SOFTWARE INTELLECTUAL PROPERTY PROTECTION SYSTEMS AND METHODS FOR EMBEDDED PLATFORMS
Granted: February 7, 2019
Application Number:
20190042712
Presented are software IP protection systems and methods that prevent potential attackers as well as customers from having access to plain text versions of both library source code and binary code. Potential attackers are prevented from reusing the software on other platforms. The protection mechanism does not impact the functionality or the performance of the library itself and does not interfere with existing software update mechanisms or application developer tools, such as JTAG.
INDICATOR OF STERILIZATION EFFICACY USING A DATA LOGGER WITH CLOUD/SOFTWARE APPLICATION
Granted: December 6, 2018
Application Number:
20180348061
The invention relates to a device (6) for communicating data with a data logger (28) that measures the temperature of ambient gas and logs the temperature data into a memory (55). The device (6) includes a body (73) for mounting a data logger (28) thereon, wherein the data logger (28) is disposed inside a capsule (12, 40). The data logger (28) includes: top and bottom covers (50, 51) that define an enclosed space and includes an electrical circuit (52) disposed in the enclosed space and…
PHYSIOLOGICAL CONDITION DETERMINATION SYSTEM
Granted: November 22, 2018
Application Number:
20180333244
A physiological condition determination system and method can include: attaching a tag to animal tissue; emitting light into the animal tissue; detecting a first optical signal; extracting a first measurement of peripheral capillary oxygen saturation from the first optical signal; qualifying the first measurement of peripheral capillary oxygen saturation as a baseline; detecting a second optical signal with the optical sensor; extracting a second measurement of peripheral capillary…
METHOD AND APPARATUS FOR MULTI-PHASE DC-DC CONVERTERS USING COUPLED INDUCTORS IN DISCONTINUOUS CONDUCTION MODE
Granted: September 6, 2018
Application Number:
20180254708
A converter includes first and second coupled inductors. A first phase includes first high side and low side switches connected to the first inductor. A second phase includes second high side and low side switches connected to the second inductor. In discontinuous conduction mode, the controller determines, in response to the first high side switch being turned on and the second low side switch being turned off, that coupling between the first and second inductors is strong or weak based…
SYSTEMS AND METHODS FOR STABLE PHYSICALLY UNCLONABLE FUNCTIONS
Granted: June 7, 2018
Application Number:
20180159685
Various embodiments of the invention allow to take advantage of the natural statistical variation of physical properties in a semiconductor device in order to create truly random, repeatable, and hard to detect cryptographic bits. In certain embodiments, this is accomplished by recursively pairing mismatch values of PUF elements so as to ensure that generated PUF key bits remain insensitive to environmental errors, without affecting the utilization rate of available PUF elements. The…
POWER-GOOD DETECTOR FOR ULTRA-WIDE BAND TRANSMITTER WITH EMPHASIS ON LOW POWER CONSUMPTION
Granted: May 24, 2018
Application Number:
20180145706
Systems, devices and methods are disclosed using a transmitter architecture to keep the transmitter in a deep sleep mode before activation/enabling. The transmitter tag comprises a power-good-detector, a first regulator and a second regulator. The power-good-detector includes a power-good-latch, a ring oscillator and a ripple counter. Upon disconnecting a GPIO pin from the ground, the power-good-latch sends a Bias_EN signal to the regulator. Upon receipt of the Bias_EN signal, the first…
LOW POWER ULTRA-WIDE-BAND TRANSMITTER
Granted: May 3, 2018
Application Number:
20180123639
Systems, devices and methods are disclosed for an ultra-wide-band (UWB) transmitter tag capable of operating in different power mode depending on voltage level and/or host interruption signal. The transmitter tag comprises a power management circuit, a one-time-programmable memory (OTP), a read/write memory, a state machine for controlling/monitoring the operation of the tag. The tag goes into the high power mode when the power supply ramps up to a preset voltage level. During the high…
SECURE PAYMENTS WITH UNTRUSTED DEVICES
Granted: April 26, 2018
Application Number:
20180114210
Various embodiments of the present invention relate to a point-of-sale (POS) system, and more particularly, to systems, devices and methods of making secure payments using a mobile device in addition to a POS terminal that may be an insecure payment device exposed to various tamper attempts under certain circumstances. The mobile device is involved in a trusted transaction between a central financial entity, e.g., a bank, and the payment terminal, such that the insecure payment terminal…
Method and Apparatus for Disabling High Speed Bus Operation Under High Common Mode Voltage Conditions
Granted: April 5, 2018
Application Number:
20180095519
An apparatus including a handshake window enabler having a pair of differential inputs and a window enablement output, a common mode detector coupled to a power input and a ground input and having a handshake inhibit output, and a handshake disabler coupled to the handshake window enabler, the common mode detector, and the pair of differential inputs. If a common mode voltage that out of range (“too high”) is detected, high speed handshake protocols are such that the bus operates a…
SYSTEMS AND METHODS FOR OPERATING SECURE ELLIPTIC CURVE CRYPTOSYSTEMS
Granted: March 1, 2018
Application Number:
20180062844
Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as sample power analysis, caused by…
SYSTEMS AND METHODS FOR A SECURE PAYMENT TERMINAL WITHOUT BATTERIES
Granted: January 18, 2018
Application Number:
20180018673
Various embodiments of the present disclosure provide systems and methods for securing electronic devices, such as financial payment terminals, to protect sensitive data and prevent unauthorized access to confidential information. In embodiments, this is achieved without having to rely on the availability of backup energy sources. In certain embodiments, tampering attempts are thwarted by using a virtually perfect PUF circuit and PUF-generated secret or private key within a payment…
DEVICES FOR DETECTING ULTRA-WIDE BAND SIGNALS
Granted: December 21, 2017
Application Number:
20170366224
Embodiments of the present invention include systems for determining locations of UWB transmitters. The system (100) includes multiple UWB receivers (104) for receiving a UWB signal (120) emitted by a UWB transmitter (106). Each receiver (104) includes: RF amplifiers (306) arranged in a cascade structure, the RF amplifiers (306) receive and amplify the UWB signal; multiple baseband blocks (308), each of the baseband blocks is coupled to the corresponding RF amplifier (306) and taps an…
SYSTEMS AND METHODS FOR ENHANCING CONFIDENTIALITY VIA LOGIC GATE ENCRYPTION
Granted: November 2, 2017
Application Number:
20170317677
Presented are systems and methods that allow hardware designers to protect valuable IP and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input. In certain embodiments, a logic function provides results that are dependent not only on input values but also on an encrypted logic key that determines connections for a given logic…
PEAK DETECTION IN DATA STREAM
Granted: September 14, 2017
Application Number:
20170264380
Embodiments of the present invention include methods and systems for detecting a peak of an ultra-wide-band (UWB) signal in a data stream. The system (1100) for detecting a peak of an ultra-wide-band (UWB) signal (1120) in a data stream (102) includes: one or more processors (1001); and a non-transitory computer-readable medium or media (1002) comprising one or more sequences of instructions which, when executed by the one or more processors (1001), causes steps to be performed…
POWER ADAPTIVE DUAL MODE CARD EMULATION SYSTEM FOR NFC AND RFID APPLICATION
Granted: June 1, 2017
Application Number:
20170155429
An adaptive dual mode card emulation system (in Card Emulation Mode or PICC design) within an NFC device is disclosed to solve the strong field power delivering issue and also achieve longer communication range. The NFC device may be a NFC tag or an electronic device (such as a smartphone) operated in a card emulation mode. The NFC device comprises an antenna used for wireless communication. The adaptive dual mode card emulation system comprises a passive load modulation (PLM) module, an…
ORIENTATION AWARE AUDIO SOUNDSTAGE MAPPING FOR A MOBILE DEVICE
Granted: January 26, 2017
Application Number:
20170026772
A mobile device with orientation aware audio mapping capability is disclosed. The mobile device has an aux speaker, a loud speaker, a sensor for device orientation detection, and a processor (or processors) coupled to the sensor and the speakers. Depending on the device orientation, the processor sends a mapped audio output to the speakers. The mapped audio output may be a mono audio signal or a stereo audio signal. The stereo audio output signal may be a stereo audio output signal with…
SYSTEMS AND METHODS FOR AUTHENTICATION BASED ON PHYSICALLY UNCLONABLE FUNCTIONS
Granted: January 5, 2017
Application Number:
20170005811
Presented are systems, devices, and methods for reliably authenticating asymmetric cryptography-based ICs based on Physically Unclonable Functions (PUFs) that are immune to reverse engineering. Various embodiments of the invention enhance the level of security in IC architectures without the need to connect to a remote certification authority, thereby, eliminating shortfalls associated with online authentication. Certain embodiments accomplish this by using a PUF-generated secure private…
SYSTEMS AND METHODS FOR OPERATING SECURE ELLIPTIC CURVE CRYPTOSYSTEMS
Granted: September 22, 2016
Application Number:
20160277178
Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as sample power analysis, caused by…
MOBILE PERSONAL POINT-OF-SALE TERMINAL
Granted: September 22, 2016
Application Number:
20160275478
A customer mobile personal point-of-sale terminal (CMPPT) includes a Point-Of-Sale (POS) sleeve portion that slidingly engages, and couples to, a cellular telephone. The cellular telephone is used to communicate encrypted information between a financial transaction verification entity (FTVE) and the POS sleeve portion. The sleeve portion includes a mechanism for reading in a merchant account number at the point-of-sale, and for communicating in a secure encrypted fashion with the FTVE…
BACKWARD COMPATIBLE SYSTEM AND METHOD FOR USING 4P AUDIO JACK TO PROVIDE POWER AND SIGNAL TO HEADSET WITH ACTIVE NOISE CANCELLATION
Granted: August 25, 2016
Application Number:
20160249127
A backward compatible system and method for using 4P audio jack in an electronic device to provide power and signal to headset with active noise cancellation (ANC) as well as accessories that require an external power are disclosed. The method involves automatically deciding at the electronic device accessory type after accessory insertion detected and choosing proper accessory communication mode based at least on the decided accessory type and accessory input signal. The accessory…