TL Poo, G Burd - US Patent 8,171,309, 2012 - Google Patents
Secure memory controlled access is described. In embodi ment (s), memory stores encrypted data and the memory includes a secure memory partition to store …
BB Dillaway - US Patent 8,687,804, 2014 - Google Patents
For a data transfer, security is negotiated via a control channel operating in accordance with a first protocol. The data is transmitted responsive to the security negotiation on a data …
RF Brabson, MR Gambino, LH Overby Jr - US Patent 7,441,119, 2008 - Google Patents
US7441119B2 - Offload processing for secure data transfer - Google Patents US7441119B2 - Offload processing for secure data transfer - Google Patents Offload processing for secure data …
JE King, SC Evans, MP Mayhead - US Patent 7,360,240, 2008 - Google Patents
(57) ABSTRACT A portable storage device, for example a secure Smart card, contains network identification information for a processing unit that is connectable to a data …
DJP Garcia - US Patent 7,380,120, 2008 - Google Patents
US PATENT DOCUMENTS 6,061,790 A 5, 2000 Bodnar 6,088,717 A 7/2000 Reed et al.................. TO9, 201 4,827,508 A 5, 1989 Shear 6,088,805 A 7/2000 Davis et al …
A Hatakeyama - US Patent 8,001,592, 2011 - Google Patents
According to one aspect, the invention provides a method which may include entering a secure mode by a processor, whereby the processor may initiate a transfer of information …
TJ Mihm Jr, ER Uner - US Patent 7,519,830, 2009 - Google Patents
A secure memory system binds an encrypted first data value stored in a memory with a state of the memory by selecting, at random, an address in the memory and mixing a second data …
V Ollikainen, H Rautio, J Pesola… - US Patent 8,571,220, 2013 - Google Patents
A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the terminal, the method divides the …
K Deierling, R Vaswani, A Gostrer, A Dubey - US Patent 8,484,486, 2013 - Google Patents
BACKGROUND A variety of cryptographic security techniques have been developed to protect private information. These include both symmetric and asymmetric key encryption …