Including Particular Structure Or Housing (e.g., Display, Keyboard) Patents (Class 380/52)
-
Patent number: 11088840Abstract: A point-of-sale (POS) terminal is provided for entering a PIN to enable a financial transaction. The point-of-sale terminal has a card reader for reading information from a credit card, a processor for running an operating system, with applications, a touch screen for displaying information and receiving user inputs, and a Security-Box connected between the touch screen and the processor to control the user input on the touch screen to the processor. The Security Box is configured to run in a “PIN Entry Mode” and a “Clear Text Mode.” When running in “PIN Entry Mode” the user input is not forwarded as touch coordinates to the processor and when running in “Clear Text Mode” the touch coordinates are transmitted to the processors.Type: GrantFiled: March 5, 2014Date of Patent: August 10, 2021Assignee: WINCOR NIXDORF INTERNATIONAL GMBHInventors: Michael Nolte, Valdemar Zavadsky
-
Patent number: 11036651Abstract: Various examples are directed to systems and methods for managing a memory system. The memory system may generate a first encrypted physical address using a first clear physical address. The memory system may generate a first encrypted logical-to-physical (L2P) pointer indicating the first logical address and a first encrypted physical address. The memory system may send the first encrypted L2P pointer to a host device for storage at a host memory.Type: GrantFiled: June 29, 2018Date of Patent: June 15, 2021Assignee: Micron Technology, Inc.Inventors: Zoltan Szubbocsev, Alberto Troia, Federico Tiziani
-
Patent number: 10977393Abstract: A circuit board is protected by being enclosed in a security housing that includes conductive tamper traces running along its interior surface, the conductive tamper traces being a housing portion of a tamper detection circuit. The tamper detection circuit also includes a board portion that detect tampering with the tamper detection circuit by monitoring voltages at monitor nodes along the board portion. The board portion of the tamper detection circuit is connected to the tamper traces via multiple connector pieces. The connector pieces can be held in place by board connector piece holders affixed to the board or housing connector piece holders of the housing. When tampering is detected, it can be localized based on voltages measured at multiple recesses along the housing. The tamper detection circuit can be arranged in a wheatstone bridge layout for environmental tolerance. The circuit board's functions/components can be disabled if tampering is detected.Type: GrantFiled: January 16, 2019Date of Patent: April 13, 2021Assignee: Square, Inc.Inventor: Mani Razaghi
-
Patent number: 10901928Abstract: Protection and integration of proprietary data in an open system architecture, which includes at least one sub-system, and which must comply with an open standard interface mandated by the system owner. The open standard interface defines the set of messages or signals which may be exchanged by sub-system components. The sub-system provider computer is granted a bridge node to instantiate within their controlled sub-system boundary. The bridge node communicates with the sub-system components via the interchangeable open standard interface and relays messages or signals to other sub-system bridge nodes through a shared common bus. The sub-system provider may protect their proprietary data in their standard interface implementation from the system owner and/or other sub-system providers in the overall system. This is achieved by removing the need for sub-system providers to share their open standard interface implementations with each other in order to integrate together into the overall system.Type: GrantFiled: February 15, 2018Date of Patent: January 26, 2021Assignee: United States of America as represented by the Secretary of the Air ForceInventors: Vahid M. Rajabian-Schwart, Nicholas S. Kovach, Kenneth Littlejohn
-
Patent number: 10635826Abstract: A system and method for securing data in a storage medium is disclosed. The system comprises a computing device, a database in communication with the computing device, and a user device including the storage medium is configured to access the computing device via a network. Computing device is configured to collect one or more parameters from at least one of the user device and the computing device. A seed key is generated based on the parameters using a digest algorithm. The computing device is configured generate a key using the seed key and MD5 and semi-Random SHA encryption. The computing device is configured to use the key to encrypt or decrypt data that accesses to and from a portion of the storage medium. The computing device is configured to execute encrypt and decrypt process through inline function without storing keys. The parameter includes server paired parameters and user device parameters.Type: GrantFiled: August 2, 2019Date of Patent: April 28, 2020Assignee: Monkey Soltion LLCInventors: Majid Hatami Aghdam, Navid Bahrami
-
Patent number: 10630675Abstract: A picture password interface is displayed to generate a password for a web service that accepts text passwords to help users more easily remember their passwords. In response to receiving user input at a picture displayed in the picture password interface, values from an associated cipher key are identified. These identified values are then combined into a user key based on an order and location at which the user input was received. The user key is then combined with a web service key to generate a password that is specific to the user and specific to the web service that the user is attempting to access. The generated password can be verified to ensure that it complies with any password complexity rules for the web service.Type: GrantFiled: April 14, 2016Date of Patent: April 21, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Reza Ferrydiansyah, Vijay A. Halepet, Mythili Muruganathan, Mostafa Mostafa
-
Patent number: 10558879Abstract: Digital signature authentication systems and methods are disclosed. An example method of authenticating a digital signature extracted from a high resolution image includes comparing an extracted signature from an image to a reference signature. The example method also includes authenticating the extracted signature against the reference signature according to one of a plurality of different authentication protocols.Type: GrantFiled: October 30, 2014Date of Patent: February 11, 2020Assignee: Hewlett-Packard Development Company L.P.Inventors: Stephen Pollard, Steven J. Simske, Guy Adams
-
Patent number: 10553133Abstract: The problem addressed by the disclosure is that of specifying an inexpensive, easily operable and largely automatable and reusable apparatus and a corresponding method for monitoring the manipulation of a transportable object. For example, the disclosure can be used to monitor the actuation of an opening flap of a transportation box without a current. For this purpose, the apparatus has the following: a magnetic data memory for storing an item of control information; a permanent magnet for destroying this control information; a mechanism for destroying the control information in the magnetic data memory by means of the permanent magnet; a data interface; a data connection between the magnetic data memory and the data interface for interchanging data between the magnetic memory and the data interface in a bidirectional manner.Type: GrantFiled: December 2, 2016Date of Patent: February 4, 2020Assignee: HARTING IT SOFTWARE DEVELOPMENT GMBH & CO,. KGInventor: Gert Havermann
-
Patent number: 10423749Abstract: Exemplary systems, methods and computer-accessible mediums can secure split manufacturing of an integrated circuit by modifying a previous location of at least one pin to a further location of the at least one pin based on a fault analysis procedure. A determination of the further location can include an iterative procedure that can be a greedy iterative procedure. The modification of the location of the at least one partition pin can be performed by swapping at least one further partition pin with the at least one partition pin.Type: GrantFiled: March 14, 2014Date of Patent: September 24, 2019Assignee: New York UniversityInventors: Jeyavijayan Rajendran, Ozgur Sinanoglu, Ramesh Karri
-
Patent number: 10270770Abstract: Secure enrollment of devices into computer networks is improved by a method that comprises receiving a first set of security data for computing devices from a vendor computing device and a second set of security data from a partner computing device and storing the first and second set of security data in a data repository; issuing a first authentication challenge to the computing devices, wherein the challenge is based on the first set and the second set of device security data; receiving a first authentication response from the computing devices and cross-referencing the first authentication response with the first set and the second set of device security data; receiving a second authentication challenge from the computing devices, wherein the second authentication challenge is based on the first set of security data; and issuing a second authentication response to the computing devices and determining whether to enroll the computing devices.Type: GrantFiled: August 23, 2018Date of Patent: April 23, 2019Assignee: Xage Security, Inc.Inventors: Susanto Junaidi Irwan, Roman M. Arutyunov, Ganesh B. Jampani, Andy Sugiarto
-
Patent number: 10257192Abstract: A storage system includes a host configured to provide a request for setting or clearing secure write protection; and a storage device including a register, the register including fields that store information for controlling write protection attributes and a secure mode of the storage device, the storage device being configured to authenticate a request of the host when the secure mode is enabled, wherein the storage device is configured set or clear the secure write protection based on the request of the host when the storage device authenticates the request of the host, wherein after the secure mode is set, the storage device restricts an access of an unauthenticated host for setting and clearing write protection, and wherein the register comprises a secure write protection (WP) configuration masking field for controlling register fields of the register that are associated with write protection.Type: GrantFiled: May 13, 2015Date of Patent: April 9, 2019Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Bo-Ram Shin, Jaegyu Lee, HeeChang Cho, Wonchul Ju
-
Patent number: 10192076Abstract: A circuit board is protected by being enclosed in a security housing that includes conductive tamper traces running along its interior surface, the conductive tamper traces being a housing portion of a tamper detection circuit. The tamper detection circuit also includes a board portion that detect tampering with the tamper detection circuit by monitoring voltages at monitor nodes along the board portion. The board portion of the tamper detection circuit is connected to the tamper traces via multiple connector pieces. The connector pieces can be held in place by board connector piece holders affixed to the board or housing connector piece holders of the housing. When tampering is detected, it can be localized based on voltages measured at multiple recesses along the housing. The tamper detection circuit can be arranged in a wheatstone bridge layout for environmental tolerance. The circuit board's functions/components can be disabled if tampering is detected.Type: GrantFiled: August 29, 2016Date of Patent: January 29, 2019Assignee: SQUARE, INC.Inventor: Mani Razaghi
-
Patent number: 10169756Abstract: A computer-implemented system and method includes receiving a first geographic location of a mobile device when a mobile wallet transaction is initiated, receiving a second geographic location of the mobile device after the mobile wallet transaction is initiated, comparing the first and second geographic locations to ensure a match, permitting the mobile device to process the mobile wallet transaction upon determining that the first and second geographic locations of the mobile device are within a predefined distance of each other, and transferring funds to a merchant after verifying that the second geographic location of the mobile device is within a predetermined distance of a location of the merchant.Type: GrantFiled: December 30, 2016Date of Patent: January 1, 2019Assignee: WELLS FARGO BANK, N.A.Inventors: Stephen M. Ellis, Michael J. Kennedy, Ashish Bhoopen Kurani, Melissa Lowry, Uma Meyyappan, Bipin M. Sahni, Nikolai Stroke
-
Patent number: 10169618Abstract: Encryption/decryption techniques for external memory are described herein. In an example embodiment, a device comprises an internal memory and an external memory controller. The internal memory is configured to store a key. The external memory controller is configured to encrypt, with the key, an address for an access operation to an external memory device to obtain an encrypted address, and to encrypt or decrypt a block of data for the access operation based on the encrypted address.Type: GrantFiled: December 23, 2014Date of Patent: January 1, 2019Assignee: Cypress Semiconductor CorporationInventors: Hans Van Antwerpen, Jan-Willem van de Waerdt
-
Patent number: 10002261Abstract: Various embodiments provide an input/output module, including: at least one input/output port for the input of data; a signature generator that is coupled to the input/output port and is set up to generate a signature for the data from the data; a reference input, wherein the reference input is set up for the application of a reference signature; and a comparator that is coupled to the signature generator and to the reference input, and is set up to output an alarm signal if the signature of the data on the input/output port differs from the reference signature.Type: GrantFiled: September 24, 2013Date of Patent: June 19, 2018Assignee: Infineon Technologies AGInventors: Marcus Janke, Peter Laackmann
-
Patent number: 9755649Abstract: A method for protecting an integrated circuit device against security violations includes monitoring a component of the integrated circuit device for security violations. A security violation of the component of the integrated circuit device is then identified. The component of the integrated circuit device is then internally destroyed in response to the identified security violation by providing current to the component beyond a tolerable limit of the component.Type: GrantFiled: February 9, 2015Date of Patent: September 5, 2017Assignee: XILINX, INC.Inventors: Richa Singhal, Edmond Jordan, Ahmad R. Ansari
-
Patent number: 9734342Abstract: Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a database, e.g. to a user PC on which said content of a copy protected audio CD cannot be accessed, the following steps are performed: receiving a serial code of a set of serial codes assigned to said data set, verifying of said received serial code, in case of a positive verification, accessing said data set correspond to said received and positively verified serial code from said database and outputting of at least parts of said accessed data.Type: GrantFiled: July 11, 2014Date of Patent: August 15, 2017Assignee: SONY DADC AUSTRIA AGInventors: Gerfried Ranner, Reinhard Blaukovitsch
-
Patent number: 9730315Abstract: A circuit board is protected by being enclosed in a security housing that includes conductive tamper traces running along its interior surface, the conductive tamper traces being a housing portion of a tamper detection circuit. The tamper detection circuit also includes a board portion that detect tampering with the tamper detection circuit by monitoring voltages at monitor nodes along the board portion. The board portion of the tamper detection circuit is connected to the tamper traces via multiple connector pieces. The connector pieces can be held in place by board connector piece holders affixed to the board or housing connector piece holders of the housing. When tampering is detected, it can be localized based on voltages measured at multiple recesses along the housing. The tamper detection circuit can be arranged in a wheatstone bridge layout for environmental tolerance. The circuit board's functions/components can be disabled if tampering is detected.Type: GrantFiled: August 29, 2016Date of Patent: August 8, 2017Assignee: SQUARE, INC.Inventor: Mani Razaghi
-
Patent number: 9684794Abstract: The present invention relates to a system and architecture for securing otherwise unsecured computer subsystems. According to one aspect, the invention provides an independent hardware platform for running software in a secure manner. According to another aspect, the invention provides the means to control and secure all disk, network and other I/O transactions. According to still further aspects, the invention provides a means to monitor and prevent unauthorized user and malicious software activity Additional aspects include providing a secure platform for device and user authentication as well as encryption key management, providing a means to perform background backup snapshots, and providing the means for enabling full management over computer operations.Type: GrantFiled: December 31, 2015Date of Patent: June 20, 2017Assignee: JANUS TECHNOLOGIES, INC.Inventors: Sofin Raskin, Michael Wang, Joshua Porten, Shaoan Chin
-
Patent number: 9626531Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for secure control of access control enablement and activation on self-encrypting storage devices. In some embodiments, the device may include a non-volatile memory (NVM) and a secure access control module. The secure access control module may include a command processor module configured to receive a request to enable access controls of the NVM from a user, and to enable the access controls. The secure access control module may also include a verification module configured to verify a physical presence of the user. The secure access control module may further include an encryption module to encrypt at least a portion of the NVM in response to an indication of success from the verification module.Type: GrantFiled: November 18, 2014Date of Patent: April 18, 2017Assignee: Intel CorporationInventors: Shankar Natarajan, Jason Cox, Charles B. Foster, Hinesh K. Shah
-
Patent number: 9449648Abstract: A program product, a graphical user interface, a computer system including such a graphical user interface and method for replacing a first version of an audio and/or video section having a first length by selecting a second version of an audio and/or video section having a second length are described. Such a method comprises selecting the first version having the first length, displaying a first indication showing that the first version is selected, opening a menu associated with the first version offering at least the second version as an alternative to replace the first version, selecting the second version in the menu to replace the first version and displaying a second indication showing that the second version is selected. The second indication replaces the first indication. Some implementations may facilitate replacing one section or piece of audio or video data by another.Type: GrantFiled: August 6, 2007Date of Patent: September 20, 2016Assignee: APPLE INC.Inventors: Ole Lagemann, John Danty, Jan-Hinnerk Helms, Gerhard Lengeling, Alexander Soren
-
Patent number: 9323957Abstract: An apparatus includes a mesh block, a first number generator configured to generate a first number, a second number generator configured to generate a second number, and a comparator block configured to compare the first number with the second number and generate an output signal from the mesh block. The output signal indicates an occurrence of an unauthorized activity on the mesh block.Type: GrantFiled: February 21, 2014Date of Patent: April 26, 2016Assignee: MARVELL WORLD TRADE LTD.Inventors: Raj Kumar A/L Krishnasamy, Chia Chieh Thum, Moo Kit Lee
-
Patent number: 9158921Abstract: A processing system has a stored, encrypted data structure that is decrypted to provide verification data values. System data values are retrieved from locations distributed about a memory storing system data. The verification data values are compared with corresponding system data values to determine if a predetermined threshold of verification data values matches the system data values. The system resumes operation if the predetermined threshold is met.Type: GrantFiled: May 12, 2014Date of Patent: October 13, 2015Assignee: FREESCALE SEMICONDUCTOR, INC.Inventors: Ruchika Gupta, Aneesh Bansal, Kalyana E. S. Chakravarthy, Ankit Pal
-
Patent number: 9117097Abstract: An electronic device includes a washer, a printed circuit board, and a screw. The printed circuit board includes a copper foil, a detecting unit and a processing unit. The copper foil comprises a plurality of electrical signal interfaces surrounding a first via defined in the copper foil. The washer defines a second via and includes a transmission metal. The screw combines the printed circuit board and the washer through the second via and the first via. The detecting unit stores an original logic level signal, and detects logic level signals of the electrical signal interfaces in real-time. The processing unit compares the original logic level signal and the detected logic level signal, to determine whether the electronic device is disassembled. If the electronic device is disassembled, the electronic device stops working.Type: GrantFiled: October 8, 2013Date of Patent: August 25, 2015Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Chi-Hsin Wu, Mao-Chang Chuang
-
Patent number: 9047493Abstract: A method, computer program product, and computing system for receiving an unsecure data portion for storage within a storage system. The unsecure data portion is stored within a temporary storage device. The unsecure data portion is processed to produce a secure data portion via a processor included within a first controller card included within the storage system. The secure data portion is stored on a persistent storage device via a second controller card.Type: GrantFiled: June 30, 2012Date of Patent: June 2, 2015Assignee: EMC CorporationInventor: Amnon Izhar
-
Patent number: 8909942Abstract: A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be prevented without having to erase or modify such data. An encryption key, or data used to generate the encryption key, is stored in an MRAM module integrated within the data storage system. The data storage system uses the encryption key to encrypt data received from a host system, and to decrypt the encrypted data when it is subsequently read by a host system. To render the stored data inaccessible, an operator (or an automated process) can expose the MRAM module to a magnetic field of sufficient strength to erase key data therefrom.Type: GrantFiled: March 30, 2012Date of Patent: December 9, 2014Assignee: Western Digital Technologies, Inc.Inventors: Dmitry S. Obukhov, Afshin Latifi, Justin Jones
-
Patent number: 8890720Abstract: A light guide is provided for illuminating innumerable constructions, but which is ideally suited for illuminating the keys of a keyboard. The light guide includes a translucent planar plate having a top, a bottom and sides. Further, the light guide includes one or more cavities which project upwardly into the translucent plate from its bottom surface. The cavities are hollow or filled with a translucent material so that the translucent plate and the one or more cavities form translucent interfaces where the cavities interface with the plate. The light guide also includes a reflector which covers the plate bottom and cavity openings.Type: GrantFiled: January 12, 2012Date of Patent: November 18, 2014Inventors: Michael Shipman, David G. Duckworth
-
Patent number: 8861728Abstract: The present disclosure relates to integrated circuits having tamper detection and response devices and methods for manufacturing such integrated circuits. One integrated circuit having a tamper detection and response device includes at least one photovoltaic cell and at least one memory cell coupled to the at least one photovoltaic cell. When the at least one photovoltaic cell is exposed to radiation, the at least one photovoltaic cell generates a current that causes an alteration to a memory state of the at least one memory cell. Another integrated circuit having a tamper detection and response device includes at least one photovoltaic cell and a reactive material coupled to the at least one photovoltaic cell, wherein a current from the at least one photovoltaic cell triggers an exothermic reaction in the reactive material.Type: GrantFiled: October 17, 2012Date of Patent: October 14, 2014Assignee: International Business Machines CorporationInventors: Jack O. Chu, Gregory M. Fritz, Harold J. Hovel, Young-Hee Kim, Dirk Pfeiffer, Kenneth P. Rodbell
-
Patent number: 8848908Abstract: An image processing apparatus includes a determination unit configured to determine whether secret information that should not be transmitted to a web server is contained in an HTML file provided by a web server. A web browser does not transmit the secret information determined by the determination unit to the web server. A job control unit executes a device function using the secret information that is not transmitted to the web server according to determination by the determination unit.Type: GrantFiled: July 16, 2010Date of Patent: September 30, 2014Assignee: Canon Kabushiki KaishaInventor: Kousuke Nakashima
-
Patent number: 8772653Abstract: An encryption keyboard is provided, especially an encryption keyboard including a front spying and detecting protection system. The encryption keyboard comprises a panel and a main control panel. A sealed flexible printed circuit board (PCB) is set between the panel and the main control panel. A circuit for preventing from spying and detecting is set in the sealed flexible circuit. The circuit for preventing from spying and detecting is connected to the surface of the sealed flexible circuit through a circuit pin, and is connected electrically to the control circuit of the main control panel for realizing a self-destroyed function through the circuit pin. The keyboard also includes a split style key grain, which comprises a keycap and a press post. The keycap comprises a cap top and an admission space which is positioned on the undersurface of the cap top and includes a downward opening.Type: GrantFiled: August 19, 2010Date of Patent: July 8, 2014Assignee: GRG Banking Equipment Co., Ltd.Inventors: Jing He, Xiaodian Chen, Junkun Zhang, Dong Wei
-
Patent number: 8769297Abstract: A method is provided for utilizing a title signal contained in digital data through a comparison of the title signal to a player signal stored in a player device.Type: GrantFiled: September 8, 2003Date of Patent: July 1, 2014Assignee: Digimarc CorporationInventor: Geoffrey B. Rhoads
-
Patent number: 8724814Abstract: A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation.Type: GrantFiled: September 26, 2011Date of Patent: May 13, 2014Assignee: BlackBerry LimitedInventors: Herbert A. Little, Neil P. Adams, Scott W. Totzke
-
Patent number: 8577031Abstract: An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a cache memory (5). Until now, it was complicated and costly to ensure the manipulation security of the modules. The function modules (2) comprise an encoding unit (6) for data encoding and decoding.Type: GrantFiled: March 10, 2005Date of Patent: November 5, 2013Assignee: Continental Automotive GmbHInventors: Karl Asperger, Jochen Kiemes, Roland Lange, Andreas Lindinger, Gerhard Rombach
-
Patent number: 8555411Abstract: A mobile device out of range of other devices in a wireless network may be locked to provide security.Type: GrantFiled: December 23, 2003Date of Patent: October 8, 2013Assignee: Intel CorporationInventor: Roger A. Hurwitz
-
Patent number: 8538891Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.Type: GrantFiled: September 24, 2007Date of Patent: September 17, 2013Assignee: American Express Travel Related Services Company, Inc.Inventors: Carol Lee Hobson, Sohail M Hussain
-
Patent number: 8520848Abstract: A password management service located either on a user computer or in the cloud intercepts a user's attempt to create an account on a Web site. The user enters a sequence of a physical key combination and the service assigns a particular keyboard layout for this Web site. The service generates a password by combining the key combination with the assigned keyboard layout and returns this password to the user or to the Web site. The service stores the name of the Web site in association with the designated keyboard layout. Upon a subsequent login attempt, the service again intercepts the user's typing of the same physical key combination, generates the same password by combining the key combination with the previously assigned and stored keyboard layout, and returns the generated password to the Web site for authentication. A keyboard layout for a site may be chosen by the user, may be selected by the service, or a random layout may be generated.Type: GrantFiled: March 14, 2011Date of Patent: August 27, 2013Assignee: Trend Micro, Inc.Inventors: Kun-Hao Liu, Lin Hung Che, Huang Bo Ching
-
Patent number: 8503674Abstract: Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are intended to protect, can alternatively, or also, be protected from attackers utilizing systems and a methodology that employs a removable storage device for providing authentication factors used in the encryption and decryption processing. Cryptographic keys and protected data can alternatively, or also, be protected with a system and methodology that supports data separation on the storage device(s) of a computing device. Cryptographic keys and the data they are intended to protect can alternatively, or also, be protected employing a system and methodology of virtual compartmentalization that effectively segregates key management from protected data.Type: GrantFiled: April 28, 2011Date of Patent: August 6, 2013Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Innokentiy Basmov, Grigory B. Lyakhovitskiy, Stefen Thom
-
Patent number: 8484134Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.Type: GrantFiled: September 24, 2007Date of Patent: July 9, 2013Assignee: American Express Travel Related Services Company, Inc.Inventors: Carol Lee Hobson, Sohail M Hussain
-
Publication number: 20130148804Abstract: An pry-proof encrypted keyboard. The encrypted keyboard comprises a keyboard panel (1), a lining board (2) assembled under the keyboard panel (1), a waterproof silicon rubber (4) and a main control panel (5). Convex rib circles (22) are provided on the circumference of the surface of the lining board (2) attached with the waterproof silicon rubber (4). The waterproof silicon rubber is extruded by the lining board (2) when the encrypted keyboard is assembled, and the thickness of corresponding waterproof silicon rubber (4) extruded by the convex rib circles (22) is less than 0.2 MM. The metallic lining to board (2) can efficiently prevent fusion attack from the lateral face of the encrypted keyboard, meanwhile two convex rib circles (22) are added on the circumference of the surface of the lining board attached with the water silicon rubber (4), so that the thickness of the waterproof silicon rubber (4) at the grooves (41) is less than 0.Type: ApplicationFiled: July 22, 2011Publication date: June 13, 2013Applicant: GRG Banking Equipment Co., Ltd.Inventors: Zhulong Lin, Junkun Zhang, Jing He, Ying Han
-
Patent number: 8443458Abstract: An object of the present invention is to provide a mechanism for tamper detection of electronic devices (110) in closed units which is robust and low cost. The object is achieved by a method in an electronic device (110) for detecting if a cover (100) enclosing the electronic device (110) has been opened. The cover (100) comprises an enclosing assembly (250) which is adapted to fasten the cover (100) into a closed position. The electronic (device 110) comprises a non volatile memory (120). The non volatile memory (120) comprises a stored reference signature associated to the enclosing assembly (250) when the cover (100) was fastened into a closed position. The method comprises the following steps: (Creating 1003) a signature associated to the enclosing assembly (250). Comparing (1004) the created signature with the reference signature. Detecting (1007) that the cover 100 has been opened when the comparing (1004) results in a difference.Type: GrantFiled: January 16, 2008Date of Patent: May 14, 2013Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Dan Anders Lindqvist
-
Patent number: 8433070Abstract: Systems and methods are described in which both a quantum key distribution (QKD) transmitter and QKD receiver may keep both of their two-path interferometers stable, with regard to path length drift, relative to an internal reference laser are described. Systems and methods are also proposed whereby the transmitter interferometer may have only a single path (e.g., Sagnac interferometers). The systems and methods described herein may greatly improve the performance of quantum cryptographic transceivers that may make use of these systems and methods.Type: GrantFiled: May 17, 2010Date of Patent: April 30, 2013Assignee: Raytheon BBN Technologies Corp.Inventor: Jonathan Lenahan Habif
-
Patent number: 8347102Abstract: An image processing apparatus generates a password each time transmission of image data is instructed, encrypts the image data with the generated password, transmits the encrypted image data, and notifies the generated password.Type: GrantFiled: March 10, 2006Date of Patent: January 1, 2013Assignee: Canon Kabushiki KaishaInventor: Yoshihide Terao
-
Patent number: 8340290Abstract: Disclosed herein is a method of securing keyboard input information by directly controlling a keyboard controller of a keyboard. The keyboard includes the keyboard controller, an interrupt controller, an input information processing module and a keyboard security module. The method includes a status information checking step of enabling the input information processing module to check status information of the keyboard controller; an interrupt inactivation step of inactivating an interrupt request function of the keyboard controller; an input information encryption step of encrypting the keyboard input information written to the keyboard input/output ports; a transfer step of transferring the encrypted input information to the keyboard security module; and an input information deletion step of deleting the keyboard input information remaining in the keyboard controller.Type: GrantFiled: October 2, 2008Date of Patent: December 25, 2012Assignee: Softcamp Co., Ltd.Inventor: Hong Seok Kang
-
Patent number: 8320556Abstract: An improved architecture is disclosed of a crypto engine, such as a Janus Crypto Engine (JCE) having a Programmable Cryptographic Channel (PCC) using a Programmable Cryptographic Processor (PCP). The architecture of the crypto engine does not require zeroizing between messages received by the PCC. Consequently, using the new architecture of the present invention, the crypto engine can allocate PCC resources based on throughput and algorithm needs, reducing latency, and employing fewer PCCs.Type: GrantFiled: September 28, 2006Date of Patent: November 27, 2012Assignee: Rockwell Collins, Inc.Inventors: Mark A. Bortz, David W. Jensen
-
Patent number: 8196815Abstract: To provide alphanumeric data, such as a PIN code, to a smart card (2) a terminal (1) is used which is capable of communicating with the smart card. The terminal comprises a keypad (4) for entering the alphanumeric data and an associated keypad matrix (5) for producing key signals, which the keypad matrix (5) is scanned for any pressed keys using a scanning sequence so as to produce key signals. To securely enter the data without the risk of the terminal intercepting them it is proposed that said scanning sequence is determined by the smart card (2). In this way, the terminal has no knowledge of the actual keys pressed and the secrecy of the alphanumeric data is ensured.Type: GrantFiled: May 28, 2004Date of Patent: June 12, 2012Assignee: NXP B.V.Inventors: Keith Baker, Johannes Maria Pleunis
-
Patent number: 8055901Abstract: A method and system for performing document image correction using a document reader is disclosed. The method includes generating a document image representative of a document having a deformation; decoding an optical pattern embedded in the document from the document image to determine an optical signature for the document; receiving document classification data associated with the optical signature; and applying an image correction technique to the document image based on the document classification data to generate a corrected document image. A document capable of being read by a document reader is also disclosed. The document includes a substrate and an optical pattern embedded on the substrate. The optical pattern is part of a background pattern printed on the substrate. The optical pattern defines an optical signature unique to the particular class of document and is associated with document classification data for the document.Type: GrantFiled: March 17, 2010Date of Patent: November 8, 2011Assignee: Scientific Games International, Inc.Inventors: William F. Behm, Charles F. Cassidy, Sten H. Mejenborg
-
Patent number: 7983992Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.Type: GrantFiled: February 23, 2009Date of Patent: July 19, 2011Assignee: American Express Travel Related Services Company, Inc.Inventors: Carol Lee Hobson, Sohail M. Hussain
-
Patent number: 7937326Abstract: A computer-based process for product selection optimization by displaying various security features available for a security document, for evaluating the impact that the selection of one security feature has upon the selection of other features, and for optimizing the selection of each security feature or a combination of features in meeting a protection goal for the security document.Type: GrantFiled: February 20, 2002Date of Patent: May 3, 2011Assignee: The Standard Register CompanyInventor: Dan Thaxton
-
Patent number: 7933842Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.Type: GrantFiled: February 23, 2009Date of Patent: April 26, 2011Assignee: American Express Travel Related Services Company, Inc.Inventors: Carol Lee Hobson, Sohail M. Hussain
-
Patent number: RE44697Abstract: An encryption chip is programmable to process a variety of secret key and public key encryption algorithms. The chip includes a pipeline of processing elements, each of which can process a round within a secret key algorithm. Data is transferred between the processing elements through dual port memories. A central processing unit allows for processing of very wide data words from global memory in single cycle operations. An adder circuit is simplified by using plural relatively small adder circuits with sums and carries looped back in plural cycles. Multiplier circuitry can be shared between the processing elements and the central processor by adapting the smaller processing element multipliers for concatenation as a very wide central processor multiplier.Type: GrantFiled: September 4, 2012Date of Patent: January 7, 2014Assignee: Mosaid Technologies IncorporatedInventors: David E. Jones, Cormac M. O'Connell