Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for masking a boot sequence by running different code on each processor

A code sequence and mask technology, applied in the field of improved data processing systems, can solve problems such as system security risks

Inactive Publication Date: 2007-12-12
INT BUSINESS MASCH CORP
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the overall security of a computing system often depends on the security of the boot process, when an intruder gains access to the boot sequence, the security of the entire system is at risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for masking a boot sequence by running different code on each processor
  • System and method for masking a boot sequence by running different code on each processor
  • System and method for masking a boot sequence by running different code on each processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Exemplary embodiments provide an apparatus and method for selecting a random processor to start a multiprocessor system. The exemplary embodiment can be used with any multiprocessor system in which a processor can be selected to start the multiprocessor system. Thus, the mechanisms of the exemplary embodiments are applicable to symmetric multiprocessor (SMP) systems, heterogeneous multiprocessor systems, non-coherent unbalanced multiprocessor systems, and the like.

[0038] One multiprocessor system in which the exemplary embodiments may be implemented is the Cell Broadband Engine (CBE), available from International Business Machines Corporation of Armonk, New York. The exemplary embodiment will be described with reference to the CBE architecture, however, it should be understood that the description of the exemplary embodiment is exemplary only, and is not intended to state or imply any details about the mechanisms by which the exemplary embodiment may be implemented. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for masking a boot sequence by running different code on each processor of a multiprocessor system are provided. With the system and method, one of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and / or thermal signatures that mask the electromagnetic and / or thermal signatures of the actual boot processor. The masking code executed by each of the non-boot processors may be different from each other and may be randomly selected from a plurality of masking code sequences stored in a masking code storage device. Each execution of masking code on each of the non-boot processors may generate a different electromagnetic and / or thermal signature such that none of the processors appear to be unique from an external monitoring perspective.

Description

technical field [0001] The present application generally relates to an improved data processing system and method. More specifically, the present application is directed to systems and methods for masking a boot sequence by running different code on each processor of a multiprocessor system. Background technique [0002] As our society becomes increasingly reliant on electronic communication and storage of information, there is growing concern about the security of digital information, such as personal information and digital rights management (DRM). Also, computer hackers and other unauthorized intruders have become more sophisticated in recent years at gaining access to computer systems. As a result, much effort has been put into the development of security systems for computing devices so that such sensitive digital information can be protected from unauthorized access. [0003] One way an intruder may gain access to a computing system is by observing the computing syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F21/00
CPCG06F21/575G06F21/556G06F21/75G06F9/4401G06F9/4405G06F2221/2123
Inventor C·M·奥尼尔S·L·罗伯茨J·J·德门特J·N·戴尔
Owner INT BUSINESS MASCH CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More