G06F21/123

3D Printer and Inventory Control and Distribution System for 3D Designs
20230401295 · 2023-12-14 · ·

A computer system is configured for digital rights management for distributing and tracking downloadable proprietary source code defining a 3-D object and being usable to print the object on a 3D printer and protect the 3D object data from unauthorized printing. The computer system stores an inventory of proprietary source code corresponding to designs of a plurality of 3D objects, and enables a user to see the inventory of designs of the plurality of 3D objects in an online store, and permits the user to securely purchase use of the source code of a desired 3D object viewed therein. The computer system sends the proprietary source code defining the desired 3D object to a 3D printer, and controls printing of the desired 3D object made by the 3D printer to prevent further use of the source code when the purchased use in completed, using one of three different typologies.

Method for Managing Soft IP Licenses on a Partially Reconfigurable Hardware System

A method for managing licenses for soft IP on a partially reconfigurable hardware system, in particular an FPGA, wherein a license manager is provided in the non-configurable part of the hardware system, or is accessible only for the non-configurable part of the hardware system, where the license manager has exclusive access to a non-volatile memory in which license data having a time restriction of the useful life of at least one soft IP is stored, where before activating a particular soft IP, the license manager checks whether the useful life has expired, where the license manager only releases use of the soft IP if the useful life has not yet expired, where the license data is changed using a key, which is stored in a non-volatile memory for license data, and where a new key is stored and the preceding key is deleted when the license data is changed.

Enabling integrity and authenticity of design data
11042610 · 2021-06-22 · ·

Embodiments herein describe techniques for validating binary files used to configure a hardware card in a computing system. In one embodiment, the hardware card (e.g., an FPGA) includes programmable logic which the binary file can configure to perform a specialized function. In one embodiment, multiple users can configure the hardware card to perform their specialized tasks. For example, the computing system may be server on the cloud that hosts multiple VMs or a shared workstation. Permitting multiple users to directly configure and use the hardware card may present a security risk. To mitigate this risk, the embodiments herein describe techniques for validating encrypted binary files.

SYSTEM AND METHOD FOR PROTECTING SOFTWARE LICENSING INFORMATION VIA A TRUSTED PLATFORM MODULE
20210192017 · 2021-06-24 ·

Methods for protecting software licensing information via a trusted platform module (TPM) are performed by systems and devices. When a licensing server is unreachable, a license is generated for a software application by a licensing manager. The license is generated via a secure register of the TPM using an asymmetric key, specific to the software application and policy-tied to the secure register, to generate a signature of a hashed license file for the software application. The asymmetric key is stored, mapped to the license file, and used for subsequent license validation. A licensing manager validation command is provided to validate the license using the key, as applied to the hash, to verify the signature and checking validity of the time stamp. Time stamp expiration or alteration of the license are determined to provoke invalidation indications for the validating application.

ON-CARTRIDGE ENCRYPTION KEY STORAGE FOR CARTRIDGE-BASED LIBRARY

A secure cartridge-based storage system includes a set of read/write control electronics on a control board adapted to removably couple with each of a plurality of storage cartridges. The read/write control electronics are adapted to transmit a public key to a target storage cartridge in response to a read/write command received from a host device. The target storage cartridge includes and encryption circuit that authenticates the transmitted public key against a stored public key, accesses a locally-stored encryption key responsive to successful authentication of the public key; and utilizes the locally-stored encryption key to encrypt or decrypt data of the read/write command that is in transit between the storage media and the control board.

Method and system for securing bank account access
11003744 · 2021-05-11 · ·

Methods, systems and devices for securing a bank account against an unauthorized access from a portable electronic device include or include using an auxiliary security device and a portable electronic device. The portable electronic device is adapted for controlling the bank account via the Internet. The auxiliary security device and the portable electronic device communicate via a Bluetooth protocol. Secure access to the bank account with the portable electronic device is based on a combination of information that is indicative of a key that is stored in the portable electronic device and data that is indicative of the key stored in the auxiliary security device that has been transmitted to the portable electronic device.

Hardware based identities for software modules

Creating a certificate for a software module. A method includes obtaining a public key for a software module. The method includes obtaining a public key for a software module implemented on a hardware device. The method further includes creating a certificate using the public key by signing the public key using a hardware protected key and hardware protected compute elements. The hardware protected key is protected by a protected portion of the hardware device, and not accessible outside of the protected portion of the hardware device.

DEVICE MANAGEMENT SYSTEM, DEVICE MANAGEMENT APPARATUS, AND NETWORK SYSTEM
20210168200 · 2021-06-03 · ·

A device management system, a device management apparatus, and a network system. The device management system receives device identification information for identifying a device transmitted from the device through a communication network, acquires application identification information for identifying an application identified based on tenant information associated with the received device identification information, and transmits the application identification information to the device as identification information of the application to be installed on the device.

Forensic investigation tool

Methods and systems are disclosed a digital investigation tool capable of recovering and decrypting content. The tool combines digital techniques with decryption capability for a wide range of encryption algorithms. In one implementation, the tool identifies the type and/or vendor of the encryption algorithm used to protect the content. The tool then automatically obtains the decryption information needed to decrypt the content. Depending on the encryption algorithm used, the information may include a master key, user-specific keys, user IDs, passwords, and the like. The decryption information may be accumulated in a local or remote storage location accessible by the tool, or it may be acquired in real time on an as-needed basis from a third-party encryption vendor, a key server, and the like. Such an arrangement allows law enforcement agencies as well as corporate security personnel to quickly recover and decrypt content stored on a computer system.

User interface switching method and terminal
11003745 · 2021-05-11 · ·

The application provides a user interface switching method and a terminal. After the terminal triggers a TUI display request of a CA according to a first operation on a CA interface by a user, the terminal switches a display environment of the CA from an REE to a TEE according to the TUI display request, and then displays a TA interface that is of the CA and that is in the TEE. In this case, the user may perform an operation of inputting sensitive information on the TA interface, and a malicious program that runs in the REE cannot access a hardware device to obtain the input operation in the TEE by the user. Therefore, t sensitive information of the user is stolen is prevented, thereby effectively enhancing security of the input operation by the user.