Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Inside Secure patents


Recent patent applications related to Inside Secure. Inside Secure is listed as an Agent/Assignee. Note: Inside Secure may have other listings under different names/spellings. We're not affiliated with Inside Secure, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Inside Secure-related inventors


Countermeasures for fault-injection attacks by optical and electromagnetic pulses

In a general aspect, an integrated circuit can include a network configured to detect fault-injection attacks on the integrated circuit, the network including a plurality of optical sensors. The integrated circuit can also include a surveillance flip-flop coupled with the network, the surveillance flip-flop being configured to signal a fault when one or more optical sensors of the plurality of optical sensors changes state. ... Inside Secure

Method and device for modulating an active load

In a general aspect, a method can include producing, by an inductive antenna circuit, a first periodic signal that is based on an alternating external magnetic field; producing, by an oscillator circuit, a second periodic signal that is based on the first periodic signal; and transmitting, in correspondence with a data-carrying modulation signal, a sequence of data bits. The transmitting can include sequentially and repetitively: applying, with the oscillator circuit operating in a free oscillation mode, the second periodic signal to the inductive antenna circuit; and inhibiting, with the oscillator circuit operating in a synchronous oscillation mode, application of the second periodic signal to the inductive antenna circuit. ... Inside Secure

Method and apparatus for hardware-enforced, always-on insertion of a watermark in a video processing path

A method, apparatus, article of manufacture, and a memory structure for inserting a watermark in a media program is described. In an exemplary embodiment, the method comprises the steps of receiving data comprising the media program in the receiver disposed at a subscriber station, generating a watermark, the watermark generated at least in part according to a secure data processor-unique identifier irreversibly stored in the secure data processor, processing the received data to reproduce the media program, and inserting portions of the generated watermark in the reproduced media program at locations determined at least in part according to the secure data processor-unique identifier to produce a watermarked media program provided for display.. ... Inside Secure

Method of securing a comparison of data during the execution of a program

This disclosure relates to a method for securing the execution of a program by a processor, including a comparison instruction for comparing two data items, followed by a program operation which is selected as a function of a comparison result provided by the comparison instruction. The method may include, before the execution of the comparison instruction, calculating in various ways comparison data representative of the equality of the data to be compared, after the execution of the comparison instruction, verifying whether the comparison data calculated are consistent with the fact that the program operation is selected or not selected, and activating an error signal if the comparison data are mutually inconsistent or inconsistent with the result of the comparison.. ... Inside Secure

Securing execution of a program

In a general aspect, a method can include: executing an operation of a program that loads an arbitrarily chosen value of an initial data item of a series of ordered data; executing a series of calculation operations distributed in the program, that calculate a current data item based on a preceding data item; performing a final calculation operation of the series of operations that calculates a final data item of the data series; and executing an operation of the program that detects a program execution error by comparing the current data item of the data series with an expected value of the current data item or the final data item, the final data item having an expected value that is independent of the number of data items in the data series and is calculated based on the current data item of the data series and a final compensation data item.. . ... Inside Secure

Sharing a memory between at least two functional entities

In a general aspect, a method for sharing a memory between two functional entities can include assigning, to the first functional entity, a first data transformation function and a first inverse transformation function, and assigning, to the second functional entity a second data transformation function and a second inverse transformation function. The second inverse data transformation function can be incompatible with the first data transformation function and the first inverse data transformation function can be incompatible with the second data transformation function.. ... Inside Secure

Authentication chaining by connected devices

In a general aspect, a method for authenticating a plurality of slave devices connected to a master device can include: generating and sending by the master device a respective challenge to each slave device; in each slave device, generating a response to the respective challenge and transmitting it to the master device; verifying by the master device the response of one of the slave devices; returning by the master device the remaining responses to respective slave devices distinct from those that generated the responses; and verifying by each slave device the response returned thereto by the master device and transmitting the result of the verification to the master device.. . ... Inside Secure

Secure asset management system

In a general aspect, a system can include a processor having a secure mode and a non-secure mode, and a secure module configured to respond to tokens posted by the processor in the secure mode. Each token can identify a secure asset, and source and destination addresses within secure and public address spaces. ... Inside Secure

Method of protecting computer program code

In a general aspect, a computer implemented method can include identifying, in a program code stored in computer memory, a location of a dynamic repair target code section for an assignment to a program variable, a value of which is known only at runtime. The method can also include modifying the program code at the identified location of the dynamic repair target code section to assign an immediate value different from a correct runtime value to the program variable. ... Inside Secure

Method and device for transmitting data by inductive coupling with controlled self-oscillation

In a general aspect, a method for transmitting data by inductive coupling can include applying, at a rate of a data-carrying signal, a plurality of bursts of a periodic signal to a tuned inductive antenna circuit. The method can also include producing, in the tuned inductive antenna circuit, an antenna signal. ... Inside Secure

Countermeasures against an attack by analysis of electrical consumption for a cryptographic device

In a general aspect, a countermeasure method implemented in a microcircuit can include selecting, at each cycle of a clock signal, a supply mode of a component internal to the microcircuit, the supply mode can be selected from among a first supply mode in which the component is fully supplied by a first supply circuit connected to a supply input of the microcircuit, and at least one second supply mode in which the component is at least partially supplied by a second supply circuit internal to the microcircuit. The second supply circuit can be isolated from the exterior of the microcircuit while it is supplying the component.. ... Inside Secure

Method and device for modulating an active load

In a general aspect, a method can include producing, by an inductive antenna circuit, a first periodic signal that is based on an alternating external magnetic field; producing, by an oscillator circuit, a second periodic signal that is based on the first periodic signal; and transmitting, in correspondence with a data-carrying modulation signal, a sequence of data bits. The transmitting can include sequentially and repetitively: applying, with the oscillator circuit operating in a free oscillation mode, the second periodic signal to the inductive antenna circuit; and inhibiting, with the oscillator circuit operating in a synchronous oscillation mode, application of the second periodic signal to the inductive antenna circuit. ... Inside Secure

Method and circuit for adjusting the frequency of a clock signal

In a general aspect, a method for adjusting an oscillator clock frequency can include applying a first control value to a first oscillator, applying a second control value, different from the first control value, to a second oscillator, measuring a frequency of each of the first and second oscillators, determining, by interpolation, a corrected frequency measurement of the second oscillator depending on a frequency deviation measured between the first and second oscillators when subjected to a third control value, on the third control value, and on the control value applied to the second oscillator, determining by interpolation a new first control value depending on the measured frequency of the first oscillator, on the corrected frequency, on the first and second control values, and on a desired frequency, and applying the new first control value to the first oscillator.. . ... Inside Secure








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Inside Secure in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Inside Secure with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###