会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Detecting radiation-based attacks
    • 检测基于辐射的攻击
    • US20080059741A1
    • 2008-03-06
    • US11515103
    • 2006-09-01
    • Alexandre CroguennecYves Fusella
    • Alexandre CroguennecYves Fusella
    • G06F12/14
    • G11C7/24G11C16/22
    • In a device having a plurality of circuits that can store at least a first value and a second value, a method can include configuring at least one circuit to persistently store the first value; determining whether the at least one circuit is storing the second value; and initiating a countermeasure if the at least one circuit is storing the second value. Determining whether the at least one circuit is storing the second value can include detecting whether the device has been attacked. Non-limiting examples of initiating a countermeasure can include resetting a portion of the device, powering down a portion of the device, activating an alarm circuit, causing protected data stored in the device to be erased, causing portions of the device to self-destruct, or causing the device to not respond to input applied to the interface.
    • 在具有可以存储至少第一值和第二值的多个电路的设备中,方法可以包括配置至少一个电路以持久存储第一值; 确定所述至少一个电路是否存储所述第二值; 以及如果所述至少一个电路正在存储所述第二值,则启动对策。 确定至少一个电路是否存储第二值可以包括检测设备是否已被攻击。 启动对策的非限制性示例可以包括重置设备的一部分,断开设备的一部分,启动报警电路,使存储在设备中的受保护数据被擦除,从而使设备的部分自毁 ,或使设备不响应​​应用于该接口的输入。
    • 7. 发明申请
    • DATA SECURITY
    • 数据安全
    • US20100064144A1
    • 2010-03-11
    • US12207983
    • 2008-09-10
    • Majid KaabouchAlexandre CroguennecCarine Lefort
    • Majid KaabouchAlexandre CroguennecCarine Lefort
    • G06F12/14
    • G06F21/85G06F12/1408
    • This document discloses data security systems and methods of securing data. A cache memory can be connected between a decryption engine and a central processing unit (“CPU”) to increase security of encrypted data that is stored in a datastore. The decryption engine can retrieve the encrypted data from the datastore, decrypt the data, and store the decrypted data in the cache. In turn, the decrypted data can be accessed by the CPU. The data can be encrypted with a secret key, so that decryption can be performed with the secret key. The key can be varied based on a memory address associated with the data. The key can be protected by restricting direct access to the decryption engine by the CPU.
    • 本文件公开了数据安全系统和数据保护方法。 缓存存储器可以连接在解密引擎和中央处理单元(“CPU”)之间,以增加存储在数据存储区中的加密数据的安全性。 解密引擎可以从数据存储区检索加密的数据,解密数据,并将解密的数据存储在缓存中。 反过来,解密的数据可以被CPU访问。 可以使用秘密密钥对数据进行加密,从而可以用密钥执行解密。 密钥可以根据与数据相关联的存储器地址而变化。 可以通过限制CPU直接访问解密引擎来保护密钥。
    • 9. 发明授权
    • Data security
    • 数据安全
    • US08782433B2
    • 2014-07-15
    • US12207983
    • 2008-09-10
    • Majid KaabouchAlexandre CroguennecCarine Lefort
    • Majid KaabouchAlexandre CroguennecCarine Lefort
    • G06F12/14G06F21/85
    • G06F21/85G06F12/1408
    • This document discloses data security systems and methods of securing data. A cache memory can be connected between a decryption engine and a central processing unit (“CPU”) to increase security of encrypted data that is stored in a datastore. The decryption engine can retrieve the encrypted data from the datastore, decrypt the data, and store the decrypted data in the cache. In turn, the decrypted data can be accessed by the CPU. The data can be encrypted with a secret key, so that decryption can be performed with the secret key. The key can be varied based on a memory address associated with the data. The key can be protected by restricting direct access to the decryption engine by the CPU.
    • 本文件公开了数据安全系统和数据保护方法。 缓存存储器可以连接在解密引擎和中央处理单元(“CPU”)之间,以增加存储在数据存储区中的加密数据的安全性。 解密引擎可以从数据存储区检索加密的数据,解密数据,并将解密的数据存储在缓存中。 反过来,解密的数据可以被CPU访问。 可以使用秘密密钥对数据进行加密,从而可以用密钥执行解密。 密钥可以根据与数据相关联的存储器地址而变化。 可以通过限制CPU直接访问解密引擎来保护密钥。
    • 10. 发明授权
    • Detecting radiation-based attacks
    • 检测基于辐射的攻击
    • US08352752B2
    • 2013-01-08
    • US11515103
    • 2006-09-01
    • Alexandre CroguennecYves Fusella
    • Alexandre CroguennecYves Fusella
    • G06F21/00
    • G11C7/24G11C16/22
    • In a device having a plurality of circuits that can store at least a first value and a second value, a method can include configuring at least one circuit to persistently store the first value; determining whether the at least one circuit is storing the second value; and initiating a countermeasure if the at least one circuit is storing the second value. Determining whether the at least one circuit is storing the second value can include detecting whether the device has been attacked. Non-limiting examples of initiating a countermeasure can include resetting a portion of the device, powering down a portion of the device, activating an alarm circuit, causing protected data stored in the device to be erased, causing portions of the device to self-destruct, or causing the device to not respond to input applied to the interface.
    • 在具有可以存储至少第一值和第二值的多个电路的设备中,方法可以包括配置至少一个电路以持久存储第一值; 确定所述至少一个电路是否存储所述第二值; 以及如果所述至少一个电路正在存储所述第二值,则启动对策。 确定至少一个电路是否存储第二值可以包括检测设备是否已被攻击。 启动对策的非限制性示例可以包括重置设备的一部分,断开设备的一部分,启动报警电路,使存储在设备中的受保护数据被擦除,从而使设备的部分自毁 ,或使设备不响应​​应用于该接口的输入。