Tamper Resistant Patents (Class 713/194)
-
Patent number: 12254105Abstract: Systems and methods for detecting interception devices. In some aspects, the system causes transmission of a first detection signal. Based on receiving a first response signal, the system determines a first probability of detection of a first interception device. Based on the first probability of detection, the system transmits a first command to deactivate a user authentication interface. The system may cause transmission of a second detection signal and determine a second probability of detection of a second interception device. In response to the second probability, the system may transmit a second command to reactivate the user authentication interface.Type: GrantFiled: November 6, 2023Date of Patent: March 18, 2025Assignee: Capital One Services, LLCInventors: Michael James Kidd, Stephen Young, Charles Lawson
-
Patent number: 12166868Abstract: An exemplary embodiment of the present disclosure provides a physically unclonable function (PUF) cell capable of exhibiting a stable performance and showing an excellent repeatability while being less affected by environmental factors such as a noise, temperature, and bias voltage. The PUF cell generates an output value by combining a scheme of amplifying a threshold voltage difference and a scheme of amplifying an oscillation frequency difference. In an oscillator that generates oscillation signals of different frequencies, the frequency difference of the oscillation signals is amplified by alternately supplying bias voltages of different magnitudes generated by utilizing the threshold voltage difference to a plurality of stages in the oscillator.Type: GrantFiled: May 4, 2022Date of Patent: December 10, 2024Assignee: POSTECH RESEARCH AND BUSINESS DEVELOPMENT FOUNDATIONInventors: Jae Han Park, Jae Yoon Sim
-
Patent number: 12130818Abstract: Provided are a data management apparatus, a data management system, and a data management method capable of creating an alternative for a useful query when a query for operating a database violates a data handling regulation of the database. When data scheduled to be generated based on the database by the query violates a rule that is the data handling regulation of the database, a data processing server generates an alternative query candidate to replace the query. The data processing server determines whether the alternative query candidate violates the rule by determining whether data scheduled to be generated based on the database by the alternative query candidate complies with the rule. When the alternative query candidate does not violate the rule, the data processing server proposes the alternative query candidate as an alternative query.Type: GrantFiled: June 30, 2023Date of Patent: October 29, 2024Assignee: HITACHI, LTD.Inventors: Tianben Ding, Mika Takata, Toshihiko Kashiyama, Hiroaki Masuda
-
Patent number: 12072760Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to control execution of tasks in a computing system. The methods, apparatus, systems and articles of manufacture include at least one storage device and at least one processor to, execute instructions to at least obtain a request to perform an inverse operation on a data flow, the data flow previously transformed during a forward operation, determine a first processor core that executed the forward operation, the data flow including an identifier of the first processor core, and transmit the data flow to a second processor core to perform the inverse operation.Type: GrantFiled: December 23, 2020Date of Patent: August 27, 2024Assignee: Intel CorporationInventors: Andrew Cunningham, Patrick Fleming, Naveen Lakkakula, Richard Guerin, Charitra Sankar, Stephen Doyle, Ralph Castro, John Browne
-
Patent number: 12073007Abstract: Computer server device (690) comprising a server control unit (600) and at least one physical connectors (605) for respective physical tamper-protected computer modules (80), which tamper-protected computer modules (SO) each comprises a respective tamper-protected enclosure (162), a respective module control unit and a respective information processing module (128), which module control unit and information processing module (128) are both entirely enclosed by said tamper-protected enclosure (162) in question.Type: GrantFiled: September 17, 2018Date of Patent: August 27, 2024Assignee: Private Machines Inc.Inventor: Radu Sion
-
Patent number: 12032486Abstract: In one embodiment, a processor includes circuitry to decode an instruction referencing an encoded data pointer that includes a set of plaintext linear address bits and a set of encrypted linear address bits. The processor also includes circuitry to perform a speculative lookup in a translation lookaside buffer (TLB) using the plaintext linear address bits to obtain physical address, buffer a set of architectural predictor state values based on the speculative TLB lookup, and speculatively execute the instruction using the physical address obtained from the speculative TLB lookup. The processor also includes circuitry to determine whether the speculative TLB lookup was correct and update a set of architectural predictor state values of the core using the buffered architectural predictor state values based on a determination that the speculative TLB lookup was correct.Type: GrantFiled: December 23, 2021Date of Patent: July 9, 2024Assignee: Intel CorporationInventors: Abhishek Basak, Santosh Ghosh, Michael D. LeMay, David M. Durham
-
Patent number: 12019789Abstract: A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program.Type: GrantFiled: April 7, 2023Date of Patent: June 25, 2024Assignee: Panasonic Holdings CorporationInventors: Hideki Matsushima, Teruto Hirota, Yukie Shoda, Shunji Harada
-
Patent number: 12010247Abstract: Methods, computer programs, and registration authority modules for implementing a butterfly key expansion scheme. The method includes receiving a public caterpillar signing key of a private/public caterpillar signing key pair and a first pseudorandom function from a requesting device; expanding the public caterpillar signing key into public cocoon signing keys using the first pseudorandom function; generating certificate signing requests based on the public cocoon signing keys; sending the certificate signing requests to a certificate authority module; receiving signed pseudonym certificates from the certificate authority module; and encrypting the signed pseudonym certificates to generate response packages.Type: GrantFiled: May 14, 2020Date of Patent: June 11, 2024Assignee: VOLKSWAGEN AKTIENGESELLSCHAFTInventor: Benedikt Brecht
-
Patent number: 11853440Abstract: Systems and methods for detecting interception devices. In some aspects, the system causes transmission of a first detection signal. Based on receiving a first response signal, the system determines a first probability of detection of a first interception device. Based on the first probability of detection, the system transmits a first command to deactivate a user authentication interface. The system may cause transmission of a second detection signal and determine a second probability of detection of a second interception device. In response to the second probability, the system may transmit a second command to reactivate the user authentication interface.Type: GrantFiled: January 11, 2023Date of Patent: December 26, 2023Assignee: Capital One Services, LLCInventors: Michael James Kidd, Stephen Young, Charles Lawson
-
Patent number: 11823183Abstract: Example implementations include a method for using tokens between two entities including a client device and a server, by generating, by a first one-way function of the client device, a first intermediate value from a transaction count corresponding to a number of transactions involving an original data, the first intermediate value being unique to a first verification transaction at a server, generating, by a second one-way function of the client device, a second intermediate value from the first intermediate value, the second intermediate value being unique to a second verification transaction at the server, sending, by the client device, a first token based on the first intermediate value to the server to execute the first verification transaction, and sending, by the client device, a second token based on the second intermediate value to the server to execute the second verification transaction.Type: GrantFiled: July 19, 2021Date of Patent: November 21, 2023Assignee: Wells Fargo Bank, N.A.Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 11765200Abstract: Methods, a user data node (120), a policy node (150), an application node (170) and an operator network (101) for enabling management of an attack towards an application (190) hosted by the application node (170) are disclosed. The policy node (150) receives (3) attack information and an identifier of the application (190) to which the attack information applies. The attack information relates to the management of the attack and the attack information comprises a type of attack, a set of detection conditions relating to detection of attacks of the type of attack, and a mitigation action to be invoked when at least one detection condition of the set of detection conditions is fulfilled. In this manner, degeneration of the application (190) caused by the attacks of the type of attack is mitigatable. The policy node (150) generates (13) at least one rule based on the attack information.Type: GrantFiled: August 15, 2018Date of Patent: September 19, 2023Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Javier Campo Trapero, Miguel Angel Muñoz De La Torre Alonso, Franco Foresti, Rodrigo Alvarez Dominguez
-
Patent number: 11709972Abstract: A substrate for a tamper sensor includes a plurality of walls and a tab. The walls define a protective volume with an open side. The walls have a plurality of open edges adjacent the open side and a plurality of interior edges different from the open edges. The tab extends from one of the interior edges of one of the walls and is disposed within the protective volume.Type: GrantFiled: February 21, 2020Date of Patent: July 25, 2023Assignee: TE CONNECTIVITY SOLUTIONS GMBHInventors: Anthony Ball, Kenneth Jermstad, Michael Ritchie, Marcus Updyke
-
Patent number: 11698972Abstract: In general, embodiments of the invention relate to implementing a secure boot process in information handling systems that supports both an external root of trust (eRoT) and an internal root of trust (RoT). Further, embodiments of the invention relate to binding a management controller to a specific chassis and, in the case where the eRoT is used, to an eRoT. When the management controller and the chassis are provisioned according to one or more embodiments of the invention, security checks may be performed by management controller executing an initial program loader (IPL) using the aforementioned bindings. If the bindings are not present or do not match, then the boot process halts and the user is unable to use the information handling system.Type: GrantFiled: July 22, 2021Date of Patent: July 11, 2023Assignee: Dell Products L.P.Inventors: Eugene David Cho, Marshal F. Savage
-
Patent number: 11595192Abstract: A Computing environment is described to enable an information handling system (IHS) to receive a public encryption key from another IHS; and decrypt with a public encryption key one or more encrypted symmetric encryption keys, encrypted via a private encryption key, to obtain one or more symmetric encryption keys respectively associated with one or more memory address ranges. The IHS may physically receive a memory device that was utilized by the other IHS to store information in an encrypted fashion. The IHS may further decrypt, with a first encryption key of the one or more symmetric encryption keys associated with a first address range of the one or more address ranges, first encrypted data stored by the at least one non-volatile memory medium to obtain first data.Type: GrantFiled: April 24, 2020Date of Patent: February 28, 2023Assignee: Dell Products L.P.Inventors: Smruti Ranjan Debata, Ravishankar N. Kanakapura, Yogesh Prabhakar Kulkarni
-
Patent number: 11585854Abstract: Circuits and methods involve an integrated circuit (IC) device, a plurality of application-specific sub-circuits, and a plurality of instances of a measuring circuit. The application-specific sub-circuits are disposed within respective areas of the IC device. Each instance of the measuring circuit is associated with one of the application-specific sub-circuits and is disposed within a respective one of the areas of the device. Each instance of the measuring circuit further includes a ring oscillator and a register for storage of a value indicative of an interval of time. Each instance of the measuring circuit is configured to measure passage of the interval of time based on a first clock signal, count oscillations of an output signal of the ring oscillator during the interval of time, and output a value indicating a number of oscillations counted during the interval of time.Type: GrantFiled: August 22, 2018Date of Patent: February 21, 2023Assignee: XILINX, INC.Inventors: Da Cheng, Nui Chong, Amitava Majumdar, Ping-Chin Yeh, Cheang-Whang Chang
-
Patent number: 11586728Abstract: Embodiments of a method, an IC device, and a circuit board are disclosed. In an embodiment, the method involves at an IC device of the system, monitoring activity on a bus interface of the IC device, wherein the bus interface is connected to a bus on the system that communicatively couples the IC device to at least one other IC device on the system, applying machine learning to data corresponding to the monitored activity to generate an activity profile, monitoring subsequent activity on the bus interface of the IC device, comparing data corresponding to the to subsequently monitored activity to the machine learning generated activity profile to determine if a system-level Trojan is detected, and generating a notification when it is determined from the comparison that a system-level Trojan has been detected.Type: GrantFiled: June 7, 2019Date of Patent: February 21, 2023Assignee: NXP B.V.Inventor: Jan-Peter Schat
-
Patent number: 11575691Abstract: Systems, methods, and computer-readable storage media for improved data comparison, particularly when scanning large amounts of data for particular conditions or configurations. With respect to cyber-security, this improvement takes the form of receiving a plurality of threat conditions for cyber threats against a networked computer device; identifying commonalities among the plurality of threat conditions by comparing each threat condition in the plurality of threat conditions against the plurality of threat conditions; generating, based on the commonalities, a hierarchy for scanning of the cyber threats; and scanning for the cyber threats according to the hierarchy.Type: GrantFiled: November 25, 2020Date of Patent: February 7, 2023Assignee: TRINITY CYBER, LLCInventors: Stephen Ryan, Stefan Baranoff, John Searles
-
Patent number: 11570003Abstract: Bitcoins and the underlying blockchain technology are one of the main innovations in building decentralized applications. The effects of quantum computing on this technology are analyzed in general. Provided herein are effective solutions to address security vulnerabilities in a blockchain-based system that can be exploited by a quantum attacker.Type: GrantFiled: October 4, 2018Date of Patent: January 31, 2023Inventor: Jintai Ding
-
Patent number: 11501294Abstract: A method for providing graphic code information is implementable by a device comprising a first module, a second module, and an interface module. The method comprises: the second module verifying through the interface module whether the first module is a trusted module; the second module receiving target user information through the interface module and verifying whether the target user information is in a logged-in state on the second module, wherein the target user information is pre-associated with the interface module; and after verifying that the first module is a trusted module and the target user information is in the logged-in state on the second module, the second module generating graphic code information and transmitting the graphic code information to the first module through the interface module.Type: GrantFiled: January 14, 2019Date of Patent: November 15, 2022Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: JiaJia Li, Xiaokai Zhou
-
Patent number: 11502744Abstract: The present disclosure provides methods operable in a balloon network. The method can include determining that a balloon is at a location associated with a legally-defined geographic area. An area profile of the legally-defined geographic area may identify geographically-restricted data that must not be removed from the legally-defined geographic area. The method can also include determining that the balloon contains at least some of the geographically-restricted data. The method can also include determining that the balloon is likely to move out of the legally-defined geographic area. The method can also include removing the geographically-restricted data from the memory of the balloon.Type: GrantFiled: April 2, 2021Date of Patent: November 15, 2022Assignee: SoftBank Corp.Inventor: Eric Teller
-
Patent number: 11496314Abstract: Embodiments are directed to providing integrity-protected command buffer execution. An embodiment of an apparatus includes a computer-readable memory comprising one or more command buffers and a processing device communicatively coupled to the computer-readable memory to read, from a command buffer of the computer-readable memory, a first command received from a host device, the first command executable by one or more processing elements on the processing device, the first command comprising an instruction and associated parameter data, compute a first authentication tag using a cryptographic key associated with the host device, the instruction and at least a portion of the parameter data, and authenticate the first command by comparing the first authentication tag with a second authentication tag computed by the host device and associated with the command.Type: GrantFiled: December 18, 2019Date of Patent: November 8, 2022Assignee: INTEL CORPORATIONInventors: Pradeep M. Pappachan, Reshma Lal
-
Patent number: 11487869Abstract: An apparatus, method, and computer program product are provided for encrypting a function symbol with relocation. The apparatus includes a compiler module, a static linker module, and an encryptor module. The compiler module inserts sequences of instructions to decrypt function symbols to be randomized at runtime before indirect function calls. The compiler module inserts an instruction sequence at compile time to encrypt an operand register that receives a local function symbol in position-independent code (PIC), where a call or store instruction uses the register as an operand. The static linker module inserts an encoding section at link time. The encoding section includes two columns representing the sizes of function symbols in bits or bytes and the locations storing the function symbols to be encrypted at runtime. The encryptor module encrypts at runtime the function symbols whose sizes and stored memory locations are identified in the encoding section.Type: GrantFiled: January 11, 2021Date of Patent: November 1, 2022Assignee: Zeus SW Defender, LLCInventors: Changwoo Pyo, Hyungyu Lee, Kyungtae Kim, Gyungho Lee
-
Patent number: 11480614Abstract: The present disclosure describes exemplary methods and systems that are applicable for hardware authentication, counterfeit detection, and in-field tamper detection in both printed circuit board and/or integrated circuit levels by utilizing random variations in boundary-scan path delay and/or current in the industry-standard JTAG-based design-for-test structure to generate unique device identifiers.Type: GrantFiled: November 13, 2020Date of Patent: October 25, 2022Assignee: University of Florida Research Foundation, Inc.Inventors: Swarup Bhunia, Shubhra Deb Paul
-
Patent number: 11403372Abstract: Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data that is not source code are disclosed. Exemplary implementations may: receive source code of a computer program; parse the source code; extract the control flow of the source code; represent at least a portion of the control flow as a control flow model using a mathematical modeling language; store the control flow model as control flow data that represents the control flow of the program and is not executable code; and remove the at least a portion of the control flow from the source code, to thereby obfuscate the control flow of the source code and render the source code more resistant to tampering.Type: GrantFiled: January 29, 2019Date of Patent: August 2, 2022Assignee: Irdeto Canada CorporationInventors: Robert Durand, Andrew Hoyt
-
Patent number: 11392496Abstract: Provided is a memory management system that efficiently protects data in a cache memory adopting a virtual address cache method. The memory management system includes a cache memory that temporarily stores data for which memory access is requested by a processor core; a state storage unit that stores a security state communicated simultaneously with the memory access request from the processor core; and a memory management unit that manages access to a main memory. In a case where there is a change in the security state when memory access is requested by the processor core, a cache flush is performed for a cache line that hits the request.Type: GrantFiled: November 21, 2018Date of Patent: July 19, 2022Assignee: SONY CORPORATIONInventor: Mamun Kazi
-
Patent number: 11373011Abstract: A security module is disclosed. In embodiments, the security module includes a common host platform configured to co-host a plurality of certified functions via a plurality of interconnected hardware resources. The common host platform may be configured to host a first certified function independently certified via a first certifying authority, and a second certified function independently certified via a second certifying authority. The first certified function may be hosted on a first sub-set of dedicated hardware resources and a first sub-set of shared hardware resources. The second certified function may hosted on a second sub-set of dedicated hardware resources and the first sub-set of shared hardware resources including one or more hardware resources shared with the first certified function.Type: GrantFiled: July 1, 2019Date of Patent: June 28, 2022Assignee: Rockwell Collins, Inc.Inventors: James A. Marek, Sarah A. Miller, Adriane R. Van Auken
-
Patent number: 11372893Abstract: A method and architecture allow labeled data to be initialized and curated by the use of label propagation, clustering and creation of dedicated classifiers for each dataset. These dedicated classifiers are retrained as the dataset grows and ensure that each dataset is kept free from outliers and noise.Type: GrantFiled: June 1, 2018Date of Patent: June 28, 2022Assignee: NTT SECURITY HOLDINGS CORPORATIONInventors: Daniel Dalek, Himanshu Sinha, Josefin Axberg
-
Patent number: 11366899Abstract: A secure Integrated Circuit (IC) includes functional circuitry, and protection circuitry configured to protect the functional circuitry against fault-injection attacks. The protection circuitry includes a plurality of digital detection cells, and protection logic. The detection cells have respective inputs and outputs and are connected output-to-input in at least a chain. In response to a fault-injection attack, a given detection cell in the chain is configured to toggle an output that drives an input of a subsequent detection cell in the chain, thereby causing a pulse to propagate along the chain. The protection logic is configured to receive the pulse from the chain and initiate a responsive action.Type: GrantFiled: February 18, 2020Date of Patent: June 21, 2022Assignee: NUVOTON TECHNOLOGY CORPORATIONInventors: Yuval Kirschner, Ziv Hershman, Tamir Golan
-
Patent number: 11354218Abstract: Provided is a system and method for generating a subset of optimal variations of a software program which allow some statements of the control flow to be exposed to side channels. Furthermore, the subset of optimal variations may be selected based on a security and a performance trade-off analysis. In one example, the method may include identifying a set of statements within a control flow of a software program, generating a plurality of variations of the software program which comprise different subsets of statements which are exposed to side channels, respectively, determining one or more pareto-optimal variations of the software program based on side channel leakage values and performance values of the plurality of variations of the software program, and outputting information about the one or more pareto-optimal variations of the software program to a user device.Type: GrantFiled: May 6, 2020Date of Patent: June 7, 2022Assignee: SAP SEInventors: Andreas Fischer, Jonas Janneck, Joern Kussmaul, Nikolas Kraetzschmar, Florian Kerschbaum
-
Patent number: 11349635Abstract: Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.Type: GrantFiled: October 8, 2019Date of Patent: May 31, 2022Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Yann Yves Rene Loisel, Frank Lhermet
-
Patent number: 11321426Abstract: A computer-implemented method of providing limited distribution of a digital media file, the method being executable at a server connected to a network, the server comprising memory. The method includes receiving the digital media file to be distributed; encrypting the digital media file to create an encrypted digital media file; creating a plurality of copies of the encrypted digital media file; creating a plurality of rights tokens, a quantity of the rights tokens being equal to a quantity of copies of the encrypted digital media file, each rights token containing: a key for decrypting a corresponding one of the plurality of copies of the encrypted digital media file, and identifying information related to access rights for the digital media file; and recording the rights tokens to a rights blockchain representative of actions related to distribution of the plurality of copies of the encrypted the digital media file.Type: GrantFiled: February 22, 2018Date of Patent: May 3, 2022Assignee: SCENAREX INC.Inventor: Simon-Pierre Marion
-
Patent number: 11314861Abstract: The present disclosure is directed to systems and methods of selectively implementing SCA mitigation elements on a per-thread basis to mitigate the effects of side channel attacks. Processor core circuits initiate a plurality of processor threads. Each of a plurality of SCA mitigation features include one or more SCA mitigation elements. SCA mitigation control circuitry associates a register circuit with each respective one of the plurality of processor threads initiated by the processor core circuits. The SCA mitigation control circuitry selectively ENABLES/DISABLES one or more SCA mitigation elements for each of the plurality of processor threads. The ENABLEMENT/DISABLEMENT of each of the SCA mitigation elements may be autonomously adjusted by the SCA mitigation control circuitry and/or manually adjusted via one or more user inputs provided to the SCA mitigation control circuitry.Type: GrantFiled: September 26, 2019Date of Patent: April 26, 2022Assignee: Intel CorporationInventors: Ke Sun, Kekai Hu, Henrique de Medeiros Kawakami, Rodrigo Branco
-
Patent number: 11301592Abstract: A processing module of a dispersed storage network determines an obfuscation method is determined from a plurality of obfuscation methods for a data segment. The method continues with the processing module obfuscating the data segment according to the obfuscation method to produce an obfuscated data segment. The obfuscated data segment is encrypted and dispersed storage error encoded to produce a set of encoded data slices. The set of encoded data slices is then transmitted for storage in the dispersed storage network.Type: GrantFiled: November 6, 2017Date of Patent: April 12, 2022Assignee: PURE STORAGE, INC.Inventors: S. Christopher Gladwin, Jason K. Resch, Thomas F. Shirley, Jr.
-
Patent number: 11288405Abstract: An IC comprising functional circuit to perform primary functions of the IC is provided. The functional circuit is to enable electrical signals to propagate through it within a timing constraint of the functional circuit. The IC comprises at least one canary circuit used for detecting glitch attacks on the circuit. Electrical signals are to propagate through the canary circuit(s) within a defined timing constraint of the canary circuit(s). The canary circuit is to provide a signal path designed such that in the event of a timing constraint of the functional circuit(s) is violated due to a glitch attack, also the timing constraint of the canary circuit(s) is violated.Type: GrantFiled: October 25, 2018Date of Patent: March 29, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Pierre Belgarric, David Plaquin, Eugene Cohen, Chris R. Gunning
-
Patent number: 11288212Abstract: A Key-Value Solid State Drive (KV-SSD) is disclosed. The KV-SSD may include storage for data. The data may include a data value encrypted using an object encryption key. The data value may be associated with an object key: the data value and the object key forming an object. A user secure object map may map the object key to a hash value. A secure key share table may map the hash value to the object encryption key. A dedup map may map the hash value to an address where the data value is stored on the KV-SSD.Type: GrantFiled: April 10, 2020Date of Patent: March 29, 2022Inventor: Yang Seok Ki
-
Patent number: 11283632Abstract: The integrated circuit includes a CPU configured to operate according to a program, a PUF information output unit configured to output PUF information while power is being supplied, a key pair output unit configured to output a public key and a private key based on the PUF information while power is being supplied, a public key transmitter configured to transmit the public key output from the key pair output unit to the outside, and a shared encryption key decryption unit configured to decrypt encrypted information produced through encryption with the public key and received from the outside with the private key output from the key pair output unit.Type: GrantFiled: December 21, 2018Date of Patent: March 22, 2022Assignee: MITSUBISHI HEAVY INDUSTRIES, LTD.Inventors: Etsuji Nishimae, Fumikado Anzai, Naruhisa Kameo
-
Patent number: 11250171Abstract: A tamper sensor assembly includes a lid having a surface and a sensor substrate on the surface of the lid. The sensor substrate has conductive lines that extend across at least a major portion of the surface of the lid and conform to three dimensional characteristics of the surface of the lid. The security processor is electrically connected to the conductive lines of the sensor substrate and is configured to identify occurrence of tampering with the lid based on an electrical characteristic of signals conducted through the conductive lines, and to perform an anti-tampering operation responsive to identifying occurrence of tampering.Type: GrantFiled: January 21, 2020Date of Patent: February 15, 2022Assignee: Thales eSecurity, INC.Inventors: Timothy E. Cook, Gerald Thomas Wardrop, Jr.
-
Patent number: 11232210Abstract: A direct-attached storage device bridge includes boot loader logic, a read-only memory, and logic to generate hash codes to be compared to determine whether to proceed with booting of the device. The hash codes may result from applying a public key from the read-only memory to decrypt an encrypted hash code into a decrypted hash code, to decrypt encrypted firmware instructions and to calculate a first calculated hash code of the decrypted firmware instructions, and to calculate a second calculated hash code for firmware instructions stored as clear-text. Multiple public keys may be utilized and selected during the boot process. The encryption and decryption may utilize asymmetric and symmetric keys.Type: GrantFiled: March 26, 2019Date of Patent: January 25, 2022Assignee: Western Digital Technologies, Inc.Inventor: Tino Lin
-
Patent number: 11232224Abstract: The present approaches generally relate to the encryption of data within a database in such a way that the encrypted data may still be easily accessed and utilized by an application. The present approach provides the ability to encrypt and decrypt data at an application layer though the data remains in an encrypted state at the database layer and when in transit.Type: GrantFiled: March 15, 2018Date of Patent: January 25, 2022Assignee: ServiceNow, Inc.Inventors: Timothy Yim, Herman Knief, James David Wigdahl
-
Patent number: 11204985Abstract: Systems, methods, and storage media for rendering target code are disclosed. Exemplary implementations may: receive the input code; apply at least one obfuscation transformation to multiple code functions of the input code to create transformed code including transformed code functions; determine a shared constant; determine a function-expression; and replace, for each transformed code function in the transformed code, the transformation parameters with the function expression and the at least one cloaked constant to create target code in which the transformed code functions are entangled to thereby render the target code protected against static analysis attacks.Type: GrantFiled: March 31, 2020Date of Patent: December 21, 2021Assignee: Irdeto Canada CorporationInventors: Damon Peng, Grant Goodes
-
Patent number: 11188683Abstract: An apparatus for intrusion detection includes processing circuitry, a switch, signal detection circuitry, and an analog-to-digital converter (“ADC”). The processing circuitry is coupled to send a challenge signal to a device when the device is coupled to the processing circuitry. The switch is coupled to be enabled and disabled by the processing circuitry. The switch is for coupling to the device to receive a response signal in response to the challenge signal sent by the processing circuitry. The signal detection circuitry is coupled to receive the response signal in via the switch, when the processing circuitry enables the switch. The ADC is coupled to take measurements of the signal detection circuitry at a first output. The processing circuitry is coupled to the ADC and configured to analyze whether an intruder is present in the device based on the measurements of the signal detection circuitry.Type: GrantFiled: May 2, 2019Date of Patent: November 30, 2021Assignee: National Technology & Engineering Solutions of Sandia, LLCInventor: Nathan J. Edwards
-
Patent number: 11177951Abstract: This invention related to a method for provisioning a first communication device with a set of at least one credential required for accessing to a wireless network by using a second communication device provisioned with a cryptographic key K also known by the wireless network, the first communication device being associated with a certificate comprising a public key PK, said certificate being stored with an associated private key PrK in said first communication device, the method comprising the following steps: receiving by the second communication device a registration request from the first communication device in order to be provisioned with the set of at least one credential; transmitting to the wireless network by the second communication device the registration request to generate a set of at least one credential associated to the first communication device comprising at least a cryptographic key K?, the wireless network being adapted to generate a first random number R1 and a second random number R2; rType: GrantFiled: March 30, 2017Date of Patent: November 16, 2021Assignee: THALES DIS FRANCE SAInventors: Mireille Pauliac, Michel Endruschat, Ly Thanh Phan, Jean-Yves Fine
-
Patent number: 11144632Abstract: Some embodiments described herein include a method to validate supply chains for electronic devices using side-channel information in a signature analysis. The method includes sending, to a target device, a first signal associated with a set of codes to be executed by the target device, and then receiving first side-channel information associated with the target device in response to the target device executing the set of codes. The method also includes determining second side-channel information associated with a simulated device in response to the set of codes. The method further includes comparing a discriminatory feature of the first side-channel information with a discriminatory feature of the second side-channel information to determine a characteristic of the target device based on a pre-determined characteristic of the simulated device. Finally, the method includes sending, to a user interface, a second signal associated with the characteristic of the target device.Type: GrantFiled: November 21, 2019Date of Patent: October 12, 2021Assignee: Power Fingerprinting Inc.Inventors: Carlos R. Aguayo Gonzalez, Jeffrey H. Reed, Steven C. Chen
-
Patent number: 11132659Abstract: A financial transaction system includes sensors, a tamper detection module, and circuitry configurable to control which sensors are used, and the circuitry is configurable after the tamper detection module has been manufactured.Type: GrantFiled: July 14, 2015Date of Patent: September 28, 2021Assignee: Texas Instruments IncorporatedInventors: Erkan Bilhan, Rajitha Padakanti, Amritpal Singh Mundra
-
Patent number: 11070380Abstract: An authentication apparatus, included in a device supporting a network communication, includes a certificate handler that receives a certificate of an opponent and parses or verifies the certificate of the opponent. Cryptographic primitives receive an authentication request of the opponent, generate a random number in response to the authentication request, generate a challenge corresponding to the random number, and verify a response of the opponent corresponding to the challenge. A shared memory stores the parsed certificate, the random number, the challenge, and the response. An authentication controller controls the certificate handler, the cryptographic primitives, and the shared memory through a register setting, according to an authentication protocol.Type: GrantFiled: July 18, 2016Date of Patent: July 20, 2021Assignee: Samsung Electronics Co., Ltd.Inventors: Kitak Kim, Ji-Su Kang, Kiseok Bae, Jonghoon Shin, Kyoungmoon Ahn, Jinsu Hyun
-
Patent number: 11055437Abstract: Systems and methods for restricting a first computing device's output of information. The methods comprise: receiving, at the first computing device, information and at least one viewing restriction set for the information; collecting situational awareness information by the first computing device; using the situational awareness information to determine if the at least one viewing restriction is satisfied; and displaying the information on a screen of the first computing device if a determination is made that the at least one viewing restriction is satisfied or preventing the displaying of the information if a determination is made that the at least one viewing restriction is not satisfied.Type: GrantFiled: February 1, 2019Date of Patent: July 6, 2021Assignee: FLORIDA ATLANTIC UNIVERSITY BOARD OF TRUSTEESInventors: Hari Kalva, Neha Kommireddy
-
Patent number: 11042664Abstract: One embodiment provides a system that implements a 1-bit protocol for differential privacy for a set of client devices that transmit information to a server. Implementations may leverage specialized instruction sets or engines built into the hardware or firmware of a client device to improve the efficiency of the protocol. For example, a client device may utilize these cryptographic functions to randomize information sent to the server. In one embodiment, the client device may use cryptographic functions such as hashes including SHA or block ciphers including AES to provide an efficient mechanism for implementing differential privacy.Type: GrantFiled: January 17, 2020Date of Patent: June 22, 2021Assignee: Apple Inc.Inventors: Yannick L. Sierra, Abhradeep Guha Thakurta, Umesh S. Vaishampayan, John C. Hurley, Keaton F. Mowery, Michael Brouwer
-
Patent number: 11023835Abstract: Embodiments of the present invention provide a system for decommissioning information technology assets using solution data modelling. The system is typically configured for generating solution data models comprising a plurality of asset systems and a plurality of users, wherein each of the plurality of asset systems is associated with at least one user of the plurality of users and wherein at least a first of the plurality of asset systems is associated with at least a second of the plurality of asset systems, storing the solution data models in a model database, identifying at least one information technology asset for decommissioning, accessing a first solution data model associated with the at least one information technology asset, identifying one or more relationships associated with the at least one information technology asset, and decommissioning the at least one information technology asset based on the one or more relationships.Type: GrantFiled: May 8, 2018Date of Patent: June 1, 2021Assignee: BANK OF AMERICA CORPORATIONInventors: Katy Leigh Huneycutt, Richard LeRoy Hayes, Aaron Dion Kephart
-
Patent number: 11023576Abstract: An approach is provided for detecting a malicious activity on a computer system. First process trees are identified for computer processes that have been executed on a computer system. Each of the first process trees are vectorized. The vectorized first process trees are associated with respective labels. Each label represents an amount by which a respective vectorized process tree reflects the malicious activity. An artificial neural network is trained by using the vectorized first process trees and the associated labels as training input. After the training of the artificial neural network is completed, second process trees for currently executing computer processes are vectorized and provided as input vectors to the artificial neural network. Responsive to the artificial neural network providing an output indicating that a combination of the input vectors indicates the malicious activity, a remedial action is performed.Type: GrantFiled: November 28, 2018Date of Patent: June 1, 2021Assignee: International Business Machines CorporationInventors: Adam L. Griffin, Christopher D. Scott, Mary E. Rudden, Craig M. Trim, Rhonda L. Childress
-
Patent number: 11017077Abstract: A security system for vetting run-time operation of device hardware. A model stores vetted states based on device hardware security signals, a severity level value and at least one vetted next state. The vetting system compares each state of the device hardware with the vetted next states of a current state, and provides an indication and a severity level when the real next state does not match a vetted next state. In response to the indication, the synchronization system performs synchronization by comparing each subsequent real next state of the device hardware with the vetted states until initial synchronization occurs when any subsequent real next state matches a vetted state. The learning system receives feedback from the device hardware in response to the indication, and when indicated by the feedback, updates the model in accordance with the feedback.Type: GrantFiled: March 21, 2018Date of Patent: May 25, 2021Assignee: NXP USA, Inc.Inventors: Monica C. Farkash, Jayanta Bhadra, Sandip Ray, Wen Chen