Entries |
Document | Title | Date |
20080216179 | Computer chassis for improved security and connectivity of secured items - An apparatus for improving the security and connectivity of secured items. Embodiments provide an apparatus for securing items that comprises at least one interface for coupling the secured item to an external system, external device, external component, etc. The item may be coupled to the interface before placing the apparatus in a secured state, where a portion of the interface accessible from the outside of the apparatus provides electrical access to the item when in the secured state. Additionally, embodiments provide movement detection and alert mechanisms to enable the apparatus to detect movement thereof and generate an alert, thereby deterring theft of and/or tampering with the secured item. | 09-04-2008 |
20080229432 | Electronic apparatus and method for preventing unauthorized access to an electronic apparatus - According to an aspect of an embodiment, an electronic apparatus comprises: an electronic apparatus powered by one of a plurality of electric power sources, comprising: a power supply unit for providing the interior of the electronic apparatus with the electric power from one of the electric power sources alternatively; and a controller for requesting user authentication when supply of the electric power to the interior of the electric apparatus is switched from one of the power sources to another. | 09-18-2008 |
20080244758 | SYSTEMS AND METHODS FOR SECURE ASSOCIATION OF HARDWARD DEVICES - An apparatus to protect one or more hardware devices from unauthorized software access is described herein and comprises, in one embodiment, a virtual machine manager, a memory protection module and an integrity measurement manager. In a further embodiment, a method of providing secure access to one or more hardware devices may include, modifying a page table, verifying the integrity of a device driver, and providing memory protection to the device driver if the device driver is verified. | 10-02-2008 |
20080244759 | COMPUTER SYSTEM WITH ELECTRONIC LOCK AND KEYBOARD TO CONTROL THE ELECTRONIC LOCK - An exemplary computer system includes an input device for users to input a command therein and converting the command into a coded command; a computer chassis; a computer power supply; a power switch by which a user is capable of turning on or off the computer power supply; a code receiving module attached in the computer chassis for receiving the coded command from the input device; a decoding module connecting to the code receiving module to decode the command into a command signal; a control module connecting to the decoding module to receive the command signal, and control the power switch being enable or disable to be operated to turn on or off the computer power supply; and an electronic lock controlled by the control module to lock or unlock the chassis based on the command signal. | 10-02-2008 |
20080250509 | Write Protection For Memory Devices - Provided is a method for implementing write protection for a non-volatile rewritable memory device, such as a hard disk drive or flash memory module. A write protect command including a first write protect limit address is received, and the first write protect limit address is stored in a register, if it is within an accessible memory area of a memory device. Any subsequent write access to a write protected area is prevented, the write protected area being defined by the first write protect limit address. Associated devices, modules, and systems are also provided. | 10-09-2008 |
20080282361 | Flat panel display with display signal input socket having safeguarding terminal - An exemplary flat panel display includes a micro processing unit, a display signal input socket defining a safeguarding terminal, an input interface configured for a user to input a user code, a first storage unit storing a security code, and a second storage unit storing a safeguarding mark. The micro processing unit is configured to monitor a voltage applied to the safeguarding terminal, detect a status of the safeguarding mark, compare the user code with the security code according to the status of the safeguarding mark, and output a control signal according to a result of the comparison. | 11-13-2008 |
20080313746 | Integrated circuit protection and detection grid - A mesh of conductors forms a grid in a multi-layered electronic device. The mesh of conductors includes ( | 12-18-2008 |
20080320608 | DATA PROTECTING APPARATUS AND DATA PROTECTING METHOD - In a vehicle audio apparatus, the detection switch is turned off when the lock claw is released from the lock-claw holder to open the front panel. The bi-directional switches are thereby turned off, disconnecting the data lines SD+and SD− between the USB interface unit of the main unit and the USB socket of the front panel. Thereafter, the front panel is opened, releasing the connector | 12-25-2008 |
20090013415 | SEMICONDUCTOR DEVICE AND METHOD FOR DETECTING ABNORMAL OPERATION - A semiconductor device includes a pull-up unit pulling up a voltage of an output node to a first voltage in response to a control signal, a photo sensing unit pulling down a voltage of the output node to a second voltage in response to an incident light, and a CPU, the CPU reset in response to the voltage of the output node produced in response to the incident light. | 01-08-2009 |
20090025094 | Data collector with expanded functionality - Embodiments of the present invention recite a data collector with expanded functionality and a method of enhancing revenue generation using a data collector with expanded functionality. In one embodiment, a central unit of a data collector is configured to receive a replaceable unit such that any one of a variety of replaceable units can be configure to be attached to said central unit. | 01-22-2009 |
20090038019 | TAMPER DETECTION MECHANISM AND CARD PROCESSING DEVICE - A tamper detection mechanism for detecting tampering when a sub system is removed from a host device may include a screw member that may include a head portion, a major diameter shaft portion and a minor diameter shaft portion. The tamper detection mechanism may also include a through hole provided in the sub system, a lever member, and a detection switch. The lever member may withdraw from said through hole as it is pushed by the major diameter shaft portion when the screw member is tightly screwed, and may advance into the through hole when the screw member is loosened. The detection switch may detect whether the screw member is tightly screwed or loosened based on withdrawal or advancement of the lever member. | 02-05-2009 |
20090070887 | Integrated laser Auto-Destruct System for Electronic Components - An apparatus, method and system for securing proprietary semiconductor IC components including a target semiconductor IC; at least one laser diode array disposed adjacent to the target semiconductor IC and coupled thereto; a power supply coupled to the at least one laser diode array; a sensor for sensing a predetermined parameter operatively coupled to the laser diode array through the power supply; wherein the sensor detects the existence of a predetermined event and as a result of the detection of the predetermined event activates the power supply and energizes the laser diode array, causing the laser diode array to project focused laser energy into the target semiconductor IC, damaging the target semiconductor IC. | 03-12-2009 |
20090077675 | Smart Wallet - A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to prevent the smart wallet from being lost or stolen. The system comprises a fob key configured to send periodic wireless transmissions to the smart wallet device having the ability for approximate range detection. Various embodiments include audible, visual and vibrational indications for authentication, battery power and range detection. | 03-19-2009 |
20090083862 | PROVIDING SECURE INPUT TO A SYSTEM WITH A HIGH-ASSURANCE EXECUTION ENVIROMENT - Methods for maintaining the security of a secured execution environment on a system comprising said secured execution environment and a second execution environment are disclosed. A maintained current state for the secured execution environment is selected from among a group of possible states including a standard input mode state and a nexus input mode state. A flow of user input is directed according to the current state through a secure kernel of both the second environment and the secured execution environment. | 03-26-2009 |
20090089886 | Adjustable Feature Access for a Controlled Environmental System - The present invention provides apparatuses and methods for restricting access to a control unit in an environmental system based on a lock level. The control unit (e.g., a thermostat) is configured with a selected lock level, where each lock level is mapped to an associated set of features. A user is able to access any of the features from the associated set of features without entering a security sequence. Also, a feature parameter may be restricted in accordance with the activated lock level. The control unit may be reconfigured with a different lock level by an administrator only when a security sequence is entered. Also, features may be mapped by an administrator to a set of features when the control unit is operating in the locked state. When the control unit is operating in the unlocked state, all supported features can be accessed by a user. | 04-02-2009 |
20090094702 | SECURE APPARATUS, INTEGRATED CIRCUIT, AND METHOD THEREOF - A wireless apparatus, an integrated circuit, and a method thereof. The wireless apparatus, providing hardware security, comprises a secure memory and a secure Integrated Circuit (IC). The secure memory comprises security authentication data. The secure IC, coupled to the secured memory, comprises a processor, a security controller, a security pin, and a read only memory (ROM). The processor is configured to process data. The security controller, coupled to the processor and the secure memory, translates the security authentication data to the processor. The security pin, coupled to the security controller, enables security of the secure IC. The ROM, coupled to the processor, has stored thereon instructions determining a security level according to the security authentication data and the security of the secure IC. The instructions are executed by the processor upon a boot-up operation. | 04-09-2009 |
20090119785 | System and Method for Secure Usage of Peripheral Devices Using Shared Secrets - A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented. | 05-07-2009 |
20090126029 | Permanent Data Hardware Integrity - A method for processing digital data X of an item of software coded on l | 05-14-2009 |
20090126030 | Tamper detection line circuitry for use in authenticating an integrated circuit - Provided is tamper detection line circuitry for an authentication integrated circuit for use in authenticating an integrated circuit. The tamper detection line circuitry includes a source of pseudo-random bits, and an XOR gate with two inputs and an output in signal communication with flash memory erase and reset circuits. A complete erasure of the memory is triggered by a 0 from the XOR gate. The circuitry also includes first and second paths arranging the source and XOR gate in signal communication with each other, as well as a number of triggers connected to the respective paths, each trigger configured to detect a physical attack on the authentication integrated circuit, said triggers configured to pull a respective path to 0 if a physical attack is detected. | 05-14-2009 |
20090144838 | Method and Apparatus for Secure Mode Indication - A method and apparatus for a hand-held device for ensuring a secured mode transition. The method includes receiving a request to transition to a mode, determining the mode of the hand-held device, transitioning to a transition mode relevant to the received request, wherein the relevant transition mode ensures that the transition is securely executed, setting the device in accordance with the received request, and transitioning to the mode requested. | 06-04-2009 |
20090158444 | System and Method for Controlling Access to Addressable Integrated Circuits - A circuitry access system for controlling access to addressable circuit elements of an integrated circuit. The circuitry access system includes a first storage element having a first listing of unique identifiers each identifier representing one of the addressable circuit elements. A selector distinguishes a first subset of unique identifiers from the first listing. A second storage element receives and stores the first subset in an arrangement that does not include an indication of the absence of any unique identifier of the first listing that is not included in the first subset. An output of second storage element allows a user of the integrated circuit to access one or more of the addressable circuit elements corresponding to the first subset of unique identifiers. A method of controlling access to addressable circuit elements is also provided. | 06-18-2009 |
20090158445 | Security Circuit for Power Up - A circuit and method for securing against non-reset of a device associated with the circuit, the circuit comprising: a first register for holding a first multi-bit value and to produce a first multi-bit output value related to the first multi-bit value; a second register for holding a second multi-bit value and to produce a second multi-bit output value related to the second multi-bit value; an inverter means arranged to invert only one of the first and second output values; and a comparator arranged to compare the inverted and non-inverted output values to produce a comparator output, wherein the first and second registers are arranged such that they are subject to substantially the same operational conditions. | 06-18-2009 |
20090165149 | Method for Making Secure the Execution of an Intermediate Language Software Code in a Portable Device - A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data. | 06-25-2009 |
20090193527 | METHOD FOR MONOTONICALLY COUNTING AND A DEVICE HAVING MONOTONIC COUNTING CAPABILITIES - A method for monotonically counting and a device having monotonically counting capabilities. The device includes: a monotonic counter, an input interface adapted to receive requests to update a value of the monotonic counter and an average request rate limiter circuit adapted to selectively reject a request if an amount of monotonic counter value updates within a predefined time window exceeded a threshold; wherein the threshold and the predefined time window are defined in response to at least one legitimate request pattern. | 07-30-2009 |
20090217389 | HARDWARE PASSWORD ALIGNMENT SYSTEM APPARATUS AND METHODS - A system, apparatus, and methods are disclosed for aligning a stored scancode sequence that corresponds to a hardware password, with a password input device type such as a current keyboard type. Aligning the stored scancode sequence with the password input device type enables successful validation of a hardware password despite a change in a password input device type or inadvertent corruption of a non-volatile memory used for storing the scancode sequence such as non-volatile memory that stores BIOS information for a computing device. | 08-27-2009 |
20090249495 | QUICK-RELEASE COMPUTER ACCESS COVER - A latch and latch handle recessed into the computer cover is provided, with the latch handle preferably presently a cam surface internally that interacts with a compatible cam surface associated with a lock bar. Preferably, a key lock is functionally integrated with the latch in such a way that when the key lock is unlocked the latch handle and latch are free to displace and to then urge the retention bar to disengage detents or hooks from slots or receptacles, by way of releasing the cover from a chassis or body of the desktop or workstation. Accordingly, in essentially one efficient movement via engaging the latch handle, a user will be able to quickly remove the cover. | 10-01-2009 |
20090249496 | INFORMATION TERMINAL APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM STORING PROGRAM THEREOF - There is provided an information terminal apparatus including a detecting unit that detects whether authentication information has been input within a given period of time or not, a determining unit that determines whether the authentication information agrees with given authentication information or not, a processing unit that performs processing in a first mode if the authentication information is not detected by the detecting unit within the given period of time or if the authentication information is detected by the detecting unit within the given period of time but the determining unit determines that it does not agree with the given authentication information, and a log processing unit that memorizes/stores operation history information operated while the processing in the first mode is being performed. | 10-01-2009 |
20090271878 | ELECTRONIC DEVICE AND METHOD FOR RECORDING DISASSEMBLE HISTORY INFORMATION AND JUDGING THE ELECTRONIC DEVICE THEREOF - An exemplary electronic device includes a detecting component and a storage unit. The detecting component generates detecting signals when the electronic device has been disassembled. The storage unit stores disassemble history information based on detecting signals received from the detecting component. | 10-29-2009 |
20090293136 | SECURITY SYSTEM TO PREVENT TAMPERING WITH A SERVER BLADE - Method, computer program product and apparatus for physically securing a server in response to detecting an unauthorized intrusion event. The method comprises detecting an unauthorized physical intrusion event to a data center, rack or chassis including a plurality of servers, communicating the detected unauthorized intrusion event to a management module that manages the plurality of servers, and automatically physically securing one or more of the plurality of servers against manual removal. Optionally, the step of physically securing may include disabling one or more front panel controls on the plurality of servers, such as a physical power switch. In a further option, the step of physically securing may include disabling one or more external ports on the plurality of servers, such as a keyboard-video-mouse port. A preferred method allows the one or more physically secured servers to continue to operate. | 11-26-2009 |
20100017893 | System for Securing Register Space and Method of Securing the Same - A system includes a processing device, at least one data processing module, and a security control module. The security control module is operatively connected to both the processing device and the data processing module. The security control module is operative to control access to a protected register that is associated with the at least one data processing module. As such, the security control module operates as a firewall or filter to allow or deny access to a protected register. Security-unaware data processing module are therefore secured in the system at a central location while eliminating the need to use only security-aware data processing module. A method for securing data processing modules, including security-unaware data processing module, is also disclosed. | 01-21-2010 |
20100024046 | METHODS AND SYSTEMS FOR DETECTING A LATERAL INTRUSION OF A SECURE ELECTRONIC COMPONENT ENCLOSURE - Methods and systems for detecting lateral intrusion of a secure electronic component enclosure are disclosed. According to one system, the system includes a secure enclosure for enclosing at least one electronic component. The secure enclosure includes a first and a second printed circuit board (PCB) and a security ring sandwiched between the first and second PCBs defining an interior region for enclosing the at least one electronic component. The PCBs define opposite sides of the enclosure and the security ring defines lateral surfaces of the enclosure. The lateral surfaces defined by the security ring are wrapped by at least two wires that define at least two circuits. An intrusion detection module detects an intrusion of the secure enclosure based on a condition of the at least two circuits. | 01-28-2010 |
20100031375 | Signal Quality Monitoring to Defeat Microchip Exploitation - Method and apparatus and associated method of detecting microchip tampering may include a conductive element in electrical communication with multiple sensors for verifying that signal degradation occurs at an expected region of the conductive element. A detected variance from the expected region may automatically trigger an action for impeding an integrated circuit exploitation process. | 02-04-2010 |
20100031376 | Continuity Check Monitoring for Microchip Exploitation Detection - Apparatus, method and program product detect an attempt to tamper with a microchip by determining that an electrical path comprising one or more connections and a metal plate attached to the backside of a microchip has become disconnected or otherwise altered. A tampering attempt may also be detected in response to the presence of an electrical path that should not be present, as may result from the microchip being incorrectly reconstituted. Actual and/or deceptive paths may be automatically selected and monitored to further confound a reverse engineering attempt. | 02-04-2010 |
20100037325 | Enhanced Packaging for PC Security - A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers. | 02-11-2010 |
20100037326 | RADIATION CURABLE EMBOSSED INK SECURITY DEVICES FOR SECURITY DOCUMENTS - A security document and a method of manufacturing a security document are provided in which a radiation curable ink is applied to at least one side of a substrate including at least one region of transparent plastics material forming a window or half-window area. The ink is embossed while soft and cured with radiation to form an embossed security device within the window or half-window area including one or more of a diffractive structure, a lens structure or other security element having a relief structure. | 02-11-2010 |
20100037327 | SYSTEM FOR MANAGING HARDWARE RESOURCES, COMPUTER SYSTEM, METHOD FOR MANAGING HARDWARE RESOURCES, AND PROGRAM - A system for managing hardware resources includes a computer system and a management server, wherein the computer system includes a static authentication key generation unit that generates authentication keys for the detected hardware resources, a dynamic authentication key generation unit that requests arrangements of a hardware resource and an activation key to the management server by transmitting a dynamic installation authentication key generated from a system authentication key, a first additional hardware resource authentication unit that judges whether or not a new hardware resource is unauthorized by comparing the authentication key with the activation key, and a second additional hardware resource authentication unit that judges whether or not the new hardware resource fit the computer system by comparing the dynamic installation authentication key with the activation key, and wherein the management server includes an activation key generation unit that transmits the activation key to the computer system. | 02-11-2010 |
20100050275 | DEVICE THAT CAN BE RENDERED USELESS AND METHOD THEREOF - In one form a device having an integrated circuit is rendered useless by providing a piezo element coupled to a voltage terminal of the integrated circuit of the device. A render useless signal is generated by any of several ways. The piezo element, in response to the render useless signal, renders in any one of several ways the device to be rendered useless. The piezo element, when disturbed, generates a voltage which is provided to the voltage terminal of the integrated circuit, the voltage being sufficiently high to render useless at least a portion of the integrated circuit. In other forms the render useless signal renders MRAM circuitry within the device useless by moving a magnetic field across the MRAM circuitry to vary resistance of memory reference cells. In one form the magnetic field is moved by spring-loading or pivoting a magnet that is released by the piezo element. | 02-25-2010 |
20100064379 | Remote Diagnosis of Unauthorized Hardware Change - Aspects describe remotely diagnosing unauthorized hardware changes on a mobile device. The changes can be identified based on hardware component identification and/or based on behavior characteristics of the device. If an unauthorized change is detected, information relating to that change can be reported to a service provider. Further, actions associated with the authorized change can be automatically implemented or implemented after confirmation to proceed with the recommended action. | 03-11-2010 |
20100083386 | Tokenized Resource Access - A method and system for unlocking diagnostic functions in a hardware device for a user. The method obtains a signed permission object for the hardware device, and validates the signed permission object. A memory of the hardware device stores a device identifier and a last recorded sequence number. The signed permission object includes a sequence number and is associated with an expiration counter having an initial value that indicates a lifetime for the signed permission object. When the signed permission object is valid, the method updates the expiration counter to decrease the lifetime of the signed permission object, stores the sequence number associated with the signed permission object as the last recorded sequence number in the hardware device, and unlocks the diagnostic functions for the user based on the signed permission object. | 04-01-2010 |
20100100972 | APPROACHES FOR A LOCATION AWARE CLIENT - Techniques for performing an action, based on the present location of a client, to protect resources of the client from theft or unauthorized access. A server may intermittently receive, from a client, location information such as GPS information, triangulation information based on one or more Wi-Fi access points, and IP trace information. The server may determine the client's location by (a) determining, for an interval of time, whether GPS information, triangulation information, and IP trace information are available for the client, and (b) based on the available GPS information, triangulation information, and IP trace information, determining the present location of the client, e.g., by determining a weighted arithmetic mean or by using a sequence of types of location information ordered based on accuracy. In response to following a security policy, the server may perform an action, specified by the security policy, based on the present location of the client. | 04-22-2010 |
20100146641 | METHOD AND DEVICE FOR PROTECTION OF AN MRAM DEVICE AGAINST TAMPERING - Data, stored in MRAM-cells should be protected against misuse or read-out by unauthorised persons. The present invention provides an array of MRAM-cells provided with a security device for destroying data stored in the MRAM-cells when they are tampered with. This is achieved by placing a permanent magnet adjacent the MRAM-array in combination with a soft-magnetic flux-closing layer. As long as the soft-magnetic layer is present, the magnetic field lines from the permanent magnet are deviated and flow through this soft-magnetic layer. When somebody is tampering with the MRAM-array, e.g. by means of reverse engineering, and the flux-closing layer is removed, the flux is no longer deviated and affects the nearby MRAM-array, thus destroying the data stored in the MRAM-cells. | 06-10-2010 |
20100180350 | ELECTRONIC SECURITY DEVICE FOR MONITORING COMPUTER EQUIPMENT, ASSOCIATED ASSEMBLIES AND METHODS - An electronic security device for monitoring equipment is disclosed, with each of the items of equipment being linked to a computer network by a plug and a cable at the level of a network interface, the device being arranged between an apparatus of the cabled network and the network interface of the item of computer equipment, the device comprising at the level of each linking cable between the management apparatus of the cabled network and the item of equipment to be monitored: a detection circuit able to detect on said cable, without perturbation, the presence of electrical energy originating from the item of equipment and revealing normal network activity and an isolating circuit able to be activated in the absence of such detection by the detection circuit, so as to isolate the cable in question of said cabled network, and an evaluating circuit able to be activated after the isolation performed by the isolating circuit, so as to apply to the cable a signal having a predetermined waveform, so as to detect the wave reflected and to determine on the basis of the reflected wave an abnormal condition in the circuit constituted by the cable and by the network interface of the item of equipment. | 07-15-2010 |
20100229248 | AUTOMATIC CONTROL OF A SECURITY PROTECTION MODE OF AN ELECTRONIC DEVICE - An automated method and apparatus is provided for deterring unauthorized use or theft of electronic devices, or other sorts of items into which a tracking device has been installed, particularly those in a distribution channel. The automated method is performed by a computer system of a monitoring center, and comprises the steps of: receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the monitoring center, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call, determining, at least, whether a sale of the electronic device has been reported; and by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device. | 09-09-2010 |
20100251391 | THEFT MANAGEMENT SYSTEM AND METHOD - Methods and apparatus for theft management are described. In an embodiment an out-of-band notification is received, indicative of theft of a computing device. In response, a theft message is delivered to the computing device using a wireless wide area network. Other embodiments are also disclosed and claimed. | 09-30-2010 |
20100287624 | METHOD AND DEVICE FOR DETECTING THE OPENING OF A COVER ENCLOSING THE DEVICE - An object of the present invention is to provide a mechanism for tamper detection of electronic devices ( | 11-11-2010 |
20100325741 | System and Method of Owner Control of Electronic Devices - A system and method of owner control of an electronic device are provided. Owner identification information, such as data integrity and source authentication information, is stored on the electronic device. Received owner control information is stored on the electronic device where the integrity of the received owner control information is verified and/or the source is authenticated using the owner identification information. In one embodiment, owner identification information comprises an owner signature private key. | 12-23-2010 |
20100333215 | ELECTRONIC DEVICE WITH STYLUS - An electronic device comprising: a main body and a stylus, wherein the main body comprises: a trigger, which is assigned identification information; a socket configured for receiving the stylus, wherein the socket defines a grooves on an inner surface thereof, and the grooves is configured for placement a trigger; and a processing unit configured for recognizing the identification information of the trigger to determine whether to lock or unlock the electronic device; the stylus comprises: a shank and a ring, wherein the ring is extended from the circumferential surface of the shank, a hook is formed in an end of the stylus, and a protrusion is protruded from the circumferential surface of the ring in alignment with the hook and is received in the groove to press the trigger when the stylus is inserted into the socket and the hook is aligned with the trigger. | 12-30-2010 |
20110035813 | ENCRYPTED DATA STORAGE DEVICE - A data storage device has encrypted user data and a media key stored on media, and a root key stored in an electronic circuit. The data storage device has a first connector adapted to receive a user key and a hardware key device connected to a second connector adjacent an installation space. The hardware key device stores a destructible key in non-volatile memory. The hardware key device is mechanically destroyed, thereby rendering the encrypted user data non-decipherable after the destroying. | 02-10-2011 |
20110047630 | METHOD AND SYSTEM FOR TAMPER PROOFING A SYSTEM OF INTERCONNECTED ELECTRONIC DEVICES - A method and system for tamper proofing a system of interconnected electronic devices. The method comprises splitting embedded software of each electronic device into at least two executable parts, a stationary part residing in memory of said each electronic device and a non-stationary part residing in memory of another electronic device. | 02-24-2011 |
20110061113 | ACCESSORY AUTHENTICATION FOR ELECTRONIC DEVICES - Improved techniques to control utilization of accessory devices with electronic devices are disclosed. The improved techniques can use cryptographic approaches to authenticate electronic devices, namely, electronic devices that interconnect and communicate with one another. One aspect pertains to techniques for authenticating an electronic device, such as an accessory device. Another aspect pertains to provisioning software features (e.g., functions) by or for an electronic device (e.g., a host device). Different electronic devices can, for example, be provisioned differently depending on different degrees or levels of authentication, or depending on manufacturer or product basis. Still another aspect pertains to using an accessory (or adapter) to convert a peripheral device (e.g., USB device) into a host device (e.g., USB host). The improved techniques are particularly well suited for electronic devices, such as media devices, that can receive accessory devices. One example of a media device is a media player, such as a hand-held media player (e.g., music player), that can present (e.g., play) media items (or media assets). | 03-10-2011 |
20110067119 | IP BASED SECURITY APPLICATIONS USING LOCATION, PORT AND/OR DEVICE IDENTIFIER INFORMATION - Methods and apparatus for determining, in a reliable manner, a port, physical location and/or device identifier, such as a MAC address, associated with a device using an IP address and for using such information, e.g., to support one or more security applications is described. Supported security applications include restricting access to services based on the location of a device seeking access to a service, determining the location of stolen devices, and verifying the location of the source of a message or other IP signal, e.g., to determine if a prisoner is contacting a monitoring service from a predetermined location. | 03-17-2011 |
20110154509 | METHOD AND DEVICE FOR PROVIDING A SECURITY BREACH INDICATIVE AUDIO ALERT - A device for providing a security breach indicative audio alert. The device includes: a security monitor adapted to detect a security breach in device and a loudspeaker, the device wherein including a secure audio alert generating hardware, adapted to participate, in response to the detection of the security breach, in a generation of a security breach indicative audio alert. The secure audio alert generating hardware is connected to an audio mixer that is adapted to mix the security breach indicative audio alert signal with audio signals generated by a software controlled audio source to provide a mixed signal. The audio mixer is further adapted to provide the mixed signal to the loudspeaker that reproduces the mixed signal as sound. | 06-23-2011 |
20110265191 | SYSTEM AND METHOD FOR PLACING AN ELECTRONIC APPARATUS INTO A PROTECTED STATE IN RESPONSE TO ENVIRONMENTAL DATA - A system and method is disclosed for placing an electronic apparatus into a protected state in response to environmental data. The method discloses: receiving a set of environmental data applicable to an electronic apparatus; generating an environmental status applicable to the electronic apparatus based-on the environmental data; and placing the electronic apparatus into a protected state based-on the environmental status. The system discloses an environment characterization module which receives a set of environmental data applicable to an electronic apparatus, and generates an environmental status applicable to the electronic apparatus based-on the environmental data; and an apparatus protection module which places the electronic apparatus into a protected state based-on the environmental status. | 10-27-2011 |
20110289603 | ANTI-KEYLOG EDITOR - Various embodiments for protecting keyboard data inputted by a user in a computer having a keyboard hardware are disclosed. According to one exemplary embodiment, a method for protecting keyboard data, where the keyboard hardware comprises an I/O port having an input buffer and an output buffer, includes: receiving scan code data based on keyboard data inputted by the user, wherein the scan code data are latched in the output buffer of the I/O port; executing an interrupt routine to fetch the scan code data from the output buffer to a CPU of the computer, wherein the latched scan code data remains in the output buffer after the latched scan code data are read from the output buffer; transmitting a control command to the keyboard hardware through the input buffer of the I/O port; and receiving from the keyboard hardware a response signal generated in response to the control command, wherein the keyboard hardware is configured to transmit the response signal to the output buffer of the I/O port. | 11-24-2011 |
20110302664 | DEVICE AND METHOD FOR PROTECTING AN ELECTRONIC SYSTEM AGAINST UNAUTHORIZED ACCESS - The invention relates to an electronic system comprising a printed circuit ( | 12-08-2011 |
20120030775 | DETECTING COUNTERFEIT ELECTRONIC COMPONENTS USING EMI TELEMETRIC FINGERPRINTS - One embodiment of the present invention provides a system that non-intrusively detects counterfeit components in a target computer system. During operation, the system collects target electromagnetic interference (EMI) signals generated by the target computer system using one or more antennas positioned in close proximity to the target computer system. The system then generates a target EMI fingerprint for the target computer system from the target EMI signals. Next, the system compares the target EMI fingerprint against a reference EMI fingerprint to determine whether the target computer system contains a counterfeit component. | 02-02-2012 |
20120036586 | Reclaim my lost computer - If this invention is granted and allowed to be brought to market there will finally be a method by which a lost or stolen computer will have a very high degree of probability that it will be returned to its rightful owner in good working order. In the near future I think it will destroy the market for all stolen computers. | 02-09-2012 |
20120066774 | NON-VOLATILE MEMORY FOR ANTI-CLONING AND AUTHENTICATION METHOD FOR THE SAME - A method and a non-volatile memory apparatus for cloning prevention is provided. The non-volatile memory apparatus includes an Enhanced Media Identification (EMID) area, which is located in a specific area of the non-volatile memory, and stores an EMID for identifying the non-volatile memory; and an EMID encoder for modifying the EMID by a preset operation in conjunction with an arbitrary value. | 03-15-2012 |
20120102580 | Out Of Band Vital Product Data Collection - A vital product data (VPD) system is connected to a network, allowing the VPD system to be accessed for inquiries about VPD. The VPD system includes a baseboard management controller (BMC), a VPD cache, a platform initialization system and a tamper detection switch. The BMC communicates with the tamper detection switch and sets a VPD flag to false when tampering is detected. Queries to the BMC through the network for VPD are then held pending and the VPD cache refreshed with a no-boot power on, using the platform initialization system to collect the new VPD capturing the nature of any modifications after tampering. | 04-26-2012 |
20120117666 | MULTILAYER SECURING STRUCTURE AND METHOD THEREOF FOR THE PROTECTION OF CRYPTOGRAPHIC KEYS AND CODE - An arrangement for the protection of cryptographic keys and codes from being compromised by external tampering, wherein the arrangement is utilized within a multilayered securing structure. More particularly, there is provided a multilayered securing structure for the protection of cryptographic keys and codes, which may be subject to potential tampering when employed in computers and/or telecommunication systems. A method is provided for producing such multilayered securing structures within a modular substrate with the intent to protect cryptographic keys and codes which are employed in computers and/or telecommunication systems from the dangers of potential tampering or unauthorized access. | 05-10-2012 |
20120124680 | METHOD FOR DETECTING ABNORMALITIES IN A CRYPTOGRAPHIC CIRCUIT PROTECTED BY DIFFERENTIAL LOGIC, AND CIRCUIT FOR IMPLEMENTING SAID METHOD - In a method for detecting anomalies in a circuit protected by differential logic and which processes logic variables represented by a pair of components, a first network of cells carrying out logic functions on the first component of said pairs, a second network of dual cells operating in complementary logic on the second component, the logic functions being carried out by each pair of cells in a pre-charge phase placing the variables in a known state on input to the cells and followed by an evaluation phase where a calculation is performed by the cells, the method includes detecting an anomaly by at least one non-consistent state. | 05-17-2012 |
20120151607 | SYSTEM FOR DETECTING INTRUSIONS BY DEVICES WITH OPENABLE CASING - The invention comprises an intrusion-detection system based on a switch | 06-14-2012 |
20120159650 | APPARATUS AND METHOD FOR RECOGNIZING SECURITY SITUATION AND GENERATING SITUATION INFORMATION BASED ON SPATIAL LINKAGE OF PHYSICAL AND IT SECURITY - An apparatus for recognizing security situation and generating situation information based on spatial linkage of physical and IT security, the apparatus includes: a security event collection unit for mapping, when a security event is detected from a security device, unique information of the security device to a location or an object in a real space, and collecting correlated security events based on the mapped information; a security situation awareness unit for determining a type of a security situation and a degree of threat based on the correlated security events; and a situation information generation unit for analyzing a correlation between the correlated security events and the security event to generate security situation information. | 06-21-2012 |
20120159651 | SECURE KVM SWITCH - A secure switch assembly for controlling first and second computers using a common keyboard and a common mouse is provided. The switch assembly comprises a secure controller together with first and second switching elements. The secure controller comprises receiving means, configured to receive a selection signal from a user, determining means configured to determine whether the selection signal represents a single, coherent selection and transmitting means configured to emit first and second enabling signals. The first switching element is associated with a first computer and is configured to receive a signal indicative of a mouse instruction from a mouse, a signal indicative of a keyboard instruction from a keyboard and a first enabling signal from the secure controller. The second switching element is also associated with the first computer and is configured to receive a signal indicative of a mouse instruction from the first switching element, a signal indicative of a keyboard instruction from the first switching element and a second enabling signal from the secure controller. The first and second switching elements are configured to enable transmission of the mouse and keyboard instructions therethrough if both the first and second enabling signals are respectively received. The first and second computers are effectively isolated by the first and second switching elements and thereby effect assurance to a high grade. | 06-21-2012 |
20120159652 | APPARATUS AND METHOD TO HARDEN COMPUTER SYSTEM - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 06-21-2012 |
20120180140 | SECURE PIN ENTRY DEVICE - A secure PIN entry device including a PIN entry assembly operative to receive a PIN from a user, a PIN entry prompter operative when actuated to prompt a user to enter a PIN via the PIN entry assembly, a PIN entry prompt security check enabled controller operative to prevent operation of the PIN entry prompter unless a predetermined security check has been successfully completed and security check functionality operative to check at least part of the PIN entry device for the presence of an unauthorized PIN eavesdropping element thereat and to provide an output to the PIN entry prompt security check enabled controller indicating whether the predetermined security check has been successfully completed. | 07-12-2012 |
20120192293 | Method and Apparatus for Configuring an Electronics Device - A method and apparatus for configuring an electronics device. The method includes receiving, by the electronics device, a request for a command to perform a predetermined operation by the electronics device and sending the command in response to receiving the request. The electronics device then receives a signature based upon the command, whereupon the electronics device verifies the signature by the electronics device and, following an affirmative verification, executes the command for performing the predetermined operation. In this way, the electronics device may be reconfigured remotely without knowledge of the particular command for performing the predetermined operation by the electronics device. | 07-26-2012 |
20120198572 | Determining Fraudulent Use of Electronic Devices Utilizing Matrix Codes - In one or more implementations, a computing device may receive information from a matrix code reader that scans multiple matrix codes, each displayed by one of multiple devices. The computing device may determine whether or not the devices are being fraudulently utilized, such as whether the devices are in the same location. Additionally, in some implementations, a computing device may receive a service request from a matrix code reader that includes an associated telephone number. The computing device may extract the number and may handle the service request based on the number. Moreover, in various implementations, a computing device may receive information from a matrix code reader that scans a displayed matrix code. The information may include an electronic signature that is included in the matrix code by the device. After receiving the information, the computing device may analyze the information to determine that the electronic signature is valid. | 08-02-2012 |
20120216301 | IMPLEMENTING HACKING DETECTION AND BLOCK FUNCTION AT INDETERMINATE TIMES WITH PRIORITIES AND LIMITS - A method and circuits for implementing a hacking detection and block function at indeterminate times, and a design structure on which the subject circuit resides are provided. A circuit includes an antenna wrapped around a dynamic bus inside circuitry to be protected. The antenna together with the dynamic bus node is designed so an average bus access activates a field effect transistor (FET) that is connected to a capacitor. The FET drains the capacitor in a specified number of activations by the antenna. The capacitor has a leakage path to a voltage supply rail VDD that charges the capacitor back high after a time, such as ten to one hundred cycles, of the dynamic bus being quiet. The capacitor provides a hacking detect signal for temporarily blocking operation of the circuitry to be protected responsive to determining that the dynamic bus is more active than functionally expected. | 08-23-2012 |
20120227117 | SECURE PROCESSING MODULE AND METHOD FOR MAKING THE SAME - Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution. In some embodiments the critical design feature can be implemented within a configurable element, such as a field programmable gate array (FPGA). | 09-06-2012 |
20120272340 | SECURING WAKEUP NETWORK EVENTS - In an embodiment, a method is provided. The method of this embodiment provides receiving a packet having a wake-up pattern, and waking up if the wake-up pattern corresponds to one of a number of dynamically modifiable passwords on a pattern wake list, each of the dynamically modifiable passwords being based, at least in part, on a seed value | 10-25-2012 |
20120278905 | CONFIGURABLE INTEGRATED TAMPER DECTECTION CIRCUITRY - Tamper detection circuitry includes a first surface layer surrounding a protected memory, the first surface layer comprising a first plurality of conductive sections; a second surface layer surrounding the protected memory, the second surface layer comprising a second plurality of conductive sections; a programmable interconnect located inside the first surface layer, the programmable interconnect being connected to each conductive section by a plurality of conductive traces, the programmable interconnect being configured to group the conductive section of the first and second plurality of conductive sections into a plurality of circuits, each of the plurality of circuits having a different respective voltage; and a tamper detection module, the tamper detection module configured to detect tampering in the event that a conductive section that is part of a first circuit comes into physical contact with a conductive section that is part of a second circuit. | 11-01-2012 |
20120278906 | SYSTEMS AND METHODS FOR DETECTING AND MITIGATING PROGRAMMABLE LOGIC DEVICE TAMPERING - Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation. | 11-01-2012 |
20120284808 | PROTECTION OF A NON-VOLATILE MEMORY BY CHANGE OF INSTRUCTIONS - A method for protecting a volatile memory against a virus, wherein: rights of writing, reading, or execution are assigned to certain areas of the memory; and a first list of opcodes authorized or forbidden as a content of the areas is associated with each of these areas. | 11-08-2012 |
20120317662 | DELAYING OR DETERRING COUNTERFEITING AND/OR CLONING OF A COMPONENT - In an embodiment, to deter or delay counterfeiting/cloning of a replacement component of a host device, the replacement component is provided with a code value. The code value is generated from a value of at least one physical parameter of the replacement component and is stored on the replacement component. The host device determines whether the replacement component is authentic if the stored code value matches a reference code value. | 12-13-2012 |
20130019324 | Embedded Ring Oscillator Network for Integrated Circuit Security and Threat Detection - Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method considers Trojans' impact on neighboring cells and on the entire IC's power consumption, and effectively localizes the measurement of dynamic power. An on-chip structure can permit threat detections. In one aspect, the on-chip structure can comprise a plurality of sensors distributed across the entirety of the IC, with each sensor of the plurality of sensors being placed in different rows of a standard-cell design. In another aspect, data analysis can permit separating effect of process variations on transient power usage of the IC from effects of a hardware threat such power usage. The on-chip structure also can be employed for implementation of a PE-PUF. | 01-17-2013 |
20130024952 | Detecting a Security Breach of an Electronic Device - A system and method for detecting a security breach of an electronic device are provided. The system includes a sensor assembly having at least one IR LED which outputs IR light, and an IR sensor which detects the IR light output by the IR LED and outputs corresponding IR detection signals. The system further includes a processor which generates an IR profile of an interior of the enclosure with reference to the IR detection signals output by the IR sensor. The processor determines that there has been a security breach of the enclosure at least in response to detecting IR activity in the enclosure from the IR detection signals that does not correspond to the IR profile. Output signals from a various other sensors may be used to confirm whether the security breach has occurred. | 01-24-2013 |
20130047272 | INTEGRATED CIRCUIT FOR PREVENTING CHIP SWAPPING AND/OR DEVICE CLONING IN A HOST DEVICE - An integrated circuit is disclosed that can be included in a host electronic device that can be commonly manufactured, where the integrated circuit can be designated (“locked”) for a specific manufacturer, thereby substantially reducing the likelihood that a third party will be able to successfully clone a host electronic device manufactured by the specific manufacturer and/or swap the chip containing the integrated circuit for one having more enabled features. The integrated circuit includes an ID module that can be programmed after fabrication. Components within the integrated circuit designate manufacturer-specific configurations (e.g., address mapping, pin routing and/or vital function releasing) based on the programmed manufacturer ID. As a result, once the integrated circuit has been programmed with the manufacturer ID, the integrated circuit will function correctly only within a host device manufactured by the manufacturer associated with the programmed manufacturer ID. | 02-21-2013 |
20130055416 | Systems and Methods for Detecting and Thwarting Unauthorized Access and Hostile Attacks on Secured Systems - Various embodiments of the present invention relates to systems, devices and methods of detecting tampering and preventing unauthorized access by incorporating programmability and randomness into a process of coupling, driving and sensing conductive wires that are arranged above sensitive areas in a secured system. Such a tampering detection system comprises a security mesh network, a random number generator, a security controller and a security monitor. The security mesh network includes a plurality of security elements made from the conductive wires. The security controller selects a subset of security elements, forms a security array, and generates a driving stimulus. The security monitor selects a SENSE node, monitors an output at the SENSE node, and generates a flag signal indicating the presence of a tampering attempt. Programmability and randomness are introduced to at least one of the system parameters including array configuration, driving stimulus, SENSE node, and detection mode via random numbers. | 02-28-2013 |
20130081147 | ANTI-KEYLOG EDITOR - Various embodiments for protecting keyboard data inputted by a user in a computer having a keyboard hardware are disclosed. According to one exemplary embodiment, a method for protecting keyboard data, where the keyboard hardware comprises an I/O port having an input buffer and an output buffer, includes: receiving scan code data based on keyboard data inputted by the user, wherein the scan code data are latched in the output buffer of the I/O port; executing an interrupt routine to fetch the scan code data from the output buffer to a CPU of the computer, wherein the latched scan code data remains in the output buffer after the latched scan code data are read from the output buffer; transmitting a control command to the keyboard hardware through the input buffer of the I/O port; and receiving from the keyboard hardware a response signal generated in response to the control command, wherein the keyboard hardware is configured to transmit the response signal to the output buffer of the I/O port. | 03-28-2013 |
20130091589 | MULTI-DOMAIN SECURE COMPUTER SYSTEM - Disclosed is a hardware based secure multi-level security computing system system. The system comprises a chassis enclosing multiple separate, secure computer devices or domains, each within an electromagnetic shielding Faraday cage. The chassis structure includes internal electromagnetic shields and other features to prevent cross domain electromagnetic interference or compromising emanations. The chassis may be the size of a standard computer tower. The computer devices or domains may be configured for handling information of different classification levels. Optionally, each of the computer devices may operate on significantly less power than a standard computer. Preferably, each computer operates on no more than 50 Watts of power, more preferably on less than 35 Watts of power. | 04-11-2013 |
20130104252 | TAMPER DETECTION COUNTERMEASURES TO DETER PHYSICAL ATTACK ON A SECURITY ASIC - Various embodiments of the present invention relates generally to an integrated circuit, and more particularly, to systems, devices and methods of incorporating a tamper detection countermeasure into a security ASIC to deter physical attacks. The tamper detection countermeasure architects an active mesh to cover a sensitive area in the security ASIC. A plurality of time-varying random numbers is generated by a random number generator (RNG), and the active mesh is driven and configured according to these random numbers. During tamper detection cycles, the active mesh is monitored with respect to the plurality of random numbers that is directly provided by the RNG. Upon a tampering attempt, a flag signal is generated and used to initialize subsequent anti-tampering actions. The active mesh may be controlled and monitored based on time-varying codes, and therefore, an adversary may not easily bypass the active mesh and attack the sensitive area. | 04-25-2013 |
20130125250 | ANTI-TAMPER DEVICE FOR INTEGRATED CIRCUITS - An anti-tamper device ( | 05-16-2013 |
20130125251 | Mobile Device Peripherals Management System and Multi-Data Stream Technology (MdS) - A device and system for management of and access to externally connected peripheral devices by mobile devices. User and/or application data on a mobile device is sent to externally connected peripheral devices. External peripheral devices includes, but are not limited to, printers, scanners, displays, audio interfaces, speakers, network adapters, storage drives, hard drives, and the like. An end user mobile device application interface is installed as an application on a mobile device. Data may be sent directly to a peripheral device, or to a peripherals aggregation device, which may be active or passive. | 05-16-2013 |
20130133088 | CONNECTION DEVICE AUTHENTICATION - A method and apparatus are provided for a secure interconnect between data modules, including a security apparatus within a secured data interconnect apparatus installed with a security chip. The interconnect apparatus may be authenticated prior to enabling a stacking feature. Authentication of a interconnect apparatus may be used to ensure the quality and performance of the interconnect apparatus and the data modules. | 05-23-2013 |
20130139272 | Resource-Type Weighting of Use Rights - Resource-type weighting is used in evaluating the use-rights associated with hardware resources. | 05-30-2013 |
20130160149 | ENCRYPTION KEYPAD CAPABLE OF PREVENTING ILLEGAL DISASSEMBLY - An enhanced encryption keypad ( | 06-20-2013 |
20130174282 | DIGITAL RIGHT MANAGEMENT METHOD, APPARATUS, AND SYSTEM - A digital right management method, including: encrypting, by a first user equipment which has access right to shared digital contents, a key of the digital contents with at least an equipment key of a second user equipment intended to share the digital contents to generate a ciphertext of the key of the digital contents; generating, by the first user equipment, from the ciphertext a new authorization certificate corresponding to the digital contents; and transmitting, by the first user equipment, the new authorization certificate and the digital contents to the second user equipment to instruct the second user equipment to share the digital contents in accordance with the new authorization certificate. | 07-04-2013 |
20130174283 | PORTABLE DATA CARRIER HAVING AN OPERATING ERROR COUNTER - A method in a portable data carrier for safeguarding the data carrier against external attacks on the data carrier, wherein at least one counter is employed in the data carrier. A specified command is safeguarded such that it is executed by the data carrier only when the at least one counter lies in a specified values range. The at least one counter is decremented before an execution of the command and incremented only when the command has been executed without interruption. The at least one counter here is settable multiple times, in particular even after the issuance of the data carrier to a user. | 07-04-2013 |
20130179996 | IIMPLEMENTING DATA THEFT PREVENTION - A method and circuit for implementing data theft prevention, and a design structure on which the subject circuit resides are provided. A polymeric resin containing microcapsules surrounds a security card. Each microcapsule contains a conductive material. The conductive material of the microcapsule provides shorting on the security card responsive to the polymer resin and the microcapsule being breached, and a data theft prevention function using the shorting by the conductive material to prevent data theft. | 07-11-2013 |
20130198873 | CHIP AUTHENTICATION USING SCAN CHAINS - Methods and systems for generating a circuit identification number include determining a propagation time delay across a scan chain of known length; comparing the propagation time delay to a threshold associated with the scan chain length; storing an identifier bit based on the result of the comparison; repeating the steps of determining, comparing, and storing until a number of stored identifier bits reaches a threshold number; and outputting the stored identifier bits. | 08-01-2013 |
20130212713 | METHOD AND APPARATUS FOR PROVIDING BACKEND SUPPORT FOR DEVICE CONTROL IN RISK CONDITIONS - An approach is provided for providing backend support for device control in risk conditions. A device control support platform determines one or more computational chains consisting of one or more computation closures for managing one or more risk conditions associated with at least one device. The device control support platform further causes a projection, a distribution, or a combination thereof of the one or more computational chains, the one or more computation closures, or a combination thereof to one or more other devices. The device control support platform also causes an execution of at least a portion of the one or more computational chains, the one or more computational closures, or a combination thereof to cause an initiation of at least one computational broker at the at least one device for managing the one or more risk condition. | 08-15-2013 |
20130212714 | Information Management System And Device - The present invention relates to an information management system, and in particular to a portable information management device. The device includes a housing having a first surface and a second surface, said first and second surfaces securely enclosing electronic componentry of the device, wherein the electronic componentry includes: a data storage device for storing information about a person or asset; and a processor for transferring the information from the data storage device to an external device via a communication means, wherein the communication means includes: an antenna to allow contactless transfer of the information; and an input/output interface to allow transfer of the information via physical means. | 08-15-2013 |
20130219525 | SECURE AUDIO PERIPHERAL DEVICE - A secure audio peripheral device, coupled to a computer, capable of enabling a user to use audio devices such as a microphone, speakers or headset when the device is in operational state, while giving to the user a clear visual indication that the audio devices are enabled. The device simultaneously disables the microphone; and turns off the visual indication when the device is in secure state. The operational state is activated by the user by pressing a momentary push-button switch. A timer resets the device to a secure state after a short preset time. The device has anti-tempering functionality and becomes permanently disabled if tempered with. Optionally the device is coupled to the computer via a USB port that powers a USB CODEC chip and a LED used as the visual indicator. | 08-22-2013 |
20130219526 | Security System and Methods for Integrated Devices - Systems and methods for implementing security mechanisms in integrated devices and related structures. This method can include validating a device ID, generating a random value based on selected seed parameters, performing logic operations from hardware using the random value, and validating the integrated device based on logic operations from software using the random value. The system can include executable instructions for performing the method in a computing system. Various embodiments of the present invention represent several implementations of a security mechanism for integrated devices. These implementations provide several levels of encryption or protection of integrated devices, which can be tailored depending on the hardware and/or software requirements of specific applications. | 08-22-2013 |
20130232587 | IMPLEMENTING CARBON NANOTUBE BASED SENSORS FOR CRYPTOGRAPHIC APPLICATIONS - A method and circuit for implementing security protection with carbon nanotube based sensors for cryptographic applications, and a design structure on which the subject circuit resides are provided. A carbon nanotube layer is incorporated with a polymeric encapsulation layer of a security card. Electrical connections to the carbon nanotube layer are provided for electrical monitoring of electrical resistance of the carbon nanotube layer. | 09-05-2013 |
20130247231 | SECURE PROCESSING UNIT SYSTEMS AND METHODS - A hardware Secure Processing Unit (SPU) is described that can perform both security functions and other information appliance functions using the same set of hardware resources. Because the additional hardware required to support security functions is a relatively small fraction of the overall device hardware, this type of SPU can be competitive with ordinary non-secure CPUs or microcontrollers that perform the same functions. A set of minimal initialization and management hardware and software is added to, e.g., a standard CPU/microcontroller. The additional hardware and/or software creates an SPU environment and performs the functions needed to virtualize the SPU's hardware resources so that they can be shared between security functions and other functions performed by the same CPU. | 09-19-2013 |
20130254906 | Hardware and Software Association and Authentication - Authentication and association of hardware and software is accomplished by loading a secure code from an external memory at startup time and authenticating the program code using an authentication key. Access to full hardware and software functionality may be obtained upon authentication of the secure code. However, if the authentication of the secure code fails, an unsecure code that provides limited functionality to hardware and software resources is executed. | 09-26-2013 |
20130263290 | ELECTRONIC DEVICE AND HARDWARE COMPONENT PROTECTION METHOD THEREOF - An exemplary hardware component protecting method obtains an identifier inputted by a user. The method outputs an unlocking signal to trigger an electric lock corresponding to one locked hardware component to unlock a case corresponding to the one locked hardware component from the housing when the inputted identifier matches an identifier stored in the locked hardware component. The method also outputs a locking signal to trigger the electric lock corresponding to one newly installed hardware component to lock the case corresponding to the newly installed hardware component to the housing when the identifier stored in the hardware component matches an authorized identifier from a manufacturer's hardware support website. | 10-03-2013 |
20130269043 | System and Method for Analyzing A Device - A system and method for analyzing a device are disclosed. In an aspect, a method can comprise determining a parameter of a device at a kernel level of a software stack associated with the device, analyzing the parameter to determine an event state, comparing the event state to a white list to determine a state of an alert trigger, and generating an alert in response to the determined state of the alert trigger. | 10-10-2013 |
20130269044 | NON-INVASIVE SAFETY WRAPPER FOR COMPUTER SYSTEMS - A processing system comprising: a first processor adapted to perform one or more tasks according to a predetermined schedule and generate one or more first outputs; and a second processor synchronised with the first processor; wherein the second processor is adapted to receive the one or more first outputs and generate one or more corresponding second outputs when the timing of the one or more first outputs corresponds with the predetermined schedule. | 10-10-2013 |
20130276151 | ELECTRONIC PHYSICAL UNCLONABLE FUNCTIONS - An electronic asymmetric unclonable function applied to an electronic system being evaluated includes an electronic system and an AUF array electronically associated with the electronic system. The AUF array includes a plurality of non-identical cells. Each of the non-identical cells includes a test element representing a characteristic of the electronic system being evaluated and a measurement device evaluating the test element. A comparison unit processes an output of the measurement device to provide a multi-bit output value representing a magnitude of differences. | 10-17-2013 |
20130291131 | APPROACHES FOR A LOCATION AWARE CLIENT - Techniques for securing a client. Two or more varieties of location information for a client may be received. The present location of the client is determined using the two or more varieties of location information. A determination is made as to whether any of the varieties of location information were received during an immediately preceding bounded interval of time having a predefined length. A weight associated with each variety of location information that was received during the immediately preceding bounded interval of time is determined. The present location of the client is calculated using a weighted arithmetic mean for the varieties of location information that were received during the immediately preceding bounded interval of time. | 10-31-2013 |
20130298262 | System and Method for Manipulating Security of Integrated Circuit Layout - A method for manipulating security of an integrated circuit layout, comprising: rendering a PCell that is created by an original user for a successive user; providing an open access to the PCell; providing a PCell evaluator to execute evaluating steps of: getting license information from the PCell, and checking the PCell license information; and generating a layout of a sub-master by instantiating a super-master of the PCell if the PCell license information is valid, or leave the sub-master empty in a PCell view if the PCell license information is invalid. | 11-07-2013 |
20130312122 | TAMPER DETECTOR FOR SECURE MODULE - A tamper detector has input and output pins for connection to ends of a tamper detection circuit, and a corresponding set of linear feedback shift registers (LFSRs) timed by clock signals for generating pseudo-random coded detection signals as a function of seed values and of a generator polynomial defined by feedback taps. A comparator compares signals received from the detection circuit with the coded detection signals. A multiplexer provides the coded detection signal selectively from the LFSRs to the output pin and the comparator. A controller varies the seed values for different cycles of values of the pseudo-random coded detection signals. The controller also controls the generator polynomial and a frequency of the clock signals for different cycles of values of the pseudo-random coded detection signals. | 11-21-2013 |
20130312123 | EMBEDDED MULTIMEDIACARD AND ELECTRONIC DEVICE USING THE SAME, AND ENERGINING BOARD FOR EMBEDDED MULTIMEDIACARD - An embedded MultiMediaCard (eMMC), an electronic device equipped with an eMMC and an eMMC engineering board are disclosed. The eMMC includes an eMMC substrate plate, a plurality of solder balls and an eMMC chip. The solder balls are soldered to the eMMC substrate plate, and, one of the solder balls is designed as a security protection enable/disable solder ball. The eMMC chip is bound to the eMMC substrate plate, and, the eMMC chip has a security protection enable/disable pin electrically connected to the security protection enable/disable solder ball. The security protection enable/disable pin is internally pulled high by the eMMC chip when the security protection enable/disable solder ball is floating. When the security protection enable/disable solder ball is coupled to ground, the eMMC is protected from software-based attacks. | 11-21-2013 |
20130312124 | CONTROL AND MONITORING MODULE OF SAFE DEVICES - The invention provides a Control and Monitoring Module internal or external to a Safe Equipment such as: Point of Sale (POS) Terminals, PINPAD Terminals and Encrypted Keyboards, designed and implemented in order to detect current consumption variations of the equipment, thus indicating the presence of undesired circuit inserted in parallel in the original circuit of the Safe Equipment. The Control Module uses electrical current consumption sensors in microprocessor circuits capable of identifying variations in consumption. | 11-21-2013 |
20130318636 | COMPUTER CHASSIS WITH PROTECTION AGAINST INSECTS - A computer chassis includes a chassis body, a control unit, a motor unit, a gate unit and a detection unit. The chassis body defines an opening. The motor unit is electronically connected to the control unit. The gate unit is connected to the motor unit. The detection unit is electronically connected to the control unit. The gate unit and the detection unit are positioned in the opening, the detection unit detects and sends a detection signal to the control unit, the control unit receives the detection signal and control the motor unit to closes the gate unit. | 11-28-2013 |
20130318637 | LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA - A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data. | 11-28-2013 |
20130318638 | Method for Programming a Mobile End Device Chip - The invention provides a method for programming a chip for a mobile end device, wherein, in a preparatory step, a serial number is programmed into the chip and thereafter, in a programming step, the serial number is verified and a programming of at least one further datum into the chip is only carried out if the serial number has been successfully verified. The serial number is verified here by means of a security module (HSM), while employing a secret information item stored in the security module (HSM) and different from the serial number. | 11-28-2013 |
20130326642 | REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE - Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic. | 12-05-2013 |
20140007264 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM | 01-02-2014 |
20140020121 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A platform including a security system is described. The security system comprises, in one embodiment, a multi-state system having a plurality of modes, available whenever the platform has a source of power. The modes comprise an unarmed mode, in which the security system is not protecting the platform, an armed mode, in which the platform is protected, the armed mode reached from the unarmed mode, after an arming command, and a suspecting mode, in which the platform is suspecting theft, the suspecting mode reached from the armed mode, when a risk behavior is detected. | 01-16-2014 |
20140033331 | MULTILAYER SECURITY WRAP - A security wrap ( | 01-30-2014 |
20140041060 | Keypad Device - An example tamper detection mechanism may include an electrical pathway having a closed conductive configuration and being openable to prevent electrical conduction along the electrical pathway, and may further include detection circuitry connected to the electrical pathway and configured to detect a change in the resistance of the electrical pathway. The electrical pathway includes a pair of conductive pads electrically isolated from one another, and also includes a connector which in the closed conductive configuration contacts both conductive pads to form an electrical connection therebetween. The connector is moveable away from the pads to open the electrical connection for tamper detection. The connector has a resistor of predefined resistance which in the closed conductive configuration is included in the electrical pathway. The detection circuitry can distinguish, on the basis of the resistance of the electrical pathway, between connection of the pads by the connector and shorting between the two pads. | 02-06-2014 |
20140041061 | TAMPER PROTECTION DEVICE FOR PROTECTING A FIELD DEVICE AGAINST TAMPERING - The invention relates to a tamper protection device for protecting a field device against tampering, comprising a carrier and at least one electronic memory, wherein the at least one electronic memory is disposed in at least one partial area on the carrier, and the at least one electronic memory stores at least one predefinable security information item, and wherein the at least one electronic memory is designed in such a way as to modify the predefinable security information item in the event of at least partial damage to the tamper protection device. The invention further relates to a method for producing a field device having a tamper protection device, to a field device comprising a tamper protection device, to a tamper protection system, and to the use of a tamper protection device. | 02-06-2014 |
20140047567 | METHOD AND SYSTEM FOR SECURE CONFIGURATION OF AN ELECTRONIC DEVICE VIA AN RFID IC - Embodiments of an electronic device are disclosed. In one embodiment, the electronic device includes a circuit board, a central processing unit (CPU), an RFID IC, and a physically secure communications channel. The circuit board includes a radio frequency (RF) antenna, the CPU is connected to the circuit board and includes a CPU-to-RF identification (RFID) interface that does not support a digital security measure which requires asymmetric key cryptography, the CPU being enclosed within a package. The RFID IC is connected to the RF antenna and has an RFID-to-CPU interface that does not support a digital security measure which requires asymmetric key cryptography. The RFID IC also has non-volatile memory that stores configuration data for configuring the electronic device. The physically secure communications channel connects the CPU-to-RFID interface to the RFID-to-CPU interface and the physically secure communication channel is protected from physical access by a structural barrier. | 02-13-2014 |
20140047568 | METHOD FOR MONITORING A TAMPER PROTECTION AND MONITORING SYSTEM FOR A FIELD DEVICE HAVING TAMPER PROTECTION - The invention relates to a method for monitoring a tamper protection of a field device, comprising the steps of: checking whether manipulation of the field device has taken place; outputting a non-manipulation certificate in case a negative inspection result was determined; transferring the non-manipulation certificate; a registration device checking the non-manipulation certificate; the registration device determining an active status of the field device in case the non-manipulation certificate is valid; a monitoring device checking the field device by querying the status of the field device and transferring field device data to the monitoring device; the monitoring device accepting the field device data if the field device has an active status. The invention further relates to a monitoring system for a field device and a use. | 02-13-2014 |
20140053286 | DYNAMICALLY RECONFIGURABLE 2D TOPOLOGY COMMUNICATION AND VERIFICATION SCHEME - Systems and methods for securing devices and encoding information in hardware and hardware arrangements are provided. Variations include switched networks included in conformal coatings applied to or connected to components to be protected or encoded. The decoding or security key data is included as part of the network layout and/or switching logic such that physical changes to the network prevent the recovery of the key data. Nodes in the network may include sensors meant to change node or network behavior based on sensor detection results. | 02-20-2014 |
20140082756 | SECURE PIN ENTRY DEVICE - A secure PIN entry device including a PIN entry assembly operative to receive a PIN from a user, a PIN entry prompter operative when actuated to prompt a user to enter a PIN via the PIN entry assembly, a PIN entry prompt security check enabled controller operative to prevent operation of the PIN entry prompter unless a predetermined security check has been successfully completed and security check functionality operative to check at least part of the PIN entry device for the presence of an unauthorized PIN eavesdropping element thereat and to provide an output to the PIN entry prompt security check enabled controller indicating whether the predetermined security check has been successfully completed. | 03-20-2014 |
20140090093 | MESH GRID PROTECTION SYSTEM - A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines. The system also includes transformation logic coupled to the grid lines and configured to receive the first set of signals and transform the first set of signals to generate a second set of signals and transmit the second set of signals on a second set of grid lines. The system further includes verification logic coupled to the transformation logic and configured to compare the second set of signals to an expected set of signals. | 03-27-2014 |
20140096272 | SYSTEM AND METHOD FOR VALIDATING INPUT BY DETECTING AND RECOGNIZING HUMAN PRESENCE - Techniques are disclosed for validating input on a handheld device. In response to receiving an input and a request to access a computing resource, an application running on the handheld device may collect data from one or more sensors of the handheld device. The application may then determine, based on the collected sensor data, if an individual is interacting with the device and recognize the input as valid if such is the case. In one embodiment, the application may present a challenge to a user which is difficult for computer programs to perform, and determine whether an individual is interacting with the device based on successful completion of the challenge. In an alternative embodiment, the application may collect data and determine whether an individual is interacting with the device without presenting an explicit challenge to the user. | 04-03-2014 |
20140123327 | FLEXIBLE PRINTED CABLE AND INFORMATION PROCESSING DEVICE - It is an object of this invention to provide an FPC capable of improving tamper resistance. An FPC ( | 05-01-2014 |
20140130189 | TRANSITION BETWEEN STATES IN A PROCESSOR - In one implementation, a processor is provided that includes logic to enable a transition from a zeroize state to a clear state. In another implementation, a processor is provided that includes logic to enable a testing secure state, the testing state to enable a testing function; logic to enable a clear state, the clear state to enable a non-secure processing function and to disable a security function; logic to enable a transition from a testing secure state to a clear state; and logic to enable a full secure state, the full secure state to enable the processing function. In another implementation, a processor is provided that includes logic to disable a transition from a clear state to a secure state. | 05-08-2014 |
20140182002 | PROCESS FOR CAPTURING AND TRANSMITTING WINDOW SCREEN DISPLAY DATA - A process is disclosed for capturing screenshots on an electronic device of a user, and for transmitting representations of the captured screenshots to a monitoring system for storage. The captured screenshot data may, for example, be used to recover a device that is lost or stolen. | 06-26-2014 |
20140189890 | DEVICE AUTHENTICATION USING A PHYSICALLY UNCLONABLE FUNCTIONS BASED KEY GENERATION SYSTEM - At least one machine accessible medium having instructions stored thereon for authenticating a hardware device is provided. When executed by a processor, the instructions cause the processor to receive two or more device keys from a physically unclonable function (PUF) on the hardware device, generate a device identifier from the two or more device keys, obtain a device certificate from the hardware device, perform a verification of the device identifier, and provide a result of the device identifier verification. In a more specific embodiment, the instructions cause the processor to perform a verification of a digital signature in the device certificate and to provide a result of the digital signature verification. The hardware device may be rejected if at least one of the device identifier verification and the digital signature verification fails. | 07-03-2014 |
20140201851 | METHOD AND APPARATUS FOR USING DYNAMIC VOLTAGE AND FREQUENCY SCALING WITH CIRCUIT-DELAY BASED INTEGRATED CIRCUIT IDENTIFICATION - One feature pertains to a method that includes implementing a Physical Unclonable Function (PUF) circuit, and obtaining a first set of output bits from the PUF circuit by operating the PUF circuit at a first supply voltage level and/or first frequency. Then, at least one of the first supply voltage level is changed to a second supply voltage level and/or the first frequency is changed to a second frequency, where the second supply voltage level and the second frequency are different than the first supply voltage level and the first frequency, respectively. A second set of output bits is then obtained by operating the PUF circuit at the second supply voltage level and/or the second frequency, where the second set of output bits is in part different than the first set. Secure data is generated using the first set of output bits and the second sets of output bits. | 07-17-2014 |
20140201852 | SYSTEMS AND METHODS FOR DETECTING AND MITIGATING PROGRAMMABLE LOGIC DEVICE TAMPERING - Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation. | 07-17-2014 |
20140223584 | SMART WALLET - A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to prevent the smart wallet from being lost or stolen. The system comprises a fob key configured to send periodic wireless transmissions to the smart wallet device having the ability for approximate range detection. Various embodiments include audible, visual and vibrational indications for authentication, battery power and range detection. | 08-07-2014 |
20140250541 | ANTI-TAMPER SYSTEM BASED ON DUAL RANDOM BITS GENERATORS FOR INTEGRATED CIRCUITS - An apparatus includes a mesh block, a first number generator configured to generate a first number, a second number generator configured to generate a second number, and a comparator block configured to compare the first number with the second number and generate an output signal from the mesh block. The output signal indicates an occurrence of an unauthorized activity on the mesh block. | 09-04-2014 |
20140283146 | TAMPER SENSOR - A deformable tamper sensor and tamper resistant electronic system is operable to detect opening of an enclosure and perform actions responsive to the detection. Movable elements within the tamper sensor are held in position when the sensor is compressed and define a multi-bit sensor value. Transitioning the sensor from a compressed to a non-compressed state non-destructively provides a new sensor value through movement of one or more elements. | 09-18-2014 |
20140283147 | Methods And Systems For Preventing Hardware Trojan Insertion - Provided are methods and systems for preventing hardware Trojan insertion. An example method can comprise determining unused space in an integrated circuit (IC), selecting a plurality of built-in self-authentication (BISA) filler cells based on the determined unused space, and placing the selected plurality of BISA filler cells onto the unused space. The plurality of BISA filler cells can be connected to form a plurality of BISA blocks. The plurality of BISA blocks can correspond to a plurality of signatures. A modification of one or more BISA filler cell can lead to an alteration of one or more signatures. | 09-18-2014 |
20140283148 | FLYING WIREBONDS FOR CREATING A SECURE CAGE FOR INTEGRATED CIRCUITS AND PATHWAYS - A system and method for disposing one or a plurality of flying sense electrode segments so as to physically cover integrated circuits, circuit pathways and other components on at least one circuit board to physically secure the circuits, pathways and components from probes or data interception. | 09-18-2014 |
20140298490 | ACCESS REQUEST AUTHORIZATION - In a method for controlling physical access to a computing device a first access request to a room containing the computing device is received. In response, a processor determines that the first access request is valid based on the room and the date and time of the first access request and unlocks a door to the room to permit entry to the room. Subsequently, a second access request to a cabinet that is located in the room and contains the computing device is received. In response, a processor determines that the second access request is valid based on the cabinet and the date and time of the second access request and unlocks the cabinet to permit access to the computing device. | 10-02-2014 |
20140310826 | MESH GRID PROTECTION SYSTEM - A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid. lines. The system also includes transformation logic to transform the first set of signals to generate a second set of signals, to transmit the second set of signals on a third set of grid lines that are coupled to the first set of grid lines, and to transmit the second set of signals on a fourth set of grid lines that are coupled to the second set of grid lines. In addition, the system includes verification logic; to compare the second set of signals on the third and fourth set of grid lines to an expected set of signals. | 10-16-2014 |
20140325688 | TAMPERPROOF HOUSING MODULE - A tamperproof housing assembly for a PCB is disclosed where unauthorized access to the circuitry or contents of the housing assembly is prohibited. In a preferred embodiment, the housing assembly comprises a top cover, a bottom cover and a PCB sandwiched between the top and bottom covers using at least one interlocking system and a tamper sensor that is armed when the assembly is fully and properly assembled. In a preferred embodiment, there are at least 2 two-part interlocking systems are configured such that the movement of each part of the interlocking system relative to the other is limited to one axis. Even when the cover of the housing assembly is moved in a contrary or oblique direction after assembly, the physical and electronic security and integrity are maintained, as any movement will set off the tamper notification. | 10-30-2014 |
20140344960 | SELECTIVE CONTROL OF ON-CHIP DEBUG CIRCUITRY OF EMBEDDED PROCESSORS - An apparatus includes a first circuit portion, a second circuit portion, and a control circuit. The first circuit portion may include a first debug circuit. Access to the first debug circuit may be controlled by a first control signal. The second circuit portion may include a second debug circuit. Access to the second debug circuit may be controlled by a second control signal. The second circuit portion is generally controlled according to a secure firmware image. The control circuit may be configured to selectively disable access to the first debug circuit and access to the second debug circuit by generating the first and second control signals. When access to the second debug circuit is disabled, access to the second debug circuit can only be re-enabled by overwriting at least a portion of the secure firmware image. | 11-20-2014 |
20140344961 | APPARATUS AND METHOD TO HARDEN COMPUTER SYSTEM - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 11-20-2014 |
20140351959 | ENCRYPTING PIN PAD - The present invention provides a method and apparatus for protecting an Encrypting PIN Pad (EPP) against tampering. The apparatus provides an EPP comprising a first layer comprising at least two spaced apart electrode elements, and a second layer comprising at least one bridge element for electrically bridging a space between the at least two electrode elements when the first layer and the second layer are urged together. | 11-27-2014 |
20140366163 | Method and Apparatus for Detecting Device Intrusion To A Network Interface Terminal - A network interface terminal (“NIT”) able to provide network service includes an intrusion shrapnel, elastic element, intrusion plate, and bolt is disclosed. The intrusion shrapnel, in one embodiment, has a cylindrical body with an opening through center of the cylindrical body. First and second discs are attached to each end of the cylindrical body. The elastic element, such as a spring, is situated between the first disc and a frame applying a force pulling the intrusion shrapnel in a disengaging direction. The intrusion plate which is electrically coupled to a PCB is situated adjacent to the second disc. The bolt having a helical ridge thread passes through the open of the cylindrical body and makes the second disc to electrically contact with the intrusion plate. | 12-11-2014 |
20140366164 | REMOTELY ACTUATED DISPLAY SYSTEM AND RELATED METHODS - A remotely articulated display system for displaying an electronic device has a locking mechanism that is controlled by software installed on the electronic device. The software installed on the electronic device requires a user to supply an authorization input to lock and unlock the electronic device from the display system. Related methods are also disclosed herein, e.g., methods of remotely locking a display via software stored on the device being displayed, methods of locking a display via a multi-stage lock, etc. | 12-11-2014 |
20140373183 | COMPUTER AND CONTROL METHOD THEREOF - A computer and a control method thereof are provided. The computer includes a power button, a flash read-only memory (ROM), a processor, a near field communication (NFC) module, a chipset, and a coprocessor. The flash ROM stores a power button protection state for the power button. The chipset is coupled to the processor and the flash ROM. The coprocessor is coupled to the power button, the NFC module, and the chipset. The coprocessor verifies whether a current user identification (UID) of a NFC card equals a default user identification (UID) after the NFC module generates an interrupt request (IRQ). The coprocessor changes the power button protection state when the current UID equals the default UID. | 12-18-2014 |
20150026829 | ANTI-KEYLOG EDITOR - Various embodiments for protecting keyboard data inputted by a user in a computer having a keyboard hardware are disclosed. According to one exemplary embodiment, a method for protecting keyboard data, where the keyboard hardware comprises an I/O port having an input buffer and an output buffer, includes: receiving scan code data based on keyboard data inputted by the user, wherein the scan code data are latched in the output buffer of the I/O port; executing an interrupt routine to fetch the scan code data from the output buffer to a CPU of the computer, wherein the latched scan code data remains in the output buffer after the latched scan code data are read from the output buffer; transmitting a control command to the keyboard hardware through the input buffer of the I/O port; and receiving from the keyboard hardware a response signal generated in response to the control command, wherein the keyboard hardware is configured to transmit the response signal to the output buffer of the I/O port. | 01-22-2015 |
20150026830 | METHOD AND SYSTEM FOR LOCATING A NOTEBOOK COMPUTER - A method for locating a notebook computer by sending a Wake on Wireless WAN (WoW) signal via a wireless network to the notebook computer to switch ON the notebook computer; instructing the notebook computer to determine its own location using GPS if the notebook computer lid is open. | 01-22-2015 |
20150033368 | DEVICE FOR SECURING A CAPACITIVE KEYPAD AND CORRESPONDING TERMINAL - A securing device is provided for securing a capacitive keypad of an electronic payment terminal having at least one processor for managing keys of the capacitive keypad. The securing device is configured for communicating with the processor and includes a driving module for driving at least one simulation element for simulating at least one keystroke on the capacitive keypad. The driving module includes a receiver for receiving at least one simulation command randomly transmitted by the processor. | 01-29-2015 |
20150052622 | METHOD AND APPARATUS FOR MONITORING PERFORMANCE FOR SECURE CHIP OPERATION - A method and apparatus is provided for monitoring performance of an processor to detect tampering and place the processor in a safe operating state that prevents unauthorized access to contents of the processor. In one example, the method and apparatus compares a measured value of an operating parameter (i.e., a temperature, supply voltage or clock signal) to predefined limits to identify an out of limits measured value. If an out of limits measured value is detected during a normal operating mode, the processor enters a reset mode, and if an out of limits measured value is detected during power up or reset, the processor in retained a reset mode. | 02-19-2015 |
20150067896 | ASSERTING PHYSICAL PRESENCE TO A TRUSTED PLATFORM MODULE BY PHYSICALLY CONNECTING OR DISCONNECTING A HOT PLUGGABLE DEVICE - A method includes asserting a physical presence signal to a trusted platform module of a compute node in response to detecting a change in the physical connection of a hot pluggable device to a port of the compute node. The change in the physical connection of the hot pluggable device to the port is selected from physically connecting the hot pluggable device to the port, physically disconnecting the hot pluggable device from the port, and combinations thereof. Optionally, the compute node has a USB port and the hot pluggable device has a USB connector that is selectively physically connectable to the USB port. In one example, detecting a change in the physical connection of the hot pluggable device to the compute node includes detecting a voltage change on the USB port. | 03-05-2015 |
20150089674 | DEVICE LOCK AND AUTOMATIC PUBLICATION IN LOST AND FOUND DATABASE - Electronic devices are registered with a device lock service during the out of box experience. Following theft or loss of the device, an instruction can be given to remotely lock the device and at the same time publish the device as lost or stolen in a lost and found database. | 03-26-2015 |
20150096061 | FLEXIBLE PRINTED CABLE AND INFORMATION PROCESSING DEVICE - It is an object of this invention to provide an FPC capable of improving tamper resistance. An FPC ( | 04-02-2015 |
20150128297 | SECURE POINT OF SALE TERMINAL - A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly operative to sense when the housing is opened and tamper indication circuitry operative to receive an input from the at least one case-open switch assembly and to provide an output indication of possible tampering with the data entry circuitry located within the housing, the at least one case-open switch assembly including an arrangement of electrical contacts including at least first, second and third contacts and a displaceable conductive element, the tamper indication circuitry and the third contact together being operative such that when the third contact is short circuited to at least one of the first contact, the second contact and another contact, an output indication of possible tampering is provided. | 05-07-2015 |
20150135340 | CIRCUIT ARRANGEMENT AND METHOD FOR SAFEGUARDING A CIRCUIT ARRANGEMENT WITH RESPECT TO REPEATED LIGHT ATTACKS - In various embodiments, a circuit arrangement is provided. The circuit arrangement may include a detection circuit, which is designed to detect light attacks on the circuit arrangement; a processing circuit, which is designed to initiate a current flow through a line for each light attack detected by the detection circuit; and a control circuit, which is designed to enable functioning of a component of the circuit arrangement depending on the conducting state of the line. | 05-14-2015 |
20150143550 | CHIP AND METHOD FOR DETECTING AN ATTACK ON A CHIP - According to one embodiment, a chip is described comprising a substrate; an energy source configured to provide energy to the substrate; an energy receiver configured to receive energy from the energy source via the substrate and a determiner configured to determine a value of a parameter of the energy transmission between the energy source and the energy receiver, to check whether the value matches a predetermined value of the parameter and to output a signal depending on the result of the check. | 05-21-2015 |
20150143551 | ELECTRONIC TAMPER DETECTION - An apparatus, method and package for electronic tamper detection. In one example, an apparatus, device or package for electronic tamper detection includes: a first inductor positioned at a first distance from a first conductive surface; a first oscillator generating a first frequency in dependence upon the first inductor; and a comparator setting a tamper detected status if the generated first frequency is not within an error tolerance to a pre-stored first frequency. One example of a method for fabricating an electronic tamper detection apparatus, device, or package is also provided. | 05-21-2015 |
20150310232 | ACTIVE COMPONENT EMBEDDED IN CABLE - Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission. Further, the examples of the cable include an active component coupled to the connector and embedded in the cable. The active component is to at least perform one of encrypt and decrypt the data transmitted on the cable. | 10-29-2015 |
20150324610 | METHOD FOR MANAGING SOFTWARE FUNCTIONALITIES IN A CONTROL UNIT - A method and an electronic hardware security module are provided for managing software functionalities in a control unit. The hardware security module records results of a security functionality and acts on software functionalities as a function of the results. | 11-12-2015 |
20150324615 | INFORMATION PROCESSING DEVICE AND PORTABLE SETTLEMENT TERMINAL DEVICE - An information processing device includes a first information processing unit that is accommodated in a housing, and in which a first input display section is provided on an operational surface of the housing, and a tamper-resistant secure second information processing unit that is accommodated in front of the first information processing unit in the housing gripped by an operator, and in which a second input display section is provided in front of the first input display section on the operational surface. Further, in the information processing device, for example, a secure state display section that indicates a secure mode in authentication input, or indicates a non-secure mode in a case other than the authentication input is disposed on the operational surface. Even when a secure portion and a non-secure portion are present together, security of authentication information is secured, and an operator's mistake or an incorrect operation is suppressed. | 11-12-2015 |
20150339497 | SECURE MEDIA CONTAINER - Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power supply; an antenna; a receptacle for receiving removable data storage; and a computer apparatus including a processor and a memory, comprising executable instructions that cause the processor to: determine that a removable data storage device has been input into the receptacle; track a location of the secure media container using the antenna; determine an action associated with the location of the secure media container by: accessing a database comprising a plurality of locations and associated actions; and comparing the location of the secure media container to the plurality of locations and associated actions in the database; and apply the action to the removable storage device based on the location of the secure media container. | 11-26-2015 |
20150339498 | USB LINK LOCK DEVICE - Provided is a USB link lock device. The device includes a device body, a blocking member provided on the device body to block access of an external device, an external USB port part provided on the device body to be adjacent to the blocking member, a signal connection part enabling signal transmission between a terminal inside the USB port and the external USB connecting port, a locking member selectively locked to the electronic device so that the blocking member is not forcedly removed from the USB port, a stopping member provided in the device body to be retractable into the external USB port part, a lock member movably provided on the blocking member to control a locking operation of the locking member and a blocking operation of the stopping member. | 11-26-2015 |
20150371060 | SYSTEM ON CHIP - In a system on chip responder units comprise one or more responder elements and is associated with one or more protection units. A request analysis unit is arranged to receive from a requesting requestor unit a request for access to one or more target responder elements among responder elements within a target responder unit among the responder units. The request analysis unit determines relevant protection data based on the request and an authorization list, which comprises one or more entries. For each entry of the authorization list: taking access requirements specified by the respective entry into account if one or more of the target responder elements are part of the group of responder elements specified by the respective entry. The request analysis unit provides the relevant protection data to one or more target protection unit(s) associated with the responder unit(s), and located in a hierarchical path between the requesting requestor unit requestor unit and the target responder unit. The target protection unit(s) are arranged to perform a protective action for the target responder elements based on relevant protection data. | 12-24-2015 |
20150371064 | Security Adjustments In Mobile Devices - Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events. | 12-24-2015 |
20160012254 | APPARATUS, A METHOD AND MACHINE READABLE INSTRUCTIONS FOR CONTROLLING PERFORMANCE OF A PROCESS IN RESPONSE TO A DETECTED PROCESSING EVENT | 01-14-2016 |
20160026828 | ELECTRONIC DEVICE OF BOARD PROTECTION MECHANISM - An electronic device of a board protection mechanism includes: a substrate, a first shell, a first protection area, a second shell, a second protection area, and an adhesive piece, where the first protection area is located between a first surface of the substrate and the first shell and uses a structure between an operation board and the substrate for protection, the second shell is located at a second surface of the substrate and includes a groove and a feed inlet that are connected; the second protection area is located at the groove of the second shell and includes a wire mesh, surrounding the electronic element area and is electrically connected to the substrate; and the adhesive piece is filled into the feed inlet to cover the groove and fixed to the first shell, the second shell, the wire mesh, and the electronic element area. | 01-28-2016 |
20160026829 | TAMPER DETECTOR WITH HARDWARE-BASED RANDOM NUMBER GENERATOR - A system includes a tamper detector that includes a linear feedback shift register (LFSR) for generating pseudorandom coded detection signals as a function of seed values and a generator polynomial. The generator polynomial is loaded from a controller to the LFSR via software, and the seed values are directly loaded from a hardware-based random number generator to the LFSR. The tamper detector has output and input elements for connection to ends of a tamper detection circuit, wherein the detection circuit is linked with a physical closure surrounding an electronic circuit. The detection signals are applied to the output element and incoming signals are received from the tamper detection circuit at a comparator via the input element. Comparison of the incoming signals with the coded detection signals is performed to detect interference with the detection circuit in an attempt to tamper with the electronic circuit. | 01-28-2016 |
20160042199 | DETECTING AND THWARTING BACKSIDE ATTACKS ON SECURED SYSTEMS - Security devices for protecting ICs from backside security attacks. A security device includes an N− well formed in a substrate, a P+ center disposed in the central region of the N− well, and a P+ ring surrounding the N− well. To prevent latchup, a pair of inner and outer N+ rings is formed in the N− well. When a current source is applied to the P+ center, the current flows through a portion of the substrate and is picked up by the P+ ring. When an attacker mills the substrate or makes a trench in the substrate, the resistance of the substrate changes. By monitoring the voltage difference between the P+ center and P+ ring, the attempt to attack the die can be detected. | 02-11-2016 |
20160048705 | AUTHENTICATED DEVICE USED TO UNLOCK ANOTHER DEVICE - An electronic device having a user-interface locked state and a user-interface unlocked state may be in the locked state. The locked electronic device may detect, via wireless communication, an external device; receive, from the external device, unlocking information for unlocking the electronic device. The locked electronic device may determine whether the external device is authorized to facilitate its unlocking. The locked electronic device may detect user input. In response to the user input, the received unlocking information, and/or a determination that the external device is authorized, the locked electronic device may unlock and enter a normal operating state wherein application programs may be launched and used. | 02-18-2016 |
20160055351 | METHOD AND SYSTEM FOR MANAGING PROCESSING RESOURCES - The present disclosure improves upon existing systems and methods by providing a tool for managing processing resources. For instance, the presently described tool may be used to time replacement, plan for uplifts, budget for uplifts/decommissioning of hardware, and/or maintain a plurality of servers. This tool may lead to increased satisfaction, uptime, and a reduction of unexpected costs. The system may include initiating collection of variables to compile a prioritized list of servers, executing, a calculation application for determining a prioritized list of servers' end of life targets based on both technical and business parameters based on the entered variables, and prioritizing uplifts of the servers based on the technical and the business parameters. | 02-25-2016 |
20160055355 | ANTI-TAMPER DEVICE - An anti-tamper device for preventing data from being tampered with by an unauthorized person includes a top cover, a bottom cover, a printed circuit board (PCB), and a signal connector. The bottom cover is assembled to the top cover. The PCB is provided with a plurality of pads. The signal connector is fixed to the top cover, and the signal connector defines a plurality of terminal grooves. At least one of the terminal grooves receives a terminal. When the terminal is electrically connected with the pads for the first time, a first relation signal is generated for initializing the anti-tamper device. When the terminal is electrically disconnected from the pads and the terminal is electrically connected with the pads for the second relation signal. If the second relation signal is different from the first relation signal, the anti-tamper device is prevented from being initialized. | 02-25-2016 |
20160070930 | Disabling Counterfeit Cartridges - A method for disabling counterfeit cartridge operation is provided. The method includes detecting a cartridge in a blade enclosure. The method includes checking authentication credentials of the cartridge. The method includes determining the cartridge to be counterfeit. The method includes disabling the cartridge in response to determining the cartridge to be counterfeit. | 03-10-2016 |
20160070933 | PROTECTING CHIP SETTINGS USING SECURED SCAN CHAINS - Some embodiments include a method for processing a scan chain in an integrated circuit, the method comprising receiving, in the integrated circuit, the scan chain, wherein the scan chain includes a secret key pattern; separating the secret key pattern from the scan chain; storing the scan chain in a first plurality of latches; storing the secret key pattern in a second plurality of latches; comparing the secret key pattern to a reference key pattern, the reference key pattern stored in a third plurality of latches; determining, based on the comparing the secret key pattern to the reference key pattern, that the secret key pattern does not match the reference key pattern; and generating a signal indicating that the secret key pattern does not match the reference key pattern. | 03-10-2016 |
20160070935 | RESPONSE TO TAMPER DETECTION IN A MEMORY DEVICE - In response to a tamper-attempt indication, a memory device selectively disables one or more memory operations. Disabling can be accomplished by different techniques, including altering bias voltages associated with performing the memory operation, gating off a current needed for performing the memory operation, and limiting the needed current to a magnitude below the threshold magnitude required for the operation. After disabling the memory operation, a mock current can be generated. The mock current is intended to mimic the current normally expended during the memory operation when not disabled, thereby leading a user to believe that the device is continuing to operate normally even though the memory operation that is being attempted is not actually being performed. | 03-10-2016 |
20160078254 | DISPLAY DEVICE HAVING SECURITY FUNCTION - Display device includes timing controller, display panel, data driver, and scan driver. The timing controller includes an authentication processing unit configured to generate an authentication result based on an authentication control signal. The timing controller converts an input image data signal to data driver control signal and scan driver control signal when the authentication result represents success. The timing controller deactivates the data driver control signal and the scan driver control signal when the authentication result represents fail. The display panel includes plurality of pixels. The data driver generates plurality of data signals based on the data driver control signal and provides the data signals to the pixels through plurality of data signal lines. The scan driver generates plurality of scan signals based on the scan driver control signal and provides the scan signals to the pixels through plurality of scan signals lines. | 03-17-2016 |
20160085995 | TECHNOLOGIES FOR VERIFYING COMPONENTS - Technologies for verifying hardware components of a computing device include retrieving platform identification data of the computing device, wherein the platform identification data is indicative of one or more reference hardware components of the computing device, accessing hardware component identification data from one or more dual-headed identification devices of the computing device, and comparing the platform identification data to the hardware component identification data to determine whether a hardware component of the computing device has been modified. Each of the one or more dual-headed identification devices is secured to a corresponding hardware component of the computing device, includes identification data indicative of an identity of the corresponding hardware component of the computing device, and is capable of wired and wireless communication. | 03-24-2016 |
20160085998 | ELECTRONIC DEVICE AND SECURITY PROTECTION METHOD FOR THE ELECTRONIC DEVICE - A method for protecting security of an electronic device includes setting one or more security operations on the electronic device by an owner of the electronic device. When a security condition associated with a security operation performed on the electronic device is false after the electronic device is activated from a sleep mode, a video is recorded for a predetermined duration using a camera of the electronic device, and the video is sent to a predetermined e-mail address stored in the storage device. According to the video, the owner of the electronic device can identify and find the current user of the electronic device. | 03-24-2016 |
20160092703 | MESH GRID PROTECTION SYSTEM - A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid lines. The system also includes transformation logic to transform the first set of signals to generate a second set of signals, to transmit the second set of signals on a third set of grid lines that are coupled to the first set of grid lines, and to transmit the second set of signals on a fourth set of grid lines that are coupled to the second set of grid lines. In addition, the system includes verification logic to compare the second set of signals on the third and fourth set of grid lines to an expected set of signals. | 03-31-2016 |
20160098065 | Terminal Device and Method for Fastening or Unlocking Functional Card of Terminal Device - A terminal device and a method for fastening or unlocking a functional card of the terminal device. The terminal device includes a card container, a fastening apparatus, and a processor, where the card container is configured to contain a functional card, and a socket is disposed on the card container; the fastening apparatus includes an extensible part, and the extensible part stretches into the socket to fasten the card container, or moves away from the socket to unlock the card container; and the processor is configured to determine, according to authentication information entered by a user, whether the authentication information is correct, and control, when the authentication information is correct, the extensible part of the fastening apparatus to stretch into the socket to fasten the card container, or move away from the socket to unlock the card container. | 04-07-2016 |
20160104001 | Input to Locked Computing Device - The subject matter of this specification can be embodied in, among other things, a method that includes receiving at a computing device that is in a locked state, one or more user inputs to unlock the device and to execute at least one command that is different from a command for unlocking the device. The method further includes executing in response to the user inputs to unlock the device an unlocking operation by the device to convert the device from a locked state to an unlocked state. The method further includes executing the at least one command in response to receiving the user inputs to execute the at least one command. The at least one command executes so that results of executing the at least one command are first displayed on the device to a user automatically after the device changes from the locked state to the unlocked state. | 04-14-2016 |
20160110567 | TAMPER RESISTANT MODULE FOR INDUSTRIAL CONTROL SYSTEM - An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial control system module upon an indication of an unauthorized module access event. In an implementation, a secure industrial control system module includes a circuit board including electrical circuitry; a sealed encasement that houses the circuit board, where the sealed encasement includes a housing having a first housing side and a second housing side, where the housing is configured to house the circuit board when the first housing side and the second housing side are coupled together; and a first sensor component integrated with the sealed encasement, where the first sensor component is communicably coupled to the circuit board and electrical circuitry and is configured to provide an indication of an unauthorized access event. | 04-21-2016 |
20160125203 | METHOD AND APPARATUS OF VERIFYING TERMINAL AND MEDIUM - A method and an apparatus of verifying a terminal are provided in the field of computer technology. In the method, the terminal establishes a secure channel with a server through a secure element in the terminal The terminal sends original terminal hardware parameters in the secure element to the server through the secure channel by using the secure element, where the server is configured to feed back identification information according to the terminal hardware parameters. The terminal then determines a verification result of an authenticity of the terminal according to the identification information fed back by the server. The apparatus includes: a channel establishing module, a parameter sending module and a result determining module. The present disclosure solves the problem that the verification application program cannot identify the authenticity of the terminal due to the degradation of the terminal performance, and achieves the effect that the accuracy of the authenticity of verifying the terminal is improved. | 05-05-2016 |
20160125206 | SECURITY APPARATUS TO HOUSE A DEVICE - According to an example, a security apparatus to house a device may include a chassis, a front stop having a front stop wall and a front stop opening, a rear stop having a rear stop wall and a rear stop opening, a front cover to be positioned in front of the front stop having a front cover opening, in which the front stop wall blocks direct line of sight into the front opening of the chassis through the front cover opening when the front cover is positioned in front of the front stop, and a rear cover to be positioned behind the rear stop having a rear cover opening, in which the rear cover blocks direct line of sight into the rear opening of the chassis through the rear cover opening when the rear cover is positioned behind the rear stop wall. | 05-05-2016 |
20160132698 | SEMICONDUCTOR DEVICE MODULE, LICENSE SETTING METHOD AND MEDIUM HAVING LICENSE SETTING PROGRAM RECORDED THEREIN - A semiconductor device module according to embodiments includes a specific information storage unit configured to store individual identification information and class information, a control unit configured to perform authentication processing of maintenance information with signature signed using the class information, generate license information with signature signed using the individual identification information, the license information being based on the maintenance information, and store the license information with signature in a non-volatile memory, and a register to which a setting value based on the license information is set by the control unit. | 05-12-2016 |
20160154981 | Tamper Responsive Sensor | 06-02-2016 |
20160162708 | SEMICONDUCTOR INTEGRATED CIRCUIT - A logic circuit includes n storage elements (n is a positive integer) which can each store 1-bit information, and an attack detection circuit. The attack detection circuit includes an error determination circuit which can detect through a logic operation that k-bit or less errors (k is a positive integer) have occurred in n-bit codes stored in the n storage elements, and a light irradiation detection circuit which has light detection elements and can detect that light has been irradiated to (k+1) or more of the n storage elements, and it is determined that the logic circuit has been attacked from outside when the error determination circuit detects an error or the light irradiation detection circuit detects light irradiation. | 06-09-2016 |
20160162710 | INFORMATION HANDLING OF ACCESS SECURITY - A method of effectuating access security includes sending authentication data with a specific lifetime from a mobile device to an information handling system. The information handling system includes a controller and a housing. The housing includes a chassis and a latch component, with the controller electrically coupled to the latch component. The method includes determining by the controller in accordance with the authentication data whether the mobile device is authorized to activate the latch component and activating the latch component by the controller to lock or unlock the housing in response to a determination that the mobile device is authorized to activate the latch component. | 06-09-2016 |
20160180116 | SECURITY OF SCREEN IN ELECTRONIC DEVICE | 06-23-2016 |
20160188908 | INFORMATION PROCESSING SYSTEM AND SEMICONDUCTOR DEVICE - According to an embodiment, an information processing system includes a time constant processor and a pattern generator. The time constant processor binarizes values indicating a plurality of unit circuits each including a gate insulating film on the basis of a time to emission indicating a time from when a defect in the gate insulating film captures a carrier in a channel current caused to flow by application of a gate voltage to the unit circuits to when the defect emits the carrier. The pattern generator generates a pattern unique to the unit circuits using the values indicating the respective unit circuits binarized by the time constant processor. | 06-30-2016 |
20160203343 | SECURED KVM SYSTEM HAVING REMOTE CONTROLLER-INDICATOR | 07-14-2016 |
20160253526 | SECURE DATA ENTRY DEVICE | 09-01-2016 |
20160253527 | SECURE DATA ENTRY DEVICE | 09-01-2016 |
20190147197 | SECURE ELECTRONIC CIRCUITRY WITH TAMPER DETECTION | 05-16-2019 |
20220138358 | COMBINING SIGNALS FROM MULTIPLE SENSORS TO FACILITATE EMI FINGERPRINT CHARACTERIZATION OF ELECTRONIC SYSTEMS - During operation, the system uses N sensors to sample an electromagnetic interference (EMI) signal emitted by a target asset while the target asset is running a periodic workload, wherein each of the N sensors has a sensor sampling frequency f, and wherein the N sensors perform sampling operations in a round-robin ordering with phase offsets between successive samples. During the sampling operations, the system performs phase adjustments among the N sensors to maximize phase offsets between successive sensors in the round-robin ordering. Next, the system combines samples obtained through the N sensors to produce a target EMI signal having an EMI signal sampling frequency F=f×N. The system then generates a target EMI fingerprint from the target EMI signal. Finally, the system compares the target EMI fingerprint against a reference EMI fingerprint for the target asset to determine whether the target asset contains any unwanted electronic components. | 05-05-2022 |