NO983960L - Procedure for establishing the security of a security module, as well as its associated security module - Google Patents
Procedure for establishing the security of a security module, as well as its associated security moduleInfo
- Publication number
- NO983960L NO983960L NO983960A NO983960A NO983960L NO 983960 L NO983960 L NO 983960L NO 983960 A NO983960 A NO 983960A NO 983960 A NO983960 A NO 983960A NO 983960 L NO983960 L NO 983960L
- Authority
- NO
- Norway
- Prior art keywords
- security
- security module
- establishing
- sensitive operation
- module
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1466—Key-lock mechanism
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/0826—Embedded security module
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Foreliggende oppfinnelse angår en fremgangsmåte for å etablere sik- kerheten for en sikkerhetsmodul (8) som er konfigurert for å samarbeide med en dataprosesseringsanordning (1), idet modulen er konstruert for å eksekvere et sett med operasjoner omfattende minst en sensitiv operasjon (23). Ifølge oppfinnelsen inkluderer fremgangsmåten trinnene som omfatter: - eksekvere, under hver eksekvering av den sensitive operasjonen og oppstrøms for den sistnevnte, en første supplementerende sekvens av opera- sjoner (22) for å aktivere signalanordninger, og nedstrøms for nevnte sensitive operasjon, en andre supplementerende operasjonssekvens (24) for å deakti- vere nevnte signalanordninger; - verifisere, under hver eksekvering av den sensitive operasjonen og oppstrøms for nevnte første supplementerende operasjonssekvens (22), hvor- vidt signalanordningen er deaktivert; - dersom signalanordnihgene er aktivert, hindre eksekvering av den sensitive operasjonen. 24.The present invention relates to a method for establishing the security of a security module (8) configured to cooperate with a data processing device (1), the module being designed to execute a set of operations comprising at least one sensitive operation (23). According to the invention, the method comprises the steps comprising: - executing, during each execution of the sensitive operation and upstream of the latter, a first supplementary sequence of operations (22) for activating signaling devices, and downstream of said sensitive operation, a second supplementary operation sequence (24) for deactivating said signal devices; - verifying, during each execution of the sensitive operation and upstream of said first supplementary operation sequence (22), whether the signaling device is deactivated; - if the signaling devices are activated, prevent execution of the sensitive operation. 24.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR9616257A FR2757972B1 (en) | 1996-12-31 | 1996-12-31 | METHOD FOR SECURING A SECURITY MODULE, AND RELATED SECURITY MODULE |
| PCT/FR1997/002389 WO1998029813A1 (en) | 1996-12-31 | 1997-12-23 | Method for ensuring the safety of a security module, and related security module |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| NO983960D0 NO983960D0 (en) | 1998-08-28 |
| NO983960L true NO983960L (en) | 1998-08-28 |
Family
ID=9499336
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| NO983960A NO983960L (en) | 1996-12-31 | 1998-08-28 | Procedure for establishing the security of a security module, as well as its associated security module |
Country Status (12)
| Country | Link |
|---|---|
| EP (1) | EP0891587A1 (en) |
| JP (1) | JPH11505055A (en) |
| KR (1) | KR19990087418A (en) |
| CN (1) | CN1212770A (en) |
| AR (1) | AR009852A1 (en) |
| AU (1) | AU5668398A (en) |
| BR (1) | BR9707881A (en) |
| CA (1) | CA2247475A1 (en) |
| FR (1) | FR2757972B1 (en) |
| NO (1) | NO983960L (en) |
| TW (1) | TW405098B (en) |
| WO (1) | WO1998029813A1 (en) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6289457B1 (en) * | 1998-07-17 | 2001-09-11 | Amdahl Corporation | Value data system having containers for theft deterrent repositories |
| FR2793904B1 (en) * | 1999-05-21 | 2001-07-27 | St Microelectronics Sa | METHOD AND DEVICE FOR MANAGING AN ELECTRONIC CIRCUIT |
| JP2003316263A (en) | 2002-04-19 | 2003-11-07 | Sony Corp | Arithmetic unit and arithmetic method |
| FR2857473B1 (en) * | 2003-07-11 | 2005-09-16 | Oberthur Card Syst Sa | METHOD FOR SECURING THE EXECUTION OF A COMPUTER PROGRAM, IN PARTICULAR IN A MICROCIRCUIT BOARD |
| DE602005011529D1 (en) * | 2004-06-07 | 2009-01-22 | Proton World Int Nv | Program execution control |
| EP1698958A1 (en) * | 2005-02-25 | 2006-09-06 | Axalto SA | Method for securing the writing in memory against radiation attacks or other attacks |
| FR2891654A1 (en) * | 2005-10-05 | 2007-04-06 | Proton World Int Nv | Event counting method for e.g. kilometric counter of motor vehicle, involves arithmetically adding values contained in different words of memory cells to obtain counting result, and incrementing/decrementing one word |
| EP2108164B1 (en) | 2007-01-05 | 2015-08-26 | Proton World International N.V. | Limitation of access to a resource of an electronic circuit |
| JP4882007B2 (en) | 2007-01-05 | 2012-02-22 | プロトン ワールド インターナショナル エヌ.ヴィ. | Electronic circuit temporary lock |
| EP2108163A1 (en) * | 2007-01-05 | 2009-10-14 | Proton World International N.V. | Protection of information contained in an electronic circuit |
| DE102010044687A1 (en) * | 2010-09-08 | 2012-03-08 | Giesecke & Devrient Gmbh | Portable data carrier with misoperation counter |
| DE102010054446A1 (en) * | 2010-12-14 | 2012-06-14 | Giesecke & Devrient Gmbh | Portable data carrier with misoperation counter |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS60207957A (en) * | 1984-03-31 | 1985-10-19 | Toshiba Corp | Data protecting system |
| US4614861A (en) * | 1984-11-15 | 1986-09-30 | Intellicard International, Inc. | Unitary, self-contained card verification and validation system and method |
| FR2674647A1 (en) * | 1991-03-29 | 1992-10-02 | Widmer Michel | Apparatus forming an electronic cheque-book for financial transactions and process for using such an apparatus |
| US5282247A (en) * | 1992-11-12 | 1994-01-25 | Maxtor Corporation | Apparatus and method for providing data security in a computer system having removable memory |
| EP0602867A1 (en) * | 1992-12-17 | 1994-06-22 | NCR International, Inc. | An apparatus for securing a system platform |
| DE4341887C2 (en) * | 1993-12-08 | 1996-12-19 | Siemens Ag | Method for preventing an unauthorized data change in a device with a non-volatile memory |
-
1996
- 1996-12-31 FR FR9616257A patent/FR2757972B1/en not_active Expired - Fee Related
-
1997
- 1997-12-23 EP EP97952982A patent/EP0891587A1/en not_active Withdrawn
- 1997-12-23 KR KR1019980706836A patent/KR19990087418A/en not_active Withdrawn
- 1997-12-23 CA CA002247475A patent/CA2247475A1/en not_active Abandoned
- 1997-12-23 BR BR9707881A patent/BR9707881A/en unknown
- 1997-12-23 AU AU56683/98A patent/AU5668398A/en not_active Abandoned
- 1997-12-23 CN CN97192699A patent/CN1212770A/en active Pending
- 1997-12-23 JP JP10529680A patent/JPH11505055A/en active Pending
- 1997-12-23 WO PCT/FR1997/002389 patent/WO1998029813A1/en not_active Ceased
- 1997-12-29 TW TW086119900A patent/TW405098B/en not_active IP Right Cessation
- 1997-12-30 AR ARP970106244A patent/AR009852A1/en unknown
-
1998
- 1998-08-28 NO NO983960A patent/NO983960L/en not_active Application Discontinuation
Also Published As
| Publication number | Publication date |
|---|---|
| EP0891587A1 (en) | 1999-01-20 |
| TW405098B (en) | 2000-09-11 |
| CA2247475A1 (en) | 1998-07-09 |
| FR2757972B1 (en) | 1999-02-19 |
| FR2757972A1 (en) | 1998-07-03 |
| KR19990087418A (en) | 1999-12-27 |
| NO983960D0 (en) | 1998-08-28 |
| CN1212770A (en) | 1999-03-31 |
| AR009852A1 (en) | 2000-05-03 |
| JPH11505055A (en) | 1999-05-11 |
| WO1998029813A1 (en) | 1998-07-09 |
| AU5668398A (en) | 1998-07-31 |
| BR9707881A (en) | 1999-07-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| NO983960L (en) | Procedure for establishing the security of a security module, as well as its associated security module | |
| ATE112118T1 (en) | METHOD FOR NETWORKING COMPUTERS AND/OR COMPUTER NETWORKS AND NETWORKING SYSTEM. | |
| DE19781620T1 (en) | Bus patcher | |
| TR199801583T2 (en) | Error detection and correction system and method. | |
| BR9406371A (en) | Device for separating solid matter from a liquid process and apparatus for separating solids from a flowing liquid apparatus for separating liquid from a flowing liquid and apparatus for separating solids retained in a liquid from a flowing liquid | |
| DE60312235D1 (en) | METHOD AND SYSTEM FOR INHIBITING PREVENTION AND DEFLECTION | |
| ATE525691T1 (en) | DATA PROCESSING THROUGH FLOW RESTART MARKING | |
| BR0208272A (en) | Telecommunication process and system for monitoring a data stream in a data network | |
| DK0621569T3 (en) | Device and method for protecting keys on a smart card | |
| DK0607225T3 (en) | Apparatus for determining the operational efficiency of a machine tool and its method. | |
| ATE88028T1 (en) | METHOD AND DEVICE FOR DIGITAL LOGICAL SYNCHRONISM MONITORING. | |
| AU2001249643A1 (en) | Multi-channel, multi-service debug on a pipelined cpu architecture | |
| DE60132633D1 (en) | DIGITAL SIGNAL PROCESSOR DEVICE | |
| DE69425542D1 (en) | Logical circuit with error detection function, method for managing equipment and fault-tolerant system for its application | |
| DK192886D0 (en) | PROCEDURE FOR REPROGRAMMING A COMPUTER INSTALLED IN A DEVICE AND APPARATUS FOR EXERCISING THE PROCEDURE | |
| KR920001212A (en) | Test method of semiconductor device | |
| SE9802058L (en) | Redundant termination for dynamic fault isolation | |
| NO962866L (en) | Method and apparatus for processing signals in a security system | |
| ATE206830T1 (en) | DEVICE FOR OPERATING TWO PROCESSORS FUNCTIONALLY CONNECTED IN PARALLEL | |
| KR890001323A (en) | Data communication control | |
| FI20035109A7 (en) | Method and apparatus for preventing operation | |
| DK0695158T3 (en) | A method and apparatus for producing in a web of sheet or sheet material a fold comprising at least one elastic | |
| ATE178718T1 (en) | CIRCUIT ARRANGEMENT AND METHOD FOR TESTING NON-INTERMITTENT ENCODERS | |
| DE50105624D1 (en) | METHOD FOR OPERATING A TELECOMMUNICATIONS SYSTEM | |
| DE69429510D1 (en) | LOCKING METHOD AND DEVICE |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FC2A | Withdrawal, rejection or dismissal of laid open patent application |