Tamper Resistant Patents (Class 713/194)
  • Patent number: 8489892
    Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.
    Type: Grant
    Filed: March 17, 2008
    Date of Patent: July 16, 2013
    Assignee: Thomson Licensing
    Inventors: Stephane Onno, Olivier Heen
  • Patent number: 8489901
    Abstract: Provided is a data acquisition module. The data acquisition module includes a memory and a controller. The controller includes an encryption module configured to encrypt information written to the memory using a key included in the controller. The key is unique to the controller. Also provided is a method for processing identification information. The method includes encrypting information with a key included in a controller and storing the encrypted information. The key is unique to the controller.
    Type: Grant
    Filed: May 5, 2008
    Date of Patent: July 16, 2013
    Assignee: Sonavation, Inc.
    Inventor: John Boudreaux
  • Patent number: 8488792
    Abstract: A wireless communications validation system comprises a validation module configured to determine an identity of an antenna disposed in a computer system and an identity of a wireless module disposed in the computer system, the validation module configured to validate permissible combination of the antenna with the wireless module.
    Type: Grant
    Filed: October 26, 2005
    Date of Patent: July 16, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Isaac Lagnado, Timothy Neill, Jeffrey Kevin Jeansonne, Harold S. Merkel
  • Patent number: 8490195
    Abstract: Method and apparatus for behavioral detection of malware in a computer system are described. In some embodiments, a request by a process executing on a computer to change time of a clock managed by the computer is detected. The process is identified as a potential threat. At least one attribute associated with the process is analyzed to determine a threat level. The request to change the time of the clock is blocked and the process is designated as a true positive threat if the threat level satisfies a threshold level.
    Type: Grant
    Filed: December 19, 2008
    Date of Patent: July 16, 2013
    Assignee: Symantec Corporation
    Inventors: Joseph H. Chen, Jamie J. Park
  • Patent number: 8484481
    Abstract: A system for implementing a chip lockout protection scheme for an IC device includes an on-chip password register that stores a password externally input by a user; an on-chip security block that generates a chip unlock signal, depending on whether the externally input password matches a correct password; an on-chip false data generator; an input protection scheme configured to gate the external data inputs to functional chip circuitry upon entry of the correct password; and an output protection scheme in communication configured to steer true chip data to external outputs of the IC device upon entry of the correct password, and to steer false data generated by the false data generator to the external outputs upon entry of an incorrect password. The false generated by the false data generator is deterministic and based upon external data inputs, thereby obfuscating whether or not the correct password has been entered.
    Type: Grant
    Filed: April 21, 2010
    Date of Patent: July 9, 2013
    Assignee: International Business Machines Corporation
    Inventors: Jesse E. Craig, Stanley B. Stanski, Scott T. Vento
  • Patent number: 8479017
    Abstract: Enhancing locality in a security co-processor module of a computing system may be achieved by including one or more additional attributes such as geographic location, trusted time, a hardware vendor string, and one or more environmental factors into an access control space for machine mode measurement of a computing system.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: July 2, 2013
    Assignee: Intel Corporation
    Inventors: Vincent J. Zimmer, Michael A. Rothman, Robert C. Swanson, Palsamy Sakthikumar, Mallik Bulusu
  • Patent number: 8479018
    Abstract: An obfuscating apparatus creates a table for inputting the same number of arguments for multiplying and squaring operations, and sets the output values of the table so that the outputs may depend on the arguments. With regard to the squaring operations, there are added and tabulated adding operations using the arguments necessary only for the multiplications, so that the number of arguments is equal to that of the multiplication operations. The outputs depend on all the arguments, so that the presence or absence of the added arguments is unknown unlike the case in which dummy arguments that are not processed are added.
    Type: Grant
    Filed: April 27, 2007
    Date of Patent: July 2, 2013
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Taichi Sato, Rieko Asai, Motoji Ohmori, Masahiro Mambo
  • Patent number: 8479022
    Abstract: A digital system is provided with a secure mode (3rd level of privilege) built in a non-invasive way on a processor system that includes a processor core, instruction and data caches, a write buffer and a memory management unit. A secure execution mode is thus provided on a platform where the only trusted software is the code stored in ROM. In particular the OS is not trusted, all native applications are not trusted. The secure mode is entered through a unique entry point. The secure execution mode can be dynamically entered and exited with full hardware assessment of the entry/exit conditions. A secure mode indicator is provided to tell a user of the digital system that the device is in secure mode. This indicator may be a small LED, for example. The user should not enter any secret information (password) or should not sign anything displayed on the screen if the secure mode indicator is not active.
    Type: Grant
    Filed: December 18, 2002
    Date of Patent: July 2, 2013
    Assignee: Texas Instruments Incorporated
    Inventors: Franck B. Dahan, Bertrand Cornillault
  • Patent number: 8473752
    Abstract: An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module records an encrypted log entry describing the access to the secure data. A verification module verifies the secure data is securely stored.
    Type: Grant
    Filed: March 17, 2010
    Date of Patent: June 25, 2013
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Howard J. Locker, David C. Challener, Mark C. Davis, Randall S. Springfield
  • Patent number: 8473749
    Abstract: In some embodiments, a non-transitory processor-readable medium includes code to cause a processor (e.g., on an enterprise server) to receive, from a communication device, a request for a client application, and in response to the request provision the installation file data associated with the client application to include an application token associated with the client application. The code is to cause the processor to send the installation file that includes the application token to the communication device such that the communication device uses the installation file to install the client application that authenticates to an application module using the application token extracted from the installation file.
    Type: Grant
    Filed: July 9, 2012
    Date of Patent: June 25, 2013
    Assignee: Ping Identity Corporation
    Inventors: Paul Madsen, Brian Campbell
  • Patent number: 8468369
    Abstract: A system, business methodology and apparatus for facilitating controlled dissemination of digital works is disclosed. An audio and video organizer, entertainment, and communication unit that plays back audio and video media content received from a central storage server. The unit relies on a smartcard, which has a personalized key that unlocks encrypted content. Using the unit, a user can purchase music or other types of media using an appropriate ordering method. The central storage server then transmits a double-encrypted, compressed audio file to the unit, where it is decrypted based on the smartcard key, and available for listening.
    Type: Grant
    Filed: April 12, 2011
    Date of Patent: June 18, 2013
    Assignee: Qxzeb LLC
    Inventor: Mark Nair
  • Patent number: 8464348
    Abstract: A computer is adapted for pay-for-use operation by adding a isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation program responsive to the clock or timer. The isolated computing environment may be protected from tampering by physical or cryptographic mechanisms, or both. The validation program measures or monitors for non-compliant states of the computer and may enforce sanctions when non-compliant states of the computer are detected.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: June 11, 2013
    Assignee: Microsoft Corporation
    Inventors: Alexander Frank, Martin H. Hall, Thomas G. Phillips
  • Patent number: 8461863
    Abstract: A kill switch is provided that, when triggered, may cause the programmable logic device (PLD) to become at least partially reset, disabled, or both. The kill switch may be implemented as a fuse or a volatile battery-backed memory bit. When, for example, a security threat is detected, the switch may be blown, and a reconfiguration of the device initiated in order to zero or clear some or all of the memory and programmable logic of the PLD.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: June 11, 2013
    Assignee: Altera Corporation
    Inventors: Bruce B. Pedersen, Dirk A. Reese, Juju Joyce
  • Patent number: 8464073
    Abstract: A secure storage device includes a storage medium configured to securely store data received from a host. The storage device further includes a host interface configured to transfer data between the host and the storage device and an encryption engine. The encryption engine is configured to encrypt data received from a host using a key and provide the encrypted data to the storage medium for storage. The encryption engine is further configured to decrypt encrypted data received from the storage medium and provide the data to the host via the host interface. In response to a predetermined condition, the storage device is configured to disable the encryption engine thereby preventing the encrypted data stored thereon from being decrypted.
    Type: Grant
    Filed: September 13, 2006
    Date of Patent: June 11, 2013
    Assignee: Stec, Inc.
    Inventor: Nader Salessi
  • Patent number: 8464077
    Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.
    Type: Grant
    Filed: April 26, 2010
    Date of Patent: June 11, 2013
    Assignee: Intertrust Technologies Corp.
    Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
  • Patent number: 8464069
    Abstract: Embodiments include systems and methods for securely accessing data in the context of a data transaction. A system may include a memory block, within which a memory partition may be allocated to the data transaction. The memory partition includes a data storage block and at least one binding register. The system also includes platform entities and an access control block, which determines whether a particular platform entity may access data within the data storage block, and whether a particular platform entity may write binding information into a binding register. Access also may be granted or denied based on the current state of a state machine associated with the data transaction. The system also includes a cipher/binding function adapted to encrypt the data, using the binding information, for storage on an unsecured memory device, and to decrypting encrypted data, using the binding information, which is retrieved from the unsecured memory device.
    Type: Grant
    Filed: February 5, 2007
    Date of Patent: June 11, 2013
    Assignee: Freescale Semiconductors, Inc.
    Inventors: Lawrence L. Case, Thomas Tkacik
  • Patent number: 8458791
    Abstract: A system and method for modifying a processor system with hypervisor hardware to provide protection against malware. The processor system is assumed to be of a type having at least a CPU and a high-speed bus for providing data links between the CPU, other bus masters, and peripherals (including a debug interface unit). The hypervisor hardware elements are (1) a co-processor programmed to perform one or more security tasks; (2) a communications interface between the co-processor and the debug interface unit; (3) a behavioral interface on the high-speed bus, configured to monitor control signals from the CPU, and (4) an access controller on the high-speed bus, configured to store access control data, to intercept requests on the high-speed bus, to evaluate the requests against the access control data, and to grant or deny the requests.
    Type: Grant
    Filed: August 18, 2010
    Date of Patent: June 4, 2013
    Assignee: Southwest Research Institute
    Inventors: Tam T Do, Michael D LeMay, Galen A Rasche, Ben A Abbott
  • Patent number: 8453211
    Abstract: The present invention provides a method for obtaining a proxy call session control function address, comprising when a terminal accesses an IP multi-media subsystem through a world interoperability for microwave access (WiMAX) network in roaming scenarios, a visited authentication, authorization, and accounting server (V-AAA) of the terminal retransmitting an access request message sent by an access service network (ASN) or a dynamic host configuration protocol (DHCP) or a home agent (HA) of said terminal to a home authentication, authorization, and accounting server (H-AAA) of said terminal after receiving the access request message, and H-AAA finally deciding whether the P-CSCF is located in a visited network or a home network according to a roaming protocol and visited network capability, and returning the determined P-CSCF address information, included by H-AAA in an access accept message corresponding to said access request message, to the sender of said access request message through V-AAA.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: May 28, 2013
    Assignee: ZTECorporation
    Inventors: Yuzhen Huo, Yangwei Tu
  • Patent number: 8452983
    Abstract: A system, method, and computer program for protecting numerical control codes, comprising decrypting an encrypted text file that defines how an event for a tool path data set is processed; processing said decrypted text file to obtain a set of instructions; formatting said set of instructions according to a definition file; and outputting said set of formatted instructions; whereby postprocessed machine controls are written and appropriate means and computer-readable instructions.
    Type: Grant
    Filed: March 20, 2008
    Date of Patent: May 28, 2013
    Assignee: Siemens Product Lifecycle Management Software Inc.
    Inventor: Gen Lin
  • Patent number: 8452981
    Abstract: Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a plurality of data blocks to create linked object code and a MAP file. Thereafter, author verification is performed by executing a plurality of comparisons between the linked object code and the MAP file. In another embodiment, a digital signing procedure is performed on linked object code by creating a signature data block. The signature data block is then encrypted and written to the linked object code to create digitally-signed object code. In another embodiment, an application program embodied in linked object code generates a data packet. The data packet is then compared to a previously-generated signature data packet from the linked object code to determine if the linked object code is authorized.
    Type: Grant
    Filed: March 1, 2006
    Date of Patent: May 28, 2013
    Assignee: Nvidia Corporation
    Inventors: Jeffrey T. Kiel, Andrei Leonid Osnovich
  • Patent number: 8452987
    Abstract: Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable first stage code upon failure. The prestored unmodifiable first stage code, which may comprise boot code for the reprogrammable system, may be stored in locked flash, and the downloaded software code may be stored in unlocked flash. The downloaded software code may be verified by comparing a signature of the downloaded code to a private key. A first sticky bit may be utilized to indicate a failure of the verification and a second sticky bit may be utilized to indicate passing of the verification and the use of the downloaded software code. Whether to reset the reprogrammable system and reload the prestored unmodifiable first stage code may be determined from within the reprogrammable system, which may comprise a set-top box.
    Type: Grant
    Filed: May 24, 2007
    Date of Patent: May 28, 2013
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Andrew Dellow, Iue-Shuenn Chen, Stephane Rodgers
  • Patent number: 8448189
    Abstract: A method, apparatus and computer instructions for handling intrusions. A tracer packet is sent back to an intruder causing the intrusion in response to receiving notification of an intrusion from a particular node in a network data processing system. Nodes in the network data processing system are notified of the tracer packet. Identification of the node is stored for use in tracing a route of the tracer packet through the data processing system in response to receiving a message from a node indicating receipt of the tracer packet.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: May 21, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dolapo Martin Falola, Vinit Jain, Shannon Marie MacAlpine, Shawn Patrick Mullen, James Stanley Tesauro
  • Patent number: 8447969
    Abstract: Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure element. The device enables a user to enter sensitive information in the user input which is then passed directly to the secure element without traversing any other element such that the secure element can encode and/or encrypt the sensitive information. Once the sensitive information has been encoded and/or encrypted by the secure element, the now secure sensitive information can be shared with other entities using familiar and popular, yet relatively unsecure, transfer methods.
    Type: Grant
    Filed: March 15, 2010
    Date of Patent: May 21, 2013
    Assignee: Assa Abloy AB
    Inventors: Mark Robinton, Scott Haigh, Scott B. Guthery
  • Patent number: 8448255
    Abstract: Apparatus, systems, and methods may operate to receive requests to securely process files on an untrusted client. Additional activity may include transparently redirecting file management operations associated with applications running on the untrusted client to file content associated with the files, where the file content is located in a sandbox on the untrusted client, where the sandbox is inaccessible to the applications. A data store, shared across the applications, may be used to share information associated with the file content. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: July 14, 2008
    Date of Patent: May 21, 2013
    Assignee: Apple Inc.
    Inventor: Premkumar Jothimani
  • Patent number: 8448239
    Abstract: A storage controller includes a command pointer register. The command pointer register points to a chain of commands in memory, and also includes a security status field to indicate a security status of the first command in the command chain. Each command in the command chain may also include a security status field that indicates the security status of the following command in the chain.
    Type: Grant
    Filed: March 5, 2011
    Date of Patent: May 21, 2013
    Assignee: Micron Technology, Inc.
    Inventors: Dennis M. O'Connor, Mark N. Fullerton, Ray Richardson
  • Patent number: 8438401
    Abstract: Devices and methods for securely storing data are provided. A device for constructing an encryption key comprising a tamper-protection barrier that encloses one or more memory devices is provided. The memory stores data for constructing the encryption key. The memory may include a single memory device or a plurality of memory devices. The tamper-protection barrier also encloses a security processor configured to combine the data stored in the memory based in part on a function, such as a logical exclusive-or (XOR) function, to construct the encryption key. The stored data in the memory may include partial keys. These partial keys may be created based in part on applying the XOR function to an encryption key.
    Type: Grant
    Filed: September 22, 2009
    Date of Patent: May 7, 2013
    Assignee: Raytheon BBN Technologies, Corp.
    Inventor: Walter Clark Milliken
  • Publication number: 20130111222
    Abstract: Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some implementations, only a data block containing evidence that is (1) appended with a server-generated challenge (e.g., a nonce) and (2) signed by the sensor may validate that the evidence is responsive to a current request and belongs to a current session. In some implementations, trust may be established and/or enhanced due to one or more security features (e.g., anti-spoofing, anti-tampering, and/or other security features) being collocated with the sensor at the actual sampling site.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 2, 2013
    Applicant: Advanced Biometric Controls, LLC
    Inventor: Arthur W. JOYCE, III
  • Patent number: 8434155
    Abstract: Machine readable media, methods, and computing devices are disclosed which establish a protected memory channel between an operating system loader of a user partition and services of a management partition. One computing device includes protected storage, read only memory, firmware, a storage device and a processor. The storage device is to store the virtual machine monitor and an operating system having an operating system loader. The virtual machine monitor is to establish a protected memory channel between the one or more integrity services of a management partition and the operating system loader of a user partition in response to measuring and verifying the operating system loader based upon the manifest. The processor is to execute the code of the read only memory, the firmware, the virtual machine monitor, the operating system, the operating system loader, the management partition, and the user partition.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: April 30, 2013
    Assignee: Intel Corporation
    Inventors: Ravi Sahita, Ned Smith
  • Patent number: 8434146
    Abstract: Systems and methods for selectively providing access to a media device based on a profile associated with the media device. In certain embodiments, the profile of the media device can be user-defined as a development profile or a personal profile. When the device is connected to a host computer system, the profile of the media device is accessed. If the profile of the media device is a development profile, an integrated development environment on the host computer system can access the media device. If the profile of the media device is a personal profile, the integrated development environment is prevented from accessing the device.
    Type: Grant
    Filed: March 4, 2009
    Date of Patent: April 30, 2013
    Assignee: Apple Inc.
    Inventors: Scott Forstall, Maxwell O. Drukman, Andreas Wendker, D. Matthew Firlik
  • Patent number: 8433927
    Abstract: A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault detection. In a preferred embodiment, secure initialization hardware loads the sensitive code from a storage location accessible only to the secure initialization hardware itself and decrypts the sensitive code into a portion of the processor-accessible memory space, from which the code is executed. Once execution of the sensitive code has completed, all or at least a portion of the code is deleted before passing control to application software. If the application software needs to cause the sensitive code to be executed, the secure initialization hardware is activated to reload/decrypt a fresh copy of the sensitive code into the memory space and cause the code to be executed. Before control is returned to the application software, the sensitive code is again deleted to prevent unauthorized access.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: April 30, 2013
    Assignee: International Business Machines Corporation
    Inventors: Wilfred E. Plouffe, Jr., Kanna Shimizu
  • Patent number: 8434138
    Abstract: A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10^Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C?. If there is an initial mismatch, the validation server compensate for a lack of synchronization between counters C and C? within a look-ahead window, whose size can be set by a parameter s.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: April 30, 2013
    Assignee: Symantec Corporation
    Inventors: Nicolas Popp, David M'Raihi, Loren Hart
  • Patent number: 8429421
    Abstract: Server-side encrypted pattern matching may minimize the risk of data theft due to server breach and/or unauthorized data access. In various implementations, a server for performing the server-side encrypted pattern matching may include an interface component to receive an encrypted query token. The server may further include a query component to find a match for the encrypted query token in the encrypted data string. The query component may find such a match without decrypting the encrypted data string and the encrypted query token by using an encrypted dictionary that includes information on the edges of the encrypted suffix tree.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Melissa E. Chase, Emily H. Shen
  • Patent number: 8429735
    Abstract: A method for a computer or microchip with one or more inner hardware-based access barriers or firewalls that establish one or more private units disconnected from a public unit or units having connection to the public Internet and one or more of the private units have a connection to one or more non-Internet-connected private networks for private network control of the configuration of the computer or microchip using active hardware configuration, including field programmable gate arrays (FPGA). The hardware-based access barriers include a single out-only bus and/or another in-only bus with a single on/off switch.
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: April 23, 2013
    Inventor: Frampton E. Ellis
  • Patent number: 8429637
    Abstract: Disclosed herein are systems, methods, and computer readable-media for obfuscating code through conditional expansion obfuscation. The method includes identifying a conditional expression in a computer program, identifying a sequence of conditional expressions that is semantically equivalent to the conditional expression, and replacing the conditional expression with the semantically equivalent sequence of conditional expressions. One option replaces each like conditional expression in the computer program with a diverse set of sequences of semantically equivalent conditional expressions. A second option rearranges computer instructions that are to be processed after the sequence of conditional expression is evaluated so that a portion of the instructions is performed before the entire sequence of conditional expressions is evaluated. A third option performs conditional expansion obfuscation of a conditional statement in combination with branch extraction obfuscation.
    Type: Grant
    Filed: September 2, 2008
    Date of Patent: April 23, 2013
    Assignee: Apple Inc.
    Inventors: Gideon M. Myles, Tanya Michelle Lattner, Julien Lerouge, Augustin J. Farrugia
  • Patent number: 8422674
    Abstract: A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 8423797
    Abstract: In a method for reading initialization data (IND) into a chip card, the chip card receives an encrypted authentication value (EAV) and decrypts it to obtain at least one release key (ENK). The release key (ENK) is checked for a match with a release key (ENK?) stored on the chip card (14). If there is a match, the initialization data (EIND, IND) are received and written to a nonvolatile memory of the chip card. A method for generating a record for initializing a chip card. a chip card and a computer-readable data carrier have corresponding features. The invention is provided in particular for initialization of chip cards by external partners of the chip card manufacturer, whereby as few possibilities of attack as possible are to be offered.
    Type: Grant
    Filed: August 27, 2002
    Date of Patent: April 16, 2013
    Assignee: Giesecke & Devrient GmbH
    Inventors: Karl Eglof Hartel, Harald Vater
  • Patent number: 8424092
    Abstract: A battery pack includes at least one rechargeable battery configured to output power; a remaining battery capacity detection unit configured to detect a remaining battery capacity of the at least one rechargeable battery; and a cryptographic unit configured to output a response word in response to an external request word by encrypting the external request word based on a cryptographic algorithm with a common code key.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: April 16, 2013
    Assignees: Mitsumi Electric Co., Ltd., Sony Mobile Communications Japan, Inc.
    Inventors: Akira Ikeuchi, Itsuki Nakano, Kenichi Kasai, Katsuya Suzuki, Kuniharu Suzuki
  • Patent number: 8416950
    Abstract: An integrated circuit includes a fingerprint element and a decryption circuit. The fingerprint element generates a fingerprint, where the fingerprint is reproducible and represents an inherent manufacturing process characteristic unique to the integrated circuit device. The decryption circuit decrypts, using a decryption key that is based on the fingerprint, an encrypted data in order to extract data. In one embodiment, the propagation delay of various circuit elements are used to generate the fingerprint. In another embodiment, the specific frequency of an oscillator is used to generate the fingerprint. In yet another embodiment, a ratio of measurable values is used to generate the fingerprint. In another embodiment, differences in transistor threshold voltages are used to generate the fingerprint. In yet another embodiment, variations in line widths are used to generate the fingerprint.
    Type: Grant
    Filed: April 7, 2011
    Date of Patent: April 9, 2013
    Assignee: Xilinx, Inc.
    Inventor: Stephen M. Trimberger
  • Patent number: 8417963
    Abstract: A method is described for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket and employing, in response to a decision making process, a sanction in the RWS device. Related apparatus and methods are also described.
    Type: Grant
    Filed: November 13, 2006
    Date of Patent: April 9, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Itsik Mantin, Perry Smith, Yaron Sella, Erez Waisbard
  • Patent number: 8417967
    Abstract: Embodiments include methods, apparatus, and systems for storage device data encryption. One method includes encrypting data on a storage device with a key and then transmitting the key to a cryptographic module that encrypts the key to form a Binary Large Object (BLOB). The BLOB is transmitted to an array controller that is coupled to the storage device which stores the BLOB.
    Type: Grant
    Filed: April 2, 2008
    Date of Patent: April 9, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joseph E. Foster, Robert C. Elliott, Jeffrey A. Plank
  • Patent number: 8417970
    Abstract: A key data recording device includes a key data recording medium section which stores key data of the encrypted data; and a reading/writing section which reads and writes the key data from and into the key data recording medium section, which sections are contained in a cartridge casing accommodatable in a library unit. When the cartridge casing is irregularly ejected from the library unit, the key data recorded in the key data recording medium section is deleted. This configuration can enhance the confidentiality of encrypted data because the key data is not leaked even when the recording medium in which key data of the encrypted data is recorded is carried away.
    Type: Grant
    Filed: June 3, 2010
    Date of Patent: April 9, 2013
    Assignee: Fujitsu Limited
    Inventors: Daisuke Tomii, Shinobu Sasaki, Koujiro Hashimoto, Noriyuki Suzuki
  • Patent number: 8417931
    Abstract: A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures.
    Type: Grant
    Filed: February 24, 2011
    Date of Patent: April 9, 2013
    Assignee: Broadcom Corporation
    Inventors: Stephane Rodgers, Andrew Dellow, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
  • Patent number: 8416955
    Abstract: A system and a method for determining a result of applying a function to signals is disclosed. The function is a polynomial function including monomials, in which the first signal in a first power forming a first part of the monomial and the second signal in a second power forming a second part of the monomial, wherein the first part of the monomial encrypted with a key is a first encrypted signal, and the second part of the monomial encrypted with the key is a second encrypted signal, comprising the steps of transmitting a first input signal encrypted with a second public key to the second processor, wherein the first input signal includes the first encrypted signal, transmitting a second input signal encrypted with a first public key to the first processor, wherein the second input signal includes a product of the first encrypted signal and the second encrypted signal.
    Type: Grant
    Filed: December 7, 2009
    Date of Patent: April 9, 2013
    Assignee: Mitsubishi Electric Research Laboratories, Inc.
    Inventors: Shantanu Rane, Wei Sun, Anthony Vetro
  • Patent number: 8413245
    Abstract: A system detects an attack on the computer system. The system identifies the attack as polymorphic, capable of modifying itself for every instance of execution of the attack. The modification of the attack is utilized to defeat detection of the attack. In one embodiment, the system determines generation of an effective signature of the attack has failed. The signature is utilized to prevent execution of the attack. The system then adjusts access to an interface to prevent further damage caused to the computer system by the attack.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: April 2, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 8411448
    Abstract: A security protection device includes a cover circuit board, at least one inner wiring layer being included within the cover circuit board. The device also includes a base circuit board, at least one inner wiring layer being included within the base circuit board. The device further includes a security frame between the base circuit board and the cover circuit board, at least one electrically conductive wire being wound and included within the security frame to form at least one winding protection layer around sides of the security frame. The cover circuit board, the security frame, and the base circuit board form an enclosure enclosing a security zone, and the at least one inner wiring layer within the cover circuit board, the at least one inner wiring layer within the base circuit board, and the at least one electrically conductive wire within the security frame are connectable to a security mechanism configured to detect an intrusion into the security zone.
    Type: Grant
    Filed: September 3, 2010
    Date of Patent: April 2, 2013
    Assignee: PAX Computer Technology, Co., Ltd.
    Inventors: Shuxian Shi, Hongtao Sun
  • Patent number: 8412958
    Abstract: A device management system is configured with a target device including at least one unit that includes a tamper-resistant chip, a management apparatus that manages or uses the target device, and an authentication apparatus including a database for authentication, connected via a network in a communicable manner. In the target device, each unit is equipped with the tamper-resistant chip that collects device information specific to a unit, stores collected device information, and stores a confidential-key.
    Type: Grant
    Filed: January 17, 2007
    Date of Patent: April 2, 2013
    Assignees: PFU Limited, Fijitsu Limited
    Inventors: Kouichi Minami, Seigo Kotani
  • Patent number: 8403998
    Abstract: A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: March 26, 2013
    Assignee: Intel Corporation
    Inventors: Mousumi M. Hazra, Gyan Prakash, Carol A. Bell, Selim Aissi
  • Patent number: 8407487
    Abstract: A method for security monitoring of an electronic device includes determining whether a storage system of the electronic device is a secured storage system according to a signal of a first switch of the electronic device, determining whether an encryption key of the secured storage system is modifiable according to a detected signal of a second switch of the electronic device. Decrypting the secured storage system using a decryption key if the decryption key is the same as a preset decryption key in the secured storage system.
    Type: Grant
    Filed: August 19, 2010
    Date of Patent: March 26, 2013
    Assignee: Hon Hai Precision Industry Co., Ltd.
    Inventors: Yang-Yuan Chen, Ming-Chih Hsieh
  • Patent number: 8407466
    Abstract: Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that can determine whether a client request to download or play content should be granted. All purchase, download, and playback requests require permission from the permission system. The server also includes a DD module system that transfers a DD module to the client. The DD module includes a content key decryption module, a content decryption module, and a content decompression module. The content key decryption module decrypts an encrypted content key that was received from the server. The decryption uses a unique DD module key that has been hard-coded into the content key decryption module. The content decryption module uses the content key to decrypt encrypted content. The content decompression module decompresses compressed content so that it can be played.
    Type: Grant
    Filed: October 24, 2011
    Date of Patent: March 26, 2013
    Assignee: Google Inc.
    Inventors: Wai Fun (Aaron) Lee, Marius P. Schilder, Jason D. Waddle, J. Alex Halderman
  • Patent number: RE44130
    Abstract: Anti-pirate circuitry is provided for combating the theft of intellectual property contained with semiconductor integrated circuits. The anti-pirate circuit includes a unique number generator that provides a multi-bit die ID data string that is unique to the integrated circuit associated with the anti-pirate circuit. One time programmable (OTP) EPROM circuitry reads the die ID data string at wafer sort and writes the data content to nonvolatile memory. During a subsequent verification cycle, ID comparator circuitry compares the data string provided by the unique number generator to the stored contents of the nonvolatile memory. If the comparison results in a mismatch between more than a predefined number of bits, then the integrated circuit associated with the anti-pirate circuit is not enabled for operation.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: April 2, 2013
    Assignee: National Semiconductor Corporation
    Inventors: Elroy M. Lucero, Daniel J. Lucero, Hengyang (James) Lin, Andrew J. Franklin, Pavel Poplevine