Tamper Resistant Patents (Class 713/194)
-
Patent number: 8489892Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.Type: GrantFiled: March 17, 2008Date of Patent: July 16, 2013Assignee: Thomson LicensingInventors: Stephane Onno, Olivier Heen
-
Patent number: 8489901Abstract: Provided is a data acquisition module. The data acquisition module includes a memory and a controller. The controller includes an encryption module configured to encrypt information written to the memory using a key included in the controller. The key is unique to the controller. Also provided is a method for processing identification information. The method includes encrypting information with a key included in a controller and storing the encrypted information. The key is unique to the controller.Type: GrantFiled: May 5, 2008Date of Patent: July 16, 2013Assignee: Sonavation, Inc.Inventor: John Boudreaux
-
Patent number: 8488792Abstract: A wireless communications validation system comprises a validation module configured to determine an identity of an antenna disposed in a computer system and an identity of a wireless module disposed in the computer system, the validation module configured to validate permissible combination of the antenna with the wireless module.Type: GrantFiled: October 26, 2005Date of Patent: July 16, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Isaac Lagnado, Timothy Neill, Jeffrey Kevin Jeansonne, Harold S. Merkel
-
Patent number: 8490195Abstract: Method and apparatus for behavioral detection of malware in a computer system are described. In some embodiments, a request by a process executing on a computer to change time of a clock managed by the computer is detected. The process is identified as a potential threat. At least one attribute associated with the process is analyzed to determine a threat level. The request to change the time of the clock is blocked and the process is designated as a true positive threat if the threat level satisfies a threshold level.Type: GrantFiled: December 19, 2008Date of Patent: July 16, 2013Assignee: Symantec CorporationInventors: Joseph H. Chen, Jamie J. Park
-
Patent number: 8484481Abstract: A system for implementing a chip lockout protection scheme for an IC device includes an on-chip password register that stores a password externally input by a user; an on-chip security block that generates a chip unlock signal, depending on whether the externally input password matches a correct password; an on-chip false data generator; an input protection scheme configured to gate the external data inputs to functional chip circuitry upon entry of the correct password; and an output protection scheme in communication configured to steer true chip data to external outputs of the IC device upon entry of the correct password, and to steer false data generated by the false data generator to the external outputs upon entry of an incorrect password. The false generated by the false data generator is deterministic and based upon external data inputs, thereby obfuscating whether or not the correct password has been entered.Type: GrantFiled: April 21, 2010Date of Patent: July 9, 2013Assignee: International Business Machines CorporationInventors: Jesse E. Craig, Stanley B. Stanski, Scott T. Vento
-
Patent number: 8479017Abstract: Enhancing locality in a security co-processor module of a computing system may be achieved by including one or more additional attributes such as geographic location, trusted time, a hardware vendor string, and one or more environmental factors into an access control space for machine mode measurement of a computing system.Type: GrantFiled: June 21, 2010Date of Patent: July 2, 2013Assignee: Intel CorporationInventors: Vincent J. Zimmer, Michael A. Rothman, Robert C. Swanson, Palsamy Sakthikumar, Mallik Bulusu
-
Patent number: 8479018Abstract: An obfuscating apparatus creates a table for inputting the same number of arguments for multiplying and squaring operations, and sets the output values of the table so that the outputs may depend on the arguments. With regard to the squaring operations, there are added and tabulated adding operations using the arguments necessary only for the multiplications, so that the number of arguments is equal to that of the multiplication operations. The outputs depend on all the arguments, so that the presence or absence of the added arguments is unknown unlike the case in which dummy arguments that are not processed are added.Type: GrantFiled: April 27, 2007Date of Patent: July 2, 2013Assignee: Panasonic CorporationInventors: Yuichi Futa, Taichi Sato, Rieko Asai, Motoji Ohmori, Masahiro Mambo
-
Patent number: 8479022Abstract: A digital system is provided with a secure mode (3rd level of privilege) built in a non-invasive way on a processor system that includes a processor core, instruction and data caches, a write buffer and a memory management unit. A secure execution mode is thus provided on a platform where the only trusted software is the code stored in ROM. In particular the OS is not trusted, all native applications are not trusted. The secure mode is entered through a unique entry point. The secure execution mode can be dynamically entered and exited with full hardware assessment of the entry/exit conditions. A secure mode indicator is provided to tell a user of the digital system that the device is in secure mode. This indicator may be a small LED, for example. The user should not enter any secret information (password) or should not sign anything displayed on the screen if the secure mode indicator is not active.Type: GrantFiled: December 18, 2002Date of Patent: July 2, 2013Assignee: Texas Instruments IncorporatedInventors: Franck B. Dahan, Bertrand Cornillault
-
Patent number: 8473752Abstract: An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module records an encrypted log entry describing the access to the secure data. A verification module verifies the secure data is securely stored.Type: GrantFiled: March 17, 2010Date of Patent: June 25, 2013Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Howard J. Locker, David C. Challener, Mark C. Davis, Randall S. Springfield
-
Patent number: 8473749Abstract: In some embodiments, a non-transitory processor-readable medium includes code to cause a processor (e.g., on an enterprise server) to receive, from a communication device, a request for a client application, and in response to the request provision the installation file data associated with the client application to include an application token associated with the client application. The code is to cause the processor to send the installation file that includes the application token to the communication device such that the communication device uses the installation file to install the client application that authenticates to an application module using the application token extracted from the installation file.Type: GrantFiled: July 9, 2012Date of Patent: June 25, 2013Assignee: Ping Identity CorporationInventors: Paul Madsen, Brian Campbell
-
Patent number: 8468369Abstract: A system, business methodology and apparatus for facilitating controlled dissemination of digital works is disclosed. An audio and video organizer, entertainment, and communication unit that plays back audio and video media content received from a central storage server. The unit relies on a smartcard, which has a personalized key that unlocks encrypted content. Using the unit, a user can purchase music or other types of media using an appropriate ordering method. The central storage server then transmits a double-encrypted, compressed audio file to the unit, where it is decrypted based on the smartcard key, and available for listening.Type: GrantFiled: April 12, 2011Date of Patent: June 18, 2013Assignee: Qxzeb LLCInventor: Mark Nair
-
Patent number: 8464348Abstract: A computer is adapted for pay-for-use operation by adding a isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation program responsive to the clock or timer. The isolated computing environment may be protected from tampering by physical or cryptographic mechanisms, or both. The validation program measures or monitors for non-compliant states of the computer and may enforce sanctions when non-compliant states of the computer are detected.Type: GrantFiled: December 22, 2004Date of Patent: June 11, 2013Assignee: Microsoft CorporationInventors: Alexander Frank, Martin H. Hall, Thomas G. Phillips
-
Patent number: 8461863Abstract: A kill switch is provided that, when triggered, may cause the programmable logic device (PLD) to become at least partially reset, disabled, or both. The kill switch may be implemented as a fuse or a volatile battery-backed memory bit. When, for example, a security threat is detected, the switch may be blown, and a reconfiguration of the device initiated in order to zero or clear some or all of the memory and programmable logic of the PLD.Type: GrantFiled: April 29, 2011Date of Patent: June 11, 2013Assignee: Altera CorporationInventors: Bruce B. Pedersen, Dirk A. Reese, Juju Joyce
-
Patent number: 8464073Abstract: A secure storage device includes a storage medium configured to securely store data received from a host. The storage device further includes a host interface configured to transfer data between the host and the storage device and an encryption engine. The encryption engine is configured to encrypt data received from a host using a key and provide the encrypted data to the storage medium for storage. The encryption engine is further configured to decrypt encrypted data received from the storage medium and provide the data to the host via the host interface. In response to a predetermined condition, the storage device is configured to disable the encryption engine thereby preventing the encrypted data stored thereon from being decrypted.Type: GrantFiled: September 13, 2006Date of Patent: June 11, 2013Assignee: Stec, Inc.Inventor: Nader Salessi
-
Patent number: 8464077Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.Type: GrantFiled: April 26, 2010Date of Patent: June 11, 2013Assignee: Intertrust Technologies Corp.Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
-
Patent number: 8464069Abstract: Embodiments include systems and methods for securely accessing data in the context of a data transaction. A system may include a memory block, within which a memory partition may be allocated to the data transaction. The memory partition includes a data storage block and at least one binding register. The system also includes platform entities and an access control block, which determines whether a particular platform entity may access data within the data storage block, and whether a particular platform entity may write binding information into a binding register. Access also may be granted or denied based on the current state of a state machine associated with the data transaction. The system also includes a cipher/binding function adapted to encrypt the data, using the binding information, for storage on an unsecured memory device, and to decrypting encrypted data, using the binding information, which is retrieved from the unsecured memory device.Type: GrantFiled: February 5, 2007Date of Patent: June 11, 2013Assignee: Freescale Semiconductors, Inc.Inventors: Lawrence L. Case, Thomas Tkacik
-
Patent number: 8458791Abstract: A system and method for modifying a processor system with hypervisor hardware to provide protection against malware. The processor system is assumed to be of a type having at least a CPU and a high-speed bus for providing data links between the CPU, other bus masters, and peripherals (including a debug interface unit). The hypervisor hardware elements are (1) a co-processor programmed to perform one or more security tasks; (2) a communications interface between the co-processor and the debug interface unit; (3) a behavioral interface on the high-speed bus, configured to monitor control signals from the CPU, and (4) an access controller on the high-speed bus, configured to store access control data, to intercept requests on the high-speed bus, to evaluate the requests against the access control data, and to grant or deny the requests.Type: GrantFiled: August 18, 2010Date of Patent: June 4, 2013Assignee: Southwest Research InstituteInventors: Tam T Do, Michael D LeMay, Galen A Rasche, Ben A Abbott
-
Patent number: 8453211Abstract: The present invention provides a method for obtaining a proxy call session control function address, comprising when a terminal accesses an IP multi-media subsystem through a world interoperability for microwave access (WiMAX) network in roaming scenarios, a visited authentication, authorization, and accounting server (V-AAA) of the terminal retransmitting an access request message sent by an access service network (ASN) or a dynamic host configuration protocol (DHCP) or a home agent (HA) of said terminal to a home authentication, authorization, and accounting server (H-AAA) of said terminal after receiving the access request message, and H-AAA finally deciding whether the P-CSCF is located in a visited network or a home network according to a roaming protocol and visited network capability, and returning the determined P-CSCF address information, included by H-AAA in an access accept message corresponding to said access request message, to the sender of said access request message through V-AAA.Type: GrantFiled: June 16, 2008Date of Patent: May 28, 2013Assignee: ZTECorporationInventors: Yuzhen Huo, Yangwei Tu
-
Patent number: 8452983Abstract: A system, method, and computer program for protecting numerical control codes, comprising decrypting an encrypted text file that defines how an event for a tool path data set is processed; processing said decrypted text file to obtain a set of instructions; formatting said set of instructions according to a definition file; and outputting said set of formatted instructions; whereby postprocessed machine controls are written and appropriate means and computer-readable instructions.Type: GrantFiled: March 20, 2008Date of Patent: May 28, 2013Assignee: Siemens Product Lifecycle Management Software Inc.Inventor: Gen Lin
-
Patent number: 8452981Abstract: Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a plurality of data blocks to create linked object code and a MAP file. Thereafter, author verification is performed by executing a plurality of comparisons between the linked object code and the MAP file. In another embodiment, a digital signing procedure is performed on linked object code by creating a signature data block. The signature data block is then encrypted and written to the linked object code to create digitally-signed object code. In another embodiment, an application program embodied in linked object code generates a data packet. The data packet is then compared to a previously-generated signature data packet from the linked object code to determine if the linked object code is authorized.Type: GrantFiled: March 1, 2006Date of Patent: May 28, 2013Assignee: Nvidia CorporationInventors: Jeffrey T. Kiel, Andrei Leonid Osnovich
-
Patent number: 8452987Abstract: Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable first stage code upon failure. The prestored unmodifiable first stage code, which may comprise boot code for the reprogrammable system, may be stored in locked flash, and the downloaded software code may be stored in unlocked flash. The downloaded software code may be verified by comparing a signature of the downloaded code to a private key. A first sticky bit may be utilized to indicate a failure of the verification and a second sticky bit may be utilized to indicate passing of the verification and the use of the downloaded software code. Whether to reset the reprogrammable system and reload the prestored unmodifiable first stage code may be determined from within the reprogrammable system, which may comprise a set-top box.Type: GrantFiled: May 24, 2007Date of Patent: May 28, 2013Assignee: Broadcom CorporationInventors: Xuemin Chen, Andrew Dellow, Iue-Shuenn Chen, Stephane Rodgers
-
Patent number: 8448189Abstract: A method, apparatus and computer instructions for handling intrusions. A tracer packet is sent back to an intruder causing the intrusion in response to receiving notification of an intrusion from a particular node in a network data processing system. Nodes in the network data processing system are notified of the tracer packet. Identification of the node is stored for use in tracing a route of the tracer packet through the data processing system in response to receiving a message from a node indicating receipt of the tracer packet.Type: GrantFiled: June 21, 2010Date of Patent: May 21, 2013Assignee: International Business Machines CorporationInventors: Dolapo Martin Falola, Vinit Jain, Shannon Marie MacAlpine, Shawn Patrick Mullen, James Stanley Tesauro
-
Patent number: 8447969Abstract: Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure element. The device enables a user to enter sensitive information in the user input which is then passed directly to the secure element without traversing any other element such that the secure element can encode and/or encrypt the sensitive information. Once the sensitive information has been encoded and/or encrypted by the secure element, the now secure sensitive information can be shared with other entities using familiar and popular, yet relatively unsecure, transfer methods.Type: GrantFiled: March 15, 2010Date of Patent: May 21, 2013Assignee: Assa Abloy ABInventors: Mark Robinton, Scott Haigh, Scott B. Guthery
-
Patent number: 8448255Abstract: Apparatus, systems, and methods may operate to receive requests to securely process files on an untrusted client. Additional activity may include transparently redirecting file management operations associated with applications running on the untrusted client to file content associated with the files, where the file content is located in a sandbox on the untrusted client, where the sandbox is inaccessible to the applications. A data store, shared across the applications, may be used to share information associated with the file content. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: July 14, 2008Date of Patent: May 21, 2013Assignee: Apple Inc.Inventor: Premkumar Jothimani
-
Patent number: 8448239Abstract: A storage controller includes a command pointer register. The command pointer register points to a chain of commands in memory, and also includes a security status field to indicate a security status of the first command in the command chain. Each command in the command chain may also include a security status field that indicates the security status of the following command in the chain.Type: GrantFiled: March 5, 2011Date of Patent: May 21, 2013Assignee: Micron Technology, Inc.Inventors: Dennis M. O'Connor, Mark N. Fullerton, Ray Richardson
-
Patent number: 8438401Abstract: Devices and methods for securely storing data are provided. A device for constructing an encryption key comprising a tamper-protection barrier that encloses one or more memory devices is provided. The memory stores data for constructing the encryption key. The memory may include a single memory device or a plurality of memory devices. The tamper-protection barrier also encloses a security processor configured to combine the data stored in the memory based in part on a function, such as a logical exclusive-or (XOR) function, to construct the encryption key. The stored data in the memory may include partial keys. These partial keys may be created based in part on applying the XOR function to an encryption key.Type: GrantFiled: September 22, 2009Date of Patent: May 7, 2013Assignee: Raytheon BBN Technologies, Corp.Inventor: Walter Clark Milliken
-
Publication number: 20130111222Abstract: Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some implementations, only a data block containing evidence that is (1) appended with a server-generated challenge (e.g., a nonce) and (2) signed by the sensor may validate that the evidence is responsive to a current request and belongs to a current session. In some implementations, trust may be established and/or enhanced due to one or more security features (e.g., anti-spoofing, anti-tampering, and/or other security features) being collocated with the sensor at the actual sampling site.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Applicant: Advanced Biometric Controls, LLCInventor: Arthur W. JOYCE, III
-
Patent number: 8434155Abstract: Machine readable media, methods, and computing devices are disclosed which establish a protected memory channel between an operating system loader of a user partition and services of a management partition. One computing device includes protected storage, read only memory, firmware, a storage device and a processor. The storage device is to store the virtual machine monitor and an operating system having an operating system loader. The virtual machine monitor is to establish a protected memory channel between the one or more integrity services of a management partition and the operating system loader of a user partition in response to measuring and verifying the operating system loader based upon the manifest. The processor is to execute the code of the read only memory, the firmware, the virtual machine monitor, the operating system, the operating system loader, the management partition, and the user partition.Type: GrantFiled: September 30, 2011Date of Patent: April 30, 2013Assignee: Intel CorporationInventors: Ravi Sahita, Ned Smith
-
Patent number: 8434146Abstract: Systems and methods for selectively providing access to a media device based on a profile associated with the media device. In certain embodiments, the profile of the media device can be user-defined as a development profile or a personal profile. When the device is connected to a host computer system, the profile of the media device is accessed. If the profile of the media device is a development profile, an integrated development environment on the host computer system can access the media device. If the profile of the media device is a personal profile, the integrated development environment is prevented from accessing the device.Type: GrantFiled: March 4, 2009Date of Patent: April 30, 2013Assignee: Apple Inc.Inventors: Scott Forstall, Maxwell O. Drukman, Andreas Wendker, D. Matthew Firlik
-
Patent number: 8433927Abstract: A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault detection. In a preferred embodiment, secure initialization hardware loads the sensitive code from a storage location accessible only to the secure initialization hardware itself and decrypts the sensitive code into a portion of the processor-accessible memory space, from which the code is executed. Once execution of the sensitive code has completed, all or at least a portion of the code is deleted before passing control to application software. If the application software needs to cause the sensitive code to be executed, the secure initialization hardware is activated to reload/decrypt a fresh copy of the sensitive code into the memory space and cause the code to be executed. Before control is returned to the application software, the sensitive code is again deleted to prevent unauthorized access.Type: GrantFiled: May 29, 2007Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Wilfred E. Plouffe, Jr., Kanna Shimizu
-
Patent number: 8434138Abstract: A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10^Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C?. If there is an initial mismatch, the validation server compensate for a lack of synchronization between counters C and C? within a look-ahead window, whose size can be set by a parameter s.Type: GrantFiled: December 6, 2011Date of Patent: April 30, 2013Assignee: Symantec CorporationInventors: Nicolas Popp, David M'Raihi, Loren Hart
-
Patent number: 8429421Abstract: Server-side encrypted pattern matching may minimize the risk of data theft due to server breach and/or unauthorized data access. In various implementations, a server for performing the server-side encrypted pattern matching may include an interface component to receive an encrypted query token. The server may further include a query component to find a match for the encrypted query token in the encrypted data string. The query component may find such a match without decrypting the encrypted data string and the encrypted query token by using an encrypted dictionary that includes information on the edges of the encrypted suffix tree.Type: GrantFiled: December 17, 2010Date of Patent: April 23, 2013Assignee: Microsoft CorporationInventors: Melissa E. Chase, Emily H. Shen
-
Patent number: 8429735Abstract: A method for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit or units having connection to the public Internet and one or more of the private units have a connection to one or more non-Internet-connected private networks for private network control of the configuration of the computer or microchip using active hardware configuration, including field programmable gate arrays (FPGA). The hardware-based access barriers include a single out-only bus and/or another in-only bus with a single on/off switch.Type: GrantFiled: February 16, 2012Date of Patent: April 23, 2013Inventor: Frampton E. Ellis
-
Patent number: 8429637Abstract: Disclosed herein are systems, methods, and computer readable-media for obfuscating code through conditional expansion obfuscation. The method includes identifying a conditional expression in a computer program, identifying a sequence of conditional expressions that is semantically equivalent to the conditional expression, and replacing the conditional expression with the semantically equivalent sequence of conditional expressions. One option replaces each like conditional expression in the computer program with a diverse set of sequences of semantically equivalent conditional expressions. A second option rearranges computer instructions that are to be processed after the sequence of conditional expression is evaluated so that a portion of the instructions is performed before the entire sequence of conditional expressions is evaluated. A third option performs conditional expansion obfuscation of a conditional statement in combination with branch extraction obfuscation.Type: GrantFiled: September 2, 2008Date of Patent: April 23, 2013Assignee: Apple Inc.Inventors: Gideon M. Myles, Tanya Michelle Lattner, Julien Lerouge, Augustin J. Farrugia
-
Patent number: 8422674Abstract: A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.Type: GrantFiled: May 29, 2007Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
-
Patent number: 8423797Abstract: In a method for reading initialization data (IND) into a chip card, the chip card receives an encrypted authentication value (EAV) and decrypts it to obtain at least one release key (ENK). The release key (ENK) is checked for a match with a release key (ENK?) stored on the chip card (14). If there is a match, the initialization data (EIND, IND) are received and written to a nonvolatile memory of the chip card. A method for generating a record for initializing a chip card. a chip card and a computer-readable data carrier have corresponding features. The invention is provided in particular for initialization of chip cards by external partners of the chip card manufacturer, whereby as few possibilities of attack as possible are to be offered.Type: GrantFiled: August 27, 2002Date of Patent: April 16, 2013Assignee: Giesecke & Devrient GmbHInventors: Karl Eglof Hartel, Harald Vater
-
Patent number: 8424092Abstract: A battery pack includes at least one rechargeable battery configured to output power; a remaining battery capacity detection unit configured to detect a remaining battery capacity of the at least one rechargeable battery; and a cryptographic unit configured to output a response word in response to an external request word by encrypting the external request word based on a cryptographic algorithm with a common code key.Type: GrantFiled: September 8, 2011Date of Patent: April 16, 2013Assignees: Mitsumi Electric Co., Ltd., Sony Mobile Communications Japan, Inc.Inventors: Akira Ikeuchi, Itsuki Nakano, Kenichi Kasai, Katsuya Suzuki, Kuniharu Suzuki
-
Patent number: 8416950Abstract: An integrated circuit includes a fingerprint element and a decryption circuit. The fingerprint element generates a fingerprint, where the fingerprint is reproducible and represents an inherent manufacturing process characteristic unique to the integrated circuit device. The decryption circuit decrypts, using a decryption key that is based on the fingerprint, an encrypted data in order to extract data. In one embodiment, the propagation delay of various circuit elements are used to generate the fingerprint. In another embodiment, the specific frequency of an oscillator is used to generate the fingerprint. In yet another embodiment, a ratio of measurable values is used to generate the fingerprint. In another embodiment, differences in transistor threshold voltages are used to generate the fingerprint. In yet another embodiment, variations in line widths are used to generate the fingerprint.Type: GrantFiled: April 7, 2011Date of Patent: April 9, 2013Assignee: Xilinx, Inc.Inventor: Stephen M. Trimberger
-
Patent number: 8417963Abstract: A method is described for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket and employing, in response to a decision making process, a sanction in the RWS device. Related apparatus and methods are also described.Type: GrantFiled: November 13, 2006Date of Patent: April 9, 2013Assignee: Cisco Technology, Inc.Inventors: Itsik Mantin, Perry Smith, Yaron Sella, Erez Waisbard
-
Patent number: 8417967Abstract: Embodiments include methods, apparatus, and systems for storage device data encryption. One method includes encrypting data on a storage device with a key and then transmitting the key to a cryptographic module that encrypts the key to form a Binary Large Object (BLOB). The BLOB is transmitted to an array controller that is coupled to the storage device which stores the BLOB.Type: GrantFiled: April 2, 2008Date of Patent: April 9, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Joseph E. Foster, Robert C. Elliott, Jeffrey A. Plank
-
Patent number: 8417970Abstract: A key data recording device includes a key data recording medium section which stores key data of the encrypted data; and a reading/writing section which reads and writes the key data from and into the key data recording medium section, which sections are contained in a cartridge casing accommodatable in a library unit. When the cartridge casing is irregularly ejected from the library unit, the key data recorded in the key data recording medium section is deleted. This configuration can enhance the confidentiality of encrypted data because the key data is not leaked even when the recording medium in which key data of the encrypted data is recorded is carried away.Type: GrantFiled: June 3, 2010Date of Patent: April 9, 2013Assignee: Fujitsu LimitedInventors: Daisuke Tomii, Shinobu Sasaki, Koujiro Hashimoto, Noriyuki Suzuki
-
Patent number: 8417931Abstract: A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures.Type: GrantFiled: February 24, 2011Date of Patent: April 9, 2013Assignee: Broadcom CorporationInventors: Stephane Rodgers, Andrew Dellow, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
-
Patent number: 8416955Abstract: A system and a method for determining a result of applying a function to signals is disclosed. The function is a polynomial function including monomials, in which the first signal in a first power forming a first part of the monomial and the second signal in a second power forming a second part of the monomial, wherein the first part of the monomial encrypted with a key is a first encrypted signal, and the second part of the monomial encrypted with the key is a second encrypted signal, comprising the steps of transmitting a first input signal encrypted with a second public key to the second processor, wherein the first input signal includes the first encrypted signal, transmitting a second input signal encrypted with a first public key to the first processor, wherein the second input signal includes a product of the first encrypted signal and the second encrypted signal.Type: GrantFiled: December 7, 2009Date of Patent: April 9, 2013Assignee: Mitsubishi Electric Research Laboratories, Inc.Inventors: Shantanu Rane, Wei Sun, Anthony Vetro
-
Patent number: 8413245Abstract: A system detects an attack on the computer system. The system identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. In one embodiment, the system determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack. The system then adjusts access to an interface to prevent further damage caused to the computer system by the attack.Type: GrantFiled: May 1, 2006Date of Patent: April 2, 2013Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
-
Patent number: 8411448Abstract: A security protection device includes a cover circuit board, at least one inner wiring layer being included within the cover circuit board. The device also includes a base circuit board, at least one inner wiring layer being included within the base circuit board. The device further includes a security frame between the base circuit board and the cover circuit board, at least one electrically conductive wire being wound and included within the security frame to form at least one winding protection layer around sides of the security frame. The cover circuit board, the security frame, and the base circuit board form an enclosure enclosing a security zone, and the at least one inner wiring layer within the cover circuit board, the at least one inner wiring layer within the base circuit board, and the at least one electrically conductive wire within the security frame are connectable to a security mechanism configured to detect an intrusion into the security zone.Type: GrantFiled: September 3, 2010Date of Patent: April 2, 2013Assignee: PAX Computer Technology, Co., Ltd.Inventors: Shuxian Shi, Hongtao Sun
-
Patent number: 8412958Abstract: A device management system is configured with a target device including at least one unit that includes a tamper-resistant chip, a management apparatus that manages or uses the target device, and an authentication apparatus including a database for authentication, connected via a network in a communicable manner. In the target device, each unit is equipped with the tamper-resistant chip that collects device information specific to a unit, stores collected device information, and stores a confidential-key.Type: GrantFiled: January 17, 2007Date of Patent: April 2, 2013Assignees: PFU Limited, Fijitsu LimitedInventors: Kouichi Minami, Seigo Kotani
-
Patent number: 8403998Abstract: A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device.Type: GrantFiled: March 31, 2008Date of Patent: March 26, 2013Assignee: Intel CorporationInventors: Mousumi M. Hazra, Gyan Prakash, Carol A. Bell, Selim Aissi
-
Patent number: 8407487Abstract: A method for security monitoring of an electronic device includes determining whether a storage system of the electronic device is a secured storage system according to a signal of a first switch of the electronic device, determining whether an encryption key of the secured storage system is modifiable according to a detected signal of a second switch of the electronic device. Decrypting the secured storage system using a decryption key if the decryption key is the same as a preset decryption key in the secured storage system.Type: GrantFiled: August 19, 2010Date of Patent: March 26, 2013Assignee: Hon Hai Precision Industry Co., Ltd.Inventors: Yang-Yuan Chen, Ming-Chih Hsieh
-
Patent number: 8407466Abstract: Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that can determine whether a client request to download or play content should be granted. All purchase, download, and playback requests require permission from the permission system. The server also includes a DD module system that transfers a DD module to the client. The DD module includes a content key decryption module, a content decryption module, and a content decompression module. The content key decryption module decrypts an encrypted content key that was received from the server. The decryption uses a unique DD module key that has been hard-coded into the content key decryption module. The content decryption module uses the content key to decrypt encrypted content. The content decompression module decompresses compressed content so that it can be played.Type: GrantFiled: October 24, 2011Date of Patent: March 26, 2013Assignee: Google Inc.Inventors: Wai Fun (Aaron) Lee, Marius P. Schilder, Jason D. Waddle, J. Alex Halderman
-
Patent number: RE44130Abstract: Anti-pirate circuitry is provided for combating the theft of intellectual property contained with semiconductor integrated circuits. The anti-pirate circuit includes a unique number generator that provides a multi-bit die ID data string that is unique to the integrated circuit associated with the anti-pirate circuit. One time programmable (OTP) EPROM circuitry reads the die ID data string at wafer sort and writes the data content to nonvolatile memory. During a subsequent verification cycle, ID comparator circuitry compares the data string provided by the unique number generator to the stored contents of the nonvolatile memory. If the comparison results in a mismatch between more than a predefined number of bits, then the integrated circuit associated with the anti-pirate circuit is not enabled for operation.Type: GrantFiled: January 21, 2011Date of Patent: April 2, 2013Assignee: National Semiconductor CorporationInventors: Elroy M. Lucero, Daniel J. Lucero, Hengyang (James) Lin, Andrew J. Franklin, Pavel Poplevine