Patent classifications
G06F21/81
METHOD OF OPERATING A MEDIA SCANNER
A method of operating a media scanner to protect a target machine from malware on a removable storage device is disclosed. The target machine and the removable storage device each include a respective data line, and the media scanner comprises a data switch. Data is scanned on the removable storage device with malware detection software of the media scanner via a first data path, the first data path comprising the data line of the removable storage device connected to the data line of the media scanner by the data switch in a first switching state. After the data has been scanned with the malware detection software, the data switch is operated to switch from the first switching state to a second switching state, thereby disconnecting the data line of the removable storage device from the data line of the media scanner and connecting the data line of the removable storage device to the data line of the target machine.
ELECTRONIC DEVICE
An electronic device is provided. The electronic device operates in a normal mode or a low power mode and includes a first non-volatile memory (NVM), a second NVM configured to store first security data generated in the low power mode, and a security processor configured to access the first NVM to store the first security data in the first NVM in the normal mode.
Securing data stored in a memory of an IoT device during a low power mode
The disclosure relates to a method for enabling the secure functions of a chipset (1) and especially the encryption of the content of the secure memory (7) when the device goes into low power mode. The content of the secure memory (7) may be encrypted and stored in an external memory (20) during low power mode of the chipset (1).
Securing data stored in a memory of an IoT device during a low power mode
The disclosure relates to a method for enabling the secure functions of a chipset (1) and especially the encryption of the content of the secure memory (7) when the device goes into low power mode. The content of the secure memory (7) may be encrypted and stored in an external memory (20) during low power mode of the chipset (1).
System and method for power supply voltage scaling for secure embedded systems
A system-on-a-chip (SoC) is designed to operate within optimal voltage and frequency ranges. If an SoC is provided power outside of the optimal voltage range, the SoC can be placed in a high-stress state, exposing the chip to a security attack. Embodiments of the present systems and method limit the minimum and maximum voltage supplied to an SoC from a power management integrated circuit (PMIC). Embodiments can also track a number of requests to provide power outside of the optimal range and can signal a warning of repeated attempts to take an SoC outside of the SoC's optimal range, which may be indicative of a malicious attack on the system.
POWER SUPPLY DEVICE, METHOD AND SECURE SYSTEM
A power supply device is provided with a secure power supply device, a voltage detection circuit, a stable voltage source and a switch. By using the voltage detection circuit, whether a driving voltage of an encryption/decryption device is insufficient to control the on and off the switch, so as to determine whether only the secure power supply device provides a supply voltage to the encryption/decryption device as the driving voltage. Alternatively, the supply voltage of the secure power supply device and a stable voltage of the stable voltage source are provided simultaneously to the encryption/decryption device as the driving voltage. In other words, once the driving voltage drops (that is, the encryption/decryption device consumes a large current for encryption/decryption), the stable voltage source immediately provides the stable voltage to the encryption/decryption device as part of the driving voltage to ensure that the encryption/decryption device can normally work.
POWER SUPPLY DEVICE, METHOD AND SECURE SYSTEM
A power supply device is provided with a secure power supply device, a voltage detection circuit, a stable voltage source and a switch. By using the voltage detection circuit, whether a driving voltage of an encryption/decryption device is insufficient to control the on and off the switch, so as to determine whether only the secure power supply device provides a supply voltage to the encryption/decryption device as the driving voltage. Alternatively, the supply voltage of the secure power supply device and a stable voltage of the stable voltage source are provided simultaneously to the encryption/decryption device as the driving voltage. In other words, once the driving voltage drops (that is, the encryption/decryption device consumes a large current for encryption/decryption), the stable voltage source immediately provides the stable voltage to the encryption/decryption device as part of the driving voltage to ensure that the encryption/decryption device can normally work.
POWER SUPPLYING DEVICE, METHOD AND SECURE SYSTEM
A power supply device is used to provide power to an encryption and decryption device of a security system, including a safety power supply device, which is used to supply the supply voltage according to the system voltage; a regulated voltage source, which is used to provide a regulated voltage; and a voltage selection device, which is electrically connected with the safety power supply device, the stable voltage source and the encryption and decryption device. During the startup period of the security system, or, after the startup period of the security system and the encryption/decryption device performs encryption/decryption, only the supply voltage is selected as the driving voltage of the encryption/decryption device. After the startup period of the security system and the encryption and decryption device does not perform encryption and decryption, the voltage only the regulated voltage is selected as the driving voltage of the encryption and decryption device.
ISOLATING A REGION OF A SYSTEM ON A CHIP FOR SAFETY CRITICAL OPERATIONS
In various examples, an integrated circuit includes first and second portions operating within separate domains. The second portion has an interface that connects the first and second portions. The second portion selectively locks the interface to prevent communication with the first portion over the interface, and selectively unlocks the interface to allow communication with the first portion over the interface.
ISOLATING A REGION OF A SYSTEM ON A CHIP FOR SAFETY CRITICAL OPERATIONS
In various examples, an integrated circuit includes first and second portions operating within separate domains. The second portion has an interface that connects the first and second portions. The second portion selectively locks the interface to prevent communication with the first portion over the interface, and selectively unlocks the interface to allow communication with the first portion over the interface.