MY136255A - Hacking susceptibility - Google Patents
Hacking susceptibilityInfo
- Publication number
- MY136255A MY136255A MYPI20012701A MY136255A MY 136255 A MY136255 A MY 136255A MY PI20012701 A MYPI20012701 A MY PI20012701A MY 136255 A MY136255 A MY 136255A
- Authority
- MY
- Malaysia
- Prior art keywords
- private
- public key
- key pair
- generated
- secure hardware
- Prior art date
Links
- 238000000034 method Methods 0.000 abstract 2
- 230000035899 viability Effects 0.000 abstract 2
- 238000004519 manufacturing process Methods 0.000 abstract 1
- 238000005457 optimization Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
DISCLOSED IS A METHOD AND SYSTEM FOR REDUCING THE SUSCEPTIBILITY OF HACKING A PRIVATE KEY OF A PRIVATE/PUBLIC KEY PAIR. THE PRIVATE/PUBLIC KEY PAIR IS GENERATED OR PLACE INSIDE SECURE HARDWARE (302) INSIDE A FISCAL PRINTER (441) AT THE TIME OF MANUFACTURE. THE PUBLIC KEY IS SENT EXTERNAL TO THE FISCAL PRINTER TO ALL "NEED TO KNOW" USERS. THE SECURE HARDWARE HAS ALGORITHMS THAT DETERMINE THE VIABILITY OF A GENERATED PRIVATE/PUBLIC KEY PAIR BY ANALYZING INPUTTED PARAMETRIC DATA COMPRISING TECHNOLOGY ADVANCES, LENGTH TIME A KEY PAIR HAS BEEN IN EXISTENCE, ECONOMIC FACTORS, SECURITY VALUE OF PROTECTED DATA, ETC. PRIVATE/PUBLIC KEY PAIRS ARE CONTINUOUSLY TESTED AND NEW PAIRS ARE GENERATED WHEREBY AN OPTIMIZATION IS MAINTAINED REGARDING THE VIABILITY OF AN EXISTING KEY PAIR AND PARAMETRIC FACTORS. ALSO DISCLOSED IS A METHOD AND SYSTEM FOR ERASING A GENERATED PRIVATE KEY IF THE SECURE HARDWARE OF A FISCAL PRINTER IS TAMPERED WITH OR ENTERED IN AN UNAUTHORIZED MANNER.FIG.2
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US59597300A | 2000-06-16 | 2000-06-16 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY136255A true MY136255A (en) | 2008-09-30 |
Family
ID=24385468
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI20012701 MY136255A (en) | 2000-06-16 | 2001-06-11 | Hacking susceptibility |
Country Status (5)
| Country | Link |
|---|---|
| EP (1) | EP1290822A2 (en) |
| AU (1) | AU2001276363A1 (en) |
| CA (1) | CA2405613A1 (en) |
| MY (1) | MY136255A (en) |
| WO (1) | WO2001097441A2 (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10255053A1 (en) * | 2002-09-10 | 2004-03-18 | Wincor Nixdorf International Gmbh | Printer, especially a voucher printer for secure printing of transactions arising from a payment till or automatic cash dispenser, has a cryptographic unit for processing a cryptographic signature received with the print data |
| US8214296B2 (en) | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
| US9819495B2 (en) | 2014-10-02 | 2017-11-14 | Qualcomm Incorporated | Systems and methods of dynamically adapting security certificate-key pair generation |
| JP2016116134A (en) * | 2014-12-16 | 2016-06-23 | パナソニックIpマネジメント株式会社 | Signature verification device, signature generation device, signature processing system, signature verification method, and signature generation method |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6199049B1 (en) * | 1998-09-30 | 2001-03-06 | International Business Machines Corporation | Verifiable electronic journal for a point of sale device and methods for using the same |
-
2001
- 2001-06-11 MY MYPI20012701 patent/MY136255A/en unknown
- 2001-06-13 CA CA002405613A patent/CA2405613A1/en not_active Abandoned
- 2001-06-13 EP EP01953977A patent/EP1290822A2/en not_active Withdrawn
- 2001-06-13 WO PCT/EP2001/006668 patent/WO2001097441A2/en not_active Ceased
- 2001-06-13 AU AU2001276363A patent/AU2001276363A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| WO2001097441A3 (en) | 2002-05-16 |
| EP1290822A2 (en) | 2003-03-12 |
| AU2001276363A1 (en) | 2001-12-24 |
| CA2405613A1 (en) | 2001-12-20 |
| WO2001097441A2 (en) | 2001-12-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2002358577A8 (en) | System and method for secure replacement of the master key in a personal security device | |
| CA2197027A1 (en) | Apparatus and method to provide security for a keypad processor of a transaction terminal | |
| AU2002212345A1 (en) | Method and system for web-based cross-domain single-sign-on authentication | |
| WO2002056155A3 (en) | Security system for preventing a personal computer from being used by unauthorized people | |
| AU2003293531A1 (en) | Trusted system clock | |
| DE60232803D1 (en) | VIRUS DETECTION SYSTEM | |
| BR9813407A (en) | Method for the protection of audiovisual data through the nrss interface | |
| TR200002758T2 (en) | Credit card system and method | |
| CN108304725A (en) | A kind of method and system to the desensitization of government data resource | |
| GB2339518A (en) | Method for secure key management using a biometric | |
| WO2004027622A3 (en) | Method and system for secure distribution | |
| CN109543432A (en) | Facial image encrypts anti-tamper and retrieval method in a kind of video | |
| CN111259079A (en) | Block chain-based limited personal data sharing and trading method | |
| Krishna et al. | Patient confidentiality in the research use of clinical medical databases | |
| MY136255A (en) | Hacking susceptibility | |
| CN116090024A (en) | Reliable data storage device, system and method | |
| Awodiran et al. | Cybercrime consciousness among undergraduate students | |
| Browne | Data privacy and integrity: an overview | |
| Bernhard | Breaching system security | |
| SE9202427L (en) | Methods and devices for preventing unauthorized access to computer systems | |
| TH73320A (en) | Ease of penetration into computer systems | |
| Rueppel | Good stream ciphers are hard to design | |
| Aloufi et al. | Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network | |
| Souvignet et al. | From Lucky Luke to Lock Bits | |
| Babakerkhell et al. | Internet Crimes-it’s Analysis and Prevention Approaches |