首页>
外国专利>
REQUIREMENTS, PROCEDURES AND SYSTEMS FOR APPLICATIONS FOR CRYPTOGRAPHICAL DATA-RELATED USE LIMITS
REQUIREMENTS, PROCEDURES AND SYSTEMS FOR APPLICATIONS FOR CRYPTOGRAPHICAL DATA-RELATED USE LIMITS
展开▼
机译:加密数据相关使用限制应用程序的要求,程序和系统
展开▼
页面导航
摘要
著录项
相似文献
摘要
Systems, procedures and devices related to a circuit device for the implementation of an instruction for the generation and/or use of data limited in terms of how they can be used shall be described. In an execution form, a hardware processor includes a core decoder to decode a single instruction into a decoded individual instruction, the single instruction being the first operator of a handle to encode a cipher text of an encryption key (e.g. B a cryptographic key,includes an authentication date and additional authentication data, and has a second data entry operator encrypted with the encryption key; and an execution unit of the kernel to execute the decoded individual instruction to: perform a first comparison of the authentication date with the cipher text and the additional authentication data with respect to a modification of the cipher text or the additional authentication data, perform a second comparison of a current kernel request with one or more limitations specified by the additional authentication data of the handle,decrypting the cipher text to generate the encryption key only if the first comparison does not show any modification of the cipher text or additional authentication data and the second comparison indicates that one or more restrictions have not been infringed, Encrypt the data encrypted with the encryption key to generate unencrypted data and provide the unencrypted data as a result of the individual instruction.
展开▼