Patent
Method, system and integrated circuit for enabling access to a memory element
TLDR
In this article, a system comprises a signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least 1 memory element.Abstract:
A system comprises signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least one memory element. The signal processing logic is arranged to receive a security key, generate a system key using the received security key and a system specific seed, perform a comparison of the generated system key to a reference key stored in an area of memory of the at least one memory element. The signal processing logic is also arranged to configure a level of access to the at least one memory element based at least partly on the comparison of the generated system key to the reference key stored in memory.read more
Citations
More filters
Patent
End-to-End Trusted Communications Infrastructure
TL;DR: In this article, the authors proposed a method of delivery of medical data via a trusted end-to-end communication link to a medical data server, where an application that receives the message executes in a trusted security zone of the server.
Patent
Trusted security zone access to peripheral devices
TL;DR: In this paper, the authors propose a trusted data communication protocol for a processor, where the processor is a component of a computer, and the controller is a peripheral device or a user interface device.
Patent
Systems and Methods for Provisioning and Using Multiple Trusted Security Zones on an Electronic Device
Stephen J. Bye,Lyle W. Paczkowski,William M. Parsel,Carl J. Persson,Matthew C. Schlesener,Trevor D. Shipley +5 more
TL;DR: In this article, the authors propose a method of provisioning a subordinate trusted security zone in a processor having a trusted security zones, which includes receiving by a master trusted application executing in a master-trusted security zone of the processor a request to provision a subordinate-security zone in the processor.
Patent
Web server bypass of backend process on near field communications and secure element chips
TL;DR: In this paper, a mobile access terminal providing access to data in a secure element of the mobile access terminals is provided, consisting of a web browser, a near field communications system, an over-the-air proxy, and an application programming interface layer.
Patent
Extended trusted security zone radio modem
TL;DR: In this article, a cellular wireless modem consisting of a cellular radio transceiver, a short range communication interface, a processor, and a memory is used to store an input forwarding application and a trusted security zone extension application.
References
More filters
Book ChapterDOI
TEA, a tiny encryption algorithm
David Wheeler,Roger M. Needham +1 more
TL;DR: This paper gives a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
Book
Practical UNIX and Internet Security
TL;DR: This book discusses computer security basics, network and Internet security, auditing, Logging, and Forensics, and the role of Unix in the modern deployment environment.
Patent
User authentication system for authenticating an authorized user of an IC card
TL;DR: In this paper, the authors proposed a user authentication system for authenticating a user using an IC card in conjunction with a portable terminal used to generate a one-time password and a server that generates a corresponding one time password for user authentication.
Patent
Method for Protecting Intellectual Property Cores on Field Programmable Gate Array
TL;DR: In this paper, the authors present techniques to protect intellectual property cores on field programmable gate arrays (FPGAs) by associating each FPGA with a secret key, which is used to charge a customer per-use or per-configuration of their intellectual property.
Patent
A data protection method for a removable storage medium and a storage device using the same
TL;DR: In this paper, a data protection method is used for protecting data recorded on a removable storage medium such as an optical magnetic disk, which includes the steps of authorizing to read and access a part of a directory area on a storage medium without specifying a password given to the removable disk.