Patent classifications
G06F21/86
Computer System for Failing a Secure Boot in a Case Tampering Event
A computer system for failing a secure boot in a case tampering event comprises a trusted platform module (TPM), for generating a plurality of random bytes for a secure boot of the computer system; a bootloader, for storing information in at least one hardware of the computer system and performing the secure boot, wherein the information comprises the plurality of random bytes, and the TPM is comprised in the bootloader; an operating system (OS), for performing the secure boot; and at least one sensor, for detecting a case tampering event in the computer system, and transmitting a signal for triggering a deletion of the plurality of random bytes, if the case tampering event happens in the computer system. The bootloader or the OS performs the operation of deleting the plurality of random bytes stored in the at least one hardware to fail the secure boot, in response to the signal.
Computer System for Failing a Secure Boot in a Case Tampering Event
A computer system for failing a secure boot in a case tampering event comprises a microcontroller unit (MCU); a trusted platform module (TPM), for generating random bytes for a secure boot of the computer system; a bootloader, for storing information comprising the random bytes in the MCU and at least one hardware of the computer system and performing the secure boot, wherein the TPM is comprised in the bootloader; an operating system (OS), for performing the secure boot; and at least one sensor, coupled to the MCU, for detecting a case tampering event, and transmitting a signal for triggering a deletion of the random bytes, if the case tampering event happens. The MCU performs the operation of deleting the random bytes stored in the MCU and the at least one hardware according to a power supply, in response to the signal.
Air-Gapped Remote Controller System
The air-gapped device controller system provides a disconnected (air-gapped) remote endpoint controller that does not allow any programmatic manipulation of the remote system and works exclusively on an analog basis. To accomplish this, the system includes an apparatus that is connected to the end-user via internes or any other network and interacts with an air-gapped system (remote system) physically. It does so by translating the user's physical input to a signal on the wire and then recreating the user's physical input on the interface attached to the air-gapped system (e.g., pressing buttons, operating a touch pad or a mouse, user's video feed etc. Further, the system provides a method to allow the user to control an air gap control system without physically operating the hardware of the air gap control system. Additionally, the system may operate and control operating systems, computers, cameras, microphones, display systems, etc.
CASTING EMBEDDED HARDWARE ENCRYPTION
An anti-counterfeit product of manufacture includes a housing defining a cavity. The housing is constructed of a first and second bodies forming an original joint at a parting line. Inner workings of the product are enclosed within the cavity. An encryption device includes an encryption-coded ceramics-based pin grid array embedded in the first body of the housing. An RFID circuit is connected with the ceramics-based pin grid array. The RFID circuit is configured to report out a confirmation signal based on the code set by the connected ceramics-based pin grid array upon an RFID reader interrogation trigger. The RFID circuit is programmed to prevent future reporting of the confirmation signal upon detachment of the ceramics-based pin grid array from the RFID circuit, such that the confirmation signal is configured to confirm both product authenticity and integrity of the original joint.
CASTING EMBEDDED HARDWARE ENCRYPTION
An anti-counterfeit product of manufacture includes a housing defining a cavity. The housing is constructed of a first and second bodies forming an original joint at a parting line. Inner workings of the product are enclosed within the cavity. An encryption device includes an encryption-coded ceramics-based pin grid array embedded in the first body of the housing. An RFID circuit is connected with the ceramics-based pin grid array. The RFID circuit is configured to report out a confirmation signal based on the code set by the connected ceramics-based pin grid array upon an RFID reader interrogation trigger. The RFID circuit is programmed to prevent future reporting of the confirmation signal upon detachment of the ceramics-based pin grid array from the RFID circuit, such that the confirmation signal is configured to confirm both product authenticity and integrity of the original joint.
Secure hardware threat protection
A printed circuit (PC) card apparatus can, in an absence of external power provided to a Peripheral Component Interconnect Express (PCIe) PC card, prevent and detect unauthorized access to secure data stored on a memory device mounted on the PCIe PC card. The PCIe card includes a primary battery to supply, when external power is disconnected from the PCIe card, power to an electronic security device mounted on the PCIe card. The PC card apparatus also includes a PCIe edge connector protector enclosing electrically conductive fingers of a PCIe edge card connector. The PCIe edge connector protector includes a hidden supplemental charge storage device integrated into the PCIe edge connector protector. The PCIe edge connector protector also includes electrically conductive contacts to transfer supplemental power from the supplemental charge storage device to the electronic security device.
System and method for securing cache boards of an enterprise network data storage system
A system and method for securing data storage devices in an information technology (IT) network storage system is provided. The security system comprises a security control computer and electronic locks, which are mounted in a data center cabinet to slots for holding respective data storage devices. The security protocol implemented by the control computer requires an authorized administrator to execute a lock/unlock command identifying a particular device, and to provide a first part of a combination key. Additionally, an on-site hardware engineer is required to input a second part of the key at a terminal on-site at the data center. Upon verification of the first key, and then the second key, the control computer unlocks or locks the appropriate electronic lock. The control computer also implements a data backup/flushing process prior to allowing removal of an online cache board to avoid data corruption, loss, or system interruption.
System and method for securing cache boards of an enterprise network data storage system
A system and method for securing data storage devices in an information technology (IT) network storage system is provided. The security system comprises a security control computer and electronic locks, which are mounted in a data center cabinet to slots for holding respective data storage devices. The security protocol implemented by the control computer requires an authorized administrator to execute a lock/unlock command identifying a particular device, and to provide a first part of a combination key. Additionally, an on-site hardware engineer is required to input a second part of the key at a terminal on-site at the data center. Upon verification of the first key, and then the second key, the control computer unlocks or locks the appropriate electronic lock. The control computer also implements a data backup/flushing process prior to allowing removal of an online cache board to avoid data corruption, loss, or system interruption.
TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENT
Tamper detection systems and methods for electronic devices carried by mobile equipment are disclosed. According to an aspect, a system includes an electronic device and a first sensor attached to the electronic device for detecting motion of the electronic device. The system includes a second sensor configured to detect motion of the mobile equipment to which the electronic device is attached. A tamper detection module receives data from the first sensor that indicates the detected motion of the electronic device. The tamper detection module receives data from the second sensor that indicates the detected motion of the mobile equipment. Further, the tamper detection module determines a difference between the detected motion of the electronic device and the detected motion of the mobile equipment. The tamper detection module determines a tamper condition for the electronic device based on the determined difference. A security action in response to determining the tamper condition.
TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENT
Tamper detection systems and methods for electronic devices carried by mobile equipment are disclosed. According to an aspect, a system includes an electronic device and a first sensor attached to the electronic device for detecting motion of the electronic device. The system includes a second sensor configured to detect motion of the mobile equipment to which the electronic device is attached. A tamper detection module receives data from the first sensor that indicates the detected motion of the electronic device. The tamper detection module receives data from the second sensor that indicates the detected motion of the mobile equipment. Further, the tamper detection module determines a difference between the detected motion of the electronic device and the detected motion of the mobile equipment. The tamper detection module determines a tamper condition for the electronic device based on the determined difference. A security action in response to determining the tamper condition.