Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2007-12-04
2007-12-04
Jung, David (Department: 2134)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C712S244000, C726S021000
Reexamination Certificate
active
10714563
ABSTRACT:
There is a provided a data processing system comprising:a processor operable in a plurality of modes and either a secure domain or a non-secure domain including:at least one secure mode being a mode in said secure domain; andat least one non-secure mode being a mode in said non-secure domain;whereinwhen said processor is executing a program in a secure mode said program has access to secure data which is not accessible when said processor is operating in a non-secure mode; and whereinsaid processor is responsive to a switching request to initiate a switch between a secure mode and a non-secure mode under control of a mode switching program starting at a location specified by an exception vector associated with said switching request.
REFERENCES:
patent: 4279016 (1981-07-01), Leininger et al.
patent: 5615263 (1997-03-01), Takahashi
patent: 5684948 (1997-11-01), Johnson et al.
patent: 5734910 (1998-03-01), Corrigan et al.
patent: 6604123 (2003-08-01), Bruno et al.
patent: 553 733 (1993-08-01), None
patent: 1 054 322 (2000-11-01), None
patent: 1 162 536 (2001-12-01), None
patent: WO 90/05951 (1990-05-01), None
patent: WO 99/38073 (1999-07-01), None
patent: WO 01/46800 (2001-06-01), None
patent: WO 02/071211 (2002-09-01), None
http://www.juniper.net/solutions/literature/white—papers/Vector-Rewrite-Attack.pdf, year 2007.
A SystemC refinement methodology for embedded software Chevalier, J.; de Nanclas, M.; Filion, L.; Benny, O.; Rondonneau, M.; Bois, G.; El Mostapha Aboulhamid; Design & Test of Computers, IEEE vol. 23, Issue 2, Mar.-Apr. 2006 pp. 148-158.
An embedded traffic information collection system based on /spl mu/Clinux Yu Changhong; Ma Hongqing; Li Peihong; Lai Hongping; Liu Jilin; Intelligent Transportation Systems, 2005. Proceedings. 2005 IEEE Sep. 13-15, 2005 pp. 718-721.
A distributed colouring algorithm for control hazards in asynchronous pipelines Theodoropoulos, T.; Qianyi Zhang; Parallel Architectures, Algorithms and Networks, 2004. Proceedings. 7th International Symposium on May 10-12, 2004 pp. 266-271.
Related U.S. Appl. No. 10/714,518.
Related U.S. Appl. No. 10/714,519.
Related U.S. Appl. No. 10/714,565.
Related U.S. Appl. No. 10/714,521.
Related U.S. Appl. No. 10/714,561.
Related U.S. Appl. No. 10/714,520.
Related U.S. Appl. No. 10/714,483.
Related U.S. Appl. No. 10/714,178.
Related U.S. Appl. No. 10/714,480.
Related U.S. Appl. No. 10/714,562.
Related U.S. Appl. No. 10/714,560.
Related U.S. Appl. No. 10/714,516.
Related U.S. Appl. No. 10/714,482.
Related U.S. Appl. No. 10/714,484.
Related U.S. Appl. No. 10/713,454.
Related U.S. Appl. No. 10/713,303.
Related U.S. Appl. No. 10/713,456.
Related U.S. Appl. No. 10/714,481.
Trusted Computing Group (TCG), Main Specification Version 1.1a, Sep. 1, 2001, pp. i-x and 1-322.
Belnet Lionel
Brochier Stephane Eric Sebastien
Chaussade Nicolas
Dornan Christopher Bentley
Orion Luc
ARM Limited
Jung David
Nixon & Vanderhye P.C.
LandOfFree
Security mode switching via an exception vector does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security mode switching via an exception vector, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security mode switching via an exception vector will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3886397