Patent classifications
G06F21/86
Systems and methods for authentication
An authentication method for a tag device includes exchanging authentication codes between the tag device and an authentication server to perform mutual authentication. A reader device acts as a communications bridge between the tag device and the authentication server. The reader device may observe mutual authentication between the tag device and the authentication server as an indicator that the tag device is authentic. A failure of mutual authentication indicates that the tag device is not authentic.
Tamper resistant module for industrial control system
An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial control system module upon an indication of an unauthorized module access event. In an implementation, a secure industrial control system module includes a circuit board including electrical circuitry; a sealed encasement that houses the circuit board, where the sealed encasement includes a housing having a first housing side and a second housing side, where the housing is configured to house the circuit board when the first housing side and the second housing side are coupled together; and a first sensor component integrated with the sealed encasement, where the first sensor component is communicably coupled to the circuit board and electrical circuitry and is configured to provide an indication of an unauthorized access event.
Tamper resistant module for industrial control system
An industrial control system module and methods are described for self-destruction or the destruction and/or erasure of sensitive data within the industrial control system module upon an indication of an unauthorized module access event. In an implementation, a secure industrial control system module includes a circuit board including electrical circuitry; a sealed encasement that houses the circuit board, where the sealed encasement includes a housing having a first housing side and a second housing side, where the housing is configured to house the circuit board when the first housing side and the second housing side are coupled together; and a first sensor component integrated with the sealed encasement, where the first sensor component is communicably coupled to the circuit board and electrical circuitry and is configured to provide an indication of an unauthorized access event.
SECURITY-BY-DESIGN METHODOLOGY USING EVIDENCE-BASED SECURITY APPROACH
Disclosed is a security-by-design method according to some exemplary embodiments of the present disclosure. The security-by-design method may include: mapping the security-by-design methodology and an evidence-based security methodology; and storing a mapping result in a database.
Modular data center
Provided is a rack, comprising: a plurality of rack units; and a plurality of lockers each housing a different respective subset of the rack units, wherein respective lockers among the plurality comprise: a first respective barrier disposed between a respective pair of the rack units; a second respective barrier disposed between another respective pair of the rack units; a third respective barrier that is orthogonal to the first barrier and the second barrier, the third respective barrier being moveably or removeably coupled to the rack; a respective volume configured to receive one or more computing devices; and a respective lock configured to secure the third respective barrier to the rack in the closed position when in a locked state.
Modular data center
Provided is a rack, comprising: a plurality of rack units; and a plurality of lockers each housing a different respective subset of the rack units, wherein respective lockers among the plurality comprise: a first respective barrier disposed between a respective pair of the rack units; a second respective barrier disposed between another respective pair of the rack units; a third respective barrier that is orthogonal to the first barrier and the second barrier, the third respective barrier being moveably or removeably coupled to the rack; a respective volume configured to receive one or more computing devices; and a respective lock configured to secure the third respective barrier to the rack in the closed position when in a locked state.
Storage enclosures
In one example, a physical storage enclosure can include a storage area to enclose a device, a locking mechanism to prevent removal of the device from the storage area, a logical configuration system coupled to the device within the storage area, wherein the logical configuration system includes instructions to identify the device within the storage area and alter instructions associated with the device within the storage area, a hardware logistic system coupled to the locking mechanism to activate and deactivate the locking mechanism, and a firewall to restrict communication between the logical configuration system and the hardware logistic system.
VIDEO SECURITY SYSTEM WITH IMPROVED NETWORK RESPONSE TIME USING PRE-AUTHENTICATION INFORMATION
A video security system with improved network response speed using pre-authentication information, which is capable of improving a network response speed by simplifying handshaking for securely exchanging authentication information and an encryption key in a process of starting communication between a client terminal and a server using pre-authentication information that is valid only for the client terminal, is provided.
VIDEO SECURITY SYSTEM WITH IMPROVED NETWORK RESPONSE TIME USING PRE-AUTHENTICATION INFORMATION
A video security system with improved network response speed using pre-authentication information, which is capable of improving a network response speed by simplifying handshaking for securely exchanging authentication information and an encryption key in a process of starting communication between a client terminal and a server using pre-authentication information that is valid only for the client terminal, is provided.
Computer System for Failing a Secure Boot in a Case Tampering Event
A computer system for failing a secure boot in a case tampering event comprises a trusted platform module (TPM), for generating a plurality of random bytes for a secure boot of the computer system; a bootloader, for storing information in at least one hardware of the computer system and performing the secure boot, wherein the information comprises the plurality of random bytes, and the TPM is comprised in the bootloader; an operating system (OS), for performing the secure boot; and at least one sensor, for detecting a case tampering event in the computer system, and transmitting a signal for triggering a deletion of the plurality of random bytes, if the case tampering event happens in the computer system. The bootloader or the OS performs the operation of deleting the plurality of random bytes stored in the at least one hardware to fail the secure boot, in response to the signal.