Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 62835. Отображено 100.
05-01-2012 дата публикации

Managing protected and unprotected data simultaneously

Номер: US20120005669A1
Принадлежит: LSI Corp

A first virtual device is created including every logically addressable unit of a data storage server that utilizes data protection. A second virtual device is created including no logically addressable unit of the data storage server that utilizes data protection. Data transfers are disabled within all command phases of the first virtual device.

Подробнее
19-01-2012 дата публикации

Perimeter encryption method and system

Номер: US20120017078A1
Принадлежит: Computer Associates Think Inc

A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain.

Подробнее
19-01-2012 дата публикации

Ultra-low cost sandboxing for application appliances

Номер: US20120017213A1
Принадлежит: Microsoft Corp

The disclosed architecture facilitates the sandboxing of applications by taking core operating system components that normally run in the operating system kernel or otherwise outside the application process and on which a sandboxed application depends on to run, and converting these core operating components to run within the application process. The architecture takes the abstractions already provided by the host operating system and converts these abstractions for use by the sandbox environment. More specifically, new operating system APIs (application program interfaces) are created that include only the basic computation services, thus, separating the basic services from rich application APIs. The code providing the rich application APIs is copied out of the operating system and into the application environment—the application process.

Подробнее
02-02-2012 дата публикации

Method And Apparatus For Remotely Provisioning Software-Based Security Coprocessors

Номер: US20120027213A1
Автор: Vincent R. Scarlata
Принадлежит: Individual

A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed.

Подробнее
02-02-2012 дата публикации

Methods and systems for facilitating communications between vehicles and service providers

Номер: US20120030467A1
Автор: Mark S. Schaefer
Принадлежит: GENERAL MOTORS LLC

Methods and systems for facilitating communications between a vehicle and a service provider are provided. A first address of a vehicle communication device and a second address of a service provider communication device are obtained at a remote location that is remote to both the vehicle and the service provider. A set of keys, including a first key and a second key, is generated at the remote server. The first key is for use by the vehicle in establishing communications with the service provider, and the second key is for use by the service provider in establishing communications with the vehicle. The first key is provided to the vehicle, and the second key is provided to the service provider.

Подробнее
02-02-2012 дата публикации

Storage apparatus, host apparatus, and storage system

Номер: US20120030479A1
Принадлежит: Sony Corp

Disclosed herein is a storage apparatus including: a first storage block configured to record and hold encrypted content data and output the encrypted content data on an on-demand basis; a second storage block configured to record and hold a confidential title key; a title stream key generation block configured to generate a title stream key corresponding to a subject of encryption of the content data by use of the held confidential title key; and a communication block configured to transmit the generated title stream key with confidentiality thereof held.

Подробнее
16-02-2012 дата публикации

Anti-counterfeiting electronic device and method thereof

Номер: US20120042169A1

An anti-counterfeiting electronic device includes a function component assigned with an identification code ID and a processor. The processor generates a random code K 1 and transmits the random code K 1 to the function component; the function component encrypts the random code K 1 and the identification code ID to generate a key ID 1 . The processor further obtains the key ID 1 from the function component and decrypts the key ID 1 to generate an identification code ID 2 , and determines whether the identification code ID 2 is the same as the ID and executes the system login command if the identification code ID 2 is the same as the identification code ID. An anti-counterfeiting method is also provided.

Подробнее
23-02-2012 дата публикации

Secure field-programmable gate array (fpga) architecture

Номер: US20120047371A1
Автор: Thomas R. Woodall
Принадлежит: Raytheon Co

A method and system for configuring a field-programmable gate array (FPGA) includes receiving an encrypted FPGA load-decryption key at an FPGA from a remote key-storage device. The remote key-storage device may be external to and operatively connected with the FPGA. The encrypted FPGA load-decryption key is decrypted using a session key, which may be stored at both the FPGA and the remote key-storage device. Encrypted FPGA-configuration data is received at the FPGA, and decrypted and authenticated using the decrypted FPGA load-decryption key. The decryption of the FPGA-configuration data may indicate a cryptographic state associated with the FPGA-configuration data, which may be used in recurring authentication of the FPGA-configuration data. For recurring authentication, a challenge message may be received at the FPGA from an authentication device, which may be encrypted using the cryptographic state and the session key to generate a response message. The response message may then be sent to the authentication device to determine authenticity of the FPGA-configuration data.

Подробнее
23-02-2012 дата публикации

Memory subsystem and method therefor

Номер: US20120047373A1
Принадлежит: Individual

A memory subsystem and method for loading and storing data at memory addresses of the subsystem. The memory subsystem is functionally connected to a processor and has a first mode of address encryption to convert logical memory addresses generated by the processor into physical memory addresses at which the data are stored in the memory subsystem. The memory subsystem is adapted to pull low a write enable signal to store data in the memory subsystem and to pull high the write enable signal to load data in the memory subsystem, wherein if pulled high the write enable signal alters the address encryption from the first mode to a second mode. The memory subsystem is adapted to be coupled to a local hardware device which supplies a key that acts upon the address encryption of the memory subsystem.

Подробнее
08-03-2012 дата публикации

Organic keyed encryption

Номер: US20120057698A1
Принадлежит: Lockheed Martin Corp

An encryption technique that creates a unique encryption key or fingerprint based on unique physical and electrical characteristics of a target electronic assembly to be protected. The encryption key can be constructed by exploiting the manufacturing variances present in all electronic elements including active elements and passive elements. Active elements include, for example: oscillators/clocks, internal I/O controllers, external I/O controllers, memory, processors, and digital power converters. Passive elements include, for example: internal I/O interconnects, external I/O interconnects, memory buses, and power buses. The encryption key can also include one or more environmental condition thresholds.

Подробнее
08-03-2012 дата публикации

Flash memory distribution of digital content

Номер: US20120060040A1
Принадлежит: TGBW Inc

Methods, apparatuses, and computer-readable media for distributing digital content. One embodiment comprises an apparatus comprising: a device ( 100 ) communications bus; coupled to the device communications bus ( 150 ), a bi-directional communications controller ( 110 ) capable of communicatively interfacing with a computer ( 710 ); coupled to the device communications bus ( 150 ), an integrated processor ( 130 ) capable of executing ( 270 ) computer-executable instructions; and coupled to the integrated processor ( 130 ), a storage module ( 140 ) capable of storing computer-executable instructions.

Подробнее
15-03-2012 дата публикации

Systems and methods for remotely loading encryption keys in card reader systems

Номер: US20120063601A1
Автор: Annmarie D. Hart
Принадлежит: Individual

Systems and methods for remotely loading encryption keys in card reader systems are provided. One such method includes storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second fingerprints includes an intrinsic magnetic characteristic of the data card, encrypting, using a first encryption key derived from the second fingerprint, information including the device identification number and first fingerprint, sending the encrypted information to an authentication server, receiving, from the authentication server, a score indicative of a degree of correlation between the first fingerprint and second fingerprint, and receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first fingerprint.

Подробнее
15-03-2012 дата публикации

Real-time secure self-aquiring root authority

Номер: US20120066512A1
Автор: Eric Kass, Joachim Kern
Принадлежит: International Business Machines Corp, SAP SE

When software is delivered to a customer, there are often programs or routines of programs that a software distributor intended to run under the credentials of a specific user other than the user who started the program. A secure method is proposed for software running in a process to acquire rights to issue restricted operations. A trusting entity trusts a process based on verifying ownership of code residing in the process. The trusted process is granted rights by the trusting entity to perform any or specific operations under the credentials of a specific user, not necessarily the current process user.

Подробнее
15-03-2012 дата публикации

Electronic device, key generation program, recording medium, and key generation method

Номер: US20120066515A1
Автор: Tomomi Kasuya
Принадлежит: Mitsubishi Electric Corp

An electronic device 100 executes a key-using process that uses a key. A physical quantity generation part 190 generates a physical quantity intrinsic to the electronic device and having a value which is different from one electronic device to another and different each time the physical quantity is generated. A key generation part 140 generates the same key for each key-using process, based on the physical quantity generated by the physical quantity generation part 190 , each time the key-using process is to be executed, immediately before the key-using process is started. A key-using process execution part 1010 executes the key-using process such as generation of a keyed hash value, by using the key generated by the key generation part 140 . A control program execution part 180 deletes the key generated by the key generation part 140 , each time the key-using process is ended.

Подробнее
15-03-2012 дата публикации

System and method for improving security using intelligent base storage

Номер: US20120066765A1
Автор: John O'brien
Принадлежит: Individual

The present invention presents a system and method for providing improved security within a computer system by using an intelligent based storage system operating with the host unit whereby, the intelligent based storage system independently provides monitoring of files that should not be accessed, monitoring of files that should be accesses with strict regularity, and analysis of access patterns.

Подробнее
22-03-2012 дата публикации

System and method of protecting data on a communication device

Номер: US20120072722A1
Принадлежит: Research in Motion Ltd

A system and method of protecting data on a communication device are provided. Data received when the communication device is in a first operational state is encrypted using a first cryptographic key and algorithm. When the communication device is in a second operational state, received data is encrypted using a second cryptographic key and algorithm. Received data is stored on the communication device in encrypted form.

Подробнее
29-03-2012 дата публикации

Data processing apparatus

Номер: US20120079286A1
Принадлежит: Renesas Electronics Corp

A data processing apparatus is provided, which detects falsification of software to data and rewriting of the data. The data processing apparatus according to an embodiment of the present invention comprises a security unit which has an encryption circuit for decrypting an encrypted signal including secrecy data. The security unit includes a compression circuit which compresses an access signal used in accessing the security unit and outputs the compression result, and a comparison circuit which compares the compression result outputted from the compression circuit with a previously-calculated expectation value of the compression result of the access signal.

Подробнее
12-04-2012 дата публикации

System and Method for Automatic Authentication of an Item

Номер: US20120089835A1
Автор: Douglas Peckover
Принадлежит: DT Labs LLC

A system, apparatus and method automatically authenticating an item. The media device includes a housing, a processor disposed within the housing, the item disposed within or attached to the housing, and a memory disposed within the housing. The memory stores computer readable instructions that when executed by the processor causes the processor to perform the steps: (a) obtaining the one or more identifiers from the item wherein the one or more identifiers includes a serial number or code; (b) transmitting the obtained identifier(s) to a server device for authentication; (c) receiving an authentication message from the server device; (d) continuing operation of the media device whenever the authentication message from the server device indicates that the item is authentic; and (e) performing one or more actions based on the authentication message whenever the authentication message from the server device indicates that the item is not authentic or cannot be verified.

Подробнее
19-04-2012 дата публикации

Processing system with register arbitration and methods for use therewith

Номер: US20120093237A1
Принадлежит: ViXS Systems Inc

A processing system includes a memory module that includes a register space for storing a plurality of register data in a plurality of registers and secure access data corresponding to the register space. A register arbitration module operates to receive a request to access one of the registers from a client module; retrieve secure access data corresponding to the client to determine if the client is trusted; and to grant the request to access the register if the client is trusted. If the client is not trusted, the register arbitration module retrieves secure access data to determine if the register is non-secured for the client. The register arbitration module grants the request to access the register when the register is non-secured for the client.

Подробнее
19-04-2012 дата публикации

Wireless intrusion prevention system and method

Номер: US20120096539A1
Принадлежит: Juniper Networks Inc

A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.

Подробнее
26-04-2012 дата публикации

Method, System And Device For Securing A Digital Storage Device

Номер: US20120102331A1
Автор: Leonard Russo
Принадлежит: Hewlett Packard Co

Method of securing a digital storage device, wherein a host is connected to the storage device, the host digitally locks the storage device so that unauthorized data access to the storage device is denied, the host sets the encryption conditions of the storage device in one of a condition wherein encryption of data on the storage device is enabled, and a condition wherein encryption of data on the storage device is disabled.

Подробнее
03-05-2012 дата публикации

Method for coding and decoding digital data, particularly data processed in a microprocessor unit

Номер: US20120110413A1
Автор: Lars Hoffmann
Принадлежит: Giesecke and Devrient GmbH

The invention relates to a method for encoding digital data, in particular of data processed in a microprocessor unit. In the method according to the invention for a respective data word (A, B, C) of a series of data words to be encoded subsequently a parity code (P(A), P(B), P(C)) is computed on the basis of the data of the respective data word (A, B, C). Further the respective data word (A, B, C) is altered with the aid of the data word (A, B, C) preceding it in the series, wherein the altered data word (Aa, Ba, Ca) and the parity code (P(A), P(B), P(C)) represent the encoded data word (Ac, Bc, Cc) and the encoded data word (Ac, Bc, Cc) can be decoded with the aid of the data word (A, B, C) preceding it in the series.

Подробнее
10-05-2012 дата публикации

Printhead integrated circuit with a solenoid piston

Номер: US20120113191A1
Автор: Kia Silverbrook
Принадлежит: SILVERBROOK RESEARCH PTY LTD

A printhead integrated circuit comprising a wafer substrate defining a nozzle outlet port; an electromagnetic piston mounted to the wafer substrate via torsion springs, said piston operatively forced towards the outlet port when activated; and a solenoid coil positioned on the wafer substrate about the piston to activate the piston when a current is passed through the coil. The piston is magnetised during a final high temperature step in a fabrication process of the nozzle apparatus to ensure that the Curie temperature is not exceeded after magnetisation

Подробнее
17-05-2012 дата публикации

System and Methods for Silencing Hardware Backdoors

Номер: US20120124393A1
Принадлежит: Columbia University of New York

Methods for preventing activation of hardware backdoors installed in a digital circuit, the digital circuit comprising one or more hardware units to be protected. A timer is repeatedly initiated for a period less than a validation epoch, and the hardware units are reset upon expiration of the timer to prevent activation of a time-based backdoor. Data being sent to the hardware unit is encrypted in an encryption element to render it unrecognizable to a single-shot cheat code hardware backdoor present in the hardware unit. The instructions being sent to the hardware unit are reordered randomly or pseudo-randomly, with determined sequential restraints, using an reordering element, to render an activation instruction sequence embedded in the instructions unrecognizable to a sequence cheat code hardware backdoor present in the hardware unit.

Подробнее
24-05-2012 дата публикации

Device archiving of past cluster binding information on a broadcast encryption-based network

Номер: US20120131337A1
Принадлежит: International Business Machines Corp

Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or more clusters are merged, a binding ID corresponding to one of the clusters is selected and a new management key is generated. Binding IDs associated with the clusters other than the cluster associated with the selected binding ID are encrypted using the new management key and stored on a cluster-authorized device in a binding ID archive. Content stored in conformity with an outdated binding ID is retrieved by decrypting the binding ID archive with the management key, recalculating an old management key and decrypting the stored content.

Подробнее
24-05-2012 дата публикации

Method and apparatus for controlling access to data based on layer

Номер: US20120131342A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Disclosed is an access control apparatus and method for giving access authority with respect to data. The access control apparatus may encrypt, using a Public Key (PK) of a terminal, a Node Key (NK) of a target layer in which the access authority is to be granted to the terminal, and produce an Access Control List (ACL) of the target layer based on the encrypted NK and ID information of the terminal. Also, the access control apparatus may produce a copy of the ACL based on the produced ACL, and store the produced copy of the ACL in a lower layer.

Подробнее
31-05-2012 дата публикации

Security systems and methods to reduce data leaks in enterprise networks

Номер: US20120137375A1
Принадлежит: Georgia Tech Research Corp

Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources.

Подробнее
14-06-2012 дата публикации

Switch to perform non-destructive and secure disablement of ic functionality utilizing mems and method thereof

Номер: US20120146684A1
Принадлежит: International Business Machines Corp

Structures and methods are provided for performing non-destructive and secure disablement of integrated circuit (IC) functionality. A structure for enabling non-destructive and secure disablement and re-enablement of the IC includes a micro-electrical mechanical structure (MEMS) initially set to a chip enable state. The structure also includes an activation circuit operable to set the MEMS device to an error state based on a detected predetermined condition of the IC. The IC is disabled when the MEMS device is in the error state.

Подробнее
14-06-2012 дата публикации

Random-id function for smartcards

Номер: US20120146773A1
Принадлежит: NXP BV

A method for low-level security based on the UID. In particular it enhances an RFID system by adding the ability to dynamically modify the UID of the smartcard or to randomly generate a new UID for the smartcard.

Подробнее
21-06-2012 дата публикации

Modular exponentiation resistant against skipping attacks

Номер: US20120159189A1
Автор: Marc Joye
Принадлежит: Individual

An exponentiation method resistant against skipping attacks. A main idea of the present invention is to evaluate, in parallel with the exponentiation such as y=g d , a value based on the exponent, e.g. f=d·1. These evaluations are performed using the same exponentiation algorithm by “gluing” together the group operations underlying the computation of y and f so that a perturbation to one operation also perturbs the other. This makes it possible to verify that f indeed equals d before returning the result. Also provided are an apparatus and a computer program product.

Подробнее
21-06-2012 дата публикации

Apparatus and method to harden computer system

Номер: US20120159652A1
Принадлежит: Individual

In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed.

Подробнее
28-06-2012 дата публикации

Elliptic curve cryptograhy with fragmented key processing and methods for use therewith

Номер: US20120163581A1
Принадлежит: Morega Systems Inc

A cryptography module includes a key store having a plurality of storage locations for storing a private key as k key fragments. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process a message in accordance with elliptic curve digital signature algorithm (ECDSA) to produce a signed message.

Подробнее
05-07-2012 дата публикации

Removable devices

Номер: US20120174188A1
Принадлежит: Micron Technology Inc

Methods and removable devices are provided. Some such removable devices may include a secure partition and a public partition. The secure partition is not accessible by an operating system of a host for some embodiments. The secure partition is configured to store information so that formatting/reformatting does not alter the stored information for other embodiments.

Подробнее
12-07-2012 дата публикации

System and method for enforcing software security through cpu statistics gathered using hardware features

Номер: US20120179898A1
Принадлежит: Apple Inc

This disclosure is directed to measuring hardware-based statistics, such as the number of instructions executed in a specific section of a program during execution, for enforcing software security. The counting can be accomplished through a specific set of instructions, which can either be implemented in hardware or included in the instruction set of a virtual machine. For example, the set of instructions can include atomic instructions of reset, start, stop, get instruction count, and get CPU cycle count. To obtain information on a specific section of code, a software developer can insert start and stop instructions around the desired code section. For each instruction in the identified code block, when the instruction is executed, a counter is incremented. The counter can be stored in a dedicated register. The gathered statistics can be used for a variety of purposes, such as detecting unauthorized code modifications or measuring code performance.

Подробнее
26-07-2012 дата публикации

One-Die Flotox-Based Combo Non-Volatile Memory

Номер: US20120191902A1
Принадлежит: Aplus Flash Technology Inc

A memory access apparatus that controls access to at least one memory array has an array of programmable comparison cells that retain a programmed pass code and compare it with an access pass code. When there is a match between the access pass code and the programmed pass code, the memory access apparatus generates a match signal for allowing access to the at least one memory array. If there is no match, the data within the at least one memory array may be corrupted or destroyed. Each nonvolatile comparison cell has a pair of series connected charge retaining transistors. The programmed pass code is stored in the charge retaining transistors. Primary and complementary query pass codes are applied to the charge retaining transistors and are logically compared with the stored pass code and based on the programmed threshold voltage levels determine if the query pass code is correct.

Подробнее
26-07-2012 дата публикации

Apparatus Protecting Software of Sentinel Logic Circuitry Against Unauthorized Access

Номер: US20120191934A1
Автор: Johann Zipperer
Принадлежит: Texas Instruments Inc

A method of protecting software for embedded applications against unauthorized access. Software to be protected is loaded into a protected memory area. Access to the protected memory area is controlled by sentinel logic circuitry. The sentinel logic circuitry allows access to the protected memory area from only either within the protected memory area or from outside of the protected memory area but through a dedicated memory location within the protected memory area. The dedicated memory location then points to protected address locations within the protected memory area.

Подробнее
26-07-2012 дата публикации

Access control data editing support device and method

Номер: US20120192267A1
Автор: Taisuke Aizawa
Принадлежит: Fujitsu Ltd

A computer-readable, non-transitory medium recording an access control data editing support program for causing a computer to implement a procedure. The procedure includes changing log information containing a record having an authorization result of first access authorization determined based on access control data and a content utilized for determining the first access authorization every time an access agent accesses an access target, and changing the access control data based on the changed log information, and determining second access authorization by applying the changed access control data to the content utilized for determining the first access authorization indicated by the log information and generating determination result information containing an authorization result of the second access authorization and a content utilized for determining the second access authorization.

Подробнее
02-08-2012 дата публикации

Program execution device

Номер: US20120198243A1
Принадлежит: Individual

A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program.

Подробнее
16-08-2012 дата публикации

Data storage medium having security function and output apparatus therefor

Номер: US20120210054A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Provided are a storage medium, which has a security function, for storing media content and an output apparatus for outputting data stored in the storage medium. The storage medium includes a controller for converting at least one of a position of pins of a connector and a storage position of media content in a memory unit in order to control transmission of the media content in the memory unit to the output apparatus.

Подробнее
16-08-2012 дата публикации

Cryptographic logic circuit with resistance to differential power analysis

Номер: US20120210138A1
Автор: James L. Tucker
Принадлежит: Honeywell International Inc

This disclosure describes techniques that may prevent cryptographic devices, including both encryption devices and decryption devices, from producing a power signature that can be used by attackers to deconstruct a cryptographic algorithm and extract a cryptographic key. The techniques may include an external power supply charging an internal, dedicated power storage element; temporarily gating off the encryption device from the external power supply; configuring a cryptographic logic unit to perform a cryptographic algorithm from power stored in the power storage element while the external power source is gated off; and then recharging the power storage element upon the cryptographic logic unit completing an iteration of the cryptographic algorithm.

Подробнее
23-08-2012 дата публикации

Providing data security through declarative modeling of queries

Номер: US20120216240A1
Принадлежит: Microsoft Corp

Data security is implemented through a query based policy constraining a primary table. Nested tables inherit the security policy by implementing the policy queries of the primary table. Operations on nested tables such as join actions execute the security policy queries once due to inheritance from the primary table therefore optimizing query modeling. A security policy may respond to a context or a role by executing queries responsive to the context.

Подробнее
23-08-2012 дата публикации

Data security management systems and methods

Номер: US20120216291A1
Автор: Hsin-Ti Chueh, Ssu-Po Chin
Принадлежит: HTC Corp

Data security management system and methods are provided. First, a first system having a management authority is provided. The first system displays an input interface on an input device. A switch switches the management authority from the first system to a second system, wherein the second system operates with a secure mechanism. When the management authority is switched to the second system, the first system transmits layout information of the input interface and an input device characteristic of the input device to the second system. The second system receives input data via the input device, and decodes the input data according to the layout information and the input device characteristic.

Подробнее
06-09-2012 дата публикации

System and method for physically detecting counterfeit electronics

Номер: US20120226463A1
Принадлежит: Nokomis Inc

A system for inspecting or screening electrically powered device includes a signal generator inputting a preselected signal into the electrically powered device. There is also an antenna array positioned at a pre-determined distance above the electrically powered device. Apparatus collects RF energy emitted by the electrically powered device in response to input of said preselected signal. The signature of the collected RF energy is compared with an RF energy signature of a genuine part. The comparison determines one of a genuine or a counterfeit condition of the electrically powered device.

Подробнее
13-09-2012 дата публикации

Data Storage Device and Data Management Method Thereof

Номер: US20120233427A1

An embodiment of the invention provides a data storage device and data management method thereof. The data storage device is coupled to a host, and includes a storage media having data sectors for storing data and a controller. The controller is coupled to the storage media for sequentially receiving one or more read commands and corresponding one or more logical addresses thereto, reads a plurality of first data sectors from the storage media according to the read commands and the corresponding logical addresses, outputs data of the first data sectors to the host, calculates a valid duration required for the one or more read commands, calculates an average data throughput according to the number of the first data sectors and the valid duration, and determines whether the average data throughput exceeds a predetermined threshold. When the average data throughput exceeds the predetermined threshold, the controller performs a blocking procedure to prevent the storage media from being accessed.

Подробнее
13-09-2012 дата публикации

System and methods for identity attribute validation

Номер: US20120233705A1
Принадлежит: Individual

A method of identity attribute validation at a computer server involves the computer server receiving an identity attribute validation request from a communication terminal. The computer server further receives a credential, and is configured with an attribute disclosure profile of attributes authorized for disclosure to the communication terminal. The computer server determines the validity of the credential, and provides the communication terminal with a response to the identity attribute validation request based on an outcome of the credential validity determination. The attribute validation response includes attributes data associated with the credential authorized for disclosure by the attribute disclosure profile but excludes attributes data associated with the credential not authorized for disclosure by the attribute disclosure profile.

Подробнее
20-09-2012 дата публикации

Storage system, storage control apparatus, and storage control method

Номер: US20120239943A1
Автор: Hiroshi Okamoto
Принадлежит: Fujitsu Ltd

In a storage system, a storage apparatus has an encryption key generator and an encryption processor that encrypts data to be recorded in a storage region using an encryption key from the encryption key generator, and is able to change an encryption key for each divided region set in the storage region. A control apparatus has a logical volume setting unit that requests the encryption processor to set an individual divided region for each storage region set as a logical volume in the storage region of the storage apparatus and a data erasure processor that requests the encryption processor to change the encryption key used for encryption in the divided region corresponding to the logical volume to be erased.

Подробнее
27-09-2012 дата публикации

Device and method for disconnecting download channel of hand-held terminal

Номер: US20120244906A1
Автор: Chunyu Li
Принадлежит: ZTE Corp

The disclosure provides a device and method for disconnecting a download channel of a hand-held terminal. The device comprises: a connection/disconnection unit ( 308 ), which comprises a fuse module ( 308 - 2 ) and a fusing module ( 308 - 4 ), arranged between a download connection point ( 302 ) and a microprocessor ( 306 ); when no downloading is needed by the hand-held terminal, the fusing module ( 308 - 4 ) is provided with a level signal through the download connection point, and switch characteristics of a triode or an MOSFET in the fusing module ( 308 - 4 ) are utilized, to control the connection/disconnection of the download channel between the download connection point ( 302 ) and the microprocessor ( 306 ), thus avoiding generation of new download channel.

Подробнее
27-09-2012 дата публикации

Storage device and method for updating data in a partition of the storage device

Номер: US20120246442A1
Принадлежит: Sandisk IL Ltd

A storage device and method for updating data stored in a partition of the storage device are provided. In one embodiment, a storage device is provided that contains a logical-to-physical address map and a memory with a first partition storing original data and a second partition. The storage device receives from a host device (i) a command to write updated data to a first logical address and (ii) a signature for verifying integrity of the updated data, wherein the first logical address is mapped to a physical address of the first partition. The storage device then stores the updated data in the second partition instead of the first partition and attempts to verify the signature of the updated data. If the attempt to verify the signature is successful, the storage device updates the logical-to-physical address map to map the first logical address to a physical address of the second partition.

Подробнее
27-09-2012 дата публикации

Data storage devices including integrated anti-virus circuits and method of operating the same

Номер: US20120246729A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A data storage device includes a storage medium and a controller circuit configured to be coupled to an external host to provide an interface between the external host and the storage medium, the controller circuit configured to detect a virus carried by a data file transferred to and/or stored in the storage medium. The controller circuit may be further configured to cure the detected virus.

Подробнее
04-10-2012 дата публикации

Rf-id tag reading system for using password and method thereof

Номер: US20120249288A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Provided is a RFID tag with enhanced security. The tag includes a tag memory to store thereto pre-determined password information and tag data, an antenna to receive a tag data transmission request signal from an outer reader, and a tag controller to request the reader to transmit the password if the tag data transmission request signal is received, and then to transmit the tag data if the password received from the reader is identical with the pre-determined password. Accordingly, it can be prevented for a third-party, who does not know the password, to check the tag data.

Подробнее
04-10-2012 дата публикации

Information processing apparatus and program product

Номер: US20120250867A1
Принадлежит: Toshiba Corp

According to one embodiment, an information processing apparatus, which is connected to an external apparatus, includes a device key storage unit, a creating unit, a calculating unit, a communication unit, and a key calculating unit. The device key storage unit stores therein a device key. The creating unit creates a media key from the device key and a media key block. The calculating unit calculates first output information on the basis of first inherent information inherent to the information processing apparatus and public information. The communication unit transmits the first output information to the external apparatus and receives second output information calculated by the external apparatus from the external apparatus. The key calculating unit calculates a shared key shared between the information processing apparatus and the external apparatus on the basis of the media key, the first inherent information, and the second output information.

Подробнее
04-10-2012 дата публикации

Routing, security and storage of sensitive data in random access memory (ram)

Номер: US20120254526A1
Принадлежит: Advanced Micro Devices Inc

A method and apparatus for securely storing and accessing processor state information in random access memory (RAM) at a time when the processor enters an inactive power state.

Подробнее
04-10-2012 дата публикации

Providing protection against unauthorized network access

Номер: US20120254951A1
Принадлежит: International Business Machines Corp

A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.

Подробнее
11-10-2012 дата публикации

Multiple independent encryption domains

Номер: US20120257743A1
Автор: Peter H. Van Der Veen
Принадлежит: QNX Software Systems Ltd

A stored object may be encrypted with an “object” cryptographic key. The object cryptographic key may be stored in metadata for the object and the metadata for the object may be encrypted using an “internal” cryptographic key associated with a particular encryption domain. The internal cryptographic key may be stored in a filesystem memory block associated with the particular encryption domain. A “domain” cryptographic key may be generated and stored associated with the particular encryption domain. The domain cryptographic key may be used to encrypt the filesystem memory block. Conveniently, below the domain cryptographic key, the filesystem has a unique, totally unknown, internal cryptographic key for actual data encryption.

Подробнее
18-10-2012 дата публикации

Processor system

Номер: US20120265904A1
Автор: Hideki Matsuyama
Принадлежит: Renesas Electronics Corp

Disclosed herein is a processor system including a specific code area setting register holding a first set value corresponding to an address range of a specific code area in which a specific program is stored; a peripheral device having a specific data storage area for storing specific data to be used by the specific program; a processor element outputting an access request to the peripheral device upon executing programs including the specific program, and determining whether the program executed by reference to the first set value is the specific program, and a safety guard controlling access to the specific data storage area depending on whether the access request results from the execution of the specific program.

Подробнее
01-11-2012 дата публикации

Document management system and method

Номер: US20120278631A1
Принадлежит: Hewlett Packard Development Co LP

A document management system and method are disclosed herein. An example of the document management system includes a composite document generation module that generates a composite document and a secret seed that is associated with an owner or initiator of the composite document, and a key derivation module that derives, from the secret seed and using a key derivation function, at least one of a key for encryption, a key for decryption, a key for signature, or a key for verification for a participant of a workflow associated with the composite document.

Подробнее
01-11-2012 дата публикации

Configurable integrated tamper dectection circuitry

Номер: US20120278905A1
Принадлежит: International Business Machines Corp

Tamper detection circuitry includes a first surface layer surrounding a protected memory, the first surface layer comprising a first plurality of conductive sections; a second surface layer surrounding the protected memory, the second surface layer comprising a second plurality of conductive sections; a programmable interconnect located inside the first surface layer, the programmable interconnect being connected to each conductive section by a plurality of conductive traces, the programmable interconnect being configured to group the conductive section of the first and second plurality of conductive sections into a plurality of circuits, each of the plurality of circuits having a different respective voltage; and a tamper detection module, the tamper detection module configured to detect tampering in the event that a conductive section that is part of a first circuit comes into physical contact with a conductive section that is part of a second circuit.

Подробнее
15-11-2012 дата публикации

Protected mode for mobile communication and other devices

Номер: US20120291101A1
Автор: Eric Ahlstrom, Jenna Lee
Принадлежит: Microsoft Corp

An electronic device includes at least one memory unit, a plurality of applications residing on at least one of the memory units and a database residing on at least one of the memory units. The database is configured to store a record specifying a subset of the plurality of applications that are to be inaccessible to a user when in a protected mode of operation. The protected mode is designed for a user (e.g., child or friend borrowing the device) who can potentially use the device with setting that are configured under the primary user's (e.g. parent, device administrator) supervision. The device also includes a user interface through which a primary user and not other users can specify the subset of the plurality of applications to be included in the record. A processor is operatively associated with the memory unit, the database and the user interface. The processor is configured to switch, in response to a request from the primary user and not other users, between a normal mode operation in which all of the applications in the plurality of applications are available for use and the protected mode of operation.

Подробнее
15-11-2012 дата публикации

Security compliant data storage management

Номер: US20120291133A1
Принадлежит: International Business Machines Corp

An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.

Подробнее
22-11-2012 дата публикации

Bit sequence generation apparatus and bit sequence generation method

Номер: US20120293354A1
Автор: Daisuke Suzuki
Принадлежит: Mitsubishi Electric Corp

A bit sequence generation apparatus includes a glitch generating circuit that generates a glitch, a sampling circuit that samples the glitch waveform generated by the glitch generating circuit, and a glitch shape determination circuit that generates 1-bit data indicating either 1 or 0, based on the glitch waveform sampled by the sampling circuit, and generates a bit sequence composed of a plurality of generated 1-bit data. The bit sequence generation apparatus can provide a PUF circuit that is able to generate highly randomized secret information even in a device with a low degree of freedom of alignment and wiring and that does not violate the design rules.

Подробнее
29-11-2012 дата публикации

Method and apparatus for encrypting and processing data in flash translation layer

Номер: US20120303880A1
Автор: Chang-Woo MIN, Jin-Ha Jun
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method and apparatus for preventing a user from interpreting optional stored data information even when the user extracts the optional stored data, by managing data associated with a flash memory in a flash translation layer, the method comprising searching at least one page of the flash memory when writing data to the flash memory, determining whether authority information corresponding to respective searched pages includes an encryption storage function, generating, corresponding to respective searched pages, a page key according to an encrypting function when the authority information includes the encryption storage function encrypting the data using the generated page key and storing the encrypted data in the respective searched pages, and storing the data in the respective searched pages without encryption when the authority information does not include the encryption storage function.

Подробнее
06-12-2012 дата публикации

Method and system for automatic generation of cache directives for security policy

Номер: US20120311674A1
Принадлежит: International Business Machines Corp

An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not then available at the server. The authorization decision engine determines an authorization policy to apply to the client request, applies the policy, and generates an authorization decision. The authorization decision is then provided to the policy analytics engine, which stores previously-generated potential cache directives that may be applied to the authorization decision. Preferably, the cache directives are generated in an off-line manner (e.g., during initialization) by examining each security policy and extracting one or more cache dimensions associated with each such policy. The policy analytics engine determines an applicable cache directive, and the decision is augmented to include that cache directive. The decision (including the cache directive) is then returned to the authorization server, where the decision is applied to process the client request. The cache directive is then cached for re-use at the authorization server.

Подробнее
13-12-2012 дата публикации

NFC Communications Device for Setting Up Encrypted Email Communication

Номер: US20120314865A1
Автор: Robert Kitchen
Принадлежит: Broadcom Corp

NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a message, public key cryptography requires the use of a pair of keys, i.e., the public key and the private key. Various embodiments of the present invention provide storage of information needed for one or more aspects of encrypting and/or decrypting messages, wherein that information is made available through an NFC communications interface. An NFC-enabled device is brought into physical proximity with a computational platform that is executing, or otherwise providing access to, an email client. Once the NFC-enabled device and the computational platform are within NFC communication range of each other, transfer of information needed to set up an encryption and/or decryption process takes place. Since the encryption/decryption keys and/or related cryptographic process parameters are not stored on the computational platform the security of this information is improved. In some embodiments the encrypted communication is encrypted email, or PUP encrypted email.

Подробнее
13-12-2012 дата публикации

Delaying or deterring counterfeiting and/or cloning of a component

Номер: US20120317662A1

In an embodiment, to deter or delay counterfeiting/cloning of a replacement component of a host device, the replacement component is provided with a code value. The code value is generated from a value of at least one physical parameter of the replacement component and is stored on the replacement component. The host device determines whether the replacement component is authentic if the stored code value matches a reference code value.

Подробнее
20-12-2012 дата публикации

Secure search system, public parameter generation device, encryption device, user secret key generation device, query issuing device, search device, computer program, secure search method, public parameter generation method, encryption method, user secret key generation method, query issuing method, and search method

Номер: US20120324240A1
Принадлежит: Mitsubishi Electric Corp

In a secure search system to be used by a plurality of users, the size of a ciphertext is reduced and the need to generate a new ciphertext when a new user is added is eliminated. A public parameter generation device 100 generates a pair of a public parameter and a master secret key. Using the public parameter, an encryption device 400 encrypts a keyword and generates a ciphertext. Using the master secret key, a user secret key generation device 200 generates a user secret key of a query issuing device 300 . Using the user secret key, the query issuing device 300 generates a query for searching for the keyword. Based on the ciphertext and the query, a search device 500 determines whether a hit is obtained for searching.

Подробнее
20-12-2012 дата публикации

Information input display device and control program thereof

Номер: US20120324571A1

An information input display device, having an input section for inputting information and a display section for displaying the information, which enables an access to protected information after being authenticated by an authentication processing executed after starting up of the information input display device, the information input display device including: an authentication processor which executes the authentication processing based on authentication information inputted by the input section; and an input display controller which, after the starting up of the information input display device and before being authenticated by the authentication processing, accepts inputting of prescribed information different from the authentication information through a screen displayed on the display section, and allows the display section to display the prescribed information on the screen.

Подробнее
27-12-2012 дата публикации

Virtual machine system and virtual machine system control method

Номер: US20120331464A1
Принадлежит: Panasonic Corp

A virtual machine system is provided with a processor having only two privileged modes, a low privileged mode and a high privileged mode, and achieves both a security function for protecting digital copyrighted works or the like and an operating system switching function that guarantees system reliability. The virtual machine system is provided with a first and a second processor and executes a hypervisor on the first processor in the high privileged mode. An operating system on the second processor is executed by cooperation between the hypervisor running on the first processor and a program running on the second processor in low privileged mode. This eliminates the need for running the hypervisor on the second processor in the high privileged mode, thus allowing for execution on the second processor in the high privileged mode of a program for implementing the security function.

Подробнее
03-01-2013 дата публикации

Memory device

Номер: US20130007393A1
Автор: Daisuke Taki
Принадлежит: Individual

According to one embodiment, a memory device includes a semiconductor memory, a memory controller which controls the semiconductor memory according to a request from outside the device, a radio section for wireless communication, and a controller. The controller manages storing data in the device according to a procedure for protecting copyright, obtains the latest version of a parameter for protecting copyright which can be updated from outside the device via the radio section, includes a comparator which compares the parameter stored in the device with the latest version of the parameter, and includes an update manager which updates the stored parameter to the latest version of the parameter when they are different.

Подробнее
03-01-2013 дата публикации

Systems and methods for identifying consumer electronic products based on a product identifier

Номер: US20130007443A1
Принадлежит: Rovi LLC

Systems and methods for identifying consumer electronic products using a playback device with a product identifier in accordance with embodiments of the invention are disclosed. One embodiment includes a processor, and memory configured to store a product identifier, where the product identifier is associated with a specific product and is associated with cryptographic information, and user account data, where the user account data is associated with a user account. In addition, the processor is configured by an application to receive a request for registration from a playback device, receive a product identifier from the playback device, retrieve cryptographic information using the playback device, and send user account data to the playback device encrypted using at least the cryptographic information associated with the product identifier.

Подробнее
03-01-2013 дата публикации

Protocol for Controlling Access to Encryption Keys

Номер: US20130007464A1
Автор: David H. MADDEN
Принадлежит: Individual

A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover the plaintext of the encrypted data; and stores at least one encrypted key at a client system. To decrypt the data, the client must obtain a copy of the encrypted data from the server, and a key to decrypt its locally-stored encrypted key. Once decrypted, the locally-stored key can be used to decrypt the encrypted data, or to decrypt an encrypted key from the server, which may then be used decrypt the encrypted data.

Подробнее
10-01-2013 дата публикации

Bios flash attack protection and notification

Номер: US20130013905A1
Принадлежит: Intel Corp

A system and method for BIOS flash attack protection and notification. A processor initialization module, including initialization firmware verification module may be configured to execute first in response to a power on and/or reset and to verify initialization firmware stored in non-volatile memory in a processor package. The initialization firmware is configured to verify the BIOS. If the verification of the initialization firmware and/or the BIOS fails, the system is configured to select at least one of a plurality of responses including, but not limited to, preventing the BIOS from executing, initiating recovery, reporting the verification failure, halting, shutting down and/or allowing the BIOS to execute and an operating system (OS) to boot in a limited functionality mode.

Подробнее
17-01-2013 дата публикации

Countermeasure method and device for protecting data circulating in an electronic microcircuit

Номер: US20130015900A1
Принадлежит: STMICROELECTRONICS ROUSSET SAS

The disclosure relates to a countermeasure method in an electronic microcircuit, comprising successive process phases executed by a circuit of the microcircuit, and adjusting a power supply voltage between power supply and ground terminals of the circuit, as a function of a random value generated for the process phase, at each process phase executed by the circuit.

Подробнее
17-01-2013 дата публикации

Anti-tampering protection assembly

Номер: US20130015972A1
Принадлежит: Verifone Inc

An anti-tampering protection assembly for sensing tampering with at least one conductor, the anti-tampering protection assembly including unpredictably varying signal generating circuitry, connected to the at least one conductor, for providing unpredictably varying signals on the at least conductor and tampering sensing circuitry for sensing tampering with the at least one conductor.

Подробнее
17-01-2013 дата публикации

Secure data recorder

Номер: US20130019111A1
Автор: Thomas Martin
Принадлежит: British Telecommunications plc

A method and apparatus for securely encrypting data is disclosed. Conventional protections against the loss or theft of sensitive data such as full disk encryption are not effective if the device is, or has recently been, running when captured or found because the keys used for full disk encryption will still be in memory and can be used to decrypt the data stored on the disk. Some devices, such as devices which gather sensitive data in use, must run in environments in which they might be captured by a person seeking access to the sensitive data already recorded by the device. An encryption method is proposed in which files on a recorder's persistent memory are initialised with pseudo-random masking data whilst the recorder is in a relatively secure environment. One or more parameters which can be used to re-create the pseudo-random masking data are encrypted with a public key using a public-key encryption algorithm and stored on the recorder. The device's memory is then purged to remove the one or more parameters. Later, when miming in a relatively insecure environment, the sensitive data is encrypted ( 414 ) using a symmetric encryption algorithm, and combined ( 418 ) with the masking data previously stored in the storage file. When the encrypted files are transferred to a reader device with access to the corresponding private key, the masking data can be recreated, the symmetric encryption reversed and the sensitive data recovered. However, an adversary without the private key cannot recreate the masking data, and is thus unable to recover the sensitive data even with the symmetric encryption key which he might successfully extract from the recorder's volatile memory.

Подробнее
17-01-2013 дата публикации

Method and system for controlling access to embedded nonvolatile memories

Номер: US20130019305A1
Принадлежит: Standard Microsystems LLC

A system to control access to a nonvolatile memory. The system includes an embedded controller, and a nonvolatile memory including a password. The embedded controller and the nonvolatile memory may be in communication with one another. The system further includes a lock register receiving and storing the password from the nonvolatile memory, and a key register receiving a key from the embedded controller and holding the key for one machine cycle. Further, the system includes a comparator connected between the lock register and the key register. The comparator compares the password received from the lock register and the key received from the key register. Output from the comparator is provided to an access filter connected between the embedded controller and the nonvolatile memory. Based on the comparator output, the access filter may grant or block access to the nonvolatile memory.

Подробнее
24-01-2013 дата публикации

Systems and Methods to Communicate with Transaction Terminals

Номер: US20130024307A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A transaction terminal is configured with an application that is configured to present a user interface for out-of-band communication with a transaction handler during the processing of a payment transaction. The transaction handler is configured invoke the application in the transaction terminal via transmitting a predetermined code in an authorization response message.

Подробнее
24-01-2013 дата публикации

Storage device in a locked state

Номер: US20130024638A1
Принадлежит: Hewlett Packard Development Co LP

A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to detecting the storage device decoupling from the device, and configuring the storage device to remain in the locked state if the storage device is re-coupled to the device after the lock timing has elapsed.

Подробнее
24-01-2013 дата публикации

Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier

Номер: US20130024686A1
Автор: Steven J. Drucker
Принадлежит: Drucker Steven J

An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The method begins by receiving an encryption key request from a sending device, where the encryption key request is based upon the message specific identifier, which is associated with a plurality of attributes associated with the message and the sending device. In more detail, the message specific identifier may be an information-based indicator that is unique with respect to the message and the sending device. The method parses the encryption key request and the message specific identifier to provide an intermediate argument used to enter a current random character set that is periodically generated and stored into memory. The intermediate argument helps identify which type of encryption method is desired for use in encryption key generation. An encryption key is constructed using the intermediate argument as an entry point to the current random character set. A data structure is stored associated with the message specific identifier, a random character set identifier for the current random character set, and an identifier of the encryption method used before the key is transmitted back to the device.

Подробнее
31-01-2013 дата публикации

Method and apparatus for protecting software of mobile terminal

Номер: US20130031375A1
Автор: Hua Lin
Принадлежит: ZTE Corp

A method for protecting software of a mobile terminal is provided in the disclosure, wherein an encryption chip is mounted in the mobile terminal. The method includes: when the mobile terminal is turned on, whether or not the encryption chip is invalid is detected; when it is not invalid, the encryption chip authenticates the software of the mobile terminal through interaction with a main chip; when the authentication is not passed, the encryption chip controls a functional module of the mobile terminal through a hardware protection circuit. An apparatus for protecting software of a mobile terminal is also provided in the present disclosure. The solution of the disclosure can prevent the software of the mobile terminal from being cracked and protect the functions of the mobile terminal from illegal usage, thus the security of the mobile terminal is greatly improved and the interests of operators and manufacturers are protected.

Подробнее
31-01-2013 дата публикации

Collecting Debug Data in a Secure Chip Implementation

Номер: US20130031419A1
Принадлежит: International Business Machines Corp

Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data.

Подробнее
07-02-2013 дата публикации

Cross-vm network filtering

Номер: US20130036470A1
Автор: Gongwei QIAN, Minghang ZHU
Принадлежит: Trend Micro Inc

A security virtual machine inspects all data traffic between other virtual machines on a virtualization platform in order to prevent an inter-VM attack. Data traffic between the machines is intercepted at the privileged domain and directed to the security virtual machine via a hook mechanism and a shared memory location. The traffic is read by the security machine and analyzed for malicious software. After analysis, the security machine sends back a verdict for each data packet to the privileged machine which then drops each data packet or passes each data packet on to its intended destination. The privileged domain keeps a copy of each packet or relies upon the security machine to send back each packet. The security machine also substitutes legitimate or warning data packets into a malicious data package instead of blocking data packets. The shared memory location is a circular buffer for greater performance. Traffic is intercepted on a single host computer or between host computers.

Подробнее
21-02-2013 дата публикации

Genomics-based keyed hash message authentication code protocol

Номер: US20130044876A1

Apparatuses, systems, computer programs and methods for implementing a genomics-based security solution are discussed herein. The genomics-based security solution may include reading and parsing a plaintext message comprising a string of words and assigning a lexicographic value to each word in the string to code each word in a rational number. The solution may also include assigning a letter code to each letter. The letter code for each letter may correspond with a function in molecular biology.

Подробнее
21-02-2013 дата публикации

Authentication processing method and apparatus

Номер: US20130047209A1

A physical unclonable function (PUF) device, and a PUF reader which extracts PUF parameters required to calculate a response output from a challenge input by analyzing an operation of the PUF device. Operation parameters characterizing an operation state are obtained by observing a power waveform, an electromagnetic waveform, or a processing time of the PUF device at that time. Authentication of the PUF device is based on the extracted parameters. The PUF reader executes authenticity determination as to whether or not the PUF device is a valid PUF device by monitoring an operation of the PUF device during response generation based on the operation parameters.

Подробнее
28-02-2013 дата публикации

Proxy Authentication

Номер: US20130054803A1
Принадлежит: Individual

In one embodiment, receiving, by an operating system of the first computing device and from a client application executing on the first computing device, a first request for accessing a set of data associated with a user of the first computing device, wherein the set of data is managed by a second computing device; sending, by the operating system and to the second computing device, a second request for accessing the set of data; receiving, by the operating system and from the second computing device, a response to the second request; and if the response to the second request grants the client application access to the set of data, then forwarding, by the operating system and to the client application, an access token to be used by the client application for accessing the set of data with the second computing device.

Подробнее
28-02-2013 дата публикации

Encrypted chunk-based rapid data encryption policy compliance

Номер: US20130054977A1
Принадлежит: Microsoft Corp

To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector.

Подробнее
28-02-2013 дата публикации

Scalable, highly available, dynamically reconfigurable cryptographic provider with quality-of-service control built from commodity backend providers

Номер: US20130055295A1
Принадлежит: International Business Machines Corp

Exemplary embodiments include a method for remapping subsets of host-centric application programming interfaces to commodity service providers, the method including receiving a commodity service providers object, embedding the commodity service providers object with a handle, transforming the handle into a serialized object readable by a hardware security module, generating a virtualized handle from the transformed handle, selecting a target hardware security module based on characteristics of the serialized object and mapping the virtualized handle to the target hardware security module.

Подробнее
28-02-2013 дата публикации

System for detecting vulnerabilities in web applications using client-side application interfaces

Номер: US20130055403A1
Принадлежит: WhiteHat Security Inc

An improved method and apparatus for client-side web application analysis is provided. Client-side web application analysis involves determining and testing, using client-side application interfaces and the like, data input points and analyzing client requests and server responses. In one embodiment, a security vulnerability analyzer is employed to analyze web page content for client-side application files, such as Flash files and Java applets, extract web addresses and data parameters embedded in the client-side application file, and modify the data parameters according to user-defined test criteria. The modified data parameters are transmitted as part of a request to a respective web server used to service the client-side application files. The security vulnerability analyzer analyzes the response from the server to ascertain if there are any security vulnerabilities associated with the interface between the client-side application file and the web server.

Подробнее
07-03-2013 дата публикации

Method and apparatus for providing a structured and partially regenerable identifier

Номер: US20130061036A1
Автор: Ian Justin Oliver
Принадлежит: Nokia Oyj

An approach is provided for generating a structured and partially regenerable identifier. An identification generation platform receives a request to generate at least one regenerable that includes, at least in part, a plurality of fields. The identification generation platform determines to separately hash and/or encrypt the respective ones of the plurality of fields. A generation of the at least one identifier is caused, based at least in part, on the hashed and/or encrypted respective ones of the plurality of fields.

Подробнее
07-03-2013 дата публикации

Protecting application programs from malicious software or malware

Номер: US20130061058A1
Принадлежит: International Business Machines Corp

An apparatus includes a memory to store a secure object comprising at least one of code and data that is encrypted when stored in the memory and a central processing unit (CPU) that is capable of executing an EnterSecureMode (esm) instruction that enables the decryption of the secure object's information when the secure object information is retrieved from the memory into the CPU. The CPU further comprises a feature to protect the secure object from code received from other software.

Подробнее
07-03-2013 дата публикации

Systems and Methods for Controlling the Use of Processing Algorithms, and Applications Thereof

Номер: US20130061060A1
Автор: Radhika Thekkath
Принадлежит: MIPS Technologies Inc

Embodiments provide systems and methods for controlling the use of processing algorithms, and applications thereof. In an embodiment, authorization to use an algorithm is validated in a system having a processor capable of executing user defined instructions, by executing a user defined instruction that writes a first value to a first storage of a user defined instruction block, uses the first value to transform a second value located in a second storage of the user defined instruction block, and compares the transformed second value to a third value located in a third storage. Use of the algorithm is permitted only if the comparison of the transformed second value to the third value indicates that use of the algorithm is authorized. In another embodiment, authorization to use an at least partially decrypted algorithm is validated via a key for enablement.

Подробнее
14-03-2013 дата публикации

Communication device, communication system

Номер: US20130065635A1
Принадлежит: Panasonic Corp

A detection signal transmitting unit 123 of a first component 110 transmits a plurality of detection signals having different frequency spectrums to a second component 210 . Upon receiving the detection signals, a detection signal returning unit 233 of the second component 210 returns, as return signals, respective signal waveforms of the received detection signals to the first component 110 . A detection signal judging unit 126 of the first component 110 judges authenticity of the received return signals based on the transmitted detection signals. When the judging unit judges that the received return signals are not authentic, a tamper-resistance control unit 127 adds a restriction to the communication performed between the first component 110 and the second component 210.

Подробнее
14-03-2013 дата публикации

Method and apparatus for key sharing over remote desktop protocol

Номер: US20130067229A1
Принадлежит: Stoneware Inc

Various methods for the secure exchange of private keys for authenticating a user to an RDP service are provided. One example method may comprise receiving a request comprising a session token to provide a user with access to an RDP service, and retrieving a username and password associated with the user using the session token. The method may further comprise assigning a time period of validity to the password. Furthermore, the method may comprise generating a first secret key based on user information, generating a second secret key based on the first secret key and a salt, and encrypting a packet comprising the password and the time period using the second secret key. Additionally, the method may comprise transmitting the username and encrypted packet to the device for authenticating the user with the requested RDP service. Similar and related example methods, apparatuses, systems, and computer program products are also provided.

Подробнее
21-03-2013 дата публикации

ANTI-KEYLOGGER COMPUTER NETWORK SYSTEM

Номер: US20130073849A1
Автор: WANG Chi-Pei
Принадлежит:

An anti-keylogger computer network system includes a servo-side host computer, with a servo software which requires the user to enter confidential data. An application-side host computer is provided and a keyboard is connected to the application-side host computer. The keys on the keyboard are divided into a data key and control key. An application software is installed in the application-side host computer to receive the instructions from the servo software, and to determine when the anti-keylogger function of the keyboard module shall he started and closed. A connection network is provided for connecting the servo-side host computer to the application-side host computer. A Translate Table program is installed in the application-side host computer and a Translate Table translation program is installed in the servo software of servo-side host computer. 1. An anti-keylogger computer network system comprising:a servo-side host computer, with a servo software which requires the user to enter confidential data, such as user account, password, ID card numbers, birthday, credit card number, amount of transaction, quantity and so on;an application-side host computer;a keyboard, connected to the application-side host computer, the keys on the keyboard are divided into data key and control key;an application software, installed in the application-side host computer, for receiving the instructions from the servo software, and determining when the anti-keylogger function of keyboard shall be started and closed, and the application-side host computer is incapable of decrypting the encrypted key data, meaning the application software has no decoding algorithm and key settings;a connection network, for connecting the servo-side host computer to the application-side host computer;a Translate Table program, installed in the application-side host computer, the Translate Table program can translate the letter or value of data key pressed by the user into another letter or value and ...

Подробнее
21-03-2013 дата публикации

INFORMATION PROCESSING APPARATUS, SOFTWARE UPDATING METHOD, AND IMAGE PROCESSING APPARATUS

Номер: US20130073869A1
Автор: Segawa Hidekazu
Принадлежит: RICOH COMPANY, LTD

An information processing apparatus which updates a basic software package is disclosed. The information processing apparatus includes an encryption and decryption unit which stores values calculated uniquely from software and encrypts information based on the calculated values and decrypts encrypted information based on the calculated values. The basic software package includes a firmware authenticating module for authenticating a firmware updating file which includes new software for updating the basic software package, a value uniquely calculated from the new software, and a public key signature. The information processing apparatus further includes a software updating module which updates the basic software package by using the authenticated firmware updating file, and an encryption key managing module for encrypting again the information encrypted by the values based on a value changed by updating the basic software package. 120-. (canceled)21. An information processing apparatus includingan encryption and decryption unit configured to encrypt and decrypt information by using a first value uniquely calculated from software including a plurality of programs;a memory unit configured to store the information encrypted by the encryption and decryption unit; and a software updating unit configured to update the software; and', 'an encryption information managing unit configured to decrypt the encrypted information by using the first value, encrypt again the decrypted information by using a second value which is changed based on the update of the software,, 'a processing unit configured to execute the programs including a basic input/output system (BIOS) and a basic software package, the processing unit executing the basic software package comprisingwherein the BIOS, when executed by the processing unit upon startup of the apparatus, calculates a hash value of the BIOS and calculates a hash value of the basic software package,the encryption and decryption unit ...

Подробнее
21-03-2013 дата публикации

AUTHENTICATION IN HETEROGENEOUS IP NETWORKS

Номер: US20130074161A1
Принадлежит:

The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one network access type, determine the network access type, to create a start message containing at least a user identity, and to encapsulate the start message in an authentication message compatible with the access network identified in the information message, and an access controller for reading the encapsulated message from the mobile and forwarding the encapsulated message to an authentication server identified in the encapsulated message. The invention also proposes a corresponding method for authenticating and authorizing network services, and an access control device, a subscriber device and a router device. 118-. (canceled)19. A system comprising:a mobile device configured to at least determine a network access type upon receipt of an information message indicating at least one network access type, create a start message containing at least a user identity, and encapsulate the start message in an authentication message compatible with an access network identified in the information message; andan access controller configured to at least read the encapsulated message from the mobile device and forward the encapsulated message to an authentication server identified in the encapsulated message.20. A system comprisingdetermining means for determining a network access type by a mobile device, upon receipt of an information message indicating at least one network access type;creating means for creating a start message containing at least a user identity; andencapsulating means for encapsulating the start message in an authentication message compatible with an access network identified in the information message; andaccess controller means comprising reading means for reading the encapsulated message from the mobile device and a forwarding means for forwarding the encapsulated ...

Подробнее
28-03-2013 дата публикации

INTERACTIVE ELECTRONIC READER WITH PARENTAL CONTROL

Номер: US20130080471A1
Принадлежит:

An e-reader with a password protected supervisory account that controls various features and functions of the e-reader, and e-reader user profile accounts for reading users of the e-reader. The supervisory account permits the supervisor user to set up one or more e-reader user profiles that are each assigned its own customizable bookshelf for displaying the available electronic published content, such as, e-books. The electronic published content is assigned to each e-reader user profile through the supervisory account. The e-reader provides interactive content that reinforces development of reading skills and reading comprehension. The e-reader provides reading-level specific definitions and an audible pronunciation of the words. The e-reader has zooming and scrolling capabilities. The e-reader may also present suggestions and recommendations for further reading based on the aggregation of reading statistics for all readers by user profile. The e-reader tracks e-reader user information and presents the information to the password protected supervisory account. Multiple instances of the e-reader may exist and be associated with the supervisory account and e-reader user profiles. 1. An e-reader comprising;a memory for storing electronic published content and information relating to an e-reader account;a display for rendering the electronic published content into a visual form;a user input device; and verifying administrative access by a supervisor user associated with the e-reader account;', 'displaying a representation of electronic published content and a prompt for assigning the electronic published content to one or more e-reader user profiles;', 'associating the electronic published content with an e-reader user profile;', 'displaying a representation of the electronic published content to the e-reader user profile only while the electronic published content is associated with the e-reader user profile; and', 'enabling access by a user of the e-reader profile to ...

Подробнее
28-03-2013 дата публикации

Computer network storage environment with file tracking

Номер: US20130080515A1
Автор: Gary Stephen Shuster
Принадлежит: HOSHIKO LLC

A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files. In particular, files that may be corrupted by alternation include executable software files and compressed files, which may be fault intolerant. Fault tolerant files, which may include text and graphics files, may not be noticeably affected. In some cases, copyrighted files, media files, and/or other files are altered to prevent undesirable distribution.

Подробнее
28-03-2013 дата публикации

METHODS OF AND SYSTEMS FOR REMOTELY CONFIGURING A WIRELESS DEVICE

Номер: US20130081113A1
Принадлежит:

A particular method includes transmitting a message from a first device to a second device. The message includes first information associated with identification of the first device. The first information enables the second device to obtain access data. The method also includes establishing a first communication link between the first device and the second device based on the access data. The method further includes receiving, via the first communication link, second information associated with establishment of a second communication link between the first device and a third device. The method also includes configuring the first device to establish the second communication link between the first device and the third device based on the second information. 1. A method comprising:transmitting a message from a first device to a second device, wherein the message comprises first information associated with identification of the first device, wherein the first information enables the second device to obtain access data;establishing a first communication link between the first device and the second device based on the access data;receiving, via the first communication link, second information associated with establishment of a second communication link between the first device and a third device; andconfiguring the first device to establish the second communication link between the first device and the third device based on the second information.2. The method of claim 1 , wherein the first device comprises a machine-to-machine communication device.3. The method of claim 1 , further comprising configuring the first device to operate in accordance with a first mode of operation claim 1 , wherein the first device is configured to provide a wireless local area network while in the first mode of operation.4. The method of claim 1 , wherein establishing the first communication link comprises:receiving security information from the second device, wherein the security ...

Подробнее
04-04-2013 дата публикации

INFORMATION TERMINAL DEVICE AND METHOD OF PERSONAL AUTHENTICATION USING THE SAME

Номер: US20130086671A1
Автор: Tamaki Makoto
Принадлежит:

An information terminal device is provided that may use the input functionality of a touch panel to remove the restriction on the use thereof, for example, release the key lock. The information terminal device () is an information terminal device including a display () and a touch panel (), including: a pattern storage memory () configured to store a release pattern that is to be entered into the touch panel () to remove the restriction on the use of the information terminal device, the release pattern being designated by a user as a graphic pattern; a comparison unit () configured to determine whether an entered pattern entered into the touch panel matches the release pattern; and a controller () configured to remove the restriction on the use of the information terminal device if the comparison unit () determines that the entered pattern matches the release pattern. 1. An information terminal device including a display and a touch panel , comprising:a pattern storage memory configured to store a release pattern that is to be entered into the touch panel to remove a restriction on a use of the information terminal device, the release pattern being designated by a user as a graphic pattern;a comparison unit configured to determine whether an entered pattern entered into the touch panel matches the release pattern; anda controller configured to remove the restriction on the use of the information terminal device if the comparison unit determines that the entered pattern matches the release pattern.2. The information terminal device according to claim 1 , wherein:the pattern storage memory stores an input request pattern suggesting that the release pattern be entered, andthe input request pattern is displayed on the display when the restriction on the use of the information terminal device is to be removed.3. The information terminal device according to claim 2 , wherein:the pattern storage memory stores a set of input request patterns suggesting that the release ...

Подробнее
11-04-2013 дата публикации

AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAM

Номер: US20130089201A1
Принадлежит: SONY CORPORATION

Provided is an authentication device including a key holding unit for holding L (L≧2) secret keys s(i=1 to L) and L public keys ythat satisfy y=F(s) with respect to a set F of multivariate polynomials of n-th order (n≧2), and an interactive protocol execution unit for performing, with a verifier, an interactive protocol for proving knowledge of (L−1) secret keys sthat satisfy y=F(s). The interactive protocol execution unit includes a challenge reception unit for receiving L challenges Chfrom the verifier, a challenge selection unit for arbitrarily selecting (L−1) challenges Chfrom the L challenges Chreceived by the challenge reception unit, a response generation unit for generating, by using the secret keys s, (L−1) responses Rsprespectively for the (L−1) challenges Chselected by the challenge selection unit, and a response transmission unit for transmitting the (L−1) responses Rspgenerated by the response generation unit to the verifier. Representative Drawing 1. An authentication device comprising:a key holding unit for holding L (L≧2) secret keys s, (i=1 to L) and L public keys y, that satisfy y, =F(s,) with respect to a set F of multivariate polynomials of n-th order (n≧2); and{'sub': i', 'i, 'an interactive protocol execution unit for performing, with a verifier, an interactive protocol for proving knowledge of (L−1) secret keys s, that satisfy y=F(s),'} [{'sub': 'i', 'a challenge reception unit for receiving L challenges Chfrom the verifier,'}, {'sub': i', 'i, 'a challenge selection unit for arbitrarily selecting (L−1) challenges Chfrom the L challenges Chreceived by the challenge reception unit,'}, {'sub': i', 'i', 'i, 'a response generation unit for generating, by using the secret keys s, (L−1) responses Rsprespectively for the (L−1) challenges Chselected by the challenge selection unit, and'}, {'sub': 'i', 'a response transmission unit for transmitting the (L−1) responses Rspgenerated by the response generation unit to the verifier.'}], 'wherein the ...

Подробнее