G06F21/725

INTEGRATED CIRCUIT WITH ELECTROMAGNETIC FAULT INJECTION PROTECTION

In one form, an integrated circuit includes a plurality of electromagnetic fault injection (EMFI) sensors and a security management circuit. Each EMFI sensor includes a sense loop having a conductor around a corresponding portion of logic circuitry whose operation is affected by an electromagnetic pulse, and a detector circuit coupled to the sense loop and having an output for providing a pulse detection signal in response to a pulse of at least a predetermined magnitude. The security management circuit performs a protection operation to secure the integrated circuit in response to an activation of a corresponding pulse detection signal of one of the plurality of EMFI sensors.

Embedded timed attestation process

A client with a processor having at least one core and a client timer, and an ETAP module comprising an ETAP high resolution timer, wherein the client processor is programed to use the ETAP timer instead of the client timer to perform timed attestation and produce test results.

Method and system for verifying an access request

A system for verifying a request for access to data is provided, the system comprising a first module 20 and a second module 30. The first module 20 is arranged to generate a password, and the second module 30 is arranged to receive a password associated with a request for data, validate the received password, and enable access to the requested data. The system is such that the first and second modules 20, 30 share a secret that has been uniquely assigned thereto, the shared secret being for use in generation and validation of a said password. Furthermore, the first module 20 is communicatively disconnected from the second module 30.

Secure wireless communication between controllers and accessories

A controller and an accessory controllable by the controller can communicate using secure read and write procedures. The procedures can include encrypting identifiers of accessory characteristics targeted by a read or write operation as well as any data being read or written. The procedures can also include the accessory returning a cryptographically signed response verifying receipt and execution of the read or write instruction. In some instances, a write procedure can be implemented as a timed write in which a first instruction containing the write data is sent separately from a second instruction to execute the write operation; the accessory can disregard the write data if the second instruction is not received within a timeout period after receiving the first instruction.

Systems and methods for variable-length encoding and decoding for enhancing computer systems
10917403 · 2021-02-09 · ·

A method for variable length decoding, the method including: receiving, in a default word length mode, at least one first data word having a default first word length; combining the received at least one first data word as a first portion of data; receiving, after the at least one first data word, a transition word indicative of transitioning to a variable word length mode; receiving, after the transition word, a first word length word indicative of a second word length; receiving, after the first word length word, at least one second data word having the second word length; and combining the received at least one second data word as a second portion of the data.

CRYPTOCURRENCY WALLET AND CRYPTOCURRENCY ACCOUNT MANAGEMENT
20210049591 · 2021-02-18 · ·

A digital wallet device for storing and securing cryptocurrency, the digital wallet device is electronically disconnected from other digital devices and comprising: a cryptocurrency integrated circuit (IC) that is isolated from any computer interface; a non-transitory computer readable storage medium mounted on the cryptocurrency IC and storing a private key of a cryptocurrency and a public key of the cryptocurrency; a man-machine interface (MMI) for receiving an input from a user; at least one processor mounted on the cryptocurrency IC for executing code to create a cryptocurrency action based on the input and to sign using the private key; and a unidirectional communication hardware for sending said transaction to a communication device for broadcasting said transaction via a network.

BLOCKCHAIN-BASED TRUSTED PLATFORM
20210049716 · 2021-02-18 · ·

A blockchain-based trusted platform enhances trustworthiness of data generated by application programs that provide services, such as legal services. Included is an application layer having at least one blockchain-based application program configured to perform steps to provide a service, and a trusted service layer having a trusted timing module, a trusted identity module, and a trusted computing module. For each step of at least some of a plurality of steps, the application program is configured to obtain a verified time stamp from the trusted timing module and a verified identity from the trusted identity module, and/or obtain a computation result based on a processing of blockchain data using the trusted computing module. The trusted computing module records information about a corresponding step that is performed by the application program and the verified time stamp, the verified identity, and/or the computation result in a blockchain.

Computer-based systems and computing devices configured to utilize one or more authentication servers for securing device commands transmissions and methods of use thereof

In some embodiments, securing device commands includes a first electronic device receiving a command authorization request message from a second electronic device, including a device command to be performed by the second electronic device, a command argument, and a first message authentication code (MAC) generated by applying a hash function to the device command, the command argument and a first counter value. The first electronic device generates a second MAC by applying the hash function to the device command, the command argument and a second counter value synchronized with the first counter value. The first electronic device compares the first MAC and the second MAC to authenticate the device command and transmit a command approval message or a command denial message. The command approval message causes the second electronic device to perform the device command and the command denial message causes the second electronic device to reject the device command.

Apparatuses and methods for frequency scaling a message scheduler data path of a hashing accelerator

Methods and apparatuses relating to a hashing accelerator having a frequency scaled message scheduler data path circuit are described. In one embodiment, a hardware accelerator includes a message digest data path circuit comprising a first message digest circuit to output a second state vector, at a first clock rate, based on a first state vector and an output from a first switch, and a second message digest circuit to output a third state vector, at the first clock rate, based on the second state vector and an output from a second switch; a message scheduler data path circuit comprising at least one first message scheduler circuit to output an element into a second message vector, at a second clock rate that is slower than the first clock rate, based on a plurality of elements of a first message vector, and at least one second message scheduler circuit to output an element into a fourth message vector, at the second clock rate that is slower than the first clock rate, based on a plurality of elements of a third message vector; and a controller to switch the first switch at the second clock rate between sourcing a first element of the first message vector and a first element of the third message vector as the output from the first switch, and switch the second switch at the second clock rate between sourcing a second element of the first message vector and a second element of the third message vector as the output from the second switch.

Managing blockchain-based centralized ledger systems

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing blockchain-based centralized ledger systems. One of the methods includes transmitting individual timestamp requests for to-be-timestamped blocks in a blockchain to a trust time server independent from a blockchain-based centralized ledger system that stores data in the blockchain, the blockchain including a plurality of blocks storing transaction data, receiving respective timestamps and associated signatures for the to-be-timestamped blocks from the trust time server, and storing information of the respective timestamps and associated signatures for the to-be-timestamped blocks in respective timestamped blocks in the blockchain, any adjacent two of the timestamped blocks in the blockchain being anchored with each other.