[go: up one dir, main page]

AU2001269215A1 - Data processing with a key - Google Patents

Data processing with a key

Info

Publication number
AU2001269215A1
AU2001269215A1 AU2001269215A AU6921501A AU2001269215A1 AU 2001269215 A1 AU2001269215 A1 AU 2001269215A1 AU 2001269215 A AU2001269215 A AU 2001269215A AU 6921501 A AU6921501 A AU 6921501A AU 2001269215 A1 AU2001269215 A1 AU 2001269215A1
Authority
AU
Australia
Prior art keywords
key
data processing
random number
data
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001269215A
Inventor
Pascal Guterman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gemplus SA
Original Assignee
Gemplus Card International SA
Gemplus SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus Card International SA, Gemplus SA filed Critical Gemplus Card International SA
Publication of AU2001269215A1 publication Critical patent/AU2001269215A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)
  • Credit Cards Or The Like (AREA)
  • Auxiliary Devices For Music (AREA)

Abstract

In a data processing device, a first key is produced based on a secret key so that the latter is never used in a clear form. In a preliminary step, the secret key and a random number are applied to a function producing a first key. The first key and the random number are pre-stored in the device. For each data processing, the first key and another random number are applied to another function to produce a second key, and the second key and the stored number are applied as inverse of the function to produce a third key used for processing the data. The device can be a smart card and the data the confidential code presented to the card.
AU2001269215A 2000-06-20 2001-06-20 Data processing with a key Abandoned AU2001269215A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0007887 2000-06-20
FR0007887A FR2810480B1 (en) 2000-06-20 2000-06-20 DATA PROCESSING WITH A KEY
PCT/FR2001/001942 WO2001099335A1 (en) 2000-06-20 2001-06-20 Data processing with a key

Publications (1)

Publication Number Publication Date
AU2001269215A1 true AU2001269215A1 (en) 2002-01-02

Family

ID=8851470

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001269215A Abandoned AU2001269215A1 (en) 2000-06-20 2001-06-20 Data processing with a key

Country Status (10)

Country Link
US (1) US7529369B2 (en)
EP (1) EP1297653B1 (en)
CN (1) CN100399738C (en)
AT (1) ATE450948T1 (en)
AU (1) AU2001269215A1 (en)
DE (1) DE60140671D1 (en)
DK (1) DK1297653T3 (en)
ES (1) ES2336543T3 (en)
FR (1) FR2810480B1 (en)
WO (1) WO2001099335A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667308B (en) * 2008-09-04 2013-02-27 日电(中国)有限公司 Access control system, access control devices, access card and access control method
CN101739756B (en) * 2008-11-10 2012-01-11 中兴通讯股份有限公司 Method for generating secrete key of smart card
DE102009043090A1 (en) * 2009-09-25 2011-03-31 Wincor Nixdorf International Gmbh Device for handling notes of value
DE102010055699A1 (en) * 2010-12-22 2012-06-28 Giesecke & Devrient Gmbh Cryptographic process
JP2014224879A (en) * 2013-05-16 2014-12-04 株式会社メガチップス Random number generator; encryption processing device, storage device, and information processing system
EP2821972B1 (en) 2013-07-05 2020-04-08 Assa Abloy Ab Key device and associated method, computer program and computer program product
PL2821970T5 (en) 2013-07-05 2019-12-31 Assa Abloy Ab Access control communication device, method, computer program and computer program product
EP3408747A4 (en) * 2016-01-28 2019-09-18 Tfor LLC ELIMINATION OF INFORMATION PRESENTED IN DATA
EP3282638A1 (en) * 2016-08-11 2018-02-14 Gemalto Sa A method for provisioning a first communication device by using a second communication device
US10615971B2 (en) * 2017-05-22 2020-04-07 Microsoft Technology Licensing, Llc High integrity logs for distributed software services

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1238427A (en) * 1984-12-18 1988-06-21 Jonathan Oseas Code protection using cryptography
FR2716280B1 (en) * 1994-02-11 1996-04-12 Solaic Sa Method for protecting memory card components against fraudulent use.
US5412723A (en) * 1994-03-01 1995-05-02 International Business Machines Corporation Mechanism for keeping a key secret from mobile eavesdroppers
JPH09238132A (en) * 1996-02-29 1997-09-09 Oki Electric Ind Co Ltd Portable terminal communication system and communication method thereof
JPH1020778A (en) * 1996-07-08 1998-01-23 Harumi Takeda Encryption device and decryption device, and IC card
DE19841676A1 (en) * 1998-09-11 2000-03-16 Giesecke & Devrient Gmbh Access protected data carrier with semiconductor chip, has operation which is modified prior to its execution, and is supplied with modified input data
JP4317607B2 (en) * 1998-12-14 2009-08-19 株式会社日立製作所 Information processing equipment, tamper resistant processing equipment
US6715078B1 (en) * 2000-03-28 2004-03-30 Ncr Corporation Methods and apparatus for secure personal identification number and data encryption

Also Published As

Publication number Publication date
CN1437808A (en) 2003-08-20
CN100399738C (en) 2008-07-02
ATE450948T1 (en) 2009-12-15
ES2336543T3 (en) 2010-04-14
WO2001099335A1 (en) 2001-12-27
FR2810480A1 (en) 2001-12-21
DK1297653T3 (en) 2010-04-12
DE60140671D1 (en) 2010-01-14
EP1297653B1 (en) 2009-12-02
EP1297653A1 (en) 2003-04-02
US20030179884A1 (en) 2003-09-25
US7529369B2 (en) 2009-05-05
FR2810480B1 (en) 2002-11-15

Similar Documents

Publication Publication Date Title
CA2462266C (en) System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
DE69428215D1 (en) Digital signature method that uses digital time authentication to digitally sign
WO2004006536A3 (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CA2306139A1 (en) Personalization of smart cards
WO2002050642A3 (en) Method for providing multimedia files and terminal therefor
WO2002073377A3 (en) Authorisation method for a user of a limited access system having an authorisation centre
GB9903123D0 (en) Method of securing communication
DE59912267D1 (en) METHOD FOR AUTHENTICATING A CHIP CARD WITHIN A MESSAGE TRANSMISSION NETWORK
WO2002078249A8 (en) Method of using biometric information for secret generation
AU2001228730A1 (en) Banking system with enhanced utility
MY126941A (en) Data processing system and method for mutual identification between apparatuses
ES2168746T3 (en) DEVICE AND ELECTRONIC DATA PROCESSING SYSTEM.
AU2001269215A1 (en) Data processing with a key
AU2001250440A1 (en) Subscriber authentication
WO2005038641A3 (en) Data security
WO2001037478A3 (en) Encryption key management system using multiple smart cards
AU2001230359A1 (en) Authenticating textile based items
AU2553000A (en) Countermeasure method in an electronic component using a secret key cryptographic algorithm
AU3771900A (en) Associating content with households using smart cards
EP1162778A3 (en) System and method for arranging digital certificates on a hardware token
WO2001016899A3 (en) Portable terminal
MY136236A (en) Certification of transactions
EP0818762A3 (en) Coding device, decoding device and IC circuit
WO2002041236A3 (en) High security data card
WO2007072450A3 (en) Puf protocol with improved backward security