The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 02, 2024

Filed:

Mar. 26, 2019
Applicant:

Kazuar Advanced Technologies Ltd., Tel-Aviv, IL;

Inventors:

Daniel Mondy Finchelstein, Rishon Lezion, IL;

Yuval Moshe Porat, Tel Aviv-Jaffa, IL;

Be'eri Berl Katznelson, Kiryat Tiv'on, IL;

Yaacov Fenster, Petach Tikvah, IL;

Assignee:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/45 (2013.01); G06F 18/22 (2023.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); G06F 21/64 (2013.01); G06F 21/86 (2013.01);
U.S. Cl.
CPC ...
G06F 21/45 (2013.01); G06F 18/22 (2023.01); G06F 21/31 (2013.01); G06F 21/602 (2013.01); G06F 21/64 (2013.01); G06F 21/86 (2013.01);
Abstract

A technique of proofing against tampering with a computer including a chassis with a plurality of fasteners. The technique includes obtaining by the computer data indicative of a sequence of implication events associated with the fasteners of the plurality of fasteners, generating a pattern corresponding to the sequence of implication events, matching between data corresponding to the generated pattern and a reference data, and initiating one or more anti-tampering actions responsive to a mismatching result. The method can further include generating a cryptographic signature corresponding to the generated pattern, wherein matching between data corresponding to the generated pattern and the reference data includes matching the generated cryptographic signature to a cryptographic reference corresponding to the reference data. Alternatively, or additionally, the generated cryptographic signature can be usable for secure access to information stored on the computer.


Find Patent Forward Citations

Loading…