[go: up one dir, main page]

MY136255A - Hacking susceptibility - Google Patents

Hacking susceptibility

Info

Publication number
MY136255A
MY136255A MYPI20012701A MY136255A MY 136255 A MY136255 A MY 136255A MY PI20012701 A MYPI20012701 A MY PI20012701A MY 136255 A MY136255 A MY 136255A
Authority
MY
Malaysia
Prior art keywords
private
public key
key pair
generated
secure hardware
Prior art date
Application number
Inventor
Wayne Roger Hucaby
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Publication of MY136255A publication Critical patent/MY136255A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

DISCLOSED IS A METHOD AND SYSTEM FOR REDUCING THE SUSCEPTIBILITY OF HACKING A PRIVATE KEY OF A PRIVATE/PUBLIC KEY PAIR. THE PRIVATE/PUBLIC KEY PAIR IS GENERATED OR PLACE INSIDE SECURE HARDWARE (302) INSIDE A FISCAL PRINTER (441) AT THE TIME OF MANUFACTURE. THE PUBLIC KEY IS SENT EXTERNAL TO THE FISCAL PRINTER TO ALL "NEED TO KNOW" USERS. THE SECURE HARDWARE HAS ALGORITHMS THAT DETERMINE THE VIABILITY OF A GENERATED PRIVATE/PUBLIC KEY PAIR BY ANALYZING INPUTTED PARAMETRIC DATA COMPRISING TECHNOLOGY ADVANCES, LENGTH TIME A KEY PAIR HAS BEEN IN EXISTENCE, ECONOMIC FACTORS, SECURITY VALUE OF PROTECTED DATA, ETC. PRIVATE/PUBLIC KEY PAIRS ARE CONTINUOUSLY TESTED AND NEW PAIRS ARE GENERATED WHEREBY AN OPTIMIZATION IS MAINTAINED REGARDING THE VIABILITY OF AN EXISTING KEY PAIR AND PARAMETRIC FACTORS. ALSO DISCLOSED IS A METHOD AND SYSTEM FOR ERASING A GENERATED PRIVATE KEY IF THE SECURE HARDWARE OF A FISCAL PRINTER IS TAMPERED WITH OR ENTERED IN AN UNAUTHORIZED MANNER.FIG.2
MYPI20012701 2000-06-16 2001-06-11 Hacking susceptibility MY136255A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US59597300A 2000-06-16 2000-06-16

Publications (1)

Publication Number Publication Date
MY136255A true MY136255A (en) 2008-09-30

Family

ID=24385468

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI20012701 MY136255A (en) 2000-06-16 2001-06-11 Hacking susceptibility

Country Status (5)

Country Link
EP (1) EP1290822A2 (en)
AU (1) AU2001276363A1 (en)
CA (1) CA2405613A1 (en)
MY (1) MY136255A (en)
WO (1) WO2001097441A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10255053A1 (en) * 2002-09-10 2004-03-18 Wincor Nixdorf International Gmbh Printer, especially a voucher printer for secure printing of transactions arising from a payment till or automatic cash dispenser, has a cryptographic unit for processing a cryptographic signature received with the print data
US8214296B2 (en) 2006-02-14 2012-07-03 Microsoft Corporation Disaggregated secure execution environment
US9819495B2 (en) 2014-10-02 2017-11-14 Qualcomm Incorporated Systems and methods of dynamically adapting security certificate-key pair generation
JP2016116134A (en) * 2014-12-16 2016-06-23 パナソニックIpマネジメント株式会社 Signature verification device, signature generation device, signature processing system, signature verification method, and signature generation method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199049B1 (en) * 1998-09-30 2001-03-06 International Business Machines Corporation Verifiable electronic journal for a point of sale device and methods for using the same

Also Published As

Publication number Publication date
WO2001097441A3 (en) 2002-05-16
EP1290822A2 (en) 2003-03-12
AU2001276363A1 (en) 2001-12-24
CA2405613A1 (en) 2001-12-20
WO2001097441A2 (en) 2001-12-20

Similar Documents

Publication Publication Date Title
AU2002358577A8 (en) System and method for secure replacement of the master key in a personal security device
CA2197027A1 (en) Apparatus and method to provide security for a keypad processor of a transaction terminal
AU2002212345A1 (en) Method and system for web-based cross-domain single-sign-on authentication
WO2002056155A3 (en) Security system for preventing a personal computer from being used by unauthorized people
AU2003293531A1 (en) Trusted system clock
DE60232803D1 (en) VIRUS DETECTION SYSTEM
BR9813407A (en) Method for the protection of audiovisual data through the nrss interface
TR200002758T2 (en) Credit card system and method
CN108304725A (en) A kind of method and system to the desensitization of government data resource
GB2339518A (en) Method for secure key management using a biometric
WO2004027622A3 (en) Method and system for secure distribution
CN109543432A (en) Facial image encrypts anti-tamper and retrieval method in a kind of video
CN111259079A (en) Block chain-based limited personal data sharing and trading method
Krishna et al. Patient confidentiality in the research use of clinical medical databases
MY136255A (en) Hacking susceptibility
CN116090024A (en) Reliable data storage device, system and method
Awodiran et al. Cybercrime consciousness among undergraduate students
Browne Data privacy and integrity: an overview
Bernhard Breaching system security
SE9202427L (en) Methods and devices for preventing unauthorized access to computer systems
TH73320A (en) Ease of penetration into computer systems
Rueppel Good stream ciphers are hard to design
Aloufi et al. Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network
Souvignet et al. From Lucky Luke to Lock Bits
Babakerkhell et al. Internet Crimes-it’s Analysis and Prevention Approaches