Patents by Inventor Qingwei Ma
Qingwei Ma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8782801Abstract: Techniques for protecting content to ensure its use in a trusted environment are disclosed. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device.Type: GrantFiled: August 15, 2007Date of Patent: July 15, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Xinwen Zhang, Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma
-
Patent number: 8136153Abstract: In an embodiment of the present invention, the ability for a user or process to set or modify affinities is restricted in order to method for control a multi-processor environment. This may be accomplished by using a reference monitor that controls a process' capability to retrieve and set its or another process' affinity. This aids in the prevention of security breaches.Type: GrantFiled: November 8, 2007Date of Patent: March 13, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Xinwen Zhang, Jean-Pierre Seifert, Onur Aciicmez, Qingwei Ma
-
Patent number: 8055848Abstract: A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves maintaining a different substantially random instruction mapping policy into an I-cache for each of multiple processes, and for each process, performing a substantially random mapping scheme for mapping a process instruction into the I-cache based on the substantially random instruction mapping policy for said process. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.Type: GrantFiled: July 31, 2008Date of Patent: November 8, 2011Assignee: Samsung Electronics Co., Ltd.Inventors: Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma, Xinwen Zhang
-
Patent number: 8019946Abstract: A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves providing security critical instructions to indicate a security critical code section; and implementing an I-cache locking policy to prevent unauthorized eviction and replacement of security critical instructions in the I-cache. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.Type: GrantFiled: July 31, 2008Date of Patent: September 13, 2011Assignee: Samsung Electronics Co., Ltd.Inventors: Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma, Xinwen Zhang
-
Patent number: 7903814Abstract: In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a public key is added to each value in the data structure, in modulo of a second random number multiplied by the public key. Then an exponentiation phase is performed, wherein each modular multiplication and square operation in the exponentiation phase is performed in modulo of the second random number multiplied by the public key, producing a result. Then the result of the exponentiation phase is reduced in modulo of the public key. The introduction of the random numbers aids in the prevention of potential security breaches from the deduction of operands in the table initiation phase by malicious individuals.Type: GrantFiled: July 26, 2007Date of Patent: March 8, 2011Assignee: Samsung Electronics Co., Ltd.Inventors: Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma, Xinwen Zhang
-
Publication number: 20100030964Abstract: A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves providing security critical instructions to indicate a security critical code section; and implementing an I-cache locking policy to prevent unauthorized eviction and replacement of security critical instructions in the I-cache. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.Type: ApplicationFiled: July 31, 2008Publication date: February 4, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma, Xinwen Zhang
-
Publication number: 20100030967Abstract: A method and system is provided for securing micro-architectural instruction caches (I-caches). Securing an I-cache involves maintaining a different substantially random instruction mapping policy into an I-cache for each of multiple processes, and for each process, performing a substantially random mapping scheme for mapping a process instruction into the I-cache based on the substantially random instruction mapping policy for said process. Securing the I-cache may further involve dynamically partitioning the I-cache into multiple logical partitions, and sharing access to the I-cache by an I-cache mapping policy that provides access to each I-cache partition by only one logical processor.Type: ApplicationFiled: July 31, 2008Publication date: February 4, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma, Xinwen Zhang
-
Publication number: 20090126006Abstract: In an embodiment of the present invention, the ability for a user or process to set or modify affinities is restricted in order to method for control a multi-processor environment. This may be accomplished by using a reference monitor that controls a process' capability to retrieve and set its or another process' affinity. This aids in the prevention of security breaches.Type: ApplicationFiled: November 8, 2007Publication date: May 14, 2009Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Xinwen Zhang, Jean-Pierre Seifert, Onur Aciicmez, Qingwei Ma
-
Publication number: 20090049510Abstract: Techniques for protecting content to ensure its use in a trusted environment are disclosed. The stored content is protected against harmful and/or defective host (or hosted) environments. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device.Type: ApplicationFiled: August 15, 2007Publication date: February 19, 2009Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Xinwen Zhang, Onur Aciicmez, Jean-Pierre Seifert, Qingwei Ma
-
Publication number: 20090028323Abstract: In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a public key is added to each value in the data structure, in modulo of a second random number multiplied by the public key. Then an exponentiation phase is performed, wherein each modular multiplication and square operation in the exponentiation phase is performed in modulo of the second random number multiplied by the public key, producing a result. Then the result of the exponentiation phase is reduced in modulo of the public key. The introduction of the random numbers aids in the prevention of potential security breaches from the deduction of operands in the table initiation phase by malicious individuals.Type: ApplicationFiled: July 26, 2007Publication date: January 29, 2009Applicant: SAMSUNG ELECTRONICS CO., LTDInventors: Onur ACIICMEZ, Jean-Pierre SEIFERT, Qingwei MA, Xinwen ZHANG