Matches 1 - 50 out of 160 1 2 3 4 >


Match Document Document Title
US20100218002 SECURING COMPUTER LOG FILES  
A log file is secured. One implementation involves maintaining a log file including one or more log entries in a storage device connected to a computer, and entering a new log entry by generating...
US20110047389 Trusted Infrastructure Support Systems, Methods and Techniques for Secure Electronic Commerce Electronic Transactions and Rights Management  
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services...
US20110060922 LICENSE MANAGEMENT SYSTEM  
A history file that an IC card received from a receiver is confirmed to be a proper history file, so that a repeat input of a license can be prevented. A server (100) which transmits a license...
US20150154407 APPARATUS FOR TAMPER PROTECTION OF APPLICATION CODE BASED ON SELF MODIFICATION AND METHOD THEREOF  
Disclosed is an apparatus for tamper protection of an application which includes: an input unit that receives codes to be used for an application; a code separator that separates the inputted...
US20080168280 Apparatus for improving computer security  
Indicating when the cover for a computer chassis has been opened is disclosed. A computer of an embodiment of the invention includes a chassis and a basic input/output system (BIOS), or another...
US20060136752 Security hardened disc drive  
A storage device assembly includes a sealed housing having a base and a cover. A storage medium is disposed within the sealed housing. A security feature within the housing is adapted to damage at...
US20150161415 TAMPER-PROTECTED HARDWARE AND METHOD FOR USING SAME  
One of the various aspects of the invention is related to suggesting various techniques for improving the tamper-resistibility of hardware. The tamper-resistant hardware may be advantageously used...
US20140108786 TAMPER-PROTECTED HARDWARE AND METHOD FOR USING SAME  
One of the various aspects of the invention is related to suggesting various techniques for improving the tamper-resistibility of hardware. The tamper-resistant hardware may be advantageously used...
US20140298044 METHOD AND APPARATUS FOR SECURE MEASUREMENT CERTIFICATION  
The invention relates to methods and apparatuses for acquiring a physical measurement, and for creating a cryptographic certification of that measurement, such that its value and time can be...
US20060259790 Implementation of an integrity-protected secure storage  
An internal but not integrated security token is provided for a device which includes a first integrated circuitry including a secure processor. The security token is provided by a second...
US20150134977 PARTITION-BASED APPARATUS AND METHOD FOR SECURING BIOS IN A TRUSTED COMPUTING SYSTEM DURING EXECUTION  
An apparatus including a ROM, a selector, and a detector. The ROM has partitions and encrypted digests. Each of the partitions is stored as plaintext, and each of the encrypted digests includes an...
US20100031065 INFORMATION SECURITY APPARATUS  
Provided is an information security apparatus (1100) that has enhanced stability and confidentiality of a hash key. The information security apparatus (1100) includes an information generating PUF...
US20080288790 Means and Method of Using Cryptographic Device to Combat Online Institution Identity Theft  
Whereas smartcards and similar cryptographic devices may customarily be used to protect against personal identity theft, this invention stores Public Keys of an institution in cryptographic...
US20130073598 Entropy source with magneto-resistive element for random number generator  
An entropy source and a random number (RN) generator are disclosed. In one aspect, a low-energy entropy source includes a magneto-resistive (MR) element and a sensing circuit. The MR element is...
US20100306544 SECURE COMPUTING ENVIRONMENT IN A TRANSPORTABLE CONTAINER  
A secure container can comprise a security server, one or more container servers, and one or more sensors that can detect a breach of the physically secure computing environment provided by the...
US20150134975 SECURE BIOS MECHANISM IN A TRUSTED COMPUTING SYSTEM  
An apparatus including a ROM and a microprocessor. The ROM includes BIOS contents that are stored as plaintext and an encrypted digest. The encrypted digest includes an encrypted version of a...
US20120179921 END TO END ENCRYPTION FOR INTRUSION DETECTION SYSTEM  
An intrusion detection module includes an enclosure and a sensor to detect a predetermined type of intrusion. The module further includes a tamper sensor to detect a tampering attempt. An...
US20050138405 Media transport cassette  
A method of transporting bank notes between a cassette loading center and one of a plurality of automated teller machines (ATMs) is disclosed. The method utilizes a transport cassette for valuable...
US20090006868 Secure storage for digital rights management  
Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these...
US20090327763 Method for Using a Compact Disk as a Smart Key Device  
A data processing method accepts a removable storage media, which becomes electrically engaged with a system unit within the data processing system, after which the removable storage media and the...
US20050039038 Method to secure service provider sensitive data  
Securing intercept related data (or other sensitive service provider data) used by a switch of a telecommunications service provider and stored in a database associated with the switch is...
US20150134978 SECURE BIOS TAMPER PROTECTION MECHANISM  
An apparatus including a ROM, a selector, and a detector. The ROM has a partitions, each stored as plaintext, and a encrypted digests, each comprising an encrypted version of a first digest...
US20070255966 Cryptographic circuit with voltage-based tamper detection and response circuitry  
A cryptographic circuit with voltage island-based tamper detection and response is disclosed. The circuit includes a voltage island having at least one monitoring circuit and a first storage area...
US20090080651 SEMICONDUCTOR WITH HARDWARE LOCKED INTELLECTUAL PROPERTY AND RELATED METHODS  
A computer readable medium includes executable instructions to describe an intellectual property core with a key check mechanism configured to compare an external key with an internal key in...
US20150134976 EVENT-BASED APPARATUS AND METHOD FOR SECURING BIOS IN A TRUSTED COMPUTING SYSTEM DURING EXECUTION  
An apparatus including a ROM, an event detector, and a tamper detector. The ROM has BIOS contents stored as plaintext, and an encrypted digest. The encrypted digest is an encrypted version of a...
US20060195705 Tamper Evident Seal System and Method  
A tape seal includes electronic circuitry to detect tamper- and manipulation events relating to sealed items in various embodiments. A complex impedance is formed in a continuous seal. The seal is...
US20060005050 Tamper-free and forgery-proof passport and methods for providing same  
A smart passport comprising a smart inlay that includes a core substrate operative to store and exchange information contactlessly with an external reader, at least one physical security component...
US20080162949 Program Conversion Device and Program Execution Device  
It is troublesome for a distributor (server) to manage a plurality of programs of different obfuscated levels that are suitable for various devices, including ones having a high-speed CPU but with...
US20080148073 Method for providing secure and trusted ASICs using 3D integration  
A system and a method for providing secure and trusted application specific integrated circuits (ASICs) using three-dimensional (3D) integrated circuit (IC) integration. The method includes...
US20090327732 Long-term secure digital signatures  
The present invention relates to digitally signing of electronic documents which are to be kept secure for a very long time, thereby taking into account future cryptographic developments which...
US20130111222 Verification of Authenticity and Responsiveness of Biometric Evidence And/Or Other Evidence  
Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some...
US20060101288 Secure implementation and utilization of device-specific security data  
The invention concerns a tamper-resistant electronic circuit configured for implementation in a device. The electronic circuit securely implements and utilizes device-specific security data during...
US20060224878 System and method for trusted early boot flow  
In some embodiments, the invention involves extending trusted computing environments to the boot firmware. In at least one embodiment, the present invention is intended to enable the trusted...
US20070168680 Anti-tamper system  
A system in accordance with the present invention prevents tampering of a device. The system includes an encrypted digital signature and a decryption attempt. The encrypted digital signature...
US20120198243 PROGRAM EXECUTION DEVICE  
A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection...
US20130311791 METHOD AND DEVICE FOR PROVIDING A CRYPTOGRAPHIC KEY FOR A FIELD DEVICE  
A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which,...
US20070079146 System and method for providing a virtual binding for a worm storage system on rewritable media  
A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM storage system composed of rewritable...
US20050216757 Persistent servicing agent  
A tamper resistant software Agent for enabling, supporting and/or providing various services (e.g., tracking assets; data delete and updating software) comprises multiple functional modules,...
US20100088528 METHOD AND APPARATUS FOR TAMPER-PROOF WIRTE-ONCE-READ-MANY COMPUTER STORAGE  
Disclosed is a method for storing digital information for storage in an adversarial setting in which trusted hardware enforces digital information compliance with data storage mandates. Secure...
US20080313475 METHODS AND SYSTEMS FOR TAMPER RESISTANT FILES  
Embodiments of the present invention provide a tamper proof file system. In particular, the present invention utilizes a virtual block device that is coupled with a real block device and a...
US20090199018 One time settable tamper resistant software repository  
An individualized per device initialization of a computing device is unique relative to the initialization of other computing devices. A common initialization program, common to all computing...
US20060253714 Information processor, tamper-proof method, and tamper-proof program  
An information processor includes a security module 2 that stores security data, decrypts a signature on the application using a common key to obtain a first hash, and outputs the obtained first...
US20060129821 Believably trustworthy enforcement of privacy enhancing technologies in data processing  
Systems and methods for trustworthy enforcement of privacy enhancing technologies within a data processing system enable data processing systems to communicate a believable statement that privacy...
US20050198521 Program tamper detecting apparatus, method for program tamper detection, and program for program tamper detection  
A program tamper detecting apparatus includes an external memory, an activation ROM and a CPU. The external memory stores a first code for program tamper detecting and a first program, wherein the...
US20090327756 SECURE DIGITAL CONTENT STORAGE DEVICE  
A secure digital content storage device comprising a memory for storing digital data, a decoder, coupled to the memory, for generating analog output based on the digital data, and a secure...
US20080077807 Computer Hard Disk Security  
Computer hard disk security comprises encrypting data on a computer's hard disk with a cryptographic key depending partly on computer memory contents, RAM and/or BIOS memory. Memory contents...
US20150134974 APPARATUS AND METHOD FOR SECURING BIOS IN A TRUSTED COMPUTING SYSTEM  
An apparatus including a BIOS read only memory (ROM) and a tamper detector. The BIOS ROM includes BIOS contents stored as plaintext, and an encrypted message digest comprising an encrypted version...
US20090287942 CLOCK ROLL FORWARD DETECTION  
Method and apparatus to detect clock roll-forward attacks in a computing device or similar system. This protects against hackers who tamper with the system clock of, for instance, a digital media...
US20080059811 Tamper resistant networking  
Methods and apparatus to provide tamper resistant networking are described. In one embodiment, one or more instructions corresponding to a device driver are stored in a memory of a network...
US20080184041 Graph-Based Tamper Resistance Modeling For Software Protection  
Implementation of graph-based tamper resistance modeling for software protection is described. In one implementation, paths of execution of a program are modeled as a graph having nodes and edges....

Matches 1 - 50 out of 160 1 2 3 4 >