METHOD FOR SECURELY PROCESSING DIGITAL INFORMATION IN A SECURE ELEMENT

    公开(公告)号:WO2021198035A1

    公开(公告)日:2021-10-07

    申请号:PCT/EP2021/057819

    申请日:2021-03-25

    Abstract: The method for securely processing digital information, has the following steps, performed by a secure element (100) having a secure processor (102): - loading (S10) the digital information (Si'') from an external memory (200) into the secure element (100); - segmenting (S13) the digital information (Si) into words of digital information (Wij,k), generating error-detection codes (EDCj,k) or error- correction codes (ECCi,k) from said words of digital information and associating said error-detection codes with the corresponding words; - transferring (S15) the words of digital information (Wij,k) and the associated error-detection codes (EDCj,k) or error-correction codes (ECCi,k) to the secure processor (102); - in the secure processor (102), verifying (S16) the words of digital information (Wij,k) based on the associated error-detection codes (EDCj,k) or error-correction codes (ECCi,k) before processing the digital information contained in said words (Wij,k).

    METHOD FOR INTRUSION DETECTION TO DETECT MALICIOUS INSIDER THREAT ACTIVITIES AND SYSTEM FOR INTRUSION DETECTION

    公开(公告)号:WO2021148145A1

    公开(公告)日:2021-07-29

    申请号:PCT/EP2020/060573

    申请日:2020-04-15

    Abstract: The present invention provides a Method (100) for intrusion detection to detect malicious insider threat activities within a network (201) of multiple interconnected computerized user profiles (203), comprising the following method steps: - Training (101) a Neural Network on multiple sets of user profile data for multiple user profiles (203) and on multiple sets of activity data (211) of the multiple user profiles (203) of the network (201), such that the Neural Network is capable of predicting for future dates activities for multiple user profiles (203), - Applying (103) the trained Neural Network on the set of further user profile data of the further user profile, - Predicting (105) an activity of the further user profile (204) based on the multiple sets of activity data (211) by the trained Neural Network, - Observing (107) activity of the further user profile (204), - Applying (109) the trained Neural Network on the observed activity, and - Detecting (111) malicious activity for the further user profile (204) by the trained Neural Network, if the observed activity deviates from the predicted activity. The current invention further provides a system (200) configured to execute the method (100)

    COUNTERACTING FRAUDULENT CLOCK READINGS AND SIDE-CHANNEL ATTACKS

    公开(公告)号:WO2023275767A1

    公开(公告)日:2023-01-05

    申请号:PCT/IB2022/056025

    申请日:2022-06-28

    Applicant: R3 LTD.

    Abstract: A computing system provides clock readings from an untrusted code to trusted code, where the trusted code is executed in a secure enclave and the untrusted code is executed outside the secure enclave. The computing system allocates a pointer to shared memory that is shared between the untrusted code and the trusted code. Under control of the untrusted code, the computing system periodically writes a clock reading to the shared memory. Under control of the trusted code, the computing system reads the clock reading stored in shared memory. The untrusted code cannot determine when the trusted code reads a clock reading.

Patent Agency Ranking