Freeze logic
    31.
    发明授权

    公开(公告)号:US10712385B2

    公开(公告)日:2020-07-14

    申请号:US15780009

    申请日:2016-12-01

    Abstract: A first plurality of logic gates and a second plurality of logic gates may be associated with a symmetric configuration. A first output at a first value may be generated by the first plurality of logic gates based on a first portion of input signals. A second output may be generated by the second plurality of logic gates at the first value based on a second portion of the input signals. A subsequent first output at a particular value may be generated by the first plurality of logic gates based on a first portion of a second plurality of input signals and a subsequent second output maybe generated by the second plurality of logic gates based on a second portion of the second plurality of input signals. A value of the subsequent second output may be complementary to the particular value of the subsequent first output.

    PROVIDING ACCESS TO A HARDWARE RESOURCE BASED ON A CANARY VALUE

    公开(公告)号:US20200220709A1

    公开(公告)日:2020-07-09

    申请号:US16722407

    申请日:2019-12-20

    Abstract: A container corresponding to executable code may be received. In response receiving the container, an assertion value may be stored in an assertion register. A final canary value may be generated based on a cycles combining a prior canary value and a mix value. A determination may be made as to whether the final canary value matches with the assertion value stored in the assertion register. In response to determining that the final canary value matches with the assertion value, one or more privilege registers may be programmed to provide access to hardware resources for the container corresponding to the executable user code.

    Determining cryptographic operation masks for improving resistance to external monitoring attacks

    公开(公告)号:US10699030B2

    公开(公告)日:2020-06-30

    申请号:US15533845

    申请日:2015-11-23

    Abstract: Systems and methods for determining cryptographic operation masks for improving resistance to external monitoring attacks. An example method may comprise: selecting a first input mask value, a first output mask value, and one or more intermediate mask values; based on the first output mask value and the intermediate mask values, calculating a first transformation output mask value comprising two or more portions, wherein concatenation of all portions of the first transformation output mask value produces the first transformation output mask value, and wherein exclusive disjunction of all portions of the first transformation output mask value is equal to the first output mask value; and performing a first masked transformation based on the first transformation output mask value and the first input mask value.

    Protecting media items using a media security controller

    公开(公告)号:US10460084B2

    公开(公告)日:2019-10-29

    申请号:US16122362

    申请日:2018-09-05

    Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.

    Secure data provisioning
    38.
    发明授权

    公开(公告)号:US10440000B2

    公开(公告)日:2019-10-08

    申请号:US15322707

    申请日:2015-07-09

    Abstract: A first instruction to store an entity identification (ID) in a memory of a device may be received. The entity ID may be stored in the memory in response to receiving the first instruction. Furthermore, a second instruction to store a value based on a key in the memory of the device may be received. A determination may be made as to whether the value based on the key that is to be stored in the memory corresponds to the entity ID that is stored in the memory. The value based on the key may be stored in the memory of the device when the value based on the key corresponds to the entity ID.

    CRYPTOGRAPHIC OPERATIONS EMPLOYING NON-LINEAR SHARE ENCODING FOR PROTECTING FROM EXTERNAL MONITORING ATTACKS

    公开(公告)号:US20190296898A1

    公开(公告)日:2019-09-26

    申请号:US16311148

    申请日:2017-06-23

    Inventor: Elke De Mulder

    Abstract: Systems and methods for performing cryptographic data processing operations employing non-linear share encoding for protecting from external monitoring attacks. An example method may comprise: receiving a plurality of shares representing a secret value employed in a cryptographic operation, wherein plurality of shares comprises a first share represented by an un-encoded form and a second share represented by an encoded form; producing a transformed form of the second share; and performing the cryptographic operation using the transformed form of the second share.

    Non-volatile memory for secure storage of authentication data

    公开(公告)号:US10303623B2

    公开(公告)日:2019-05-28

    申请号:US15469999

    申请日:2017-03-27

    Abstract: A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the first non-volatile memory and the second non-volatile memory and may receive a request to perform an authentication operation. In response to the request to perform the authentication operation, the authentication component may access the first data stored at the first non-volatile memory and the second data stored at the second non-volatile memory and determine whether the second data stored at the second non-volatile memory has become unreliable based on a memory disturbance condition. In response to determining that the second data stored at the second non-volatile memory has become unreliable, a corrective action associated with the first data stored at the first non-volatile memory may be performed.

Patent Agency Ranking