Abstract:
The present disclosure outlines various systems and methods for detecting an optical fault injection within an electronic device and/or preventing the optical fault injection from introducing an exploitable abnormality within the electronic device. These various systems and methods can include systems and methods that can detect or prevent laser injection attacks, which can include one or more small footprint complementary metal oxide silicon (CMOS) light detection circuits, or structures that can shield one or more transistors from a bottom side laser injection attack.
Abstract:
Dynamically splitting a job in wireless system between a processor other remote devices may involve evaluating a job that a wireless mobile communication (WMC) device may be requested to perform. The job may be made of one or more tasks. The WMC device may evaluate by determining the availability of at least one local hardware resource of the wireless mobile communication device in processing the requested job. The WMC device may apportion one or more tasks making up the requested job between the wireless mobile communication device and a remote device. The apportioning may be based on the availability of the at least one local hardware resource.
Abstract:
A security architecture in which a security module is integrated in a client machine, wherein the client machine includes a local host that is untrusted. The security module performs encryption and decryption algorithms, authentication, and public key processing. The security module also includes separate key caches for key encryption keys and application keys. A security module can also interface a cryptographic accelerator through an application key cache. The security module can authorize a public key and an associated key server. That public key can subsequently be used to authorize additional key servers. Any of the authorized key servers can use their public keys to authorize the public keys of additional key servers. Secure authenticated communications can then transpire between the client and any of these key servers. Such a connection is created by a secure handshake process that takes place between the client and the key server. A time value can be sent from the key server to the client, allowing for secure revocation of keys. In addition, secure configuration messages can be sent to the security module.
Abstract:
A Wireless mobile communication (WMC) device may maintain user preference information, which is unique to the WMC device capabilities and the device user. WMC devices located in near proximity of each other may be enabled to form an ad hoc wireless network wherein each WMC device within the network may function as a router for other devices. Utilizing such routing capability within an ad hoc wireless network may allow WMC devices that are out of their wireless coverage area to use other WMC devices within such ad hoc wireless network to route any impending communication through such other WMC devices wherein these devices may have wireless connectivity to their coverage networks. WMC devices that are may have external connectivity may be enable to be selective in routing information and/or data from other WMC devices in the ad hoc network.
Abstract:
A handheld wireless communication device (HWCD) establishes an ad hoc network comprising interconnected networks for a user. The HWCD gains access to content on a first device and controls communication of the content from the first device via the HWCD to a second device. The HWCD enables the second device to consume the content. The content may be streamed from the first device via the HWCD to the second device. The first device is a service provider network device or other network device. The access may be authenticated and/or secure. Secure access to the content is extended from the first device to the second device. The ad hoc network is configured and/or reconfigured until communication is complete. The HWCD comprises multiple wireless interfaces. The ad hoc network comprises a PAN, WLAN, WAN and/or cellular network. The HWCD may hand-off among base stations during communication of the content.
Abstract:
A thin-client embedded secure element, which includes a processor and a memory coupled to the processor, and a proxy client. The thin-client embedded secure element also includes a storage device including an identification uniquely identifying the thin-client secure element. The proxy client is configured to receive a request for the secured data from a module in the client device, establish a secure communication channel with a proxy server coupled to the computing device over a network, request the secured data from the proxy server using the identification, and provide the secured data to the module of the client device.
Abstract:
Methods and systems provide secure functions for a mobile client. A circuit may include a memory configured to store a server access key and a first function authentication key. The circuit may also include authentication circuitry configured to access the server access key to authenticate access to a server to download a function capsule comprising a first function and to access the first function authentication key to authenticate use of the first function of the function capsule.
Abstract:
Wireless mobile communication (WMC) devices located in operating proximity of each other may be enabled to form a mesh (ad hoc wireless) network. WMC devices in a mesh network may form a queuing system wherein each WMC device may store data forwarded to and/or from other WMC devices in the mesh network. Each WMC device in the mesh network may have different queuing capability based on a plurality of factors that may comprise internal factors such as processing, storage, power, and/or connectivity. The mesh network may comprise an internal addressing scheme that may enable utilization of the queuing system whether or not WMC devices in the mesh network are communicatively coupled to external networks.
Abstract:
A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines. The system also includes transformation logic coupled to the grid lines and configured to receive the first set of signals and transform the first set of signals to generate a second set of signals and transmit the second set of signals on a second set of grid lines. The system further includes verification logic coupled to the transformation logic and configured to compare the second set of signals to an expected set of signals.
Abstract:
Methods and systems for a persistent request generated by a wireless device, executed remotely and output to configurable local resources are described and may include generating via a handheld wireless communication device (HWCD) a persistent request for a user that may be communicated to remote devices for execution and storage of results. The stored results may be received from local resources local which may be configured by the remote devices based on user preferences to deliver the stored results to the user. The stored results may be received by the user via the HWCD or another wireless communication device, and the identity of the user may be authenticated prior to receiving the stored results. The remote devices may discover the local resources based on the detection of the user logging into the network. User preferences may be stored in networked devices or may be stored in the HWCD.