http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2005510095-A

Outgoing Links

Predicate Object
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-04
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-76
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-003
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F1-00
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-10
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-76
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06K19-073
filingDate 2002-11-05^^<http://www.w3.org/2001/XMLSchema#date>
publicationDate 2005-04-14^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber JP-2005510095-A
titleOfInvention Apparatus and method for reducing information leakage
abstract 【Task】 The present invention relates to a data processing comprising a processor and a first encrypted information in a first persistent memory having a higher information leakage level than that of the second persistent memory. Target the system. The second persistent memory decrypts the first encrypted information and thereby generates first unencrypted information that can be used by the processor to perform the operation. A first encryption key is stored. The same encryption key may be used to encrypt the first unencrypted information, thereby generating the first encrypted information. The present invention also provides a method of processing such a data processing system in an operating system, the writing step for writing first unencrypted information to a first persistent memory, and a first encryption key. Encrypting the first unencrypted information using and generating the first encrypted information in the first persistent memory therefrom; to the first persistent memory; A method including an access restriction step for setting the data processing system to a state in which writing is controlled by the operating system is also contemplated. The present invention is also a method for performing an operation on such a data processing system, wherein the first encryption information is decrypted by using the first encryption key, thereby causing the first non-deletion from there. A method also includes a decryption step for generating encrypted information and an execution step for performing an operation by the processor using the first unencrypted information.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-4701260-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2009245336-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2005235225-A
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/KR-101472777-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/JP-2010258630-A
priorityDate 2001-11-14^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID66898
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419485447

Showing number of triples: 1 to 26 of 26.