[go: up one dir, main page]

Vedula et al. - Google Patents

CHANGE RECORD

Vedula et al.

View PDF
Document ID
5924952979417644461
Author
Vedula M
Natraj A
Weidong C

External Links

Snippet

The Renesas Technology America, Inc.(Renesas) AE57C1 (hereafter referred to as the module) is a single-chip module that contains a CPU, ROM, EEPROM, and RAM. The module contains firmware (BoardID OS or “BOS”) that resides in ROM, with key storage and …
Continue reading at csrc.nist.rip (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US9953166B2 (en) Method for securely booting target processor in target system using a secure root of trust to verify a returned message authentication code recreated by the target processor
US5533123A (en) Programmable distributed personal security
EP1320803A2 (en) Embedded security device within a nonvolatile memory device
Jacob et al. faulTPM: Exposing AMD fTPMs’ Deepest Secrets
US20240187231A1 (en) Forensics Module and Integrated System
Schellekens Design and analysis of trusted computing platforms
Vedula et al. CHANGE RECORD
Lee et al. Security Architecture for Heterogeneous Chiplet-Based Mobile SoC
Digipass FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
US20240193564A1 (en) Forensics Module and Embedded System
TIEMPO et al. Security Target Lite of the Security Enclave in SEQUANS communication SoC Monarch 2/N-SQN3401
Biomatica Zyt Cryptographic Module Security Policy
Platform FIPS 140-2 Level 3
Aladdin eToken Aladdin eToken NG-FLASH (Java), Aladdin eToken NG-FLASH Anywhere, and Aladdin eToken NG-OTP (Java) FIPS 140-2 Cryptographic Module Security Policy
Card FIPS 140-2 Security Policy for HiCOS Combi PKI Native Smart Card Cryptographic Module
IDflex Document Version: 1.0 Date: May 2, 2012
Athena FIPS 140-2 Cryptographic Module Security Policy
Cryptographic FIPS 140-2 Security Policy for HiCOS PKI Native Smart Card Cryptographic Module
Heinkel Infineon Technologies AG
TIEMPO et al. ASE_ST-Security Target Lite TESIC-SC-02.1
Revision HardCache™-SL3/PC v2. 1 FIPS 140-2 Security Policy
Defrance et al. .NET Smart Card-Security Policy
Brych et al. FIPS 140-2 Level 3 Non-Proprietary Security Policy
Novinsky et al. Infineon Technologies AG
SDencrypter FIPS 140-2 Level-3 Non-propriety Security Policy