[go: up one dir, main page]

NO983960L - Procedure for establishing the security of a security module, as well as its associated security module - Google Patents

Procedure for establishing the security of a security module, as well as its associated security module

Info

Publication number
NO983960L
NO983960L NO983960A NO983960A NO983960L NO 983960 L NO983960 L NO 983960L NO 983960 A NO983960 A NO 983960A NO 983960 A NO983960 A NO 983960A NO 983960 L NO983960 L NO 983960L
Authority
NO
Norway
Prior art keywords
security
security module
establishing
sensitive operation
module
Prior art date
Application number
NO983960A
Other languages
Norwegian (no)
Other versions
NO983960D0 (en
Inventor
Michel Hazard
Original Assignee
Bull Cp8
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull Cp8 filed Critical Bull Cp8
Publication of NO983960D0 publication Critical patent/NO983960D0/en
Publication of NO983960L publication Critical patent/NO983960L/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1466Key-lock mechanism
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/0826Embedded security module

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Foreliggende oppfinnelse angår en fremgangsmåte for å etablere sik- kerheten for en sikkerhetsmodul (8) som er konfigurert for å samarbeide med en dataprosesseringsanordning (1), idet modulen er konstruert for å eksekvere et sett med operasjoner omfattende minst en sensitiv operasjon (23). Ifølge oppfinnelsen inkluderer fremgangsmåten trinnene som omfatter: - eksekvere, under hver eksekvering av den sensitive operasjonen og oppstrøms for den sistnevnte, en første supplementerende sekvens av opera- sjoner (22) for å aktivere signalanordninger, og nedstrøms for nevnte sensitive operasjon, en andre supplementerende operasjonssekvens (24) for å deakti- vere nevnte signalanordninger; - verifisere, under hver eksekvering av den sensitive operasjonen og oppstrøms for nevnte første supplementerende operasjonssekvens (22), hvor- vidt signalanordningen er deaktivert; - dersom signalanordnihgene er aktivert, hindre eksekvering av den sensitive operasjonen. 24.The present invention relates to a method for establishing the security of a security module (8) configured to cooperate with a data processing device (1), the module being designed to execute a set of operations comprising at least one sensitive operation (23). According to the invention, the method comprises the steps comprising: - executing, during each execution of the sensitive operation and upstream of the latter, a first supplementary sequence of operations (22) for activating signaling devices, and downstream of said sensitive operation, a second supplementary operation sequence (24) for deactivating said signal devices; - verifying, during each execution of the sensitive operation and upstream of said first supplementary operation sequence (22), whether the signaling device is deactivated; - if the signaling devices are activated, prevent execution of the sensitive operation. 24.

NO983960A 1996-12-31 1998-08-28 Procedure for establishing the security of a security module, as well as its associated security module NO983960L (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9616257A FR2757972B1 (en) 1996-12-31 1996-12-31 METHOD FOR SECURING A SECURITY MODULE, AND RELATED SECURITY MODULE
PCT/FR1997/002389 WO1998029813A1 (en) 1996-12-31 1997-12-23 Method for ensuring the safety of a security module, and related security module

Publications (2)

Publication Number Publication Date
NO983960D0 NO983960D0 (en) 1998-08-28
NO983960L true NO983960L (en) 1998-08-28

Family

ID=9499336

Family Applications (1)

Application Number Title Priority Date Filing Date
NO983960A NO983960L (en) 1996-12-31 1998-08-28 Procedure for establishing the security of a security module, as well as its associated security module

Country Status (12)

Country Link
EP (1) EP0891587A1 (en)
JP (1) JPH11505055A (en)
KR (1) KR19990087418A (en)
CN (1) CN1212770A (en)
AR (1) AR009852A1 (en)
AU (1) AU5668398A (en)
BR (1) BR9707881A (en)
CA (1) CA2247475A1 (en)
FR (1) FR2757972B1 (en)
NO (1) NO983960L (en)
TW (1) TW405098B (en)
WO (1) WO1998029813A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6289457B1 (en) * 1998-07-17 2001-09-11 Amdahl Corporation Value data system having containers for theft deterrent repositories
FR2793904B1 (en) * 1999-05-21 2001-07-27 St Microelectronics Sa METHOD AND DEVICE FOR MANAGING AN ELECTRONIC CIRCUIT
JP2003316263A (en) 2002-04-19 2003-11-07 Sony Corp Arithmetic unit and arithmetic method
FR2857473B1 (en) * 2003-07-11 2005-09-16 Oberthur Card Syst Sa METHOD FOR SECURING THE EXECUTION OF A COMPUTER PROGRAM, IN PARTICULAR IN A MICROCIRCUIT BOARD
DE602005011529D1 (en) * 2004-06-07 2009-01-22 Proton World Int Nv Program execution control
EP1698958A1 (en) * 2005-02-25 2006-09-06 Axalto SA Method for securing the writing in memory against radiation attacks or other attacks
FR2891654A1 (en) * 2005-10-05 2007-04-06 Proton World Int Nv Event counting method for e.g. kilometric counter of motor vehicle, involves arithmetically adding values contained in different words of memory cells to obtain counting result, and incrementing/decrementing one word
EP2108164B1 (en) 2007-01-05 2015-08-26 Proton World International N.V. Limitation of access to a resource of an electronic circuit
JP4882007B2 (en) 2007-01-05 2012-02-22 プロトン ワールド インターナショナル エヌ.ヴィ. Electronic circuit temporary lock
EP2108163A1 (en) * 2007-01-05 2009-10-14 Proton World International N.V. Protection of information contained in an electronic circuit
DE102010044687A1 (en) * 2010-09-08 2012-03-08 Giesecke & Devrient Gmbh Portable data carrier with misoperation counter
DE102010054446A1 (en) * 2010-12-14 2012-06-14 Giesecke & Devrient Gmbh Portable data carrier with misoperation counter

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60207957A (en) * 1984-03-31 1985-10-19 Toshiba Corp Data protecting system
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
FR2674647A1 (en) * 1991-03-29 1992-10-02 Widmer Michel Apparatus forming an electronic cheque-book for financial transactions and process for using such an apparatus
US5282247A (en) * 1992-11-12 1994-01-25 Maxtor Corporation Apparatus and method for providing data security in a computer system having removable memory
EP0602867A1 (en) * 1992-12-17 1994-06-22 NCR International, Inc. An apparatus for securing a system platform
DE4341887C2 (en) * 1993-12-08 1996-12-19 Siemens Ag Method for preventing an unauthorized data change in a device with a non-volatile memory

Also Published As

Publication number Publication date
EP0891587A1 (en) 1999-01-20
TW405098B (en) 2000-09-11
CA2247475A1 (en) 1998-07-09
FR2757972B1 (en) 1999-02-19
FR2757972A1 (en) 1998-07-03
KR19990087418A (en) 1999-12-27
NO983960D0 (en) 1998-08-28
CN1212770A (en) 1999-03-31
AR009852A1 (en) 2000-05-03
JPH11505055A (en) 1999-05-11
WO1998029813A1 (en) 1998-07-09
AU5668398A (en) 1998-07-31
BR9707881A (en) 1999-07-27

Similar Documents

Publication Publication Date Title
NO983960L (en) Procedure for establishing the security of a security module, as well as its associated security module
ATE112118T1 (en) METHOD FOR NETWORKING COMPUTERS AND/OR COMPUTER NETWORKS AND NETWORKING SYSTEM.
DE19781620T1 (en) Bus patcher
TR199801583T2 (en) Error detection and correction system and method.
BR9406371A (en) Device for separating solid matter from a liquid process and apparatus for separating solids from a flowing liquid apparatus for separating liquid from a flowing liquid and apparatus for separating solids retained in a liquid from a flowing liquid
DE60312235D1 (en) METHOD AND SYSTEM FOR INHIBITING PREVENTION AND DEFLECTION
ATE525691T1 (en) DATA PROCESSING THROUGH FLOW RESTART MARKING
BR0208272A (en) Telecommunication process and system for monitoring a data stream in a data network
DK0621569T3 (en) Device and method for protecting keys on a smart card
DK0607225T3 (en) Apparatus for determining the operational efficiency of a machine tool and its method.
ATE88028T1 (en) METHOD AND DEVICE FOR DIGITAL LOGICAL SYNCHRONISM MONITORING.
AU2001249643A1 (en) Multi-channel, multi-service debug on a pipelined cpu architecture
DE60132633D1 (en) DIGITAL SIGNAL PROCESSOR DEVICE
DE69425542D1 (en) Logical circuit with error detection function, method for managing equipment and fault-tolerant system for its application
DK192886D0 (en) PROCEDURE FOR REPROGRAMMING A COMPUTER INSTALLED IN A DEVICE AND APPARATUS FOR EXERCISING THE PROCEDURE
KR920001212A (en) Test method of semiconductor device
SE9802058L (en) Redundant termination for dynamic fault isolation
NO962866L (en) Method and apparatus for processing signals in a security system
ATE206830T1 (en) DEVICE FOR OPERATING TWO PROCESSORS FUNCTIONALLY CONNECTED IN PARALLEL
KR890001323A (en) Data communication control
FI20035109A7 (en) Method and apparatus for preventing operation
DK0695158T3 (en) A method and apparatus for producing in a web of sheet or sheet material a fold comprising at least one elastic
ATE178718T1 (en) CIRCUIT ARRANGEMENT AND METHOD FOR TESTING NON-INTERMITTENT ENCODERS
DE50105624D1 (en) METHOD FOR OPERATING A TELECOMMUNICATIONS SYSTEM
DE69429510D1 (en) LOCKING METHOD AND DEVICE

Legal Events

Date Code Title Description
FC2A Withdrawal, rejection or dismissal of laid open patent application