Cryptography – Key management – Having particular key generator
Patent
1990-01-18
1995-03-07
Gossage, Glenn
Cryptography
Key management
Having particular key generator
395725, 380 4, 364DIG1, 365195, G06F 1214, H04L 932, G11C 700
Patent
active
053966090
ABSTRACT:
A method of protecting programs and data in computers against unauthorized access and modifications employs a programmable hardware circuit to monitor memory regions of a computer. The memory regions are divided into different access levels, and the circuit is programmed to permit access only to predetermined regions. If an unauthorized access is attempted by a program, an address corresponding to the program location initiating the unauthorized access is detected and the program is stopped. This ensures that the procedures for protecting the operating system cannot be circumvented to gain unauthorized access to data of any type. After programming of the circuit is completed, the programming cannot be changed except by actuation of a hardware switch or by re-starting the computer. Removal of the circuit will cause short circuits, thus making it impossible to shut the circuit off without being detected.
REFERENCES:
patent: 4104721 (1978-08-01), Markstein
patent: 4118789 (1978-10-01), Casto et al.
patent: 4665506 (1987-05-01), Cline et al.
patent: 4811293 (1989-03-01), Knothe et al.
patent: 4951249 (1990-08-01), McClung et al.
patent: 4954982 (1990-09-01), Tateishi et al.
patent: 4979098 (1990-12-01), Baum et al.
patent: 5023773 (1991-06-01), Baum et al.
patent: 5027317 (1991-06-01), Pepera et al.
patent: 5043878 (1991-08-01), Ooi
patent: 5067077 (1991-11-01), Wakimoto et al.
Carroll, "Implementing Multilevel Security by Violation Privilege," Computers and Security, vol. 7, No. 6, Dec. 1988, pp. 563-573.
Groepler et al, "The Virtual MC68010," Mini-Micro Conference Record, Nov. 8-11, 1983, pp. 1-8.
"Interactive Work Station with Auxiliary Microprocessor for Storage Protection," IBM Technical Disclosure Bulletin, vol. 29, No. 11, Apr. 1987, 1987, pp. 4976-4982.
"Storage Keys Addressed by Logical or Physical Address Bus Under Program Control in IBM System/370," IBM Technical Disclosure Bulletin, vol. 31, No. 6, Nov. 1988, p. 353.
"A Survey of Microprocessor Architectures for Memory Management," by B. Furht et al, Computer, Mar. 1987, pp. 48, 63-67.
Menache Georg
Schmidt Karl-Heinz
Waidelich Wilhelm
Gesellschaft fur Strahlen- und Umweltforschung mbH (GSF)
Gossage Glenn
LandOfFree
Method of protecting programs and data in a computer against una does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of protecting programs and data in a computer against una, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of protecting programs and data in a computer against una will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1413563