Via Power Supply Patents (Class 726/36)
  • Patent number: 8286259
    Abstract: The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the network projector and a display signal control unit which, when confirming that a connection confirmation signal which is transmitted at a fixed period from a host computer via a network is not inputted for more than a predetermined time, outputs a supply stop signal to the power source unit indicating that the supply of power should be stopped.
    Type: Grant
    Filed: October 26, 2007
    Date of Patent: October 9, 2012
    Assignee: NEC Display Solutions, Ltd.
    Inventors: Shuji Murayama, Masaki Kitagawa
  • Patent number: 8250358
    Abstract: A data diode system enables one-way data flow from an unsecured device to a secured device is disclosed. The data diode system includes at least one data diode that convert a communication received from an unsecured device to a secured communication for transmission to the secured device. The data diode system includes a voltage converter that receives a negative voltage from a serial data port connection of the secured device. The voltage converter converts the negative voltage into a positive voltage in order to power the data diode.
    Type: Grant
    Filed: April 1, 2009
    Date of Patent: August 21, 2012
    Assignee: Raytheon Company
    Inventor: Kelvin Y. Cheng
  • Patent number: 8225417
    Abstract: A circuit for controlling a signal line transmitting data. The circuit includes a data level controller that, when the level of the data transmitted through the signal line is changed, controls the level of the data to be lower than an external power supply voltage level and higher than a ground voltage level after a predetermined time.
    Type: Grant
    Filed: July 9, 2008
    Date of Patent: July 17, 2012
    Assignee: SK hynix, Inc.
    Inventors: Kwang-Myoung Rho, Jae-Jin Lee
  • Patent number: 8209765
    Abstract: The electronic circuit executes operations dependent on secret information. Power supply current dependency on the secret information is cloaked by drawing additional power supply current. A plurality of processing circuits (102, 106) executes respective parts of the operations dependent on the secret information. An activity monitor circuit (12a, b, 14), coupled to receive pairs of processing signals coming into and out of respective ones of the processing circuits, derive activity information from each pair of processing signals. The activity monitoring circuit (12a, b, 14) generates a combined activity signal indicative of a sum of power supply currents that will be consumed by the processing circuits (102, 106) dependent on the processing signals.
    Type: Grant
    Filed: April 21, 2004
    Date of Patent: June 26, 2012
    Assignee: NXP B.V.
    Inventor: Francesco Pessolano
  • Patent number: 8209443
    Abstract: A system and method for identifying lost/stale peripheral hardware devices connected to an enterprise computer system is disclosed. In one embodiment, a method for identifying lost peripheral hardware devices connected to an enterprise computer system includes initializing system memory by obtaining data structures associated with last detected connected peripheral hardware devices stored in an external database upon reboot, initiating an enterprise computer system wide scanning to obtain the detected data structures associated with current connected peripheral hardware devices during the reboot, and comparing the obtained data structures associated with the last detected connected peripheral hardware devices and the current connected peripheral hardware devices to determine whether there is any chance in system resources associated with the connected peripheral hardware devices during the reboot.
    Type: Grant
    Filed: September 18, 2008
    Date of Patent: June 26, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeevan Basavaraju, Harish Kuttan, Santosh Ananth Rao
  • Publication number: 20120151608
    Abstract: This microcircuit card includes means for detecting an attack on the card, command means (130) capable of charging a charge pump (120) capable of applying a programming voltage (UP) to command a write operation into a cell (110) of a nonvolatile memory when an attack is detected, and a capacitor (140) arranged so as to be supplied with power during normal operation and to supply said charge pump (120) with power only when an attack is detected. The card (100) being characterized in that said capacitor (140) also supplies power to the command means (130) when an attack is detected.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 14, 2012
    Applicant: OBERTHUR TECHNOLOGIES
    Inventors: Nicolas MORIN, Christophe Giraud
  • Patent number: 8201267
    Abstract: A cryptographic device that will actively clear its memory even in the absence of external power when a security breach is detected is provided. The memory cell clusters of the cryptographic device are provided with an internal power source that provides sufficient energy for the memory cell clusters to perform a clearing operation. If the external power source for the memory is removed and a physical security breach is detected, the power from the internal power source will allow the memory cells to actively clear their contents, thereby rendering any attempt to obtain the contents of the memory cells fruitless.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: June 12, 2012
    Assignee: Pitney Bowes Inc.
    Inventors: Sungwon Moh, Peter A. Pagliaro
  • Patent number: 8182548
    Abstract: An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: May 22, 2012
    Assignee: Softex Incorporated
    Inventors: Apurva Mahendrakumar Bhansali, Manoj Kumar Jain, Shradha Dube, Gayathri Rangarajan, Mehul Ramjibhai Patel, Rayesh Kashinath Raikar, Kamal Mansukhlal Dhanani, Ranjit Kapila, Elza Abraham Varghese, Thomas David Tucker
  • Publication number: 20120124393
    Abstract: Methods for preventing activation of hardware backdoors installed in a digital circuit, the digital circuit comprising one or more hardware units to be protected. A timer is repeatedly initiated for a period less than a validation epoch, and the hardware units are reset upon expiration of the timer to prevent activation of a time-based backdoor. Data being sent to the hardware unit is encrypted in an encryption element to render it unrecognizable to a single-shot cheat code hardware backdoor present in the hardware unit. The instructions being sent to the hardware unit are reordered randomly or pseudo-randomly, with determined sequential restraints, using an reordering element, to render an activation instruction sequence embedded in the instructions unrecognizable to a sequence cheat code hardware backdoor present in the hardware unit.
    Type: Application
    Filed: October 13, 2011
    Publication date: May 17, 2012
    Applicant: The Trustees of Columbia University in the City of New York
    Inventors: Lakshminarasimhan SETHUMADHAVAN, Adam Waksman
  • Patent number: 8127151
    Abstract: A system and method of recovering encoded information contained in a device by storing and retrieving at least part of the necessary decoding data by setting and measuring the physical characteristics of the device. Storage and recovery options include, but are not limited to, measurement of electronic or optical characteristics of electrically or optically conductive portions of the device using a range of measurement techniques that include, but are not limited to, time-domain reflectometry.
    Type: Grant
    Filed: October 13, 2009
    Date of Patent: February 28, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Patrick A. Nelson, Christian Adams
  • Publication number: 20120032834
    Abstract: Embodiments disclosed herein include a sensor device that monitors external activity and that includes functionality to detect tampering of the device itself. When monitoring for tampering, a power switch is disabled. Techniques include detecting relative movement of the sensor device, reporting tampering activity, and executing tamper detection responses. Responses can include tracking geographical movement and/or subsequent tampering activity to assist in recovery of a transported device. Responses can also include adjusting power consumption such as by modifying sensing functionality of the sensor device. Techniques include use of an accelerometer that can be positioned in the sensor device to detect relative movement. Once relative movement meets a predetermined threshold indicating device tampering, the sensor device transmits a notification of such tampering, via a network, or in response to a query from an authorized peer device.
    Type: Application
    Filed: June 17, 2011
    Publication date: February 9, 2012
    Inventor: Steven V. Weeks
  • Publication number: 20110296530
    Abstract: Present invention relates to an electronic reading apparatus with data security and anti-theft functions. The electronic reader apparatus has a code input unit for receiving a security code, and a code determining unit for determining an authenticity of the security code. When no security code, no authentic security code or even no operational signal has been received during the predetermined periods of time, a central control unit may stop a power supply unit from outputting power in order to turn off the electronic reader apparatus and clear the image shown on a display unit. As such, a content of sensitive or confidential data stored in the electronic reading apparatus may not be intruded.
    Type: Application
    Filed: August 17, 2010
    Publication date: December 1, 2011
    Applicant: E INK HOLDINGS INC.
    Inventors: YAO-CHOU TSAI, SUNG-HUI HUANG, CHIA-CHUN YEH, TED-HONG SHINN
  • Patent number: 8045235
    Abstract: Provided are a specific image information adding method with enhanced detection accuracy enabling multiple pieces of information to be added, and an image forming apparatus using the method. In the method of adding specific image information about a recorded image onto the recorded image, the specific image information consists of reference information and identification information, the reference information is formed so as to be able to set a reference position for reading of the specific image information, and the identification information is formed from dot images indicative of bit information at predetermined positions on an arc or a circumference around the reference position. The identification information can represent a single information item by a plurality of dot images, which are placed on a plurality of different arcs or circumferences and arranged at predetermined spacings in the circumferential direction and in the radial direction.
    Type: Grant
    Filed: January 19, 2007
    Date of Patent: October 25, 2011
    Assignee: Sharp Kabushiki Kaisha
    Inventors: Yoshiyuki Nakai, Koichi Sumida, Takao Yamanouchi
  • Patent number: 8041933
    Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.
    Type: Grant
    Filed: June 4, 2009
    Date of Patent: October 18, 2011
    Assignee: The Invention Science Fund I
    Inventors: Bran Ferren, W. Daniel Hillis
  • Publication number: 20110239292
    Abstract: A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation.
    Type: Application
    Filed: June 10, 2011
    Publication date: September 29, 2011
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Herbert A. Little, Neil P. Adams, Scott W. Totzke
  • Patent number: 7962965
    Abstract: There is a provided a semiconductor device having a high security whose power consumption is difficult to analyze even without setting up random characteristic to the processing time. The semiconductor device includes a target circuit (14), a sub-target circuit (15) having the same circuit configuration as the target circuit (14), and a dummy bit string generation circuit (11) for generating a bit string of a dummy serial input signal to be inputted to the sub-target circuit (15) according to the bit string of the serial input signal of the target circuit (14).
    Type: Grant
    Filed: May 9, 2005
    Date of Patent: June 14, 2011
    Assignee: Sharp Kabushiki Kaisha
    Inventor: Shigeo Ohyama
  • Patent number: 7962760
    Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.
    Type: Grant
    Filed: June 4, 2009
    Date of Patent: June 14, 2011
    Assignee: The Invention Science Fund I
    Inventors: Bran Ferren, W. Daniel Hillis
  • Publication number: 20110119773
    Abstract: An irrigation system includes an irrigation controller, at least one environmental sensor and a vandal resistant data relay. The irrigation controller includes a two conductor hard wired communications link for accepting an actual value of at least one parameter of interest from an environmental sensor in the form of data encoded on the conductors via current modulation. The environmental sensor is mounted in a location remote from the irrigation controller. A circuit is connected to the environmental sensor for transmitting an RF signal representing an actual value of a parameter of interest detected by the environmental sensor. The vandal resistant data relay is connected to the two conductor hard wired communication link of the irrigation controller.
    Type: Application
    Filed: November 18, 2009
    Publication date: May 19, 2011
    Inventor: Peter J. Woytowitz
  • Patent number: 7941865
    Abstract: A method and system for authenticating a smart battery having a smart battery and an electronic device. Both the device and the smart battery generate encrypted random strings using key material based by A/D noise bits as a seed value. A pseudo random number is generated from the A/D noise that is transmitted to both the electronic device and the smart battery. The pseudo random number is used by both devices as a key index to select one of a plurality of keys stored in separate key libraries. The keys, or key material, is used to execute an encryption algorithm. The two encryption data streams are then compared to authenticate the smart battery.
    Type: Grant
    Filed: November 20, 2006
    Date of Patent: May 10, 2011
    Assignee: Black & Decker Inc.
    Inventors: Andrew E. Seman, Jr., Daniele C. Brotto, Danh T. Trinh, Fugen Qin
  • Patent number: 7941866
    Abstract: A semiconductor apparatus of the present invention includes a first to a fourth external terminals and a decoding circuit. The semiconductor apparatus in a first mode inputs a first encoded data from the first external terminal, decodes the first encoded data by the decoding circuit to generate a first decoded data, outputs the first decoded data from the fourth external terminal, and the semiconductor apparatus in a second mode, inputs a second encoded data from the first external terminal, outputs the second encoded data input from the first external terminal from the second external terminal, inputs the second encoded data output from the second external terminal from the third external terminal, decodes the second encoded data input from the third external terminal by the decoding circuit to generate a second decoded data and outputs the second decoded data from the fourth external terminal.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: May 10, 2011
    Assignee: Renesas Electronics Corporation
    Inventors: Kazuhisa Takigawa, Kengo Okada
  • Patent number: 7936267
    Abstract: A theft protection for an electronic device, in particular an optionally portable computer, a mobile telephone or a PDA, includes an electrical cable (2) with a coupling connector (3) for coupling to a corresponding coupling connector of the device. Alarm elements are connected to the cable (2) which are able and adapted to generate an alarm signal in the case the device is stolen. The alarm elements (4) are accommodated in a housing (1) separate from the device. The housing is provided with fastening elements (5) for a mechanical connection of the housing to a fixed object (9). The alarm elements include detection elements which are adapted and able to detect an interruption of the electrical cable connection (2), in addition to signalling elements (4) which generate the alarm signal when the interruption is detected.
    Type: Grant
    Filed: February 19, 2007
    Date of Patent: May 3, 2011
    Assignee: A.C. Pasma Holding B.V.
    Inventor: Andries Cornelis Pasma
  • Publication number: 20110072523
    Abstract: A computing apparatus having a hard drive storage unit which includes a global positioning system, a non-volatile memory and a compare module. The non-volatile memory stores a permitted zone of operation of the hard drive storage unit while the compare module monitors the current location. If the compare module detects a current location of the hard drive storage unit as tracked by the global positioning system which is outside of the permitted zone of operation as stored in the non-volatile memory, the non-volatile memory contains at least one command implemented by a computer processor that may cause the hard drive storage unit to become disabled.
    Type: Application
    Filed: September 23, 2009
    Publication date: March 24, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Frederick C. DeWilde
  • Patent number: 7907934
    Abstract: A method, system, and node provides security in a network such as a mobile proximity network and a mobile Ad-Hoc network. The security is provided by setting at least one of security parameters for a connection of a node to another node of the network. At least one context-awareness parameter is checked, and at least one of the security parameters is set depending on the result of the check of the at least one context-awareness parameter.
    Type: Grant
    Filed: September 9, 2004
    Date of Patent: March 15, 2011
    Assignee: Nokia Corporation
    Inventor: Siamak Naghian
  • Patent number: 7882566
    Abstract: Methods for maintaining the security of a secured execution environment on a system comprising said secured execution environment and a second execution environment are disclosed. A maintained current state for the secured execution environment is selected from among a group of possible states including a standard input mode state and a nexus input mode state. A flow of user input is directed according to the current state through a secure kernel of both the second environment and the secured execution environment.
    Type: Grant
    Filed: November 25, 2008
    Date of Patent: February 1, 2011
    Assignee: Microsoft Corporation
    Inventors: Idan Avraham, Christine M. Chew, John E. Paff, Paul Roberts, Hirofumi Yamamoto
  • Patent number: 7877815
    Abstract: Multiple battery authentication security levels and procedures alert a user of counterfeit or unapproved batteries that are installed after manufacture of the wireless communication device. In an exemplary a battery authentication system, a mobile device sends a pre-stored plain text to a battery installed in the mobile device. An approved battery receives the plain text and performs an encryption algorithm on the plain text. Encrypted text is sent back to the mobile device. The mobile device compares the received encrypted text with a pre-stored encrypted text. If the received encrypted text matches the pre-stored encrypted text, then the battery is authenticated. Upon completion of the authentication of the installed battery, the mobile phone conducts normal battery and charging operation. If the received encrypted text does not match the pre-stored encrypted text, then the device enters authentication failure events that limit the use of the battery.
    Type: Grant
    Filed: January 20, 2006
    Date of Patent: January 25, 2011
    Assignee: Kyocera Corporation
    Inventors: Doosun Yoo, Murali Krishna Bandaru
  • Patent number: 7840807
    Abstract: A authentication device of an apparatus in one example authenticates a computing device, in communication with the authentication device, through employment of a determination that a current location of the authentication device matches an initial location of the authentication device.
    Type: Grant
    Filed: March 18, 2004
    Date of Patent: November 23, 2010
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Kevin Eugene Dombkowski, Charles Arthur Witschorik
  • Patent number: 7826615
    Abstract: A scrambling apparatus and method are provided for increasing randomness without damaging compression efficiency of total video data by selectively and randomly performing conversion when converting motion vector codes of compressed video data into other motion vector codes indicating other motion vector values, and more particularly, by performing conditional conversion only if a predetermined condition is satisfied when selective conversion of motion vector codes is performed. The scrambling apparatus includes a conversion motion vector code table generator generating a conversion motion vector code table comprising motion vector codes obtained by converting motion vector codes corresponding to motion vector values of input video data in a standard motion vector code table; and a conversion controller randomly determining whether a certain motion vector value is encoded using the conversion motion vector code table or the standard motion vector code table.
    Type: Grant
    Filed: February 4, 2005
    Date of Patent: November 2, 2010
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Su-hyun Nam, Myung-sun Kim, Yong-jin Jang, Sun-nam Lee, Jae-heung Lee, Sang-su Choi
  • Patent number: 7822207
    Abstract: A method of protecting secret key integrity in a hardware cryptographic system includes first obtaining an encryption result and corresponding checksum of known data using the secret key, saving those results, then masking the secret key and storing the masked key. When the masked key is to be used in a cryptographic application, the method checks key integrity against fault attacks by decrypting the prior encryption results using the masked key. If upon comparison, the decryption result equals valid data, then the key's use in the cryptographic system can proceed. Otherwise, all data relating to the masked key is wiped from the system and fault injection is flagged.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: October 26, 2010
    Assignee: Atmel Rousset S.A.S.
    Inventors: Michel Douguet, Vincent Dupaquis
  • Patent number: 7810165
    Abstract: Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface.
    Type: Grant
    Filed: June 18, 2007
    Date of Patent: October 5, 2010
    Assignee: Visa U.S.A. Inc.
    Inventors: Ayman Hammad, Patrick Faith
  • Patent number: 7806938
    Abstract: A method and apparatus are described that control the supply of electrical power to one or more components of a computing device. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 16, 2005
    Date of Patent: October 5, 2010
    Assignee: Intel Corporation
    Inventors: Eng Yeow Ng, Ze-Yng Cheong, Choon Hooi Khor
  • Patent number: 7801942
    Abstract: A rich media file is a self-contained file, including both the information to be viewed by a user and the viewer that displays the information to the user. The information can be formatted however the client likes: for example, the information can be split across several pages, and can include text and still and animated images. There can also be web links to pages on a network, and e-mail forms to simplify sending an e-mail message to the client. The rich media file can include viewing limitations, so that only the proper password can unlock the file, or that the rich media file will automatically expire after a specified condition occurs. The rich media file also assists the user in obtaining the latest version of the rich media file, by offering to retrieve a newer version for the user.
    Type: Grant
    Filed: September 19, 2007
    Date of Patent: September 21, 2010
    Assignee: Marger Johnson & McCollom, P.C.
    Inventors: Robert M. Caruso, Konstantin J. Balashov
  • Patent number: 7784104
    Abstract: A power tool system with enhanced antitheft capability has a hand-held power tool and a wearable piece worn by the user. The wearable piece incorporates a certification unit which stores an identification code specifying the power tool and transmits the identification code to an authenticator incorporated in the power tool. The authenticator reads the identification code from the certification unit and to provide an authentication signal when the identification code is authenticated to be eligible for a privileged use of the power tool. The power tool is enabled only in response to the authentication signal, and otherwise disabled for avoiding unauthorized use. A communication is established between the certification unit and the authenticator for transmission of the identification code, while the user holds the power tool with the wearable piece carried on.
    Type: Grant
    Filed: February 9, 2006
    Date of Patent: August 24, 2010
    Assignee: Panasonic Electric Works Co., Ltd.
    Inventors: Teruhisa Innami, Masaki Ikeda, Naotake Tanaka, Atsumasa Kubota, Tatsuya Miwa
  • Patent number: 7774616
    Abstract: Masking a boot sequence by providing a dummy processor is provided. One of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. The execution of the masking code on the non-boot processors preferably generates electromagnetic and/or thermal signatures that approximate the signatures of the actual boot code execution on the boot processor. One of the non-boot processors is selected to execute masking code that is different from the other masking code sequence to thereby generate an electromagnetic and/or thermal signature that appears to be unique from an external monitoring perspective.
    Type: Grant
    Filed: June 9, 2006
    Date of Patent: August 10, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jason N. Dale, Jonathan J. DeMent, Clark M. O'Niell, Steven L. Roberts
  • Patent number: 7757295
    Abstract: Structures and methods within an integrated circuit for controlling access to secured information embedded therein. A security block embedded within an integrated circuit (e.g., an SOC) may control authorized and unauthorized access to secured information stored within a memory of the integrated circuit. The security block may combine security key techniques and structures with a counting technique and structure such that when a maximum number of unauthorized attempts are detected, all further access to the secured information will be denied thereby rendering the IC unusable. In one aspect, the counting features may be implemented using a one time programmable register comprising a plurality of one time programmable bits such that each bit may be set to indicate detection of an unauthorized access attempt. If all bits of the OTP register are so set, the maximum number of unauthorized attempts has been detected and the circuit precludes all further access attempts.
    Type: Grant
    Filed: February 9, 2005
    Date of Patent: July 13, 2010
    Assignee: LSI Corporation
    Inventor: Ardeshir Hadaaegh
  • Patent number: 7757094
    Abstract: A power management technique for a Subscriber Identity Module (SIM), makes use of a voting process to determine when to power-up and power-down the SIM. In particular, the voting process determines whether software modules running on a wireless communication device (WCD) require current or imminent access to the SIM. The voting process is designed to make more efficient use of the SIM without sacrificing performance. A modified security authorization process can be added, in which the WCD caches a user access code in memory for authenticating the user to the SIM to gain access to the secure features of the SIM. The security verification process avoids the need for the user to enter the access code each time the SIM is powered up in the course of the power management routine, reducing user inconvenience and maintaining performance.
    Type: Grant
    Filed: May 29, 2001
    Date of Patent: July 13, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: Chidambaram Krishnan, James A. Hutchison, IV, Tom Summers
  • Patent number: 7735145
    Abstract: A timed erasure mechanism can be used with portable computer-readable media to ensure automatic erasure of secure information, minimizing the security risks in using such media to store and transport passwords, codes, keys and similar private setup information. The portable computer-readable media can comprise volatile memory and a timed erasure mechanism in the form of a power supply and discharging circuitry that discharges the power supply after a predetermined amount of time. Alternatively, the portable computer-readable media can comprise nonvolatile memory and a timed erasure mechanism in the form of a digital time and erasure algorithms that are initiated after a predetermined amount of time. Furthermore, such portable computer-readable media can comprise a container that bears unique physical properties that can alert users to the volatile nature of the media.
    Type: Grant
    Filed: February 18, 2005
    Date of Patent: June 8, 2010
    Assignee: Microsoft Corporation
    Inventors: Thomas W. Kuehnel, Shannon J. Chan, Dale A. Sather, Guillaume Simonnet
  • Patent number: 7730541
    Abstract: A data processing apparatus secures data from third parties in event of power loss by utilizing a backup power supply to provide power while data is erased from memory. The data is stored in a nonvolatile memory. A first voltage supply unit supplies voltage to the memory, and a second voltage unit supplies voltage to the memory when the first voltage supply unit is incapable of supplying voltage to the memory. When the first voltage supply unit becomes incapable of supplying voltage to the memory, the memory is controlled to erase the data stored therein using a selected one of a plurality of erasing processes depending on the status of processing of the data.
    Type: Grant
    Filed: September 22, 2005
    Date of Patent: June 1, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventors: Tadashi Kawaguchi, Hideki Hirose, Kei Morita, Eijiro Atarashi, Takahiro Haraguchi, Fumio Mikami
  • Patent number: 7721115
    Abstract: A secure media device preferably includes a Universal Serial Bus (USB) Mass Storage Class (MSC) interface and a USB Human Interface Device (HID) interface. A storage media area is also preferably provided. The storage media is preferably divided into a secure and nonsecure area by arranging the storage media into multiple Logical Units (LUNs). The nonsecure area is preferably accessed in a conventional manner using a host USB MSC driver through the USB MSC interface on the storage device. A password dialog application can be located in the nonsecure area of the storage device.
    Type: Grant
    Filed: February 16, 2005
    Date of Patent: May 18, 2010
    Assignee: Cypress Semiconductor Corporation
    Inventors: Eric Luttmann, Jeff Miller
  • Publication number: 20100122339
    Abstract: A device (1) for the data survey and check, comprising: a case; and means for detecting a tampering of such a case, to verify the protection and the reliability of the collected data, guarantees the reliability of said means even when the device (1) is off, because it comprises: means for the storage and/or the generation of a piece of information (22), electrically supplied by a battery (21) housed inside said case (2) through an electric circuit; and means for interrupting (26) the electric supply to said means for the storage and/or the generation of a piece of information, activated by the opening of said case (2).
    Type: Application
    Filed: April 24, 2008
    Publication date: May 13, 2010
    Inventor: Roberto Boccacci
  • Patent number: 7702934
    Abstract: A semiconductor device comprises a semiconductor substrate, a basic module having a memory cell unit composed of first nonvolatile memory cells or a processor unit on a part of the substrate, an authentication module which has second nonvolatile memory cells in an area different from that of the basic module on the substrate, and stores an authentication code, and a lifetime control module which has aging devices configured by third nonvolatile memory cells in an area different from those of the basic module and the authentication module on the substrate, and which is turned on for a fixed period by storage of charges and permits reading of the authentication module only during an on-period of the aging devices.
    Type: Grant
    Filed: November 4, 2005
    Date of Patent: April 20, 2010
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Hiroshi Watanabe
  • Patent number: 7698572
    Abstract: A security module for use with a terminal comprises a data interface adapted to be coupled to a terminal, for receiving at least part of an algorithm code or the complete algorithm code from the terminal, and a power interface for receiving supply power. A volatile memory coupled to the power interface in order to have power supplied thereto stores the part of the algorithm code or the complete algorithm code received via the data interface. A processor performs, the algorithm code in order to obtain an algorithm code result that can be delivered to the terminal. Due to storing at least part of an algorithm code in the volatile memory of the security module, the algorithm code of the security module is effectively protected against being detected by spying from a potential attacker.
    Type: Grant
    Filed: July 15, 2003
    Date of Patent: April 13, 2010
    Assignee: Infineon Technologies AG
    Inventor: Marcus Janke
  • Publication number: 20100083388
    Abstract: The present invention aims to provide a network projector which has a simple security function via a network. The network projector comprises a power source unit which supplies power to the network projector and a display signal control unit which, when confirming that a connection confirmation signal which is transmitted at a fixed period from a host computer via a network is not inputted for more than a predetermined time, outputs a supply stop signal to the power source unit indicating that the supply of power should be stopped.
    Type: Application
    Filed: October 26, 2007
    Publication date: April 1, 2010
    Applicant: NEC DISPLAY SOULUTIONS, INC.
    Inventor: Shuji Murayama
  • Publication number: 20100083387
    Abstract: A security processor integrated within a system may be securely shut down. The security processor may receive shut down requests, and may determine components and/or subsystems that need be shut down during shut down periods. The security processor may determine when each of the relevant components is ready for shut down. Once the relevant components are shut down, the security processor may itself be shut down, wherein the shut down of the security processor may be performed by stopping the clocking of the security processor. A security error monitor may monitor the system during shut down periods, and the security processor may be powered back on when security breaches and/or threats may be detected via the security error monitor. The security error monitor may be enabled to power on the security processor by reactivating the security processor clock, and the security processor may then power on the system.
    Type: Application
    Filed: October 9, 2008
    Publication date: April 1, 2010
    Inventors: Stephane Rodgers, Iue-Shuenn Chen
  • Publication number: 20100070791
    Abstract: A device having a power supply monitoring capabilities, the device includes: a power supply unit; at least one real time clock generator counter adapted to receive a supply voltage from the power supply unit; a fixed value storage circuit that is un-accessible to software executed by a processor; wherein the fixed value storage circuit stores a fixed value; wherein the fixed value includes multiple bits; a volatile storage unit, being accessible to the processor; wherein the volatile storage unit is adapted to: (i) store a reset value after being reset; (ii) receive the fixed value during an initialization state; and (iii) store the fixed value until being reset; wherein the volatile storage unit is designed such that there is a low probability that the reset value equals the fixed value; and a comparator adapted to provide a tamper indication if the fixed value stored at the fixed value storage circuit differs from a value stored at the volatile storage unit.
    Type: Application
    Filed: October 27, 2006
    Publication date: March 18, 2010
    Applicant: Freescale Semiconductor, Inc.
    Inventors: Michael Priel, Asaf Ashkenazi, Dan Kuzmin
  • Publication number: 20100071077
    Abstract: An apparatus, system, and method are disclosed for detecting tampering of devices such as fiscal printers. A memory module includes a volatile memory that stores multi-bit data. An operation module allows operation of an electronic device, such as a fiscal printer, in response to determining that the predefined multi-bit data is stored in the volatile memory. A detection module detects an attempt to access the enclosed device where access to the enclosed device is restricted by an enclosure. A tamper switch module disconnects power to the volatile memory such that the predefined multi-bit data stored in the volatile memory is erased in response to the detection module detecting an attempted access to the enclosed device. A shutdown module disables operation of the electronic device in response to determining that the predefined multi-bit data is not stored in the volatile memory.
    Type: Application
    Filed: September 12, 2008
    Publication date: March 18, 2010
    Applicant: International Business Machines Corporation
    Inventors: Julie A. Morris, James M. White, Wayne R. Hucaby
  • Publication number: 20100005533
    Abstract: RFID tags were believed to be immune to power analysis since they have no direct connection to an external power supply. However, recent research has shown that they s are vulnerable to such attacks, since it is possible to measure their power consumption remotely via a completely passive attack. The method and apparatus of the invention protects RFID tags against simple and differential power attacks. The invention is particularly useful regarding inventory control systems or secure documents such as epassports. The basic technique is to use two capacitors embedded in the RFID tag in lo such a way that at any given time one of them is storing energy that is being generated by the charge pump of the tag that sucks energy from the electromagnetic or magnetic field of a tag reader, and the other one is discharging and powering the computational element of the tag chip.
    Type: Application
    Filed: July 30, 2007
    Publication date: January 7, 2010
    Applicant: YEDA RESEARCH & DEVELOPMENT CO. LTD.
    Inventor: Adi Shamir
  • Patent number: 7636858
    Abstract: In an embodiment, an apparatus includes a trusted cryptographic processor that includes at least one functional unit. The trusted cryptographic processor also includes a controller to receive a primitive instruction that identifies which of the at least one functional unit is to perform an operation, wherein the controller is to reduce power to the at least one functional unit that is not identified by the primitive instruction. The apparatus includes a trusted power management unit to supply the power based on control from the controller, wherein the control is independent of a processor that is not in a trusted state.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: December 22, 2009
    Assignee: Intel Corporation
    Inventors: Moinul H Khan, Anitha Kona
  • Publication number: 20090282261
    Abstract: In an embodiment, an apparatus includes a trusted cryptographic processor that includes at least one functional unit. The trusted cryptographic processor also includes a controller to receive a primitive instruction that identifies which of the at least one functional unit is to perform an operation, wherein the controller is to reduce power to the at least one functional unit that is not identified by the primitive instruction. The apparatus includes a trusted power management unit to supply the power based on control from the controller, wherein the control is independent of a processor that is not in a trusted state.
    Type: Application
    Filed: June 30, 2004
    Publication date: November 12, 2009
    Inventors: Moinul H. Khan, Anitha Kona
  • Patent number: RE42984
    Abstract: A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.
    Type: Grant
    Filed: September 16, 2009
    Date of Patent: November 29, 2011
    Assignee: Acqis Technology, Inc.
    Inventor: William W. Y. Chu
  • Patent number: RE43602
    Abstract: A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.
    Type: Grant
    Filed: November 10, 2011
    Date of Patent: August 21, 2012
    Assignee: Acqis LLC
    Inventor: William W. Y. Chu