DK1305708T3 - Rækkefølge-nummereringsmekanisme til at sikre integriteten af eksekveringsrækkefølgen for indbyrdes afhængige smartcard-applikationer - Google Patents

Rækkefølge-nummereringsmekanisme til at sikre integriteten af eksekveringsrækkefølgen for indbyrdes afhængige smartcard-applikationer

Info

Publication number
DK1305708T3
DK1305708T3 DK01938842T DK01938842T DK1305708T3 DK 1305708 T3 DK1305708 T3 DK 1305708T3 DK 01938842 T DK01938842 T DK 01938842T DK 01938842 T DK01938842 T DK 01938842T DK 1305708 T3 DK1305708 T3 DK 1305708T3
Authority
DK
Denmark
Prior art keywords
order
code
executed
interdependent
integrity
Prior art date
Application number
DK01938842T
Other languages
English (en)
Inventor
Ulf Carlsen
Hakon Hammerstad
Original Assignee
Sospita As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sospita As filed Critical Sospita As
Application granted granted Critical
Publication of DK1305708T3 publication Critical patent/DK1305708T3/da

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/465Distributed object oriented systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Saccharide Compounds (AREA)
  • Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
  • Peptides Or Proteins (AREA)
DK01938842T 2001-05-11 2001-05-11 Rækkefølge-nummereringsmekanisme til at sikre integriteten af eksekveringsrækkefølgen for indbyrdes afhængige smartcard-applikationer DK1305708T3 (da)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/NO2001/000201 WO2002093365A1 (en) 2001-05-11 2001-05-11 Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications

Publications (1)

Publication Number Publication Date
DK1305708T3 true DK1305708T3 (da) 2003-07-14

Family

ID=19904215

Family Applications (1)

Application Number Title Priority Date Filing Date
DK01938842T DK1305708T3 (da) 2001-05-11 2001-05-11 Rækkefølge-nummereringsmekanisme til at sikre integriteten af eksekveringsrækkefølgen for indbyrdes afhængige smartcard-applikationer

Country Status (10)

Country Link
US (1) US6490720B1 (da)
EP (1) EP1305708B1 (da)
AT (1) ATE242892T1 (da)
CA (1) CA2446489A1 (da)
DE (1) DE60100363T2 (da)
DK (1) DK1305708T3 (da)
ES (1) ES2201038T3 (da)
NO (1) NO20034816L (da)
PT (1) PT1305708E (da)
WO (1) WO2002093365A1 (da)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6938244B1 (en) 1999-05-11 2005-08-30 Microsoft Corp. Interlaced protocol for smart card application development
US6845498B1 (en) * 1999-05-11 2005-01-18 Microsoft Corporation Method and apparatus for sharing data files among run time environment applets in an integrated circuit card
US6912528B2 (en) * 2000-01-18 2005-06-28 Gregg S. Homer Rechargeable media distribution and play system
US7272228B2 (en) * 2003-06-12 2007-09-18 International Business Machines Corporation System and method for securing code and ensuring proper execution using state-based encryption
DE10340411B4 (de) * 2003-09-02 2005-10-13 Infineon Technologies Ag Vorrichtung und Verfahren zur sicheren Ausführung eines Programms
US7730318B2 (en) * 2003-10-24 2010-06-01 Microsoft Corporation Integration of high-assurance features into an application through application factoring
US7426752B2 (en) * 2004-01-05 2008-09-16 International Business Machines Corporation System and method for order-preserving encryption for numeric data
US20050204405A1 (en) * 2004-03-04 2005-09-15 Brian Wormington Method and system for digital rights management
US20080022267A1 (en) * 2004-04-26 2008-01-24 Google Inc. Method and System for Dynamically Composing Distributed Interactive Applications from High-Level Programming Languages
ES2255814B1 (es) * 2004-05-31 2007-07-01 Administracion De La Comunidad Autonoma De Euskadi Dispositivo de establecimiento, ejecucion y obtencion del resultado de la ejecucion de una tarea.
EP1698958A1 (fr) * 2005-02-25 2006-09-06 Axalto SA Procédé de sécurisation de l'ecriture en mémoire contre des attaques par rayonnement ou autres
EP2033145B1 (en) 2006-06-15 2011-04-06 Kabushiki Kaisha Toshiba Portable electronic device and control method thereof
US20080133419A1 (en) * 2006-12-05 2008-06-05 Brian Wormington Secure financial transaction system and method
KR101224717B1 (ko) * 2008-12-26 2013-01-21 에스케이플래닛 주식회사 소프트웨어 라이센스 보호 방법과 그를 위한 시스템, 서버,단말기 및 컴퓨터로 읽을 수 있는 기록매체
US9934377B2 (en) 2015-11-20 2018-04-03 Atmel Corporation Input/output parameter selection

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4558176A (en) 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
CA1322422C (en) * 1988-07-18 1993-09-21 James P. Emmond Single-keyed indexed file for tp queue repository
JP3290280B2 (ja) * 1994-01-13 2002-06-10 株式会社東芝 情報処理装置
FR2723652B1 (fr) 1994-08-11 1996-09-13 Cegelec Procede pour ordonnancer des taches successives
US6157721A (en) * 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US5651068A (en) 1995-03-08 1997-07-22 Hewlett-Packard Company International cryptography framework
NO302388B1 (no) 1995-07-13 1998-02-23 Sigurd Sigbjoernsen Fremgangsmåte og anordning for å beskytte programvare mot bruk uten tillatelse
US5825877A (en) 1996-06-11 1998-10-20 International Business Machines Corporation Support for portable trusted software
US5841869A (en) 1996-08-23 1998-11-24 Cheyenne Property Trust Method and apparatus for trusted processing
US5917913A (en) 1996-12-04 1999-06-29 Wang; Ynjiun Paul Portable electronic authorization devices and methods therefor
US5933640A (en) * 1997-02-26 1999-08-03 Digital Equipment Corporation Method for analyzing and presenting test execution flows of programs
US6126328A (en) 1997-02-28 2000-10-03 Oracle Corporation Controlled execution of partitioned code
GB2328042B (en) 1997-07-26 2002-10-09 Ibm Smartcard transaction processing
US6117185A (en) * 1997-09-24 2000-09-12 International Business Machines Corporation Skip list data storage during compilation
US6061449A (en) 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
US6038646A (en) 1998-01-23 2000-03-14 Sun Microsystems, Inc. Method and apparatus for enforcing ordered execution of reads and writes across a memory interface
US6205465B1 (en) * 1998-07-22 2001-03-20 Cisco Technology, Inc. Component extensible parallel execution of multiple threads assembled from program components specified with partial inter-component sequence information
US6223287B1 (en) * 1998-07-24 2001-04-24 International Business Machines Corporation Method for establishing a secured communication channel over the internet
FR2792431B1 (fr) * 1999-04-19 2001-07-13 Canon Kk Dispositif et procede pour filtrer et/ou delivrer des paquets de donnees entrants a des applications clientes dans des architectures de communication a acces direct au reseau

Also Published As

Publication number Publication date
EP1305708B1 (en) 2003-06-11
DE60100363D1 (de) 2003-07-17
US6490720B1 (en) 2002-12-03
NO20034816D0 (no) 2003-10-28
DE60100363T2 (de) 2004-05-06
CA2446489A1 (en) 2002-11-21
ATE242892T1 (de) 2003-06-15
EP1305708A1 (en) 2003-05-02
NO20034816L (no) 2004-03-10
PT1305708E (pt) 2003-10-31
WO2002093365A1 (en) 2002-11-21
ES2201038T3 (es) 2004-03-16

Similar Documents

Publication Publication Date Title
DK1305708T3 (da) Rækkefølge-nummereringsmekanisme til at sikre integriteten af eksekveringsrækkefølgen for indbyrdes afhængige smartcard-applikationer
Labrosse Embedded systems building blocks
ES2291278T3 (es) Aparato y metodo para catalogar datos simbolicos para su empleo en analisis de funcionamiento de programas de ordenador.
Lin et al. Benchmark dalvik and native code for android system
US9632761B2 (en) Distribute workload of an application to a graphics processing unit
DE60102305D1 (de) Migration von prozessen unter benutzung einer darstellung dieser prozesse in einer daten-darstellungssprache in einer verteilten rechnerumgebung
CN105975816A (zh) 移动终端下基于虚拟技术的代码保护方法及系统
DE60142152D1 (de) Virtualisierung von E/A-Adapterressourcen
TW200609821A (en) Method of providing patches for software
WO2005055051A3 (en) Determining the possibility of adverse effects arising from a code change
KR920020315A (ko) 병렬프로세서
CN110673851B (zh) 一种智能合约运行方法、装置及电子设备
CN113366474B (zh) 用于通过将计算机程序的控制流表示为数据来混淆计算机程序的系统、方法和存储介质
DE50001510D1 (de) Sicherung eines rechnerkerns gegen äussere manipulationen
SE0103360D0 (sv) Object oriented data processing
SE0200383D0 (sv) A method and a system for a data processor
CN120085566A (zh) 扩展虚拟综合系统元模型的仿真方法及系统、设备、介质
CN108897532B (zh) 一种类工厂注册的方法、装置及电子设备
CN102662845A (zh) 一种实现经过性数据断点的方法、装置及系统
CN101493789B (zh) 一种获取cpu利用率的方法、装置及系统
ATE493705T1 (de) Deterministische regelbasierte verteilung von objekten an objektverarbeitenden code
DK2225693T3 (da) Fremgangsmåde til sikring af en betinget forbindelse, informationsbærer, program og sikret system til denne fremgangsmåde
Reilly et al. Tutorial: parallel computing of simulation models for risk analysis
Kim Assigning priorities for fixed priority preemption threshold scheduling
Schulte et al. Inuring: Live Attacker-Guided Repair