This application is based on and claims the benefit of priority from United Kingdom Application 1419282.7, filed on Oct. 30, 2014, which is hereby incorporated herein by reference in its entirety.
Computer systems running customer workloads often include confidential and/or sensitive data. For a system fault or a performance analysis, it may be desired to extract data from a customer computer system and send it to the vendor of the computer system, however the data may include customer data and internal data about the computer system itself.
Shortcomings of the prior art are overcome and additional advantages are provided through the provision of a computer-implemented method that includes: A computer-implemented method comprising: obtaining, by a security engine of a system, a public encryption key associated with a private decryption key; generating an extraction key that is inaccessible outside of the security engine; encrypting the extraction key with the public encryption key, to thereby obtain an encrypted extraction key; collecting state information of the system; encrypting the collected state information with the extraction key and storing the encrypted collected state information; and based on a request for access to the stored encrypted collected state information by a request for the extraction key, providing the extraction key to facilitate decryption of the stored encrypted state information.
Further, a computer system is provided that includes a memory; and a processor in communications with the memory. The computer system is configured to perform a method that includes: obtaining, by a security engine of a system, a public encryption key associated with a private decryption key; generating an extraction key that is inaccessible outside of the security engine; encrypting the extraction key with the public encryption key, to thereby obtain an encrypted extraction key; collecting state information of the system; encrypting the collected state information with the extraction key and storing the encrypted collected state information; and based on a request for access to the stored encrypted collected state information by a request for the extraction key, providing the extraction key to facilitate decryption of the stored encrypted state information.
Yet further, a computer program product is provided, that includes a computer readable storage medium readable by a processor and storing instructions for execution by the processor for performing a method that includes: obtaining, by a security engine of a system, a public encryption key associated with a private decryption key; generating an extraction key that is inaccessible outside of the security engine; encrypting the extraction key with the public encryption key, to thereby obtain an encrypted extraction key; collecting state information of the system; encrypting the collected state information with the extraction key and storing the encrypted collected state information; and based on a request for access to the stored encrypted collected state information by a request for the extraction key, providing the extraction key to facilitate decryption of the stored encrypted state information.
Additional features and advantages are realized through the concepts of the present invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention.
Embodiments of the invention will now be described, by way of example only, and with reference to the following drawings:
Aspects described herein relate generally securely extracting state information of a computer system and further to a security engine for securely extracting state information of a computer system, a data processing program, and a computer program product.
Some customers may expect controlled encryption of data sent to a vendor. Other customers may like to decide whether the vendor sees the data, and some industries, like the medical industry, may have legal concerns about the exchange of data altogether.
Some approaches exist, such as letting the customer provide an encryption solution or turn off the data collection altogether. These approaches are poor answers to security and confidentiality. The customer has no control over the data collection if the customer only provides the encryption, and in the infrastructure may not be compromised. Cloud environments used by customers are not addressed by this solution. Only private cloud environments may have this sort of data security using the above-described approach.
In modern public cloud environments, there is an increased desire for confidentiality and data security in the coming years, as a comparably large amount of data is moved out to cloud environments as compared to today's private data centers.
There are approaches related to methods for extracting state information of a computer system.
U.S. Pat. No. 7,484,060 B2, which is hereby incorporated herein by reference in its entirety, discloses systems, methods and computer products for protecting information during troubleshooting. A dumping mechanism includes marking at least one of a plurality of memory regions in a computer-readable medium as non-dumpable, initiating a core dump, determining which memory regions of the plurality regions are non-dumpable, and dumping the contents only if memory regions are not marked as non-dumpable.
U.S. Pub. 2013/0282951 A1, which is hereby incorporated herein by reference in its entirety, discloses systems, methods and computer program products for secure rebooting and debugging a peripheral sub-system of a system on a chip device (SoC). According to one aspect of the method, when an application processor of the SoC detects a crash of the peripheral sub-system, the application processor loads a secure boot agent into the device memory. This secure boot agent is configured to access the security memory region of the peripheral sub-system comprising memory dump data associated with the peripheral sub-system. The secure memory region is inaccessible to the application process. The secure boot agent is configured to access a secure memory region of the application processor. The application processor accesses the secure memory region and collects the encrypted memory dump data. The application processor then formats the encrypted memory dump data to the third party for debugging purposes.
However, there may be a desire for an elegant end-user controlled method for providing data security and allowing a vendor insight into a customer computer system for problem detection and troubleshooting in cloud environments.
In the context of this description, the following conventions, terms and/or expressions may be used:
The term “state information” may denote information about internal states of a computer system or information about programs being executed on the computer system. The information may include the program code itself—in particular, operating system program code or application program code—or related data. Thus, state information may include any information for troubleshooting in case of a malfunction of a computer system. It may be noted that the computer system may also be a virtual machine including a CPU, memory, peripheral devices, communication links, and the like. Basically, state information may include anything to describe a status of a computer system at any time.
The term “public encryption key” may denote an element of a pair of related encryption keys. The second element of such a pair is typically denoted as “private decryption key”. These keys may be used in asymmetric cryptographic encryption/decryption methods.
The term “security engine” may denote an additional element of a computer system, independently executing steps of extraction key generation and encrypting data, in particular state information of the computer system. The operation of the security engine may not be compromised or influenced by user code.
The term “extraction key” may denote a decryption key to decrypt encrypted state information of a computer system. An asymmetric cryptographic method or a symmetric cryptographic method may be used for the extraction key.
Aspects described herein, such as proposed method(s) for securely extracting state information of a computer system, may offer several benefits.
Customers having sensitive data and programs on their computer systems may maintain complete control over the kind of data or state information being sent to a vendor of the computer system in case of problems with the computer system. Troubleshooting by the vendor is not performed automatically on state information on the computer system if the computer system automatically informs the vendor of the computer system about problems. This may also include preventive maintenance, i.e., if a vendor connects regularly to a customer computer system for checking the status of the computer system to prevent malfunction.
The customer may maintain complete control of any access to information, in particular state information, on the customer's computer system by the vendor. This may also apply to cloud computing environments and/or multi-tenant computer systems running in, e.g., cloud computing centers. In such a case, vendor access to customer data or state information about virtual machines of different customers may be prevented. This may be best achieved by different encryption keys and different extraction keys for different virtual machines running on a physical computer system. Proposed method(s) and system(s) described herein may allow a fine-grained access to state information under complete control of a customer. Thus, also for sensitive industries, like the healthcare sector, remote maintenance may be offered to customers in such sensitive industries without compromising data security and/or data privacy.
According to one embodiment of a method, the encrypted state information may be stored on a remote storage system. This may be, e.g., a cloud storage system. Thus, the state information may not be stored on storage systems of the computer system in question. The remote storage system may also be located at a vendor's premise. However, because of the missing extraction key, the vendor may not access the state information unless the vendor has access to the extraction key. Hence, although the vendor may have physical access to the state information of a customer computer system, the vendor may not analyze the state information because it is encrypted.
Additionally, the encrypted extraction key may be stored together with the encrypted state information.
According to a further embodiment of a method, multiple sets of encrypted state information originating from multiple computer systems or a multi-tenant computer system may be stored on the storage system, which may be remote. The multi-tenant computer system may execute different virtual machines on which application programs of different customers may be executed. The same may apply for multiple computer systems in a computing center in which different computer systems relating to different customers may be operated. A vendor may not have access to state information of different computer systems or virtual machines because the related sets of state information may be encrypted with different extraction keys. Only customers may have control over the selected extraction key to the state information. A customer may decide, according to the customer's own policy, to grant or deny access to each independent extraction key and for each vendor's request for troubleshooting. Hence, state information of different virtual machines running on the same physical machine in a multi-tenant cloud environment may be accessible independently from each other. Data privacy may be guaranteed.
According to a related embodiment of the method, an extraction key may be generated for each set of encrypted state information. This may guarantee that different state information sets of different customers are not accessible with the same extraction key. Additionally, once a vendor obtains one extraction key, it does not permit the vendor to decrypt all state information sets belonging to that customer, such as those captured at different points in time. However, it may be noted that some extraction keys for different computer systems or virtual machines relating to different state information may be identical if, e.g., the computer systems or virtual machines may relate to the same customer. This may reduce administrative overhead for both, the customer and the vendor.
According to one more embodiments of a method, the computer system is a virtual machine having an identifier. Thus, it may be the case that no differentiation is made between physical and virtual machines, in that the method may be applicable to either.
According to a further embodiment of a method, the collected state information may also refer to an underlying hardware system of the virtual machine, and each set of collected state information may include only state information relating to one identifier. This way, a complete environment for a dedicated virtual machine may be mapped to related state information. At the same time, data privacy among different customers in a cloud computing environment running different virtual machines on one physical computer system may be guaranteed.
According to an additional embodiment of a method, the generating an extraction key, the encrypting the extraction key with the public encryption key, and the encrypting the collected state information with the extraction key may be performed by a security engine separate to the processor of the computer system. Hence, dedicated elements within a CPU (central processing unit) with one or more cores may be responsible for collecting the state information and encrypting these state information and related extraction keys; namely, the security engine. The operation of the security engine may, in some embodiments, not be influenced and/or may not able to be influence by user code; user code may only be executed by the CPU.
Furthermore, embodiments may take the form of a computer program product, accessible from a computer-usable or computer-readable medium providing program code for use, by or in connection with a computer or any instruction execution system. A computer-usable or computer-readable medium may be any apparatus that may contain means for storing, communicating, propagating or transporting the program for use, by or in a connection with the instruction execution system, apparatus, or device.
The medium may be an electronic, magnetic, optical, electromagnetic, infrared or a semi-conductor system for a propagation medium. Examples of a computer-readable medium may include a semi-conductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W), DVD and Blu-Ray-Disk.
It should also be noted that embodiments of the invention are described with reference to different subject-matters. In particular, some embodiments are described with reference to method type claims whereas other embodiments are described with reference to apparatus type claims. However, a person skilled in the art will gather from the aspects disclosed herein that, unless otherwise notified, in addition to any combination of features belonging to one type of subject-matter, also any combination between features relating to different subject-matters, in particular, between features of the method type claims, and features of the apparatus type claims, is considered as to be disclosed within this document.
The aspects defined/described herein and embodiments of the present invention are apparent from examples of embodiments described herein and are explained with reference to examples of embodiments, but to which the invention is not limited.
A detailed description of the figures is provided in the following. Instructions in the figures are schematic. Initially, an embodiment of an inventive method for securely extracting state information of a computer system is given. Additionally, further embodiments of a security engine for securely extracting state information of a computer system is described.
The method 100 includes also generating (104) an extraction key which is not accessible by instruction(s), in particular not accessible by any unsecure component of the computer system, e.g., a user program or the computing core(s) of the computer system. However, the extraction key may be accessible by the security engine. It may indeed be generated by the security engine.
The method 100 includes also encrypting (106) the extraction key with the public encryption key, thereby obtaining an encrypted extraction key. This may be achieved by the security engine.
Furthermore, the method 100 includes collecting (108) state information of the computer system (e.g. 600 of
Additionally, the method 100 uses the extraction key to encrypt (110) the collected state information and store (112) the encrypted collected state information. These aspects may be performed by the security engine. The encrypted extraction key (e.g. 404 of
In response to receiving (116) the extraction key by the server, the method includes decrypting (118) the stored encrypted state information using the extraction key.
Then, the computer system (e.g. 600 of
The vendor may then ask (214) the customer for the extraction key to view and diagnose the collected status information. The customer may decrypt (215) the extraction key, then may send it to the vendor in a secure manner. Next, the vendor may (216) decrypt the collected status information and may diagnose the problem of the customer's computer system (e.g. 600 of
The service engine, once a malfunction or an alert has been created, may receive a request to extract status information of the chip and/or other components of the computer system. The service engine may deliver (324) the collected status information to the encryption engine 316 as part of the security engine 312. The service engine 310 may receive back (326) the encrypted status information from the security engine/the encryption engine 316.
Once status information may be encrypted on the customer site 402 with the extraction key 404, the status information may be sent, 412, to a dump server 414. The dump server 414 may be located on the customer site 402, or it may be a cloud storage system. The dump server 414 may also be located on the premise of the vendor.
If the customer requests to have his status information debugged, i.e., troubleshooting may be required by the vendor, the customer may decrypt the extraction key 404, then send (416) the encrypted extraction key 404 to the vendor's computer or server 422 in a secure manner.
After the vendor may receive the extraction key 404, the vendor may access (418) then decrypt the status information stored on the dump server 414 for analysis and troubleshooting, 420.
By controlling the extraction key, customers have complete control over the data and status information that the vendor may see, decrypt, and analyze.
In an abstract form, the security engine 500 for securely extracting state information of a computer system (e.g. 600 of
Furthermore, the security engine may include a collection unit 508 adapted for collecting state information of the computer system, a second encrypting unit 510 adapted for encrypting the collected state information with the extraction key and storing the encrypted collected state information, and a sending unit 512 adapted for sending the encrypted extraction key upon request.
Aspects described herein may be addressed by a method for securely extracting state information of a computer system, a security engine for securely extracting state information of a computer system, a computing system, a data processing program, and a computer program product.
According to one aspect, a method for securely extracting state information may include providing a public encryption key associated with a private decryption key to a security engine of the computer system, generating an extraction key which is not accessible outside the security engine, and encrypting the extraction key with the public encryption key, thereby obtaining an encrypted extraction key. The method may further include collecting state information of the computer system, and encrypting the collected state information with the extraction key and storing the encrypted collected state information.
A server may request access to the stored encrypted collected state information by requesting the extraction key, and in response to receiving the extraction key by the server, decrypting the stored encrypted state information with the extraction key.
According to another aspect, a security engine for securely extracting state information of a computer system may be provided. The security engine may include a receiving unit adapted for receiving a public encryption key associated with a private decryption key by a security engine of the computer system, a generating unit adapted for generating an extraction key which is not accessible outside the security engine, and a first encrypting unit adapted for encrypting the extraction key with the public encryption key, thereby obtaining an encrypted extraction key.
The security engine may further include a collection unit adapted for collecting state information of the computer system, a second encrypting unit adapted for encrypting the collected state information with the extraction key and storing the encrypted collected state information, and a sending unit adapted for sending the extraction key upon requesting access by a server to the stored encrypted collected state information by requesting the extraction key, such that the stored encrypted state information is decryptable by the server using the extraction key.
It may be noted that the computer system may be owned and operated by a customer, whereas the server may be owned and operated by a vendor or a service provider. Thus, the computer system and the server and its data may be owned by different entities.
It may also be noted that the extraction key may not be accessible outside the security engine, in particular by the processor and/or by user code.
Embodiments of the invention may be implemented together with virtually any type of computer, regardless of the platform being suitable for storing and/or executing program code. For example, in an embodiment of a computing system including a security engine as shown in
The computing system 600 may also include input means such as a keyboard 608, a pointing device such as a mouse 610, or a microphone (not shown). Alternatively, the computing system may be equipped with a touch sensitive screen as main input device. Furthermore, the computer 600, may include output means such as a monitor or screen 612 (e.g., a liquid crystal display (LCD), a plasma display, a light emitting diode display (LED), or cathode ray tube (CRT) monitor). The computer system 600 may be connected to a network (e.g., a local area network (LAN), a wide area network (WAN)), such as the Internet or any other similar type of network, including wireless networks via a network interface connection 614. This may allow a coupling to other computer systems, or a storage network, or a tape drive. Those, skilled in the art will appreciate that many different types of computer systems exist, and the aforementioned input and output means may take other forms. Generally speaking, the computer system 600 may include at least the minimal processing, input and/or output means, necessary to practice embodiments of the invention.
While embodiments of the invention have been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments may be devised, which do not depart from the scope of the invention, as disclosed herein. Accordingly, the scope of embodiments of the invention should be limited only by the attached claims. Also, elements described in association with different embodiments may be combined.
As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or computer program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that may contain, or store, a program for use, by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that may communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present disclosure are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the present disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, may be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that may direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions, which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus, or other devices to produce a computer implemented process such that the instructions, which execute on the computer or other programmable apparatus, provide processes for implementing the functions/acts specified in the flowchart and/or block diagram, block, or blocks.
The block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products, according to various embodiments of the present disclosure. In this regard, each block in the block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions, discussed hereinabove, may occur out of the disclosed order. For example, two functions taught in succession may, in fact, be executed substantially concurrently, or the functions may sometimes be executed in the reverse order depending upon the functionality involved. It will also be noted that each block of the block diagrams, and combinations of blocks in the block diagrams, may be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will further be understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or steps plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements, as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skills in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skills in the art to understand the invention for various embodiments with various modifications, as are suited to the particular use contemplated.
Number | Date | Country | Kind |
---|---|---|---|
1419282.7 | Oct 2014 | GB | national |
Number | Name | Date | Kind |
---|---|---|---|
5295188 | Wilson | Mar 1994 | A |
6134660 | Boneh | Oct 2000 | A |
6170058 | Kausik | Jan 2001 | B1 |
6574733 | Langford | Jun 2003 | B1 |
6700993 | Minematsu | Mar 2004 | B1 |
7133990 | Link et al. | Nov 2006 | B2 |
7484060 | Kelly et al. | Jan 2009 | B2 |
7802111 | Tahan | Sep 2010 | B1 |
7920706 | Asokan | Apr 2011 | B2 |
8171309 | Poo et al. | May 2012 | B1 |
8621196 | Pasam et al. | Dec 2013 | B2 |
8656191 | Kudelski | Feb 2014 | B2 |
20010018736 | Hashimoto | Aug 2001 | A1 |
20020049900 | Patrick | Apr 2002 | A1 |
20020053024 | Hashimoto | May 2002 | A1 |
20030033537 | Fujimoto | Feb 2003 | A1 |
20040030911 | Isozaki | Feb 2004 | A1 |
20040054792 | Pitsos | Mar 2004 | A1 |
20040210757 | Kogan | Oct 2004 | A1 |
20040255199 | Yamashita | Dec 2004 | A1 |
20050071337 | Baranczyk | Mar 2005 | A1 |
20060106721 | Hori | May 2006 | A1 |
20060182282 | Negahdar | Aug 2006 | A1 |
20060242465 | Cruzado | Oct 2006 | A1 |
20060257102 | Park | Nov 2006 | A1 |
20060281480 | Klug | Dec 2006 | A1 |
20070043978 | Cruzado | Feb 2007 | A1 |
20070226786 | Berger | Sep 2007 | A1 |
20070271461 | Hardy | Nov 2007 | A1 |
20080095375 | Tateoka | Apr 2008 | A1 |
20080195740 | Lowell | Aug 2008 | A1 |
20080216177 | Yokosato | Sep 2008 | A1 |
20090112769 | Dicks | Apr 2009 | A1 |
20090122988 | Schuba | May 2009 | A1 |
20090282036 | Fedtke | Nov 2009 | A1 |
20100211932 | Jones | Aug 2010 | A1 |
20110142242 | Tanaka | Jun 2011 | A1 |
20110167258 | Schibuk | Jul 2011 | A1 |
20110185192 | Kito | Jul 2011 | A1 |
20110246767 | Chaturvedi | Oct 2011 | A1 |
20110246986 | Nicholas et al. | Oct 2011 | A1 |
20120297201 | Matsuda | Nov 2012 | A1 |
20120311337 | Wuschek | Dec 2012 | A1 |
20130132719 | Kobayashi | May 2013 | A1 |
20130145177 | Cordella et al. | Jun 2013 | A1 |
20130151848 | Baumann | Jun 2013 | A1 |
20130246813 | Mori | Sep 2013 | A1 |
20130282951 | Kuo et al. | Oct 2013 | A1 |
20140006877 | Zhu et al. | Jan 2014 | A1 |
20140047427 | Evans | Feb 2014 | A1 |
20140059356 | Nesnow | Feb 2014 | A1 |
20140089667 | Arthur, Jr. | Mar 2014 | A1 |
20140108818 | Choi | Apr 2014 | A1 |
20140143548 | Wang | May 2014 | A1 |
20140201533 | Kruglick | Jul 2014 | A1 |
20140208097 | Brandwine | Jul 2014 | A1 |
20140208111 | Brandwine | Jul 2014 | A1 |
20150033031 | Swaminathan | Jan 2015 | A1 |
20150089244 | Roth | Mar 2015 | A1 |
20150169851 | Boivie | Jun 2015 | A1 |
20150172260 | Brenner | Jun 2015 | A1 |
20150281273 | Shields | Oct 2015 | A1 |
20150288685 | Li | Oct 2015 | A1 |
20150295911 | Sumioka | Oct 2015 | A1 |
20150319140 | Qiu | Nov 2015 | A1 |
20150350045 | Fan | Dec 2015 | A1 |
20160087947 | Wong | Mar 2016 | A1 |
Number | Date | Country |
---|---|---|
2446173 | Aug 2008 | GB |
Entry |
---|
Leo Dorrendorf, “Protecting Drive Encryption Systems Against Memory Attacks”, dated May 6, 2011, pp. 1-15, https://eprint.iacr.org/2011/221.pdf. |
“Memory Encryption Method”, ip.com, dated Mar. 1, 2004, https://priorart.ip.com/IPCOM/000022197. |
Number | Date | Country | |
---|---|---|---|
20160125188 A1 | May 2016 | US |