摘要:
A system may include a first connector housing, a magnetic data storage device mechanically coupled to the first connector housing, a second connector housing configured to be mechanically engaged with the first connector housing, and a permanent magnet mechanically coupled to the second cavity. In some examples, relative motion between the magnetic data storage device and the permanent magnetic causes data stored on the magnetic data storage device to be modified. In one example, the system further includes a printed board assembly mechanically coupled to one of the first or second connector housings and a master interconnect board mechanically coupled to the other one of the first or connector housings. Modification to the data stored on the magnetic data storage device may indicate relative movement between the first and second connector housings.
摘要:
an integrated circuit (IC) package with a fibrous interface is provided. The package includes a substrate, a bond coat and a top coat. The substrate is configured to contain IC components and connections. The bond coat layer is configured to encapsulate the IC components. The top coat layer has at least a portion embedded in the bond coat layer. Moreover, the top coat layer includes a fibrous interface configured to provide security and strengthen the bond coat layer.
摘要:
An improved system and method are disclosed for non-destructively determining the thickness and uniformity of an anti-tamper coating on a sensitive electronic part, such as, for example, an integrated circuit, multi-chip module, or other type of electronic device, component or equipment. The system includes an anti-tamper coating thickness measurement probe with a highly collimated beta radiation source and a Geiger-Muller tube sensitive to beta radiation arranged in close proximity to the beta radiation source. The probe is placed on or in close proximity to the anti-tamper coating on the part, so that the beta radiation electrons penetrate the coating material and are reflected back (back scattered) toward the beta radiation source and the Geiger-Muller tube. The Geiger-Muller tube collects the electrons from the back scattered radiation.
摘要:
A package includes a chassis, a plurality of components arranged within the chassis, a plurality of RFID devices, and at least one processing device. The RFID devices are arranged at a plurality of locations to form an array configured to authenticate compliance of the actual configuration of the package with a model configuration. The processing device is configured to communicate with the RFID devices, determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices, and set an operational mode of one or more of the components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration.
摘要:
A system may include a first connector housing, a magnetic data storage device mechanically coupled to the first connector housing, a second connector housing configured to be mechanically engaged with the first connector housing, and a permanent magnet mechanically coupled to the second cavity. In some examples, relative motion between the magnetic data storage device and the permanent magnetic causes data stored on the magnetic data storage device to be modified. In one example, the system further includes a printed board assembly mechanically coupled to one of the first or second connector housings and a master interconnect board mechanically coupled to the other one of the first or connector housings. Modification to the data stored on the magnetic data storage device may indicate relative movement between the first and second connector housings.
摘要:
In one embodiment, a system comprises application-specific functionality, anti-tamper functionality to detect an unauthorized attempt to interact with the application-specific functionality; and a hardware key interface to communicatively couple the system to a hardware key. An attempt to interact with the application-specific functionality is considered unauthorized if an authorized hardware key is not communicatively coupled to the hardware key interface when the attempt occurs.