Patent classifications
G06F21/123
Display driver integrated circuit and display system having the same
Systems and methods are described for a display driver integrated circuit that is configured to certify whether an application processor and the display driver integrated circuit are genuine products. The display driver integrated circuit includes: an encryptor for generating first encrypted data by encrypting first data; a data converter for converting the first data into a first converted signal expressed with four or more voltage levels; an interface for providing the first converted signal to a host processor, and receiving, from the host processor, a second converted signal corresponding to second encrypted data generated by the host processor; and a determiner for controlling a display panel by comparing the first encrypted data with converted data corresponding to the second encrypted data. The second converted signal transferred through the interface is expressed with the voltage levels.
System and method for protecting software licensing information via a trusted platform module
Methods for protecting software licensing information via a trusted platform module (TPM) are performed by systems and devices. When a licensing server is unreachable, a license is generated for a software application by a licensing manager. The license is generated via a secure register of the TPM using an asymmetric key, specific to the software application and policy-tied to the secure register, to generate a signature of a hashed license file for the software application. The asymmetric key is stored, mapped to the license file, and used for subsequent license validation. A licensing manager validation command is provided to validate the license using the key, as applied to the hash, to verify the signature and checking validity of the time stamp. Time stamp expiration or alteration of the license are determined to provoke invalidation indications for the validating application.
MONITORING CONTROL DEVICE AND CLIENT PC
A monitoring control device according to an embodiment includes a host-side storage unit and a host-side processor. The host-side storage unit is configured to store an HMI program configured to generate a monitoring operation screen, host-side remote monitoring software configured to establish connection between an own device and a client PC according to a remote desktop protocol and send the monitoring operation screen to the client PC, and a key code. The host-side processor is configured to execute the host-side remote monitoring software and the HMI program. The host-side remote monitoring software is configured to virtualize a dongle connected to the client PC, as a dongle connected to the monitoring control device. The HMI program is configured to end execution of the HMI program if the key code stored in the virtualized dongle does not match with the key code stored in the host-side storage unit.
Method and Intelligent Apparatus for Calling Permission Verification of Protected Intelligent Application
A method and an intelligent apparatus for calling permission verification of a protected intelligent application are provided. Based on the present application, through the calling of the hardware decryption module by the device kernel application, the intelligent apparatus can decrypt the authentication ciphertext in the protected intelligent application by using the implanted-into-kernel key in the device kernel application and the burnt-into-hardware key in the write-protected storage medium, and only when the implanted-into-kernel key is the secondary authentication key obtained by encrypting the second controlled key with the first controlled key and the burnt-into-hardware key is the first controlled key, the correct second controlled key can be obtained to decrypt the authentication ciphertext and the decrypted plaintext consistent with the sample plaintext can be obtained after decryption, so that the protected intelligent application can grant the calling permission to the device kernel application through consistency verification. Thus, the use permission of the protected intelligent application can be limited to the intelligent apparatus with correct key configuration, so as to prevent the malicious piracy of the protected intelligent application running in the illegal apparatus.
Systems and methods for cryptographic authentication of contactless cards
Example embodiments of systems and methods for data transmission between a contactless card, a client application, and a server are provided. The memory of the contactless card may include a first card number table storing a first plurality of card numbers, each card number associated with a user account. A first applet may cycle through the first card number table and transmit each of the first plurality of card numbers to a second applet. In response to detection of one or more gestures by the card, the client application may read one or more of the first plurality of card numbers from the second applet and transmit a verification request associated with the one or more read card numbers to the server, which may compare the one or more read card numbers to a number from a second card number table and transmit a verification determination to authenticate the card.
Systems and methods for dynamically and randomly encrypting and decrypting data
A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods. The system and methods may be employed in virtually any system or network, and may be used to protect virtually any type of data, whether at rest (data storage), in motion (data transfer), or in use. In some embodiments, synchronization points are used as analogs for encryption/decryption keys, enabling the encrypting system and decrypting system to begin randomly altering encryption data in a like-manner, thereby creating a constantly changing encryption field that is virtually impossible to decrypt without authorization.
Threat control and prevention for android systems
A method is provided that determines whether to allow an application (app) for use or restrict the app on a set top box (STB). The method includes the steps of measuring at the STB, one or more resources used by the app; comparing at the STB, one or more thresholds set by an operator; and determining if the one or more resources used by the app exceed one or more thresholds set by the operator. Another method is provided that monitors applications (apps) that are installed a set top box (STB) for illegal or harmful activity by a policy manager. This method includes downloading and copying an app from an external source; installing or uninstalling the app into an application folder; providing a notification informing the policy manager of the installing or uninstalling of the app; and evaluating the app be installed or uninstalled.
CONTROL SYSTEM, CONTROL DEVICE, AND MANAGEMENT METHOD
A control device that has received a request for starting the execution of a control program issues a comparison request to two control devices that store shared information, the control devices that have received the comparison request each compare unique information created by the own control device with unique information on the own control device contained in a piece of the shared information stored in each control device, and when the comparison result satisfies a prescribed condition, the execution of the control program is permitted.
Processor authentication method
The disclosure includes a method of authenticating a processor that includes an arithmetic and logic unit. At least one decoded operand of at least a portion of a to-be-executed opcode is received on a first terminal of the arithmetic and logic unit. A signed instruction is received on a second terminal of the arithmetic and logic unit. The signed instruction combines a decoded instruction of the to-be-executed opcode and at least one previously-executed opcode.
ENFORCING LOCATION-BASED DATA PRIVACY RULES ACROSS NETWORKED WORKLOADS
Techniques for maintaining geographic-based data privacy rules in networked environments. An example method includes receiving a request from a user device; generating, based on the request, a query for data associated with fulfilling the request; transmitting, to a data controller, the query; transmitting, to the data controller, an indication of a geographic region in which at least one device implementing the entity is located; and receiving, from the data controller, a portion of the data associated with fulfilling the request.