System and method for detecting activities within a computerized device based on monitoring of its power consumption

    公开(公告)号:US10817605B2

    公开(公告)日:2020-10-27

    申请号:US15128352

    申请日:2015-03-22

    Abstract: The invention relates to a system for protecting a computerized device from a malicious activity resulting from a malicious code, which comprises: (a) a first DC supply monitoring unit which is located within a separate computerized environment, namely an environment which is totally separated and isolated both physically and in terms of connectivity from the hardware and software of the computerized environment of the device; (b) a memory database for storing one or more signatures of known malicious events, each of said signatures describes the temporal effect of a malicious event, respectively, on the power consumption from the DC supply of the device; and (c) a microprocessor within said DC supply monitoring unit for continuously monitoring the power consumption from said DC supply of the device, comparing temporal characteristics of the power consumption with said malicious events signatures in said database, and alerting upon detection of a match, wherein said DC supply monitoring unit is at most physically connected to the DC supply of the device.

    CAPACITIVE WIRELESS POWER TRANSFER BY MEANS OF ADAPTIVE MATCHING NETWORKS

    公开(公告)号:US20200287413A1

    公开(公告)日:2020-09-10

    申请号:US16651225

    申请日:2018-11-06

    Abstract: A controlled wireless Capacitive Power Transfer (CPT) system includes a primary side for wirelessly transmitting power to a secondary side via coupling plates having mutual capacitance CM. A primary adaptive matching network regulates the current flowing to the secondary side. A primary controller includes a first control loop for adjusting the switching frequency fsw to compensate for changes in the impedance of the primary matching network. A second control loop adjusts the resonant frequency of the primary resonant circuit to track the switching frequency fsw. A secondary adaptive matching network is comprised of a secondary resonant circuit with a bias-controlled variable secondary inductor serially connected to the mutual capacitance CM and a capacitor parallelly connected to the mutual capacitance CM, for matching the impedance of the secondary matching network. A secondary controller adjusts the impedance of the secondary matching network to match the resonant frequency of the primary resonant circuit.

    METHOD AND SYSTEM FOR PERFORMING BROADCAST ENCRYPTION WITH REVOCATION CAPABILITY

    公开(公告)号:US20200186347A1

    公开(公告)日:2020-06-11

    申请号:US16611032

    申请日:2018-05-10

    Abstract: A broadcast encryption method that allows a broadcaster to send encrypted content to a set of users such that only a subset of authorized users can decrypt the content, and to perform both temporary and permanent revocation of users. Accordingly, during a Setup stage, a Key Service generates a public key and a Master Secret Key (MSK) and sends the Public Parameters PP used to generate the public key to a broadcaster and to all users. The broadcaster uses the Public Parameters PP to create a message M, with which the broadcaster encrypts the content, and further creates a Cipher Text (CT), which is sent to all users. During a Key Gen stage, whenever a user wishes to decrypt the message M for decrypting the content, the user sends a request with his ID1 to the Key Service. The Key Service generates a corresponding secret key SKID1 and the secret key SKID1 is sent to the user ID1 via a secure data channel. During a Decrypt stage, the user uses the secret key SKID1, to decrypt the Cipher Text (CT) and obtain the message M. During a Revoke stage of k users (k=1, 2, 3, . . . ) a State Update Message (SUM) which is sent to all users, is provided and each user updates his state with the SUM he received, such that the k users having identities ID1, ID2, . . . IDk will not be able to update their state and will be permanently revoked, while all the remaining users being admitted users will be able to update their state and will not be revoked. Temporary revocation is done by inserting a list of IDs (ID1, ID2, . . . IDk) to be revoked into the CT.

Patent Agency Ranking