AU2002212279A1 - System for protecting static and dynamic data against unauthorised manipulation - Google Patents

System for protecting static and dynamic data against unauthorised manipulation

Info

Publication number
AU2002212279A1
AU2002212279A1 AU2002212279A AU1227902A AU2002212279A1 AU 2002212279 A1 AU2002212279 A1 AU 2002212279A1 AU 2002212279 A AU2002212279 A AU 2002212279A AU 1227902 A AU1227902 A AU 1227902A AU 2002212279 A1 AU2002212279 A1 AU 2002212279A1
Authority
AU
Australia
Prior art keywords
dynamic
dynamic data
data object
authorization
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002212279A
Inventor
Ben Smeets
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Publication of AU2002212279A1 publication Critical patent/AU2002212279A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

The integrity of a dynamic data object that comprises one or more dynamic data items is ensured by storing the dynamic data object and dynamic authorization data in a memory. The dynamic authorization data may, for example, be a count of how many failed attempts to gain authorization have previously been made, and this is modified at least whenever another failed attempt is made. Whenever the dynamic data object or the dynamic authorization data is changed, its corresponding hash value is recomputed and stored into the memory. The dynamic data object is considered authentic only if newly-generated values of the two hash signatures match those that were previously stored into the memory. Changes to the dynamic data object are permitted only after the user has executed passed an authorization procedure.
AU2002212279A 2000-09-26 2001-09-25 System for protecting static and dynamic data against unauthorised manipulation Abandoned AU2002212279A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US23493500P 2000-09-26 2000-09-26
US60234935 2000-09-26
US09/951,676 US7043636B2 (en) 2000-09-26 2001-09-14 Data integrity mechanisms for static and dynamic data
US09951676 2001-09-14
PCT/EP2001/011042 WO2002027441A1 (en) 2000-09-26 2001-09-25 System for protecting static and dynamic data against unauthorised manipulation

Publications (1)

Publication Number Publication Date
AU2002212279A1 true AU2002212279A1 (en) 2002-04-08

Family

ID=26928409

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002212279A Abandoned AU2002212279A1 (en) 2000-09-26 2001-09-25 System for protecting static and dynamic data against unauthorised manipulation

Country Status (9)

Country Link
US (1) US7043636B2 (en)
EP (1) EP1325401B1 (en)
CN (1) CN1210637C (en)
AT (1) ATE355551T1 (en)
AU (1) AU2002212279A1 (en)
DE (1) DE60126968T2 (en)
ES (1) ES2278793T3 (en)
MY (1) MY127742A (en)
WO (1) WO2002027441A1 (en)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7043636B2 (en) 2000-09-26 2006-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Data integrity mechanisms for static and dynamic data
US20030159047A1 (en) * 2000-09-26 2003-08-21 Telefonaktiebolaget L M Ericsson (Publ) Method of securing and exposing a logotype in an electronic device
JP3980327B2 (en) * 2001-11-01 2007-09-26 富士通株式会社 Tamper detection system, tamper detection method, and program
US20030188180A1 (en) * 2002-03-28 2003-10-02 Overney Gregor T. Secure file verification station for ensuring data integrity
WO2003093961A2 (en) * 2002-05-02 2003-11-13 Shieldip, Inc. Method and apparatus for protecting information and privacy
GB0212318D0 (en) * 2002-05-28 2002-07-10 Symbian Ltd Tamper evident removable media storing executable code
US7296156B2 (en) * 2002-06-20 2007-11-13 International Business Machines Corporation System and method for SMS authentication
US20040003265A1 (en) * 2002-06-26 2004-01-01 International Business Machines Corporation Secure method for BIOS flash data update
WO2004006071A1 (en) * 2002-07-02 2004-01-15 Telefonaktiebolaget Lm Ericsson (Publ) Method of securing and exposing a logotype in an electronic device
US7877607B2 (en) * 2002-08-30 2011-01-25 Hewlett-Packard Development Company, L.P. Tamper-evident data management
JP2004302921A (en) * 2003-03-31 2004-10-28 Toshiba Corp Device authenticating apparatus using off-line information and device authenticating method
JP4036838B2 (en) * 2004-03-12 2008-01-23 インターナショナル・ビジネス・マシーンズ・コーポレーション Security device, information processing device, method executed by security device, method executed by information processing device, program executable for executing the method, and ticket system
US7287159B2 (en) * 2004-04-01 2007-10-23 Shieldip, Inc. Detection and identification methods for software
JP4783112B2 (en) * 2005-10-11 2011-09-28 株式会社日立製作所 Signature history storage device
US7681050B2 (en) * 2005-12-01 2010-03-16 Telefonaktiebolaget L M Ericsson (Publ) Secure and replay protected memory storage
US8356178B2 (en) * 2006-11-13 2013-01-15 Seagate Technology Llc Method and apparatus for authenticated data storage
US20080134321A1 (en) * 2006-12-05 2008-06-05 Priya Rajagopal Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates
TWI402715B (en) * 2007-03-23 2013-07-21 Via Tech Inc Application protection systems and methods
US8209550B2 (en) * 2007-04-20 2012-06-26 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for protecting SIMLock information in an electronic device
US9497028B1 (en) 2007-05-03 2016-11-15 Google Inc. System and method for remote storage auditing
US10248483B2 (en) * 2007-10-19 2019-04-02 Oracle International Corporation Data recovery advisor
EP2071898A1 (en) * 2007-12-10 2009-06-17 Telefonaktiebolaget LM Ericsson (publ) Method for alteration of integrity protected data in a device, computer program product and device implementing the method
US20090193265A1 (en) * 2008-01-25 2009-07-30 Sony Ericsson Mobile Communications Ab Fast database integrity protection apparatus and method
FR2930065A1 (en) * 2008-04-11 2009-10-16 Thales Sa Smart card data securing method for computer ticketing system, involves decrypting encrypted seal variable, disassembling variable for obtaining seals corresponding to data, and verifying coherence of each seal with corresponding data
US9559868B2 (en) 2011-04-01 2017-01-31 Onavo Mobile Ltd. Apparatus and methods for bandwidth saving and on-demand data delivery for a mobile device
US9348790B2 (en) * 2011-04-01 2016-05-24 Facebook, Inc. Method for efficient use of content stored in a cache memory of a mobile device
US20140173294A1 (en) * 2012-12-14 2014-06-19 Broadcom Corporation Techniques for emulating an eeprom device
US20150292985A1 (en) * 2014-04-11 2015-10-15 Stride Tool, Inc. Smart hvac manifold system
US9690922B2 (en) * 2014-07-28 2017-06-27 Avago Technologies General Ip (Singapore) Pte. Ltd. System, apparatus, and method for anti-replay protection of data stored in a non-volatile memory device
US10015015B1 (en) * 2014-09-30 2018-07-03 EMC IP Holding Company LLC Method and apparatus for verifying system log integrity
US10223294B2 (en) * 2015-09-01 2019-03-05 Nxp Usa, Inc. Fast secure boot from embedded flash memory
CN108234491B (en) * 2018-01-02 2021-01-01 武汉斗鱼网络科技有限公司 Protocol association verification method and device and electronic equipment
US10693641B2 (en) * 2018-01-12 2020-06-23 Blackberry Limited Secure container based protection of password accessible master encryption keys
WO2020118639A1 (en) * 2018-12-13 2020-06-18 深圳市大疆软件科技有限公司 Unmanned aerial vehicle and firmware upgrade method thereof
US11907402B1 (en) 2021-04-28 2024-02-20 Wells Fargo Bank, N.A. Computer-implemented methods, apparatuses, and computer program products for frequency based operations

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4748668A (en) 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
US5442645A (en) 1989-06-06 1995-08-15 Bull Cp8 Method for checking the integrity of a program or data, and apparatus for implementing this method
AU6151090A (en) * 1989-08-01 1991-03-11 Silicon Graphics, Inc. File alteration monitor for computer operating and file management systems
US5050212A (en) * 1990-06-20 1991-09-17 Apple Computer, Inc. Method and apparatus for verifying the integrity of a file stored separately from a computer
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5606315A (en) 1994-12-12 1997-02-25 Delco Electronics Corp. Security method for protecting electronically stored data
US5689565A (en) 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application
EP0753816A1 (en) 1995-07-07 1997-01-15 Thomson Consumer Electronics, Inc. A method and apparatus for storing sensitive information securely in a relatively insecure storage medium
US5933851A (en) * 1995-09-29 1999-08-03 Sony Corporation Time-stamp and hash-based file modification monitor with multi-user notification and method thereof
US6467085B2 (en) 1995-10-17 2002-10-15 Telefonaktiebolaget L M Ericsson (Publ) System and method for reducing coupling in an object-oriented programming environment
US5774545A (en) 1996-03-28 1998-06-30 Lucent Technologies Inc. Method and apparatus for enhancing security in and discouraging theft of VLSI and ULSI devices
US5802592A (en) 1996-05-31 1998-09-01 International Business Machines Corporation System and method for protecting integrity of alterable ROM using digital signatures
US6026293A (en) 1996-09-05 2000-02-15 Ericsson Inc. System for preventing electronic memory tampering
WO1998019239A1 (en) 1996-10-25 1998-05-07 Raytheon Systems Canada Ltd. Distributed virtual software interface or machine
US5949882A (en) 1996-12-13 1999-09-07 Compaq Computer Corporation Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
AUPO704097A0 (en) 1997-05-29 1997-06-19 Griffits, John Philip Priority display of advertising on a personal computer
US5919257A (en) 1997-08-08 1999-07-06 Novell, Inc. Networked workstation intrusion detection system
EP1040678B1 (en) 1997-12-12 2005-10-26 Alcatel USA Sourcing, L.P. Network management
US6098079A (en) * 1998-04-02 2000-08-01 Mitsubishi Electric Information Technology Center America, Inc. (Ita) File version reconciliation using hash codes
US6285985B1 (en) 1998-04-03 2001-09-04 Preview Systems, Inc. Advertising-subsidized and advertising-enabled software
US6808111B2 (en) 1998-08-06 2004-10-26 Visa International Service Association Terminal software architecture for use with smart cards
US6463535B1 (en) 1998-10-05 2002-10-08 Intel Corporation System and method for verifying the integrity and authorization of software before execution in a local platform
WO2000062140A2 (en) 1999-04-12 2000-10-19 Silanis Technology Inc. Secure electronic document creation, approval and distribution method in an open and distributed network environment
US6373498B1 (en) 1999-06-18 2002-04-16 Phoenix Technologies Ltd. Displaying images during boot-up and shutdown
KR20000030060A (en) 1999-06-23 2000-06-05 주진용 The advertising method using application softwares
US6467086B1 (en) 1999-07-20 2002-10-15 Xerox Corporation Aspect-oriented programming
GB2365184B (en) 1999-08-21 2004-06-16 Kent Ridge Digital Labs Legitimacy protection of electronic document and a printed copy thereof
EP1250643A2 (en) 1999-08-23 2002-10-23 Koninklijke Philips Electronics N.V. Generic interface for a software module
US6317659B1 (en) 1999-12-09 2001-11-13 Honeywell International Inc. Layered subsystem architecture for a flight management system
CA2403733C (en) 2000-03-20 2010-11-09 At&T Corp. Method for dynamically displaying brand information in a user interface
GB0011954D0 (en) 2000-05-17 2000-07-05 Univ Surrey Protocol stacks
US7139709B2 (en) 2000-07-20 2006-11-21 Microsoft Corporation Middleware layer between speech related applications and engines
US7043636B2 (en) 2000-09-26 2006-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Data integrity mechanisms for static and dynamic data
TW548535B (en) 2000-10-17 2003-08-21 Ericsson Telefon Ab L M Security system
EP2317432A1 (en) 2000-10-26 2011-05-04 Microsoft Development Center Copenhagen ApS A system and method supporting configurable object definitions
US7536181B2 (en) 2002-02-15 2009-05-19 Telefonaktiebolaget L M Ericsson (Publ) Platform system for mobile terminals
US7415270B2 (en) 2002-02-15 2008-08-19 Telefonaktiebolaget L M Ericsson (Publ) Middleware services layer for platform system for mobile terminals

Also Published As

Publication number Publication date
CN1210637C (en) 2005-07-13
DE60126968D1 (en) 2007-04-12
WO2002027441A1 (en) 2002-04-04
EP1325401B1 (en) 2007-02-28
EP1325401A1 (en) 2003-07-09
ES2278793T3 (en) 2007-08-16
MY127742A (en) 2006-12-29
US20020038429A1 (en) 2002-03-28
CN1466710A (en) 2004-01-07
DE60126968T2 (en) 2007-07-05
US7043636B2 (en) 2006-05-09
ATE355551T1 (en) 2006-03-15

Similar Documents

Publication Publication Date Title
AU2002212279A1 (en) System for protecting static and dynamic data against unauthorised manipulation
WO2005006109A3 (en) System and method for authenticating software using hidden intermediate keys
WO2007068519A3 (en) Method and systems using radio frequency identifier tags for comparing and authenticating items
WO2001086396A3 (en) Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
WO2003005172A3 (en) Firmware validation
CA2400222A1 (en) Unauthorised modification of values stored in flash memory
WO2004099947A3 (en) Memory protection systems and methods for writable memory
US20050076226A1 (en) Computing device that securely runs authorized software
EP2284758A3 (en) Versatile content control with partitioning
WO2006116871A3 (en) Retrofitting authentication onto firmware
MXPA05007150A (en) Policy engine and methods and systems for protecting data.
HK1019209A1 (en) Networked computer game system with persistent playing objects.
WO2007008807A3 (en) Secure local storage of files
WO2001075563A3 (en) Generating a key hierarchy for use in an isolated execution environment
CA2367778A1 (en) Secure content objects
WO2007106567A3 (en) Protecting the integrity of electronically derivative works
TW200514408A (en) System and method for authenticating software using protected master key
WO2002025410A3 (en) Protect by data chunk address as encryption key
WO2007041064A3 (en) Reliably storing information across multiple computers
WO2005043396A3 (en) Word-individual key generation
CA2541639A1 (en) System and method for application authorization
WO2002001329A3 (en) Method and system for limiting the use of user-specific software features
HUP0102397A2 (en) Method for electronic transmission, storage and retrieval of authenticated documents
WO2000059177A8 (en) Server computer for guaranteeing files integrity
CA2288892A1 (en) Method for preventing buffer deadlock in dataflow computations