scispace - formally typeset
Patent

Method, system and integrated circuit for enabling access to a memory element

TLDR
In this article, a system comprises a signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least 1 memory element.
Abstract
A system comprises signal processing logic that is operably coupled to at least one memory element and is arranged to enable access to the at least one memory element. The signal processing logic is arranged to receive a security key, generate a system key using the received security key and a system specific seed, perform a comparison of the generated system key to a reference key stored in an area of memory of the at least one memory element. The signal processing logic is also arranged to configure a level of access to the at least one memory element based at least partly on the comparison of the generated system key to the reference key stored in memory.

read more

Citations
More filters
Patent

End-to-End Trusted Communications Infrastructure

TL;DR: In this article, the authors proposed a method of delivery of medical data via a trusted end-to-end communication link to a medical data server, where an application that receives the message executes in a trusted security zone of the server.
Patent

Trusted security zone access to peripheral devices

TL;DR: In this paper, the authors propose a trusted data communication protocol for a processor, where the processor is a component of a computer, and the controller is a peripheral device or a user interface device.
Patent

Systems and Methods for Provisioning and Using Multiple Trusted Security Zones on an Electronic Device

TL;DR: In this article, the authors propose a method of provisioning a subordinate trusted security zone in a processor having a trusted security zones, which includes receiving by a master trusted application executing in a master-trusted security zone of the processor a request to provision a subordinate-security zone in the processor.
Patent

Web server bypass of backend process on near field communications and secure element chips

TL;DR: In this paper, a mobile access terminal providing access to data in a secure element of the mobile access terminals is provided, consisting of a web browser, a near field communications system, an over-the-air proxy, and an application programming interface layer.
Patent

Extended trusted security zone radio modem

TL;DR: In this article, a cellular wireless modem consisting of a cellular radio transceiver, a short range communication interface, a processor, and a memory is used to store an input forwarding application and a trusted security zone extension application.
References
More filters
Book ChapterDOI

TEA, a tiny encryption algorithm

TL;DR: This paper gives a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
Book

Practical UNIX and Internet Security

TL;DR: This book discusses computer security basics, network and Internet security, auditing, Logging, and Forensics, and the role of Unix in the modern deployment environment.
Patent

User authentication system for authenticating an authorized user of an IC card

TL;DR: In this paper, the authors proposed a user authentication system for authenticating a user using an IC card in conjunction with a portable terminal used to generate a one-time password and a server that generates a corresponding one time password for user authentication.
Patent

Method for Protecting Intellectual Property Cores on Field Programmable Gate Array

TL;DR: In this paper, the authors present techniques to protect intellectual property cores on field programmable gate arrays (FPGAs) by associating each FPGA with a secret key, which is used to charge a customer per-use or per-configuration of their intellectual property.
Patent

A data protection method for a removable storage medium and a storage device using the same

TL;DR: In this paper, a data protection method is used for protecting data recorded on a removable storage medium such as an optical magnetic disk, which includes the steps of authorizing to read and access a part of a directory area on a storage medium without specifying a password given to the removable disk.