ATE431603T1 - Kryptographisches verfahren mit öffentlichem schlüssel zum schützen einer integrierten schaltung gegen missbrauch - Google Patents
Kryptographisches verfahren mit öffentlichem schlüssel zum schützen einer integrierten schaltung gegen missbrauchInfo
- Publication number
- ATE431603T1 ATE431603T1 AT04001402T AT04001402T ATE431603T1 AT E431603 T1 ATE431603 T1 AT E431603T1 AT 04001402 T AT04001402 T AT 04001402T AT 04001402 T AT04001402 T AT 04001402T AT E431603 T1 ATE431603 T1 AT E431603T1
- Authority
- AT
- Austria
- Prior art keywords
- protecting
- integrated circuit
- public key
- key cryptographic
- cryptographic method
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computing Systems (AREA)
- Pure & Applied Mathematics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0301108A FR2850479B1 (fr) | 2003-01-24 | 2003-01-24 | Procede cryptographique a cle publique pour la protection d'une puce contre la fraude |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE431603T1 true ATE431603T1 (de) | 2009-05-15 |
Family
ID=32525020
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT04001402T ATE431603T1 (de) | 2003-01-24 | 2004-01-23 | Kryptographisches verfahren mit öffentlichem schlüssel zum schützen einer integrierten schaltung gegen missbrauch |
Country Status (11)
| Country | Link |
|---|---|
| US (1) | US7590846B2 (de) |
| EP (1) | EP1441313B1 (de) |
| JP (1) | JP4659149B2 (de) |
| KR (1) | KR101142656B1 (de) |
| CN (1) | CN100566246C (de) |
| AR (1) | AR047012A1 (de) |
| AT (1) | ATE431603T1 (de) |
| DE (1) | DE602004021047D1 (de) |
| FR (1) | FR2850479B1 (de) |
| MX (1) | MXPA04000700A (de) |
| TW (1) | TWI336864B (de) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7395425B2 (en) * | 2001-03-29 | 2008-07-01 | Matsushita Electric Industrial Co., Ltd. | Data protection system that protects data by encrypting the data |
| JP4612461B2 (ja) * | 2004-06-24 | 2011-01-12 | 株式会社東芝 | マイクロプロセッサ |
| JP5147412B2 (ja) * | 2005-01-21 | 2013-02-20 | サーティコム コーポレーション | 楕円曲線乱数生成 |
| TW200708027A (en) * | 2005-04-29 | 2007-02-16 | Sean O'neil | Process of and apparatus for hashing |
| US7613915B2 (en) | 2006-11-09 | 2009-11-03 | BroadOn Communications Corp | Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed |
| US9767319B2 (en) | 2007-04-17 | 2017-09-19 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Method and apparatus of secure authentication for system on chip (SoC) |
| EP2251813A1 (de) * | 2009-05-13 | 2010-11-17 | Nagravision S.A. | Verfahren zur Authentifizierung des Zugangs auf einen gesicherten Chip in einer Testvorrichtung |
| DE102009022233A1 (de) * | 2009-05-20 | 2010-11-25 | Feustel, Dietmar | Verwendung einer Zeichenkette in Sytemen der Kryptographie, der Statistik, der Simulation, der Randomisierung, von Spielautomaten und dgl. |
| US8923519B2 (en) * | 2009-05-29 | 2014-12-30 | Alcatel Lucent | Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens |
| DE102010010950A1 (de) * | 2010-03-10 | 2011-09-15 | Giesecke & Devrient Gmbh | Verfahren zum Authentisieren eines portablen Datenträgers |
| EP2720167A1 (de) * | 2012-10-11 | 2014-04-16 | Nagravision S.A. | Verfahren und System zur Chippersonalisierung von Chipkarten |
| SG10202011641RA (en) | 2016-02-23 | 2021-01-28 | Nchain Holdings Ltd | Tokenisation method and system for implementing exchanges on a blockchain |
| EP3420518B1 (de) | 2016-02-23 | 2023-08-23 | nChain Licensing AG | Verfahren und systeme zur effizienten übertragung von einheiten auf einem verteilten peer-to-peer-konto mittels blockchain |
| KR102753027B1 (ko) | 2016-02-23 | 2025-01-14 | 엔체인 홀딩스 리미티드 | 블록체인상의 개체의 안전한 전송을 위한 방법 및 시스템 |
| LT3268914T (lt) | 2016-02-23 | 2018-11-12 | nChain Holdings Limited | Bendros paslapties, skirtos saugiems informacijos mainams, nustatymas ir hierarchiniai determinuoti kriptografiniai raktai |
| EP3420669B1 (de) | 2016-02-23 | 2021-03-24 | Nchain Holdings Limited | Kryptographisches verfahren und system zur sicheren extraktion von daten aus einer blockkette |
| JP6511201B1 (ja) | 2016-02-23 | 2019-05-15 | エヌチェーン ホールディングス リミテッドNchain Holdings Limited | ブロックチェーンにより施行される洗練された取引のためのレジストリ及び自動管理方法 |
| MX2018010056A (es) | 2016-02-23 | 2019-01-21 | Nchain Holdings Ltd | Un metodo y sistema para asegurar software de computadora usando un cuadro hash distribuido y una cadena de bloques. |
| GB2560274C (en) | 2016-02-23 | 2022-06-15 | Nchain Holdings Ltd | Personal device security using elliptic curve cryptography for secret sharing |
| AU2017223127B2 (en) | 2016-02-23 | 2023-01-05 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
| CN116739778A (zh) | 2016-02-23 | 2023-09-12 | 区块链控股有限公司 | 具有令牌化的基于区块链的交换 |
| SG10202112185TA (en) | 2016-02-23 | 2021-12-30 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| CA3014737A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
| CA3014727A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
| CN109155036B (zh) | 2016-02-23 | 2023-05-23 | 区块链控股有限公司 | 用于经由区块链控制资产有关的动作的系统及方法 |
| AU2017222468B2 (en) | 2016-02-23 | 2023-01-12 | nChain Holdings Limited | Agent-based turing complete transactions integrating feedback within a blockchain system |
| CN109471610B (zh) * | 2018-10-25 | 2021-03-19 | 北京链化未来科技有限公司 | 一种串行随机数生成方法、装置和存储介质 |
| CN109361509A (zh) * | 2018-10-25 | 2019-02-19 | 杭州隐知科技有限公司 | 一种随机数生成方法、装置和存储介质 |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4926480A (en) * | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems |
| US4933970A (en) * | 1988-01-19 | 1990-06-12 | Yeda Research And Development Company Limited | Variants of the fiat-shamir identification and signature scheme |
| EP0383985A1 (de) * | 1989-02-24 | 1990-08-29 | Claus Peter Prof. Dr. Schnorr | Verfahren zur Identifikation von Teilnehmern sowie zur Generierung und Verifikation von elektronischen Unterschriften in einem Datenaustauschsystem |
| JP2993275B2 (ja) * | 1992-05-25 | 1999-12-20 | 三菱電機株式会社 | 認証方法 |
| FR2716058B1 (fr) * | 1994-02-04 | 1996-04-12 | France Telecom | Procédé de signature numérique et d'authentification de messages utilisant un logarithme discret. |
| FR2717286B1 (fr) * | 1994-03-09 | 1996-04-05 | Bull Cp8 | Procédé et dispositif pour authentifier un support de données destiné à permettre une transaction ou l'accès à un service ou à un lieu, et support correspondant. |
| CA2167631A1 (en) * | 1995-01-20 | 1996-07-21 | W. Dale Hopkins | Method and apparatus for user and security device authentication |
| US6226383B1 (en) | 1996-04-17 | 2001-05-01 | Integrity Sciences, Inc. | Cryptographic methods for remote authentication |
| DE19820422A1 (de) * | 1998-05-07 | 1999-11-11 | Giesecke & Devrient Gmbh | Verfahren zur Authentisierung einer Chipkarte innerhalb eines Nachrichtenübertragungs-Netzwerks |
| TW536672B (en) | 2000-01-12 | 2003-06-11 | Hitachi Ltd | IC card and microcomputer |
| JP3864675B2 (ja) * | 2000-03-09 | 2007-01-10 | 株式会社日立製作所 | 共通鍵暗号装置 |
| GB0102516D0 (en) * | 2001-01-31 | 2001-03-21 | Hewlett Packard Co | Trusted gateway system |
| FR2826531B1 (fr) * | 2001-06-26 | 2003-10-24 | France Telecom | Procede cryptographique pour la protection d'une puce electronique contre la fraude |
| FR2828780B1 (fr) * | 2001-08-20 | 2004-01-16 | France Telecom | Procede de realisation d'une unite cryptographique pour un systeme de cryptographie asymetrique utilisant une fonction logarithme discret |
| FR2829645A1 (fr) * | 2001-09-10 | 2003-03-14 | St Microelectronics Sa | Protocole d'authentification a verification d'integrite de memoire |
| FR2834403B1 (fr) | 2001-12-27 | 2004-02-06 | France Telecom | Systeme cryptographique de signature de groupe |
| US7353395B2 (en) * | 2002-03-21 | 2008-04-01 | Ntt Docomo Inc. | Authenticated ID-based cryptosystem with no key escrow |
-
2003
- 2003-01-24 FR FR0301108A patent/FR2850479B1/fr not_active Expired - Fee Related
-
2004
- 2004-01-15 TW TW093101032A patent/TWI336864B/zh not_active IP Right Cessation
- 2004-01-19 KR KR1020040003931A patent/KR101142656B1/ko not_active Expired - Lifetime
- 2004-01-20 US US10/761,040 patent/US7590846B2/en not_active Expired - Lifetime
- 2004-01-21 CN CNB2004100029538A patent/CN100566246C/zh not_active Expired - Lifetime
- 2004-01-23 AR ARP040100213A patent/AR047012A1/es active IP Right Grant
- 2004-01-23 EP EP04001402A patent/EP1441313B1/de not_active Expired - Lifetime
- 2004-01-23 AT AT04001402T patent/ATE431603T1/de not_active IP Right Cessation
- 2004-01-23 MX MXPA04000700A patent/MXPA04000700A/es active IP Right Grant
- 2004-01-23 DE DE602004021047T patent/DE602004021047D1/de not_active Expired - Lifetime
- 2004-01-26 JP JP2004017044A patent/JP4659149B2/ja not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| DE602004021047D1 (de) | 2009-06-25 |
| FR2850479B1 (fr) | 2005-04-29 |
| TWI336864B (en) | 2011-02-01 |
| JP2004229308A (ja) | 2004-08-12 |
| US20040193890A1 (en) | 2004-09-30 |
| JP4659149B2 (ja) | 2011-03-30 |
| US7590846B2 (en) | 2009-09-15 |
| TW200511136A (en) | 2005-03-16 |
| CN1518270A (zh) | 2004-08-04 |
| FR2850479A1 (fr) | 2004-07-30 |
| EP1441313A1 (de) | 2004-07-28 |
| CN100566246C (zh) | 2009-12-02 |
| AR047012A1 (es) | 2006-01-04 |
| KR20040068472A (ko) | 2004-07-31 |
| EP1441313B1 (de) | 2009-05-13 |
| MXPA04000700A (es) | 2004-08-03 |
| KR101142656B1 (ko) | 2012-05-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE431603T1 (de) | Kryptographisches verfahren mit öffentlichem schlüssel zum schützen einer integrierten schaltung gegen missbrauch | |
| GB2443349B (en) | A method and apparatus for protecting private information on a user apparatus | |
| DE602004005324D1 (de) | Vorrichtung zum erweitern von bohrlöchern | |
| DE602004013116D1 (de) | Haptische tastengesteuerte Dateneingabe | |
| IS8420A (is) | Aðferð fyrir örugga auðkenningu | |
| DE60318974D1 (de) | Elektronisches Schlüsselsystem | |
| DE602004008370D1 (de) | Insassenbeinschutzvorrichtung | |
| DE602004005369D1 (de) | Vorrichtung zum Verlegen von Leitungselementen | |
| DE602004006473D1 (de) | Insassenbeinschutzvorrichtung | |
| DE602005014426D1 (de) | Elektronisches Schlüsselsystem | |
| FI20031558L (fi) | Menetelmä käyttäjän autentikoimiseksi | |
| DE60306864D1 (de) | Verfahren und System zum abnehmbaren kryptographischenen Zündungsschlüssel | |
| DE602005000670D1 (de) | Elektrische Lenksperre und zugehöriges Verfahren | |
| DE60313337D1 (de) | Aufprallschutz und dessen Verfahren | |
| DE502004003065D1 (de) | Vorrichtung und verfahren zum schutz einer elektrischen maschine | |
| DE60135864D1 (de) | Verfahren zum öffnen eines elektronischen schlosses | |
| DE602004001051D1 (de) | Schlüsselbetätigte Diebstahlsicherung | |
| DE502004004313D1 (de) | Elektronischer schl ssel | |
| EP1479206A4 (de) | Serverunterstütztes kryptographisches verfahren mit öffentlichen schlüsseln | |
| FI20035084L (fi) | Menetelmä ja järjestelmä valinnan suorittamiseksi ja elektroniikkalaite | |
| GB2430788B (en) | Method for authenticating an electronic signature | |
| DE60206107D1 (de) | Verfahren zum Schutz eines elektronisches Gerätes, und elektronisches Gerät | |
| DE50307086D1 (de) | Vorrichtung zum insassenschutz | |
| DE602004011645D1 (de) | Vorrichtung zum Schutz einer Information | |
| DE10391022D2 (de) | Vorrichtung zum Schutz gegen unautorisierte Benutzung von Software |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |