Working in a rapidly changing market landscape and constantly fighting new threats, Discretix is committed to continue producing a wide spectrum of mathematical and system-security breakthroughs. This will allow us to keep providing our clients with new products featuring even greater improvements in security, functionality and performance.
|US Patent 7,467,304
||System, Device, and Method of Selectively Allowing a Host Processor to Access Host-executable Code
||Secure system boot based on a secure embedded Flash device
|UK Patent 2434673
||Method, Device, and System of Securely Storing Data
||Hardware-based secure storage for keys and credentials with data confidentiality and integrity and with protection against rollback attacks
|US Patent 8201260
|| Device, system, and method of digital rights management utilizing supplemental content
||In some embodiments, a device may include a DRM agent to manage the utilizing of a content object including secured digital content based on a rights object related to the content object, wherein based on at least one restriction defined in the rights object, the agent is to cause the device to present supplemental content of at least one supplemental content object when the content object is utilized. Other embodiments are described and claimed.
||A Method and Apparatus for Carrying Out Efficiently Arithmetic Computations in Hardware
||Efficient implementation of PKI engine based on Montgomery Multiplication
||System, Method and Apparatus of Securing an Operating System
||A hardware-assisted mechanism for securing a rich OS.
||Method, Device, and System of Selectively Accessing Data
||Corporate secure storage allowing server-based control of secure data stored as files on a client device, as well as user-level access control to files, implemented under the file-system layer.
||Method, Device, and System of Encrypting/Decrypting Data
||Implementation of dual tunnel encryption supporting conversion of encryption using a temporary session key to encryption using a permanent key in a storage device.
||System, Device, and Method of Selectively Operating a Host Connected to a Token
||A SIM Lock mechanism based on a secure embedded Flash device
||System, Device and Method of Verifying that a Code is Executed by a Processor
||Hardware based secure execution mode for a processor.
||Memory System with In-stream Data Encryption/Decryption*
||Secure Flash card architecture including “on-the-fly” encryption decryption
||Secure yet Flexible System Architecture for Secure Devices with Flash Mass Storage Memory*
||Automatic secure boot for secure flash card with program code stored on flash memory
||Secure Memory Card with Life Cycle Phases*
||Enables different levels of system functionality according to the life cycle state of a device
||Memory System with Versatile Content Control*
||Flash card based corporate secure storage
||Methods, circuits, devices and systems for provisioning of cryptographic data to one or more electronic devices
||A Client-side machine provisioning messages that convey key material and delegation information. Allows the design owner (and master key) to authorize the provisioning of certain keys to as many other entities down the device life-cycle as needed
* Joint patent with SanDisk