H04L2209/12

Snooping detection between silicon elements in a circuit
09846187 · 2017-12-19 · ·

An electronic circuit with protection against eavesdropping, including a first circuit element embedded in the electronic circuit, a second circuit element embedded in the electronic circuit, one or more connection lines between the first circuit element and the second circuit element, a first monitoring unit in the first circuit element for measuring capacitance of at least one of the connection lines between the first circuit element and the second circuit element, wherein the first monitoring unit is configured to identify changes in capacitance of the connection lines and to initiate actions to prevent eavesdropping in response to identifying changes.

PUF-FILM AND METHOD FOR PRODUCING THE SAME
20220384368 · 2022-12-01 ·

A method for producing a PUF-film includes printing a layer of dielectric material on a film substrate, such that a variable thickness of the layer is obtained by the printing. The method includes arranging a structured electrode layer on the dielectric material such that the structured electrode layer is influenced with respect to an electric measurement value due to the variable thickness.

ONE INS NETWORK-BASED ANTI-FAULT ATTACK METHOD OF RANDOM INFECTION
20170359165 · 2017-12-14 ·

The present invention discloses an INS network-based anti-fault attack method of random infection, comprising the steps of sending the plain-text into an encryption processor, wherein two groups of cipher text are outputted through temporal or spatial redundancy; conducting XOR operation) on the two groups of said cipher text output to obtain the output difference; sending the said output difference into an infection function module to initiate an infection operation to obtain the infection result; conducting XOR operation on any of said groups of cipher text output to generate the final output. The present invention can realize the randomization of infection function in infection countermeasures, reduce the successful probability of fault attack and improve the safety of the circuit.

System and method to secure on-board bus transactions
09842214 · 2017-12-12 · ·

A technique for securing on-board bus transactions in a computing device is discussed. A shared key is generated and then programmed into the read-only non-volatile write-once storage of two on-board components. The shared key may be generated during the manufacturing process. Once complete, all transactions between the two on-board components are encrypted by the components using the shared key without exposing the key on any external bus.

MODULAR SECURITY CONTROL DEVICE

A modular security control device for controlling an apparatus or an installation includes a basic control apparatus which is configured such that an apparatus or an installation which is at least connectable to the basic control apparatus is at least controllable via a sequence of a control program in the basic control apparatus, and includes a security module which is configured to provide or perform a cryptographic functionality for the basic control apparatus, where the security module is connected to the basic control apparatus by a data connection via a data interface, the basic control apparatus is configured to interact with the security module to achieve a security function of the security control device, and where the basic control apparatus is configured to query an identity and/or authenticity of the security module.

SYSTEMS AND METHODS FOR USING EXTENDED HARDWARE SECURITY MODULES
20170351879 · 2017-12-07 ·

An extended hardware security module (“HSM”) possessing additional security properties relative to conventional HSMs and methods for initializing, deploying, and managing such extended HSMs in a networked environment. In the preferred embodiment, an extended HSM includes additional hardware and software components that configure it to run sensitive client tasks on demand inside a cloud-hosted, anti-tamper HSM housing so as to ensure sensitive data is encrypted when stored or processed outside the housing. Methods for initializing, deploying, and managing provide a framework through which extended HSMs may be secured from their initial assembly through their availing for use and actual use over a network by one or more clients. Such use often entails repeated discrete sequential secure sessions and concurrent discrete secure sessions.

INFORMATION PROCESSING APPARATUS, METHOD FOR PROCESSING INFORMATION, AND MEDIUM
20170353299 · 2017-12-07 ·

An information processing apparatus for encrypting or decrypting data by AES scheme, includes a processor; and a memory storing a first table including mixed components based on exclusive OR of first random components and key data, a second table, and a third table. The processor executes selecting four bytes of sub-round data from the data; a first transformation based on the first table, for each of one-byte data items of the sub-round data, to generate first data by taking exclusive OR of the one-byte data items and the mixed components; a second transformation based on the second table to transform the first data into second data; a third transformation based on the third table to transform the second data into multiple items of third data; calculating exclusive OR of the third data.

METHOD FOR GUARANTEEING RELIABILITY OF REAL-TIME SCRAMBLING AND MESSAGE TRANSMISSION BY TRAIN CONTROL CENTER SYSTEM

The invention relates to a method for guaranteeing the reliability of real-time scrambling and message transmission by a train control center system. The method comprises the following steps: S1, starting the system for offline message loading and reading; S2, obtaining message data to be scrambled; S3, sending the message to be scrambled to a scrambling operation board for scrambling; S4, performing inverse decoding processing on an operation board; S5, performing comparison after decoding; and S6, outputting effective message data. Compared with the prior art, the invention has the advantages of being capable of guaranteeing the safety and reliability of message data.

DEVICE, SYSTEM AND METHOD FOR THE ENCRYPTED STORAGE OF CLINICAL-SURGICAL DATA

The present invention describes means for encrypted storage of clinical-surgical data from a clinical-surgical environment, and a device adapted for such function being proposed. Specifically, the present invention comprises an integrator provided with a processor being capable of receiving clinical-surgical data from a plurality of signal sources, such that the integrator comprises an electrical isolator arranged at the inputs receiving the physical connections of the signal sources, providing a high degree security in order to avoid fraud, damage to data/signals generated in the clinical-surgical event and injury to the patient. The present invention refers to the fields of health, medicine, information technology and electrical engineering.

Encryption method and system using a random bit string encryption key
09836281 · 2017-12-05 ·

Methods and systems for encrypting data are disclosed. A circuit uses a white noise generator to capture a random string of bits as an encryption key. The encryption key is generated at a central server and is provided to a subscriber on a physical memory device. The subscriber uses the encryption key to encrypt a source data file. The encrypted data file is sent to the central server, which uses the encryption key to decrypt the encrypted data file and to recover the source data file. The file name for the source data file may be encrypted into the encrypted data file and a new name assigned to the encrypted data file. A random number index may be used to identify the starting point of the encrypted file.