G06F2221/2143

Method and apparatus for erasing security-relevant information in a device
11556660 · 2023-01-17 · ·

Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.

PROGRAMMABLE INTEGRATED CIRCUIT USING A RADIOACTIVE SOURCE

A programmable integrated circuit, including: at least one component that changes over time, changing autonomously within the integrated circuit, as a function of the time that has elapsed since an initialization phase of the integrated circuit, this change taking place by virtue of an internal radioactive source, at least one control circuit sensitive to the temporal change of the component and having at least one protected internal output that changes state only after a programmable predefined duration has elapsed since the initialization phase of the integrated circuit.

PROTECTED CIRCUIT SYSTEM AND METHOD OF OPERATION
20230214539 · 2023-07-06 ·

A protected circuit is provided comprising multiple essentially identical circuits, such as TPM (Trusted Platform Module) hosted in a common chip-housing, such that the signals thereof interfere with each other and it is difficult to obtain information therefrom. Additional protection may be achieved by adding a random delay to mask any relation between contents of processed information packages and the processing time required between in- and output signals of protected circuits. A physical barrier may be provided in order to prevent or at least limit physical access to for example at least one TPM chip arranged inside of the barrier. The physical barrier may comprises an impedance, i.e. in form of a capacitor with capacity C and or resistor R and or inductivity L, for example formed by two of the reflector layers with an absorbing material in between. Any impedance (i.e. capacity C and/or resistance R and/or inductivity L) change can be detected and any impedance (i.e. capacity and/or resistance and/or inductivity L) change beyond a chosen threshold is indicative of an attempt to physically destruct or enter the barrier. Upon detecting an impedance (i.e. capacity C and/or resistance R and/or inductivity L) change beyond the threshold, any suitable action may be performed, such as deleting all information from the chip, destroying the chip or providing wrong information. The barrier may also act as a reflector for reflecting the desired signal of the at least one chip, such that the desired signal and the reflected signals interfere with each other and it is difficult to obtain information therefrom.

PROTECTED CIRCUIT SYSTEM AND METHOD OF OPERATION
20230214536 · 2023-07-06 ·

Circuits are protected from timing attacks by adding a random delay to mask any relation between contents of processed information packages and the processing time required between in- and output signals of protected circuits. This random delay has to be performed preferably inside the protected volume and can be realized by one or more random delay buffers that are realized by means of e.g. random shift-registers. Further protection may be provided by situating the circuits in a single chip housing, such that the signals thereof interfere with each other and it is difficult to obtain information therefrom. A physical barrier may be provided in order to prevent or at least limit physical access to for example at least one TPM chip arranged inside of the barrier. The physical barrier comprises an impedance, i.e. in form of a capacitor with capacity C and or resistor R and or inductivity L, for example formed by two of the reflector layers of the barrier with an absorbing material in between. Any impedance (i.e. capacity C and/or resistance R and/or inductivity L) change can be detected and any impedance (i.e. capacity and/or resistance and/or inductivity L) change beyond a chosen threshold is indicative of an attempt to physically destruct or enter the barrier. Upon detecting an impedance (i.e. capacity C and/or resistance R and/or inductivity L) change beyond the threshold, any suitable action may be performed, such as deleting all information from the chip, destroying the chip or providing wrong information. The barrier may also act as a reflector for reflecting the desired signal of the at least one chip, such that the desired signal and the reflected signals interfere with each other and it is difficult to obtain information therefrom.

Storage data encryption/decryption apparatus and method

Embodiments of the disclosure provide a method and apparatus for encrypting and decrypting data. The method for encrypting data in a computer system can include: receiving, by a memory operation module, a first data and a second data for encryption; determining at least one storage area for a first encrypted data corresponding to the first data and a second encrypted data corresponding to the second data; generating at least one key based on the first and second data and the at least one storage area; and encrypting the first data and the second data using the at least one key to generate the first encrypted data and the second encrypted, respectively.

Automatic device zeroization

Systems, apparatuses, and methods are described for zeroization of a computing device based on biometric information and vitality information. A computing device may store information associated with a user. The computing device may request biometric information and vitality information from one or more sensing devices. The computing device may determine, based on the requested biometric information and the requested vitality information, whether to zeroize the computing device.

Securely processing shareable data in a data communication network
11550945 · 2023-01-10 · ·

A method includes a data processing system creating a virtual machine for use with a data owner system in accordance with a temporary credential protocol between the data processing system and the data owner system. The method continues with by the virtual machine accessing memory of the data owner system regarding a set of data records having common data criteria. The method continues by the virtual machine modifying the set of data records to produce a set of shareable data records. The method continues with the data processing system executing a data analysis function on the set of shareable data records to produce an analytical result. The method continues with the data processing system sending the analytical result to a data consumer computing entity.

Data labeling awareness for backup systems

Embodiments for a method performing data migration such as backups and restores in a network by identifying characteristics of data in a data saveset to separate the data into defined types based on respective characteristics, assigning a data label to each defined type, defining migration rules for each data label, discovering assigned labels during a migration operation; and applying respective migration rules to labeled data in the data saveset. The migration rules can dictate storage location, access rights, replication periods, retention periods, and similar parameters.

Secure offline streaming of content

Methods, systems, and computer-readable media for secure offline transmission of a plurality of data segments from a sending device to one or more receiving devices. The sending device and the one or more receiving devices may communicate via an offline local network. A secure, encrypted container may be created at the receiving device to temporarily cache the received data segments one at a time and the encrypted storage container prevents access by one or more applications of the receiving device to data stored therein based on storage instructions from the sending device. The encrypted container may be configured to store the data segments such that less than all of the data segments are stored at the receiving device at any one time.

File containerization and management

This disclosure is directed to embodiments of systems and methods for containerizing files and managing policy data applied to the resulting containers. In some of the disclosed embodiments, a computing system determines that a file stored in storage medium is to be included in a container to be sent to at least one computing component associated with a device including a user interface. The computing system determines that the file is of a particular type and also determines code that can be used to access files of the particular type. The computing system combines the file and the code into the container such that container is configured to be executed by the at least one computing component so as to cause content of the file to be presented by the user interface. The computing system then sends the container to the at least one computing component. In some implementations, the container may further include policy information defining at least one of whether, how, where, when, or by whom the file can be accessed using the code. A communication link may be established between the computing system and the container at the at least one computing component and an instruction may be sent via the communication link that causes a change to the policy information.