Match Document Document Title
9043932 Managing physical presence across multiple blades  
A method uses a firmware interface setup program for a selected compute node (“node”) to cause a firmware interface to enable a trusted platform module (TPM) on the selected node to receive a...
9043933 Method of processing data to enable external storage thereof with minimized risk of information leakage  
A method is provided to process data so that the data can be externally stored with minimized risk of information leakage. A framework (virtual execution framework) based on virtual machines (VMs)...
9038138 Device token protocol for authorization and persistent authentication shared across applications  
Various techniques for providing a device token protocol for authorization and persistent authentication shared across applications are disclosed. In some embodiments, a device token protocol for...
9032222 Secure point of sale terminal  
A data entry device including a housing formed of at least two portions, data entry circuitry located within the housing, at least one case-open switch assembly operative to sense when the housing...
9032519 Protecting websites from cross-site scripting  
Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web...
9032221 Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system  
An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is...
9032210 Mobile electronic device configured to establish secure wireless communication  
The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to...
9032530 Correcting workflow security vulnerabilities via static analysis and virtual patching  
A computer program can be statically analyzed to determine an order in which client side workflows are intended to be implemented by the computer program. A virtual patch can be generated. When...
9026806 Method and device for providing a cryptographic key for a field device  
A security device and a method provide a cryptographic key for a field device. The security device is connected to at least one tamper sensor which is associated with the field device and which,...
9021261 Integrated secure and non-secure display for a handheld communications device  
A handheld communications device is created with a touch sensitive display, a secure computing component, and a non-secure computing component. The secure component may comprise a secure CPU...
9021603 Non-volatile memory for anti-cloning and authentication method for the same  
A method and a non-volatile memory apparatus for cloning prevention is provided. The non-volatile memory apparatus includes an Enhanced Media Identification (EMID) area, which is located in a...
9021596 Correcting workflow security vulnerabilities via static analysis and virtual patching  
A computer program can be statically analyzed to determine an order in which client side workflows are intended to be implemented by the computer program. A virtual patch can be generated. When...
9015500 Method and apparatus for using dynamic voltage and frequency scaling with circuit-delay based integrated circuit identification  
One feature pertains to a method that includes implementing a Physical Unclonable Function (PUF) circuit, and obtaining a first set of output bits from the PUF circuit by operating the PUF circuit...
9009809 Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM  
A computer or microchip including a system BIOS located in flash memory which is located in a portion of the computer or microchip protected by an inner hardware-based access barrier or firewall,...
RE45473 Copy protection using detailed copy control information  
Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified...
9009860 Tamper resistance extension via tamper sensing material housing integration  
Systems and apparatuses disclosed herein provide for a tamper resistant electronic device. The electronic device can include a circuit board, housing, a security shield, one or more pressure...
9003203 Storage encryption  
Storage associated with a virtual machine or other type of device may be migrated between locations (e.g., physical devices, network locations, etc.). To maintain the security of the storage, a...
9003510 Computer or microchip with a secure system bios having a separate private network connection to a separate private network  
A computer or microchip including a network connection for connection to a public network of computers including the Internet, the network connection being located in a public unit; and an...
9003519 Verifying transactions using out-of-band devices  
The present disclosure relates to verifying transactions using user devices. A client device used to complete a transaction with a server computer. The client device communicates with a user...
9003199 Modular cryptographic device providing multi-mode wireless LAN operation features and related methods  
A cryptographic device may include a cryptographic module and a communications module removably coupled thereto. The cryptographic module may include a first housing, a user Local Area Network...
8990578 Password authentication circuit and method  
A password authentication circuit includes a timer that measures first and second periods of a password authentication period, a control circuit that, in a first period, disables writing of a...
8984656 Sensitive data aliasing  
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive...
8983072 Portable data carrier featuring secure data processing  
Disclosed is a method for securely processing data in a portable data carrier. Said method is characterized by the following steps: a) the data to be processed is requested; b) the data to be...
8978132 Apparatus and method for managing a microprocessor providing for a secure execution mode  
An apparatus providing for a secure execution environment including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure...
8977868 Flexible printed cable and information processing device  
It is an object of this invention to provide an FPC capable of improving tamper resistance. An FPC (1) of this invention includes: a signal line pattern (2) for inputting a communication signal;...
8972743 Computer security system and method  
A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a trusted platform module (TPM) to...
8971525 Method, module and system for providing cipher data  
A method of providing cipher data during a period of time when output of a primary source of cipher data is unavailable is disclosed. The method comprises switching from a primary source of cipher...
8966289 Pairing of angle sensor and electronic control unit  
Various embodiments relate to a tamper-proof vehicle sensor system and a related method for sending secure packets between components. A sensing unit may include an angular sensor, such as an...
8966284 Hardware driver integrity check of memory card controller firmware  
A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of...
8966264 Signature generation apparatus, signature method, non-transitory computer readable medium storing signature generation program  
A signature generation apparatus includes basic operation execution units each executing a basic operation included in a signature generation procedure; and a whole operation controller connected...
8966638 System, method, and computer program product for selecting a wireless network based on security information  
A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further,...
8959366 De-sequencing encoded data slices  
A method begins by a processing module obtaining at least an ordering threshold number of encoded data slices to produce obtained encoded data slices. The method continues with the processing...
8959363 Systems, methods, and apparatus to virtualize TPM accesses  
Embodiments of system, method, and apparatus for virtualizing TPM accesses is described. In some embodiments, an apparatus including a CPU core to execute a software program, a manageability...
8959641 Foiling a document exploit attack  
A method of foiling a document exploit type attack on a computer, where the attack attempts to extract malware code from within a document stored on the computer. The method includes monitoring...
8955134 Malicious code infection cause-and-effect analysis  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
8953330 Security protection device and method  
A security protection device includes a cover circuit board comprising at least one inner wiring layer and a base circuit board comprising at least one inner wiring layer. The device further...
8955125 Snoop echo response extractor  
A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be...
8954624 Method and system for securing input from an external device to a host  
The pureness of a connection between an external device and a host computer can be inspected or monitored to determine the status: connected or disconnected. When it is determined that a...
8955135 Malicious code infection cause-and-effect analysis  
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer system activities. Upon being...
8949929 Method and apparatus for providing a secure virtual environment on a mobile device  
Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and devices create a secure application...
8943329 Method and apparatus for sharing an integrity security module in a dual-environment computing device  
A method and apparatus are disclosed for sharing an integrity security module in a dual-environment computing device. The apparatus include an integrity security module, one or more processors, a...
8943326 Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data  
A novel system and method for accessing data stored in a secure or tamperproof storage device in a wireless communication device is provided. The wireless communication device may include a...
8938627 Multilayer securing structure and method thereof for the protection of cryptographic keys and code  
An arrangement for the protection of cryptographic keys and codes from being compromised by external tampering, wherein the arrangement is utilized within a multilayered securing structure. More...
8935523 Cryptographic protected communication system with multiplexed cryptographic cryptopipe modules  
An auditable cryptographic protected communication system for connecting an enterprise server to a plurality of industrial devices using messaging protocols for each industrial device enabling the...
8935520 Control word obfuscation in secure TV receiver  
A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler in a normal operating mode. The...
8930711 Critical security parameter generation and exchange system and method for smart-card memory modules  
A storage device contains a smart-card device and a memory device, which is connected to a controller. The storage device may be used in the same manner as a conventional smart-card device, or it...
8931084 Methods and systems for scripting defense  
Methods and systems for cross-site scripting (XSS) defense are described herein. An embodiment includes, embedding one or more tags in content at a server to identify executable and non-executable...
8930600 Protecting circuit for basic input output system chip  
A protecting circuit for a basic input output system (BIOS) chip of a computer includes a platform controller hub (PCH), an inverting circuit connected to the PCH, a BIOS socket to connect the...
8925072 Unlocking schemes  
An end device may include a camera configured to capture an image of an object, a touch screen configured to receive a touch input and a processor configured to determine to unlock the end device...
8913739 Method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems  
A method and device for transforming data with a secret parameter in an elliptic curve cryptosystem based on an elliptic curve defined over an underlying prime field, includes multiplying a point...