Method and apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from microdevices
First Claim
1. A method for prevention of tampering, unauthorized use, and unauthorized extraction of information, from at least one information containing region of a secured microdevice in a processing device by controlled obliteration of said information comprising the following steps:
- (a) implementing control protocols and hardware which generate at least one command to trigger said controlled obliteration of said information;
(b) establishing of a local energy storage device which stores energy in a form of localized electromagnetic fields to be used to initiate and perform said controlled obliteration of said information;
(c) establishing of localized controlled release of the stored energy from the local energy storage device and at least partial deposition of the stored energy in a proximity of the at least one information containing region of the secured microdevice, upon generation of said at least one command to trigger said controlled obliteration of said information;
(d) maintaining of conditions for controlled release of the energy stored in the local energy storage device upon generation of said command to trigger said controlled obliteration of said information for the duration of time necessary to achieve desired controlled obliteration of said information;
wherein the at least partial deposition of stored energy in a form of localized electromagnetic fields in the proximity of the at least one information containing region of the secured microdevices is maintained for a period of time shorter than the time needed for a heat from the energy released in the proximity of the at least one information containing region of the secured microdevice to diffuse through a volume of the at least one information containing region of said secured microdevice.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and an apparatus for securing stand-alone microdevices or parts of larger processing devices are arranged for prevention of tampering, unauthorized use, and unauthorized extraction of information from an information containing region of the secured microdevice. The method includes implementation of control protocols and hardware which monitor the conditions of secured microdevices and generate commands to trigger obliteration of information; establishment of a local energy storage device which stores energy to be used to perform the controlled obliteration of information; establishment of localized controlled release of the stored energy from the local energy storage device and deposition of the stored energy in the proximity of the information containing regions of the secured microdevices, upon generation of a command to trigger the obliteration of information; and maintenance of conditions for controlled release of the energy stored in the local energy storage upon generation of the command to trigger.
-
Citations
49 Claims
-
1. A method for prevention of tampering, unauthorized use, and unauthorized extraction of information, from at least one information containing region of a secured microdevice in a processing device by controlled obliteration of said information comprising the following steps:
- (a) implementing control protocols and hardware which generate at least one command to trigger said controlled obliteration of said information;
(b) establishing of a local energy storage device which stores energy in a form of localized electromagnetic fields to be used to initiate and perform said controlled obliteration of said information;
(c) establishing of localized controlled release of the stored energy from the local energy storage device and at least partial deposition of the stored energy in a proximity of the at least one information containing region of the secured microdevice, upon generation of said at least one command to trigger said controlled obliteration of said information;
(d) maintaining of conditions for controlled release of the energy stored in the local energy storage device upon generation of said command to trigger said controlled obliteration of said information for the duration of time necessary to achieve desired controlled obliteration of said information;
wherein the at least partial deposition of stored energy in a form of localized electromagnetic fields in the proximity of the at least one information containing region of the secured microdevices is maintained for a period of time shorter than the time needed for a heat from the energy released in the proximity of the at least one information containing region of the secured microdevice to diffuse through a volume of the at least one information containing region of said secured microdevice. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
- (a) implementing control protocols and hardware which generate at least one command to trigger said controlled obliteration of said information;
-
23. An apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one information containing region of a secured microdevice in a processing device by controlled obliteration of said information comprising:
- (a) control hardware arranged to generate at least one command to trigger said controlled obliteration of said information;
(b) a local energy storage device which stores energy in a form of localized electromagnetic fields to be used to initiate and perform said controlled obliteration of said information;
(c) a circuit for localized controlled release of the stored energy from the local energy storage device and at least partial deposition of the stored energy in a proximity of the at least one information containing region of the secured microdevice, upon generation of said command to trigger said controlled obliteration of information;
wherein the circuit for localized controlled release of the stored energy is arranged for controlled release of the energy stored in the local energy storage upon generation of said command to trigger said controlled obliteration of said information for the duration of time necessary to achieve desired controlled obliteration of said information; and
wherein the circuit for localized controlled release of the stored energy is arranged to maintain the at least partial deposition of the stored energy in the proximity of the at least one information containing region of the secured microdevice to diffuse through a volume of the at least one information containing region of said secured microdevice. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
- (a) control hardware arranged to generate at least one command to trigger said controlled obliteration of said information;
-
37. A secured microdevice for use in a processing device that is resistant to tampering and unauthorized use and unauthorized extraction of information comprising:
- at least one information containing region with a structure organized to store and process said information, a protective housing with at least one inner and outer surface, contact connectors and associated conduits for conduction of said information, and an assembly for localized controlled release of energy in a proximity of the information containing region for controlled obliteration of the information contained in the at least one information containing region having at least one discharge electrode incorporated in a secured microdevice protective housing for initiation and support of an electrical discharge between said at least one discharge electrode and predetermined portions of the at least one information containing region for a period of time shorter than the time needed for a heat from the energy released in the proximity of the at least one information containing region of the secured microdevice to diffuse through a volume of the at least one information containing region of said secured microdevice.
- View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
Specification