Tamper Resistant Patents (Class 713/194)
-
Patent number: 8751821Abstract: A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket storing data, and employing the controller to corrupt at least a portion of the data.Type: GrantFiled: February 22, 2013Date of Patent: June 10, 2014Assignee: Cisco Technology Inc.Inventors: Itsik Mantin, Perry Smith, Yaron Sella, Erez Waisbard
-
Patent number: 8745752Abstract: A detection method for detecting fraud with respect to a card reader. The card reader includes a removal detection switch for detecting a removal from a housing of a user operation terminal, a first RAM that can erase removal detection recognition data being stored therein, according to an output signal from the detection switch, a second RAM being independent of the first RAM and storing authentication key data. The method includes erasing the removal detection recognition data is erased when the card reader is removed from the housing of the user operation terminal. Afterwards, the authentication key data is changed after completion of predetermined authentication procedures when the card reader is mounted into the housing of the user operation terminal. Then, the changed authentication key data is stored in the second RAM, while the removal detection recognition data is stored in the first RAM.Type: GrantFiled: July 7, 2010Date of Patent: June 3, 2014Assignee: Nidec Sankyo CorporationInventor: Tsutomu Baba
-
Patent number: 8744403Abstract: The present disclosure provides a method and system for remote control of a smart card. The method comprises that: a smart card management platform receives a request of locking or unlocking a smart card from a subscriber; and the smart card management platform performs interactive processing with a terminal side according to the request via a mobile network platform, so as to enable the terminal side to perform the locking or unlocking of the smart card. The present disclosure enables the payment subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.Type: GrantFiled: December 23, 2009Date of Patent: June 3, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Patent number: 8745408Abstract: An instruction decryption arrangement includes an input interface configured to receive an encrypted instruction, a decryption key updater configured to output a decryption key, and an instruction decrypter including a first input connected to the input interface and a second input connected to the decryption key updater, and configured to decrypt the encrypted instruction using the decryption key and to provide a decrypted instruction. The decryption key updater is further configured to update the decryption key using at least one of the encrypted instruction and the decrypted instruction. An alternative instruction decryption arrangement includes a key stream module configured to iteratively determine a key state corresponding to a current instruction for a computing unit and an instruction decrypter configured to receive an encrypted instruction related to the current instruction and decrypt the encrypted instruction using the key state to provide a decrypted instruction.Type: GrantFiled: April 8, 2011Date of Patent: June 3, 2014Assignee: Infineon Technologies AGInventor: Stefan Mangard
-
Patent number: 8739280Abstract: A taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. It is determined whether the taint processing is effective in mitigating a security vulnerability caused by the tainted value for the output context.Type: GrantFiled: September 29, 2011Date of Patent: May 27, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian V Chess, Sean Patrick Fay
-
Patent number: 8734529Abstract: An electronic device, prior to entering a distribution channel, is equipped with a loss prevention client which permits limited use of the device until correct authentication is provided by a legitimate purchaser. By permitting limited use before authentication, the device remains both useful to a legitimate purchaser and valuable to a thief. While allowing operation in the possession of a thief, options can be provided to permit tracking of the device or to allow proper purchase of the device.Type: GrantFiled: August 13, 2012Date of Patent: May 27, 2014Assignee: Absolute Software CorporationInventor: Jon Stevens
-
Patent number: 8726374Abstract: A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with.Type: GrantFiled: February 15, 2010Date of Patent: May 13, 2014Assignee: Panasonic CorporationInventors: Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi
-
Patent number: 8724817Abstract: A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.Type: GrantFiled: April 30, 2012Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Bruce A. Rich, Thomas H. Benjamin, John T. Peck
-
Patent number: 8726037Abstract: Various systems and methods for encrypting data are disclosed. In one aspect, the method includes receiving a memory address and a value to be written in the memory address. The method also includes encrypting the value using the memory address as an initial value for an encryption process. The method also includes storing the encrypted value in the memory address.Type: GrantFiled: September 27, 2011Date of Patent: May 13, 2014Assignee: Atmel CorporationInventors: Guillaume Pean, Alain Vergnes, Michel Douguet
-
Patent number: 8726378Abstract: Implementations of the present disclosure include methods, systems, and computer readable storage mediums for validating input parameters provided to an application, including executing the application using the one or more processors, collecting one or more validation aspects associated with the application to provide a set of validation aspects, receiving a first input parameter that is associated with a first validation point, extracting a first data type of the first input parameter, and determining that a validation aspect corresponding to the first data type is available in the set of validation aspects and, in response, applying a corresponding validation function to the first input parameter.Type: GrantFiled: October 27, 2011Date of Patent: May 13, 2014Assignee: SAP AGInventors: Anderson Santana de Oliveira, Theodoor Scholte, Gabriel Serme
-
Patent number: 8719589Abstract: A microprocessor includes a storage element having a plurality of locations each storing decryption key data associated with an encrypted program. A control register field (may be x86 EFLAGS register reserved field) specifies a storage element location associated with a currently executing encrypted program. The microprocessor restores from memory to the control register a previously saved value of the field in response to executing a return from interrupt instruction. A fetch unit fetches encrypted instructions of the currently executing encrypted program and decrypts them using the decryption key data stored the storage element location specified by the restored field value. A kill bit associated with each storage element location may be employed if the location is clobbered because more encrypted programs are multitasked than available locations in the storage element, in which case an exception is generated to re-load the clobbered decryption key data in response to the return from interrupt instruction.Type: GrantFiled: April 21, 2011Date of Patent: May 6, 2014Assignee: VIA Technologies, Inc.Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
-
Patent number: 8718603Abstract: The present application discloses a method and system for remote control of a smart card. The method includes: a smart card management platform receives a request to destroy the smart card from a subscriber (S101); according to the request, the smart card management platform performs interactive processing with a terminal side via a mobile network platform to make the terminal side destroy the smart card (S103). The present application enables the subscriber to avoid loss when the terminal is robbed, lost, stolen, or is illegally used seriously, and provide a higher flexibility to the payment system.Type: GrantFiled: December 23, 2009Date of Patent: May 6, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Patent number: 8719938Abstract: Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data. The first network device receives data from the second network device that is encrypted using the decoy cryptographic key. The first network device determines that the data is encrypted using the decoy cryptographic key. The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key. The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data. The alert message also instructs the other network devices to ignore data originating from the second network device.Type: GrantFiled: April 9, 2012Date of Patent: May 6, 2014Assignee: Landis+Gyr Innovations, Inc.Inventors: Stephen Chasko, Michael Demeter
-
Patent number: 8719957Abstract: Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation.Type: GrantFiled: April 29, 2011Date of Patent: May 6, 2014Assignee: Altera CorporationInventor: Bruce B. Pedersen
-
Patent number: 8718602Abstract: The disclosure discloses a method and a system for remote control of a smart card; the method comprises: receiving, by a smart card management platform, a request for performing a LOCKING/UNLOCKING operation for a smart card from a user (S101); and the smart card management platform performs a short message interaction with a terminal side through a mobile network platform based on the request, so as to make the terminal side perform the LOCKING/UNLOCKING operation for the smart card (S103). By means of the disclosure, the effects are achieved that the user can apply to a smart card supervision department for locking/unlocking the smart card and a terminal through a short message and disabling or enabling the smart card, when the smart card and the terminal in which the smart card is located are robbed, lost, stolen and has a serious illegal behavior, so as to protect the security of the user and the smart card relevant department to the greatest extent and provide a better flexibility for a payment system.Type: GrantFiled: December 23, 2009Date of Patent: May 6, 2014Assignee: ZTE CorporationInventors: Chuanxi Wu, Jingwang Ma
-
Patent number: 8707430Abstract: An information security apparatus includes a plurality of monitoring modules that monitor for tampering. A management apparatus includes a reception unit that receives a plurality of monitoring results each generated by a source monitoring module monitoring a target monitoring module; a detection unit that detects an abnormality by referring to fewer than all of the received monitoring results; and an identification unit that identifies, when an abnormality is detected, a monitoring module that has been tampered with from among (i) a monitoring module that generates a monitoring result related to the abnormality, and (ii) one or more monitoring modules identified by tracing back through a chain of monitoring modules consecutively from the target of monitoring to the source of monitoring, starting from the monitoring module that generates the monitoring result related to the abnormality.Type: GrantFiled: April 19, 2011Date of Patent: April 22, 2014Assignee: Panasonic CorporationInventors: Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
-
Patent number: 8702812Abstract: Methods and arrangements for ensuring that, when a computer system is stolen or otherwise misplaced, the system is rendered unusable (i.e., locked down). Conventional solutions have required software running on the system to perform the lockdown action, but in accordance with at least one preferred embodiment of the present invention is the linkage of TPM (Trusted Platform Module) and AMT (Active Management Technology) solutions whereby an AMT arrangement can remove secure data or identifiers so that any encrypted data present on the system will become unusable.Type: GrantFiled: February 29, 2008Date of Patent: April 22, 2014Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: David C. Challener, Howard Locker, Randall S. Springfield
-
Patent number: 8707438Abstract: Techniques for providing storage for electronic records are described herein. According to one embodiment, a command is received from a client through an interface of a storage system. An approval is received from an authorization agent associated with the storage system for the received command. In response to the approval received from the authorization agent for the received command, an operation associated with the received command is performed. Other methods and apparatuses are also described.Type: GrantFiled: October 9, 2008Date of Patent: April 22, 2014Assignee: EMC CorporationInventor: Windsor W. Hsu
-
Patent number: 8707051Abstract: A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while accelerating their processing. This firmware cipher component allows an ASIC to support multiple cipher algorithms while accelerating the operations beyond speeds conventionally achieved by software or firmware only solutions. This system combines cryptographic specific custom instructions with hardware based data manipulation accelerators. The cryptographic specific custom instructions and hardware accelerators may support both block and stream ciphers. Thus, the system may be reconfigured, allowing the cipher algorithm to change without halting the system. Further, embedding the Firmware Programmable Cipher within an ASIC may allow future capabilities to be supported in secure applications.Type: GrantFiled: June 4, 2012Date of Patent: April 22, 2014Assignee: Exelis, Inc.Inventors: Kevin Joel Osugi, Nhu-Ha Yup, Michael D. Collins, Lee Paul Noehring
-
Patent number: 8707059Abstract: An intrusion detection module includes an enclosure and a sensor to detect a predetermined type of intrusion. The module further includes a tamper sensor to detect a tampering attempt. An encryption mechanism is coupled to receive signals from the sensor and tamper sensor and encrypt such signals for transmission to a control panel.Type: GrantFiled: January 7, 2011Date of Patent: April 22, 2014Assignee: Cinch Systems, Inc.Inventors: Joel Curtis Christianson, Gregory Brett Olson
-
Patent number: 8707435Abstract: The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U1) entering into a security domain (SD), the general trust center (TC) distributing to the node at least one keying material share corresponding to the entered security domain, and upon detecting corruption of at least two security domains, determining, for each security domain, based on information registered by the base station (BTS), a respective set of nodes having received keying material corresponding to said security domain,—comparing the respective sets of nodes and identifying the common nodes as being compromised.Type: GrantFiled: May 28, 2010Date of Patent: April 22, 2014Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Klaus Kursawe
-
Publication number: 20140108786Abstract: One of the various aspects of the invention is related to suggesting various techniques for improving the tamper-resistibility of hardware. The tamper-resistant hardware may be advantageously used in a transaction system that provides the off-line transaction protocol. Amongst these techniques for improving the tamper-resistibility are trusted bootstrapping by means of secure software entity modules, a new use of hardware providing a Physical Unclonable Function, and the use of a configuration fingerprint of a FPGA used within the tamper-resistant hardware.Type: ApplicationFiled: March 12, 2012Publication date: April 17, 2014Applicant: EMSYCON GMBHInventor: Heinz Kreft
-
Patent number: 8701193Abstract: A method, article of manufacture, and apparatus for efficiently processing information are disclosed. In some embodiments, a first signature index is received. The first signature index is compared to a second signature index. A negative signature match is based on the comparison. A file is flagged based on the negative match.Type: GrantFiled: September 30, 2009Date of Patent: April 15, 2014Assignee: EMC CorporationInventor: Steven Thomas Wong
-
Patent number: 8694802Abstract: A system and method for creating tamper-resistant code are described herein. In one embodiment, the method comprises receiving a first object code block. The method also comprises translating the first object code block into a second code block, wherein the translating includes applying taper-resistance techniques to the first object code block or the second object code block. The method also comprises executing the second object code block.Type: GrantFiled: April 30, 2004Date of Patent: April 8, 2014Assignee: Apple Inc.Inventor: James D. Batson
-
Patent number: 8694770Abstract: An auditable cryptographic protected cloud computing communication system, wherein the system can include a plurality of industrial devices. Each industrial device can have an individualized messaging protocol enabling each industrial device to receive commands and transmit status and measurement data using the individualized messaging protocol for each industrial device.Type: GrantFiled: August 21, 2012Date of Patent: April 8, 2014Assignee: DJ Inventions, LLCInventor: Douglas C. Osburn, III
-
Patent number: 8694767Abstract: A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a NAND flash memory with a block structure that comprises a guaranteed block and non-guaranteed blocks. The guaranteed block is guaranteed to be useable. A boot code is segmented into boot code segments and the boot code segments are stored separately in the guaranteed and non-guaranteed blocks. The security sub-system is configured to locate the boot code segments stored in the non-guaranteed blocks and validate them independently based on data in the guaranteed block. The security sub-system is further configured to assemble the boot code segments into the boot code and execute the boot code.Type: GrantFiled: February 26, 2013Date of Patent: April 8, 2014Assignee: Broadcom CorporationInventors: Stephane Rodgers, Andrew Dellow, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
-
Patent number: 8689010Abstract: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.Type: GrantFiled: June 28, 2007Date of Patent: April 1, 2014Assignee: Microsoft CorporationInventors: James M. Alkove, Alexandre V. Grigorovitch, Patrik Schnell
-
Patent number: 8689016Abstract: A system, apparatus, and method are directed to providing digital copy protection of media using a subscriber/publisher architecture. In one embodiment, a publisher employs various dynamic and/or static tamper detection, including, filter graph change detectors, ICE detectors, screen scraping detectors, debugger detectors, pattern recognizers, or the like. When a tampering event is detected by one or more of the publishers, the tamper event may be published for access by a subscriber. Published tamper events may be pushed to or pulled by the subscribers. When one or more subscribers receive the tamper event, the subscriber(s) may perform one or more tamper response actions according to various business rules, and/or other core rules.Type: GrantFiled: November 30, 2006Date of Patent: April 1, 2014Assignee: Google Inc.Inventors: Glenn A. Morten, Edward Charles Hiar, Andre Jacobs, James E. Veres, Oscar V. Zhuk, Jeffrey Lee Tinker
-
Patent number: 8689006Abstract: A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.Type: GrantFiled: April 13, 2012Date of Patent: April 1, 2014Assignee: McAfee, Inc.Inventors: Manabendra Paul, Abhilash Chandran
-
Patent number: 8683217Abstract: A device according to the present invention is configured for transmitting data between two semiconductor chips of a data processor in an encrypted manner, wherein a first semiconductor chip is connected to a second semiconductor chip. The device includes a non-volatile memory element in each of the two semiconductor chips, wherein an encryption initial value for an encryption rule is stored in the memory element of the first semiconductor chip and a decryption initial value associated to the encryption initial value for a decryption rule associated to the encryption rule is stored in the memory element of the second semiconductor chip. Additionally, the first semiconductor chip has a first data transmission interface formed to generate an encryption data stream from an input data stream using the encryption initial value according to the encryption rule.Type: GrantFiled: March 24, 2006Date of Patent: March 25, 2014Assignee: Infineon Technologies AGInventors: Berndt Gammel, Dietmar Scheiblhofer
-
Patent number: 8681972Abstract: A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining (11) first and second random values (r, r?), then, by obtaining a first result (13) by applying a second affine operation (?K1), which corresponds to a second secret key, to a first combination (12) of the first and second random values, and, by obtaining (14) thereafter a second result by applying a third affine operation (?K2) which corresponds to a third secret key to said first result.Type: GrantFiled: May 9, 2008Date of Patent: March 25, 2014Assignee: MORPHOInventors: Herve Chabanne, Julien Bringer, Thomas Icart
-
Patent number: 8683233Abstract: The invention relates to a method for protecting at least one motor vehicle component against manipulation in a control device, which comprises at least one microcomputer (?C) and at least one memory module (2, 3), characterized in that the microcomputer (?C) reads out a specific original identifier (ID) of at least one memory module (2, 3) from the memory module (2, 3) and stores it. Furthermore the invention relates to a control device for a motor vehicle component which comprises at least one microcomputer (?C) and at least one memory module (2, 3), characterized in that at least one memory module (2, 3) has at least one specific identifier (ID) and the microcomputer (?C) has at least one area (11) in which at least one specific original identifier is stored.Type: GrantFiled: July 23, 2003Date of Patent: March 25, 2014Assignee: Audi AGInventors: Oliver Feilen, Rudiger Stadtmuller
-
Patent number: 8677115Abstract: A request is received from a client for accessing a resource provided in a network, the request including credential data representing system integrity of at least one component running on the client. In response to the request, one or more credential identifiers identifying the credential data is transmitted to a management server that provisioned the client. Credential reference data is received from the management server based on the one or more credential identifiers. The client is authenticated based on a comparison of the credential data received from the client and credential reference data received from the management server.Type: GrantFiled: December 9, 2010Date of Patent: March 18, 2014Assignee: Red Hat, Inc.Inventors: Eric L. Paris, Neil R. T. Horman
-
Patent number: 8677155Abstract: The invention comprises an intrusion-detection system based on a switch 1 that provides more effective protection by means of an innovative arrangement of three intrusion-detection contacts 16-17-18 on an electronic circuit, connected to two different intrusion-detection electronic circuit and an intrusion-detection switch 1 with a special design that provides three different interconnections between said contacts in response to different intrusion attacks. The special arrangement of the contacts on the electronic board provides protection against different sophisticated attacks even without the participation of the intrusion-detection switch.Type: GrantFiled: May 20, 2009Date of Patent: March 18, 2014Inventor: Nikolay Dimitrov Chambourov
-
Patent number: 8677153Abstract: A device and a method for protecting a cryptographic module of which the method includes: estimating a functionality of a circuit that is adapted to malfunction when a physical parameter has a first value different from a nominal parameter value at which the cryptographic module functions correctly. The cryptographic module malfunctions when the physical parameter has a second value different from the nominal parameter value and a difference between the first value and the nominal parameter value being smaller than a difference between the second value and the nominal parameter value. A cryptographic module protective measure is applied if estimating that the circuit malfunctions.Type: GrantFiled: March 19, 2008Date of Patent: March 18, 2014Assignee: Freescale Semiconductor, Inc.Inventors: Michael Priel, Asaf Ashkenazi, Dan Kuzmin, Anton Rozen
-
Patent number: 8677507Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.Type: GrantFiled: February 8, 2011Date of Patent: March 18, 2014Assignee: Intertrust Technologies CorporationInventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
-
Publication number: 20140068280Abstract: There is provided a security chip having a tamper-resistant feature, including an acquisition part configured to acquire specific information transmitted by a device performing challenge-response authentication, the specific information being specific to the device, a storage configured to store second key information that enables generation of first key information from the specific information, the first key information being used by the device for challenge-response authentication, and a generation part configured to generate, using the second key information, the first key information from the specific information. A response to be transmitted to the device is generated, using the first key information, from a challenge transmitted by the device. In the device, the first key information is not stored in a tamper-resistant security chip.Type: ApplicationFiled: August 20, 2013Publication date: March 6, 2014Applicant: SONY CORPORATIONInventor: Hideo Yoshimi
-
Patent number: 8667283Abstract: A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of accuracy (i.e., high probability of rejection of a forged signature and a low probably of false rejection of a true signature). In some examples, the information shared by a recipient of a message signature includes a parametric model of operational characteristics of the PUF used to form the signature.Type: GrantFiled: May 9, 2011Date of Patent: March 4, 2014Assignee: Verayo, Inc.Inventors: William Henry Bares, Srinivas Devadas, Vivek Khandelwal, Zdenek Paral, Richard Sowell, Tonghang Zhou
-
Patent number: 8667597Abstract: Methods, program product, and systems for providing tamper-resistant executable software code are provided to enable software code transport, storage, and execution security by formatting all instructions to use operand indirect addressing, resulting in an indirect table for each operand position, or field, in the instruction set. That is, rather than each instruction including an operand, each instruction includes an index to the location of the value of the operand in an indirect table. The methods, program product, and systems can also implement a non-typical instruction fetch associated with a program counter and a sequentially stored vector table, or jump table, to retrieve the next sequential instruction (“NSI”). Following rearranging or scrambling or encoding of the executable code, the code can be loaded and executed directly in scrambled form using the jump table, but cannot be meaningfully disassembled, nor executed properly, without the jump table to resolve the NSI.Type: GrantFiled: March 16, 2009Date of Patent: March 4, 2014Assignee: Lockheed Martin CorporationInventor: Edward L. Safford, III
-
Patent number: 8662394Abstract: An electronic system comprising a printed circuit having first and second opposite surfaces, an electronic component attached to the second surface and a first device of protection against access attempts on the first surface side. The system comprises a second protection device at least partially covering, on the second surface side, the electronic component, and comprising at least one tab. The printed circuit comprises at least one through opening, the tab extending in the opening and being attached to the printed circuit. The tab comprises at least one conductive portion electrically contacting at least one first conductive track of the first surface.Type: GrantFiled: July 15, 2009Date of Patent: March 4, 2014Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingenico”Inventors: Eric Bonnet, Alain Eck, Vincent Hernandez
-
Patent number: 8661539Abstract: A system is disclosed that can be used to monitor for an attempted intrusion of an access system. The system detects an access system event in the access system and determines whether the access system event is of a type that is being monitored. If the access system event is of a type that is being monitored, the system reports information about the access system event. This information can be used by a rules engine or other process to determine if the access system event was part of an attempted intrusion of the access system.Type: GrantFiled: February 26, 2001Date of Patent: February 25, 2014Assignee: Oracle International CorporationInventor: Jeffrey D. Hodges
-
Patent number: 8656191Abstract: A secure system-on-chip for processing data, the system-on-chip comprising at least a central processing unit (CPU), an input and an output channel, an encryption/decryption engine and a memory, wherein, said input channel comprises an input encryption module to encrypt all incoming data, said output channel comprising an output decryption module to decrypt all outgoing data, said CPU receiving the encrypted data from the input encryption module and storing them in the memory, and while processing the stored data, said CPU reading the stored data from the memory, requesting decryption of same in the encryption/decryption engine, processing the data and requesting encryption of the result by the encryption/decryption engine and storing the encrypted result, outputting the result to the output decryption module for decryption purpose and exiting the decrypted result via the output channel.Type: GrantFiled: December 13, 2012Date of Patent: February 18, 2014Assignee: Nagravision S.A.Inventor: Andre Kudelski
-
Patent number: 8656501Abstract: There is provided a method for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language, in particular Java, wherein a protected application is created by adding a protection module to the application, analyzing a first method to be protected of a plurality of methods of a first class of the application and determining first parameters needed for executing the first method, generating first gate code depending on the determined first parameters, replacing the first code of the first method by said first gate code and storing the replaced first code such that it can be accessed by the protection module during execution of the protected application, wherein, when the first method is called during execution of the protected application, the first gate code collects first data based on the determined first parameters and transmits the collected first data to the protection module, the protection module accesses the stored first code and generates aType: GrantFiled: July 1, 2011Date of Patent: February 18, 2014Assignee: SafeNet Germany GmbHInventor: Benjamin Gnahm
-
Patent number: 8656190Abstract: A one-time-settable tamper resistant software repository may be used in any computing system to store system information such as security violations and policies for responding to them. A one-time-settable tamper resistant software repository may be cryptographically signed, encrypted with a per device key and accessible by only the most privileged software executed by a computing device, e.g., hypervisor or operating system kernel. A one-time-settable tamper resistant software repository may be mirrored in RAM for performance. Recordable event fields in a software repository may be one-time-settable without the ability to reset them in a field operation mode whereas they may be resettable in a different mode such as a manufacturing mode.Type: GrantFiled: January 31, 2008Date of Patent: February 18, 2014Assignee: Microsoft CorporationInventors: Sebastian Lange, Adam Gabriel Poulos, Victor Tan
-
Patent number: 8650639Abstract: A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack.Type: GrantFiled: September 29, 2010Date of Patent: February 11, 2014Assignee: BlackBerry LimitedInventors: Neil Patrick Adams, Michael Stephen Brown, Robert John Lambert, Alfred John Menezes
-
Patent number: 8649513Abstract: Method for converting non copy protected data into copy protected data. The non copy protected data includes data structure data, controlling data and content data. The content data are embedded into data structures defined by the data structure data, and are processed using the controlling data. The method includes transferring part of the data structure data or the controlling data via a first network, from a first to a second network location, generating modified data structure data or modified controlling data at the second network location based on the data structure/controlling data supplied to the second network location, transferring the modified data structure/controlling data via a second network from the second to a third network location, where the copy protected data is generated by embedding the content data into modified data structures based on the modified data structure data or by replacing the controlling data with the modified controlling data.Type: GrantFiled: May 23, 2006Date of Patent: February 11, 2014Assignee: SONY DADC Austria AGInventors: Klaus Holzapfel, Walter Hinterhoelzl, Thomas Goebl, Markus Prenn, Rupert Schoenauer
-
Patent number: 8650636Abstract: In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen 172 may display a personalized digital image 310. A user input device 160 may receive a user drawing set executed by a user over the personalized digital image 310. A processor 120 may authenticate access to the user session if the user drawing set matches a library drawing set associated with the user.Type: GrantFiled: June 17, 2011Date of Patent: February 11, 2014Assignee: Microsoft CorporationInventors: Jeff Johnson, Steve Seixeiro, Zachary Pace, Giles van der Bogert, Sean Gilmour, Levi Siebens, Ken Tubbs
-
Patent number: 8645716Abstract: The present disclosure describes apparatuses and techniques for fail-safe key zeroization. In some aspects a periodic counter is activated that is configured to indicate an amount of time that content of a one-time-programmable (OTP) memory is accessible and overwriting of the content of the OTP is caused when the periodic counter reaches a predetermined value effective to zeroize the content. In other aspects a periodic counter is started in response to a power event and one or more encryption keys stored in OTP memory are zeroized if an indication of media drive security is not received within a predetermined amount of time.Type: GrantFiled: October 4, 2011Date of Patent: February 4, 2014Assignee: Marvell International Ltd.Inventors: Vineet Dujari, Tze Lei Poo
-
Patent number: 8645735Abstract: The invention relates to a secure device, and more particularly, to systems, devices and methods of reducing power consumption of the secure device by limiting the amount of secure volatile memory that needs to be supplied by a battery. In a transport power mode, a sensitive data originally stored in a volatile memory is backed up in an encrypted format to a non-volatile memory, such that none or only a small area of the secure volatile memory has to be retained and powered by the battery for preserving cryptographic keys that are used to backup and recover the sensitive data. This secure device is applied in high security applications such as secure financial terminals.Type: GrantFiled: November 1, 2012Date of Patent: February 4, 2014Assignee: Maxim Integrated Products, Inc.Inventors: Kristopher Leigh Ardis, Tangkwai Ma, Sung Ung Kwak, Robert Michael Muchsel
-
Patent number: 8646046Abstract: A digital rights management system includes an authentication module and a decryption module. If desired, the modules can be implemented in separate integrated circuits. The authentication module retrieves authentication information for protected content and powers down after the authentication information is retrieved. The decryption module decrypts the protected content based on the authentication information while the authentication module is powered down.Type: GrantFiled: May 15, 2008Date of Patent: February 4, 2014Assignees: Advanced Micro Devices, Inc., ATI Technologies ULCInventors: Alwyn Dos Remedios, Stefan Scherer, Mark Bapst, Satyajit Patne