Patent application number | Description | Published |
20100106954 | Multi-Layer Content Protecting Microcontroller - The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation. | 04-29-2010 |
20140006190 | Secure Payments with Untrusted Devices | 01-02-2014 |
20140040584 | Multi-layer content protecting microcontroller - The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation. | 02-06-2014 |
20140095564 | System and Method with Specific Ordered Execution Over Physical Elements - The invention relates to semiconductor devices, and more particularly, to systems, devices and methods of utilizing inherent differences among physical elements in an electrical component to generate unique and non-duplicable numbers that are statistically random and repeatable. These bits may be applied as identifications, random number seeds or encryption keys in many security applications, e.g., a financial terminal. An integrator is coupled to a plurality of physical elements, selects two physical elements or element sets, and generates an integrated difference signal according to a difference between these two physical elements or element sets. A comparison-decision logic further determines whether the difference between the selected two physical elements is associated with a bit of “1” or “0”. In some embodiments, a multi-bit number constitutes multiple bits each of which may be derived from a difference between two randomly selected physical elements or element sets. | 04-03-2014 |
20140299664 | SECURE PAYMENT CARD INTERFACE - The invention relates to a smartcard reader, and more particularly, to systems, devices and methods of creating a card input/output interface that allows the smartcard reader to couple to a smartcard within a secure cavity. The secure cavity is mounted on an internal side of a system housing, i.e., a smartcard socket, included in the smartcard reader. An interface chip is further attached inside the secure cavity. When the smartcard is inserted to a designated position or depth inside the system housing, the secure cavity encloses the interface chip and its contact area with the smartcard. Mechanical contacts on the interface chip are thus aligned to and physically contact electrical connectors on the inserted smartcard, so as to electrically couple the interface chip and the smartcard. As a result, sensitive data within the smartcard may be protected from exposure to any tamper attempt and processed with an enhanced security level. | 10-09-2014 |
20140369495 | Secure modules using unique identification elements - Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying identification elements uniquely associated with modules or elements. These unique identification elements provide an improved, statistically random source from which keys may be derived. The application of these keys across various architectures result in an improvement in the security of data communicated within a system. | 12-18-2014 |
20160087795 | SECURE MEMORIES USING UNIQUE IDENTIFICATION ELEMENTS - Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying identification elements uniquely associated with memory, memory mapping and encrypted storage. These unique identification elements provide an improved, statistically random source from which keys and memory mappings may be derived. The application of these keys across various architectures result in an improvement in the security of data stored within a system. | 03-24-2016 |
20160099714 | SYSTEMS AND METHODS FOR ENHANCING CONFIDENTIALITY VIA LOGIC GATE ENCRYPTION - Presented are systems and methods that allow hardware designers to protect valuable IP and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input. In certain embodiments, a logic function provides results that are dependent not only on input values but also on an encrypted logic key that determines connections for a given logic building block, such that the functionality of the logic function cannot be determined by reverse engineering. In some embodiments, the logic key is created by decrypting a piece of data using a secret decryption key. Advantages of automatic encryption include that existing circuitry need not be re-implemented or re-built, and that the systems and methods presented are backward compatible with standard manufacturing tools. | 04-07-2016 |