G06F21/725

Method and system for verifying an access request

Systems and methods for use in verifying a request for access to data in a system comprising a first module having access to a first trusted indicator of time, a second module having access to an untrusted indicator of time and a computing device having access to a second trusted indicator of time. The first module generates a password using at least the first trusted indicator of time. The second module receives a password associated with the request for access to data and validates the received password using at least the untrusted indicator of time. The second module then causes a message to be transmitted to the computing device, the message comprising data indicative at least of the untrusted indicator of time used to validate the received password. The computing device then generates data indicative of a comparison between the untrusted indicator of time and the second trusted indicator of time, and uses the generated data to provide said access to data.

Electronic apparatus and control method thereof
09805220 · 2017-10-31 · ·

According to one embodiment, an electronic apparatus includes a processor configured to operate based on a clock, the processor includes a register in which a value added in accordance with the clock is stored, and a memory configured to store first period information indicating a first period in which a file is accessible. The processor is configured to acquire first time and date information indicating a first time and date from an external device, calculate a second time and date indicating a present time and date based on the first time and date information and the value, and restrict access to a resource of the electronic apparatus, when the second time and date does not correspond to the first period.

SYSTEM AND METHODS THEREOF FOR IDENTIFICATION OF SUSPICIOUS SYSTEM PROCESSES
20170286683 · 2017-10-05 · ·

A computerized method for identification of suspicious processes executing on an end-point device communicatively connected to network, the network communicatively connected to a server, the method comprising receiving, by the server, a record of at least one process, initiated by and executing on by the end-point device. One or more parameters associated with the at least one process are identified. A first time pointer is identified corresponding to the identified one or more parameters, a first time pointer. A second time pointer at which a user associated with the end-point device initiated a user dependent process is identified. Whether the second time pointer occurred before the first time pointer is identified. It is determined whether the at least one process was initiated by the user based on identification of user dependent processes and corresponding attribution. An action is performed based on the above determination.

Detecting Possible Security Violations In An Integrated Circuit
20220309191 · 2022-09-29 ·

In one embodiment, an apparatus includes: a clock generator to receive a reference clock signal and generate a first clock signal using the reference clock signal; a counter coupled to the clock generator to maintain a first count regarding a number of cycles of the first clock signal; and a controller coupled to the counter. The controller may be configured to detect a potential security violation when the first count varies from a predetermined value.

Secure time functionality for a wireless device

The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.

Resistance to cache timing attacks on block cipher encryption

Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or more tunable parameters of the block cipher encryption algorithm; creating multiple encryption algorithm implementations by varying one or more of the parameter values; causing a computing system to encrypt data using the implementations; measuring average execution times at the computing system for the implementations subjecting the implementations to a cache timing attack; measuring average execution times at the computing system for the implementations subjected to a cache timing attack; computing a time difference between the average execution times for the implementations when not subjected and when subjected to a cache timing attack; selecting an implementation having a lower time difference; and using the selected implementation for a subsequent encryption operation.

Blockchain-based trusted platform
11250528 · 2022-02-15 · ·

A blockchain-based trusted platform enhances trustworthiness of data generated by application programs that provide services, such as legal services. Included is an application layer having at least one blockchain-based application program configured to perform steps to provide a service, and a trusted service layer having a trusted timing module, a trusted identity module, and a trusted computing module. For each step of at least some of a plurality of steps, the application program is configured to obtain a verified time stamp from the trusted timing module and a verified identity from the trusted identity module, and/or obtain a computation result based on a processing of blockchain data using the trusted computing module. The trusted computing module records information about a corresponding step that is performed by the application program and the verified time stamp, the verified identity, and/or the computation result in a blockchain.

SECURE TIMER SYNCHRONIZATION BETWEEN FUNCTION BLOCK AND EXTERNAL SOC
20210406207 · 2021-12-30 ·

Various embodiments include methods and systems performed by a processor of a first function block for providing secure timer synchronization with a second function block. Various embodiments may include storing, in a shared register space, a first time counter value in which the first time counter value is based on a global counter of the second function block, transmitting, from the shared register space, the stored first time counter value to a preload register of the first function block, receiving, by the first function block, a strobe signal from the second function block configured to enable the first time counter value in the preload register to be loaded into a global counter of the first function block, and configuring the global counter with the first time counter value from the preload register.

Magnetic tunnel junction (MTJ) for multi-key encryption

A memory system in an integrated circuit and a method of operation. The system includes multiple magnetic tunnel junction (MTJ) structures, each MTJ structure storing a logic value according to a resistive state. A selection switch device associated with a respective MTJ structure is activated to select one of the multiple MTJ structures at a time. An output circuit is configured to sense the resistive state of a selected MTJ structure, the output circuit having a selectable input reference resistance value according to a selected first reference resistance or a second reference resistance value, and outputting a first logic value of the selected MTJ structure responsive to a resistive state of the MTJ structure and a selected first resistance reference value, or alternately outputting a second logic value of the selected MTJ structure responsive to the resistive state of the MTJ structure and a selected second resistance reference value.

Clock and periodic computing machines
11194934 · 2021-12-07 · ·

A new computational machine is invented, called a clock machine, that is a novel alternative to computing machines (digital computers) based on logic gates. In an embodiment, computation is performed with one or more clock machines that use time. In an embodiment, a cryptographic cipher is implemented with random clock machines, constructed from a non-deterministic process, wherein the compiled set of instructions (i.e., the implementation of the cryptographic procedure) is distinct on each device or chip that executes the cryptographic cipher. In an embodiment, by using a different set of clock machines to execute two different instances of the same cryptographic procedure, each execution of a procedure looks different to malware that may try to infect and subvert the cryptographic procedure. This cryptographic process also makes timing attacks more challenging. In an embodiment, a detailed implementation of the Midori cipher with random clock machines is described.