Including Particular Structure Or Housing (e.g., Display, Keyboard) Patents (Class 380/52)
  • Patent number: 10635826
    Abstract: A system and method for securing data in a storage medium is disclosed. The system comprises a computing device, a database in communication with the computing device, and a user device including the storage medium is configured to access the computing device via a network. Computing device is configured to collect one or more parameters from at least one of the user device and the computing device. A seed key is generated based on the parameters using a digest algorithm. The computing device is configured generate a key using the seed key and MD5 and semi-Random SHA encryption. The computing device is configured to use the key to encrypt or decrypt data that accesses to and from a portion of the storage medium. The computing device is configured to execute encrypt and decrypt process through inline function without storing keys. The parameter includes server paired parameters and user device parameters.
    Type: Grant
    Filed: August 2, 2019
    Date of Patent: April 28, 2020
    Assignee: Monkey Soltion LLC
    Inventors: Majid Hatami Aghdam, Navid Bahrami
  • Patent number: 10630675
    Abstract: A picture password interface is displayed to generate a password for a web service that accepts text passwords to help users more easily remember their passwords. In response to receiving user input at a picture displayed in the picture password interface, values from an associated cipher key are identified. These identified values are then combined into a user key based on an order and location at which the user input was received. The user key is then combined with a web service key to generate a password that is specific to the user and specific to the web service that the user is attempting to access. The generated password can be verified to ensure that it complies with any password complexity rules for the web service.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: April 21, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Reza Ferrydiansyah, Vijay A. Halepet, Mythili Muruganathan, Mostafa Mostafa
  • Patent number: 10558879
    Abstract: Digital signature authentication systems and methods are disclosed. An example method of authenticating a digital signature extracted from a high resolution image includes comparing an extracted signature from an image to a reference signature. The example method also includes authenticating the extracted signature against the reference signature according to one of a plurality of different authentication protocols.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: February 11, 2020
    Assignee: Hewlett-Packard Development Company L.P.
    Inventors: Stephen Pollard, Steven J. Simske, Guy Adams
  • Patent number: 10553133
    Abstract: The problem addressed by the disclosure is that of specifying an inexpensive, easily operable and largely automatable and reusable apparatus and a corresponding method for monitoring the manipulation of a transportable object. For example, the disclosure can be used to monitor the actuation of an opening flap of a transportation box without a current. For this purpose, the apparatus has the following: a magnetic data memory for storing an item of control information; a permanent magnet for destroying this control information; a mechanism for destroying the control information in the magnetic data memory by means of the permanent magnet; a data interface; a data connection between the magnetic data memory and the data interface for interchanging data between the magnetic memory and the data interface in a bidirectional manner.
    Type: Grant
    Filed: December 2, 2016
    Date of Patent: February 4, 2020
    Assignee: HARTING IT SOFTWARE DEVELOPMENT GMBH & CO,. KG
    Inventor: Gert Havermann
  • Patent number: 10423749
    Abstract: Exemplary systems, methods and computer-accessible mediums can secure split manufacturing of an integrated circuit by modifying a previous location of at least one pin to a further location of the at least one pin based on a fault analysis procedure. A determination of the further location can include an iterative procedure that can be a greedy iterative procedure. The modification of the location of the at least one partition pin can be performed by swapping at least one further partition pin with the at least one partition pin.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: September 24, 2019
    Assignee: New York University
    Inventors: Jeyavijayan Rajendran, Ozgur Sinanoglu, Ramesh Karri
  • Patent number: 10270770
    Abstract: Secure enrollment of devices into computer networks is improved by a method that comprises receiving a first set of security data for computing devices from a vendor computing device and a second set of security data from a partner computing device and storing the first and second set of security data in a data repository; issuing a first authentication challenge to the computing devices, wherein the challenge is based on the first set and the second set of device security data; receiving a first authentication response from the computing devices and cross-referencing the first authentication response with the first set and the second set of device security data; receiving a second authentication challenge from the computing devices, wherein the second authentication challenge is based on the first set of security data; and issuing a second authentication response to the computing devices and determining whether to enroll the computing devices.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: April 23, 2019
    Assignee: Xage Security, Inc.
    Inventors: Susanto Junaidi Irwan, Roman M. Arutyunov, Ganesh B. Jampani, Andy Sugiarto
  • Patent number: 10257192
    Abstract: A storage system includes a host configured to provide a request for setting or clearing secure write protection; and a storage device including a register, the register including fields that store information for controlling write protection attributes and a secure mode of the storage device, the storage device being configured to authenticate a request of the host when the secure mode is enabled, wherein the storage device is configured set or clear the secure write protection based on the request of the host when the storage device authenticates the request of the host, wherein after the secure mode is set, the storage device restricts an access of an unauthenticated host for setting and clearing write protection, and wherein the register comprises a secure write protection (WP) configuration masking field for controlling register fields of the register that are associated with write protection.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: April 9, 2019
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Bo-Ram Shin, Jaegyu Lee, HeeChang Cho, Wonchul Ju
  • Patent number: 10192076
    Abstract: A circuit board is protected by being enclosed in a security housing that includes conductive tamper traces running along its interior surface, the conductive tamper traces being a housing portion of a tamper detection circuit. The tamper detection circuit also includes a board portion that detect tampering with the tamper detection circuit by monitoring voltages at monitor nodes along the board portion. The board portion of the tamper detection circuit is connected to the tamper traces via multiple connector pieces. The connector pieces can be held in place by board connector piece holders affixed to the board or housing connector piece holders of the housing. When tampering is detected, it can be localized based on voltages measured at multiple recesses along the housing. The tamper detection circuit can be arranged in a wheatstone bridge layout for environmental tolerance. The circuit board's functions/components can be disabled if tampering is detected.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: January 29, 2019
    Assignee: SQUARE, INC.
    Inventor: Mani Razaghi
  • Patent number: 10169618
    Abstract: Encryption/decryption techniques for external memory are described herein. In an example embodiment, a device comprises an internal memory and an external memory controller. The internal memory is configured to store a key. The external memory controller is configured to encrypt, with the key, an address for an access operation to an external memory device to obtain an encrypted address, and to encrypt or decrypt a block of data for the access operation based on the encrypted address.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: January 1, 2019
    Assignee: Cypress Semiconductor Corporation
    Inventors: Hans Van Antwerpen, Jan-Willem van de Waerdt
  • Patent number: 10169756
    Abstract: A computer-implemented system and method includes receiving a first geographic location of a mobile device when a mobile wallet transaction is initiated, receiving a second geographic location of the mobile device after the mobile wallet transaction is initiated, comparing the first and second geographic locations to ensure a match, permitting the mobile device to process the mobile wallet transaction upon determining that the first and second geographic locations of the mobile device are within a predefined distance of each other, and transferring funds to a merchant after verifying that the second geographic location of the mobile device is within a predetermined distance of a location of the merchant.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: January 1, 2019
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Stephen M. Ellis, Michael J. Kennedy, Ashish Bhoopen Kurani, Melissa Lowry, Uma Meyyappan, Bipin M. Sahni, Nikolai Stroke
  • Patent number: 10002261
    Abstract: Various embodiments provide an input/output module, including: at least one input/output port for the input of data; a signature generator that is coupled to the input/output port and is set up to generate a signature for the data from the data; a reference input, wherein the reference input is set up for the application of a reference signature; and a comparator that is coupled to the signature generator and to the reference input, and is set up to output an alarm signal if the signature of the data on the input/output port differs from the reference signature.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: June 19, 2018
    Assignee: Infineon Technologies AG
    Inventors: Marcus Janke, Peter Laackmann
  • Patent number: 9755649
    Abstract: A method for protecting an integrated circuit device against security violations includes monitoring a component of the integrated circuit device for security violations. A security violation of the component of the integrated circuit device is then identified. The component of the integrated circuit device is then internally destroyed in response to the identified security violation by providing current to the component beyond a tolerable limit of the component.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: September 5, 2017
    Assignee: XILINX, INC.
    Inventors: Richa Singhal, Edmond Jordan, Ahmad R. Ansari
  • Patent number: 9734342
    Abstract: Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a database, e.g. to a user PC on which said content of a copy protected audio CD cannot be accessed, the following steps are performed: receiving a serial code of a set of serial codes assigned to said data set, verifying of said received serial code, in case of a positive verification, accessing said data set correspond to said received and positively verified serial code from said database and outputting of at least parts of said accessed data.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: August 15, 2017
    Assignee: SONY DADC AUSTRIA AG
    Inventors: Gerfried Ranner, Reinhard Blaukovitsch
  • Patent number: 9730315
    Abstract: A circuit board is protected by being enclosed in a security housing that includes conductive tamper traces running along its interior surface, the conductive tamper traces being a housing portion of a tamper detection circuit. The tamper detection circuit also includes a board portion that detect tampering with the tamper detection circuit by monitoring voltages at monitor nodes along the board portion. The board portion of the tamper detection circuit is connected to the tamper traces via multiple connector pieces. The connector pieces can be held in place by board connector piece holders affixed to the board or housing connector piece holders of the housing. When tampering is detected, it can be localized based on voltages measured at multiple recesses along the housing. The tamper detection circuit can be arranged in a wheatstone bridge layout for environmental tolerance. The circuit board's functions/components can be disabled if tampering is detected.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: August 8, 2017
    Assignee: SQUARE, INC.
    Inventor: Mani Razaghi
  • Patent number: 9684794
    Abstract: The present invention relates to a system and architecture for securing otherwise unsecured computer subsystems. According to one aspect, the invention provides an independent hardware platform for running software in a secure manner. According to another aspect, the invention provides the means to control and secure all disk, network and other I/O transactions. According to still further aspects, the invention provides a means to monitor and prevent unauthorized user and malicious software activity Additional aspects include providing a secure platform for device and user authentication as well as encryption key management, providing a means to perform background backup snapshots, and providing the means for enabling full management over computer operations.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: June 20, 2017
    Assignee: JANUS TECHNOLOGIES, INC.
    Inventors: Sofin Raskin, Michael Wang, Joshua Porten, Shaoan Chin
  • Patent number: 9626531
    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for secure control of access control enablement and activation on self-encrypting storage devices. In some embodiments, the device may include a non-volatile memory (NVM) and a secure access control module. The secure access control module may include a command processor module configured to receive a request to enable access controls of the NVM from a user, and to enable the access controls. The secure access control module may also include a verification module configured to verify a physical presence of the user. The secure access control module may further include an encryption module to encrypt at least a portion of the NVM in response to an indication of success from the verification module.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: April 18, 2017
    Assignee: Intel Corporation
    Inventors: Shankar Natarajan, Jason Cox, Charles B. Foster, Hinesh K. Shah
  • Patent number: 9449648
    Abstract: A program product, a graphical user interface, a computer system including such a graphical user interface and method for replacing a first version of an audio and/or video section having a first length by selecting a second version of an audio and/or video section having a second length are described. Such a method comprises selecting the first version having the first length, displaying a first indication showing that the first version is selected, opening a menu associated with the first version offering at least the second version as an alternative to replace the first version, selecting the second version in the menu to replace the first version and displaying a second indication showing that the second version is selected. The second indication replaces the first indication. Some implementations may facilitate replacing one section or piece of audio or video data by another.
    Type: Grant
    Filed: August 6, 2007
    Date of Patent: September 20, 2016
    Assignee: APPLE INC.
    Inventors: Ole Lagemann, John Danty, Jan-Hinnerk Helms, Gerhard Lengeling, Alexander Soren
  • Patent number: 9323957
    Abstract: An apparatus includes a mesh block, a first number generator configured to generate a first number, a second number generator configured to generate a second number, and a comparator block configured to compare the first number with the second number and generate an output signal from the mesh block. The output signal indicates an occurrence of an unauthorized activity on the mesh block.
    Type: Grant
    Filed: February 21, 2014
    Date of Patent: April 26, 2016
    Assignee: MARVELL WORLD TRADE LTD.
    Inventors: Raj Kumar A/L Krishnasamy, Chia Chieh Thum, Moo Kit Lee
  • Patent number: 9158921
    Abstract: A processing system has a stored, encrypted data structure that is decrypted to provide verification data values. System data values are retrieved from locations distributed about a memory storing system data. The verification data values are compared with corresponding system data values to determine if a predetermined threshold of verification data values matches the system data values. The system resumes operation if the predetermined threshold is met.
    Type: Grant
    Filed: May 12, 2014
    Date of Patent: October 13, 2015
    Assignee: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Ruchika Gupta, Aneesh Bansal, Kalyana E. S. Chakravarthy, Ankit Pal
  • Patent number: 9117097
    Abstract: An electronic device includes a washer, a printed circuit board, and a screw. The printed circuit board includes a copper foil, a detecting unit and a processing unit. The copper foil comprises a plurality of electrical signal interfaces surrounding a first via defined in the copper foil. The washer defines a second via and includes a transmission metal. The screw combines the printed circuit board and the washer through the second via and the first via. The detecting unit stores an original logic level signal, and detects logic level signals of the electrical signal interfaces in real-time. The processing unit compares the original logic level signal and the detected logic level signal, to determine whether the electronic device is disassembled. If the electronic device is disassembled, the electronic device stops working.
    Type: Grant
    Filed: October 8, 2013
    Date of Patent: August 25, 2015
    Assignee: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: Chi-Hsin Wu, Mao-Chang Chuang
  • Patent number: 9047493
    Abstract: A method, computer program product, and computing system for receiving an unsecure data portion for storage within a storage system. The unsecure data portion is stored within a temporary storage device. The unsecure data portion is processed to produce a secure data portion via a processor included within a first controller card included within the storage system. The secure data portion is stored on a persistent storage device via a second controller card.
    Type: Grant
    Filed: June 30, 2012
    Date of Patent: June 2, 2015
    Assignee: EMC Corporation
    Inventor: Amnon Izhar
  • Patent number: 8909942
    Abstract: A secure data storage system includes a mechanism that can be activated to inhibit access to stored data. In one embodiment, access to stored data can be prevented without having to erase or modify such data. An encryption key, or data used to generate the encryption key, is stored in an MRAM module integrated within the data storage system. The data storage system uses the encryption key to encrypt data received from a host system, and to decrypt the encrypted data when it is subsequently read by a host system. To render the stored data inaccessible, an operator (or an automated process) can expose the MRAM module to a magnetic field of sufficient strength to erase key data therefrom.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: December 9, 2014
    Assignee: Western Digital Technologies, Inc.
    Inventors: Dmitry S. Obukhov, Afshin Latifi, Justin Jones
  • Patent number: 8890720
    Abstract: A light guide is provided for illuminating innumerable constructions, but which is ideally suited for illuminating the keys of a keyboard. The light guide includes a translucent planar plate having a top, a bottom and sides. Further, the light guide includes one or more cavities which project upwardly into the translucent plate from its bottom surface. The cavities are hollow or filled with a translucent material so that the translucent plate and the one or more cavities form translucent interfaces where the cavities interface with the plate. The light guide also includes a reflector which covers the plate bottom and cavity openings.
    Type: Grant
    Filed: January 12, 2012
    Date of Patent: November 18, 2014
    Inventors: Michael Shipman, David G. Duckworth
  • Patent number: 8861728
    Abstract: The present disclosure relates to integrated circuits having tamper detection and response devices and methods for manufacturing such integrated circuits. One integrated circuit having a tamper detection and response device includes at least one photovoltaic cell and at least one memory cell coupled to the at least one photovoltaic cell. When the at least one photovoltaic cell is exposed to radiation, the at least one photovoltaic cell generates a current that causes an alteration to a memory state of the at least one memory cell. Another integrated circuit having a tamper detection and response device includes at least one photovoltaic cell and a reactive material coupled to the at least one photovoltaic cell, wherein a current from the at least one photovoltaic cell triggers an exothermic reaction in the reactive material.
    Type: Grant
    Filed: October 17, 2012
    Date of Patent: October 14, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jack O. Chu, Gregory M. Fritz, Harold J. Hovel, Young-Hee Kim, Dirk Pfeiffer, Kenneth P. Rodbell
  • Patent number: 8848908
    Abstract: An image processing apparatus includes a determination unit configured to determine whether secret information that should not be transmitted to a web server is contained in an HTML file provided by a web server. A web browser does not transmit the secret information determined by the determination unit to the web server. A job control unit executes a device function using the secret information that is not transmitted to the web server according to determination by the determination unit.
    Type: Grant
    Filed: July 16, 2010
    Date of Patent: September 30, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kousuke Nakashima
  • Patent number: 8772653
    Abstract: An encryption keyboard is provided, especially an encryption keyboard including a front spying and detecting protection system. The encryption keyboard comprises a panel and a main control panel. A sealed flexible printed circuit board (PCB) is set between the panel and the main control panel. A circuit for preventing from spying and detecting is set in the sealed flexible circuit. The circuit for preventing from spying and detecting is connected to the surface of the sealed flexible circuit through a circuit pin, and is connected electrically to the control circuit of the main control panel for realizing a self-destroyed function through the circuit pin. The keyboard also includes a split style key grain, which comprises a keycap and a press post. The keycap comprises a cap top and an admission space which is positioned on the undersurface of the cap top and includes a downward opening.
    Type: Grant
    Filed: August 19, 2010
    Date of Patent: July 8, 2014
    Assignee: GRG Banking Equipment Co., Ltd.
    Inventors: Jing He, Xiaodian Chen, Junkun Zhang, Dong Wei
  • Patent number: 8769297
    Abstract: A method is provided for utilizing a title signal contained in digital data through a comparison of the title signal to a player signal stored in a player device.
    Type: Grant
    Filed: September 8, 2003
    Date of Patent: July 1, 2014
    Assignee: Digimarc Corporation
    Inventor: Geoffrey B. Rhoads
  • Patent number: 8724814
    Abstract: A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation.
    Type: Grant
    Filed: September 26, 2011
    Date of Patent: May 13, 2014
    Assignee: BlackBerry Limited
    Inventors: Herbert A. Little, Neil P. Adams, Scott W. Totzke
  • Patent number: 8577031
    Abstract: An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a cache memory (5). Until now, it was complicated and costly to ensure the manipulation security of the modules. The function modules (2) comprise an encoding unit (6) for data encoding and decoding.
    Type: Grant
    Filed: March 10, 2005
    Date of Patent: November 5, 2013
    Assignee: Continental Automotive GmbH
    Inventors: Karl Asperger, Jochen Kiemes, Roland Lange, Andreas Lindinger, Gerhard Rombach
  • Patent number: 8555411
    Abstract: A mobile device out of range of other devices in a wireless network may be locked to provide security.
    Type: Grant
    Filed: December 23, 2003
    Date of Patent: October 8, 2013
    Assignee: Intel Corporation
    Inventor: Roger A. Hurwitz
  • Patent number: 8538891
    Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: September 17, 2013
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Carol Lee Hobson, Sohail M Hussain
  • Patent number: 8520848
    Abstract: A password management service located either on a user computer or in the cloud intercepts a user's attempt to create an account on a Web site. The user enters a sequence of a physical key combination and the service assigns a particular keyboard layout for this Web site. The service generates a password by combining the key combination with the assigned keyboard layout and returns this password to the user or to the Web site. The service stores the name of the Web site in association with the designated keyboard layout. Upon a subsequent login attempt, the service again intercepts the user's typing of the same physical key combination, generates the same password by combining the key combination with the previously assigned and stored keyboard layout, and returns the generated password to the Web site for authentication. A keyboard layout for a site may be chosen by the user, may be selected by the service, or a random layout may be generated.
    Type: Grant
    Filed: March 14, 2011
    Date of Patent: August 27, 2013
    Assignee: Trend Micro, Inc.
    Inventors: Kun-Hao Liu, Lin Hung Che, Huang Bo Ching
  • Patent number: 8503674
    Abstract: Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are intended to protect, can alternatively, or also, be protected from attackers utilizing systems and a methodology that employs a removable storage device for providing authentication factors used in the encryption and decryption processing. Cryptographic keys and protected data can alternatively, or also, be protected with a system and methodology that supports data separation on the storage device(s) of a computing device. Cryptographic keys and the data they are intended to protect can alternatively, or also, be protected employing a system and methodology of virtual compartmentalization that effectively segregates key management from protected data.
    Type: Grant
    Filed: April 28, 2011
    Date of Patent: August 6, 2013
    Assignee: Microsoft Corporation
    Inventors: Octavian T. Ureche, Innokentiy Basmov, Grigory B. Lyakhovitskiy, Stefen Thom
  • Patent number: 8484134
    Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: July 9, 2013
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Carol Lee Hobson, Sohail M Hussain
  • Publication number: 20130148804
    Abstract: An pry-proof encrypted keyboard. The encrypted keyboard comprises a keyboard panel (1), a lining board (2) assembled under the keyboard panel (1), a waterproof silicon rubber (4) and a main control panel (5). Convex rib circles (22) are provided on the circumference of the surface of the lining board (2) attached with the waterproof silicon rubber (4). The waterproof silicon rubber is extruded by the lining board (2) when the encrypted keyboard is assembled, and the thickness of corresponding waterproof silicon rubber (4) extruded by the convex rib circles (22) is less than 0.2 MM. The metallic lining to board (2) can efficiently prevent fusion attack from the lateral face of the encrypted keyboard, meanwhile two convex rib circles (22) are added on the circumference of the surface of the lining board attached with the water silicon rubber (4), so that the thickness of the waterproof silicon rubber (4) at the grooves (41) is less than 0.
    Type: Application
    Filed: July 22, 2011
    Publication date: June 13, 2013
    Applicant: GRG Banking Equipment Co., Ltd.
    Inventors: Zhulong Lin, Junkun Zhang, Jing He, Ying Han
  • Patent number: 8443458
    Abstract: An object of the present invention is to provide a mechanism for tamper detection of electronic devices (110) in closed units which is robust and low cost. The object is achieved by a method in an electronic device (110) for detecting if a cover (100) enclosing the electronic device (110) has been opened. The cover (100) comprises an enclosing assembly (250) which is adapted to fasten the cover (100) into a closed position. The electronic (device 110) comprises a non volatile memory (120). The non volatile memory (120) comprises a stored reference signature associated to the enclosing assembly (250) when the cover (100) was fastened into a closed position. The method comprises the following steps: (Creating 1003) a signature associated to the enclosing assembly (250). Comparing (1004) the created signature with the reference signature. Detecting (1007) that the cover 100 has been opened when the comparing (1004) results in a difference.
    Type: Grant
    Filed: January 16, 2008
    Date of Patent: May 14, 2013
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Dan Anders Lindqvist
  • Patent number: 8433070
    Abstract: Systems and methods are described in which both a quantum key distribution (QKD) transmitter and QKD receiver may keep both of their two-path interferometers stable, with regard to path length drift, relative to an internal reference laser are described. Systems and methods are also proposed whereby the transmitter interferometer may have only a single path (e.g., Sagnac interferometers). The systems and methods described herein may greatly improve the performance of quantum cryptographic transceivers that may make use of these systems and methods.
    Type: Grant
    Filed: May 17, 2010
    Date of Patent: April 30, 2013
    Assignee: Raytheon BBN Technologies Corp.
    Inventor: Jonathan Lenahan Habif
  • Patent number: 8347102
    Abstract: An image processing apparatus generates a password each time transmission of image data is instructed, encrypts the image data with the generated password, transmits the encrypted image data, and notifies the generated password.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: January 1, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yoshihide Terao
  • Patent number: 8340290
    Abstract: Disclosed herein is a method of securing keyboard input information by directly controlling a keyboard controller of a keyboard. The keyboard includes the keyboard controller, an interrupt controller, an input information processing module and a keyboard security module. The method includes a status information checking step of enabling the input information processing module to check status information of the keyboard controller; an interrupt inactivation step of inactivating an interrupt request function of the keyboard controller; an input information encryption step of encrypting the keyboard input information written to the keyboard input/output ports; a transfer step of transferring the encrypted input information to the keyboard security module; and an input information deletion step of deleting the keyboard input information remaining in the keyboard controller.
    Type: Grant
    Filed: October 2, 2008
    Date of Patent: December 25, 2012
    Assignee: Softcamp Co., Ltd.
    Inventor: Hong Seok Kang
  • Patent number: 8320556
    Abstract: An improved architecture is disclosed of a crypto engine, such as a Janus Crypto Engine (JCE) having a Programmable Cryptographic Channel (PCC) using a Programmable Cryptographic Processor (PCP). The architecture of the crypto engine does not require zeroizing between messages received by the PCC. Consequently, using the new architecture of the present invention, the crypto engine can allocate PCC resources based on throughput and algorithm needs, reducing latency, and employing fewer PCCs.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: November 27, 2012
    Assignee: Rockwell Collins, Inc.
    Inventors: Mark A. Bortz, David W. Jensen
  • Patent number: 8196815
    Abstract: To provide alphanumeric data, such as a PIN code, to a smart card (2) a terminal (1) is used which is capable of communicating with the smart card. The terminal comprises a keypad (4) for entering the alphanumeric data and an associated keypad matrix (5) for producing key signals, which the keypad matrix (5) is scanned for any pressed keys using a scanning sequence so as to produce key signals. To securely enter the data without the risk of the terminal intercepting them it is proposed that said scanning sequence is determined by the smart card (2). In this way, the terminal has no knowledge of the actual keys pressed and the secrecy of the alphanumeric data is ensured.
    Type: Grant
    Filed: May 28, 2004
    Date of Patent: June 12, 2012
    Assignee: NXP B.V.
    Inventors: Keith Baker, Johannes Maria Pleunis
  • Patent number: 8055901
    Abstract: A method and system for performing document image correction using a document reader is disclosed. The method includes generating a document image representative of a document having a deformation; decoding an optical pattern embedded in the document from the document image to determine an optical signature for the document; receiving document classification data associated with the optical signature; and applying an image correction technique to the document image based on the document classification data to generate a corrected document image. A document capable of being read by a document reader is also disclosed. The document includes a substrate and an optical pattern embedded on the substrate. The optical pattern is part of a background pattern printed on the substrate. The optical pattern defines an optical signature unique to the particular class of document and is associated with document classification data for the document.
    Type: Grant
    Filed: March 17, 2010
    Date of Patent: November 8, 2011
    Assignee: Scientific Games International, Inc.
    Inventors: William F. Behm, Charles F. Cassidy, Sten H. Mejenborg
  • Patent number: 7983992
    Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: July 19, 2011
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Carol Lee Hobson, Sohail M. Hussain
  • Patent number: 7937326
    Abstract: A computer-based process for product selection optimization by displaying various security features available for a security document, for evaluating the impact that the selection of one security feature has upon the selection of other features, and for optimizing the selection of each security feature or a combination of features in meeting a protection goal for the security document.
    Type: Grant
    Filed: February 20, 2002
    Date of Patent: May 3, 2011
    Assignee: The Standard Register Company
    Inventor: Dan Thaxton
  • Patent number: 7933842
    Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: April 26, 2011
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Carol Lee Hobson, Sohail M. Hussain
  • Patent number: 7913299
    Abstract: Systems, methods and computer program products for firewall use of certified binaries. Exemplary embodiments include a method including reading a plaintext component from a digital signature, searching the plaintext component for an identifier, reading in a TotalTCPIPPorts field for a total number of sockets to be opened for an application, reading in ports and descriptions for each of the ports, displaying information from the plaintext component up to a block including the identifier, the port being opened and the port description, prompting an instruction, displaying on the screen information from the plaintext component up to a block including the identifier, displaying a warning that the application is opening additional ports beyond the default number specified displaying a warning that opening the additional ports should be avoided and prompting the instruction.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: March 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Alan D. May, Jeffery A. Miller, Malissa G. Sullivan
  • Patent number: 7894624
    Abstract: The main CPU executes Fourier transform to the partial image, then performs strict spectrum analysis 1 for judging the presence/absence of data at a coordinate position designated in advance on a Fourier transform plane with high resolution for judging the presence/absence of prohibition of duplication, then judges whether duplication-prohibited data exists or not, and clears both the partial image and the document image if it is judged that duplication-prohibited data exists. If it is judged that duplication-prohibited data does not exist, the main CPU executes spectrum analysis 2 for broadly inspecting the existence of a periodic component instead of lowering the resolution from the spectrum analysis 1 and judges whether a structure other than DC component exists or not.
    Type: Grant
    Filed: June 23, 2006
    Date of Patent: February 22, 2011
    Assignees: Kabushiki Kaisha Toshiba, Toshiba Tec Kabushiki Kaisha
    Inventor: Haruko Kawakami
  • Patent number: 7879111
    Abstract: Network registration for a device is achieved by providing the device with an RFID chip bearing a MAC address, cryptographic capabilities and keys, and then disposing the device near a registration server (such as a home network server/server TV) to cause the information on the RFID chip to be automatically transferred to the server and thus execute registration of the device on the network automatically, relieving a person from having to enter long strings of numbers.
    Type: Grant
    Filed: November 2, 2006
    Date of Patent: February 1, 2011
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventors: Robert Hardacker, Edgar Allan Tu
  • Patent number: 7873580
    Abstract: An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: January 18, 2011
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Carol Lee Hobson, Sohail M. Hussain
  • Patent number: RE44697
    Abstract: An encryption chip is programmable to process a variety of secret key and public key encryption algorithms. The chip includes a pipeline of processing elements, each of which can process a round within a secret key algorithm. Data is transferred between the processing elements through dual port memories. A central processing unit allows for processing of very wide data words from global memory in single cycle operations. An adder circuit is simplified by using plural relatively small adder circuits with sums and carries looped back in plural cycles. Multiplier circuitry can be shared between the processing elements and the central processor by adapting the smaller processing element multipliers for concatenation as a very wide central processor multiplier.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: January 7, 2014
    Assignee: Mosaid Technologies Incorporated
    Inventors: David E. Jones, Cormac M. O'Connell