$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for preventing electronic memory tampering 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/28
  • H04L-009/30
  • H04Q-007/32
출원번호 US-0706574 (1996-09-05)
발명자 / 주소
  • Osborn William R.
출원인 / 주소
  • Ericsson Inc.
대리인 / 주소
    Burns, Doane, Swecker & Mathis, L.L.P.
인용정보 피인용 횟수 : 179  인용 특허 : 20

초록

Methods and apparatus for preventing tampering with memory in an electronic device, such as a cellular telephone, are disclosed. An electronic device having a memory and a processing means contains logic that is used to perform a one-way hash calculation on the device's memory contents whereby an au

대표청구항

[ What is claimed is:] [1.] A cellular telephone comprising:a microprocessor; anda memory;wherein the microprocessor performs a hash calculation on contents of the memory to derive an audit hash value, which audit hash value is compared to a valid hash value previously derived from perlormance of th

이 특허에 인용된 특허 (20)

  1. Sammarco Anthony J. (Garner NC), Authentication key entry in cellular radio system.
  2. Rosenthal Eugene J. ; Silverman David Phillip ; Zaleski Michael, Automatic authentication system.
  3. Reeds ; III James A. (New Providence) Treventi Philip A. (Murray Hill) Yu I-Hsiang (Cedar Knolls NJ), Cellular telephony authentication arrangement.
  4. Raith Alex K. (Durham NC), Cellular verification and validation system.
  5. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  6. Moore James W. (Potomac MD), Hybrid encryption method and system for protecting reusable software components.
  7. Hendrickson Alan F. (Austin TX) Damien Bruno (Voisins le Bretonneux FRX), Method and apparatus for protecting cordless telephone account authentication information.
  8. Ugon Michel (Maurepas FRX) Oisel Andr (Elancourt FRX), Method for checking the integrity of a program or data, and apparatus for implementing this method.
  9. Dent Paul W. (Stehag SEX) Raith Alex K. (Kista SEX) Dahlin Jan E. S. (Jrflla SEX), Method of carrying out an authentication check between a base station and a mobile station in a mobile radio system.
  10. Akiyama Ryota (Kawasaki JPX) Yabe Toshihiro (Kawasaki JPX) Motohashi Kazutoshi (Kawasaki JPX), Method of registering identification number in personal communication terminal.
  11. Shamir Adi (Rehovot ILX) Fiat Amos (Rehovot ILX), Method, apparatus and article for identification and signature.
  12. Paulini Werner (Salzkotten DEX) Wessel Dietmar (Delbrck DEX), Process for securing and for checking the integrity of the secured programs.
  13. Anderson Walter M. (64 Wildwood Rd. Bedford MA 01730), Public key cryptographic system and method.
  14. Zicker Robert G. (Houston TX) Dion John K. (The Woodlands TX) Blair Kevin B. (Spring TX) Austin William J. (Spring TX), Remote accessing system for cellular telephones.
  15. Kung Kenneth C. (Cerritos CA), Secure mobile storage.
  16. Krolopp Robert K. (Hoffman Estates IL) Auchter Thomas J. (Barrington IL) Pregont Gary J. (Elgin IL) Dabbish Ezzat A. (Buffalo Grove IL), Secure transfer of radio specific data.
  17. Gaskins Ronald E. (Kokomo IN), Security method for protecting electronically stored data.
  18. Reeds ; III James A. (New Providence NJ) Treventi Philip A. (Murray Hill NJ), Service provision authentication protocol.
  19. Niiyama Manabu (Sendai JPX) Sakata Minoru (Sendai JPX), System for rewriting information in rewritable memory provided in portable remote terminal and portable remote terminal.
  20. Kikuchi Hiroaki (Kawasaki JPX), User authenticating system and method in wide area distributed environment.

이 특허를 인용한 특허 (179)

  1. Labaton, Isaac J, Acoustic encoding of dynamic identification codes.
  2. Labaton,Isaac, Acoustic encoding of dynamic identification codes.
  3. Sion, Radu, Anti-tamper system.
  4. Hars, Laszlo; Beaver, Donald Rozinak, Apparatus and method for protecting diagnostic ports of secure devices.
  5. Diebold, Michael; Potschadtke, Jens; Behrens, Günter; Bode, Sven, Apparatus for and method of operating a mobile communication device sensor.
  6. Clarke, Dwaine; Gassend, Blaise; Dijk, Marten Van; Devadas, Srinivas, Authentication of integrated circuits.
  7. Devadas, Srinivas; Gassend, Blaise, Authentication of integrated circuits.
  8. Ziola, Thomas; Paral, Zdenek; Devadas, Srinivas; Suh, Gookwon Edward; Khandelwal, Vivek, Authentication with physical unclonable functions.
  9. Boatwright, John T., Call security system.
  10. Boatwright, John T., Call security system.
  11. Nehushtan, Rafi, Cellular device security apparatus and method.
  12. Nehushtan, Rafi, Cellular device security apparatus and method.
  13. Nehushtan, Rafi, Cellular device security apparatus and method.
  14. Nehushtan, Rafi, Cellular device security apparatus and method.
  15. Nehushtan, Rafi; Nehushtan, Refael, Cellular device security apparatus and method.
  16. Yu, Meng-Day, Combination of values from a pseudo-random source.
  17. Smeets,Ben, Data integrity mechanisms for static and dynamic data.
  18. Devadas, Srinivas; Gassend, Blaise, Data protection and cryptographic functions using a device-specific value.
  19. Haga, Tomoyuki; Matsushima, Hideki; Ito, Takayuki; Maeda, Manabu; Sato, Taichi, Detecting unauthorized tampering of a program.
  20. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  21. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  22. Bennett, James D.; Karaoguz, Jeyhan, Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery.
  23. Bennett, James D.; Karaoguz, Jeyhan, Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery.
  24. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  25. Patterson, James Frank; Wallner, Edward J, Event data protection method for a flash programmable microprocessor-based control module.
  26. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  27. Estakhri, Petro, Flash memory architecture implementing simultaneously programmable multiple flash memory banks that are host compatible.
  28. Estakhri, Petro; Nemazie, Siamack, Flash memory architecture with separate storage of overhead and user data.
  29. Estakhri, Petro; Nemazie, Siamack, Flash memory architecture with separate storage of overhead and user data.
  30. Estakhri, Petro; Nemazie, Siamack, Flash memory architecture with separate storage of overhead and user data.
  31. Estakhri, Petro; Nemazie, Siamack, Flash memory architecture with separate storage of overhead and user data.
  32. Estakhri,Petro; Nemazie,Siamack, Flash memory architecture with separate storage of overhead and user data.
  33. Estakhri, Petro; Assar, Mahmud, Flash memory card with enhanced operating mode detection and user-friendly interfacing system.
  34. Estakhri,Petro; Assar,Mahmud, Flash memory card with enhanced operating mode detection and user-friendly interfacing system.
  35. Estakhri,Petro; Assar,Mahmud, Flash memory card with enhanced operating mode detection and user-friendly interfacing system.
  36. Estakhri,Petro; Assar,Mahmud, Flash memory card with enhanced operating mode detection and user-friendly interfacing system.
  37. Estakhri, Petro, Flash memory system and method implementing LBA to PBA correlation within flash memory array.
  38. Yu, Meng-Day; Devadas, Srinivas, Index-based coding with a pseudo-random source.
  39. Hamlin, Christopher L., Integrated circuit comprising encryption circuitry selectively enabled by verifying a device.
  40. Devadas, Srinivas; Gassend, Blaise, Integrated circuit that uses a dynamic characteristic of the circuit.
  41. Lapstun, Paul; Silverbrook, Kia, Interactive device network registration protocol.
  42. Frank, Alexander; Hall, Martin H.; Phillips, Thomas G., Isolated computing environment anchored into CPU and motherboard.
  43. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  44. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  45. Bodensjö, Marcus; Osthoff, Harro; Schalin, Patrik; Smeets, Bernard, Loading data onto an electronic device.
  46. Pruscino,Angelo; Zoll,Michael; Chan,Wilson, Maintain fairness of resource allocation in a multi-node environment.
  47. Chang, Ching-Wen, Memory management method, controller, and storage system.
  48. Hars, Laszlo, Method and apparatus for authenticated data storage.
  49. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  50. Hilbert, John, Method and apparatus for changing firmware in a gaming printer.
  51. Hilbert, John, Method and apparatus for changing firmware in a gaming printer.
  52. Jacobs Pamela J., Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system.
  53. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  54. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  55. Mauro,Anthony, Method and apparatus for providing secure processing and data storage for a wireless communication device.
  56. Gehrmann, Christian; Damberg, Kent; Smeets, Bernard, Method and apparatus for secure hardware analysis.
  57. Smeets,Bernhard Jan Marie; Poon,Kar Fat; Bodensjo,Marcus, Method and apparatus for secure leveled access control.
  58. Moss,Robert Wayne; Forehand,Monty Aaron; Matthews, Jr.,Donald Preston; Hars,Laszlo; Beaver,Donald Rozinak; Thiesfeld,Charles William; Trantham,Jon David; Goodwill,William Preston, Method and apparatus for securing communications ports in an electronic device.
  59. Sibert, Hervé; Ståhl, Per, Method and apparatus for software boot revocation.
  60. Lipsit, James Mason, Method and apparatus for storing activation data in a cellular telephone.
  61. Lipsit, James Mason, Method and apparatus for storing activation data in a cellular telephone.
  62. Lipsit,James Mason, Method and apparatus for storing activation data in a cellular telephone.
  63. Vogt,James R.; Hasbun,Robert N.; Brizek,John P., Method and device for providing hidden storage in non-volatile memory.
  64. Williams, Emrys, Method and system for accepting a pass code.
  65. Gunyakti,Caglar; Hatlelid,Kristjan Eric, Method and system for limiting software updates.
  66. Kiiveri,Antti, Method for processing audiovisual information in an electronic device, a system, and an electronic device.
  67. R��nkk��,Risto; Sormunen,Toni; Kiiveri,Antti; Jauhiainen,Antti, Method for processing information in an electronic device, a system, an electronic device and a processing block.
  68. Arne Norefors SE; Yi Cheng SE; Lorens Almehag SE; Karl Dan Gustav Jerrestam SE, Method for secure handover.
  69. Figueroa, David; Hutchison, James A., Method for securely storing a programmable identifier in a communication station.
  70. Sormunen,Toni; Ronkka,Risto; Kiiveri,Antti, Method for securing an electronic device, a security system and an electronic device.
  71. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  72. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  73. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  74. Brune,Peter; Sasse,Andreas, Method of distributing keys to subscribers of communications networks.
  75. Miller, Norbert; Pischke, Juergen; Feilen, Oliver; Loechel, Norbert, Method of protecting microcomputer system against manipulation of data stored in a memory assembly of the microcomputer system.
  76. Floden Anders,SEX ; Darroch John,SEX ; Johansson Lena,SEX ; Johannsen Berndt Ove,SEX, Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network.
  77. Vilppola, Kari M.; Manttari, Tommmi O., Method, apparatus, and computer program for providing application security.
  78. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  79. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  80. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  81. Estakhri, Petro; Assar, Mahmud, Methods and apparatus for identifying operating modes for peripheral devices.
  82. Aaron, Jeffrey A., Methods, systems and computer program products for detecting tampering of electronic equipment based on constrained time to obtain computational result.
  83. Aaron, Jeffrey A., Methods, systems and computer program products for detecting tampering of electronic equipment based on constrained time to obtain computational result.
  84. Robertson, Ian; Bowman, Roger Paul; Wood, Robert Henderson, Microcode-based challenge/response process.
  85. Weber, Jochen; Schneider, Klaus; Aue, Axel, Microprocessor system and method for detecting the exchange of modules of the system.
  86. Toombs,Thomas N.; Holtzman,Micky, Multiple mode communication system.
  87. Toombs, Thomas N.; Holtzman, Micky, Multiple mode communications system.
  88. Devadas, Srinivas, Non-networked RFID-PUF authentication.
  89. Kim, Jung-Soo; Jung, Bong-Kil, Nonvolatile memory devices and solid state drives including the same.
  90. Boris Klots ; Roger J. Bamford ; Jeffrey Fischer ; Ravi Mirchandaney, Object hashing with incremental changes.
  91. Madoukh, Ashraf T., Object-based security system.
  92. Lapstun,Paul; Silverbrook,Kia, Optical sensing device for reading coded data on a surface and registration network for same.
  93. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  94. King, Benjamin John, Peer to peer secure synchronization between handheld devices.
  95. Tanada, Yoshifumi; Yamazaki, Shunpei; Arai, Yasuyuki; Moriya, Yoshitaka, Personal data management system and nonvolatile memory card.
  96. Swaay, Eveline Wesby-van, Programmable communicator.
  97. Wesby-van Swaay, Eveline, Programmable communicator.
  98. Wesby-van Swaay, Eveline, Programmable communicator.
  99. Wesby-van Swaay, Eveline, Programmable communicator.
  100. Wesby-van Swaay, Eveline, Programmable communicator.
  101. Wesby-van Swaay, Eveline, Programmable communicator.
  102. Wesby-van Swaay, Eveline, Programmable communicator.
  103. Wesby-van Swaay, Eveline, Programmable communicator.
  104. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  105. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  106. Lapstun, Paul; Silverbrook, Kia, Registration network for an optical sensing device.
  107. Lapstun,Paul; Silverbrook,Kia, Registration network for optical sensing device including printer as base station.
  108. Devadas, Srinivas; Gassend, Blaise, Reliable generation of a device-specific value.
  109. Estakhri, Petro, Removable memory media with integral indicator light.
  110. Estakhri,Petro, Removable memory media with integral indicator light.
  111. Vadekar, Ashok; Neill, Brian, Retrofitting authentication onto firmware.
  112. Smeets,Bernard, SIM card to mobile device interface protection method and system.
  113. Lundblade, Laurence; Phillips, Marc S.; Minear, Brian; Zhuang, Yan; Krishnan, Anand; Sprigg, Stephen A.; Chmaytelli, Mazen; Oliver, Mitchell B.; Horel, Gerald Charles; Crossland, Karen, Safe application distribution and execution in a wireless environment.
  114. Lundblade, Laurence; Phillips, Marc S.; Minear, Brian; Zhuang, Yan; Krishnan, Anand; Sprigg, Stephen A.; Chmaytelli, Mazen; Oliver, Mitchell B.; Horel, Gerald Charles; Crossland, Karen, Safe application distribution and execution in a wireless environment.
  115. Lundblade, Laurence; Phillips, Marc S.; Minear, Brian; Zhuang, Yan; Krishnan, Anand; Sprigg, Stephen A; Chmaytelli, Mazen; Oliver, Mitchell B.; Horel, Gerald Charles; Crossland, Karen, Safe application distribution and execution in a wireless environment.
  116. Lundblade,Laurence; Phillips,Marc S.; Minear,Brian; Zhuang,Yan; Krishnan,Anand; Sprigg,Stephen A.; Chmaytelli,Mazen; Oliver,Mitchell; Horel,Gerald; Crossland,Karen, Safe application distribution and execution in a wireless environment.
  117. McDermott,John P., Secure attention instruction central processing unit and system architecture.
  118. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  119. Gehrmann, Christian; Smeets, Bernard, Secure loading and storing of data in a data processing device.
  120. Tucker, Peter L., Secure patient data recorder for recording monitored vital sign data.
  121. Tucker, Peter L., Secure patient data recorder for recording monitored vital sign data.
  122. Tucker, Peter L., Secure patient data recorder for recording monitored vital sign data.
  123. Devadas, Srinivas; Ziola, Thomas J., Securely field configurable device.
  124. Devadas, Srinivas; Ziola, Thomas J., Securely field configurable device.
  125. Gentles, Thomas A.; Loose, Timothy C.; Rothschild, Wayne H., Security of gaming software.
  126. Gentles,Thomas A.; Loose,Timothy C.; Rothschild,Wayne H., Security of gaming software.
  127. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  128. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  129. Berson, Thomas A.; Olson, Bryan; Fein, Michael E.; Mannheimer, Paul D.; Porges, Charles E.; Schloemer, David, Sensor with signature of data relating to sensor.
  130. Suh, Gookwon Edward; Devadas, Srinivas, Signal generator based device security.
  131. V��h�� Sipil��,Antti, Software integrity test.
  132. Barnes,Brian C.; Smith,David W.; Cole,Terry L.; Schmidt,Rodney; Strongin,Geoffrey S.; Barclay,Michael, Software modem with hidden authentication commands.
  133. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  134. Siu, Ta-yan, Special phone book entries.
  135. Morais, Dinarte R., System and method for applying security to memory reads and writes.
  136. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  137. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  138. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  139. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  140. Yamazaki, Shunpei; Koyama, Jun; Yamazaki, Yu, System and method for identifying an individual.
  141. Shell,Scott R.; Butler,Lee M.; Peev,Igor B.; Zhu,Yuhang, System and method for over the air configuration security.
  142. Broyles, Samuel K.; Quick, Jr., Roy Franklin, System and method for preventing replay attacks in wireless communication.
  143. Wesby, Philip Bernard, System and method for remote asset management.
  144. Wesby, Philip Bernard, System and method for remote asset management.
  145. Wesby, Philip Bernard, System and method for remote asset management.
  146. Wesby, Philip Bernard, System and method for remote asset management.
  147. Wesby, Philip Bernard, System and method for remote asset management.
  148. Wesby, Philip Bernard, System and method for remote asset management.
  149. Wesby, Philip Bernard, System and method for remote asset management.
  150. Wesby, Philip Bernard, System and method for remote asset management.
  151. Wesby, Philip Bernard, System and method for remote asset management.
  152. Takae, Naohito; Tani, Hiroyuki; Mitsuhashi, Mamoru, System and method for upgrading mobile handset.
  153. Morais, Dinarte R.; Andrews, Jeffrey A.; Hall, William E., System and method for using address bits to affect encryption.
  154. Morais,Dinarte R.; Andrews,Jeffrey A., System and method for using address bits to form an index into secure memory.
  155. Morais,Dinarte R.; Andrews,Jeffrey A., System and method for using address bits to signal security attributes of data in the address space.
  156. Morais, Dinarte R.; Andrews, Jeffrey A., System and method for using address lines to control memory usage.
  157. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  158. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  159. Yamazaki, Shunpei; Koyama, Jun, System for identifying an individual, a method for identifying an individual or a business method.
  160. Samson, Allan L; Keilty, Michael, System for preventing tampering with a signal conditioner remote from a host system.
  161. Lapstun, Paul; Silverbrook, Kia, System for registration of sensing device with printer.
  162. Jukka-Matti Karhu DE, System for remotely accessing data stored in a radiotelephone.
  163. Hamilton,Dave; Brinkman,John; Longawa,John; Randall,Charles Corris; Rampley,Rob; Ryle,Marcus, System, device, and method for providing secure electronic commerce transactions.
  164. Fries,Robert M.; Fleming,Michael K., Systems and methods for detecting tampering of a computer system by calculating a boot signature.
  165. Estakhri, Petro; Assar, Mahmud, Systems configured to identify an operating mode.
  166. Dive-Reclus, Corinne, Tamper evident removable media storing executable code.
  167. Chan, Wilson Wai Shun, Techniques for DLM optimization with re-mapping responsibility for lock management.
  168. Chan, Wilson Wai Shun, Techniques for DLM optimization with re-mastering events.
  169. Chan, Wilson Wai Shun, Techniques for DLM optimization with transferring lock information.
  170. Chan,Wilson Wai Shun; Yurek,Tolga, Techniques for achieving higher availability of resources during reconfiguration of a cluster.
  171. Chan,Wilson Wai Shun; Chandrasekaran,Sashikanth; Yurek,Tolga, Techniques for multiple window resource remastering among nodes of a cluster.
  172. Carneheim, Caisa; Moynihan, Marie, Terminal authentication procedure timing for data calls.
  173. Ala-Laurila, Juha; Hansen, Harri; Salvela, Juha, Transfer of security association during a mobile terminal handover.
  174. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  175. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  176. Robert Paul Morris, User authentication for portable electronic devices using asymmetrical cryptography.
  177. Robertson, Ian; Bowman, Roger Paul; Wood, Robert Henderson, Utilization of a microcode interpreter built in to a processor.
  178. Devadas, Srinivas; Ziola, Thomas, Volatile device keys and applications thereof.
  179. Devadas, Srinivas; Ziola, Thomas, Volatile device keys and applications thereof.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로