Patent classifications
G06F21/81
TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENT
Tamper detection systems and methods for electronic devices carried by mobile equipment are disclosed. According to an aspect, a system includes an electronic device and a first sensor attached to the electronic device for detecting motion of the electronic device. The system includes a second sensor configured to detect motion of the mobile equipment to which the electronic device is attached. A tamper detection module receives data from the first sensor that indicates the detected motion of the electronic device. The tamper detection module receives data from the second sensor that indicates the detected motion of the mobile equipment. Further, the tamper detection module determines a difference between the detected motion of the electronic device and the detected motion of the mobile equipment. The tamper detection module determines a tamper condition for the electronic device based on the determined difference. A security action in response to determining the tamper condition.
TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENT
Tamper detection systems and methods for electronic devices carried by mobile equipment are disclosed. According to an aspect, a system includes an electronic device and a first sensor attached to the electronic device for detecting motion of the electronic device. The system includes a second sensor configured to detect motion of the mobile equipment to which the electronic device is attached. A tamper detection module receives data from the first sensor that indicates the detected motion of the electronic device. The tamper detection module receives data from the second sensor that indicates the detected motion of the mobile equipment. Further, the tamper detection module determines a difference between the detected motion of the electronic device and the detected motion of the mobile equipment. The tamper detection module determines a tamper condition for the electronic device based on the determined difference. A security action in response to determining the tamper condition.
Secure wake-on of a computing device
In some examples, an embedded controller of a computing device may detect, when the computing device is in a low-power state, that a smartcard has been connected to a port of the computing device or that data has been received from an input device (e.g., keyboard or biometric input device) connected to the computing device. For the smartcard, the embedded controller may use a card driver to read data stored on the smartcard. The embedded controller may compute a hash value based on the data read from the smartcard or received from the input device. If the hash value matches a previously stored hash value, then the embedded controller may initiate a boot-up process of the computing device. If the hash value does not match the previously stored hash value, then the embedded controller may cause the computing device to remain in the low-power state.
Secure wake-on of a computing device
In some examples, an embedded controller of a computing device may detect, when the computing device is in a low-power state, that a smartcard has been connected to a port of the computing device or that data has been received from an input device (e.g., keyboard or biometric input device) connected to the computing device. For the smartcard, the embedded controller may use a card driver to read data stored on the smartcard. The embedded controller may compute a hash value based on the data read from the smartcard or received from the input device. If the hash value matches a previously stored hash value, then the embedded controller may initiate a boot-up process of the computing device. If the hash value does not match the previously stored hash value, then the embedded controller may cause the computing device to remain in the low-power state.
Process for pick and place of electronic components in a vacuum
A process for placing a circuit array on a sheet having adhesive during a pick and place operation in which a vacuum is used during its placement to minimize air bubbles between the adhesive layer and the circuit array.
Process for pick and place of electronic components in a vacuum
A process for placing a circuit array on a sheet having adhesive during a pick and place operation in which a vacuum is used during its placement to minimize air bubbles between the adhesive layer and the circuit array.
GFI tripped circuit detection and wireless notification systems and methods
Systems and methods for ground fault circuit interrupter trip detection and entire premises loss of power and restoration detection and notification of those events is disclosed. An example system may receive a smart plug identification. The system may authorize a smart plug. The system may link the smart plug to a smart plug application. The system may query the smart plug to obtain a power notification. The system may notify smart plug application of a power status.
A Method for Adjusting Operation Parameters of an Electrical Device
An apparatus (1) provided to connect at least one device (2) to a power distribution system (3), said apparatus (1) comprising a human machine interface, HMI, (4) having elements to interact with the apparatus (1), wherein the human machine interface elements (11,12) are adapted to display and/or to adjust setting values of operation parameters of the at least one connected device (2), wherein access to one or more human machine interface elements is restricted by at least one access restriction mechanism of said apparatus (1) to enhance the operation security of the at least one device (2) connected via said apparatus (1) to said power distribution system (3) and/or to enhance the operation security of the apparatus (1) and/or of the power distribution system (3).
A Method for Adjusting Operation Parameters of an Electrical Device
An apparatus (1) provided to connect at least one device (2) to a power distribution system (3), said apparatus (1) comprising a human machine interface, HMI, (4) having elements to interact with the apparatus (1), wherein the human machine interface elements (11,12) are adapted to display and/or to adjust setting values of operation parameters of the at least one connected device (2), wherein access to one or more human machine interface elements is restricted by at least one access restriction mechanism of said apparatus (1) to enhance the operation security of the at least one device (2) connected via said apparatus (1) to said power distribution system (3) and/or to enhance the operation security of the apparatus (1) and/or of the power distribution system (3).
CUSTOMIZED THERMAL AND POWER POLICIES IN COMPUTERS
Example approaches for customization of thermal and power policies in computers, are described. In an example, a microcontroller of a computing system, also referred to as system, validates thermal policy custom data stored in a firmware storage medium of the system, in response to a supply of power to the system. On a successful validation of the thermal policy custom data, thermal control settings is updated with a customized thermal policy included in the thermal policy custom data. In response to initiation of a boot operation of the system, a processor of the system validates power policy custom data stored in the firmware storage medium. In response to a successful validation of the power policy custom data during the boot operation, the processor updates power control settings of the system with a customized power policy included in the power policy custom data.