum et al.
patent: 5023773 (1991-06-01), Baum et al.
patent: 5027317 (1991-06-01), Pepera et al.
patent: 5043878 (1991-08-01), Ooi
patent: 5067077 (1991-11-01), Wakimoto et al.
Carroll, "Implementing Multilevel Security by Violation Privilege," Computers and Security, vol. 7, No. 6, Dec. 1988, pp. 563-573.
Groepler et al, "The Virtual MC68010," Mini-Micro Conference Record, Nov. 8-11, 1983, pp. 1-8.
"Interactive Work Station with Auxiliary Microprocessor for Storage Protection," IBM Technical Disclosure Bulletin, vol. 29, No. 11, Apr. 1987, 1987, pp. 4976-4982.
"Storage Keys Addressed by Logical or Physical Address Bus Under Program Control in IBM System/370," IBM Technical Disclosure Bulletin, vol. 31, No. 6, Nov. 1988, p. 353.
"A Survey of Microprocessor Architectures for Memory Management," by B. Furht et al, Computer, Mar. 1987, pp. 48, 63-67.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of protecting programs and data in a computer against una does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of protecting programs and data in a computer against una, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of protecting programs and data in a computer against una will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1413563

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.