INTEGRATION OF HIGHLY RELIABLE FUNCTIONS INTO APPLICATION THROUGH APPLICATION DISSECTION Russian patent published in 2009 - IPC G06F9/48 

Abstract RU 2367006 C2

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to means of processing data. An application function is divided into two groups according to whether it involves given a sensitive data processing action. Separate program objects (processors) are created for executing actions, related to the two groups. A confidential processor processes protected data and executes in a highly reliable medium. When the other processor encounters protected data, the data are sent to the confidential processor. The data are encased such that, they can be sent to the confidential processor and decoding of data using any other object except the confidential processor is prevented. The infrastructure encases objects, sends the objects to the appropriate processor and verifies integrity in reverse confidential sequence up to the basic component, known as the confidential component.

EFFECT: provision for a universal medium for processing data for most functions.

33 cl, 8 dwg

Similar patents RU2367006C2

Title Year Author Number
AUTHENTICITY DISPLAY FROM HIGHLY RELIABLE MEDIUM TO NON-SECURE MEDIUM 2004
  • Uilmehn Brajan Mark
  • Inglend Pol
  • Rej Kennet D.
  • Kaplan Kejt
  • Kurien Varugis
  • Marr Majkl Dehvid
RU2390836C2
PROVISION FOR PROTECTED INPUT INTO SYSTEM WITH HIGHLY RELIABLE PROGRAM EXECUTION ENVIRONMENT 2004
  • Chu Kristin M.
  • Jamamoto Khirofumi
  • Avrakhehm Idan
  • Paff Dzhon E.
  • Roberts Pol K.
RU2365988C2
MAINTENANCE OF SECURE INPUT AND OUTPUT FOR ENTRUSTED AGENT IN SYSTEM WITH HIGHLY RELIABLE ENVIRONMENT OF PROGRAMS EXECUTION 2004
  • Uillmehn Brajan M.
  • Chu Kristin M.
  • Rej Kennet D.
  • Roberts Pol K.
RU2365045C2
PROMOTION OF INTERACTION FOR SYSTEM SERVICE REQUEST FOR HARDWARE-PROTECTED APPLICATIONS 2012
  • Baumann Endryu A.
  • Khant Galen K.
  • Pejnado Markus
RU2621001C2
ACTIVATION OF SERVICE FUNCTIONS IN WORKING APPLICATIONS 2012
  • Khvang Dzhennifer Khui-Ni
  • Ekstejn Mettyu
  • Uillyams Iii Sem Franklin
RU2628210C2
SYSTEM AND METHOD OF PROTECTING COMPUTER APPLICATIONS 2011
  • Rusakov Vjacheslav Evgen'Evich
  • Shirjaev Aleksandr Vasil'Evich
RU2460133C1
METHODS AND SYSTEMS FOR AUTHENTICATION OF COMPONENTS IN GRAPHIC SYSTEM 2003
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2310227C2
ABSTRACTION LAYERS FOR AUTOMATION APPLICATIONS 2019
  • Ludvig, Khartmut
  • Bettenkhauzen, Kurt Dirk
  • Fridrikh, Khermann
  • Van, Linyun
RU2729209C1
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES 2017
  • Lutas Andrei-Vlad
RU2723668C1
DELAYED APPLICATION LAUNCHING 2006
  • Ehrgan Senk
  • Li Dan
  • Fortin Majkl R.
  • Gize Robin
  • Rajnauehr Robert L.
RU2419840C2

RU 2 367 006 C2

Authors

Rej Kennet D.

Pejnado Markus

Inglend Pol

Kurien Tkhekktkhalakhal Varugis

Dates

2009-09-10Published

2004-10-22Filed