摘要:
A tamper-indicating assembly includes a container formed by a plurality of walls and a door mechanically coupled to at least one of the walls via a hinge. At least one cable extends at least partially through the hinge between the door and the at least one wall. The cable transmits a signal, and the assembly can identify potential tamper events related to opening and closing of the door based on changes in properties of the transmitted signal. Techniques for forming the assembly are also described.
摘要:
An anti-tamper enclosure system comprises an optical medium; at least one photosensitive sensor configured to measure at least one characteristic of a light wave transmitted in the optical medium; at least one logic circuit coupled to the at least one photosensitive sensor, the at least one logic circuit configured to initiate security measures when the at least one characteristic of the light wave changes; an enclosure coupled to the optical medium and configured to enclose the optical medium, the at least one photosensitive sensor, and the at least one logic circuit; and a plurality of attachment posts configured to be coupled to a printed circuit board, wherein at least one of the plurality of attachment posts is also coupled to the optical medium.
摘要:
Systems and methods for protecting electronic and other sensitive devices in the event of security breaches such as physical intrusion or access, tampering, and attempts at reverse engineering. One aspect of the present invention provides security systems and methods that utilize an active security measure that can identify a security breach and respond with a protective action. Protective actions may include erasure or randomizing of data or software, activation of an alarm or signal (such as at a remote location), or destruction of any portion of a protected device or circuit or the like.
摘要:
A passive optical anti-tamper system including one or more light pipes, one or more light detectors and an alarm. The light pipes each include an input end and an output end and are located within a chassis with the one or more light detectors. The one or more light detectors are optically coupled to the output ends of the one or more light pipes. The alarm is operable to transmit a tamper-event-warning signal if an increased light level is detected by at least one detector.
摘要:
A method of recognizing a tamper event is provided. The method uses an optical medium having a unique signature, and transmits at least one light wave into the optical medium. The light wave is altered by the unique signature of the optical medium and at least one property of the light wave is measured. Access to at least a portion of a system is conditioned based on the at least one property of the light wave.
摘要:
An integrated circuit (IC) package with a fibrous interface is provided. The package includes a substrate, a bond coat and a top coat. The substrate is configured to contain IC components and connections. The bond coat layer is configured to encapsulate the IC components. The top coat layer has at least a portion embedded in the bond coat layer. Moreover, the top coat layer includes a fibrous interface configured to provide security and strengthen the bond coat layer.
摘要:
A package includes a chassis, a plurality of components arranged within the chassis, a plurality of RFID devices, and at least one processing device. The RFID devices are arranged at a plurality of locations to form an array configured to authenticate compliance of the actual configuration of the package with a model configuration. The processing device is configured to communicate with the RFID devices, determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices, and set an operational mode of one or more of the components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration.
摘要:
A system may include a first connector housing, a magnetic data storage device mechanically coupled to the first connector housing, a second connector housing configured to be mechanically engaged with the first connector housing, and a permanent magnet mechanically coupled to the second cavity. In some examples, relative motion between the magnetic data storage device and the permanent magnetic causes data stored on the magnetic data storage device to be modified. In one example, the system further includes a printed board assembly mechanically coupled to one of the first or second connector housings and a master interconnect board mechanically coupled to the other one of the first or connector housings. Modification to the data stored on the magnetic data storage device may indicate relative movement between the first and second connector housings.
摘要:
An apparatus to indicate unauthorized manipulation of at least one protected device enclosed in a housing is provided. The apparatus includes a structure attached to a first portion of the housing and a token switch attached to a second portion of the housing. The token switch is operably positioned with reference to the structure. The token switch includes a plunger, and a register programmed with a value. The register is communicatively coupled with a processor in a circuit. The circuit is communicatively coupled to drive the device. The structure, the token switch, and the circuit are internal to the housing when the housing is in a closed position. The plunger and the structure are positioned to generate a current when the housing is opened. The programmed value in the register is changed by the generated current and the processor takes an action responsive to the change in the programmed value.
摘要:
A method and system for destroying information stored on a data storage device located onboard a vehicle in order to prevent unfriendly forces from obtaining the information is described. The method and system are initiated when the operator of the vehicle activates a triggering mechanism. The information may be destroyed by physically damaging the data storage device on which the information is stored or by releasing a software virus into the device on which the sensitive information is stored. A software virus may also be transmitted to a computer of an unfriendly force attempting to access the sensitive information.