Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 2175. Отображено 197.
03-05-2017 дата публикации

УСТРОЙСТВО ФОРМИРОВАНИЯ ИЗОБРАЖЕНИЙ, СПОСОБ ЕГО ЗАПУСКА И КОМПЬЮТЕРНО-ЧИТАЕМЫЙ НОСИТЕЛЬ ЗАПИСИ

Номер: RU2618369C2

Изобретение относится к устройству формирования изображений. Техническим результатом является снижение энергопотребления устройства формирования изображений. Устройство формирования изображений со сниженным энергопотреблением, имеющее множество рабочих режимов, содержит блок интерфейса связи, функциональный блок и контроллер, включающий основной CPU и вспомогательный CPU. Основной CPU управляет функциональным блоком в нормальном режиме. Вспомогательный CPU выполняет аутентификацию внешнего устройства, когда в режиме экономии энергии принимается команда выполнения задания от внешнего устройства. Вспомогательный CPU выполняет аутентификацию путем сравнения адресной информации внешнего устройства, которое передало команду выполнения задания, с предварительно сохраненной адресной информацией внешнего устройства. Функциональный блок переводит рабочий режим устройства формирования изображений в соответствии с результатом аутентификации и выполнения функции, соответствующей команде выполнения ...

Подробнее
26-11-2019 дата публикации

Устройство для защиты информации от утечки по каналам побочных электромагнитных излучений и наводок, образованных средством вычислительной техники

Номер: RU2707418C1

Изобретение относится к области технической защиты информации в различных сферах деятельности. Техническим результатом является исключение утечки защищаемой информации по каналам побочных электромагнитных излучений и наводок, образованных средством вычислительной техники объекта информатизации через средства мобильной связи и закладочные устройства. Устройство содержит детектор электромагнитных сигналов, подключенный к системному блоку средства вычислительной техники, и программный комплекс, функционирующий под управлением операционной системы средства вычислительной техники. При обнаружении детектором электромагнитных сигналов радиосигнала средства мобильной связи или закладочного устройства, нарушившим контролируемую зону объекта информатизации и превышающего заданный пороговый уровень радиосигнала, детектор электромагнитных сигналов передает управляющий сигнал на средство вычислительной техники объекта информатизации, который распознается программным комплексом, и в соответствии с настройками ...

Подробнее
10-11-2016 дата публикации

УСТРОЙСТВО ФОРМИРОВАНИЯ ИЗОБРАЖЕНИЙ, СПОСОБ ЕГО ЗАПУСКА И КОМПЬЮТЕРНО-ЧИТАЕМЫЙ НОСИТЕЛЬ ЗАПИСИ

Номер: RU2015114237A
Принадлежит:

... 1. Устройство формирования изображений, имеющее множество рабочих режимов, содержащее: блок интерфейса связи для осуществления связи с внешним устройством; контроллер для выполнения аутентификации внешнего устройства наряду с поддержанием режима экономии энергии, когда от внешнего устройства принимается команда выполнения задания, когда рабочим режимом устройства формирования изображений является режим экономии энергии; и функциональный блок для перевода рабочего режима устройства формирования изображений в соответствии с результатом аутентификации и выполнения функции, соответствующей команде выполнения задания.2. Устройство по п. 1, в котором контроллер содержит: основной CPU для управления функциональным блоком в нормальном режиме; и вспомогательный CPU для выполнения аутентификации внешнего устройства, когда в режиме экономии энергии принимается команда выполнения задания от внешнего устройства.3. Устройство по п. 2, в котором, когда рабочим режимом является режим экономии энергии, ...

Подробнее
20-03-2011 дата публикации

МОДУЛЬ ОБЕСПЕЧЕНИЯ БЕЗОПАСНОСТИ, ВКЛЮЧАЮЩИЙ ВТОРИЧНЫЙ АГЕНТ, ВЗАИМОДЕЙСТВУЮЩИЙ С ГЛАВНЫМ АГЕНТОМ

Номер: RU2009126826A
Принадлежит:

... 1. Система для удаленного мониторинга устройства, включающая, по крайней мере, одну сеть, по крайней мере, один сетевой интерфейс устройства, связанный, с этой, по крайней мере, одной сетью, главный агент, приспособленный для работы под управлением операционной системы базового устройства, установленной на устройстве, при этом главный агент имеет доступ к, по крайней мере, одной сети через, по крайней мере, один сетевой интерфейс, центр мониторинга, подключенный к, по крайней мере, одной сети, и настроенный таким образом, чтобы иметь возможность связываться с главным агентом и (или) с вторичным агентом через, по крайней мере, один сетевой интерфейс, и вторичный агент, установленный на устройстве, при этом вторичный агент имеет доступ к, по крайней мере, одной сети, через, по крайней мере, один сетевой интерфейс независимо от операционной системы базового устройства, при этом вторичный агент и главный агент приспособлены для того, чтобы передавать в центр мониторинга сведения об атрибутах ...

Подробнее
28-10-2009 дата публикации

Device to device handshaking through a power supply signal

Номер: GB0002453405A8
Принадлежит:

Подробнее
06-02-2019 дата публикации

Digital storage system

Номер: GB0002543394B
Принадлежит: KEN STRATFORD, Ken Stratford

Подробнее
20-11-2019 дата публикации

Method of operating a media scanner

Номер: GB0201914519D0
Автор:
Принадлежит:

Подробнее
04-09-2019 дата публикации

Memory security for automotive functional safety compliance with independent downstream processes

Номер: GB0002571628A
Принадлежит:

A single memory space of a device such as pressure sensor 120 (figure 1) having a dedicated functionality is partitioned to provide separate memory partitions 208, 210 for access by different processes along a production stream, wherein partition boundaries are determined by the data storage requirements of the specific process. Firmware 204 in the device controls the overall functionality of the device in addition to partitioning non-volatile memory. The firmware also controls how each of the partitions may be accessed by applying a number of different safety features for protecting data in the device, wherein the safety features include preventing alteration of data in a partition after completion of a manufacturing process. Data security is implemented independently for each partition in order to maintain functional safety compliance of the device. The different partitions can be created and accessed at different points in a production stream by different entities such as a device manufacturer ...

Подробнее
15-08-2013 дата публикации

System and method for accessing diagnostic information

Номер: AU2010281522B2
Принадлежит:

A technique is provided for accessing diagnostic information in an electronic device 10. In accordance with this technique, a system 74 is provided for determining diagnostic information about a power source 200. In one embodiment, the system 74 provides an interface 66 to provide access to the diagnostic information. The system 74 may further provide a memory, wherein the diagnostic information may be stored. The system 74 may further be configured to provide access to the diagnostic information when the electronic device 10 is non-operational.

Подробнее
07-11-2013 дата публикации

Methods, systems and apparatus for determining whether an accessory includes particular circuitry

Номер: AU2013200782A1
Принадлежит:

Methods, systems, and apparatus for determining whether an accessory includes particular circuitry. A host device may measure a first voltage and a second voltage received from an accessory, where the voltages are provide through the accessory from a power source. Before measuring the second voltage, the host device may send an instruction to the accessory instructing the accessory to alter an impedance of the power path between the power source and the host device, and the host device may draw at least a threshold amount of current from the power source via the accessory. The host device may then determine whether the accessory includes particular circuitry based on the relationship between the first voltage and the second voltage. MEASURE A FIRST VOLTAGE RECEIVED FROM AN ACCESSORY 422 SEND AN INSTRUCTION TO THE ACCESSORY TO ALTER AN IMPEDANCE, AT THE ACCESSORY, OF A POWER PATH BETWEEN A POWER SOURCE AND A HOST DEVICE SINK CURRENT FROM THE POWER SOURCE VIA THE ACCESSORY MEASURE A SECOND ...

Подробнее
12-09-2013 дата публикации

DYNAMIC DUTY-CYCLING OF PROCESSOR OF MOBILE DEVICE BASED ON OPERATING CONDITION OF MOBILE DEVICE

Номер: CA0003001006A1
Принадлежит:

... ²In one embodiment, a method includes recording a first location of a mobile ²device; determining, ²by one or more processors of a geographic-positioning component of the mobile ²device, on a ²periodic basis, a current location of the mobile device; determining, by the ²processors of the ²geographic-positioning component, whether the current location is outside a ²geographic region ²defined at least in part by the first location; and if the current location is ²outside the geographic ²region, then transmitting, by the processors of the geographic-positioning ²component, a message ²to one or more other processors of the mobile device, the message causing one ²or more of the ²other processors to transition from a sleep state to an active state.² ...

Подробнее
08-11-2007 дата публикации

COMMUNICATION PROTOCOL FOR DEVICE AUTHENTICATION

Номер: CA0002647328A1
Принадлежит:

A communication protocol between a master device (102), such as a mobile phone, and a peripheral device (104) facilitates authentication of the peripheral device. When a peripheral device is detected, the master device initiates a wake-up command to the peripheral device, transmits an authentication request command followed by challenge data to the peripheral device, and awaits responses from the peripheral device. The accessory receives the challenge data, performs a hash function on the challenge data, performs a hash function on the challenge data, and generates response data. An authentication response type byte is sent to the mobile phone followed by the response data. The mobile phone compares the response data to pre-stored data that is associated with the challenge data. A match indicates that the accessory is authentic. The challenge / response data, also referred to as a plaintext / cyphertext pair, is pre-generated external to the mobile phone using the hash function, then pre-stored ...

Подробнее
06-11-2018 дата публикации

LOW POWER BATTERY MODE FOR WIRELESS-ENABLED DEVICE PRIOR TO COMMISSIONING

Номер: CA0002973755C
Принадлежит: ABL IP HOLDING LLC

The wireless lighting control device examples conserve battery power before installation and/or Commissioning. To save battery life, such a device remains in a low power mode and is awakened for commissioning, for example, by a button press (e.g. for a wall switch) or motion or audio sensing (e.g. for an occupancy sensor or the like). When awakened, the lighting control device enters its commissioning mode with the radio transceiver active for a short period of time. If the lighting control device is not commissioned within that time interval, for example, it may reenter the sleep mode. Conversely, if successfully commissioned during the active time period, the lighting control device is ready for normal operations.

Подробнее
24-07-2018 дата публикации

MANAGING DATA FOR AUTHENTICATION DEVICES

Номер: CA0002832348C
Принадлежит: CERTICOM CORP., CERTICOM CORP

Methods, systems, and computer programs for managing authentication data for an authentication device are disclosed. An authentication device may be included, for example, in a mobile device battery so that the battery can be authenticated by a mobile device. In some implementations, encrypted certificate data are stored on an authentication device. The encrypted certificate data are accessed, and unencrypted certificate data are generated by decrypting the encrypted certificate data. The unencrypted certificate data are stored on the authentication device. The unencrypted certificate data enable the authentication device to provide a valid reply message, for example, in response to receiving an interrogation message from an interrogation device. In some implementations, the reply message includes the unencrypted certificate data and a response value generated by the authentication device based on a secret value.

Подробнее
14-03-2017 дата публикации

DYNAMIC DUTY-CYCLING OF PROCESSOR OF MOBILE DEVICE BASED ON OPERATING CONDITION OF MOBILE DEVICE

Номер: CA0002866158C
Принадлежит: FACEBOOK, INC., FACEBOOK INC

In one embodiment, a method includes recording a first location of a mobile device; determining, by one or more processors of a geographic-positioning component of the mobile device, on a periodic basis, a current location of the mobile device; determining, by the processors of the geographic-positioning component, whether the current location is outside a geographic region defined at least in part by the first location; and if the current location is outside the geographic region, then transmitting, by the processors of the geographic-positioning component, a message to one or more other processors of the mobile device, the message causing one or more of the other processors to transition from a sleep state to an active state.

Подробнее
26-10-2004 дата публикации

METHOD AND APPARATUS FOR AN INTEGRATED SECURITY DEVICE FOR PROVIDING FOR AUTOMATIC DISABLEMENT

Номер: CA0002285848C

In electronic devices containing microprocessors, including data processing systems, logic is loaded to storage registers within a microprocessor or other suitable non - volatile storage medium during the manufacturing process. The logic provides for detecting the presence of a battery employed to power an interval timer. Also, the logic provides pre-set time intervals that operate in conjunction with the interval timer and existing or installed device state sensing devices. One time interval provides a warning to a user that the protected device will be deactivated within a specified period of time if a preset authorization code is not entered into the device . Another interval is provided to carry out deactivation if the preset code is not entered. Types of automatic deactivation include: partial deactivation, which comprises allowing communication via modem with a service center to obtain authorization; fully deactivated state requiring entry of a key code to reactivate the device and ...

Подробнее
04-05-2000 дата публикации

METHOD AND APPARATUS FOR AN INTEGRATED SECURITY DEVICE FOR PROVIDING FOR AUTOMATIC DISABLEMENT

Номер: CA0002285848A1
Принадлежит:

In electronic devices containing microprocessors, including data processing systems, logic is loaded to storage registers within a microprocessor or other suitable nonvolatile storage medium during the manufacturing process. The logic provides for detecting the presence of a battery employed to power an interval timer. Also, the logic provides pre-set time intervals that operate in conjunction with the interval timer and existing or installed device state sensing devices. One time interval provides a warning to a user that the protected device will be deactivated within a specified period of time if a preset authorization code is not entered into the device. Another interval is provided to carry out deactivation if the preset code is not entered. Types of automatic deactivation include: partial deactivation, which comprises allowing communication via modem with a service center to obtain authorization; fully deactivated state requiring entry of a key code to reactivate the device and destructive ...

Подробнее
16-05-2012 дата публикации

Measuring instrument use information management and control system and method

Номер: CN0102456180A
Принадлежит:

Подробнее
24-09-2019 дата публикации

A method for protecting the electronic device and electronic apparatus

Номер: CN0106650512B
Автор:
Принадлежит:

Подробнее
30-03-2018 дата публикации

SECURED START FOR AN ELECTRONIC CIRCUIT

Номер: FR0003043229B1
Принадлежит: PROTON WORLD INTERNATIONAL N.V.

Подробнее
12-08-1994 дата публикации

Electronic security device built into a microcomputer allowing authentification of the identity of a physical person

Номер: FR0002701324A1
Принадлежит:

Dispositif de sécurité pour contrôler l'alimentation électrique d'un système informatique. L'invention concerne un dispositif électronique permettant la mise sous tension d'un système informatique par authentification de l'identité d'une personne physique à l'aide d'une carte à puce personnelle. Il est constitué d'un lecteur de carte à puce, d'un dispositif électronique de contrôle, d'une carte à puce et d'un programme permettant les différentes fonctions du dispositif ...

Подробнее
18-04-2011 дата публикации

SECURITY FEATURES IN INTERCONNECT CENTRIC ARCHITECTURES

Номер: KR0101029901B1
Автор:
Принадлежит:

Подробнее
24-04-2013 дата публикации

SYSTEM AND METHOD FOR ACCESSING DIAGNOSTIC INFORMATION

Номер: KR0101253005B1
Автор:
Принадлежит:

Подробнее
18-01-2017 дата публикации

COMPUTER WITH ENHANCED SECURITY FUNCTION

Номер: KR1020170007100A
Автор: YU, TAE JONG
Принадлежит:

In the present invention, disclosed is a computer with an enhanced security function. The computer according to the present invention includes: a power supply device and a main board installed inside a case; an optical disk drive (ODD) which is installed to expose an entrance to the outside of the case; a security controller which controls a power supply from the power supply device to the optical disk drive; and a key switch which is installed in the case, is electrically connected to the security controller, and generates on/off signals by a security key. The security controller controls to supply power to the optical disk drive if a switch on signal is generated in the key switch by the security key. Accordingly, the present invention can fundamentally prevent information from being leaked and replicated through a data input and output unit. COPYRIGHT KIPO 2017 (140) Main board (150) Power supply device (160) Security controller (184) Key switch ...

Подробнее
10-07-2008 дата публикации

METHOD TO AUTHENTICATE AN ACCESSORY

Номер: WO2008083053A2
Принадлежит:

An apparatus (100) used by a plurality of devices to authenticate an accessory (120) is configured to operate with a device (110) of the plurality of devices. The accessory (120) applies an authentication algorithm to a key and a challenge (130) received from the device (110) and generates a response (132) thereto. A challenge and response memory (114) stores a subset of a set of challenges (232) and pre-computed responses (230). The enabling circuit transmits a challenge (130) to the accessory (120) and receives a received response (132) therefrom. The enabling circuit (112) also compares the received response (132) to the stored response (230) corresponding to the stored challenge (232) sent to the accessory (120). The enabling circuit (112) is configured to generate a normal operation enabling signal that enables normal operation of the device when the received response (132) matches the stored response and is configured not to generate the normal operation enabling signal when the received ...

Подробнее
04-04-2013 дата публикации

UNLOCKING A STORAGE DEVICE

Номер: WO2013048380A1
Принадлежит:

An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock the storage device during a procedure to transition the electronic device from the lower power state to a higher power state. The predetermined information is different from a credential for use in unlocking the storage device.

Подробнее
27-06-2013 дата публикации

ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM

Номер: WO2013095587A1
Принадлежит:

A system comprising a platform protected by an always-on always-available security system is described. In one embodiment, the system includes a risk behavior logic to detect a potential problem, a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion, and the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform.

Подробнее
13-03-2008 дата публикации

COMPONENT AUTHENTICATION FOR COMPUTER SYSTEMS

Номер: WO000002008030659A3
Принадлежит:

A radio frequency (RF) tag may be attached to an electronic component in a computer system to enable authentication of the electronic component. A RF reader may receive information stored in the RF tag. An authentication logic coupled to the RF reader may process the received information and compared it with stored information. The received information may include identification of a manufacturer of the electronic component and identification of the RF tag.

Подробнее
01-11-2012 дата публикации

SYSTEM AND METHOD FOR SECURE AUTHENTICATION OF A "SMART" BATTERY BY A HOST

Номер: US20120278629A1
Принадлежит: TEXAS INSTRUMENTS INCORPORATED

Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within the battery module 110 and (2) a key generator configured to generate a key based on an identity of the battery module 110 and cause the key to be stored within the tamper resistant processing environment 200.

Подробнее
03-04-2018 дата публикации

Rogue hardware detection through power monitoring

Номер: US0009934119B2
Принадлежит: Cisco Technology, Inc., CISCO TECH INC

Techniques are provided for monitoring power consumption for individual systems or devices as a way to detect illicit or rogue hardware, e.g., addition of an unauthorized integrated circuit (IC), which may have been added to an existing system. Techniques include monitoring a power on sequence of a system, the power on sequence including one or more distinct stages, determining for each stage of the one or more distinct stages of the power on sequence, whether an observed power load of any distinct stage has deviated from an expected power load according to a power profile for the system, and when the observed power load of a given distinct stage has deviated from the expected power load, performing an action indicating that a deviation from the expected power load has occurred. The power profile specifies expected power characteristics of the system for each stage of a power on sequence.

Подробнее
20-07-2017 дата публикации

INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR THE SAME AND STORAGE MEDIUM

Номер: US20170205867A1
Принадлежит:

An information processing apparatus that can avoid an IEEE802.1X re-authentication process due to a communication speed setting change made at the time of transitioning to the power-saving state and realize both of security and power-saving. Fixed link speed with which both a MFP and a communication apparatuses are compatible is set on the basis of acquired pieces of link speed setting information about the MFP and the communication apparatus. Then, 100 Mbps lower than 1000 Mbps is fixedly set on the basis of acquired power-saving setting information about the MFP when the power-saving setting is effective, and EEE is enabled. 111-. (canceled)12. An information processing apparatus having an authentication function based on IEEE802.1X , comprising:a memory; and 'change, when the information processing apparatus receives an instruction to enable the authentication function, a setting of the information processing apparatus from a first setting, where a communication speed is changed to a lower speed from a higher communication speed when the information processing apparatus transitions to a power saving state from a normal power state, to a second setting where the communication speed is not changed when the information processing apparatus transitions to the power saving state.', 'a processor that executes instructions stored in the memory to13. The information processing apparatus according to claim 12 , wherein the information processing apparatus is a printing apparatus.14. A control method for an information processing apparatus having an authentication function based on IEEE802.1X claim 12 , the control method comprising:changing, when the information processing apparatus receives an instruction to enable the authentication function, a setting of the information processing apparatus from a first setting, where a communication speed is changed to a lower speed from a higher communication speed when the information processing apparatus transitions to a power ...

Подробнее
03-11-1998 дата публикации

Secure module with microprocessor and co-processor

Номер: US0005832207A1
Принадлежит: Dallas Semiconductor Corporation

An electronic module having at least a microprocessor and co-processor on a single integrated circuit. The electronic module can be contained in a small housing. The electronic module provides secure bidirectional data communication via a data bus. The electronic module may include integrated circuit comprising a microprocessor, and a co-processor adapted to handle 1,024-bit modulo mathematics primarily aimed at RSA calculations. The electronic module is preferably contained in a small token sized metallic container and will preferably communicate via a single wire data bus which uses a one-wire protocol.

Подробнее
26-12-2000 дата публикации

Data processing system and method for disabling a portable computer outside an authorized area

Номер: US0006166688A1

A data processing system and method are disclosed for disabling a portable computer in response to the portable computer being moved outside of an authorized area of use. An authorized, geographical area of use is established. The authorized, geographical area is any geographical area capable of being defined. The geographical area is not limited to areas within an enclosure, and is not bounded by a transmitter's broadcast range. A determination is made regarding whether the portable computer is located outside of the authorized area. If the portable computer is moved outside of the authorized area, the portable computer is disabled. The portable computer is inoperable when disabled.

Подробнее
22-03-2022 дата публикации

Integrated circuit, control device, information distribution method, and information distribution system

Номер: US0011283632B2
Принадлежит: MITSUBISHI HEAVY INDUSTRIES, LTD.

The integrated circuit includes a CPU configured to operate according to a program, a PUF information output unit configured to output PUF information while power is being supplied, a key pair output unit configured to output a public key and a private key based on the PUF information while power is being supplied, a public key transmitter configured to transmit the public key output from the key pair output unit to the outside, and a shared encryption key decryption unit configured to decrypt encrypted information produced through encryption with the public key and received from the outside with the private key output from the key pair output unit.

Подробнее
03-05-2005 дата публикации

Battery-based secured storage binding system

Номер: US0006889298B2

An apparatus and method for exclusively binding data to a data processing system. The logical binding apparatus of the present invention includes a detachable circuit device mounted within a system planar. Data to be bound within the system planar is stored in a memory device within the detachable circuit device. A battery signal is applied from the system planar to a binding pin on the detachable circuit device, wherein the binding pin is applied to the input of a binding latch. The binding latch remains in a reset state while the battery signal is applied. Upon removal of said binding signal from the binding pin, the binding latch is set thus signaling a processing unit within the detachable circuit device to remove the data from the memory device.

Подробнее
02-12-2014 дата публикации

Security module having a secondary agent in coordination with a host agent

Номер: US0008904523B2

The invention is directed to a security module deployed in a host device, which provides a secondary agent that operates in coordination with the host agent in the host device, but operates independent of the host operating system of the host device to independently access an existing communication network interface in the host device or a separate dedicated network interface, if available. In one aspect, the present invention enables robust theft recovery and asset tracking services. The system comprises a monitoring center; one or more monitored devices; a security module in the monitored devices; and one or more active communications networks. Monitored devices may be stand alone devices, such as computers (e.g., portable or desktop computers), or a device or a subsystem included in a system. A monitored device comprises a security module, a host agent and software to support the host agent that runs in the monitored device's OS.

Подробнее
22-09-2020 дата публикации

Hardware structure of a trusted computer and trusted booting method for a computer

Номер: US0010783253B2

This disclosure provides a hardware structure of a trusted computer, which comprises: a trusted socket and a trusted module compatible with TPM and TPCM specifications; a trusted management module connected to the trusted socket for measuring the credibility; a firmware memory of BIOS connected to the trusted socket. A firmware memory of BMC connected to the trusted socket through a switch module. When the trusted management module is in the standby status, the trusted management module measures the credibility of the firmware memory of the BIOS and the firmware memory of the BMC according to the output signal of the trusted module inserted to the trusted socket, and the computer is allowed being turning on as the measurement is pass. This disclosure further relates to a trusted booting method for a computer.

Подробнее
01-08-2017 дата публикации

Information handling system port seal

Номер: US0009720451B2
Принадлежит: Dell Products L.P., DELL PRODUCTS LP

An information handling system opening, such as at a cable port, selectively closes and opens through inflation and deflation of a seal, such as an expanding balloon structure interfaced with a microfluidic reservoir. The seal fills the opening to block contaminants from entering the information handling system and deflates to provide room for cables to pass when desired. Automated sealing of a port is provided in response to detection of contaminants, such as liquids or dust.

Подробнее
14-11-2006 дата публикации

Dynamically loading power management code in a secure environment

Номер: US0007137016B2
Принадлежит: Intel Corporation, INTEL CORP, INTEL CORPORATION

Methods and apparatuses for dynamically loading and unloading power management code at runtime in a secure environment are described herein. In one embodiment, exemplary method includes loading authenticated/trusted power management code into a memory of a secure environment of an operating system (OS) and executing the power management code within the secure environment of the OS to handle power management tasks. Other methods and apparatuses are also described.

Подробнее
11-07-2019 дата публикации

SYSTEM AND METHOD FOR CONTROLLING THE POWER STATES OF A MOBILE COMPUTING DEVICE

Номер: US20190213339A1
Принадлежит: BOOZ ALLEN HAMILTON INC.

An exemplary mobile computing device, including a memory device for storing a control policy defining a functional configuration of the mobile computing device; and a processor configured to place the mobile computing device in one of one of plural states based on a validation result of the control policy.

Подробнее
03-06-2010 дата публикации

SELF-DELEGATING SECURITY ARRANGEMENT FOR PORTABLE INFORMATION DEVICES

Номер: US20100138926A1
Принадлежит:

A portable information device includes a dynamically configurable security arrangement in which operational settings are automatically and dynamically configured based on a current set of security risks to which the device is exposed, on a current computing capacity of the portable information device, or both. The operational settings can be adjusted to control which security services or functions are to be executed locally by portable information device, and which of the security services or functions are to be executed remotely on at least one computing device that is distinct from the portable information device.

Подробнее
19-05-2020 дата публикации

Enabling secure transactions with an underpowered device

Номер: US0010657516B2
Принадлежит: PayPal, Inc., PAYPAL INC, PAYPAL, INC.

Methods, systems, and computer program products for providing secure transactions for a device with limited functionality are disclosed. For example, a computer-implemented method may include presenting an encoded image identifying a form of payment on a display of a computing device in response to detecting a condition limiting a functionality of the device, maintaining the presentation of the encoded image on the display in response to the detected condition, and removing the presentation of the encoded image from the display in response to determining that the detected condition is no longer detected.

Подробнее
12-04-2006 дата публикации

A METHOD OF ENABLING A MULTITASKING COMPUTING DEVICE TO CONSERVE RESOURCES

Номер: EP0001644831A1
Принадлежит:

Подробнее
06-06-2018 дата публикации

ПАНЕЛЬ OLED (ДИСПЛЕЯ НА ОРГАНИЧЕСКИХ СВЕТОДИОДАХ), ТЕРМИНАЛ И СПОСОБ УПРАВЛЕНИЯ ИДЕНТИФИКАЦИЕЙ

Номер: RU2656814C2
Принадлежит: Сяоми Инк. (CN)

Изобретение относится к вариантам осуществления панели дисплея на органических светодиодах (OLED), терминалу и способу управления идентификацией и принадлежит к области технологии дисплея. Технический результат - терминал может одновременно отображать изображение и идентифицировать отпечаток пальца, даже если только обеспечен панелью OLED, таким образом, улучшая целостную согласованность и эстетику терминала. Панель OLED включает в себя: подложку матрицы, слой OLED, расположенный на подложке матрицы, матрицу компонентов получения отпечатка пальца, расположенную в подложке матрицы, или матрицу компонентов получения отпечатка пальца, расположенную между подложкой матрицы и слоем OLED, и схему управления, соединенную с матрицей компонента получения отпечатка пальца. В соответствии с вариантами осуществления настоящего раскрытия, матрица модуля идентификации отпечатка пальца расположена в подложке матрицы панели OLED или между подложкой матрицы и слоем OLED таким образом, чтобы располагать ...

Подробнее
22-06-2020 дата публикации

Программно-аппаратное шифровальное (криптографическое) средство защиты фискальных данных

Номер: RU198181U1

Полезная модель относится к области вычислительной техники. Технический результат заключается в повышении уровня защиты фискальных данных и надёжности работы программно-аппаратного шифровального средства защиты фискальных данных. Раскрыто программно-аппаратное шифровальное средство защиты фискальных данных, содержащее легкосъёмный защищенный от несанкционированного вскрытия корпус с интерфейсным разъёмом (2) для реализации информационного обмена между центральным процессором (6) программно-аппаратного шифровального средства защиты фискальных данных и контрольно-кассовой техникой (11), осуществляющей информационный обмен с налоговыми органами (14), операторами фискальных данных (12) и информационными системами маркировки (13), при этом центральный процессор (6) содержит часы реального времени (7) и соединён с криптографическим процессором (8) и энергонезависимой памятью (9), характеризующееся тем, что содержит блок конденсаторов (3) с внешним питанием через интерфейсный разъем (2), при этом ...

Подробнее
04-02-2010 дата публикации

Energiemanagement- und Sicherheitsschutzsystem sowie zugehöriges Verfahren

Номер: DE102008050370A1
Принадлежит:

Es werden ein System (20) und ein Verfahren zum Energiemanagement und zum Sicherheitsschutz angegeben, die bei einem Computersystem mit einem Sensor (13) anwendbar sind. Der Sensor erfasst Positionsinformation eines Benutzers in Bezug auf das Computersystem, um davon ausgehend zu bestimmen, ob in einen Schlafmodus oder in einen Erkennungsmodus einzutreten ist. Der Sensor erfasst auch Bewegungsinformation einer speziellen Bewegung des Benutzers, um abhängig vom Inhalt der Bewegungsinformation in einen Betriebsmodus zurückzukehren.

Подробнее
28-03-2007 дата публикации

Hibernating a processing apparatus for processing secure data

Номер: GB0000703178D0
Автор:
Принадлежит:

Подробнее
04-08-2004 дата публикации

A method of enabling a multitasking computing device to conserve resources

Номер: GB0000414830D0
Автор:
Принадлежит:

Подробнее
13-10-2004 дата публикации

A remote protection system for disabling electrical equipment.

Номер: GB0002400453A
Принадлежит:

A remote protection system comprises a transmitter adapted to signal to a receiver 1, the receiver adapted to control electrical equipment 6 coupled thereto, the receiver being responsive to a said signal to disable said electrical equipment. Preferably, the receiver operates a three way switch having an enable 3, disable 4 and protection 5 positions, whereby on selection of the protection position a surge of power is supplied to the equipment to damage or destroy part of the equipment so as to prevent its unauthorised use. Alternatively an anti-tamper unit 7 is provided which detects the attempt of unauthorised access to the use of the equipment and in so doing so activates the protection mode of the switch.

Подробнее
20-08-2008 дата публикации

Securely saving a state of a processor during hibernation

Номер: GB0002446658A
Принадлежит:

A data processing apparatus comprises processing circuitry including several state retention cells for holding a current state of the processing circuitry, at least some of the state retention cells being arranged in series. In response to a hibernate signal, the processing apparatus switches from an operational mode to a low power or sleep mode in which the processing circuitry is powered down. Prior to powering down the processing circuitry its current state is output from the state retention cells and encrypted, and the encrypted state is then stored (fig. 3a). Upon detection of a wake signal, the processing apparatus switches from the low power mode to the operational mode and the stored encrypted state data is decrypted and used to restore the state of the processing circuitry (fig. 3b). The state retention cells may take the form of one or more scan chains and provide an output in the form of one or more serial data streams. This is a convenient form for subsequent encryption by hardware ...

Подробнее
15-07-2020 дата публикации

Always-available embedded theft reaction subsystem

Номер: GB0002500852B
Принадлежит: INTEL CORP, Intel Corporation

Подробнее
06-11-2019 дата публикации

Interactive mirror

Номер: GB0002573373A
Автор: IAN REES, Ian Rees
Принадлежит:

A system for delivering video content comprising a digital video display unit 2, a server, a content delivery portal, and a content controller. The mirror display is fully reflective in areas of dimmed or switched off pixels and positions images at an area of the screen to superimpose them over real physical reflected images. The display unit also has a network connector 3, and a camera and microphone 10 which are turned on and off by a physical switch for privacy. The server 7 comprises content, URLs, or metadata or control data relating to the specific unit. The content delivery portal 8 streams or broadcasts the media to the display unit. The content controller 5 controls the stream from the server/portal to the display unit. The system may comprise a means to control access or a time window to the video sources. The content controller may be a person or a machine learning AI.

Подробнее
06-06-2018 дата публикации

Interactive mirror

Номер: GB0201806532D0
Автор:
Принадлежит:

Подробнее
03-04-2019 дата публикации

Interactive mirror

Номер: GB0201902216D0
Автор:
Принадлежит:

Подробнее
15-09-2010 дата публикации

PROCEDURE AND COUPLING DEVICE FOR THE PREVENTION OF A ON A MICROPROCESSOR OF BAD ACCESS

Номер: AT0000478392T
Принадлежит:

Подробнее
15-05-2008 дата публикации

DIGITAL SELF-DELETION OF A BY A KEY COPYING CANNONS OF MEMORY.

Номер: AT0000394750T
Принадлежит:

Подробнее
10-06-2003 дата публикации

METHOD AND APPARATUS FOR UNLOCKING A COMPUTER SYSTEM HARD DRIVE

Номер: AU2002352879A1
Автор: GIRARD LUKE, LUKE GIRARD
Принадлежит:

Подробнее
29-03-1996 дата публикации

Method for protecting an apparatus against unauthorized use

Номер: AU0003467295A
Принадлежит:

Подробнее
01-12-2011 дата публикации

Systems and methods for providing device-to-device handshaking through a power supply signal

Номер: AU2008266928B2
Принадлежит:

Handshaking circuits are provided in a communications cable and in a device operable to be mated with the communications cable. Before a device can utilize the power supply signal of such a communications channel, the two handshaking circuits must sufficiently identify one another over a power supply signal with a decreased voltage. The decreased voltage allows for a cable plug to be provided with a safe, protected power that cannot cause harm to a human. The decreased voltage also reduces the chance that a device can receive a primary power supply signal from the cable before the device sufficiently identifies itself. Accordingly, a laptop may be connected to a portable music player, but the voltage of the power supply signal provided by the laptop to the cable may be decreased on-cable until the handshaking circuit of the portable music player sufficiently performs a handshaking operation with a on-cable handshaking circuit.

Подробнее
03-10-2019 дата публикации

Small form factor wireless communication device and method

Номер: AU2015101967A4
Принадлежит: FPA Patent Attorneys Pty Ltd

A small form factor device for selectively communicating an authorisation signal. The small form factor device comprises a processor configured to process force signals received from a force sensor to determine the occurrence of an authorisation gesture. If an authorisation gesture is determined to have occurred and light is detected by a light sensor of the device, the processor further causes a wireless communications module of the device to transmit an authorisation signal.

Подробнее
23-04-2003 дата публикации

2K COMPUTER TOUCHLESS

Номер: CA0002361388A1
Принадлежит:

Подробнее
12-09-2013 дата публикации

DYNAMIC DUTY-CYCLING OF PROCESSOR OF MOBILE DEVICE BASED ON OPERATING CONDITION OF MOBILE DEVICE

Номер: CA0002866158A1
Принадлежит:

In one embodiment, a method includes recording a first location of a mobile device; determining, by one or more processors of a geographic-positioning component of the mobile device, on a periodic basis, a current location of the mobile device; determining, by the processors of the geographic-positioning component, whether the current location is outside a geographic region defined at least in part by the first location; and if the current location is outside the geographic region, then transmitting, by the processors of the geographic-positioning component, a message to one or more other processors of the mobile device, the message causing one or more of the other processors to transition from a sleep state to an active state.

Подробнее
18-06-2014 дата публикации

Electronic storage device and data protection method thereof

Номер: CN103870766A
Автор: ZHUANG ZHEWEI, LIN XINZHI
Принадлежит:

The invention discloses an electronic storage device and a data protection method thereof. The electronic device is electrically connected with a host and used for storing data of the host. The date protection method comprises the following steps of: providing a standby battery which is arranged in the electronic storage device and used for providing electric power needed by operation of the electronic device when the host does not provide power for the electronic storage device; setting a time set value; transmitting a login event to the electronic device; judging whether the electronic storage device needs to protect the stored data in the electronic storage device according to the time set value and the login event through the electronic device, and if so, the electronic storage device protects the stored data. A protection mechanism of the electronic storage device can make judgments according to the time set value and the login event or according to whether the login event reaches ...

Подробнее
21-10-2015 дата публикации

Provided for by the power supply signal handshake between equipment system and method

Номер: CN0102915102B
Автор:
Принадлежит:

Подробнее
21-11-2012 дата публикации

Systems and methods for providing device-to-device handshaking through a power supply signal

Номер: CN0101675406B
Принадлежит:

Handshaking circuits are provided in a communications cable and in a device operable to be mated with the communications cable. Before a device can utilize the power supply signal of such a communications channel, the two handshaking circuits must sufficiently identify one another over a power supply signal with a decreased voltage. The decreased voltage allows for a cable plug to be provided with a safe, protected power that cannot cause harm to a human. The decreased voltage also reduces the chance that a device can receive a primary power supply signal from the cable before the device sufficiently identifies itself. Accordingly, a laptop may be connected to a portable music player, but the voltage of the power supply signal provided by the laptop to the cable may be decreased on-cable until the handshaking circuit of the portable music player sufficiently performs a handshaking operation with a on-cable handshaking circuit.

Подробнее
04-12-1987 дата публикации

UNIT HAS KEYBOARD OF SAFETY, IN PARTICULAR FOR the COMPOSITION Of a CONFIDENTIAL CODE

Номер: FR0002599525A1
Принадлежит:

Подробнее
29-06-2012 дата публикации

PROCESS Of ACTIVATION Of a MECHANISM, AND DEVICE IMPLEMENTING SUCH a PROCESS.

Номер: FR0002969777A1
Автор: FOLSCHEID BRUNO
Принадлежит: CASSSIDIAN SAS

L'invention concerne un procédé d'activation d'une fonction telle un déverrouillage d'un clavier de téléphone mobile au moyen d'une séquence de consignes {X1, ..., xn} de longueur n fournie à un utilisateur qui doit valider cette séquence pour activer la fonction. On détermine la séquence de consignes {X1, ..., xn} de façon aléatoire, et pour chaque consigne xi, le procédé comprend les étapes suivantes : émission d'une consigne xi vers l'utilisateur ; réception d'une réponse yi, de l'utilisateur ; analyse pour validation de la consigne xi ; la consigne xi est dite validée lorsque yi, est une réponse valable pour x, et que le temps écoulé entre l'émission de xi et la réception de yi, est inférieur à une durée Δi, impartie ; si la consigne xi, n'est pas validée alors la fonction n'est pas activée ; émission de la consigne suivante, si elle existe, après validation de xi ; activation de la fonction lorsqu'au moins la dernière consigne émise est validée.

Подробнее
06-01-2017 дата публикации

GENUINENESS OF AN ELECTRONIC CIRCUIT OR A PRODUCT CONTAINING SUCH A CIRCUIT

Номер: FR0003038411A1

L'invention concerne un procédé de vérification de l'authenticité d'un produit associé à un dispositif hôte, dans lequel : un premier circuit électronique (10) du dispositif initialise un circuit de rétention de charges d'un deuxième circuit électronique (22) du produit ; et le premier circuit interprète une durée de décharge du circuit de rétention de charges pour décider de l'authenticité du produit.

Подробнее
27-10-2010 дата публикации

ELECTRONIC DEVICE, INFORMATION PROCESSING DEVICE

Номер: KR1020100115389A
Автор:
Принадлежит:

Подробнее
01-12-2011 дата публикации

Electronic reading apparatus and the data protection method thereof

Номер: TW0201142644A
Принадлежит:

Present invention relates to an electronic reading apparatus with data protection and thief prevention function. The electronic reader apparatus has a code input unit for a user inputs a security code by a code unit, and a code determining unit determines the code. When the code is incorrect, the user not inputs code for a period, or the user not inputs a signal for a period, the center control unit stops the power supply unit output power to turning off the electronic reader apparatus and cleans the displaying image on the display unit. According to, under any conditions as the user not leaves for a long period, not inputs a security code for a long period, or the security code incorrect, the electronic reading apparatus can't be operated. Therefore, the data protection and thief prevention function is achieved.

Подробнее
16-10-2004 дата публикации

Computer system having an identification means

Номер: TW0200421092A
Принадлежит:

A computer system includes an identification means and a host. The identification means includes a first wireless module for transmitting a wireless location signal in response to a reception of a wireless identification signal. The host includes a processing module for controlling the operation of the host, a second wireless module for transmitting the wireless identification signal and for receiving the wireless location signal. The power supply is capable of providing power to the processing module when receiving a power control signal, and a control module for identifying the location signal and transmitting the power control signal to the power supply based on the comparison before the power supply provides power to the processing module.

Подробнее
21-11-1997 дата публикации

Security control circuit for computer system power switch

Номер: TW0000320697B
Принадлежит: WINBOND ELECTRONICS CORP

A power switch security control circuit, used to be installed in one computer system, in which the computer system includes one main board, one power supply and one keyboard, comprises: (1) one keyboard intercept unit, when computer system is in power off state, it can intercept keyboard signal between keyboard and keyboard controller interface of main board; (2) one keyboard input data decoder, which can accept keyboard signal intercepted by keyboard intercept unit, and decoding it; (3) one first-in first-out buffer, connected to output end of keyboard input data decoder, and buffering the decoded keyboard data with predetermined format by first-in first-out sequence; (4) one password data memory, which can store computer system power-on password; (5) one comparison unit, whose two input ends separately receives first-in first-out buffer output and password data memory output, and comparing if both are matched, and outputting comparison result; (6) one power supply controller unit, receiving ...

Подробнее
02-05-2008 дата публикации

POWER SUPPLY MONITORING METHOD AND SYSTEM

Номер: WO2008050180A1
Принадлежит:

A device (10) having a power supply monitoring capabilities, the device (10) includes: a power supply unit (60); at least one real time clock generator counter (150) adapted to receive a supply voltage from the power supply unit (60); a fixed value storage circuit (20) that is un-accessible to software executed by a processor (130); wherein the fixed value storage circuit (20) stores a fixed value; wherein the fixed value includes multiple bits; a volatile storage unit (30), being accessible to the processor (130); wherein the volatile storage unit (30) is adapted to: (i) store a reset value after being reset; (ii) receive the fixed value during an initialization state; and (iii) store the fixed value until being reset; wherein the volatile storage unit (30) is designed such that there is a low probability that the reset value equals the fixed value; and a comparator (40) adapted to provide a tamper indication if the fixed value stored at the fixed value storage circuit differs from a value ...

Подробнее
06-02-1997 дата публикации

ELECTRONIC DATA-PROCESSING SYSTEM

Номер: WO1997004375A3
Автор: FORER, Josef, KAUF, Otto
Принадлежит:

Described is an electronic data-processing system with at least one central control unit, a memory unit, and operating unit and a power supply, the operating unit including means for the acquisition of features characteristic of people, means also being provided for comparing the acquired features with stored patterns. This makes it possible to check access rights simply and effectively, even with portable PCs or electronic consumer goods.

Подробнее
21-03-1996 дата публикации

Номер: WO1996008754A1
Автор:
Принадлежит:

Подробнее
23-10-2012 дата публикации

Communication protocol for device authentication

Номер: US0008296565B2

A communication protocol between a master device, such as a mobile phone, and a peripheral device facilitates authentication of the peripheral device. When a peripheral device is detected, the master device initiates a wake-up command to the peripheral device, transmits an authentication request command followed by challenge data to the peripheral device, and awaits responses from the peripheral device. The accessory receives the challenge data, performs a hash function on the challenge data, and generates response data. An authentication response type byte is sent to the handset followed by the response data. The handset compares the response data to pre-stored data that is associated with the challenge data. A match indicates that the accessory is authentic. The challenge/response data, also referred to as a plaintext/cyphertext pair, is pre-generated external to the handset using the hash function, then pre-stored in the handset.

Подробнее
27-06-2017 дата публикации

Communication apparatus and method for controlling the same

Номер: US0009691235B2

A communication apparatus that can be driven with a battery includes: an authentication unit arranged to authenticate a battery attached to the communication apparatus; and a wireless communication unit arranged to communicate with an external apparatus via a wireless network. The wireless communication unit of the communication apparatus is arranged to output a result of authentication by the authentication unit to the external apparatus via the wireless network.

Подробнее
01-12-2015 дата публикации

Computing system with identification mechanism and method of operation thereof

Номер: US0009203834B2

A method of operation of a computing system includes: providing a portable authorization module having a module enclosure and an identification unit, the module enclosure completely covering unit contacts of the identification unit; receiving operation power wirelessly for operation of the portable authorization module; and transmitting an identification signal from the portable authorization module for identifying communication from a device.

Подробнее
25-05-2006 дата публикации

Apparatus and Method of Intelligent Multistage System Deactivation

Номер: US20060109117A1

A deactivation management unit for facilitating an intelligent multistage system deactivation process where the deactivation management unit is flexible, facilitates recovery, and renders reverse engineering nearly impossible after the system has been permanently deactivated.

Подробнее
13-03-2018 дата публикации

Low power battery mode for wireless-enabled device prior to commissioning

Номер: US0009918372B2
Принадлежит: ABL IP HOLDING LLC

The wireless lighting control device examples conserve battery power before installation and/or commissioning. To save battery life, such a device remains in a low power mode and is awakened for commissioning, for example, by a button press (e.g. for a wall switch) or motion or audio sensing (e.g. for an occupancy sensor or the like). When awakened, the lighting control device enters its commissioning mode with the radio transceiver active for a short period of time. If the lighting control device is not commissioned within that time interval, for example, it may reenter the sleep mode. Conversely, if successfully commissioned during the active time period, the lighting control device is ready for normal operations.

Подробнее
13-04-2017 дата публикации

ELECTRONIC DEVICE AND METHOD OF CONTROLLING ELECTRONIC DEVICE

Номер: US20170103197A1
Принадлежит:

An electronic device includes an authentication unit that performs authentication to determine whether a power supply apparatus connected to the electronic device is a predetermined apparatus, a selection unit that makes a user select whether to use the power supply apparatus, when the authentication has failed, a storage unit that stores information indicating that the authentication has succeeded or the user has selected to use the power supply apparatus as history information. When the power supply apparatus is detached from the electronic device, the history information is deleted from the storage unit. The electronic device permits use of the power supply apparatus connected to the electronic device when the history information is stored in the storage unit while the electronic device is in a power ON state. 1. An electronic device comprising:an authentication unit that performs authentication to determine whether a power supply apparatus connected to the electronic device is a predetermined apparatus;a selection unit that makes a user select whether to use the power supply apparatus, when the authentication has failed;a storage unit that stores information indicating that the authentication has succeeded or the user has selected to use the power supply apparatus as history information, wherein when the power supply apparatus is detached from the electronic device, the history information is deleted from the storage unit; anda permission unit that permits use of the power supply apparatus connected to the electronic device when the history information is stored in the storage unit while the electronic device is in a power ON state.2. The electronic device according to claim 1 , wherein when the history information is stored in the storage unit claim 1 , the authentication unit does not execute the authentication.3. The electronic device according to claim 1 , further comprising a determination unit that determines whether the power supply apparatus connected to ...

Подробнее
14-02-2006 дата публикации

Method and apparatus for unlocking a computer system hard drive

Номер: US0007000109B2
Принадлежит: Intel Corporation, INTEL CORP, INTEL CORPORATION

For one embodiment of the present invention, a protected storage device of a computer system includes a password stored therein. Instructions may be included on the computer system to authenticate the user. Once authenticated, the password may be transferred to a hard drive where it may be used to unlock the drive. Subsequent to unlocking the drive, an operating system may be loaded. For one embodiment of the present invention, the drive may be relocked by reducing the voltage supplied to the drive in accordance with a power management policy. The drive may be again unlocked by re-authenticating the user and transferring the password from protected storage to the drive.

Подробнее
24-05-2018 дата публикации

MULTI-INPUT USER INTERACTION AND BEHAVIORAL BASED AUTHENTICATION SYSTEM FOR CONTEXT AWARE APPLICATIONS

Номер: US20180144110A1
Принадлежит:

A mobile device which can identify a change in possession of the device and based on a change in possession of the device implement different types of security protocols to follow based on a scoring system regarding threat of the user to the data on the mobile device. 1. A method for determining security threats to a device based on user usage of the device , the device comprising a computer receiving input from a plurality of sensors regarding user usage of the device , the method comprising the steps of:the computer continuously checking user behavior in context to the device to determine user usage;the computer comparing the user usage to an established primary user profile and other associated profiles of the device to determine if the user behavior matches a profile;if the user behavior matches a profile other than the established primary user profile, the computer assessing a threat score; andif the threat score is greater than a first threshold, the computer preventing a user from accessing determined features of the device and enabling secondary authentication to access the determined features of the device.2. The method of claim 1 , wherein if the threat score is greater than a second threshold claim 1 , the computer shutting down the device for use.3. The method of claim 1 , wherein the secondary authentication is based on prior user behavior associated with the associated profiles.4. The method of claim 1 , wherein determined features which are inaccessible are related to personal information of the primary user.5. The method of claim 1 , wherein the primary user profile is created by usage of the device over a period of time.6. The method of claim 1 , wherein the device is a mobile phone and the determined features of the device that are inaccessible if the threat score is greater than the first threshold are applications comprising financial data and application comprising personal information regarding the user.7. The method of claim 1 , wherein the ...

Подробнее
03-11-2020 дата публикации

Apparatus for autonomous security and functional safety of clock and voltages

Номер: US0010824764B2
Принадлежит: Intel Corporation, INTEL CORP

An apparatus is provided for autonomous security and functional safety (FUSA) of clock and voltages. The apparatus may include: a multiplexer having a first input communicatively coupled to a pin to receive a first clock external to a die, and a second input coupled to an output of a divider; an oscillator to provide a second clock; and a counter coupled to an output of the multiplexer and the oscillator, wherein the counter is to operate with the second clock and is to determine a frequency of the first clock. The apparatus may further include a voltage monitor circuitry for monitoring voltage(s) for FUSA, a reference generator for FUSA, a duty cycle monitor for FUSA, a frequency degradation monitor for FUSA, and a phase error degradation monitor for FUSA.

Подробнее
23-06-2016 дата публикации

System for Security Conscious Energy Drain

Номер: US20160179649A1
Принадлежит:

A method, system and computer-usable medium are disclosed for detecting unanticipated consumption of power by a device. A first set of power consumption data is selected, followed by the collection of a second set of power consumption data, which respectively correspond to the consumption of a first and second amount of power by a device when it performs an authorized operation. The first and second sets of power consumption data are then compared to detect whether the second amount of power consumed is greater than the first amount of power consumed. If so, then a notification is generated, stating that the device has consumed an unanticipated greater amount of power as a result of performing the authorized operation.

Подробнее
26-09-2019 дата публикации

METHOD AND SYSTEM FOR PROVIDING HACK PROTECTION IN AN AUTONOMOUS VEHICLE

Номер: US20190294799A1
Принадлежит: Wipro Limited

A method and hack protection system for providing hack protection in an autonomous vehicle is disclosed. The method includes generating, by the hack protection system, random power ON sequence, where the random power ON sequence is in encrypted format and generated during power ON of the autonomous vehicle. The method further includes detecting current flow to sensors in the autonomous vehicle, the sensors are controlled by power switching circuitry and is responsive to power switching control signals generated by a system software module in response to the random power ON sequence, the random power ON sequence being converted from the encrypted format into decrypted format by the system software module. The method includes determining actual power ON sequence of the sensors in response to the current flow. Moreover, the method includes comparing the actual power ON sequence with the random power ON sequence to control power of the autonomous vehicle.

Подробнее
07-11-2017 дата публикации

Method of saving power of station in wireless network

Номер: US0009813984B2
Принадлежит: FCI INC

A method of saving power of a station in wireless network is provided. The station comprises a connectivity module, a central processing unit, and peripheral devices. The method includes: upon receiving a wake-up signal, powering on the connectivity module, the central processing unit, and the peripheral devices; performing the central processing unit and the peripheral devices in a connection state; performing the connectivity module in an authenticated state; and upon a condition that there is no data to be transferred to the station or after the station transmits and receives all needed data, performing a sleep mode to power off the connectivity module, the central processing unit, and the peripheral devices.

Подробнее
03-02-2004 дата публикации

Energy-saving control interface and method for power-on identification

Номер: US0006687830B2
Автор: Wu-Chih Yang, YANG WU-CHIH

An energy-saving control interface for power-on identification utilizes a first switch to start to sense and identify data. A second switch is connected to a sensing/scanning circuit for powering off the sensing/scanning circuit when a timer has reached its count. A third switch is used to control whether to supply power to a security control unit, wherein the security control unit is supplied with power immediately when the sensing/scanning circuit completes data identification. A power supply is connected with a fourth switch controlled by a confirmation signal from the security control unit, such that the security control unit determines whether to activate the power supply.

Подробнее
02-04-2024 дата публикации

Voltage glitch detection circuit

Номер: US0011947672B2
Принадлежит: NXP B.V.

A voltage glitch detector includes a ring oscillator, a plurality of counters, a combined result circuit, and a result evaluation circuit. The ring oscillator includes a plurality of series-connected stages. An output of a last stage of the ring oscillator is coupled to an input of a first stage of the ring oscillator. Each counter of the plurality of counters has an input coupled to a node located between two stages of the plurality of series-connected stages. The combined result circuit is coupled to each of the plurality of counters. The combined result circuit combines the count values received from each counter of the plurality of counters to provide a combined result. The result evaluation circuit is coupled to compare the combined result with a reference value to determine when a voltage glitch is detected.

Подробнее
20-03-2013 дата публикации

Systems and methods for providing device-to-device handshaking through a power supply signal

Номер: EP2570886A2
Принадлежит:

Handshaking circuits (142) are provided in a communications cable and in a device (150) operable to be mated with the communications cable. Before a device (150) can utilize the power supply signal of such a communications channel, the two handshaking circuits must sufficiently identify one another over a power supply signal with a decreased voltage. The decreased voltage allows for a cable plug to be provided with a safe, protected power that cannot cause harm to a human. The decreased voltage also reduces the chance that a device can receive a primary power supply signal from the cable before the device sufficiently identifies itself.; Accordingly, a laptop may be connected to a portable music player, but the voltage of the power supply signal provided by the laptop to the cable may be decreased on-cable until the handshaking circuit of the portable music player sufficiently performs a handshaking operation with a on-cable handshaking circuit.

Подробнее
27-08-2012 дата публикации

МОДУЛЬ ОБЕСПЕЧЕНИЯ БЕЗОПАСНОСТИ, ВКЛЮЧАЮЩИЙ ВТОРИЧНЫЙ АГЕНТ, ВЗАИМОДЕЙСТВУЮЩИЙ С ГЛАВНЫМ АГЕНТОМ

Номер: RU2460220C2

Изобретение относится к системам связи, а именно к способу и устройству для удаленного мониторинга устройства, устанавливаемому в базовом устройстве. Техническим результатом является повышение отказоустойчивости системы связи. Технический результат достигается тем, что согласно способу используют устройство, снабженное сетевым интерфейсом, связанным с сетью, используют главный агент, работающий под управлением операционной системы базового устройства, установленной на устройстве, при этом главный агент имеет доступ к сети через сетевой интерфейс, подключают центр мониторинга к сети, настроенной таким образом, чтобы через нее можно было связываться с главным агентом и (или) с вторичным агентом через сетевой интерфейс, и используют вторичный агент, установленный на устройстве и имеющий доступ к сети через сетевой интерфейс независимо от операционной системы базового устройства, при этом вторичный агент и главный агент согласовывают между собой, кто из них должен получить доступ к сети через ...

Подробнее
01-03-2018 дата публикации

Verfahren zum Laden eines elektrischen Energiespeichers eines elektrisch betreibbaren Fahrzeugs

Номер: DE102017006488A1
Принадлежит:

Die Erfindung betrifft ein Verfahren zum Laden eines elektrischen Energiespeichers (1.1) eines elektrisch betreibbaren Fahrzeugs (1), wobei – das Fahrzeug (1) mit einer externen Stromversorgungseinheit (2) mittels eines Koppelelements (1.2) gekoppelt wird und – ein Autorisierungsvorgang zur Freischaltung eines für das Fahrzeug (1) bevorstehenden Ladevorgangs durchgeführt wird. Erfindungsgemäß ist vorgesehen, dass bei dem Autorisierungsvorgang – eine Stromversorgungseinheit-Identifikationskennung automatisch von der externen Stromversorgungseinheit (2) über das Koppelelement (1.2) an eine fahrzeugeigene Steuereinheit (1.3) übertragen wird, – die Stromversorgungseinheit-Identifikationskennung an eine externe Datenverarbeitungseinheit (3) übermittelt wird, – die Stromversorgungseinheit-Identifikationskennung sowie eine dem Fahrzeug (1) und/oder einem Nutzer des Fahrzeugs (1) zugeordnete Nutzerkennung von der externen Datenverarbeitungseinheit (3) an einen mobilen Diensteanbieter (4) übermittelt ...

Подробнее
04-03-2021 дата публикации

RANDVORRICHTUNGSDEAKTIVIERUNG

Номер: DE112019002156T5

Beispiele betreffen eine Randvorrichtungsdeaktivierung. In einigen Beispielen umfasst die Randvorrichtungsdeaktivierung eine Randvorrichtung, umfassend eine Verarbeitungsressource in Kommunikation mit einer Speicherressource, welche Befehle umfasst, die ausführbar sind, um eine Anzeige eines Deaktivierungsauslösers zu empfangen, der zu der Randvorrichtung gehört, und in Reaktion auf die Anzeige eine gedruckte Schaltungsbaugruppe (PCA) der Randvorrichtung umzuprogrammieren, um Mechanismen der PCA betriebsunfähig zu machen.

Подробнее
06-08-2003 дата публикации

A method of enabling a multitasking wireless information device to conserve battery power

Номер: GB0000315492D0
Автор:
Принадлежит:

Подробнее
14-06-2012 дата публикации

Random-id function for smartcards

Номер: US20120146773A1
Принадлежит: NXP BV

A method for low-level security based on the UID. In particular it enhances an RFID system by adding the ability to dynamically modify the UID of the smartcard or to randomly generate a new UID for the smartcard.

Подробнее
27-09-2012 дата публикации

Device and method for disconnecting download channel of hand-held terminal

Номер: US20120244906A1
Автор: Chunyu Li
Принадлежит: ZTE Corp

The disclosure provides a device and method for disconnecting a download channel of a hand-held terminal. The device comprises: a connection/disconnection unit ( 308 ), which comprises a fuse module ( 308 - 2 ) and a fusing module ( 308 - 4 ), arranged between a download connection point ( 302 ) and a microprocessor ( 306 ); when no downloading is needed by the hand-held terminal, the fusing module ( 308 - 4 ) is provided with a level signal through the download connection point, and switch characteristics of a triode or an MOSFET in the fusing module ( 308 - 4 ) are utilized, to control the connection/disconnection of the download channel between the download connection point ( 302 ) and the microprocessor ( 306 ), thus avoiding generation of new download channel.

Подробнее
20-12-2012 дата публикации

Wireless cloud-based computing for rural and developing areas

Номер: US20120324245A1
Принадлежит: Microsoft Corp

A framework that enables a local computing cloud infrastructure for rural (and third world) populations with the ability to connect into the global cloud. The framework include is a low cost architecture of long distance, wireless based, renewable energy powered, and small datacenter (DC) (referred to as a pico-DC) nodes that can fully operate off-grid, both power-wise and Internet connection-wise at a very low cost. Additionally, the framework includes power management and storage techniques that effectively enable low power and efficient power use. Thus, systems are self-sufficient, low maintenance and weather proof with no need for power or data connections.

Подробнее
24-01-2013 дата публикации

Anti-theft Device and Method and Related Computer System

Номер: US20130021748A1
Автор: Chin-Lung Fan
Принадлежит: Wistron Corp

The present invention discloses an anti-theft device for a computer system includes a lock; a slot formed on a housing of the computer system for fixing the lock; and a switching module for cutting off power supply for a plurality of external interfaces of the computer system when the lock is fixed to the slot.

Подробнее
09-05-2013 дата публикации

System and Method for Bidirectional Trust Between Downloaded Applications and Mobile Devices Including a Secure Charger and Malware Scanner

Номер: US20130117854A1
Принадлежит: Andrew M. Wesie, Brian S. Pak, Douglas Britton

A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.

Подробнее
17-10-2013 дата публикации

Always-available embedded theft reaction subsystem

Номер: US20130275770A1
Автор: Michael Berger
Принадлежит: Intel Corp

A platform including an always-available theft protection system is described. In one embodiment, the platform comprises a storage including full disk encryption, a risk behavior logic to detect a potential problem when the platform is armed, and a core logic component to provide logic to analyze the potential problem and to trigger a security action logic to perform the security action, when the potential problem indicates a theft suspicion. The system, in one embodiment, further includes the security action logic, to send an alert to another device regarding the theft suspicion, and to trigger the storage to encrypt data, and an encryption logic to encrypt the data when the platform is in an OFF or low power state.

Подробнее
24-10-2013 дата публикации

Methods, systems and apparatus for determining whether an accessory includes particular circuitry

Номер: US20130278205A1
Принадлежит: Apple Inc

Methods, systems, and apparatus for determining whether an accessory includes particular circuitry. A host device may measure a first voltage and a second voltage received from an accessory, where the voltages are provide through the accessory from a power source. Before measuring the second voltage, the host device may send an instruction to the accessory instructing the accessory to alter an impedance of the power path between the power source and the host device, and the host device may draw at least a threshold amount of current from the power source via the accessory. The host device may then determine whether the accessory includes particular circuitry based on the relationship between the first voltage and the second voltage.

Подробнее
21-11-2013 дата публикации

METHOD AND APPARATUS FOR SECURE TRUSTED TIME TECHNIQUES

Номер: US20130312125A1
Принадлежит: INTERDIGITAL TECHNOLOGY CORPORATION

A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be graded by the frequency and accuracy with which a reliable external time source is available for correction and/or reset, and how trustworthy this external source is in a commercial scenario. The techniques also take into account that the number of different paths and number of hops between the device and the trusted external time source may vary. A local clock related value which is protected by a TPM securely bound to an external clock. A system of Accuracy Statements (AS) is added to introduce time references to the audit data provided by other maybe cheaper sources than the time source providing the initial time. 1. A method for securing a time component in a wireless transmit/receive unit (WTRU) comprising:providing, by a tamper detection and failure unit, power to a real time clock;responsive to a detection of tampering by the tamper detection and failure unit, the tamper detection and failure unit stopping the providing of power to the real time clock;wherein the tamper detection and failure unit and the real time clock are configured within a secure time component of a wireless transmit/receive unit (WTRU) subscriber identity module (SIM) integrated circuit card (ICC), wherein a time report and synchronization controller is further configured on the secure time component, and wherein a SIM component is configured on the WTRU SIM ICC.2. The method of claim 1 , wherein the real time clock comprises a quartz crystal oscillator.3. The method of claim 2 , further comprising disabling the WTRU SIM ICC in response to removal of the quartz crystal oscillator.4. The method of claim 1 , wherein a trusted platform module communicatively connected to the SIM component and the real time clock is configured on the WTRU SIM ICC.5. The method of claim 4 , further comprising the tamper detection and failure unit providing ...

Подробнее
02-01-2014 дата публикации

Mobile information terminal and gripping-feature authentication method

Номер: US20140007227A1
Принадлежит: NTT DOCOMO INC

A mobile information terminal including a gripping-feature sample acquisition unit to acquire a gripping-feature sample, one or more environmental sensors outputting an environmental signal, a terminal status detector to acquire the environmental signal and detect a terminal status, a template selection unit to select a user authentication template fitting the detected terminal status, a user authentication unit collating the acquired gripping-feature sample with the selected user authentication template and outputting a user authentication result, a user authenticity level monitor that outputs a sensor power source OFF signal when the user authenticity level exceeds a threshold value and outputs a sensor power source ON signal when the user authenticity level falls below the threshold value, and a power source control unit halting energization to a sensor when acquiring the sensor power source OFF signal, and energizing a sensor when acquiring the sensor power source ON signal.

Подробнее
09-01-2014 дата публикации

ALWAYS-AVAILABLE EMBEDDED THEFT REACTION SUBSYSTEM

Номер: US20140013455A1
Принадлежит:

A system comprising a platform protected by an always-on always-available security system is described. The system, in one embodiment, includes a core logic component to provide logic to move the platform to an armed mode upon receipt of an arming command, a battery access controller to prevent access to a battery of the platform, when the platform is in the armed mode, a disarming logic to receive a disarming command from a user, the disarming command causing the battery access controller to provide the access to the battery, such that when the platform is disarmed the battery can be accessed, whereby the system prevents removal of the battery when the platform is in the armed mode to ensure that the platform remains powered to perform a security action when needed. 1. A system comprising a platform protected by an always-on always-available security system , including:a risk behavior logic to detect a potential problem;a core logic component to provide logic to analyze the potential problem and to move the platform to a suspecting mode when the potential problem indicates a theft suspicion;the security action logic, to send periodic alerts to a security server when the platform is in the suspecting mode, the alert including movement related data, such that the security server can take an action to protect the platform.2. The system of claim 1 , wherein the movement related data comprises received signal strength indicators (RSSI) for a plurality of wireless access points and associated wireless access point identifiers (BSSIDs) claim 1 , the security server using the movement related data to determine a movement of the platform.3. The system of claim 1 , wherein the movement related data comprises information collected from an on-board accelerometer claim 1 , the security server using the movement related data to determine a movement of the platform.4. The system of claim 1 , further comprising:a disarming logic to send a notification to the security server when ...

Подробнее
05-01-2017 дата публикации

DETECTION OF THE AUTHENTICITY OF AN ELECTRONIC CIRCUIT OR OF A PRODUCT CONTAINING SUCH A CIRCUIT

Номер: US20170004333A1
Принадлежит:

A method of authenticating a slave device. The method includes initializing, by a host device, a charge retention circuit of the slave device, and receiving, by the host device, an indication of a discharge time of the charge retention circuit. The host device authenticates the slave device based on the received indication of the discharge time of the charge retention device. 1. A method , comprising:initializing, by a host device, a charge retention circuit of a slave device;receiving, by the host device, an indication of a discharge time of the charge retention circuit;determining, by the host device, an authenticity of the slave device based on the received indication of the discharge time of the charge retention device; andcontrolling, by the host device, interactions with the slave device based on the determined authenticity of the slave device.2. The method of wherein the host device compares information representative of time claim 1 , generated by the charge retention circuit claim 1 , with information indicative of an expected duration.3. The method of wherein initializing the charge retention circuit comprises switching off a power supply of the slave device.4. The method of wherein a duration of time in which the power supply of the slave device is switched off is random.5. The method of claim 1 , comprising:transmitting, by the host device to the slave device, a voltage representative of a charge level to be stored in the charge retention circuit;charging, by the slave device, of the charge retention circuit;switching off, by the host device, of a power supply of the slave device for a duration of time;measuring, by the slave device, a residual quantity of charge in the charge retention circuit at an expiration of the duration of time;transmitting, by the slave device to the host device, information representative of the residual quantity; andcomparing, by the host device, said information with an expected value of said information.6. The method of claim ...

Подробнее
13-01-2022 дата публикации

Glitch Attack Mitigation for In-Vehicle Networks

Номер: US20220012371A1
Принадлежит: Intel Corporation

Systems, apparatuses, and methods to mitigate effects of glitch attacks on a broadcast communication bus are provided. The voltage levels of the communication bus are repeatedly sampled to identify glitch attacks. The voltage level on the communication bus can be overdriven or overwritten to either corrupt received messages or correct received messages. 1. A method , comprising:sampling, by circuitry of an attack prevention electronic control unit (ECU), a voltage waveform on a communication bus, the communication bus coupled to a plurality of ECUs;identifying a glitch in the voltage waveform; andmodifying the voltage level on the communication bus based on the glitch.2. The method of claim 1 , modifying the voltage level on the communication bus based on the glitch comprising:identifying a recessive voltage level on the communication bus; andoverdriving the voltage level on the communication bus to change the recessive voltage level to a dominant voltage level.3. The method of claim 1 , sampling the voltage waveform on the communication bus comprising:iteratively sampling the voltage level on the communication bus over a period of time to generate a plurality of voltage level samples; andgenerating the voltage waveform from the plurality of voltage level samples.4. The method of claim 3 , identifying a glitch in the voltage waveform comprising determining whether the voltage level during a portion of the period of time unexpectedly changes.5. The method of claim 4 , wherein the voltage level during the portion of the period of time unexpectedly changes from a dominant voltage level to a recessive voltage level and wherein modifying the voltage level on the communication bus based on the glitch comprising overdriving the voltage level on the communication bus to maintain the dominant voltage level.6. The method of claim 4 , wherein the voltage level during the portion of the period of time unexpectedly changes from a recessive voltage level to a dominant voltage ...

Подробнее
01-01-2015 дата публикации

SYSTEM AND METHOD FOR SECURE CONTROL OVER PERFORMANCE STATE

Номер: US20150007356A1
Принадлежит:

The present disclosure relates to a method and system for securing a performance state change of one or more processors. A disclosed method includes intercepting a request for a change of a performance state of the processor and determining whether to execute the request based on a security condition of the processor. The performance state of the processor includes at least one of an operating voltage and an operating frequency. A disclosed system includes an operating system module operative to transmit a request for a performance state change of at least one processing core. The system includes performance state control logic in communication with the operating system module and operative to receive the request and to change the performance state of the at least one processing core based on the request. The computing system further includes performance state security logic operative to intercept the request transmitted from the operating system module to the performance state control logic and to selectively transmit the request to the performance state control logic based on a security condition of the computing system. 1. A method of securing a performance state change of a processor , the method comprising:intercepting, by performance state security logic, a request for a change of a performance state of the processor, the performance state including at least one of an operating voltage and an operating frequency; anddetermining, by the performance state security logic, whether to execute the request based on a security condition of the processor.2. The method of claim 1 , wherein the intercepting comprises blocking a transmission of the request for the change of the performance state over a first communication path and routing the request for the change of the performance state over a second communication path different from the first communication path.3. The method of claim 2 , wherein the first communication path and the second communication path are routed ...

Подробнее
20-01-2022 дата публикации

Tamper-proof data processing device

Номер: US20220021531A1
Принадлежит: MUSE Electronics GmbH

A data processing device having a housing in which are arranged a processor, a program memory connected to the processor and at least one hardware component connected to the processor via a data line and supplied with power via a power supply line, comprises a microcontroller arranged in the housing and having an interface and a persistent key memory in which the public key of a first public/private key pair is stored, wherein a switch controlled by the microcontroller is interposed in the data line, and wherein the microcontroller is configured to receive a signature, generated using the private key of the first key pair, of a memory module detachably connected to the interface via the interface, to verify the signature using the public key of the first key pair, and to switch on the switch in the case of verification.

Подробнее
15-01-2015 дата публикации

Controller

Номер: US20150015408A1
Принадлежит: Hewlett Packard Development Co LP

A first controller can provide system state information and a second controller can receive the system state information. The second controller can be programmed to control the state of a component. The state of the component can be based on information programmed in the second controller and the system state information. The component can include an off state and an operating state indicated by a signal from the second controller.

Подробнее
14-01-2021 дата публикации

Online static security assessment under the qss model

Номер: US20210014261A1
Принадлежит: Bigwood Tech Inc

An online static security assessment (SSA) method based on a quasi steady-state (QSS) model is applied to a power system. An input to the method includes a post-contingency state of the power system for each of a set of contingencies. The following operations are performed for each contingency. Using the QSS model of the post contingency state of the power system, a steady-state voltage magnitude is calculated for each bus in the power system by solving a system of equations. The system of equations is formulated according to a time-domain stability model of the power system and includes nonlinear differential algebraic equations (DAE) with continuous and discreet variables. The derivative terms of short-term state variables in the DAE are set to zero. The method compares the calculated voltage magnitude with a limit, classifies each contingency as secure, critical or insecure, and determines a control action in response to the classification.

Подробнее
24-01-2019 дата публикации

Secure circuit control to disable circuitry

Номер: US20190026501A1
Принадлежит: Apple Inc

Techniques are disclosed in which a secure circuit controls a gating circuit to enable or disable other circuitry of a device (e.g., one or more input sensors). For example, the gating circuit may be a power gating circuit and the secure circuit may be configured to disable power to an input sensor in certain situations. As another example, the gating circuit may be a clock gating circuit and the secure circuit may be configured to disable the clock to an input sensor. As yet another example, the gating circuit may be configured to gate a control bus and the secure circuit may be configured to disable control signals to an input sensor. In some embodiments, hardware resources included in or controlled by the secure circuit are not accessible by other elements of the device, other than by sending requests to a predetermined set of memory locations (e.g., a secure mailbox).

Подробнее
28-01-2021 дата публикации

Electronic device and method for protecting personal information using secure switch

Номер: US20210026983A1
Автор: Sunghyuk Lee
Принадлежит: SAMSUNG ELECTRONICS CO LTD

An electronic device according to an embodiment includes: a memory configured to store encryption information, a processor, and a switch configured to electrically disconnect the processor from the memory in a first state and to electrically connect the processor and the memory in a second state. The processor is configured to receive a user input for switching the switch from the first state to the second state, provide the encryption information stored in the memory to a secure application executing only in a second execution environment through a secure operating system of the second execution environment, when the switch is switched from the first state to the second state to generate an electrical path between the memory and the processor, acquire signature information for a transaction based on the encryption information, and provide the signature information acquired based on the encryption information to a signature request application.

Подробнее
31-01-2019 дата публикации

Electronic apparatus and control method

Номер: US20190033937A1
Автор: Hajime Inoue
Принадлежит: Canon Inc

An electronic apparatus comprises a first battery authentication unit that performs a battery authentication process for authenticating a battery pack connected to the electronic apparatus, a second battery authentication unit that performs the battery authentication process, a first control unit that performs an activation process and controls the first battery authentication unit to perform the battery authentication process after the activation process ends, and a second control unit that controls the second battery authentication unit to perform the battery authentication process while the first control unit is performing the activation process.

Подробнее
05-02-2015 дата публикации

COMPLIMENTARY BIT SLICING SIDE CHANNEL ATTACK DEFENSE

Номер: US20150039911A1
Автор: Card Robert A.
Принадлежит:

This document discusses, among other things, systems and methods to communicate data over a data bus during a first period of a clock signal with a uniform power distribution, including providing a complimentary bit state of the data during a first portion of the first period of the clock signal and providing an actual bit state of the data during a second portion of the first period of the clock signal. In an example, the first period can include first, second, third, and fourth portions, and the systems and methods can include providing a complimentary bit state of the data during first and fourth portions of the first period of the clock signal and an actual bit state of the data during a second portion of the first period of the clock signal. 1. A complimentary bit slicing uniform power distribution communication system , comprising:a cryptographic engine configured to communicate data over a data bus during a first period of a clock signal with a uniform power distribution;wherein the cryptographic engine is configured to provide a complimentary bit state of the data during a first portion of the first period of the clock signal and to provide an actual bit state of the data during a second portion of the first period of the clock signal.2. The system of claim 1 , including:a non-volatile memory (NVM) configured to store data,wherein the cryptographic engine is configured to communicate the data stored in the NVM over the data bus during the first period of the clock signal.3. The system of claim 1 , wherein the first and second portions of the first period of the clock signal are successive portions.4. The system of claim 1 , wherein the first and second portions of the first period of the clock signal have different lengths.5. The system of claim 1 , wherein the cryptographic engine is configured to provide the complimentary bit state of the data during a first portion of the first period of the clock signal on a first data line of the data bus and the actual ...

Подробнее
05-02-2015 дата публикации

Directed wakeup into a secured system environment

Номер: US20150039919A1
Принадлежит: Thiam Ern Lim, Wan Chin Teh

Embodiments of processors, methods, and systems for directed wakeup into a secured system environment are disclosed. In one embodiment, a processor includes a decode unit, a control unit, and a messaging unit. The decode unit is to receive a secured system environment wakeup instruction. The control unit is to cause wake-inhibit indicator to be set for each of a plurality of responding logical processor to be kept in a sleep state. The messaging unit is to send a wakeup message to the plurality of responding logical processors, wherein the wakeup message is to be ignored by each of the plurality of responding logical processors for which the wake-inhibit indicator is set.

Подробнее
24-02-2022 дата публикации

SYSTEM AND METHOD FOR SECURE ELECTRIC POWER DELIVERY

Номер: US20220058296A1
Принадлежит:

A system or method provides electric power to an authorized user and denies electric power to an unauthorized user. An administrator requests access for a user, and a central controller generates a key/receptacle tuple for the access. The key/receptacle tuple is communicated to a site power controller, which broadcasts the key/receptacle information to secure receptacles in a facility. The key is also communicated to the user. The user plugs in a device into a secure receptacle and provides the key via a secure adapter. If the key is valid, the device is supplied with electric power; otherwise, electric power is denied. The central controller logs and analyzes activities of the secure receptacles and reports to the administrator. 1. A method for secure electric power delivery comprising:an administrator approving a user for access to electrical power at a site including one or more secure receptacles;providing a generated key to the user;connecting a user device, a secure adapter, and a selected one of the secure receptacles;the user providing an entered key through the secure adapter to the selected secure receptacle; andproviding power from the selected secure receptacle to the user device in response to determining that the entered key is valid.2. The method of claim 1 , further comprising disabling power from the selected secure receptacle to the user device in response to determining the entered key does is not valid.3. The method of claim 1 , further comprising:detecting connection of the user device to the selected secure receptacle; anddisabling power from the selected secure receptacle if the user fails to provide an entered key that is valid before a timeout period ends.4. The method of claim 1 , further comprising limiting validity of the generated key to secure receptacles determined by the administrator.5. The method of claim 1 , further comprising limiting validity of the generated key to an access duration determined by the administrator.6. The method ...

Подробнее
12-02-2015 дата публикации

Dynamic Duty-Cycling of Processor of Mobile Device Based on Operating Condition of Mobile Device

Номер: US20150046554A1
Принадлежит: Facebook Inc

In one embodiment, a method includes recording a first location of a mobile device; determining, by a geographic-positioning component of the mobile device, on a periodic basis, a trajectory of the mobile device, wherein the trajectory is calculated based on present and past user locations; determining, by the geographic-positioning component, whether the trajectory is outside a geographic region defined at least in part by the first location; and if the trajectory is outside the geographic region, then transmitting, by the processors of the geographic-positioning component, a message to one or more other processors of the mobile device, the message causing one or more of the other processors to transition from a sleep state to an active state.

Подробнее
16-02-2017 дата публикации

Method of Protecting Power Receiver and Related Wireless Charging Device

Номер: US20170046541A1
Автор: CHU Feng-Seng
Принадлежит:

A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization. 1. A method for a power receiver for protecting the power receiver from being taken without permission while charged wirelessly , the method comprising:receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver;detecting whether the wireless charging is interrupted without receiving a security code for authorization; andstarting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization.2. The method of claim 1 , wherein the protection function comprises at least one of releasing a warning signal to notify an owner of a power receiver theft claim 1 , launching a function for reporting a location of the power receiver claim 1 , and sending a message to a specific person or a place for help.3. The method of claim 1 , further comprising:sending an unauthorized interruption notification signal to the power transmitter after detecting that the wireless charging is interrupted without receiving the security code for authorization.4. The method of claim 3 , wherein the power transmitter releases a warning signal to notify an owner of a power receiver theft or sends a message to a specific person or a place for help after receiving the unauthorized interruption notification signal.5. A power receiver claim 3 , comprising:a processing means, for executing a program; anda storage unit, coupled to the ...

Подробнее
15-02-2018 дата публикации

SYSTEM AND METHOD FOR SECURE AUTHENTICATION OF A "SMART" BATTERY BY A HOST

Номер: US20180046830A1
Принадлежит:

Systems and methods for providing a battery module with secure identity information and authentication of the identity of the battery by a host In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment located within the battery module and (2) a key generator configured to generate a key based on an identity of the battery module and cause the key to be stored within the tamper resistant processing environment 1(a) a host device including a data bus, a power bus, a host processor coupled to the data bus, and a table of root keys; and i. an interface coupled to the power bus and the data bus, and having a public bus;', 'ii. a public non-volatile memory connected with the public bus and containing a root key index and an encrypted identity key;', 'iii. a public RAM connected with the public bus;', 'iv. a private bus separate from the public bus;', 'v. processor circuitry separately connected with the public bus and the private bus;', 'vi. a private non-volatile memory connected only with the private bus and containing an un-encrypted identity key; and', 'vii. a private RAM connected only with the private bus., '(b) a battery including. A system comprising: This application is a divisional of prior application Ser. No. 15/015,761, filed Feb. 4, 2016, currently pending;Which was a divisional of prior application Ser. No. 14/079,850, filed Nov. 14, 2013, now U.S. Pat. No. 9,286,492, issued Mar. 15, 2016;Which was a divisional of prior application Ser. No. 13/546,529, filed Jul. 11, 2012, now U.S. Pat. No. 8,612,760, granted Dec. 17, 2013;Which was a divisional of prior application Ser. No. 13/240,202, filed Sep. 22, 2011, now U.S. Pat. No. 8,245,041, granted Aug. 14, 2012;Which was a divisional of prior application Ser. No. 12/564,590, filed Sep. 22, 2009, now U.S. Pat. No. 8,051,285, granted Nov. 1, 2011;Which was a divisional of prior application Ser. No. 11/074,611, filed Mar. ...

Подробнее
25-02-2016 дата публикации

SUPPORTING PORT SECURITY ON POWER-OVER-ETHERNET ENABLED PORTS

Номер: US20160055354A1
Принадлежит: DELL PRODUCTS L.P.

Embodiments of the present invention include systems and methods for controlling power delivery to a port in a power sourcing equipment. The power sourcing equipment receives identity information from a device connected to the port and determines whether the device is a trusted device or a rogue device according to a security policy. If the device is a trusted device, the power sourcing equipment supplies data and electrical power to the port according to a priority policy. If the device is a rogue device, the power source equipment does not supply electrical power to the port. 1. A computer-implemented method for controlling power delivery to a port in a power sourcing equipment , the method comprising:receiving one or more indicators containing an identity from a device connected to the port via a cable for receiving data and electrical power;determining whether the device is a rogue device or a trusted device by comparing at least one of the one or more indicators to a security policy;responsive to a determination that the device is a rogue device, not supplying electrical power to the port to power the device via the cable; andresponsive to a determination that the device is a trusted device, assigning a priority to the device for delivering power to the device based upon least one of the one or more indicators and a priority policy.2. A computer-implemented method as recited in claim 1 , wherein the security policy includes one or more identities of trusted devices.3. A computer-implemented method as recited in claim 1 , further comprising:responsive to a determination that the device is a trusted device, delivering electrical power to the port according to a priority assigned to the device.4. A computer-implemented method as recited in claim 3 , wherein the security policy is applied on per-port level.5. A computer-implemented method as recited in claim 3 , wherein the security policy is applied on per-system level.6. A computer-implemented method as recited ...

Подробнее
22-02-2018 дата публикации

FINGER PRINT STATE INTEGRATION WITH NON-APPLICATION PROCESSOR FUNCTIONS FOR POWER SAVINGS IN AN ELECTRONIC DEVICE

Номер: US20180053034A1
Принадлежит:

A system includes a fingerprint sensor, an application processor, and an auxiliary processor. The application processor is operable to arm the fingerprint sensor prior to the application processor entering a low power or sleep mode. The auxiliary processor is to receive a state output from the fingerprint sensor. The state output is to cause activation of one or more functions of the auxiliary processor upon fingerprint authentication while leaving the application processor in the low power or sleep mode. 120-. (canceled)21. A system , comprising:a fingerprint sensor;an application processor connected to the fingerprint sensor via a connection and configured to arm the fingerprint sensor prior to the application processor entering a low power or sleep mode, and to perform an action on an authentication process after exiting the low power or sleep mode, the connection configured to convey a status of at least one of a serial peripheral interface transfer mode, a device ready mode, or a sleep mode;an auxiliary processor connected to the fingerprint sensor and configured to receive a state output from the fingerprint sensor, one or more functions of the auxiliary processor configured to be activated, in response to the state output, related to fingerprint authentication while the application processor remains in the low power or sleep mode, the state output comprising a first state indicating the authentication process of a fingerprint is in progress, a second state indicating successful authentication of the fingerprint, and a third state indicating that the fingerprint sensor is waiting to begin the authentication process, the fingerprint sensor configured to initiate a timer in response to the state output transitioning to the second state, the state output configured to transition from the second state to the third state in response to a passing of a duration of time measured by the timer; andan interrupt control configured to cause the application processor to ...

Подробнее
15-05-2014 дата публикации

OPERATING CONTROL SYSTEM FOR ELECTRONIC EQUIPMENT

Номер: US20140132392A1
Автор: Kady Darren
Принадлежит: Direct Source International, LLC

The operating control system can be use on electronic equipment, such as cell phones, computers, engine analyzers, etc. An input device, programming a single or multiple devices, enables the input of user access data by a primary user for multiple modes. Through use of a black list, blocked numbers can be stored or immediately deleted with notification going to the user as well as the owner of the blocked number. A temporary shut down feature enables the device to be shut down for a programmed period of time and reactivated at the end of that time. 1. An operating control system for electronic equipment , said control system being internal to said electronic equipment and having:a. an activation/deactivation member;b. at least three user programmable modes, said at least three user programmable modes being from the group including normal operation and at least one member from the group of temporary shut down, number override, delayed start, at least one extension mode, selective number blocking, restricted sending and receiving, intermittent use, partial shut down, and deactivation;c. at least one user access code, at least one of said at least one user access code being capable of programming parameters and accessing for each said at least three user programmable modes;d. an activate programming mode, said activate programming mode accessible with at least one of said at lease one user access code for programming said parameters for said at least three programmable modes;g. input means, said input means to receive said user access codes, said programmable mode selection;h. an internal microprocessor, said internal microprocessor for receiving input from said input means and executing said program parameters;i. a use mode, said use mode being activated by entry of said at least one user access code to enables use of said multiple user programmable modes based upon said parameters;wherein said microprocessor controls operation of said electronic equipment based upon ...

Подробнее
10-03-2022 дата публикации

Controlling power of electronic devices on a vehicle

Номер: US20220075338A1
Принадлежит: MOTIONAL AD LLC

Among other things, techniques are described for controlling power of electronic devices of a vehicle. For example, a vehicle includes a power source, a power distribution unit configured to control power to at least one electronic device from the power source, a first processor configured for communicating power commands to the power distribution unit. The power distribution unit comprises a second processor configured to execute computer executable instructions stored in computer-readable medium for carrying out operations including adjusting a power distribution from the vehicle power source to the at least one electronic device based on a power command received from the first processor.

Подробнее
05-03-2015 дата публикации

Restricting the operation of an electronic device

Номер: US20150063338A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method is provided including: detecting an activation of an electronic device; detecting a current location of the electronic device; detecting whether the activation is prohibited at the current location of the electronic device; and shutting down the electronic device when the activation is prohibited.

Подробнее
17-03-2022 дата публикации

SECURE FAILSAFE APPARATUS

Номер: US20220083698A1
Автор: WONG Ivy, Xue Ella
Принадлежит:

According to some embodiments, an electronic device can implement a failsafe action. The system comprises a processor and a computer-readable medium comprising processor executable instructions, that when executed by the processor, performs a method, the method comprises receiving a first antidote message within a first time interval. Based on receiving the first antidote message, continuing normal operation of the electronic device is continued. The electronic device waits for reception of a second antidote message within a second time interval. A determination is made that the second antidote message was not received within the second time interval. In response to determining that the second antidote message was not received, implementing a first failsafe action. 1. An electronic device , comprising:a processor; anda non-transitory computer-readable medium comprising processor executable instructions, that when executed by the processor, performs a method, the method comprising:receiving a first antidote message within a first time interval;continuing normal operation of the electronic device based on receiving the first antidote message;waiting for reception of a second antidote message within a second time interval;determining that the second antidote message was not received within the second time interval; andimplementing a first failsafe action in response to determining that the second antidote message was not received.2. The electronic device of claim 1 , wherein the first failsafe comprises at least one of pausing a current operation of the electronic device for a pre-determined amount of time claim 1 , stopping the current operation of the electronic device claim 1 , resetting the electronic device to a preset or factory state claim 1 , clearing partial or all data stored in the electronic device claim 1 , disabling specific functionalities or features or the electronic device claim 1 , initiating a self-destruct sequence claim 1 , reducing current and/or ...

Подробнее
28-02-2019 дата публикации

DEVICE AND METHOD FOR POWER SOURCE BASED DEVICE AUTHENTICATION

Номер: US20190065789A1
Принадлежит:

A device and method for power source based device authentication is provided. The device comprises: a power interface configured to receive power from an external power source; a detector configured to detect a characteristic of the power received by the power interface; and a controller. When the characteristic of the power matches an authorized characteristic, the controller implements an authorization process to provide access to the device. When the characteristic of the power does not match the authorized characteristic, the controller implements a deny-authorization process to deny access to the device. 1. A device comprising:a power interface configured to receive power from an external power source;a detector coupled to the power interface, the detector configured to detect a characteristic of the power received by the power interface; and when the characteristic of the power matches an authorized characteristic, implement an authorization process to provide access to the device; and', 'when the characteristic of the power does not match the authorized characteristic, implement a deny-authorization process to deny access to the device., 'a controller coupled to the detector, the controller configured to2. The device of claim 1 , further comprising a memory coupled to the controller claim 1 , the memory configured to store the authorized characteristic.3. The device of claim 1 , the controller further configured to determine the authorized characteristic by:receiving, using an input device, authorization data to provide access to the device;when the authorization data is received, detecting, using the detector, a present characteristic of present power received at the power interface; andstoring, in a memory, the present characteristic as the authorized characteristic.4. The device of claim 1 , wherein the detector comprises one or more of: a signal detector claim 1 , a current detector claim 1 , a voltage detector claim 1 , a power detector claim 1 , and a ...

Подробнее
10-03-2016 дата публикации

ELECTRONIC APPARATUS

Номер: US20160070936A1
Автор: KAECHI Shuya
Принадлежит:

An electronic apparatus includes an authentication unit that executes an authentication process for authenticating a battery connected to the electronic apparatus, a holding unit that holds a value representing a result of the authentication process, wherein the value held by the holding unit is deleted in a case where the battery is removed from the electronic apparatus, or in a case where a voltage of the battery is equal to or less than a predetermined value, and a control unit that performs control to determine whether to cause the authentication unit to execute the authentication process according to the value held by the holding unit. 1. An electronic apparatus comprising:an authentication unit that executes an authentication process for authenticating a battery connected to the electronic apparatus;a holding unit that holds a value representing a result of the authentication process, wherein the value held by the holding unit is deleted in a case where the battery is removed from the electronic apparatus, or in a case where a voltage of the battery is equal to or less than a predetermined value; anda control unit that performs control to determine whether to cause the authentication unit to execute the authentication process according to the value held by the holding unit.2. The electronic apparatus according to claim 1 , wherein claim 1 , in a case where the authentication process results in failure claim 1 , the holding unit holds a value different from an initial value.3. The electronic apparatus according to claim 1 , wherein claim 1 , in a case where the value held by the holding unit is a value different from an initial value claim 1 , the control unit determines that the authentication process results in failure.4. The electronic apparatus according to claim 3 , further comprising a display unit claim 3 ,wherein, in a case where it is determined that the authentication process results in failure, the control unit prevents information about ...

Подробнее
12-03-2015 дата публикации

ELECTRONIC DEVICE AND PROTECTION METHOD THEREOF

Номер: US20150074834A1
Автор: WANG HSIEN-YU
Принадлежит: GETAC TECHNOLOGY CORPORATION

The present invention is an electronic device and has a positioning module, a micro processing unit and an electronic device with a first storing device. The micro processing unit electrically connects with the positioning module and the first storing device. The electronic detects a position thereof via the positioning module and generates a positioning coordinate datum. The micro processing unit determines whether the electronic device is in a preset working area through the positioning coordinate datum. When the electronic device is not in the preset working area, the micro processing unit stops the electronic device from accessing the first storing device. 1. A protection method for an electronic device , the electronic device having a first storing device corresponding to a preset working area , comprising the steps of:a) detecting a position of the electronic device, and acquiring a positioning coordinate datum according to a detection result;b) determining whether the electronic device is in the preset working area according to the positioning coordinate datum; andc) stopping the electronic device from accessing the first storing device when the electronic device is not in the preset working area.2. The protection method for the electronic device according to claim 1 , wherein the electronic device further comprises a second storing device and the protection method further comprises the step of:d) allowing the electronic device to access the second storing device when the electronic device is not in the preset working area.3. The protection method for the electronic device according to claim 2 , wherein in the step (d) claim 2 , the electronic device executes a boot process through the second storing device claim 2 , the protection method further comprising the steps of:e) executing a basic input/output system (BIOS) in the electronic device; andf) executing an operating system of the second storing device.4. The protection method for the electronic device ...

Подробнее
09-03-2017 дата публикации

Dynamic duty-cycling of processor of mobile device based on operating condition of mobile device

Номер: US20170070463A1
Принадлежит: Facebook Inc

In one embodiment, a geographic-positioning component records a first location of a mobile device. The geographic-positioning component determines on a periodic basis a current location of the mobile device. The geographic-positioning component determines whether the current location is outside a geographic region defined at least in part by the first location and a radius, the radius being adjusted from a pre-determined value based on a detected velocity of the mobile device; time of day information; a battery level of the mobile device; or an error of the first location measurement or the current location measurement. If the current location is outside the geographic region, the geographic-positioning component causes a client application of the mobile device to send the current location to a remote server.

Подробнее
09-03-2017 дата публикации

Method of saving power of station in wireless network

Номер: US20170070953A1
Автор: Beomjin Kim, David Cohen
Принадлежит: FCI Inc Korea

A method of saving power of a station in wireless network is provided. The station comprises a connectivity module, a central processing unit, and peripheral devices. The method includes: upon receiving a wake-up signal, powering on the connectivity module, the central processing unit, and the peripheral devices; performing the central processing unit and the peripheral devices in a connection state; performing the connectivity module in an authenticated state; and upon a condition that there is no data to be transferred to the station or after the station transmits and receives all needed data, performing a sleep mode to power off the connectivity module, the central processing unit, and the peripheral devices.

Подробнее
07-03-2019 дата публикации

Secure starting of an electronic circuit

Номер: US20190073480A1
Принадлежит: Proton World International NV

A method of checking the authenticity of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element includes starting the microcontroller with instructions stored in a first non-reprogrammable memory area associated with the microcontroller, starting the secure element, executing, with the secure element, a signature verification on the content of a second reprogrammable non-volatile memory area associated with the microcontroller, and if the signature is verified, using the secure element to send the first key to the microcontroller.

Подробнее
07-03-2019 дата публикации

Central and Delegate Security Processors for a Computing Device

Номер: US20190073491A1
Принадлежит: Google LLC

The present disclosure describes use of two security processors for a mobile device. In some aspects, a first security processor device embodied in a security component of an apparatus receives a user input via an input device and transmits a security condition signal to a second security processor device embodied in a System on Chip (SoC) component of the apparatus, causing the SoC component to perform a security operation. In other aspects, the first security processor receives a signal via a sensor device sensing environmental conditions surrounding the apparatus and, in response, transmits a security condition signal to the second security processor, causing the SoC component to perform a security operation. The security operation is directly controlled, maintained, and implemented by the second security processor embodied in the SoC component. 1. An apparatus comprising:a user input subsystem configured to receive an input from a user; receive an input signal from the user via the user input subsystem;', 'determine a security condition based on the input signal received from the user input subsystem; and', 'transmit, in response to determining the security condition, a security condition signal; and, 'a security component, the security component having a first security processor device configured to receive, from the first security processor device, the security condition signal; and', 'cause, in response to receiving the security condition signal, the SoC component to perform a security operation., 'a System on Chip (SoC) component separate from the security component, the SoC component having a second security processor device configured to2. The apparatus as recited by claim 1 , further comprising an external secure control and communication bus claim 1 , the external secure control and communication bus configured to transmit the security condition signal from the first security processor device to the second security processor device.3. The apparatus as ...

Подробнее
05-03-2020 дата публикации

Anti-tamper circuitry

Номер: US20200074120A1
Принадлежит: Varex Imaging Corp

Embodiments include a device, comprising: a mounting structure configured to mount the device to an external component; first circuitry; and anti-tamper circuitry electrically connected to the first circuitry and configured to disable at least one function of the first circuitry when the device is removed from the external component and methods of operating the device.

Подробнее
05-03-2020 дата публикации

Information Processing Method, Positioning Chip, And Mobile Terminal

Номер: US20200077232A1
Принадлежит: Huawei Technologies Co Ltd

The present disclosure relates to information processing methods, positioning chips, and mobile terminals. One example method includes receiving, by a positioning chip, control information sent by a main chip, where the positioning chip and the main chip are disposed in a same mobile terminal, and the control information includes a preset location, obtaining a current location based on the control information, determining whether the current location matches the preset location, and when the current location matches the preset location, sending, by the positioning chip, a command to the main chip, where the command instructs the main chip to perform a preset operation.

Подробнее
26-03-2015 дата публикации

Semiconductor Integrated Circuit

Номер: US20150089676A1
Принадлежит: RENESAS ELECTRONICS CORPORATION

A method of a semiconductor integrated circuit comprising a logic circuit including n storage elements (n is a positive integer) which can each store 1-bit information and an attack detection circuit, the method including detecting, by an error determination circuit, through a logic operation that k-bit or less errors (k is a positive integer) have occurred in n-bit codes stored in the n storage elements, and detecting, by a light irradiation detection circuit which includes light detection elements, that light has been irradiated to (k+1) or more of the n storage elements. It is determined that the logic circuit has been attacked from outside when the error determination circuit detects an error or the light irradiation detection circuit detects light irradiation. 1. A method of a semiconductor integrated circuit comprising a logic circuit including n storage elements (n is a positive integer) which can each store 1-bit information and an attack detection circuit , the method comprising:detecting, by an error determination circuit, through a logic operation that k-bit or less errors (k is a positive integer) have occurred in n-bit codes stored in the n storage elements;detecting, by a light irradiation detection circuit which includes light detection elements, that light has been irradiated to (k+1) or more of the n storage elements; anddetermining that the logic circuit has been attacked from outside when the error determination circuit detects an error or the light irradiation detection circuit detects light irradiation.2. The method according to claim 1 , further comprising:storing, by the n storage elements including m storage elements, m-bit error detection codes; andgenerating, by the error determination circuit including an error detection code generation circuit, an error detection code from (n-m) storage elements of the n storage elements and a check circuit which can detect occurrence of an error in the n storage elements.3. The method according to claim ...

Подробнее
12-03-2020 дата публикации

Control apparatus, control method, program, and electronic device system

Номер: US20200084388A1
Принадлежит: Sony Semiconductor Solutions Corp

The present technology relates to a control apparatus, a control method, a program, and an electronic device system that enables achievement of low power consumption. The presence or absence of a preset, predetermined subject is detected from an image having a low resolution output by an image sensor in a low power consumption mode, the image sensor including, as operation modes, the low power consumption mode in which the image having the low resolution is output and a normal mode in which an image having a high resolution as compared with the image having the low resolution is output. Then, in a case where the presence of the predetermined subject is detected, the operation mode of the image sensor is set to the normal mode, and the image sensor outputs the image having the high resolution. The present technology may be applied, for example, to control of the image sensor.

Подробнее
21-03-2019 дата публикации

CONTROLLED STARTING OF AN ELECTRONIC CIRCUIT

Номер: US20190087584A1
Принадлежит:

A method of checking the authenticity of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element includes starting the microcontroller with instructions stored in a first non-reprogrammable memory area associated with the microcontroller, starting the secure element, executing, with the secure element, a signature verification on the content of a second reprogrammable non-volatile memory area associated with the microcontroller, and interrupting the microcontroller power supply if the signature is not verified. 1. A method , comprising:starting a microcontroller of an electronic device by executing instructions stored in a non-reprogrammable memory area of a non-volatile memory of the electronic device, the non-reprogrammable memory area being associated with the microcontroller;starting a boot sequence in a secure element embedded in the electronic device;verifying, with the secure element, a signature generated by the secure element from content stored in a reprogrammable memory area of the non-volatile memory, the reprogrammable memory area being associated with the microcontroller; andinterrupting a power supply of the microcontroller in response to the verifying indicating the signature is not verified.2. The method of claim 1 , comprising:responding, with the secure element, to the verifying indicating the signature is verified, by sending a message of validation of the content of the reprogrammable memory area to the microcontroller.3. The method of claim 1 , comprising:waiting, by the microcontroller, for a response from the secure element after the starting of the microcontroller; andexecuting, by the microcontroller, instructions contained in the reprogrammable memory area after receiving the response from the secure element.4. The method of claim 1 , comprising:determining that an update of the content of the reprogrammable memory area is authentic; andbased on the determination, modifying a ...

Подробнее
06-04-2017 дата публикации

METHOD AND APPARATUS FOR IDENTIFYING MALICIOUS OPERATION IN MOBILE TERMINAL

Номер: US20170098073A1
Автор: Shen Cong
Принадлежит:

The present disclosure provides a method and apparatus for identifying a malicious operation in a mobile terminal. The method includes: receiving an operation of a user on a mobile terminal; prompting the user to input an operation identification code when determining that the operation on the mobile terminal matches with a predetermined suspected malicious operation; receiving the operation identification code, and determining whether the operation identification code matches with a predetermined anti-malicious operation identification code; and operating the mobile terminal to perform a predetermined operation if the operation identification code does not match with the predetermined anti-malicious operation identification code. With the method for identifying a malicious operation in a mobile terminal according to the embodiments of the present disclosure, an unauthorized user performing a malicious operation for a mobile terminal can be identified, such that the mobile terminal makes a response in time. 1. A method for identifying a malicious operation in a mobile terminal , comprising:receiving an operation of a user on a mobile terminal;prompting the user to input an operation identification code when determining that the operation on the mobile terminal matches with a predetermined suspected malicious operation;receiving the operation identification code, and determining whether the operation identification code matches with a predetermined anti-malicious operation identification code; andoperating the mobile terminal to perform a predetermined operation if the operation identification code does not match with the predetermined anti-malicious operation identification code.2. The method for identifying a malicious operation in a mobile terminal according to claim 1 , wherein prior to receiving an operation of a user on a mobile terminal claim 1 , the method further comprises:receiving an anti-malicious operation identification code input by an authorized user, ...

Подробнее
12-04-2018 дата публикации

Method and System for Countering Ransomware

Номер: US20180101678A1
Автор: Stephen Rosa
Принадлежит: Individual

Methods, systems and computer readable media are provide for protecting stored data from ransomware. In an embodiment, the data is stored in an external drive connected to the processor. The connection between the processor and external drive is interrupted (e.g., open) except during a data transfer between the processor and the external drive. Connection of the processor to the external drive, permitted for a time period specified by a user or until the transfer of data is complete, occurs in response to manual actuation of a control means interposed between the processor and external drive and optionally, an indication from the user computing system that malware has not been detected on the device. The control means may be a mechanical switch or a fingerprint authentication device.

Подробнее
12-04-2018 дата публикации

DETECTION OF THE AUTHENTICITY OF AN ELECTRONIC CIRCUIT OR OF A PRODUCT CONTAINING SUCH A CIRCUIT

Номер: US20180101702A1
Принадлежит:

A method of authenticating a slave device. The method includes initializing, by a host device, a charge retention circuit of the slave device, and receiving, by the host device, an indication of a discharge time of the charge retention circuit. The host device authenticates the slave device based on the received indication of the discharge time of the charge retention device. 1. A method , comprising:initializing, by a host device, a charge retention circuit of a slave device, wherein initializing the charge retention circuit comprises switching off a power supply of the slave device;receiving, by the host device, an indication of a discharge time of the charge retention circuit;determining, by the host device, an authenticity of the slave device based on the received indication of the discharge time of the charge retention circuit; andcontrolling, by the host device, communication with the slave device based on the determined authenticity of the slave device.2. The method of wherein the host device compares information representative of time claim 1 , generated by the charge retention circuit claim 1 , with information indicative of an expected duration.3. The method of wherein a duration of time in which the power supply of the slave device is switched off is random.4. The method of claim 1 , comprising:transmitting, by the host device to the slave device, a voltage representative of a charge level to be stored in the charge retention circuit;charging of the charge retention circuit;measuring a residual quantity of charge in the charge retention circuit at an expiration of a duration of time; andcomparing information indicative of the measured residual quantity of charge with an expected value of said information.5. The method of claim 1 , comprising:receiving, by the slave device, a value indicating to the slave device a no-response time-period;charging, by the slave device, of the charge retention circuit;initializing of a time counter and switching off, by the ...

Подробнее
13-04-2017 дата публикации

TRANSITIONING BETWEEN TWO POWER STATES BASED ON USER-RELATED SIGNALS

Номер: US20170102764A1
Принадлежит:

Systems, methods, and machine-readable media transitioning between two power states based on user-related signals are provided. A computing device in a first power state may monitor multiple sensors and receive first sensor signals from a first group of the sensors. One or more radio frequency (RF) signals may be received from one or more nearby communication devices. The first sensor signals may be used to determine that the computing device has been picked up and, in response, an application processor maybe activated. The application processor may select a second power state based on the first power state and the first sensor signals. The second power state includes a power on state when the first power state is a suspended power state and the first sensor signals indicate that the computing device has been picked up while being touched on a screen. The computing device is transitioned to the second power state. 1. A computer-implemented method comprising:monitoring, by a computing device in a first power state, a plurality of sensors;receiving, based on the monitoring, first sensor signals from a first group of the plurality of sensors;activating an application processor of the computing device;selecting, by the application processor, a second power state based on the first power state; andtransitioning the computing device to the second power state,wherein the second power state comprises a suspended power state when the first power state is a hibernation power state and the first sensor signals indicate that the computing device has been left in the hibernation power state for a first predetermined length of time.2. The computer-implemented method of claim 1 , wherein:the second power state comprises the suspended power state when the first power state is a power on state and the first sensor signals indicate that the computing device has been left in a first state for a second predetermined length of time, the first state being characterized by detection of ...

Подробнее
13-04-2017 дата публикации

Electronic apparatus

Номер: US20170103235A1
Автор: Naoki Shimma
Принадлежит: Canon Inc

An electronic apparatus includes an authentication unit that performs authentication for determining whether a battery is a genuine battery, a storage unit that stores an authentication result representing a result of the authentication, a charging unit that charges the battery with power received from a power transmission device, and a control unit that controls the charging unit so that charging of the battery is started when the power transmission device is determined to be a device that satisfies a predetermined condition and the battery is authenticated to be a genuine battery. When the authentication result is stored in the storage unit, the authentication unit does not perform new authentication. When the authentication result is stored in the storage unit, the control unit controls the charging unit so that charging of the battery is started based on the stored authentication result.

Подробнее
23-04-2015 дата публикации

Automatic identification of returned merchandise in a data center

Номер: US20150113106A1
Принадлежит: Microsoft Corp

A method and system for determining a device identifier assigned to a device within an installation of devices connected via a network is provided. A system determines the device identifier of a device that has been repaired and reinstalled so that the device can be placed in service. Upon receiving an indication that a repaired device has been reinstalled, the system requests and receives a possible device identifier of the repaired device from an interconnect device that connects the repaired device to the network. To verify that the possible device identifier is the actual device identifier, the system directs the repaired device to reboot so that it broadcasts its device identifier. When the repaired device reboots, it broadcasts its device identifier. Upon receiving the broadcast device identifier, the system verifies that the possible device identifier is the same as the broadcast device identifier.

Подробнее
23-04-2015 дата публикации

Method and system for preventing unauthorized processor mode switches

Номер: US20150113642A1
Автор: Gregory R. Conti
Принадлежит: Texas Instruments Inc

A system comprising a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules.

Подробнее
03-07-2014 дата публикации

Communication device and communication system

Номер: US20140189892A1
Принадлежит: Toshiba Corp

According to one embodiment, a communication device includes a detector, a power controller and an authentication module. The detector is configured to detect connection of a source device. The authentication module is configured to perform authentication of the source device based on authentication data. The power controller is configured to continue supplying power to the source device when the authentication of the source device is successfully completed.

Подробнее
11-04-2019 дата публикации

DETECTION OF THE AUTHENTICITY OF AN ELECTRONIC CIRCUIT OR OF A PRODUCT CONTAINING SUCH A CIRCUIT

Номер: US20190108367A1
Принадлежит:

A method of authenticating a slave device. The method includes initializing, by a host device, a charge retention circuit of the slave device, and receiving, by the host device, an indication of a discharge time of the charge retention circuit. The host device authenticates the slave device based on the received indication of the discharge time of the charge retention device. 1. A non-transitory computer-readable medium having contents which cause a host device to perform a method , the method comprising:initializing a charge retention circuit of a slave device, wherein initializing the charge retention circuit comprises switching off a power supply of the slave device;receiving an indication of a discharge time of the charge retention circuit;determining an authenticity of the slave device based on the received indication of the discharge time of the charge retention circuit; andcontrolling communication with the slave device based on the determined authenticity of the slave device.2. The non-transitory computer-readable medium of wherein the method comprises comparing information representative of time claim 1 , generated by the charge retention circuit claim 1 , with information indicative of an expected duration.3. The non-transitory computer-readable medium of wherein a duration of time in which the power supply of the slave device is switched off is random.4. The non-transitory computer-readable medium of wherein the method comprises:transmitting, to the slave device, a voltage representative of a charge level to be stored in the charge retention circuit;charging of the charge retention circuit;measuring a residual quantity of charge in the charge retention circuit at an expiration of a duration of time; andcomparing information indicative of the measured residual quantity of charge with an expected value of said information.5. The non-transitory computer-readable medium of wherein the method comprises:transmitting, to the slave device, a value indicating to ...

Подробнее
02-04-2020 дата публикации

TECHNOLOGIES FOR PROVIDING SECURE EMERGENCY POWER CONTROL OF HIGH VOLTAGE DIRECT CURRENT TRANSMISSION SYSTEM

Номер: US20200104536A1
Принадлежит:

Technologies for providing secure emergency power control of a high voltage direct current transmission (HVDC) system include a controller. The controller includes circuitry configured to receive status data indicative of a present physical status of a power system. The circuitry is also configured to obtain an emergency power control command triggered by a remote source. The emergency power control command is to be executed by an HVDC transmission system of the power system. Further, the circuitry is configured to determine, as a function of the status data, whether the emergency power control command is consistent with the present physical status of the power system and block, in response to a determination that the emergency power control command is not consistent with the present physical status of the power system, execution of the emergency power control command by the HVDC transmission system. 1. A method comprising:receiving, by an apparatus, status data indicative of a present physical status of a power system;obtaining, by the apparatus, an emergency power control command triggered by a remote source, wherein the emergency power control command is to be executed by a high voltage direct current (HVDC) transmission system of the power system;determining, by the apparatus and as a function of the status data, whether the emergency power control command is consistent with the present physical status of the power system; andblocking, by the apparatus and in response to a determination that the emergency power control command is not consistent with the present physical status of the power system, execution of the emergency power control command by the HVDC transmission system.2. The method of claim 1 , wherein to obtain an emergency power control command triggered by a remote source comprises to obtain an emergency power control command triggered by input data received from a wide area monitoring protection and control (WAMPAC) system claim 1 , a special ...

Подробнее
02-04-2020 дата публикации

Method of DVFS-Power Management and Corresponding System

Номер: US20200104537A1
Принадлежит:

In one embodiment, a system on chip includes a dynamic voltage and frequency (DVFS) power supply, a secure environment, a non-secure environment, and a power supply management control module. The secure environment is configured to generate a secure instruction defining a permitted operating point of voltage and frequency for the DVFS power supply. The non-secure environment is configured to generate a request to modify the DVFS power supply, where the request to modify includes a voltage-frequency operating point. The power supply management control module is configured to scale the DVFS power supply to the permitted operating point, in response to the request to modify the DVFS power supply. 1. A method for managing a dynamic voltage and frequency (DVFS) power supply , the method comprising:generating, by a secure environment, a secure instruction defining a permitted operating point of voltage and frequency for the DVFS power supply;generating, by a non-secure environment, a request to modify the DVFS power supply, the request to modify comprising a voltage-frequency operating point; andscaling the DVFS power supply to the permitted operating point, in response to the request to modify the DVFS power supply.2. The method according to claim 1 , further comprisingassigning, by the secure environment, a label for the permitted operating point;determining whether the request to modify includes the label of the permitted operating point;scaling to the permitted operating point in response to determining that the request to modify includes the label of the permitted operating point; andoperating the secure environment at the permitted operating point.3. The method according to claim 2 , further comprising:operating the secure environment without scaling to the permitted operating point in response to determining that the request to modify does not include the label of the permitted operating point.4. The method according to claim 1 , wherein the secure instruction ...

Подробнее
09-06-2022 дата публикации

BLOCK OR PAGE LOCK FEATURES IN SERIAL INTERFACE MEMORY

Номер: US20220179803A1
Автор: PEKNY Theodore T.
Принадлежит:

Embodiments are provided for protecting boot block space in a memory device. Such a memory device may include a memory array having a protected portion and a serial interface controller. The memory device may have a register that enables or disables access to the portion when data indicating whether to enable or disable access to the portion is written into the register via a serial data in (SI) input. 1. A memory device , comprising:a memory array;a serial interface controller configured to interface with a master device; anda register coupled to the serial interface controller, wherein the register is configured receive a password from the master device via the serial interface controller and store the password received from the master device as a received password, wherein access to at least a portion of the memory array is enabled if the received password is validated via comparison of the received password with a stored value.2. The memory device of claim 1 , wherein the at least a portion of the memory array comprises a boot block space of the memory array.3. The memory device of claim 1 , wherein the at least a portion of the memory array comprises a non-boot block space of the memory array.4. The memory device of claim 1 , wherein the at least a portion of the memory array comprises an entirety of the memory array.5. The memory device of claim 1 , wherein the at least a portion of the memory array comprises an individual page within a particular block of the memory array.6. The memory device of claim 1 , wherein the at least a portion of the memory array comprises a block region comprising one or more blocks of the memory array.7. The memory device of claim 6 , wherein the block region is user-definable.8. The memory device of claim 6 , wherein the block region comprises an entire boot area.9. The memory device of claim 1 , wherein the master device is configured to initiate a read operation as the access.10. The memory device of claim 1 , wherein the master ...

Подробнее
13-05-2021 дата публикации

ERASING A CRYPTOGRAPHIC ITEM IN A MEMORY OF A DEVICE IN RESPONSE TO A CHANGE OF AN OPERATING MODE OF THE DEVICE

Номер: US20210141942A1
Принадлежит:

The technology disclosed herein enables a method to receive an indication of a change to an operating mode of a device from a first operating mode to a second operating mode, and identify a cryptographic item stored at a memory of the device, wherein the cryptographic item corresponds to an identification of the device signed with a digital signature, and wherein the digital signature is based on a private key that is inaccessible to the device. On response to receiving the indication of the change to the operating mode of the device, the method can modify the cryptographic item stored at the memory, and operate the device in the second operating mode based on the modified cryptographic item. The indication of the change to the operating mode of the device can correspond to a detection of a change in a function of the device. 1. A method comprising:receiving an indication of a change to an operating mode of a device from a first operating mode to a second operating mode;identifying a cryptographic item stored at a memory of the device, wherein the cryptographic item corresponds to an identification of the device signed with a digital signature, and wherein the digital signature is based on a private key that is inaccessible to the device;in response to receiving the indication of the change to the operating mode of the device, modifying, by a processing device, the cryptographic item stored at the memory; andoperating the device in the second operating mode based on the modified cryptographic item.2. The method of claim 1 , wherein the indication of the change to the operating mode of the device corresponds to a detection of a change in a function of the device.3. The method of claim 2 , wherein the change in the function of the device comprises a change in software that is used to provide functionality of the first operating mode.4. The method of claim 3 , wherein the change in the function of the device comprises an update to software of the device.5. The method ...

Подробнее
13-05-2021 дата публикации

SEMICONDUCTOR DEVICE WITH SECURE ACCESS KEY AND ASSOCIATED METHODS AND SYSTEMS

Номер: US20210141943A1
Принадлежит:

Memory devices, systems including memory devices, and methods of operating memory devices are described, in which security measures may be implemented to control access to a fuse array (or other secure features) of the memory devices based on a secure access key. In some cases, a customer may define and store a user-defined access key in the fuse array. In other cases, a manufacturer of the memory device may define a manufacturer-defined access key (e.g., an access key based on fuse identification (FID), a secret access key), where a host device coupled with the memory device may obtain the manufacturer-defined access key according to certain protocols. The memory device may compare an access key included in a command directed to the memory device with either the user-defined access key or the manufacturer-defined access key to determine whether to permit or prohibit execution of the command based on the comparison. 1. A memory device comprising:a memory array;a fuse array configured to store a first access key at a predetermined set of addresses thereof, the first access key based on a unique identifier of the memory device; generate an access command in response to receiving an access request directed to the fuse array, from a host device, wherein the access request includes a second access key;', 'retrieve the first access key from the fuse array;', 'compare the first access key with the second access key; and', 'determine whether to permit or prohibit execution of the access command at the fuse array based on comparing the first access key with the second access key., 'peripheral circuitry coupled to the fuse array and the memory array, and configured to2. The memory device of claim 1 , wherein the predetermined set of addresses is based on parameters associated with the memory device such as a product identification claim 1 , a design revision identification claim 1 , a memory capacity claim 1 , an operating voltage claim 1 , a package type claim 1 , an ...

Подробнее
13-05-2021 дата публикации

System and Method for Secure Electric Power Delivery

Номер: US20210141945A1
Принадлежит: Individual

An information security system and method that provides electric power to an authorized user and denies electric power to an unauthorized user. An administrator requests access for a user, and a site controller generates a key/receptacle tuple for the use. The key/receptacle tuple is communicated to a site power source, which broadcasts the key/receptacle information to all secure receptacles in a facility, or other infrastructure. The key is also communicated to the user. The user plugs in a device into a secure receptacle and provides the key via a secure adapter between the device and the secure receptacle. If the key is valid, the users' device is supplied with electric power; otherwise, electric power is denied to the unauthorized user's device. The usage of the secure receptacles are logged and analyzed by the site controller and reports are communicated to the administrator.

Подробнее
17-07-2014 дата публикации

Subsystem Authenticity and Integrity Verification (SAIV)

Номер: US20140201853A1
Принадлежит:

Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security. 1. A method of ascertaining authenticity or integrity of a battery operated electronic computing apparatus , the method comprising:coupling a security station with the battery operated electronic computing apparatus, the battery operated electronic computing apparatus being a device under test (DUT);issuing a challenge from the security station to the DUT;receiving, by the security station, a response from the DUT;establishing an authenticated session with a first remote secret store through a network;communicating, from the security station, information about the DUT response to the first remote secret store;receiving, by the security station, a response from the first remote secret store regarding the DUT, the response from the first remote secret store including a remotely made pass/fail determination; andresponsive to receiving the response from the first remote secret store, generating a local pass/fail indication at the security station.2. The method of further comprising:selecting, outside of the DUT, a secret index number;selecting, by the security station and responsive to the value of the number, the first remote secret store from a plurality of remote secret stores.3. The method of wherein the security station selects the secret index number.4. The method of wherein ...

Подробнее
03-05-2018 дата публикации

PHYSICAL TOKEN BASED SECURED CHARGE MANAGEMENT OF A USER EQUIPMENT

Номер: US20180121683A1

Embodiments for physical token based secured charge management of a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof. 1. A method for physical token based secured charge management of a user equipment (UE) by a processor , comprising:authorizing a power charging session by firmware of the UE for charging the UE upon detecting one or more physical authentication tokens within a selected area of a power charging source or on the power charging source itself, or combination thereof; andallowing an unauthorized charging session, prior to the authorizing, to charge the UE up to a pre-authorized charging limit comprising a predetermined percentage of charged capacity of the UE; wherein the unauthorized charging session is allowed prior to the authorizing upon detecting, by the firmware of the UE, that an unauthorized power charging source has been connected to the UE.2. The method of claim 1 , further including adding the one or more physical authentication tokens to an approved list of authorized physical authentication tokens at the UE claim 1 , wherein the one or more physical authentication tokens are a near field communication (NFC) sticker claim 1 , a quick response (QR) code claim 1 , barcode claim 1 , or combination thereof.3. The method of claim 2 , further including entering a unique password into an application of the UE for adding the one or more physical authentication tokens to the approved list of authorized physical authentication tokens.4. The method of claim 3 , further including synchronizing a database with the one or more physical authentication tokens added to the approved list of authorized physical authentication tokens claim 3 , wherein the approved list of authorized physical authentication tokens is encrypted.5 ...

Подробнее
03-05-2018 дата публикации

POWER CHARGER AUTHORIZATION FOR A USER EQUIPMENT VIA A CRYPTOGRAPHIC HANDSHAKE

Номер: US20180121684A1

Embodiments for using power charge management authorization for a user equipment (UE) by a processor. A power charging session is authorized by firmware of the UE for charging the UE using a cryptographic handshake between the UE and a power charging station. 1. A method for using power charge management authorization for a user equipment (UE) with secured power charging stations by a processor , comprising:authorizing a power charging session by firmware of the UE for charging the UE using a cryptographic handshake between the UE and a power charging station; andallowing an unauthorized charging session, prior to the authorizing, to charge the UE up to a pre-authorized charging limit comprising a predetermined percentage of charged capacity of the UE; wherein the unauthorized charging session is allowed prior to the authorizing upon detecting, by the firmware of the UE, that an unauthorized power charging source has been connected to the UE.2. The method of claim 1 , further including querying claim 1 , by the UE claim 1 , the power charging station for a cryptographic identification token.3. The method of claim 1 , further including:adding the power charging station to an approved list of authorized power charging stations for the UE; andvalidating the power charging station according to the approved list of authorized power charging stations stored in a database associated with the UE.4. The method of claim 1 , further including entering a unique password into an application of the UE for adding the power charging station to an approved list of authorized power charging stations.5. The method of claim 4 , further including synchronizing a database with the power charging station added to an approved list of authorized power charging stations claim 4 , wherein the approved list of authorized power charging stations is encrypted.6. The method of claim 1 , further including requiring a re-authorization of a subsequent power charging session by firmware of the UE for ...

Подробнее
03-05-2018 дата публикации

Location defined power charger management authorization for a user equipment

Номер: US20180121685A1
Принадлежит: International Business Machines Corp

Embodiments for authorizing power charging of a user equipment (UE) based on a location. A power charging session is authorized by firmware of the UE for charging the UE upon detecting the UE is currently located and validated within an authorized geographic location. Either an unauthorized charging session is permitted to charge the UE up to a pre-authorized charging limit upon the UE being located in an unauthorized geographic location, or the power charging session is permitted to continue to charge the UE upon detecting the UE relocated from the authorized geographic location to an unauthorized geographic location.

Подробнее
04-05-2017 дата публикации

Secure starting of an electronic circuit

Номер: US20170124330A1
Принадлежит: Proton World International NV

A method of checking the authenticity of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element includes starting the microcontroller with instructions stored in a first non-reprogrammable memory area associated with the microcontroller, starting the secure element, executing, with the secure element, a signature verification on the content of a second reprogrammable non-volatile memory area associated with the microcontroller, and if the signature is verified, using the secure element to send the first key to the microcontroller.

Подробнее
04-05-2017 дата публикации

Controlled starting of an electronic circuit

Номер: US20170124331A1
Принадлежит: Proton World International NV

A method of checking the authenticity of the content of a non-volatile memory of an electronic device including a microcontroller and an embedded secure element includes starting the microcontroller with instructions stored in a first non-reprogrammable memory area associated with the microcontroller, starting the secure element, executing, with the secure element, a signature verification on the content of a second reprogrammable non-volatile memory area associated with the microcontroller, and interrupting the microcontroller power supply if the signature is not verified.

Подробнее
16-04-2020 дата публикации

TERMINAL DEVICE AND METHOD AND SYSTEM FOR MONITORING BATTERY SAFETY IN TERMINAL DEVICE

Номер: US20200117260A1
Принадлежит:

Provided are a terminal device and a method and system for monitoring battery safety in a terminal device. The method includes the following. Power-off information generated upon disconnection between a battery connector of the terminal device and a main board of the terminal device is acquired. Whether the disconnection between the battery connector and the main board is an unauthorized disconnection is determined according to the power-off information. Upon determining that the disconnection between the battery connector and the main board is the unauthorized disconnection, determine that a battery of the terminal device has safety hazard and control the terminal device to send reminder information indicative of battery abnormality. 1. A method for monitoring battery safety in a terminal device , comprising:acquiring power-off information generated upon disconnection between a battery connector of the terminal device and a main board of the terminal device;determining, according to the power-off information, whether the disconnection between the battery connector and the main board is an unauthorized disconnection; anddetermining that a battery of the terminal device has safety hazard and controlling the terminal device to send reminder information indicative of battery abnormality, upon determining that the disconnection between the battery connector and the main board is the unauthorized disconnection.2. The method of claim 1 , wherein power-off state bit information is generated upon the disconnection between the battery connector and the main board and is used as the power-off information.3. The method of claim 2 , wherein determining claim 2 , according to the power-off information claim 2 , whether the disconnection between the battery connector and the main board is the unauthorized disconnection comprises:determining whether the power-off state bit information has been reset;determining that the disconnection between the battery connector and the main ...

Подробнее
27-05-2021 дата публикации

Portable communication peripheral, system for protecting a portable terminal, and communication method

Номер: US20210157934A1
Принадлежит: Individual

The portable peripheral ( 1001 ) of communication with a data storage peripheral and a data network utilizing the internet protocol, comprises: a connector to mechanically connect and establish a removable wired connection between the peripheral and a portable terminal, a first means of wired bidirectional communication with the portable terminal, a second means of bidirectional communication with a data storage peripheral or a data network and a security unit protecting the communication between the portable terminal and the data storage peripheral or the data network, this communication being established between the first and the second means of communication.

Подробнее
14-05-2015 дата публикации

Information processing apparatus, control method for the same and storage medium

Номер: US20150134986A1
Автор: Shigeki Hasui
Принадлежит: Canon Inc

An information processing apparatus that can avoid an IEEE802.1X re-authentication process due to a communication speed setting change made at the time of transitioning to the power-saving state and realize both of security and power-saving. Fixed link speed with which both a MFP 100 and a communication apparatuses are compatible is set on the basis of acquired pieces of link speed setting information about the MFP 100 and the communication apparatus. Then, 100 Mbps lower than 1000 Mbps is fixedly set on the basis of acquired power-saving setting information about the MFP 100 when the power-saving setting is effective, and EEE is enabled.

Подробнее
08-09-2022 дата публикации

VOLTAGE GLITCH DETECTION CIRCUIT

Номер: US20220284099A1
Принадлежит:

A voltage glitch detector includes a ring oscillator, a plurality of counters, a combined result circuit, and a result evaluation circuit. The ring oscillator includes a plurality of series-connected stages. An output of a last stage of the ring oscillator is coupled to an input of a first stage of the ring oscillator. Each counter of the plurality of counters has an input coupled to a node located between two stages of the plurality of series-connected stages. The combined result circuit is coupled to each of the plurality of counters. The combined result circuit combines the count values received from each counter of the plurality of counters to provide a combined result. The result evaluation circuit is coupled to compare the combined result with a reference value to determine when a voltage glitch is detected. 1. A voltage glitch detector comprising:a ring oscillator having a plurality of series-connected stages, wherein an output of a last stage of the ring oscillator is coupled to an input of a first stage of the ring oscillator;a plurality of counters, each counter of the plurality of counters having an input coupled to a node located between two stages of the plurality of series-connected stages;a combined result circuit coupled to each of the plurality of counters for combining count values received from each counter of the plurality of counters into a combined result; anda result evaluation circuit coupled to compare the combine result with a reference value to determine when a voltage glitch is detected.2. The voltage glitch detector of claim 1 , wherein the plurality of series-connected stages is equal to the plurality of counters.3. The voltage glitch detector of claim 1 , wherein the plurality of counters further comprises a first counter and a second counter coupled to a same node located between two stages of the plurality of stages claim 1 , wherein the first counter triggers upon receiving a positive clock edge at the same node and the second ...

Подробнее
09-05-2019 дата публикации

MOBILE COMMUNICATION PERIPHERAL, SYSTEM FOR PROTECTING A MOBILE TERMINAL AND COMMUNICATION METHOD

Номер: US20190138726A1
Принадлежит:

The portable peripheral (100) of communication with the data network (105) utilizing the internet protocol, comprises: 125-. (canceled)27. Peripheral according to claim 26 , in which the security unit comprises a firewall filtering packets claim 26 , received from the data network and meant to be transmitted to the portable terminal claim 26 , comprising a processing unit configured to execute a firewall software.28. Peripheral according to claim 26 , which comprises claim 26 , in the removable housing claim 26 , a geo-locator for geo-localizing the peripheral claim 26 , the firewall being configured to block the packets received when the geo-localization of the peripheral is not within a predetermined geographical area.29. Peripheral according to claim 26 , in which the first communicator comprises a USB connector.30. Peripheral according to claim 26 , in which the second communicator comprises an Ethernet connector.31. Peripheral according to claim 26 , in which the second communicator comprises an antenna functioning according to the 802.11 standard also known as “Wi-Fi”.32. Peripheral according to claim 26 , configured to send claim 26 , upon connection with the portable terminal claim 26 , a deactivation command of a means of wireless communication of the portable terminal.33. Peripheral according to claim 32 , that comprises:an electronic lock preventing the operation of the peripheral anda mechanism for unlocking the lock.32. Peripheral according to the claim 33 , in which the mechanism for unlocking is biometrical.34. Peripheral according to the claim 33 , in which the communicator is configured to claim 33 , once an internet connection is validated claim 33 , establish a data tunnel between the server and the peripheral.35. Peripheral according to claim 26 , in which the volume is smaller than thirty-five cubic centimeters.36. Peripheral according to claim 26 , that comprises a battery supplying power to the electronic circuits of the peripheral.37. ...

Подробнее
07-05-2020 дата публикации

Non-wakeable system states

Номер: US20200142468A1
Принадлежит: Hewlett Packard Development Co LP

Examples for setting a system state as one of wakeable through a trigger and non-wakeable, are described. In one example, a value of an enabling time interval is obtained. Thereafter, it is determined if the enabling time interval has elapsed since the computing device has been in a low powered mode. Based on the determining, a system state is set as one of wakeable and non-wakeable through a trigger

Подробнее
17-06-2021 дата публикации

SECURING DATA STORED IN A MEMORY OF AN IOT DEVICE DURING A LOW POWER MODE

Номер: US20210182435A1
Принадлежит:

The disclosure relates to a method for enabling the secure functions of a chipset () and especially the encryption of the content of the secure memory () when the device goes into low power mode. The content of the secure memory () may be encrypted and stored in an external memory () during low power mode of the chipset (). 17217. A method of securing a memory content of a first memory () of a secure part () of a chipset () during a low power mode , wherein the low power mode causes the memory content to be erased from the first memory () , comprising:{'b': 20', '2, 'when entering the low power mode, encrypting and optionally signing at least a part of the memory content to obtain an encrypted memory content and storing the encrypted memory content in an external memory () external to the secure part () during the low power mode.'}2. The method according to claim 1 , further comprising:{'b': 2', '20', '7, 'when exiting the low power mode, receiving in the secure part () the encrypted memory content from the external memory (), decrypting and optionally authenticating the encrypted memory content to obtain decrypted memory content, and loading the decrypted memory content in the first memory ().'}31. The method according to claim 2 , wherein the chipset () is configured to:{'b': 2', '11, 'set up a secure link between the secure part () and a remote client access server ();'}{'b': 11', '2, 'receive a secure stamp from the client access server () in the secure part () via the secure link, wherein the secure stamp comprises data for securing the memory content;'}{'b': 5', '2', '5, 'store the secure stamp in a second memory () of the secure part (), wherein the secure stamp remains stored in the second memory () in the low power mode;'}when entering the low power mode, encrypt the at least part of the content using the secure stamp; andwhen exiting the low power mode, decrypt the encrypted memory content using the secure stamp.415. The method according to claim 3 , ...

Подробнее
07-06-2018 дата публикации

Rogue Hardware Detection Through Power Monitoring

Номер: US20180157572A1
Принадлежит:

Techniques are provided for monitoring power consumption for individual systems or devices as a way to detect illicit or rogue hardware, e.g., addition of an unauthorized integrated circuit (IC), which may have been added to an existing system. Techniques include monitoring a power on sequence of a system, the power on sequence including one or more distinct stages, determining for each stage of the one or more distinct stages of the power on sequence, whether an observed power load of any distinct stage has deviated from an expected power load according to a power profile for the system, and when the observed power load of a given distinct stage has deviated from the expected power load, performing an action indicating that a deviation from the expected power load has occurred. The power profile specifies expected power characteristics of the system for each stage of a power on sequence. 1. A method comprising:monitoring a power on sequence of a system by monitoring power loads of functional blocks in the system prior to the system being fully powered on, wherein the functional blocks each include at least one computing component and the power on sequence comprises a plurality of distinct stages that each initialize a unique functional block of the functional blocks prior to the system being fully powered on;determining, for each distinct stage of the plurality of distinct stages of the power on sequence, whether a given power load of the monitored power loads has deviated from an expected power load of a corresponding power profile included in a composite power profile for the system, wherein each power profile in the composite power profile specifies expected power characteristics of the at least one computing component included in a corresponding unique functional block; andpowering down the system when the given power load of a given distinct stage of the plurality of distinct stages has deviated from the expected power load for the given distinct stage.2. The ...

Подробнее
22-09-2022 дата публикации

TRACKING DEVICE STATE TRANSITIONS

Номер: US20220300295A1

An example computing device includes a tracking device, an interface, a processor, and a controller. The interface including a power pin, a data pin, and a clock pin, where the interface is to couple the tracking device to the computing device via the power pin and the data pin, and the clock pin is disconnected from the tracking device. The controller is communicatively coupled to the processor and the interface, the controller is to control an operation of the tracking device via the data pin. 1. A computing device comprising:a tracking device;an interface including a power pin, a data pin, and a clock pin, wherein the interface is to couple the tracking device to the computing device via the power pin and the data pin, and the clock pin is disconnected from the tracking device;a processor; anda controller communicatively coupled to the processor and the interface, the controller to control an operation of the tracking device via the data pin.2. The computing device of claim 1 , further including an input device coupled to the controller claim 1 , and the controller is to:identify a button press that is input to the input device, andcontrol the operation of the tracking device via the data pin and independent of an operating system of the computing device in response to the button press.3. The computing device of claim 1 , wherein the controller is to assert a signal via the data pin to control the operation claim 1 , and the tracking device is to transition to a ready-to-activate state in response to the asserted signal.4. The computing device of claim 1 , wherein the tracking device is powered via the power pin claim 1 , the power being provided to the tracking device while the computing device is in a back-up power state.5. The computing device of claim 1 , wherein the processor is to:enable activation of the tracking device of the computing device in an operating system (OS) of the computing device;disable the activation of the tracking device in the OS; ...

Подробнее
22-09-2022 дата публикации

DEVICE, SOFTWARE, AND METHODS FOR ADMINISTRATIVE CONTROL OF ELECTRONIC DEVICES

Номер: US20220300664A1
Принадлежит:

An administrative control system for controlling access to one or more devices for one or more users. In at least some examples, the administrative control system utilizes an access control device (ACD) inserted into an electrical circuit to selectively control electricity (e.g., power or control signals) in an electrical circuit of one or more governed devices. In this regard, even closed devices may be subjected to control by the administrative control system. In turn, a policy regarding device use may be enforced across different devices and platforms to provide a comprehensive system for controlling access to governed devices. Further still, the system may monitor for one or more circumvention states to provide a responsive action or altering/notification in response to a circumvention state. 1. An administrative control system , comprising: electrical connectors for electrically inserting the ACD into an electrical circuit of one or more governed devices,', 'access circuitry that controls flow of electricity through the electrical connectors for controlling the flow of electricity through the electrical circuit,', 'a computing device electronically connected to the access circuitry; and, 'an access control device (ACD) comprisinga network connection operationally connecting the computing device of the ACD to a computer network comprising one or more network computing devices; andan access module comprising software executing on at least one of the computing device of the ACD or the one or more network computing devices to control the access circuitry.2. The system of claim 1 , further comprising:an authentication input device, wherein at least one of the computing device of the ACD or the one or more network computing devices are programmed to control access to a governed device in response to an input to the authentication input device.3. The system of claim 2 , wherein the authentication input device is selected from the group consisting of a camera claim 2 , ...

Подробнее
28-08-2014 дата публикации

Method of Protecting Power Receiver and Related Wireless Charging Device

Номер: US20140245464A1
Автор: Feng-Seng Chu
Принадлежит: HTC Corp

A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization.

Подробнее
24-06-2021 дата публикации

DISPLAY APPARATUS

Номер: US20210192092A1
Автор: HUANG Beizhou
Принадлежит:

A display apparatus comprises a control module configured to provide a power supply signal and a plurality of control signals and configured to determinate the operation of the control module in a first operation mode or a second operation mode according to a matching signal provided by the system circuit board transmitted to the printed circuit board. And, a security module is electrically coupled to the control module and configured to receive and transmit the power supply signal, wherein the security module includes a plurality of switches comprising a first switch, a second switch, a third switch and a fourth switch. Moreover, a displaying module is electrically coupled to a second terminal of the fourth switch, wherein an open state or a conducted state of each of the plurality of switches is controlled by the control module according to the operation mode of the control module. 1. A display apparatus , comprising:a control module, configured to provide a power supply signal and a plurality of control signals, determining operation of the control module in a first operation mode or a second operation mode according to a matching signal provided by the system circuit board transmitted to the printed circuit board; a first switch, having a control terminal configured to receive a first control signal and a first terminal electrically coupled to the control module;', 'a second switch, having a control terminal configured to receive a second control signal and a first terminal electrically coupled to a second terminal of the first switch;', 'a third switch, having a control terminal configured to receive a third control signal and a first terminal electrically coupled to a second terminal of the second switch; and', 'a fourth switch, having a control terminal configured to receive a fourth control signal and a first terminal electrically coupled to a second terminal of the third switch; and, 'a security module, electrically coupled to the control module and ...

Подробнее
14-06-2018 дата публикации

Devices including a privacy switch

Номер: US20180167806A1
Автор: Aaron Boyd
Принадлежит: Silent Circle SA

Devices including one or more input mechanisms for preventing power from being provided to one or more components of a mobile device are described herein. In some embodiments, a mobile device may include a privacy circuitry that includes a switch, such as a multi-mode switch. The multi-mode switch may be capable of being placed in at least two positions, where one of the positions corresponds to the mobile device being in a privacy mode, and at least one of the positions corresponding to the mobile device being in a non-privacy mode. When the mobile device is in the privacy mode, the mobile device behaves as if a power source for the mobile device had been completely removed, thereby increasing the mobile device's security for preventing external interrupts and penetration.

Подробнее
23-06-2016 дата публикации

System for Security Conscious Energy Drain

Номер: US20160179171A1

A method, system and computer-usable medium are disclosed for detecting unanticipated consumption of power by a device. A first set of power consumption data is selected, followed by the collection of a second set of power consumption data, which respectively correspond to the consumption of a first and second amount of power by a device when it performs an authorized operation. The first and second sets of power consumption data are then compared to detect whether the second amount of power consumed is greater than the first amount of power consumed. If so, then a notification is generated, stating that the device has consumed an unanticipated greater amount of power as a result of performing the authorized operation. 16-. (canceled)7. A system comprising:a processor,a data bus coupled to the processor; and selecting a first set of power consumption data associated with an authorized operation performed by a first device, the first set of power consumption data corresponding to a first amount of power consumed by the first device when performing the authorized operation;', 'collecting a second set of power consumption data associated with the authorized operation, the second set of power consumption data corresponding to a second amount of power consumed by the first device when performing the authorized operation; and', 'comparing the first and second sets of power consumption data, the comparing detecting that the second amount of power consumed is greater than the first amount of power consumed; and', 'generating a notification that the first device has consumed an unanticipated greater amount of power as a result of performing the authorized operation., 'a computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus, the computer program code used for detecting unanticipated consumption of power by a device and comprising instructions executable by the processor and configured for8. The system of claim 7 , ...

Подробнее
21-06-2018 дата публикации

SYSTEM AND METHOD FOR DETECTING ACTIVITES WITHIN A COMPUTERIZED DEVICE BASED ON MONITORING OF ITS POWER CONSUMPTION

Номер: US20180173877A1
Принадлежит:

The invention relates to a system for protecting a computerized device from a malicious activity resulting from a malicious code, which comprises: (a) a first DC supply monitoring unit which is located within a separate computerized environment, namely an environment which is totally separated and isolated both physically and in terms of connectivity from the hardware and software of the computerized environment of the device; (b) a memory database for storing one or more signatures of known malicious events, each of said signatures describes the temporal effect of a malicious event, respectively, on the power consumption from the DC supply of the device; and (c) a microprocessor within said DC supply monitoring unit for continuously monitoring the power consumption from said DC supply of the device, comparing temporal characteristics of the power consumption with said malicious events signatures in said database, and alerting upon detection of a match, wherein said DC supply monitoring unit is at most physically connected to the DC supply of the device. 1. System for protecting a computerized device from a malicious activity resulting from a malicious code , which comprising:a. a first DC supply monitoring unit which is located within a separate computerized environment, namely an environment which is totally separated and isolated both physically and in terms of connectivity from the hardware and software of the computerized environment of the device;b. a memory database for storing one or more signatures of known malicious events, each of said signatures describes the temporal effect of a malicious event, respectively, on the power consumption from the DC supply of the device; andc. a microprocessor within said DC supply monitoring unit for continuously monitoring the power consumption from said DC supply of the device, comparing temporal characteristics of the power consumption with said malicious events signatures in said database, and alerting upon detection ...

Подробнее
22-06-2017 дата публикации

Security Mechanisms for Extreme Deep Sleep State

Номер: US20170177870A1
Автор: Uwe Hildebrand
Принадлежит: Intel IP Corp

A processor includes logic to generate a wakeup code value for a deep sleep state in which the processor is powered down, store the wakeup code value to a first location in a power domain in which power is maintained in the deep sleep state, store the wakeup code value to a second location in a non-volatile memory device, and initiate entry into the deep sleep state. The processor also includes logic to begin execution of a wakeup sequence upon waking up from the deep sleep state. The wakeup sequence includes a determination of whether a value read from the second location and a value read from the first location match. If they do not match, the processor triggers an exception handling sequence, which may include a secure boot sequence. If they match, the processor continues executing the wakeup sequence without executing a secure boot sequence.

Подробнее
02-07-2015 дата публикации

POWER SUPPLY AND ELECTRONIC DEVICE WITH POWER SUPPLY

Номер: US20150186684A1
Принадлежит:

A power supply includes a power supply module supplying power for a motherboard, a receiving module, a controlling module, and a switch module. The receiving module receives an unique authorized code and determines if the unique authorized code matches a preset code, which can send a switch-on signal to the controlling module when the unique authorized code matches the preset code. The controlling module sends a high-logic level to the switch module upon receiving the switch-on signal, to switch on the switch module to connect the power supply module with the motherboard. The receiving module sends a switch-off signal to the controlling module when the unique authorized code does not match the preset code, and the controlling module sends a low-logic level to the switch module, to switch off the switch module to disconnect the power supply module from the motherboard. 1. A power supply comprising:a power supply module configured to supply power for a motherboard;a receiving module configured to receive an unique authorized code and configured to determine if the unique authorized code matches a preset code;a controlling module coupled to the receiving module; anda switch module coupled to the controlling module,wherein the receiving module is configured to send a switch-on signal to the controlling module when the unique authorized code matches the preset code,the controlling module is configured to send a high-logic level to the switch module upon receiving the switch-on signal,the switch module is switched on to connect the power supply module with the motherboard,the receiving module is configured to send a switch-off signal to the controlling module when the unique authorized code does not match the preset code, andthe controlling module is configured to send a low-logic level to the switch module, and the switch module is switched off to disconnect the power supply module from the motherboard.2. The power supply of claim 1 , wherein the switch module is a ...

Подробнее
28-05-2020 дата публикации

Out-of-Band Content Analysis

Номер: US20200167463A1

A method of validating content out-of-band for a computing device having a processor capable of executing software with a management controller separate from the processor of the computing device. The method includes identifying a content to be deployed. The content resides on a storage medium. The method further includes measuring the content and establishing a content baseline for the content based on the measuring. Also, the method includes copying a deployed content to a storage product to produce a copied deployed content. The copied deployed content is compared with the content baseline out-of-band while the deployed content is deployed. A difference is identified between the copied deployed content and the content baseline.

Подробнее
29-06-2017 дата публикации

System and method for detecting activities within a bootstrap of a computerized device based on monitoring of power consumption

Номер: US20170185770A1

The invention relates to a system for protecting a computerized device from activities within the device bootstrap, which comprises: (a) a DC supply monitoring unit for monitoring power consumption of the DC supply of the device during bootstrap; and (b) a database for storing one or more valid bootstrap signatures, each of said valid bootstrap signatures describes a valid variation of power consumption pattern, respectively, from the DC supply of the device; wherein, during bootstrapping of the device, said DC supply monitoring unit continuously monitors the power consumption from said DC supply of the device, compares characteristics of the power consumption with said one or more valid bootstrap signatures in said database, and alerts upon detection of a mismatch.

Подробнее
05-07-2018 дата публикации

Wearable device and data security method thereof

Номер: US20180189500A1

Provided is an operating method of a wearable device, the method including setting a threshold voltage when there is not a physical contact of an outsider, measuring an envelope voltage while performing a data communication, determining whether to be the physical contact with the outsider by comparing the threshold voltage with the envelope voltage, and stopping the data communication, when there is the physical contact with the outsider.

Подробнее
06-07-2017 дата публикации

METHOD FOR CONTROLLING SERVER DEVICE, AND SERVER DEVICE

Номер: US20170193250A1
Автор: TOYA Shoichi
Принадлежит:

A method including: receiving identification information of a charging device including individual identification information of the charging device, and identification information of a power storage device, which is connected to the charging device, including individual identification information of the power storage device, from at least one of the charging device and the power storage device; determining the possibility of charging the power storage device from the identification information of the power storage device and the identification information of the charging device received; and transmitting information indicating the determined possibility of charging the power storage device to at least one of the charging device and the power storage device. 1. A method comprising:(a) receiving identification information of a charging device including individual identification information of the charging device, and identification information of a power storage device, which is connected to the charging device, including individual identification information of the power storage device, from at least one of the charging device and the power storage device;(b) determining a possibility of charging the power storage device from the identification information of the power storage device and the identification information of the charging device received in the step (a); and(c) transmitting information indicating the determined possibility of charging the power storage device to at least one of the charging device and the power storage device.2. The method according to claim 1 , comprising:(d) associating to each other and storing, in a storage device of the server device, the identification information of the power storage device and the identification information of the charging device,wherein, in the step (b),when an association between the identification information of the power storage device and the identification information of the charging device received ...

Подробнее
20-06-2019 дата публикации

Multiple mailbox secure circuit

Номер: US20190188397A1
Принадлежит: Apple Inc

Techniques are disclosed relating to data storage. In various embodiments, a computing device includes first and second processors and memory having stored therein a first encrypted operating system executable by the first processor and a second encrypted operating system executable by the second processor. The computing device also includes a secure circuit configured to receive, via a first mailbox mechanism of the secure circuit, a first request from the first processor for a first cryptographic key usable to decrypt the first operating system. The secure circuit is further configured to receive, via a second mailbox mechanism of the secure circuit, a second request from the second processor for a second cryptographic key usable to decrypt the second operating system, and to provide the first and second cryptographic keys.

Подробнее
20-06-2019 дата публикации

Communications Bus Data Transmission Using Relative Ground Shifting

Номер: US20190188420A1
Принадлежит:

Methods are described herein for communications bus data transmission using relative ground shifting. A plurality of voltage lines of at least one electronic control unit (ECU) are monitored. The at least one ECU electrically coupled to a communications bus. A voltage differential across at least two of the plurality of voltage lines of the at least one ECU is measured. A pulse or data stream is injected into the communications bus via one or two voltage lines based on the measured voltage differential having an amplitude lower than a predetermined voltage threshold. 1. A method for implementation by one or more data processors forming one or more computing devices , the method comprising:monitoring, by at least one data processor of at least one security module, a plurality of voltage lines of at least one electronic control unit (ECU) electrically coupled to a communications bus;measuring, by at least one data processor, a voltage differential across at least three of the plurality of voltage lines of the at least one ECU; andinjecting, by at least one data processor, a data stream into the communications bus via at least two voltage lines of the at least three measured voltage lines based on the measured voltage differential having an amplitude lower than a predetermined voltage threshold.2. The method according to claim 1 , wherein the communications bus comprises a serial communications bus.3. The method according to claim 2 , the serial communications bus comprises a controller area network (CAN) bus and wherein the at least three of the plurality of voltage lines comprises a CAN high voltage line claim 2 , a CAN low voltage line claim 2 , and a ground line.4. The method according to claim 1 , wherein the predetermined threshold comprises an absolute value of a summation of a first voltage range of one voltage line and a second voltage range of another voltage line.5. The method according to claim 1 , wherein the data stream comprises a half-duplex data stream ...

Подробнее
11-06-2020 дата публикации

ERASING A CRYPTOGRAPHIC ITEM IN A MEMORY OF A DEVICE IN RESPONSE TO A CHANGE OF AN OPERATING MODE OF THE DEVICE

Номер: US20200184114A1
Принадлежит:

An indication of a change to an operating mode of a device may be received. A cryptographic item stored at a memory of the device may be identified. In response to receiving the indication of the change to the operating mode of the device, the cryptographic item stored at the memory may be modified. The device may operate in the changed operating mode based on the modified cryptographic item. 1. A method comprising:receiving an indication of a change to an operating mode of a device;identifying a cryptographic item stored at a memory of the device;in response to receiving the indication of the change to the operating mode of the device, modifying, by a processing device, the cryptographic item stored at the memory; andoperating the device in the changed operating mode based on the modified cryptographic item.2. The method of claim 1 , wherein the cryptographic item corresponds to an identification of the device with a digital signature claim 1 , and wherein the digital signature is based on a private key that is inaccessible to the device.3. The method of claim 1 , wherein the memory is a volatile memory claim 1 , and wherein modifying the cryptographic item stored at the memory comprises:stopping a providing of power to the volatile memory to erase the cryptographic item stored at the volatile memory.4. The method of claim 1 , wherein the memory is a non-volatile memory claim 1 , and wherein modifying the cryptographic item stored at the memory corresponds to an overwriting or an erasing of the cryptographic item stored at the non-volatile memory.5. The method of claim 1 , wherein the indication of the change to the operating mode of the device corresponds to a detection of a tampering of the device.6. The method of claim 5 , wherein the tampering of the device is associated with an opening of the device.7. The method of claim 1 , wherein the cryptographic item indicates the operating mode of the device claim 1 , and wherein an absence of the cryptographic item ...

Подробнее
14-07-2016 дата публикации

METHOD AND APPARATUS FOR SECURELY SAVING AND RESTORING THE STATE OF A COMPUTING PLATFORM

Номер: US20160203340A1
Принадлежит:

An apparatus and method for securely suspending and resuming the state of a processor. For example, one embodiment of a method comprises: generating a data structure including at least the monotonic counter value; generating a message authentication code (MAC) over the data structure using a first key; securely providing the data structure and the MAC to a module executed on the processor; the module verifying the MAC, comparing the monotonic counter value with a counter value stored during a previous suspend operation and, if the counter values match, then loading processor state required for the resume operation to complete. Another embodiment of a method comprises: generating a first key by a processor; securely sharing the first key with an off-processor component; and using the first key to generate a pairing ID usable to identify a pairing between the processor and the off-processor component. 1. A method comprising:generating a first key;securely sharing the first key with an off-processor component; andusing the first key to generate a pairing ID usable to identify a pairing between the processor and the off-processor component.2. The method as in further comprising:storing the pairing ID in a platform database; andsubsequently querying the platform database to determine whether to provision attestation keys to a computer system containing the pairing.3. The method as in further comprising:injecting the pairing ID into one or more other security keys used in a computer system containing the pairing.4. The method as in wherein the one or more other security keys comprise security keys used for establishing secure enclaves on the computer system.5. The method as in wherein generating the first key comprises using a digital random number generator (DRNG) to generate a random number to be used for the first key.6. The method as in wherein injecting comprises using a second key to generate a message authentication code over both the pairing ID and the one or more ...

Подробнее
13-07-2017 дата публикации

SECURING ELECTRONIC PROPERTY FROM UNAUTHORIZED USE

Номер: US20170200025A1
Автор: SHAPIRO Steven
Принадлежит:

An apparatus is provided. The apparatus includes processing circuitry including a processor and a memory that contains instructions that, when executed by the processor, configure the processor to receive an activation request including identification data from a device, determine whether functionality of the device is authorized for activation based on the identification data, and in response to determining the device is not authorized for activation, cause transmission of a message configured to cause functionality of the device to remain deactivated while keeping communication capability of the device activated. The memory containing instructions that, when executed by the processor, configure the processor to, in response to determining the device is authorized for activation, one of (a) cause transmission of a message configured to cause functionality of the device to activate and (b) prevent transmission of a message, the prevention indicating whether activation of functionality of the device is authorized. 1. An apparatus for controlling activation and deactivation of functionality of a device , the apparatus comprising: receive an activation request from a device, the activation request including identification data of the device;', 'determine whether functionality of the device is authorized for activation based on the identification data;', 'in response to determining the device is not authorized for activation, cause transmission of a message to the device, the message configured to cause functionality of the device to remain deactivated while keeping communication capability of the device activated; and', 'in response to determining the device is authorized for activation, one of (a) cause transmission of a message to the device, the message configured to cause functionality of the device to activate and (b) prevent a transmission of a message to the device, the prevention indicating whether activation of functionality of the device is authorized., ' ...

Подробнее
27-06-2019 дата публикации

METHOD AND APPARATUS FOR PROTECTING CREDITABILITY OF SERVER HARDWARE BASED ON BASEBOARD MANAGEMENT CONTROLLER

Номер: US20190197261A1
Принадлежит:

A method for protecting the credibility of a server's hardware, the method including: setting reference values of credible components, encrypting the reference values, and writing the encrypted reference values to available record regions in the Field Replaceable Unit (FRU) of a server; obtaining information of target components of the server, and parsing and extracting needed data fields; and reading the encrypted reference values from the FRU, performing decryption operations, and determining whether the obtained component information is matched with the reference value; if they are not matched, one hardware component of the server is incredible, and a power-off operation is performed, otherwise the hardware of the server is credible, and the server is allowed to continue to run. 1. A method for protecting the credibility of a server's hardware , the method comprising:1): setting reference values of credible hardware components, encrypting the reference values, and writing the encrypted reference values to available record regions in the Field Replaceable Unit (FRU) of a server;2): measuring the credibility of a hardware component, obtaining information of a target hardware component of the server through the baseboard management controller (BMC), then parsing and extracting needed target fields from the byte data stream; and3): reading the encrypted reference value from the FRU, then performing a decryption operation, and then completing a hardware credibility validation, and determining whether the obtained component information is matched with the reference value; if the obtained information of the component is not matched with the reference value, the hardware of the server is incredible, and a power-off operation is performed, otherwise the hardware of the server is credible, and the server is allowed to continue to run.2. The method of claim 1 , wherein 1) is implemented as follows: obtaining a reference value from a user input claim 1 , encrypting and ...

Подробнее
20-07-2017 дата публикации

Unlocking a storage device

Номер: US20170206373A1
Принадлежит: Hewlett Packard Development Co LP

An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock the storage device during a procedure to transition the electronic device from the lower power state to a higher power state. The predetermined information is different from a credential for use in unlocking the storage device.

Подробнее
02-10-2014 дата публикации

Increased Flexibility of Security Framework During Low Power Modes Management

Номер: US20140298480A1
Принадлежит: St Ericsson SA

The present invention relates to a method of managing switching from a first mode of operation to a second mode of operation a first processor in a processing device which comprises at least one other processor and a controller processor. The method comprises receiving a message which comprises a request to switch the first processor from a first to a second mode of operation; deciding whether the switching is appropriate; and upon decision of switching, switching the first processor from a first mode of operation to a second mode of operation according to the selected type of switching.

Подробнее
28-07-2016 дата публикации

UNLOCKING A STORAGE DEVICE

Номер: US20160217304A1
Принадлежит:

An electronic device has a lower power state in which power to a storage device is disabled. Predetermined information stored in a memory is useable to unlock the storage device during a procedure to transition the electronic device from the lower power state to a higher power state. The predetermined information is different from a credential for use in unlocking the storage device. 1. A method comprising:performing a procedure to transition an electronic device from a lower power state to a higher power state, wherein power to a storage device of the electronic device is disabled in the lower power state; and producing unlocking information based on predetermined information stored in a memory prior to placing the electronic device in the lower power state, the predetermined information different from the credential, and', 'providing the unlocking information to the storage device to allow for generation of a credential to unlock the storage device., 'as part of the procedure to transition the electronic device from the lower power state to the higher power state2. The method of claim 1 , wherein producing the unlocking information comprises computing an encryption key based on the predetermined information stored in the memory claim 1 ,wherein providing the unlocking information comprises providing the computed encryption key to the storage device, wherein the computed encryption key is useable by the storage device to generate the credential to unlock the storage device.3. The method of claim 2 , wherein computing the encryption key comprises computing the encryption key based on a seed key and a counter value that were stored in the memory prior to placing the electronic device in the lower power state claim 2 , where the predetermined information includes the seed key and the counter value.4. The method of claim 3 , wherein computing the encryption key comprises computing the encryption key using a HMAC (hash-based message authentication code)-based-one-time- ...

Подробнее
25-06-2020 дата публикации

POWER SUPPLY CONTROL CIRCUIT WITH CONFIGURATION VALIDATION

Номер: US20200202042A1
Принадлежит:

A power supply control circuit includes serial communication circuitry, non-volatile memory, and a controller circuit. The serial communication circuitry is configured to receive configuration information. The configuration information includes a data structure containing validation information identifying a controller. The non-volatile memory is configured to store the configuration information, and to store identification information that identifies the power supply control circuit. The controller circuit is configured to compare the validation information to the identification information, and to apply the configuration information to configure the power supply control circuit responsive the comparison indicating that the validation information is the same as the identification information. 1. A power supply control circuit , comprising:serial communication circuitry configured to receive configuration information, wherein the configuration information comprises a data structure containing validation information identifying a power supply controller; the configuration information; and', 'identification information that identifies the power supply control circuit; and, 'non-volatile memory storing identify the validation information in the configuration information;', 'retrieve the identification information from the non-volatile memory;', 'compare the validation information to the identification information;', 'determine whether the configuration information is intended to be used by the power supply control circuit;', 'and', 'apply the configuration information to configure the power supply control circuit based on a determination that the configuration information is intended to be used by the power supply control circuit., 'a controller circuit coupled to the serial communication circuitry and the non-volatile memory, and configured to2. The power supply control circuit of claim 1 , wherein the controller circuit is configured to compare a controller part ...

Подробнее
04-07-2019 дата публикации

INTEGRATED CIRCUIT, CONTROL DEVICE, INFORMATION DISTRIBUTION METHOD, AND INFORMATION DISTRIBUTION SYSTEM

Номер: US20190207775A1
Принадлежит:

The integrated circuit includes a CPU configured to operate according to a program, a PUF information output unit configured to output PUF information while power is being supplied, a key pair output unit configured to output a public key and a private key based on the PUF information while power is being supplied, a public key transmitter configured to transmit the public key output from the key pair output unit to the outside, and a shared encryption key decryption unit configured to decrypt encrypted information produced through encryption with the public key and received from the outside with the private key output from the key pair output unit. 1. An integrated circuit comprising:a controller configured to operate according to a program;a physically unclonable function (PUF) information output unit configured to output PUF information while power is being supplied;a key pair output unit configured to output a public key and a private key based on the PUF information while power is being supplied;a public key transmitter configured to transmit the public key output from the key pair output unit to an outside; anda decryption unit configured to decrypt encrypted information, produced through encryption with the public key and received from the outside, with the private key output from the key pair output unit.2. The integrated circuit according to claim 1 , wherein the public key transmitter is configured to transmit the public key output from the key pair output unit to the outside before shipment claim 1 , andthe decryption unit is configured to decrypt the encrypted information received from the outside with the private key output from the key pair output unit after shipment.3. The integrated circuit according to claim 1 , wherein the decryption unit is configured to decrypt a shared encryption key claim 1 , with which information to be protected is encrypted claim 1 , as the encrypted information with the private key output from the key pair output unit.4. ...

Подробнее
04-08-2016 дата публикации

NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM FOR STORING APPLICATION PROGRAM FOR NETWORK CERTIFICATION

Номер: US20160226873A1
Принадлежит:

A non-transitory computer readable storage medium for storing an application program for network certification is disclosed. The application program is implemented by an electrical device for executing a wireless network certification process. The wireless network certification process includes the following steps: driving a network module of the electrical device to receive a certification code broadcasted by a wireless network access point (AP), determining if the certification code is in an identified list, executing an action to limit communication between the electrical device and the network AP when the certification code is not in the identified list, and receiving a password for removing the limitation of the communication. 1. A non-transitory computer readable storage medium for storing an application program for network certification , the application program being implemented by an electrical device to execute a network certification process , the network certification process comprising the steps of:driving a network module of the electrical device to receive a certification code, which is broadcasted by a network access point (AP);determining if the certification code is in an identified list;when the certification code is not in the identified list, the application program executing a first action to limit the electrical device to a limited function mode;when an unlock password is received, the application program executing a second action to unlock the electrical device to an un-limited function mode; andwhen the electrical device is in the un-limited function mode and a connecting password is received, driving the network module of the electrical device to connect to the network AP.2. The non-transitory computer readable storage medium of claim 1 , wherein the network certification process further comprises the step of:when the certification code is in the identified list and the connecting password is received, driving the network module of the ...

Подробнее