Class / Patent application number | Description | Number of patent applications / Date published |
726036000 | Via power supply | 22 |
20080263682 | SYSTEM FOR PREVENTING UNAUTHORIZED ACTIVATION OF COMPUTER - An exemplary network system includes a remote computer and a network server. The remote computer includes a baseboard management controller (BMC), a south bridge chipset, a power button, and a switching circuit. The switching circuit has a control terminal connected to an output of the BMC, a power terminal connected to a power supply, and also connected to a SB_PWRBTN pin of the south bridge chipset, and a ground terminal connected to ground via the power button. The network server is connected to an input of the BMC of the remote computer, the network server outputs a control signal for forbidding activating the remote computer, the BMC receives the control signal and outputs a low level voltage signal to turn off the transistor, and the remote computer can not be activated. | 10-23-2008 |
20080276326 | Electronic Device Disabling System and Method - A method for tracking, locating and disabling an electronic device. A method includes checking if an application component operated correctly during last power-up of the device; and placing the device under control of power on self test to proceed with powering-up the device if the application component operated correctly during last device power-up. | 11-06-2008 |
20090070888 | Falling protective device for hard disk of a portable computer - A falling protective device for protecting a hard disk of a falling portable computer against damages includes a falling sensor arranged in the portable computer for generating and sending an interrupt signal to a keyboard controller in response to a detected falling state of the computer. An SMI signal line is extended between and connected to the keyboard controller and a system BIOS of the computer. On receipt of the interrupt signal generated by the falling sensor, the keyboard controller sends an SMI signal via the SMI signal line to the system BIOS, which in turn sends a park control signal to park the hard disk or a power-off control signal to terminate the supply of working power to the hard disk. The system BIOS sends a polling signal via a polling signal line to the keyboard controller, so as to poll about a state signal of a default status bit in a default signal port of the keyboard controller. | 03-12-2009 |
20100005533 | METHOD AND APPARATUS FOR PROTECTING RFID TAGS FROM POWER ANALYSIS - RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their power consumption remotely via a completely passive attack. The method and apparatus of the invention protects RFID tags against simple and differential power attacks. The invention is particularly useful regarding inventory control systems or secure documents such as epassports. The basic technique is to use two capacitors embedded in the RFID tag in lo such a way that at any given time one of them is storing energy that is being generated by the charge pump of the tag that sucks energy from the electromagnetic or magnetic field of a tag reader, and the other one is discharging and powering the computational element of the tag chip. | 01-07-2010 |
20100071077 | APPARATUS, SYSTEM, AND METHOD FOR DETECTING TAMPERING OF FISCAL PRINTERS - An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory. | 03-18-2010 |
20100083387 | METHOD AND SYSTEM FOR A SECURE POWER MANAGEMENT SCHEME - A security processor integrated within a system may be securely shut down. The security processor may receive shut down requests, and may determine components and/or subsystems that need be shut down during shut down periods. The security processor may determine when each of the relevant components is ready for shut down. Once the relevant components are shut down, the security processor may itself be shut down, wherein the shut down of the security processor may be performed by stopping the clocking of the security processor. A security error monitor may monitor the system during shut down periods, and the security processor may be powered back on when security breaches and/or threats may be detected via the security error monitor. The security error monitor may be enabled to power on the security processor by reactivating the security processor clock, and the security processor may then power on the system. | 04-01-2010 |
20100083388 | NETWORK PROJECTOR AND PROJECTOR SYSTEM - The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the network projector and a display signal control unit which, when confirming that a connection confirmation signal which is transmitted at a fixed period from a host computer via a network is not inputted for more than a predetermined time, outputs a supply stop signal to the power source unit indicating that the supply of power should be stopped. | 04-01-2010 |
20110072523 | COMPUTER SECURITY SYSTEM HAVING INTEGRATED GPS - A computing apparatus having a hard drive storage unit which includes a global positioning system, a non-volatile memory and a compare module. The non-volatile memory stores a permitted zone of operation of the hard drive storage unit while the compare module monitors the current location. If the compare module detects a current location of the hard drive storage unit as tracked by the global positioning system which is outside of the permitted zone of operation as stored in the non-volatile memory, the non-volatile memory contains at least one command implemented by a computer processor that may cause the hard drive storage unit to become disabled. | 03-24-2011 |
20110119773 | Data Relay for a Controller - An irrigation system includes an irrigation controller, at least one environmental sensor and a vandal resistant data relay. The irrigation controller includes a two conductor hard wired communications link for accepting an actual value of at least one parameter of interest from an environmental sensor in the form of data encoded on the conductors via current modulation. The environmental sensor is mounted in a location remote from the irrigation controller. A circuit is connected to the environmental sensor for transmitting an RF signal representing an actual value of a parameter of interest detected by the environmental sensor. The vandal resistant data relay is connected to the two conductor hard wired communication link of the irrigation controller. The vandal resistant data relay includes a receiver that receives the RF signal, and circuitry configured to extract the actual value of the parameter of interest and emulate a predetermined set of physical and protocol properties of the two conductor hard wired communication link of the irrigation controller. | 05-19-2011 |
20120151608 | SYSTEMS AND METHODS FOR SECURING THE POWER SUPPLY OF COMMAND MEANS OF A MICROCIRCUIT CARD IN CASE OF ATTACK - This microcircuit card includes means for detecting an attack on the card, command means ( | 06-14-2012 |
20130086700 | USER PROFILE-BASED DEVICE ACCESS CONTROL METHOD AND APPARATUS - A method and apparatus for configuring electronic devices is provided. The method includes collecting, at a device management apparatus, user information regarding a user within a predetermined area; and controlling access to an electronic device based on the user information. | 04-04-2013 |
20130305395 | COMPUTER SECURITY SYSTEM HAVING INTEGRATED GPS - A computing apparatus having a hard drive storage unit which includes a global positioning system, a non-volatile memory and a compare module. The non-volatile memory stores a permitted zone of operation of the hard drive storage unit while the compare module monitors the current location. If the compare module detects a current location of the hard drive storage unit as tracked by the global positioning system which is outside of the permitted zone of operation as stored in the non-volatile memory, the non-volatile memory contains at least one command implemented by a computer processor that may cause the hard drive storage unit to become disabled. | 11-14-2013 |
20130312125 | METHOD AND APPARATUS FOR SECURE TRUSTED TIME TECHNIQUES - A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be graded by the frequency and accuracy with which a reliable external time source is available for correction and/or reset, and how trustworthy this external source is in a commercial scenario. The techniques also take into account that the number of different paths and number of hops between the device and the trusted external time source may vary. A local clock related value which is protected by a TPM securely bound to an external clock. A system of Accuracy Statements (AS) is added to introduce time references to the audit data provided by other maybe cheaper sources than the time source providing the initial time. | 11-21-2013 |
20140013455 | ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM - A system comprising a platform protected by an always-on always-available security system is described. The system, in one embodiment, includes a core logic component to provide logic to move the platform to an armed mode upon receipt of an arming command, a battery access controller to prevent access to a battery of the platform, when the platform is in the armed mode, a disarming logic to receive a disarming command from a user, the disarming command causing the battery access controller to provide the access to the battery, such that when the platform is disarmed the battery can be accessed, whereby the system prevents removal of the battery when the platform is in the armed mode to ensure that the platform remains powered to perform a security action when needed. | 01-09-2014 |
20140189892 | COMMUNICATION DEVICE AND COMMUNICATION SYSTEM - According to one embodiment, a communication device includes a detector, a power controller and an authentication module. The detector is configured to detect connection of a source device. The authentication module is configured to perform authentication of the source device based on authentication data. The power controller is configured to continue supplying power to the source device when the authentication of the source device is successfully completed. | 07-03-2014 |
20140201853 | Subsystem Authenticity and Integrity Verification (SAIV) - Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security. | 07-17-2014 |
20140344962 | PREVENTING WATER DAMAGE IN PORTABLE DEVICES - A shut-off circuit interrupts the flow of power to the system circuit of a portable device, when liquids are detected within the portable device. Liquid sensors are placed proximate to the ports of the portable device. The ports may admit the flow of liquids, so the liquid sensors may detect the passage of liquids into the portable device. If the liquid sensors detect liquids entering the portable device, a shut-off circuit interrupts the flow of power from the battery to the system circuit. | 11-20-2014 |
20150074834 | ELECTRONIC DEVICE AND PROTECTION METHOD THEREOF - The present invention is an electronic device and has a positioning module, a micro processing unit and an electronic device with a first storing device. The micro processing unit electrically connects with the positioning module and the first storing device. The electronic detects a position thereof via the positioning module and generates a positioning coordinate datum. The micro processing unit determines whether the electronic device is in a preset working area through the positioning coordinate datum. When the electronic device is not in the preset working area, the micro processing unit stops the electronic device from accessing the first storing device. | 03-12-2015 |
20150089676 | Semiconductor Integrated Circuit - A method of a semiconductor integrated circuit comprising a logic circuit including n storage elements (n is a positive integer) which can each store 1-bit information and an attack detection circuit, the method including detecting, by an error determination circuit, through a logic operation that k-bit or less errors (k is a positive integer) have occurred in n-bit codes stored in the n storage elements, and detecting, by a light irradiation detection circuit which includes light detection elements, that light has been irradiated to (k+1) or more of the n storage elements. It is determined that the logic circuit has been attacked from outside when the error determination circuit detects an error or the light irradiation detection circuit detects light irradiation. | 03-26-2015 |
20150317496 | METHOD AND APPARATUS FOR LIMITING ACCESS TO AN INTEGRATED CIRCUIT (IC) - A method and apparatus for limiting access to an integrated circuit (IC) upon detection of abnormal conditions is provided. At least one of abnormal voltage detection, abnormal temperature detection, and abnormal clock detection are provided with low power consumption. Both abnormally low and abnormally high parameter values (e.g. abnormally low or high voltage, temperature, or clock frequency) may be detected. Abnormal clock detection may also detect a stopped clock signal, including a clock signal stopped at a low logic level or at a high logic level. Furthermore, abnormal clock detection may detect an abnormal duty cycle of a clock signal. A sampled bandgap reference may be used to provide accurate voltage and current references while consuming a minimal amount of power. Upon detection of an abnormal parameter value, one or more tamper indications may be provided to initiate tampering countermeasures, such as limiting access to the IC. | 11-05-2015 |
20150379308 | INFORMATION PROCESSING DEVICE AND OPERATION CONTROL METHOD - According to one embodiment, a firmware stored in a ROM in an information processing device connects the information processing device to a first server through a network, and downloads a client program into a volatile memory in the information processing device from the first server. Also, the firmware launches the client program to connect the information processing device and a second server through the network, and turns off the power of the information processing device to erase content in the volatile memory, when the information processing device is disconnected from the network after connection between the information processing device and the second server is established. | 12-31-2015 |
20160055354 | SUPPORTING PORT SECURITY ON POWER-OVER-ETHERNET ENABLED PORTS - Embodiments of the present invention include systems and methods for controlling power delivery to a port in a power sourcing equipment. The power sourcing equipment receives identity information from a device connected to the port and determines whether the device is a trusted device or a rogue device according to a security policy. If the device is a trusted device, the power sourcing equipment supplies data and electrical power to the port according to a priority policy. If the device is a rogue device, the power source equipment does not supply electrical power to the port. | 02-25-2016 |