[go: up one dir, main page]

DE60308990D1 - Schutz eines gerätes gegen unerwünschte verwendung in einem sicheren umfeld - Google Patents

Schutz eines gerätes gegen unerwünschte verwendung in einem sicheren umfeld

Info

Publication number
DE60308990D1
DE60308990D1 DE60308990T DE60308990T DE60308990D1 DE 60308990 D1 DE60308990 D1 DE 60308990D1 DE 60308990 T DE60308990 T DE 60308990T DE 60308990 T DE60308990 T DE 60308990T DE 60308990 D1 DE60308990 D1 DE 60308990D1
Authority
DE
Germany
Prior art keywords
random number
memory
hash value
secret
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
DE60308990T
Other languages
English (en)
Other versions
DE60308990T2 (de
Inventor
Philippe Bressy
Yann Loisel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Identiv GmbH
Original Assignee
SCM Microsystems GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SCM Microsystems GmbH filed Critical SCM Microsystems GmbH
Publication of DE60308990D1 publication Critical patent/DE60308990D1/de
Application granted granted Critical
Publication of DE60308990T2 publication Critical patent/DE60308990T2/de
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Emergency Alarm Devices (AREA)
  • Emergency Protection Circuit Devices (AREA)
  • Details Of Indoor Wiring (AREA)
DE60308990T 2002-01-07 2003-01-07 Schutz eines gerätes gegen unerwünschte verwendung in einem sicheren umfeld Expired - Fee Related DE60308990T2 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10200288A DE10200288A1 (de) 2002-01-07 2002-01-07 Eine Vorrichtung zur Ausführung von Anwendungen, die sichere Transaktionen und/oder Zugangskontrolle zu werthaltigen Inhalten und/oder Dienstleistungen umfassen, und Verfahren zum Schutz einer solchen Vorrichtung
DE10200288 2002-01-07
PCT/EP2003/000075 WO2003058409A2 (en) 2002-01-07 2003-01-07 Protecting a device against unintended use in a secure environment

Publications (2)

Publication Number Publication Date
DE60308990D1 true DE60308990D1 (de) 2006-11-23
DE60308990T2 DE60308990T2 (de) 2007-06-14

Family

ID=7711584

Family Applications (2)

Application Number Title Priority Date Filing Date
DE10200288A Withdrawn DE10200288A1 (de) 2002-01-07 2002-01-07 Eine Vorrichtung zur Ausführung von Anwendungen, die sichere Transaktionen und/oder Zugangskontrolle zu werthaltigen Inhalten und/oder Dienstleistungen umfassen, und Verfahren zum Schutz einer solchen Vorrichtung
DE60308990T Expired - Fee Related DE60308990T2 (de) 2002-01-07 2003-01-07 Schutz eines gerätes gegen unerwünschte verwendung in einem sicheren umfeld

Family Applications Before (1)

Application Number Title Priority Date Filing Date
DE10200288A Withdrawn DE10200288A1 (de) 2002-01-07 2002-01-07 Eine Vorrichtung zur Ausführung von Anwendungen, die sichere Transaktionen und/oder Zugangskontrolle zu werthaltigen Inhalten und/oder Dienstleistungen umfassen, und Verfahren zum Schutz einer solchen Vorrichtung

Country Status (8)

Country Link
US (1) US20050125681A1 (de)
EP (1) EP1461681B1 (de)
KR (1) KR20040068614A (de)
AT (1) ATE342548T1 (de)
AU (1) AU2003202545A1 (de)
DE (2) DE10200288A1 (de)
ES (1) ES2275075T3 (de)
WO (1) WO2003058409A2 (de)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2837944B1 (fr) * 2002-03-26 2004-07-09 Oberthur Card Syst Sa Procede et dispositif de validation automatique d'un programme informatique utilisant des fonctions de cryptographie
DE10340861A1 (de) * 2003-09-04 2005-04-07 Infineon Technologies Ag Prozessorschaltung und Verfahren zum Zuordnen eines Logikchips zu einem Speicherchip
US7664966B2 (en) * 2004-05-17 2010-02-16 Microsoft Corporation Secure storage on recordable medium in a content protection system
US7602910B2 (en) * 2004-11-17 2009-10-13 Microsoft Corporation Password protection
FR2885709A1 (fr) * 2005-05-10 2006-11-17 St Microelectronics Sa Controle d'integrite d'une memoire externe a un processeur
US20070101156A1 (en) * 2005-10-31 2007-05-03 Manuel Novoa Methods and systems for associating an embedded security chip with a computer
WO2007076610A1 (en) * 2006-01-06 2007-07-12 Verichk Global Technologies Inc. Secure access to information associated with a value item
DE102006006109A1 (de) * 2006-02-10 2007-08-16 Robert Bosch Gmbh Verfahren zum Manipulationsschutz eines Steuergeräts sowie gegen Manipulationen geschütztes Steuergerät
US7793110B2 (en) * 2006-05-24 2010-09-07 Palo Alto Research Center Incorporated Posture-based data protection
US8209542B2 (en) * 2006-12-29 2012-06-26 Intel Corporation Methods and apparatus for authenticating components of processing systems
US8761402B2 (en) * 2007-09-28 2014-06-24 Sandisk Technologies Inc. System and methods for digital content distribution
US9083685B2 (en) * 2009-06-04 2015-07-14 Sandisk Technologies Inc. Method and system for content replication control
US20100310076A1 (en) * 2009-06-04 2010-12-09 Ron Barzilai Method for Performing Double Domain Encryption in a Memory Device
US8484481B2 (en) * 2009-07-14 2013-07-09 International Business Machines Corporation Chip lockout protection scheme for integrated circuit devices and insertion thereof
US8812854B2 (en) 2009-10-13 2014-08-19 Google Inc. Firmware verified boot
US20110099423A1 (en) * 2009-10-27 2011-04-28 Chih-Ang Chen Unified Boot Code with Signature
KR101636816B1 (ko) * 2011-09-29 2016-07-20 인텔 코포레이션 메모리 액세스 제어를 제공하는 장치, 시스템, 및 방법
US8805850B2 (en) * 2012-05-23 2014-08-12 International Business Machines Corporation Hardware-accelerated relational joins
US9641339B2 (en) 2013-07-31 2017-05-02 Arista Networks, Inc. System and method for authentication for field replaceable units
KR20160014464A (ko) * 2014-07-29 2016-02-11 삼성전자주식회사 메모리 시스템 및 이의 데이터 보호 방법
US10896267B2 (en) * 2017-01-31 2021-01-19 Hewlett Packard Enterprise Development Lp Input/output data encryption
US11625711B2 (en) * 2018-04-24 2023-04-11 Duvon Corporation Autonomous exchange via entrusted ledger key management
US11443072B2 (en) 2018-06-29 2022-09-13 Microsoft Technology Licensing, Llc Peripheral device with resource isolation
US11126757B2 (en) * 2018-10-19 2021-09-21 Microsoft Technology Licensing, Llc Peripheral device
EP3663959B1 (de) * 2018-12-06 2021-08-11 Mastercard International Incorporated Integrierte schaltung, verfahren und computerprogramm
CN114629641B (zh) * 2022-03-17 2022-10-25 江南信安(北京)科技有限公司 基于安全芯片的代码下载启动安全保护方法及装置
AT526879A1 (de) * 2023-02-03 2024-08-15 Btv Tech Gmbh Verfahren zum Beschreiben von Daten auf einen IC sowie System zur Ausführung des Verfahrens
EP4518244A1 (de) * 2023-08-31 2025-03-05 Siemens Aktiengesellschaft Verfahren zur sicheren datenverarbeitung und gemeinsamen nutzung in einem datenmarktplatz

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5887131A (en) * 1996-12-31 1999-03-23 Compaq Computer Corporation Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password
US5983273A (en) * 1997-09-16 1999-11-09 Webtv Networks, Inc. Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferences
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
US6266754B1 (en) * 1998-05-29 2001-07-24 Texas Instruments Incorporated Secure computing device including operating system stored in non-relocatable page of memory
JP2002526822A (ja) * 1998-09-25 2002-08-20 ヒューズ・エレクトロニクス・コーポレーション セキュリティ処理環境を提供するための装置
US6292874B1 (en) * 1999-10-19 2001-09-18 Advanced Technology Materials, Inc. Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges
FR2810138B1 (fr) * 2000-06-08 2005-02-11 Bull Cp8 Procede de stockage securise d'une donnee sensible dans une memoire d'un systeme embarque a puce electronique, notamment d'une carte a puce, et systeme embarque mettant en oeuvre le procede
JP2002014871A (ja) * 2000-06-29 2002-01-18 Fujitsu Ltd コンテンツチェック方法、コンテンツ更新方法、および処理装置

Also Published As

Publication number Publication date
AU2003202545A1 (en) 2003-07-24
US20050125681A1 (en) 2005-06-09
DE10200288A1 (de) 2003-07-17
KR20040068614A (ko) 2004-07-31
EP1461681B1 (de) 2006-10-11
WO2003058409A3 (en) 2004-06-17
ATE342548T1 (de) 2006-11-15
ES2275075T3 (es) 2007-06-01
DE60308990T2 (de) 2007-06-14
EP1461681A2 (de) 2004-09-29
WO2003058409A2 (en) 2003-07-17

Similar Documents

Publication Publication Date Title
DE60308990D1 (de) Schutz eines gerätes gegen unerwünschte verwendung in einem sicheren umfeld
Suh et al. AEGIS: A single-chip secure processor
Suh et al. Aegis: A single-chip secure processor
CN112005237B (zh) 安全区中的处理器与处理加速器之间的安全协作
TWI493951B (zh) 保護對稱加密鑰的系統及方法
Hwang et al. Securing embedded systems
CN103106372A (zh) 用于Android系统的轻量级隐私数据加密方法及系统
CN107528690A (zh) 一种基于异构加速平台的sm4对称加解密方法及系统
Proulx et al. A survey on FPGA cybersecurity design strategies
Rahimi et al. Trends and challenges in ensuring security for low-power and high-performance embedded SoCs
TW201523256A (zh) 確保機板上匯流排交易安全的系統和方法
Choi et al. Design of security enhanced TPM chip against invasive physical attacks
Sau et al. Survey of secure processors
Parikh et al. Survey on hardware security: PUFs, Trojans, and side-channel attacks
Lee et al. Design and implementation of secure cryptographic system on chip for Internet of Things
Zhao et al. Remote power side-channel attacks on FPGAs
Khalil et al. Lightweight hardware security and physically unclonable functions
Verma et al. A new tool for lightweight encryption on android
Gao et al. A novel approximate computing based security primitive for the Internet of Things
Vig et al. Customizing skewed trees for fast memory integrity verification in embedded systems
Vaslin et al. A security approach for off-chip memory in embedded microprocessor systems
Ahn et al. Countermeasure against side-channel attack in shared memory of trustzone
CN114866228B (zh) 一种实现软密码模块的方法、系统、存储介质及终端
Gora et al. A flexible design flow for software IP binding in commodity FPGA
US20060020785A1 (en) Secure distribution of a video card public key

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8339 Ceased/non-payment of the annual fee