G06F21/71

Platform security mechanism
11698973 · 2023-07-11 · ·

An apparatus to facilitate security within a computing system is disclosed. The apparatus includes a storage drive, a controller, comprising a trusted port having one or more key slots to program one or more cryptographic keys and an encryption engine to receive the cryptographic keys via the one or more key slots, encrypt data written to the storage drive using the cryptographic keys and decrypt data read from the storage drive using the cryptographic keys.

Platform security mechanism
11698973 · 2023-07-11 · ·

An apparatus to facilitate security within a computing system is disclosed. The apparatus includes a storage drive, a controller, comprising a trusted port having one or more key slots to program one or more cryptographic keys and an encryption engine to receive the cryptographic keys via the one or more key slots, encrypt data written to the storage drive using the cryptographic keys and decrypt data read from the storage drive using the cryptographic keys.

Secure processor and a program for a secure processor
11550962 · 2023-01-10 · ·

The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside.

Secure processor and a program for a secure processor
11550962 · 2023-01-10 · ·

The instruction code including an instruction code stored in the area where the encrypted instruction code is stored in a non-rewritable format is authenticated using a specific key which is specific to the core where the instruction code is executed or an authenticated key by a specific key to perform an encryption processing for the input and output data between the core and the outside.

Security Configuration Optimizer Systems and Methods

Security configuration optimizer system and methods create optimized access control policies. The systems and methods analyze constraints on the secured system and produce a plurality of proposals for an updated security configuration. The proposals are analyzed and filtered. A resulting set of proposals are graded or ranked according to a variety of desirable outcomes. A proposal is selected according to criteria based on the balance of security and complexity. The security configuration is updated according to the selected proposal.

Security Configuration Optimizer Systems and Methods

Security configuration optimizer system and methods create optimized access control policies. The systems and methods analyze constraints on the secured system and produce a plurality of proposals for an updated security configuration. The proposals are analyzed and filtered. A resulting set of proposals are graded or ranked according to a variety of desirable outcomes. A proposal is selected according to criteria based on the balance of security and complexity. The security configuration is updated according to the selected proposal.

Air-Gapped Remote Controller System
20230216855 · 2023-07-06 ·

The air-gapped device controller system provides a disconnected (air-gapped) remote endpoint controller that does not allow any programmatic manipulation of the remote system and works exclusively on an analog basis. To accomplish this, the system includes an apparatus that is connected to the end-user via internes or any other network and interacts with an air-gapped system (remote system) physically. It does so by translating the user's physical input to a signal on the wire and then recreating the user's physical input on the interface attached to the air-gapped system (e.g., pressing buttons, operating a touch pad or a mouse, user's video feed etc. Further, the system provides a method to allow the user to control an air gap control system without physically operating the hardware of the air gap control system. Additionally, the system may operate and control operating systems, computers, cameras, microphones, display systems, etc.

COUNTERMEASURE AGAINST FAULT INJECTION ATTACKS
20230214490 · 2023-07-06 ·

A method includes programming first and second values and a first compare enable command into respective first operand, second operand, and first compare enable command registers in a hardware comparator circuit. The method includes determining that a first match exists corresponding to the first and second values, programming a third value into the first operand register and a fourth value into the second operand register, and programming a second compare enable command into a second compare enable command register in the hardware comparator circuit. In response to a determination that a second match exists corresponding to the third and fourth values, the method includes asserting a success interrupt signal, programming a fifth value into the first operand register and a sixth value into the second operand register and programming a second compare enable command into a second compare enable command register in the hardware comparator circuit.

Secure feature and key management in integrated circuits

A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.

Secure feature and key management in integrated circuits

A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.