Via Power Supply Patents (Class 726/36)
-
Patent number: 8286259Abstract: The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the network projector and a display signal control unit which, when confirming that a connection confirmation signal which is transmitted at a fixed period from a host computer via a network is not inputted for more than a predetermined time, outputs a supply stop signal to the power source unit indicating that the supply of power should be stopped.Type: GrantFiled: October 26, 2007Date of Patent: October 9, 2012Assignee: NEC Display Solutions, Ltd.Inventors: Shuji Murayama, Masaki Kitagawa
-
Patent number: 8250358Abstract: A data diode system enables one-way data flow from an unsecured device to a secured device is disclosed. The data diode system includes at least one data diode that convert a communication received from an unsecured device to a secured communication for transmission to the secured device. The data diode system includes a voltage converter that receives a negative voltage from a serial data port connection of the secured device. The voltage converter converts the negative voltage into a positive voltage in order to power the data diode.Type: GrantFiled: April 1, 2009Date of Patent: August 21, 2012Assignee: Raytheon CompanyInventor: Kelvin Y. Cheng
-
Patent number: 8225417Abstract: A circuit for controlling a signal line transmitting data. The circuit includes a data level controller that, when the level of the data transmitted through the signal line is changed, controls the level of the data to be lower than an external power supply voltage level and higher than a ground voltage level after a predetermined time.Type: GrantFiled: July 9, 2008Date of Patent: July 17, 2012Assignee: SK hynix, Inc.Inventors: Kwang-Myoung Rho, Jae-Jin Lee
-
Patent number: 8209765Abstract: The electronic circuit executes operations dependent on secret information. Power supply current dependency on the secret information is cloaked by drawing additional power supply current. A plurality of processing circuits (102, 106) executes respective parts of the operations dependent on the secret information. An activity monitor circuit (12a, b, 14), coupled to receive pairs of processing signals coming into and out of respective ones of the processing circuits, derive activity information from each pair of processing signals. The activity monitoring circuit (12a, b, 14) generates a combined activity signal indicative of a sum of power supply currents that will be consumed by the processing circuits (102, 106) dependent on the processing signals.Type: GrantFiled: April 21, 2004Date of Patent: June 26, 2012Assignee: NXP B.V.Inventor: Francesco Pessolano
-
Patent number: 8209443Abstract: A system and method for identifying lost/stale peripheral hardware devices connected to an enterprise computer system is disclosed. In one embodiment, a method for identifying lost peripheral hardware devices connected to an enterprise computer system includes initializing system memory by obtaining data structures associated with last detected connected peripheral hardware devices stored in an external database upon reboot, initiating an enterprise computer system wide scanning to obtain the detected data structures associated with current connected peripheral hardware devices during the reboot, and comparing the obtained data structures associated with the last detected connected peripheral hardware devices and the current connected peripheral hardware devices to determine whether there is any chance in system resources associated with the connected peripheral hardware devices during the reboot.Type: GrantFiled: September 18, 2008Date of Patent: June 26, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jeevan Basavaraju, Harish Kuttan, Santosh Ananth Rao
-
Publication number: 20120151608Abstract: This microcircuit card includes means for detecting an attack on the card, command means (130) capable of charging a charge pump (120) capable of applying a programming voltage (UP) to command a write operation into a cell (110) of a nonvolatile memory when an attack is detected, and a capacitor (140) arranged so as to be supplied with power during normal operation and to supply said charge pump (120) with power only when an attack is detected. The card (100) being characterized in that said capacitor (140) also supplies power to the command means (130) when an attack is detected.Type: ApplicationFiled: December 13, 2011Publication date: June 14, 2012Applicant: OBERTHUR TECHNOLOGIESInventors: Nicolas MORIN, Christophe Giraud
-
Patent number: 8201267Abstract: A cryptographic device that will actively clear its memory even in the absence of external power when a security breach is detected is provided. The memory cell clusters of the cryptographic device are provided with an internal power source that provides sufficient energy for the memory cell clusters to perform a clearing operation. If the external power source for the memory is removed and a physical security breach is detected, the power from the internal power source will allow the memory cells to actively clear their contents, thereby rendering any attempt to obtain the contents of the memory cells fruitless.Type: GrantFiled: October 24, 2008Date of Patent: June 12, 2012Assignee: Pitney Bowes Inc.Inventors: Sungwon Moh, Peter A. Pagliaro
-
Patent number: 8182548Abstract: An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers.Type: GrantFiled: July 2, 2008Date of Patent: May 22, 2012Assignee: Softex IncorporatedInventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
-
Publication number: 20120124393Abstract: Methods for preventing activation of hardware backdoors installed in a digital circuit, the digital circuit comprising one or more hardware units to be protected. A timer is repeatedly initiated for a period less than a validation epoch, and the hardware units are reset upon expiration of the timer to prevent activation of a time-based backdoor. Data being sent to the hardware unit is encrypted in an encryption element to render it unrecognizable to a single-shot cheat code hardware backdoor present in the hardware unit. The instructions being sent to the hardware unit are reordered randomly or pseudo-randomly, with determined sequential restraints, using an reordering element, to render an activation instruction sequence embedded in the instructions unrecognizable to a sequence cheat code hardware backdoor present in the hardware unit.Type: ApplicationFiled: October 13, 2011Publication date: May 17, 2012Applicant: The Trustees of Columbia University in the City of New YorkInventors: Lakshminarasimhan SETHUMADHAVAN, Adam Waksman
-
Patent number: 8127151Abstract: A system and method of recovering encoded information contained in a device by storing and retrieving at least part of the necessary decoding data by setting and measuring the physical characteristics of the device. Storage and recovery options include, but are not limited to, measurement of electronic or optical characteristics of electrically or optically conductive portions of the device using a range of measurement techniques that include, but are not limited to, time-domain reflectometry.Type: GrantFiled: October 13, 2009Date of Patent: February 28, 2012Assignee: Lockheed Martin CorporationInventors: Patrick A. Nelson, Christian Adams
-
Publication number: 20120032834Abstract: Embodiments disclosed herein include a sensor device that monitors external activity and that includes functionality to detect tampering of the device itself. When monitoring for tampering, a power switch is disabled. Techniques include detecting relative movement of the sensor device, reporting tampering activity, and executing tamper detection responses. Responses can include tracking geographical movement and/or subsequent tampering activity to assist in recovery of a transported device. Responses can also include adjusting power consumption such as by modifying sensing functionality of the sensor device. Techniques include use of an accelerometer that can be positioned in the sensor device to detect relative movement. Once relative movement meets a predetermined threshold indicating device tampering, the sensor device transmits a notification of such tampering, via a network, or in response to a query from an authorized peer device.Type: ApplicationFiled: June 17, 2011Publication date: February 9, 2012Inventor: Steven V. Weeks
-
Publication number: 20110296530Abstract: Present invention relates to an electronic reading apparatus with data security and anti-theft functions. The electronic reader apparatus has a code input unit for receiving a security code, and a code determining unit for determining an authenticity of the security code. When no security code, no authentic security code or even no operational signal has been received during the predetermined periods of time, a central control unit may stop a power supply unit from outputting power in order to turn off the electronic reader apparatus and clear the image shown on a display unit. As such, a content of sensitive or confidential data stored in the electronic reading apparatus may not be intruded.Type: ApplicationFiled: August 17, 2010Publication date: December 1, 2011Applicant: E INK HOLDINGS INC.Inventors: YAO-CHOU TSAI, SUNG-HUI HUANG, CHIA-CHUN YEH, TED-HONG SHINN
-
Patent number: 8045235Abstract: Provided are a specific image information adding method with enhanced detection accuracy enabling multiple pieces of information to be added, and an image forming apparatus using the method. In the method of adding specific image information about a recorded image onto the recorded image, the specific image information consists of reference information and identification information, the reference information is formed so as to be able to set a reference position for reading of the specific image information, and the identification information is formed from dot images indicative of bit information at predetermined positions on an arc or a circumference around the reference position. The identification information can represent a single information item by a plurality of dot images, which are placed on a plurality of different arcs or circumferences and arranged at predetermined spacings in the circumferential direction and in the radial direction.Type: GrantFiled: January 19, 2007Date of Patent: October 25, 2011Assignee: Sharp Kabushiki KaishaInventors: Yoshiyuki Nakai, Koichi Sumida, Takao Yamanouchi
-
Patent number: 8041933Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.Type: GrantFiled: June 4, 2009Date of Patent: October 18, 2011Assignee: The Invention Science Fund IInventors: Bran Ferren, W. Daniel Hillis
-
Publication number: 20110239292Abstract: A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation.Type: ApplicationFiled: June 10, 2011Publication date: September 29, 2011Applicant: RESEARCH IN MOTION LIMITEDInventors: Herbert A. Little, Neil P. Adams, Scott W. Totzke
-
Patent number: 7962965Abstract: There is a provided a semiconductor device having a high security whose power consumption is difficult to analyze even without setting up random characteristic to the processing time. The semiconductor device includes a target circuit (14), a sub-target circuit (15) having the same circuit configuration as the target circuit (14), and a dummy bit string generation circuit (11) for generating a bit string of a dummy serial input signal to be inputted to the sub-target circuit (15) according to the bit string of the serial input signal of the target circuit (14).Type: GrantFiled: May 9, 2005Date of Patent: June 14, 2011Assignee: Sharp Kabushiki KaishaInventor: Shigeo Ohyama
-
Patent number: 7962760Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.Type: GrantFiled: June 4, 2009Date of Patent: June 14, 2011Assignee: The Invention Science Fund IInventors: Bran Ferren, W. Daniel Hillis
-
Publication number: 20110119773Abstract: An irrigation system includes an irrigation controller, at least one environmental sensor and a vandal resistant data relay. The irrigation controller includes a two conductor hard wired communications link for accepting an actual value of at least one parameter of interest from an environmental sensor in the form of data encoded on the conductors via current modulation. The environmental sensor is mounted in a location remote from the irrigation controller. A circuit is connected to the environmental sensor for transmitting an RF signal representing an actual value of a parameter of interest detected by the environmental sensor. The vandal resistant data relay is connected to the two conductor hard wired communication link of the irrigation controller.Type: ApplicationFiled: November 18, 2009Publication date: May 19, 2011Inventor: Peter J. Woytowitz
-
Patent number: 7941865Abstract: A method and system for authenticating a smart battery having a smart battery and an electronic device. Both the device and the smart battery generate encrypted random strings using key material based by A/D noise bits as a seed value. A pseudo random number is generated from the A/D noise that is transmitted to both the electronic device and the smart battery. The pseudo random number is used by both devices as a key index to select one of a plurality of keys stored in separate key libraries. The keys, or key material, is used to execute an encryption algorithm. The two encryption data streams are then compared to authenticate the smart battery.Type: GrantFiled: November 20, 2006Date of Patent: May 10, 2011Assignee: Black & Decker Inc.Inventors: Andrew E. Seman, Jr., Daniele C. Brotto, Danh T. Trinh, Fugen Qin
-
Patent number: 7941866Abstract: A semiconductor apparatus of the present invention includes a first to a fourth external terminals and a decoding circuit. The semiconductor apparatus in a first mode inputs a first encoded data from the first external terminal, decodes the first encoded data by the decoding circuit to generate a first decoded data, outputs the first decoded data from the fourth external terminal, and the semiconductor apparatus in a second mode, inputs a second encoded data from the first external terminal, outputs the second encoded data input from the first external terminal from the second external terminal, inputs the second encoded data output from the second external terminal from the third external terminal, decodes the second encoded data input from the third external terminal by the decoding circuit to generate a second decoded data and outputs the second decoded data from the fourth external terminal.Type: GrantFiled: September 28, 2006Date of Patent: May 10, 2011Assignee: Renesas Electronics CorporationInventors: Kazuhisa Takigawa, Kengo Okada
-
Patent number: 7936267Abstract: A theft protection for an electronic device, in particular an optionally portable computer, a mobile telephone or a PDA, includes an electrical cable (2) with a coupling connector (3) for coupling to a corresponding coupling connector of the device. Alarm elements are connected to the cable (2) which are able and adapted to generate an alarm signal in the case the device is stolen. The alarm elements (4) are accommodated in a housing (1) separate from the device. The housing is provided with fastening elements (5) for a mechanical connection of the housing to a fixed object (9). The alarm elements include detection elements which are adapted and able to detect an interruption of the electrical cable connection (2), in addition to signalling elements (4) which generate the alarm signal when the interruption is detected.Type: GrantFiled: February 19, 2007Date of Patent: May 3, 2011Assignee: A.C. Pasma Holding B.V.Inventor: Andries Cornelis Pasma
-
Publication number: 20110072523Abstract: A computing apparatus having a hard drive storage unit which includes a global positioning system, a non-volatile memory and a compare module. The non-volatile memory stores a permitted zone of operation of the hard drive storage unit while the compare module monitors the current location. If the compare module detects a current location of the hard drive storage unit as tracked by the global positioning system which is outside of the permitted zone of operation as stored in the non-volatile memory, the non-volatile memory contains at least one command implemented by a computer processor that may cause the hard drive storage unit to become disabled.Type: ApplicationFiled: September 23, 2009Publication date: March 24, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Frederick C. DeWilde
-
Patent number: 7907934Abstract: A method, system, and node provides security in a network such as a mobile proximity network and a mobile Ad-Hoc network. The security is provided by setting at least one of security parameters for a connection of a node to another node of the network. At least one context-awareness parameter is checked, and at least one of the security parameters is set depending on the result of the check of the at least one context-awareness parameter.Type: GrantFiled: September 9, 2004Date of Patent: March 15, 2011Assignee: Nokia CorporationInventor: Siamak Naghian
-
Patent number: 7882566Abstract: Methods for maintaining the security of a secured execution environment on a system comprising said secured execution environment and a second execution environment are disclosed. A maintained current state for the secured execution environment is selected from among a group of possible states including a standard input mode state and a nexus input mode state. A flow of user input is directed according to the current state through a secure kernel of both the second environment and the secured execution environment.Type: GrantFiled: November 25, 2008Date of Patent: February 1, 2011Assignee: Microsoft CorporationInventors: Idan Avraham, Christine M. Chew, John E. Paff, Paul Roberts, Hirofumi Yamamoto
-
Patent number: 7877815Abstract: Multiple battery authentication security levels and procedures alert a user of counterfeit or unapproved batteries that are installed after manufacture of the wireless communication device. In an exemplary a battery authentication system, a mobile device sends a pre-stored plain text to a battery installed in the mobile device. An approved battery receives the plain text and performs an encryption algorithm on the plain text. Encrypted text is sent back to the mobile device. The mobile device compares the received encrypted text with a pre-stored encrypted text. If the received encrypted text matches the pre-stored encrypted text, then the battery is authenticated. Upon completion of the authentication of the installed battery, the mobile phone conducts normal battery and charging operation. If the received encrypted text does not match the pre-stored encrypted text, then the device enters authentication failure events that limit the use of the battery.Type: GrantFiled: January 20, 2006Date of Patent: January 25, 2011Assignee: Kyocera CorporationInventors: Doosun Yoo, Murali Krishna Bandaru
-
Patent number: 7840807Abstract: A authentication device of an apparatus in one example authenticates a computing device, in communication with the authentication device, through employment of a determination that a current location of the authentication device matches an initial location of the authentication device.Type: GrantFiled: March 18, 2004Date of Patent: November 23, 2010Assignee: Alcatel-Lucent USA Inc.Inventors: Kevin Eugene Dombkowski, Charles Arthur Witschorik
-
Patent number: 7826615Abstract: A scrambling apparatus and method are provided for increasing randomness without damaging compression efficiency of total video data by selectively and randomly performing conversion when converting motion vector codes of compressed video data into other motion vector codes indicating other motion vector values, and more particularly, by performing conditional conversion only if a predetermined condition is satisfied when selective conversion of motion vector codes is performed. The scrambling apparatus includes a conversion motion vector code table generator generating a conversion motion vector code table comprising motion vector codes obtained by converting motion vector codes corresponding to motion vector values of input video data in a standard motion vector code table; and a conversion controller randomly determining whether a certain motion vector value is encoded using the conversion motion vector code table or the standard motion vector code table.Type: GrantFiled: February 4, 2005Date of Patent: November 2, 2010Assignee: Samsung Electronics Co., Ltd.Inventors: Su-hyun Nam, Myung-sun Kim, Yong-jin Jang, Sun-nam Lee, Jae-heung Lee, Sang-su Choi
-
Patent number: 7822207Abstract: A method of protecting secret key integrity in a hardware cryptographic system includes first obtaining an encryption result and corresponding checksum of known data using the secret key, saving those results, then masking the secret key and storing the masked key. When the masked key is to be used in a cryptographic application, the method checks key integrity against fault attacks by decrypting the prior encryption results using the masked key. If upon comparison, the decryption result equals valid data, then the key's use in the cryptographic system can proceed. Otherwise, all data relating to the masked key is wiped from the system and fault injection is flagged.Type: GrantFiled: December 22, 2006Date of Patent: October 26, 2010Assignee: Atmel Rousset S.A.S.Inventors: Michel Douguet, Vincent Dupaquis
-
Patent number: 7810165Abstract: Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface.Type: GrantFiled: June 18, 2007Date of Patent: October 5, 2010Assignee: Visa U.S.A. Inc.Inventors: Ayman Hammad, Patrick Faith
-
Patent number: 7806938Abstract: A method and apparatus are described that control the supply of electrical power to one or more components of a computing device. Other embodiments are described and claimed.Type: GrantFiled: June 16, 2005Date of Patent: October 5, 2010Assignee: Intel CorporationInventors: Eng Yeow Ng, Ze-Yng Cheong, Choon Hooi Khor
-
Patent number: 7801942Abstract: A rich media file is a self-contained file, including both the information to be viewed by a user and the viewer that displays the information to the user. The information can be formatted however the client likes: for example, the information can be split across several pages, and can include text and still and animated images. There can also be web links to pages on a network, and e-mail forms to simplify sending an e-mail message to the client. The rich media file can include viewing limitations, so that only the proper password can unlock the file, or that the rich media file will automatically expire after a specified condition occurs. The rich media file also assists the user in obtaining the latest version of the rich media file, by offering to retrieve a newer version for the user.Type: GrantFiled: September 19, 2007Date of Patent: September 21, 2010Assignee: Marger Johnson & McCollom, P.C.Inventors: Robert M. Caruso, Konstantin J. Balashov
-
Patent number: 7784104Abstract: A power tool system with enhanced antitheft capability has a hand-held power tool and a wearable piece worn by the user. The wearable piece incorporates a certification unit which stores an identification code specifying the power tool and transmits the identification code to an authenticator incorporated in the power tool. The authenticator reads the identification code from the certification unit and to provide an authentication signal when the identification code is authenticated to be eligible for a privileged use of the power tool. The power tool is enabled only in response to the authentication signal, and otherwise disabled for avoiding unauthorized use. A communication is established between the certification unit and the authenticator for transmission of the identification code, while the user holds the power tool with the wearable piece carried on.Type: GrantFiled: February 9, 2006Date of Patent: August 24, 2010Assignee: Panasonic Electric Works Co., Ltd.Inventors: Teruhisa Innami, Masaki Ikeda, Naotake Tanaka, Atsumasa Kubota, Tatsuya Miwa
-
Patent number: 7774616Abstract: Masking a boot sequence by providing a dummy processor is provided. One of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. The execution of the masking code on the non-boot processors preferably generates electromagnetic and/or thermal signatures that approximate the signatures of the actual boot code execution on the boot processor. One of the non-boot processors is selected to execute masking code that is different from the other masking code sequence to thereby generate an electromagnetic and/or thermal signature that appears to be unique from an external monitoring perspective.Type: GrantFiled: June 9, 2006Date of Patent: August 10, 2010Assignee: International Business Machines CorporationInventors: Jason N. Dale, Jonathan J. DeMent, Clark M. O'Niell, Steven L. Roberts
-
Patent number: 7757295Abstract: Structures and methods within an integrated circuit for controlling access to secured information embedded therein. A security block embedded within an integrated circuit (e.g., an SOC) may control authorized and unauthorized access to secured information stored within a memory of the integrated circuit. The security block may combine security key techniques and structures with a counting technique and structure such that when a maximum number of unauthorized attempts are detected, all further access to the secured information will be denied thereby rendering the IC unusable. In one aspect, the counting features may be implemented using a one time programmable register comprising a plurality of one time programmable bits such that each bit may be set to indicate detection of an unauthorized access attempt. If all bits of the OTP register are so set, the maximum number of unauthorized attempts has been detected and the circuit precludes all further access attempts.Type: GrantFiled: February 9, 2005Date of Patent: July 13, 2010Assignee: LSI CorporationInventor: Ardeshir Hadaaegh
-
Patent number: 7757094Abstract: A power management technique for a Subscriber Identity Module (SIM), makes use of a voting process to determine when to power-up and power-down the SIM. In particular, the voting process determines whether software modules running on a wireless communication device (WCD) require current or imminent access to the SIM. The voting process is designed to make more efficient use of the SIM without sacrificing performance. A modified security authorization process can be added, in which the WCD caches a user access code in memory for authenticating the user to the SIM to gain access to the secure features of the SIM. The security verification process avoids the need for the user to enter the access code each time the SIM is powered up in the course of the power management routine, reducing user inconvenience and maintaining performance.Type: GrantFiled: May 29, 2001Date of Patent: July 13, 2010Assignee: QUALCOMM IncorporatedInventors: Chidambaram Krishnan, James A. Hutchison, IV, Tom Summers
-
Patent number: 7735145Abstract: A timed erasure mechanism can be used with portable computer-readable media to ensure automatic erasure of secure information, minimizing the security risks in using such media to store and transport passwords, codes, keys and similar private setup information. The portable computer-readable media can comprise volatile memory and a timed erasure mechanism in the form of a power supply and discharging circuitry that discharges the power supply after a predetermined amount of time. Alternatively, the portable computer-readable media can comprise nonvolatile memory and a timed erasure mechanism in the form of a digital time and erasure algorithms that are initiated after a predetermined amount of time. Furthermore, such portable computer-readable media can comprise a container that bears unique physical properties that can alert users to the volatile nature of the media.Type: GrantFiled: February 18, 2005Date of Patent: June 8, 2010Assignee: Microsoft CorporationInventors: Thomas W. Kuehnel, Shannon J. Chan, Dale A. Sather, Guillaume Simonnet
-
Patent number: 7730541Abstract: A data processing apparatus secures data from third parties in event of power loss by utilizing a backup power supply to provide power while data is erased from memory. The data is stored in a nonvolatile memory. A first voltage supply unit supplies voltage to the memory, and a second voltage unit supplies voltage to the memory when the first voltage supply unit is incapable of supplying voltage to the memory. When the first voltage supply unit becomes incapable of supplying voltage to the memory, the memory is controlled to erase the data stored therein using a selected one of a plurality of erasing processes depending on the status of processing of the data.Type: GrantFiled: September 22, 2005Date of Patent: June 1, 2010Assignee: Canon Kabushiki KaishaInventors: Tadashi Kawaguchi, Hideki Hirose, Kei Morita, Eijiro Atarashi, Takahiro Haraguchi, Fumio Mikami
-
Patent number: 7721115Abstract: A secure media device preferably includes a Universal Serial Bus (USB) Mass Storage Class (MSC) interface and a USB Human Interface Device (HID) interface. A storage media area is also preferably provided. The storage media is preferably divided into a secure and nonsecure area by arranging the storage media into multiple Logical Units (LUNs). The nonsecure area is preferably accessed in a conventional manner using a host USB MSC driver through the USB MSC interface on the storage device. A password dialog application can be located in the nonsecure area of the storage device.Type: GrantFiled: February 16, 2005Date of Patent: May 18, 2010Assignee: Cypress Semiconductor CorporationInventors: Eric Luttmann, Jeff Miller
-
Publication number: 20100122339Abstract: A device (1) for the data survey and check, comprising: a case; and means for detecting a tampering of such a case, to verify the protection and the reliability of the collected data, guarantees the reliability of said means even when the device (1) is off, because it comprises: means for the storage and/or the generation of a piece of information (22), electrically supplied by a battery (21) housed inside said case (2) through an electric circuit; and means for interrupting (26) the electric supply to said means for the storage and/or the generation of a piece of information, activated by the opening of said case (2).Type: ApplicationFiled: April 24, 2008Publication date: May 13, 2010Inventor: Roberto Boccacci
-
Patent number: 7702934Abstract: A semiconductor device comprises a semiconductor substrate, a basic module having a memory cell unit composed of first nonvolatile memory cells or a processor unit on a part of the substrate, an authentication module which has second nonvolatile memory cells in an area different from that of the basic module on the substrate, and stores an authentication code, and a lifetime control module which has aging devices configured by third nonvolatile memory cells in an area different from those of the basic module and the authentication module on the substrate, and which is turned on for a fixed period by storage of charges and permits reading of the authentication module only during an on-period of the aging devices.Type: GrantFiled: November 4, 2005Date of Patent: April 20, 2010Assignee: Kabushiki Kaisha ToshibaInventor: Hiroshi Watanabe
-
Patent number: 7698572Abstract: A security module for use with a terminal comprises a data interface adapted to be coupled to a terminal, for receiving at least part of an algorithm code or the complete algorithm code from the terminal, and a power interface for receiving supply power. A volatile memory coupled to the power interface in order to have power supplied thereto stores the part of the algorithm code or the complete algorithm code received via the data interface. A processor performs, the algorithm code in order to obtain an algorithm code result that can be delivered to the terminal. Due to storing at least part of an algorithm code in the volatile memory of the security module, the algorithm code of the security module is effectively protected against being detected by spying from a potential attacker.Type: GrantFiled: July 15, 2003Date of Patent: April 13, 2010Assignee: Infineon Technologies AGInventor: Marcus Janke
-
Publication number: 20100083388Abstract: The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the network projector and a display signal control unit which, when confirming that a connection confirmation signal which is transmitted at a fixed period from a host computer via a network is not inputted for more than a predetermined time, outputs a supply stop signal to the power source unit indicating that the supply of power should be stopped.Type: ApplicationFiled: October 26, 2007Publication date: April 1, 2010Applicant: NEC DISPLAY SOULUTIONS, INC.Inventor: Shuji Murayama
-
Publication number: 20100083387Abstract: A security processor integrated within a system may be securely shut down. The security processor may receive shut down requests, and may determine components and/or subsystems that need be shut down during shut down periods. The security processor may determine when each of the relevant components is ready for shut down. Once the relevant components are shut down, the security processor may itself be shut down, wherein the shut down of the security processor may be performed by stopping the clocking of the security processor. A security error monitor may monitor the system during shut down periods, and the security processor may be powered back on when security breaches and/or threats may be detected via the security error monitor. The security error monitor may be enabled to power on the security processor by reactivating the security processor clock, and the security processor may then power on the system.Type: ApplicationFiled: October 9, 2008Publication date: April 1, 2010Inventors: Stephane Rodgers, Iue-Shuenn Chen
-
Publication number: 20100070791Abstract: A device having a power supply monitoring capabilities, the device includes: a power supply unit; at least one real time clock generator counter adapted to receive a supply voltage from the power supply unit; a fixed value storage circuit that is un-accessible to software executed by a processor; wherein the fixed value storage circuit stores a fixed value; wherein the fixed value includes multiple bits; a volatile storage unit, being accessible to the processor; wherein the volatile storage unit is adapted to: (i) store a reset value after being reset; (ii) receive the fixed value during an initialization state; and (iii) store the fixed value until being reset; wherein the volatile storage unit is designed such that there is a low probability that the reset value equals the fixed value; and a comparator adapted to provide a tamper indication if the fixed value stored at the fixed value storage circuit differs from a value stored at the volatile storage unit.Type: ApplicationFiled: October 27, 2006Publication date: March 18, 2010Applicant: Freescale Semiconductor, Inc.Inventors: Michael Priel, Asaf Ashkenazi, Dan Kuzmin
-
Publication number: 20100071077Abstract: An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.Type: ApplicationFiled: September 12, 2008Publication date: March 18, 2010Applicant: International Business Machines CorporationInventors: Julie A. Morris, James M. White, Wayne R. Hucaby
-
Publication number: 20100005533Abstract: RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their power consumption remotely via a completely passive attack. The method and apparatus of the invention protects RFID tags against simple and differential power attacks. The invention is particularly useful regarding inventory control systems or secure documents such as epassports. The basic technique is to use two capacitors embedded in the RFID tag in lo such a way that at any given time one of them is storing energy that is being generated by the charge pump of the tag that sucks energy from the electromagnetic or magnetic field of a tag reader, and the other one is discharging and powering the computational element of the tag chip.Type: ApplicationFiled: July 30, 2007Publication date: January 7, 2010Applicant: YEDA RESEARCH & DEVELOPMENT CO. LTD.Inventor: Adi Shamir
-
Patent number: 7636858Abstract: In an embodiment, an apparatus includes a trusted cryptographic processor that includes at least one functional unit. The trusted cryptographic processor also includes a controller to receive a primitive instruction that identifies which of the at least one functional unit is to perform an operation, wherein the controller is to reduce power to the at least one functional unit that is not identified by the primitive instruction. The apparatus includes a trusted power management unit to supply the power based on control from the controller, wherein the control is independent of a processor that is not in a trusted state.Type: GrantFiled: June 30, 2004Date of Patent: December 22, 2009Assignee: Intel CorporationInventors: Moinul H Khan, Anitha Kona
-
Publication number: 20090282261Abstract: In an embodiment, an apparatus includes a trusted cryptographic processor that includes at least one functional unit. The trusted cryptographic processor also includes a controller to receive a primitive instruction that identifies which of the at least one functional unit is to perform an operation, wherein the controller is to reduce power to the at least one functional unit that is not identified by the primitive instruction. The apparatus includes a trusted power management unit to supply the power based on control from the controller, wherein the control is independent of a processor that is not in a trusted state.Type: ApplicationFiled: June 30, 2004Publication date: November 12, 2009Inventors: Moinul H. Khan, Anitha Kona
-
Patent number: RE42984Abstract: A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.Type: GrantFiled: September 16, 2009Date of Patent: November 29, 2011Assignee: Acqis Technology, Inc.Inventor: William W. Y. Chu
-
Patent number: RE43602Abstract: A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.Type: GrantFiled: November 10, 2011Date of Patent: August 21, 2012Assignee: Acqis LLCInventor: William W. Y. Chu