AU2002212279A1 - System for protecting static and dynamic data against unauthorised manipulation - Google Patents
System for protecting static and dynamic data against unauthorised manipulationInfo
- Publication number
- AU2002212279A1 AU2002212279A1 AU2002212279A AU1227902A AU2002212279A1 AU 2002212279 A1 AU2002212279 A1 AU 2002212279A1 AU 2002212279 A AU2002212279 A AU 2002212279A AU 1227902 A AU1227902 A AU 1227902A AU 2002212279 A1 AU2002212279 A1 AU 2002212279A1
- Authority
- AU
- Australia
- Prior art keywords
- dynamic
- dynamic data
- data object
- authorization
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Abstract
The integrity of a dynamic data object that comprises one or more dynamic data items is ensured by storing the dynamic data object and dynamic authorization data in a memory. The dynamic authorization data may, for example, be a count of how many failed attempts to gain authorization have previously been made, and this is modified at least whenever another failed attempt is made. Whenever the dynamic data object or the dynamic authorization data is changed, its corresponding hash value is recomputed and stored into the memory. The dynamic data object is considered authentic only if newly-generated values of the two hash signatures match those that were previously stored into the memory. Changes to the dynamic data object are permitted only after the user has executed passed an authorization procedure.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US23493500P | 2000-09-26 | 2000-09-26 | |
US60234935 | 2000-09-26 | ||
US09/951,676 US7043636B2 (en) | 2000-09-26 | 2001-09-14 | Data integrity mechanisms for static and dynamic data |
US09951676 | 2001-09-14 | ||
PCT/EP2001/011042 WO2002027441A1 (en) | 2000-09-26 | 2001-09-25 | System for protecting static and dynamic data against unauthorised manipulation |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002212279A1 true AU2002212279A1 (en) | 2002-04-08 |
Family
ID=26928409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002212279A Abandoned AU2002212279A1 (en) | 2000-09-26 | 2001-09-25 | System for protecting static and dynamic data against unauthorised manipulation |
Country Status (9)
Country | Link |
---|---|
US (1) | US7043636B2 (en) |
EP (1) | EP1325401B1 (en) |
CN (1) | CN1210637C (en) |
AT (1) | ATE355551T1 (en) |
AU (1) | AU2002212279A1 (en) |
DE (1) | DE60126968T2 (en) |
ES (1) | ES2278793T3 (en) |
MY (1) | MY127742A (en) |
WO (1) | WO2002027441A1 (en) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7043636B2 (en) | 2000-09-26 | 2006-05-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Data integrity mechanisms for static and dynamic data |
US20030159047A1 (en) * | 2000-09-26 | 2003-08-21 | Telefonaktiebolaget L M Ericsson (Publ) | Method of securing and exposing a logotype in an electronic device |
JP3980327B2 (en) * | 2001-11-01 | 2007-09-26 | 富士通株式会社 | Tamper detection system, tamper detection method, and program |
US20030188180A1 (en) * | 2002-03-28 | 2003-10-02 | Overney Gregor T. | Secure file verification station for ensuring data integrity |
WO2003093961A2 (en) * | 2002-05-02 | 2003-11-13 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
GB0212318D0 (en) * | 2002-05-28 | 2002-07-10 | Symbian Ltd | Tamper evident removable media storing executable code |
US7296156B2 (en) * | 2002-06-20 | 2007-11-13 | International Business Machines Corporation | System and method for SMS authentication |
US20040003265A1 (en) * | 2002-06-26 | 2004-01-01 | International Business Machines Corporation | Secure method for BIOS flash data update |
WO2004006071A1 (en) * | 2002-07-02 | 2004-01-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of securing and exposing a logotype in an electronic device |
US7877607B2 (en) * | 2002-08-30 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Tamper-evident data management |
JP2004302921A (en) * | 2003-03-31 | 2004-10-28 | Toshiba Corp | Device authenticating apparatus using off-line information and device authenticating method |
JP4036838B2 (en) * | 2004-03-12 | 2008-01-23 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Security device, information processing device, method executed by security device, method executed by information processing device, program executable for executing the method, and ticket system |
US7287159B2 (en) * | 2004-04-01 | 2007-10-23 | Shieldip, Inc. | Detection and identification methods for software |
JP4783112B2 (en) * | 2005-10-11 | 2011-09-28 | 株式会社日立製作所 | Signature history storage device |
US7681050B2 (en) * | 2005-12-01 | 2010-03-16 | Telefonaktiebolaget L M Ericsson (Publ) | Secure and replay protected memory storage |
US8356178B2 (en) * | 2006-11-13 | 2013-01-15 | Seagate Technology Llc | Method and apparatus for authenticated data storage |
US20080134321A1 (en) * | 2006-12-05 | 2008-06-05 | Priya Rajagopal | Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates |
TWI402715B (en) * | 2007-03-23 | 2013-07-21 | Via Tech Inc | Application protection systems and methods |
US8209550B2 (en) * | 2007-04-20 | 2012-06-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for protecting SIMLock information in an electronic device |
US9497028B1 (en) | 2007-05-03 | 2016-11-15 | Google Inc. | System and method for remote storage auditing |
US10248483B2 (en) * | 2007-10-19 | 2019-04-02 | Oracle International Corporation | Data recovery advisor |
EP2071898A1 (en) * | 2007-12-10 | 2009-06-17 | Telefonaktiebolaget LM Ericsson (publ) | Method for alteration of integrity protected data in a device, computer program product and device implementing the method |
US20090193265A1 (en) * | 2008-01-25 | 2009-07-30 | Sony Ericsson Mobile Communications Ab | Fast database integrity protection apparatus and method |
FR2930065A1 (en) * | 2008-04-11 | 2009-10-16 | Thales Sa | Smart card data securing method for computer ticketing system, involves decrypting encrypted seal variable, disassembling variable for obtaining seals corresponding to data, and verifying coherence of each seal with corresponding data |
US9559868B2 (en) | 2011-04-01 | 2017-01-31 | Onavo Mobile Ltd. | Apparatus and methods for bandwidth saving and on-demand data delivery for a mobile device |
US9348790B2 (en) * | 2011-04-01 | 2016-05-24 | Facebook, Inc. | Method for efficient use of content stored in a cache memory of a mobile device |
US20140173294A1 (en) * | 2012-12-14 | 2014-06-19 | Broadcom Corporation | Techniques for emulating an eeprom device |
US20150292985A1 (en) * | 2014-04-11 | 2015-10-15 | Stride Tool, Inc. | Smart hvac manifold system |
US9690922B2 (en) * | 2014-07-28 | 2017-06-27 | Avago Technologies General Ip (Singapore) Pte. Ltd. | System, apparatus, and method for anti-replay protection of data stored in a non-volatile memory device |
US10015015B1 (en) * | 2014-09-30 | 2018-07-03 | EMC IP Holding Company LLC | Method and apparatus for verifying system log integrity |
US10223294B2 (en) * | 2015-09-01 | 2019-03-05 | Nxp Usa, Inc. | Fast secure boot from embedded flash memory |
CN108234491B (en) * | 2018-01-02 | 2021-01-01 | 武汉斗鱼网络科技有限公司 | Protocol association verification method and device and electronic equipment |
US10693641B2 (en) * | 2018-01-12 | 2020-06-23 | Blackberry Limited | Secure container based protection of password accessible master encryption keys |
WO2020118639A1 (en) * | 2018-12-13 | 2020-06-18 | 深圳市大疆软件科技有限公司 | Unmanned aerial vehicle and firmware upgrade method thereof |
US11907402B1 (en) | 2021-04-28 | 2024-02-20 | Wells Fargo Bank, N.A. | Computer-implemented methods, apparatuses, and computer program products for frequency based operations |
Family Cites Families (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4748668A (en) | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
US5442645A (en) | 1989-06-06 | 1995-08-15 | Bull Cp8 | Method for checking the integrity of a program or data, and apparatus for implementing this method |
AU6151090A (en) * | 1989-08-01 | 1991-03-11 | Silicon Graphics, Inc. | File alteration monitor for computer operating and file management systems |
US5050212A (en) * | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5606315A (en) | 1994-12-12 | 1997-02-25 | Delco Electronics Corp. | Security method for protecting electronically stored data |
US5689565A (en) | 1995-06-29 | 1997-11-18 | Microsoft Corporation | Cryptography system and method for providing cryptographic services for a computer application |
EP0753816A1 (en) | 1995-07-07 | 1997-01-15 | Thomson Consumer Electronics, Inc. | A method and apparatus for storing sensitive information securely in a relatively insecure storage medium |
US5933851A (en) * | 1995-09-29 | 1999-08-03 | Sony Corporation | Time-stamp and hash-based file modification monitor with multi-user notification and method thereof |
US6467085B2 (en) | 1995-10-17 | 2002-10-15 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for reducing coupling in an object-oriented programming environment |
US5774545A (en) | 1996-03-28 | 1998-06-30 | Lucent Technologies Inc. | Method and apparatus for enhancing security in and discouraging theft of VLSI and ULSI devices |
US5802592A (en) | 1996-05-31 | 1998-09-01 | International Business Machines Corporation | System and method for protecting integrity of alterable ROM using digital signatures |
US6026293A (en) | 1996-09-05 | 2000-02-15 | Ericsson Inc. | System for preventing electronic memory tampering |
WO1998019239A1 (en) | 1996-10-25 | 1998-05-07 | Raytheon Systems Canada Ltd. | Distributed virtual software interface or machine |
US5949882A (en) | 1996-12-13 | 1999-09-07 | Compaq Computer Corporation | Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm |
AUPO704097A0 (en) | 1997-05-29 | 1997-06-19 | Griffits, John Philip | Priority display of advertising on a personal computer |
US5919257A (en) | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system |
EP1040678B1 (en) | 1997-12-12 | 2005-10-26 | Alcatel USA Sourcing, L.P. | Network management |
US6098079A (en) * | 1998-04-02 | 2000-08-01 | Mitsubishi Electric Information Technology Center America, Inc. (Ita) | File version reconciliation using hash codes |
US6285985B1 (en) | 1998-04-03 | 2001-09-04 | Preview Systems, Inc. | Advertising-subsidized and advertising-enabled software |
US6808111B2 (en) | 1998-08-06 | 2004-10-26 | Visa International Service Association | Terminal software architecture for use with smart cards |
US6463535B1 (en) | 1998-10-05 | 2002-10-08 | Intel Corporation | System and method for verifying the integrity and authorization of software before execution in a local platform |
WO2000062140A2 (en) | 1999-04-12 | 2000-10-19 | Silanis Technology Inc. | Secure electronic document creation, approval and distribution method in an open and distributed network environment |
US6373498B1 (en) | 1999-06-18 | 2002-04-16 | Phoenix Technologies Ltd. | Displaying images during boot-up and shutdown |
KR20000030060A (en) | 1999-06-23 | 2000-06-05 | 주진용 | The advertising method using application softwares |
US6467086B1 (en) | 1999-07-20 | 2002-10-15 | Xerox Corporation | Aspect-oriented programming |
GB2365184B (en) | 1999-08-21 | 2004-06-16 | Kent Ridge Digital Labs | Legitimacy protection of electronic document and a printed copy thereof |
EP1250643A2 (en) | 1999-08-23 | 2002-10-23 | Koninklijke Philips Electronics N.V. | Generic interface for a software module |
US6317659B1 (en) | 1999-12-09 | 2001-11-13 | Honeywell International Inc. | Layered subsystem architecture for a flight management system |
CA2403733C (en) | 2000-03-20 | 2010-11-09 | At&T Corp. | Method for dynamically displaying brand information in a user interface |
GB0011954D0 (en) | 2000-05-17 | 2000-07-05 | Univ Surrey | Protocol stacks |
US7139709B2 (en) | 2000-07-20 | 2006-11-21 | Microsoft Corporation | Middleware layer between speech related applications and engines |
US7043636B2 (en) | 2000-09-26 | 2006-05-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Data integrity mechanisms for static and dynamic data |
TW548535B (en) | 2000-10-17 | 2003-08-21 | Ericsson Telefon Ab L M | Security system |
EP2317432A1 (en) | 2000-10-26 | 2011-05-04 | Microsoft Development Center Copenhagen ApS | A system and method supporting configurable object definitions |
US7536181B2 (en) | 2002-02-15 | 2009-05-19 | Telefonaktiebolaget L M Ericsson (Publ) | Platform system for mobile terminals |
US7415270B2 (en) | 2002-02-15 | 2008-08-19 | Telefonaktiebolaget L M Ericsson (Publ) | Middleware services layer for platform system for mobile terminals |
-
2001
- 2001-09-14 US US09/951,676 patent/US7043636B2/en not_active Expired - Lifetime
- 2001-09-25 EP EP01980433A patent/EP1325401B1/en not_active Expired - Lifetime
- 2001-09-25 MY MYPI20014473A patent/MY127742A/en unknown
- 2001-09-25 AT AT01980433T patent/ATE355551T1/en not_active IP Right Cessation
- 2001-09-25 WO PCT/EP2001/011042 patent/WO2002027441A1/en active IP Right Grant
- 2001-09-25 DE DE60126968T patent/DE60126968T2/en not_active Expired - Lifetime
- 2001-09-25 AU AU2002212279A patent/AU2002212279A1/en not_active Abandoned
- 2001-09-25 CN CNB018162185A patent/CN1210637C/en not_active Expired - Lifetime
- 2001-09-25 ES ES01980433T patent/ES2278793T3/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
CN1210637C (en) | 2005-07-13 |
DE60126968D1 (en) | 2007-04-12 |
WO2002027441A1 (en) | 2002-04-04 |
EP1325401B1 (en) | 2007-02-28 |
EP1325401A1 (en) | 2003-07-09 |
ES2278793T3 (en) | 2007-08-16 |
MY127742A (en) | 2006-12-29 |
US20020038429A1 (en) | 2002-03-28 |
CN1466710A (en) | 2004-01-07 |
DE60126968T2 (en) | 2007-07-05 |
US7043636B2 (en) | 2006-05-09 |
ATE355551T1 (en) | 2006-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2002212279A1 (en) | System for protecting static and dynamic data against unauthorised manipulation | |
WO2005006109A3 (en) | System and method for authenticating software using hidden intermediate keys | |
WO2007068519A3 (en) | Method and systems using radio frequency identifier tags for comparing and authenticating items | |
WO2001086396A3 (en) | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |
WO2003005172A3 (en) | Firmware validation | |
CA2400222A1 (en) | Unauthorised modification of values stored in flash memory | |
WO2004099947A3 (en) | Memory protection systems and methods for writable memory | |
US20050076226A1 (en) | Computing device that securely runs authorized software | |
EP2284758A3 (en) | Versatile content control with partitioning | |
WO2006116871A3 (en) | Retrofitting authentication onto firmware | |
MXPA05007150A (en) | Policy engine and methods and systems for protecting data. | |
HK1019209A1 (en) | Networked computer game system with persistent playing objects. | |
WO2007008807A3 (en) | Secure local storage of files | |
WO2001075563A3 (en) | Generating a key hierarchy for use in an isolated execution environment | |
CA2367778A1 (en) | Secure content objects | |
WO2007106567A3 (en) | Protecting the integrity of electronically derivative works | |
TW200514408A (en) | System and method for authenticating software using protected master key | |
WO2002025410A3 (en) | Protect by data chunk address as encryption key | |
WO2007041064A3 (en) | Reliably storing information across multiple computers | |
WO2005043396A3 (en) | Word-individual key generation | |
CA2541639A1 (en) | System and method for application authorization | |
WO2002001329A3 (en) | Method and system for limiting the use of user-specific software features | |
HUP0102397A2 (en) | Method for electronic transmission, storage and retrieval of authenticated documents | |
WO2000059177A8 (en) | Server computer for guaranteeing files integrity | |
CA2288892A1 (en) | Method for preventing buffer deadlock in dataflow computations |