Tamper Resistant Patents (Class 713/194)
  • Patent number: 8751821
    Abstract: A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket storing data, and employing the controller to corrupt at least a portion of the data.
    Type: Grant
    Filed: February 22, 2013
    Date of Patent: June 10, 2014
    Assignee: Cisco Technology Inc.
    Inventors: Itsik Mantin, Perry Smith, Yaron Sella, Erez Waisbard
  • Patent number: 8745752
    Abstract: A detection method for detecting fraud with respect to a card reader. The card reader includes a removal detection switch for detecting a removal from a housing of a user operation terminal, a first RAM that can erase removal detection recognition data being stored therein, according to an output signal from the detection switch, a second RAM being independent of the first RAM and storing authentication key data. The method includes erasing the removal detection recognition data is erased when the card reader is removed from the housing of the user operation terminal. Afterwards, the authentication key data is changed after completion of predetermined authentication procedures when the card reader is mounted into the housing of the user operation terminal. Then, the changed authentication key data is stored in the second RAM, while the removal detection recognition data is stored in the first RAM.
    Type: Grant
    Filed: July 7, 2010
    Date of Patent: June 3, 2014
    Assignee: Nidec Sankyo Corporation
    Inventor: Tsutomu Baba
  • Patent number: 8744403
    Abstract: The present disclosure provides a method and system for remote control of a smart card. The method comprises that: a smart card management platform receives a request of locking or unlocking a smart card from a subscriber; and the smart card management platform performs interactive processing with a terminal side according to the request via a mobile network platform, so as to enable the terminal side to perform the locking or unlocking of the smart card. The present disclosure enables the payment subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: June 3, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Patent number: 8745408
    Abstract: An instruction decryption arrangement includes an input interface configured to receive an encrypted instruction, a decryption key updater configured to output a decryption key, and an instruction decrypter including a first input connected to the input interface and a second input connected to the decryption key updater, and configured to decrypt the encrypted instruction using the decryption key and to provide a decrypted instruction. The decryption key updater is further configured to update the decryption key using at least one of the encrypted instruction and the decrypted instruction. An alternative instruction decryption arrangement includes a key stream module configured to iteratively determine a key state corresponding to a current instruction for a computing unit and an instruction decrypter configured to receive an encrypted instruction related to the current instruction and decrypt the encrypted instruction using the key state to provide a decrypted instruction.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: June 3, 2014
    Assignee: Infineon Technologies AG
    Inventor: Stefan Mangard
  • Patent number: 8739280
    Abstract: A taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. It is determined whether the taint processing is effective in mitigating a security vulnerability caused by the tainted value for the output context.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: May 27, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian V Chess, Sean Patrick Fay
  • Patent number: 8734529
    Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.
    Type: Grant
    Filed: August 13, 2012
    Date of Patent: May 27, 2014
    Assignee: Absolute Software Corporation
    Inventor: Jon Stevens
  • Patent number: 8726374
    Abstract: A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with.
    Type: Grant
    Filed: February 15, 2010
    Date of Patent: May 13, 2014
    Assignee: Panasonic Corporation
    Inventors: Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi
  • Patent number: 8724817
    Abstract: A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Bruce A. Rich, Thomas H. Benjamin, John T. Peck
  • Patent number: 8726037
    Abstract: Various systems and methods for encrypting data are disclosed. In one aspect, the method includes receiving a memory address and a value to be written in the memory address. The method also includes encrypting the value using the memory address as an initial value for an encryption process. The method also includes storing the encrypted value in the memory address.
    Type: Grant
    Filed: September 27, 2011
    Date of Patent: May 13, 2014
    Assignee: Atmel Corporation
    Inventors: Guillaume Pean, Alain Vergnes, Michel Douguet
  • Patent number: 8726378
    Abstract: Implementations of the present disclosure include methods, systems, and computer readable storage mediums for validating input parameters provided to an application, including executing the application using the one or more processors, collecting one or more validation aspects associated with the application to provide a set of validation aspects, receiving a first input parameter that is associated with a first validation point, extracting a first data type of the first input parameter, and determining that a validation aspect corresponding to the first data type is available in the set of validation aspects and, in response, applying a corresponding validation function to the first input parameter.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: May 13, 2014
    Assignee: SAP AG
    Inventors: Anderson Santana de Oliveira, Theodoor Scholte, Gabriel Serme
  • Patent number: 8719589
    Abstract: A microprocessor includes a storage element having a plurality of locations each storing decryption key data associated with an encrypted program. A control register field (may be x86 EFLAGS register reserved field) specifies a storage element location associated with a currently executing encrypted program. The microprocessor restores from memory to the control register a previously saved value of the field in response to executing a return from interrupt instruction. A fetch unit fetches encrypted instructions of the currently executing encrypted program and decrypts them using the decryption key data stored the storage element location specified by the restored field value. A kill bit associated with each storage element location may be employed if the location is clobbered because more encrypted programs are multitasked than available locations in the storage element, in which case an exception is generated to re-load the clobbered decryption key data in response to the return from interrupt instruction.
    Type: Grant
    Filed: April 21, 2011
    Date of Patent: May 6, 2014
    Assignee: VIA Technologies, Inc.
    Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
  • Patent number: 8718603
    Abstract: The present application discloses a method and system for remote control of a smart card. The method includes: a smart card management platform receives a request to destroy the smart card from a subscriber (S101); according to the request, the smart card management platform performs interactive processing with a terminal side via a mobile network platform to make the terminal side destroy the smart card (S103). The present application enables the subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: May 6, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Patent number: 8719938
    Abstract: Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data. The first network device receives data from the second network device that is encrypted using the decoy cryptographic key. The first network device determines that the data is encrypted using the decoy cryptographic key. The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key. The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data. The alert message also instructs the other network devices to ignore data originating from the second network device.
    Type: Grant
    Filed: April 9, 2012
    Date of Patent: May 6, 2014
    Assignee: Landis+Gyr Innovations, Inc.
    Inventors: Stephen Chasko, Michael Demeter
  • Patent number: 8719957
    Abstract: Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: May 6, 2014
    Assignee: Altera Corporation
    Inventor: Bruce B. Pedersen
  • Patent number: 8718602
    Abstract: The disclosure discloses a method and a system for remote control of a smart card; the method comprises: receiving, by a smart card management platform, a request for performing a LOCKING/UNLOCKING operation for a smart card from a user (S101); and the smart card management platform performs a short message interaction with a terminal side through a mobile network platform based on the request, so as to make the terminal side perform the LOCKING/UNLOCKING operation for the smart card (S103). By means of the disclosure, the effects are achieved that the user can apply to a smart card supervision department for locking/unlocking the smart card and a terminal through a short message and disabling or enabling the smart card, when the smart card and the terminal in which the smart card is located are robbed, lost, stolen and has a serious illegal behavior, so as to protect the security of the user and the smart card relevant department to the greatest extent and provide a better flexibility for a payment system.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: May 6, 2014
    Assignee: ZTE Corporation
    Inventors: Chuanxi Wu, Jingwang Ma
  • Patent number: 8707430
    Abstract: An information security apparatus includes a plurality of monitoring modules that monitor for tampering. A management apparatus includes a reception unit that receives a plurality of monitoring results each generated by a source monitoring module monitoring a target monitoring module; a detection unit that detects an abnormality by referring to fewer than all of the received monitoring results; and an identification unit that identifies, when an abnormality is detected, a monitoring module that has been tampered with from among (i) a monitoring module that generates a monitoring result related to the abnormality, and (ii) one or more monitoring modules identified by tracing back through a chain of monitoring modules consecutively from the target of monitoring to the source of monitoring, starting from the monitoring module that generates the monitoring result related to the abnormality.
    Type: Grant
    Filed: April 19, 2011
    Date of Patent: April 22, 2014
    Assignee: Panasonic Corporation
    Inventors: Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
  • Patent number: 8702812
    Abstract: Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down). Conventional solutions have required software running on the system to perform the lockdown action, but in accordance with at least one preferred embodiment of the present invention is the linkage of TPM (Trusted Platform Module) and AMT (Active Management Technology) solutions whereby an AMT arrangement can remove secure data or identifiers so that any encrypted data present on the system will become unusable.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: April 22, 2014
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: David C. Challener, Howard Locker, Randall S. Springfield
  • Patent number: 8707438
    Abstract: Techniques for providing storage for electronic records are described herein. According to one embodiment, a command is received from a client through an interface of a storage system. An approval is received from an authorization agent associated with the storage system for the received command. In response to the approval received from the authorization agent for the received command, an operation associated with the received command is performed. Other methods and apparatuses are also described.
    Type: Grant
    Filed: October 9, 2008
    Date of Patent: April 22, 2014
    Assignee: EMC Corporation
    Inventor: Windsor W. Hsu
  • Patent number: 8707051
    Abstract: A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while accelerating their processing. This firmware cipher component allows an ASIC to support multiple cipher algorithms while accelerating the operations beyond speeds conventionally achieved by software or firmware only solutions. This system combines cryptographic specific custom instructions with hardware based data manipulation accelerators. The cryptographic specific custom instructions and hardware accelerators may support both block and stream ciphers. Thus, the system may be reconfigured, allowing the cipher algorithm to change without halting the system. Further, embedding the Firmware Programmable Cipher within an ASIC may allow future capabilities to be supported in secure applications.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: April 22, 2014
    Assignee: Exelis, Inc.
    Inventors: Kevin Joel Osugi, Nhu-Ha Yup, Michael D. Collins, Lee Paul Noehring
  • Patent number: 8707059
    Abstract: An intrusion detection module includes an enclosure and a sensor to detect a predetermined type of intrusion. The module further includes a tamper sensor to detect a tampering attempt. An encryption mechanism is coupled to receive signals from the sensor and tamper sensor and encrypt such signals for transmission to a control panel.
    Type: Grant
    Filed: January 7, 2011
    Date of Patent: April 22, 2014
    Assignee: Cinch Systems, Inc.
    Inventors: Joel Curtis Christianson, Gregory Brett Olson
  • Patent number: 8707435
    Abstract: The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U1) entering into a security domain (SD), the general trust center (TC) distributing to the node at least one keying material share corresponding to the entered security domain, and upon detecting corruption of at least two security domains, determining, for each security domain, based on information registered by the base station (BTS), a respective set of nodes having received keying material corresponding to said security domain,—comparing the respective sets of nodes and identifying the common nodes as being compromised.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: April 22, 2014
    Assignee: Koninklijke Philips N.V.
    Inventors: Oscar Garcia Morchon, Klaus Kursawe
  • Publication number: 20140108786
    Abstract: One of the various aspects of the invention is related to suggesting various techniques for improving the tamper-resistibility of hardware. The tamper-resistant hardware may be advantageously used in a transaction system that provides the off-line transaction protocol. Amongst these techniques for improving the tamper-resistibility are trusted bootstrapping by means of secure software entity modules, a new use of hardware providing a Physical Unclonable Function, and the use of a configuration fingerprint of a FPGA used within the tamper-resistant hardware.
    Type: Application
    Filed: March 12, 2012
    Publication date: April 17, 2014
    Applicant: EMSYCON GMBH
    Inventor: Heinz Kreft
  • Patent number: 8701193
    Abstract: A method, article of manufacture, and apparatus for efficiently processing information are disclosed. In some embodiments, a first signature index is received. The first signature index is compared to a second signature index. A negative signature match is based on the comparison. A file is flagged based on the negative match.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: April 15, 2014
    Assignee: EMC Corporation
    Inventor: Steven Thomas Wong
  • Patent number: 8694802
    Abstract: A system and method for creating tamper-resistant code are described herein. In one embodiment, the method comprises receiving a first object code block. The method also comprises translating the first object code block into a second code block, wherein the translating includes applying taper-resistance techniques to the first object code block or the second object code block. The method also comprises executing the second object code block.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: April 8, 2014
    Assignee: Apple Inc.
    Inventor: James D. Batson
  • Patent number: 8694770
    Abstract: An auditable cryptographic protected cloud computing communication system, wherein the system can include a plurality of industrial devices. Each industrial device can have an individualized messaging protocol enabling each industrial device to receive commands and transmit status and measurement data using the individualized messaging protocol for each industrial device.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: April 8, 2014
    Assignee: DJ Inventions, LLC
    Inventor: Douglas C. Osburn, III
  • Patent number: 8694767
    Abstract: A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a NAND flash memory with a block structure that comprises a guaranteed block and non-guaranteed blocks. The guaranteed block is guaranteed to be useable. A boot code is segmented into boot code segments and the boot code segments are stored separately in the guaranteed and non-guaranteed blocks. The security sub-system is configured to locate the boot code segments stored in the non-guaranteed blocks and validate them independently based on data in the guaranteed block. The security sub-system is further configured to assemble the boot code segments into the boot code and execute the boot code.
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: April 8, 2014
    Assignee: Broadcom Corporation
    Inventors: Stephane Rodgers, Andrew Dellow, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
  • Patent number: 8689010
    Abstract: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: April 1, 2014
    Assignee: Microsoft Corporation
    Inventors: James M. Alkove, Alexandre V. Grigorovitch, Patrik Schnell
  • Patent number: 8689016
    Abstract: A system, apparatus, and method are directed to providing digital copy protection of media using a subscriber/publisher architecture. In one embodiment, a publisher employs various dynamic and/or static tamper detection, including, filter graph change detectors, ICE detectors, screen scraping detectors, debugger detectors, pattern recognizers, or the like. When a tampering event is detected by one or more of the publishers, the tamper event may be published for access by a subscriber. Published tamper events may be pushed to or pulled by the subscribers. When one or more subscribers receive the tamper event, the subscriber(s) may perform one or more tamper response actions according to various business rules, and/or other core rules.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: April 1, 2014
    Assignee: Google Inc.
    Inventors: Glenn A. Morten, Edward Charles Hiar, Andre Jacobs, James E. Veres, Oscar V. Zhuk, Jeffrey Lee Tinker
  • Patent number: 8689006
    Abstract: A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.
    Type: Grant
    Filed: April 13, 2012
    Date of Patent: April 1, 2014
    Assignee: McAfee, Inc.
    Inventors: Manabendra Paul, Abhilash Chandran
  • Patent number: 8683217
    Abstract: A device according to the present invention is configured for transmitting data between two semiconductor chips of a data processor in an encrypted manner, wherein a first semiconductor chip is connected to a second semiconductor chip. The device includes a non-volatile memory element in each of the two semiconductor chips, wherein an encryption initial value for an encryption rule is stored in the memory element of the first semiconductor chip and a decryption initial value associated to the encryption initial value for a decryption rule associated to the encryption rule is stored in the memory element of the second semiconductor chip. Additionally, the first semiconductor chip has a first data transmission interface formed to generate an encryption data stream from an input data stream using the encryption initial value according to the encryption rule.
    Type: Grant
    Filed: March 24, 2006
    Date of Patent: March 25, 2014
    Assignee: Infineon Technologies AG
    Inventors: Berndt Gammel, Dietmar Scheiblhofer
  • Patent number: 8681972
    Abstract: A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining (11) first and second random values (r, r?), then, by obtaining a first result (13) by applying a second affine operation (?K1), which corresponds to a second secret key, to a first combination (12) of the first and second random values, and, by obtaining (14) thereafter a second result by applying a third affine operation (?K2) which corresponds to a third secret key to said first result.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: March 25, 2014
    Assignee: MORPHO
    Inventors: Herve Chabanne, Julien Bringer, Thomas Icart
  • Patent number: 8683233
    Abstract: The invention relates to a method for protecting at least one motor vehicle component against manipulation in a control device, which comprises at least one microcomputer (?C) and at least one memory module (2, 3), characterized in that the microcomputer (?C) reads out a specific original identifier (ID) of at least one memory module (2, 3) from the memory module (2, 3) and stores it. Furthermore the invention relates to a control device for a motor vehicle component which comprises at least one microcomputer (?C) and at least one memory module (2, 3), characterized in that at least one memory module (2, 3) has at least one specific identifier (ID) and the microcomputer (?C) has at least one area (11) in which at least one specific original identifier is stored.
    Type: Grant
    Filed: July 23, 2003
    Date of Patent: March 25, 2014
    Assignee: Audi AG
    Inventors: Oliver Feilen, Rudiger Stadtmuller
  • Patent number: 8677115
    Abstract: A request is received from a client for accessing a resource provided in a network, the request including credential data representing system integrity of at least one component running on the client. In response to the request, one or more credential identifiers identifying the credential data is transmitted to a management server that provisioned the client. Credential reference data is received from the management server based on the one or more credential identifiers. The client is authenticated based on a comparison of the credential data received from the client and credential reference data received from the management server.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: March 18, 2014
    Assignee: Red Hat, Inc.
    Inventors: Eric L. Paris, Neil R. T. Horman
  • Patent number: 8677155
    Abstract: The invention comprises an intrusion-detection system based on a switch 1 that provides more effective protection by means of an innovative arrangement of three intrusion-detection contacts 16-17-18 on an electronic circuit, connected to two different intrusion-detection electronic circuit and an intrusion-detection switch 1 with a special design that provides three different interconnections between said contacts in response to different intrusion attacks. The special arrangement of the contacts on the electronic board provides protection against different sophisticated attacks even without the participation of the intrusion-detection switch.
    Type: Grant
    Filed: May 20, 2009
    Date of Patent: March 18, 2014
    Inventor: Nikolay Dimitrov Chambourov
  • Patent number: 8677153
    Abstract: A device and a method for protecting a cryptographic module of which the method includes: estimating a functionality of a circuit that is adapted to malfunction when a physical parameter has a first value different from a nominal parameter value at which the cryptographic module functions correctly. The cryptographic module malfunctions when the physical parameter has a second value different from the nominal parameter value and a difference between the first value and the nominal parameter value being smaller than a difference between the second value and the nominal parameter value. A cryptographic module protective measure is applied if estimating that the circuit malfunctions.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: March 18, 2014
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Michael Priel, Asaf Ashkenazi, Dan Kuzmin, Anton Rozen
  • Patent number: 8677507
    Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.
    Type: Grant
    Filed: February 8, 2011
    Date of Patent: March 18, 2014
    Assignee: Intertrust Technologies Corporation
    Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
  • Publication number: 20140068280
    Abstract: There is provided a security chip having a tamper-resistant feature, including an acquisition part configured to acquire specific information transmitted by a device performing challenge-response authentication, the specific information being specific to the device, a storage configured to store second key information that enables generation of first key information from the specific information, the first key information being used by the device for challenge-response authentication, and a generation part configured to generate, using the second key information, the first key information from the specific information. A response to be transmitted to the device is generated, using the first key information, from a challenge transmitted by the device. In the device, the first key information is not stored in a tamper-resistant security chip.
    Type: Application
    Filed: August 20, 2013
    Publication date: March 6, 2014
    Applicant: SONY CORPORATION
    Inventor: Hideo Yoshimi
  • Patent number: 8667283
    Abstract: A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of accuracy (i.e., high probability of rejection of a forged signature and a low probably of false rejection of a true signature). In some examples, the information shared by a recipient of a message signature includes a parametric model of operational characteristics of the PUF used to form the signature.
    Type: Grant
    Filed: May 9, 2011
    Date of Patent: March 4, 2014
    Assignee: Verayo, Inc.
    Inventors: William Henry Bares, Srinivas Devadas, Vivek Khandelwal, Zdenek Paral, Richard Sowell, Tonghang Zhou
  • Patent number: 8667597
    Abstract: Methods, program product, and systems for providing tamper-resistant executable software code are provided to enable software code transport, storage, and execution security by formatting all instructions to use operand indirect addressing, resulting in an indirect table for each operand position, or field, in the instruction set. That is, rather than each instruction including an operand, each instruction includes an index to the location of the value of the operand in an indirect table. The methods, program product, and systems can also implement a non-typical instruction fetch associated with a program counter and a sequentially stored vector table, or jump table, to retrieve the next sequential instruction (“NSI”). Following rearranging or scrambling or encoding of the executable code, the code can be loaded and executed directly in scrambled form using the jump table, but cannot be meaningfully disassembled, nor executed properly, without the jump table to resolve the NSI.
    Type: Grant
    Filed: March 16, 2009
    Date of Patent: March 4, 2014
    Assignee: Lockheed Martin Corporation
    Inventor: Edward L. Safford, III
  • Patent number: 8662394
    Abstract: An electronic system comprising a printed circuit having first and second opposite surfaces, an electronic component attached to the second surface and a first device of protection against access attempts on the first surface side. The system comprises a second protection device at least partially covering, on the second surface side, the electronic component, and comprising at least one tab. The printed circuit comprises at least one through opening, the tab extending in the opening and being attached to the printed circuit. The tab comprises at least one conductive portion electrically contacting at least one first conductive track of the first surface.
    Type: Grant
    Filed: July 15, 2009
    Date of Patent: March 4, 2014
    Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingenico”
    Inventors: Eric Bonnet, Alain Eck, Vincent Hernandez
  • Patent number: 8661539
    Abstract: A system is disclosed that can be used to monitor for an attempted intrusion of an access system. The system detects an access system event in the access system and determines whether the access system event is of a type that is being monitored. If the access system event is of a type that is being monitored, the system reports information about the access system event. This information can be used by a rules engine or other process to determine if the access system event was part of an attempted intrusion of the access system.
    Type: Grant
    Filed: February 26, 2001
    Date of Patent: February 25, 2014
    Assignee: Oracle International Corporation
    Inventor: Jeffrey D. Hodges
  • Patent number: 8656191
    Abstract: A secure system-on-chip for processing data, the system-on-chip comprising at least a central processing unit (CPU), an input and an output channel, an encryption/decryption engine and a memory, wherein, said input channel comprises an input encryption module to encrypt all incoming data, said output channel comprising an output decryption module to decrypt all outgoing data, said CPU receiving the encrypted data from the input encryption module and storing them in the memory, and while processing the stored data, said CPU reading the stored data from the memory, requesting decryption of same in the encryption/decryption engine, processing the data and requesting encryption of the result by the encryption/decryption engine and storing the encrypted result, outputting the result to the output decryption module for decryption purpose and exiting the decrypted result via the output channel.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: February 18, 2014
    Assignee: Nagravision S.A.
    Inventor: Andre Kudelski
  • Patent number: 8656501
    Abstract: There is provided a method for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language, in particular Java, wherein a protected application is created by adding a protection module to the application, analyzing a first method to be protected of a plurality of methods of a first class of the application and determining first parameters needed for executing the first method, generating first gate code depending on the determined first parameters, replacing the first code of the first method by said first gate code and storing the replaced first code such that it can be accessed by the protection module during execution of the protected application, wherein, when the first method is called during execution of the protected application, the first gate code collects first data based on the determined first parameters and transmits the collected first data to the protection module, the protection module accesses the stored first code and generates a
    Type: Grant
    Filed: July 1, 2011
    Date of Patent: February 18, 2014
    Assignee: SafeNet Germany GmbH
    Inventor: Benjamin Gnahm
  • Patent number: 8656190
    Abstract: A one-time-settable tamper resistant software repository may be used in any computing system to store system information such as security violations and policies for responding to them. A one-time-settable tamper resistant software repository may be cryptographically signed, encrypted with a per device key and accessible by only the most privileged software executed by a computing device, e.g., hypervisor or operating system kernel. A one-time-settable tamper resistant software repository may be mirrored in RAM for performance. Recordable event fields in a software repository may be one-time-settable without the ability to reset them in a field operation mode whereas they may be resettable in a different mode such as a manufacturing mode.
    Type: Grant
    Filed: January 31, 2008
    Date of Patent: February 18, 2014
    Assignee: Microsoft Corporation
    Inventors: Sebastian Lange, Adam Gabriel Poulos, Victor Tan
  • Patent number: 8650639
    Abstract: A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack.
    Type: Grant
    Filed: September 29, 2010
    Date of Patent: February 11, 2014
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Michael Stephen Brown, Robert John Lambert, Alfred John Menezes
  • Patent number: 8649513
    Abstract: Method for converting non copy protected data into copy protected data. The non copy protected data includes data structure data, controlling data and content data. The content data are embedded into data structures defined by the data structure data, and are processed using the controlling data. The method includes transferring part of the data structure data or the controlling data via a first network, from a first to a second network location, generating modified data structure data or modified controlling data at the second network location based on the data structure/controlling data supplied to the second network location, transferring the modified data structure/controlling data via a second network from the second to a third network location, where the copy protected data is generated by embedding the content data into modified data structures based on the modified data structure data or by replacing the controlling data with the modified controlling data.
    Type: Grant
    Filed: May 23, 2006
    Date of Patent: February 11, 2014
    Assignee: SONY DADC Austria AG
    Inventors: Klaus Holzapfel, Walter Hinterhoelzl, Thomas Goebl, Markus Prenn, Rupert Schoenauer
  • Patent number: 8650636
    Abstract: In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen 172 may display a personalized digital image 310. A user input device 160 may receive a user drawing set executed by a user over the personalized digital image 310. A processor 120 may authenticate access to the user session if the user drawing set matches a library drawing set associated with the user.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: February 11, 2014
    Assignee: Microsoft Corporation
    Inventors: Jeff Johnson, Steve Seixeiro, Zachary Pace, Giles van der Bogert, Sean Gilmour, Levi Siebens, Ken Tubbs
  • Patent number: 8645716
    Abstract: The present disclosure describes apparatuses and techniques for fail-safe key zeroization. In some aspects a periodic counter is activated that is configured to indicate an amount of time that content of a one-time-programmable (OTP) memory is accessible and overwriting of the content of the OTP is caused when the periodic counter reaches a predetermined value effective to zeroize the content. In other aspects a periodic counter is started in response to a power event and one or more encryption keys stored in OTP memory are zeroized if an indication of media drive security is not received within a predetermined amount of time.
    Type: Grant
    Filed: October 4, 2011
    Date of Patent: February 4, 2014
    Assignee: Marvell International Ltd.
    Inventors: Vineet Dujari, Tze Lei Poo
  • Patent number: 8645735
    Abstract: The invention relates to a secure device, and more particularly, to systems, devices and methods of reducing power consumption of the secure device by limiting the amount of secure volatile memory that needs to be supplied by a battery. In a transport power mode, a sensitive data originally stored in a volatile memory is backed up in an encrypted format to a non-volatile memory, such that none or only a small area of the secure volatile memory has to be retained and powered by the battery for preserving cryptographic keys that are used to backup and recover the sensitive data. This secure device is applied in high security applications such as secure financial terminals.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: February 4, 2014
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Kristopher Leigh Ardis, Tangkwai Ma, Sung Ung Kwak, Robert Michael Muchsel
  • Patent number: 8646046
    Abstract: A digital rights management system includes an authentication module and a decryption module. If desired, the modules can be implemented in separate integrated circuits. The authentication module retrieves authentication information for protected content and powers down after the authentication information is retrieved. The decryption module decrypts the protected content based on the authentication information while the authentication module is powered down.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: February 4, 2014
    Assignees: Advanced Micro Devices, Inc., ATI Technologies ULC
    Inventors: Alwyn Dos Remedios, Stefan Scherer, Mark Bapst, Satyajit Patne