User/Enterprise Data Protection Preventing Non-Authorized Firmware Modification

    公开(公告)号:US20200082088A1

    公开(公告)日:2020-03-12

    申请号:US16127730

    申请日:2018-09-11

    Abstract: Various embodiments include methods and devices for implementing protection of data by preventing non-authorized firmware modification on a computing device. Embodiments may include measuring, by a software program, an image of a firmware update producing a measurement of the image of the firmware update, modifying a version identifier of a prior installed firmware producing a version identifier of the firmware update, applying a root key generation algorithm to the measurement of the image of the firmware update, the version identifier of the firmware update, and an enroll identity credential, generating an enroll encryption root key as an output of the root key generation algorithm, applying a seed key encryption algorithm to the enroll encryption root key and an enroll encryption seed key, and generating a sealed encryption seed key as an output of the seed key encryption algorithm.

    METHODS FOR DETECTING AN IMMINENT POWER FAILURE IN TIME TO PROTECT LOCAL DESIGN STATE

    公开(公告)号:US20200176971A1

    公开(公告)日:2020-06-04

    申请号:US16782761

    申请日:2020-02-05

    Abstract: In certain aspects of the disclosure, a system includes an isolation device coupled between a first circuit in a first power domain and a second circuit in a second power domain. The system also includes a second power source coupled to a power distribution network, wherein the power distribution network is configured to distribute power from a first power source to the second power domain. The system further includes a failure detector having an input coupled to a node on the power distribution network located upstream of the second power source, and an output coupled to the isolation device, wherein the failure detector is configured to sense a voltage at the node, to detect a power loss of the first power source based on the sensed voltage, and to enable the isolation device in response to detection of the power loss.

    PATCHABLE HARDWARE FOR ACCESS CONTROL
    4.
    发明申请

    公开(公告)号:US20200004697A1

    公开(公告)日:2020-01-02

    申请号:US16024596

    申请日:2018-06-29

    Abstract: In an aspect, an apparatus defines a group of registers that includes at least one of a plurality of registers in an integrated circuit. Each of the plurality of registers in the integrated circuit may be constrained to one of a plurality of fixed groups of registers. The apparatus applies a first set of access control rules to the group of registers, the first set of access control rules configured to override any of a second set of access control rules applied to the one or more fixed groups of registers.

    FLEXIBLE RESOURCE ACCESS CONTROL
    5.
    发明申请

    公开(公告)号:US20190334919A1

    公开(公告)日:2019-10-31

    申请号:US15965573

    申请日:2018-04-27

    Abstract: One feature pertains to a device that includes memory circuits having resource groups and access control circuitry. The access control circuitry establishes a tiered resource group access control scheme where security and access control properties of each resource group are managed by at least one of a hard governor execution environment or at least one soft governor execution environment. The access control circuitry also enforces access permissions of each resource group set by at least one of the hard governor execution environment or the at least one soft governor execution environment of each resource group.

    INTEGRATED CIRCUIT DATA PROTECTION
    6.
    发明申请

    公开(公告)号:US20190278914A1

    公开(公告)日:2019-09-12

    申请号:US16296066

    申请日:2019-03-07

    Abstract: Techniques for providing data protection in an integrated circuit are provided. An example method according to these techniques includes determining that an unauthorized update has been made to software or firmware associated with the integrated circuit, and corrupting an anti-replay counter (ARC) value, maintained in a one-time programmable memory of the integrated circuit and used by the integrated circuit to protect contents of a non-volatile memory, responsive to determining that the unauthorized update has been made to the software or the firmware.

Patent Agency Ranking