ATE455409T1 - Verfahren und vorrichtung zur gewährleistung der softwareintegrität - Google Patents

Verfahren und vorrichtung zur gewährleistung der softwareintegrität

Info

Publication number
ATE455409T1
ATE455409T1 AT03798246T AT03798246T ATE455409T1 AT E455409 T1 ATE455409 T1 AT E455409T1 AT 03798246 T AT03798246 T AT 03798246T AT 03798246 T AT03798246 T AT 03798246T AT E455409 T1 ATE455409 T1 AT E455409T1
Authority
AT
Austria
Prior art keywords
center
new
modulus
message hash
hash value
Prior art date
Application number
AT03798246T
Other languages
English (en)
Inventor
Jeffrey Lotspiech
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Application granted granted Critical
Publication of ATE455409T1 publication Critical patent/ATE455409T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Information Transfer Between Computers (AREA)
AT03798246T 2002-09-26 2003-09-22 Verfahren und vorrichtung zur gewährleistung der softwareintegrität ATE455409T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/259,542 US7240200B2 (en) 2002-09-26 2002-09-26 System and method for guaranteeing software integrity via combined hardware and software authentication
PCT/GB2003/004064 WO2004030269A2 (en) 2002-09-26 2003-09-22 System and method for guaranteeing software integrity

Publications (1)

Publication Number Publication Date
ATE455409T1 true ATE455409T1 (de) 2010-01-15

Family

ID=32029514

Family Applications (1)

Application Number Title Priority Date Filing Date
AT03798246T ATE455409T1 (de) 2002-09-26 2003-09-22 Verfahren und vorrichtung zur gewährleistung der softwareintegrität

Country Status (10)

Country Link
US (3) US7240200B2 (de)
EP (1) EP1547305B1 (de)
JP (1) JP4793843B2 (de)
KR (1) KR100702499B1 (de)
CN (1) CN1689269B (de)
AT (1) ATE455409T1 (de)
AU (1) AU2003264906A1 (de)
DE (1) DE60330976D1 (de)
TW (1) TWI225195B (de)
WO (1) WO2004030269A2 (de)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005293109A (ja) * 2004-03-31 2005-10-20 Canon Inc ソフトウェア実行管理装置、ソフトウェア実行管理方法、及び制御プログラム
US8312431B1 (en) * 2004-09-17 2012-11-13 Oracle America, Inc. System and computer readable medium for verifying access to signed ELF objects
KR100711722B1 (ko) * 2005-10-04 2007-04-25 엘지전자 주식회사 이동통신 단말기의 소프트웨어 인증 장치 및 그 방법
US7389426B2 (en) * 2005-11-29 2008-06-17 Research In Motion Limited Mobile software terminal identifier
US7571377B2 (en) * 2005-12-22 2009-08-04 International Business Machines Corporation Method and apparatus for transmitting data in an integrated circuit
US20100048193A1 (en) * 2006-07-13 2010-02-25 Jean-Michel Ortion Secure upgrade of a mobile device with an individual upgrade software over the air
DE102007056662A1 (de) * 2007-11-24 2009-05-28 Bayerische Motoren Werke Aktiengesellschaft System zur Freischaltung der Funktionalität einer Ablaufsteuerung, die in einem Steuergerät eines Kraftfahrzeugs gespeichert ist
JP4998314B2 (ja) * 2008-02-19 2012-08-15 コニカミノルタホールディングス株式会社 通信制御方法および通信制御プログラム
EP2259205B1 (de) * 2008-03-28 2018-04-25 Panasonic Corporation Softwareaktualisierungsgerät, softwareaktualisierungssystem, änderungsprüfungsverfahren und änderungsprüfungsprogramm
EP2259204A1 (de) * 2008-03-28 2010-12-08 Panasonic Corporation Softwareaktualisierungsvorrichtung, softwareaktualisierungssystem sowie rücksetzungsverfahren und rücksetzungsprogramm dafür
US8108928B2 (en) 2008-06-20 2012-01-31 International Business Machines Corporation Adaptive traitor tracing
US8949797B2 (en) 2010-04-16 2015-02-03 International Business Machines Corporation Optimizing performance of integrity monitoring
US8782434B1 (en) 2010-07-15 2014-07-15 The Research Foundation For The State University Of New York System and method for validating program execution at run-time
US8782435B1 (en) 2010-07-15 2014-07-15 The Research Foundation For The State University Of New York System and method for validating program execution at run-time using control flow signatures
US8683579B2 (en) * 2010-12-14 2014-03-25 Microsoft Corporation Software activation using digital licenses
TWI480735B (zh) * 2012-02-14 2015-04-11 Nuvoton Technology Corp 具有防複製功能的微處理器晶片及其晶片燒錄系統與電子裝置
US9063721B2 (en) 2012-09-14 2015-06-23 The Research Foundation For The State University Of New York Continuous run-time validation of program execution: a practical approach
CN104217141B (zh) * 2014-09-04 2017-02-15 东莞理工学院 一种增强的虚拟仪器测量软件计量支持方法及装置
JP6139804B2 (ja) * 2014-10-03 2017-05-31 株式会社東芝 再暗号化鍵生成装置、再暗号化装置、暗号化装置、復号装置及びプログラム
CA2874277C (en) * 2014-10-04 2015-08-18 2381371 Ontario Inc. Tamper-evident network messaging method and system, and device configured therefor
CN107249002B (zh) * 2017-07-20 2021-02-23 云南电网有限责任公司电力科学研究院 一种提高智能电能表安全性的方法、系统及装置
CN108173653A (zh) * 2018-03-13 2018-06-15 江苏信源久安信息科技有限公司 通过标识密码算法生成具有生命周期密钥的方法
US11610012B1 (en) * 2019-11-26 2023-03-21 Gobeep, Inc. Systems and processes for providing secure client controlled and managed exchange of data between parties
CN111404952B (zh) * 2020-03-24 2022-06-14 中国南方电网有限责任公司 变电站数据加密传输方法、装置、计算机设备和存储介质
CN114666055B (zh) * 2022-03-31 2025-02-14 中国工商银行股份有限公司 软件数字水印的处理方法及相关装置
CN116522300B (zh) * 2023-07-04 2023-09-08 北京点聚信息技术有限公司 一种电子印章智能管理系统

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US5266771A (en) * 1991-12-05 1993-11-30 Amf Irrevocable Trust Ornament having patterned ornamental indicia thereon, and method and apparatus for fabricating same
US5343527A (en) * 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
JP2570136B2 (ja) * 1993-10-28 1997-01-08 日本電気株式会社 鍵生成装置
US5978482A (en) * 1995-08-21 1999-11-02 International Business Machines Corporation Method and system for protection of digital information
JPH09233068A (ja) * 1996-02-23 1997-09-05 Digital Vision Lab:Kk 電子認証システム
US6049671A (en) 1996-04-18 2000-04-11 Microsoft Corporation Method for identifying and obtaining computer software from a network computer
US6138236A (en) * 1996-07-01 2000-10-24 Sun Microsystems, Inc. Method and apparatus for firmware authentication
US5919247A (en) * 1996-07-24 1999-07-06 Marimba, Inc. Method for the distribution of code and data updates
CN1197248A (zh) * 1996-09-25 1998-10-28 中国工商银行福建省分行 一种数字签名方法
US6381741B1 (en) * 1998-05-18 2002-04-30 Liberate Technologies Secure data downloading, recovery and upgrading
US6266771B1 (en) 1997-02-10 2001-07-24 The Regents Of The University Of California Probabilistic signature scheme
US6334189B1 (en) * 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US6105137A (en) * 1998-07-02 2000-08-15 Intel Corporation Method and apparatus for integrity verification, authentication, and secure linkage of software modules
US6266429B1 (en) * 1998-09-23 2001-07-24 Philips Electronics North America Corporation Method for confirming the integrity of an image transmitted with a loss
US6389537B1 (en) 1999-04-23 2002-05-14 Intel Corporation Platform and method for assuring integrity of trusted agent communications
DE10008973B4 (de) 2000-02-25 2004-10-07 Bayerische Motoren Werke Ag Autorisierungsverfahren mit Zertifikat
KR100455566B1 (ko) 2000-06-30 2004-11-09 인터내셔널 비지네스 머신즈 코포레이션 코드 갱신을 위한 장치 및 방법
JP3725020B2 (ja) * 2000-11-22 2005-12-07 株式会社日立製作所 電子データの内容証明方法及びそのシステム
US20020083318A1 (en) * 2000-12-26 2002-06-27 Larose Gordon Edward Method and system for software integrity control using secure hardware assist

Also Published As

Publication number Publication date
US20040064695A1 (en) 2004-04-01
JP2006500843A (ja) 2006-01-05
US7721098B2 (en) 2010-05-18
DE60330976D1 (de) 2010-03-04
TW200406667A (en) 2004-05-01
CN1689269A (zh) 2005-10-26
US7734921B2 (en) 2010-06-08
TWI225195B (en) 2004-12-11
AU2003264906A1 (en) 2004-04-19
US20080215885A1 (en) 2008-09-04
US20080313460A1 (en) 2008-12-18
EP1547305B1 (de) 2010-01-13
JP4793843B2 (ja) 2011-10-12
KR20050056204A (ko) 2005-06-14
EP1547305A2 (de) 2005-06-29
US7240200B2 (en) 2007-07-03
KR100702499B1 (ko) 2007-04-02
CN1689269B (zh) 2010-04-28
WO2004030269A2 (en) 2004-04-08
WO2004030269A3 (en) 2004-08-12
AU2003264906A8 (en) 2004-04-19

Similar Documents

Publication Publication Date Title
ATE455409T1 (de) Verfahren und vorrichtung zur gewährleistung der softwareintegrität
GB2603096A (en) Forward secrecy in transport layer security using ephemral keys
CN110166242B (zh) 报文传输方法及装置
JP7147856B2 (ja) 情報処理装置、情報処理システム、メンバ特定方法、及びプログラム
CN103064931B (zh) 可验证的隐私数据比较与排名查询方法
WO2008127446A3 (en) A method and apparatus for time-lapse cryptography
JP2009526411A5 (de)
CN110149209A (zh) 物联网设备及其提高数据传输安全性的方法和装置
ATE374478T1 (de) System und verfahren für das erneuern von schlüsseln, welche in public-key kryptographie genutzt werden
ATE485691T1 (de) Verfahren zum authentifizieren und verifizieren von sms-übermittlungen
EP4169206A1 (de) Schwellensignaturen
US20080212780A1 (en) Homomorphic Encryption For Secure Watermarking
CN113128999A (zh) 一种区块链隐私保护方法及装置
CN104156671A (zh) 一种保护隐私的无中心点积计算方法
CN112162726A (zh) 目标用户确定方法、装置、设备及存储介质
JP2019519176A (ja) 鍵管理システム及び方法
ATE506797T1 (de) Datenauthentifizierungsverfahren und agent basiertes system
CN110532734B (zh) 一种基于安全多方计算的隐私时间戳的数字版权方法及系统
CN112073173A (zh) 一种面向区块链pki的非法签名者确定系统
ATE362249T1 (de) Verfahren und vorrichtungen zur erstellung fairer blindunterschriften
US20090060188A1 (en) Determining security states using binary output sequences
CN110572257B (zh) 基于身份的数据来源鉴别方法和系统
CN111161075A (zh) 区块链交易数据证明监管方法、系统及相关设备
ATE472769T1 (de) Verbesserte natürliche montgomery- exponentenmaskierung
CN111552950A (zh) 一种软件授权方法、装置及计算机可读存储介质

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties