ATE235082T1 - Sicherung eines rechnerkerns gegen äussere manipulationen - Google Patents

Sicherung eines rechnerkerns gegen äussere manipulationen

Info

Publication number
ATE235082T1
ATE235082T1 AT00926991T AT00926991T ATE235082T1 AT E235082 T1 ATE235082 T1 AT E235082T1 AT 00926991 T AT00926991 T AT 00926991T AT 00926991 T AT00926991 T AT 00926991T AT E235082 T1 ATE235082 T1 AT E235082T1
Authority
AT
Austria
Prior art keywords
check sum
securing
against external
cpu
compared
Prior art date
Application number
AT00926991T
Other languages
German (de)
English (en)
Inventor
Michael Baldischweiler
Original Assignee
Giesecke & Devrient Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke & Devrient Gmbh filed Critical Giesecke & Devrient Gmbh
Application granted granted Critical
Publication of ATE235082T1 publication Critical patent/ATE235082T1/de

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Detection And Correction Of Errors (AREA)
  • Executing Machine-Instructions (AREA)
  • Hardware Redundancy (AREA)
  • Information Transfer Systems (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
  • Saccharide Compounds (AREA)
AT00926991T 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen ATE235082T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19918620A DE19918620A1 (de) 1999-04-23 1999-04-23 Sicherung eines Rechnerkerns gegen äußere Manipulationen
PCT/EP2000/003530 WO2000065442A1 (de) 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen

Publications (1)

Publication Number Publication Date
ATE235082T1 true ATE235082T1 (de) 2003-04-15

Family

ID=7905707

Family Applications (1)

Application Number Title Priority Date Filing Date
AT00926991T ATE235082T1 (de) 1999-04-23 2000-04-19 Sicherung eines rechnerkerns gegen äussere manipulationen

Country Status (10)

Country Link
US (1) US6959391B1 (enExample)
EP (1) EP1190319B1 (enExample)
JP (1) JP4693245B2 (enExample)
CN (1) CN1173264C (enExample)
AT (1) ATE235082T1 (enExample)
AU (1) AU4552600A (enExample)
DE (2) DE19918620A1 (enExample)
ES (1) ES2190966T3 (enExample)
RU (1) RU2249247C2 (enExample)
WO (1) WO2000065442A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327048A1 (en) * 2000-11-28 2002-05-28 Olivier Benoit Method for verifying data integrity in electronic device data processing
DE10105987A1 (de) 2001-02-09 2002-08-29 Infineon Technologies Ag Datenverarbeitungsvorrichtung
DE10122505A1 (de) * 2001-05-10 2002-11-14 Giesecke & Devrient Gmbh Verfahren zum Schützen eines Rechners gegen Manipulation von Registerinhalten und Rechner zum Durchführen des Verfahrens
US7363547B2 (en) * 2003-07-09 2008-04-22 Stmicroeletronics S.A. Error-detection cell for an integrated processor
RU2265241C2 (ru) * 2004-01-20 2005-11-27 Ардашев Дмитрий Васильевич Способ вызова процедуры на основе двойного стека
DE102004021088A1 (de) * 2004-04-29 2005-11-17 Giesecke & Devrient Gmbh Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe
KR20060067584A (ko) * 2004-12-15 2006-06-20 삼성전자주식회사 해킹 방지 기능이 있는 스마트 카드
DE102005016801B4 (de) * 2005-04-12 2018-04-26 Robert Bosch Gmbh Verfahren und Rechnereinheit zur Fehlererkennung und Fehlerprotokollierung in einem Speicher
DE102006037810A1 (de) 2006-08-11 2008-02-14 Giesecke & Devrient Gmbh Sichere Programmcodeausführung
US20090187507A1 (en) * 2006-12-20 2009-07-23 Brown Kerry D Secure financial transaction network
US8549260B2 (en) * 2009-01-29 2013-10-01 Infineon Technologies Ag Apparatus for processing data and method for generating manipulated and re-manipulated configuration data for processor
EP2262259A1 (en) 2009-06-08 2010-12-15 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
CN105117298A (zh) * 2015-08-10 2015-12-02 中颖电子股份有限公司 一种用于显屏驱动芯片的静电释放保护系统以及方法
US11386234B2 (en) * 2019-12-17 2022-07-12 Nuvoton Technology Corporation Security systems and methods for integrated circuits

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device
DE3644248A1 (de) * 1986-12-23 1988-07-07 Siemens Ag Verfahren zur ueberwachung des programmlaufs eines mikroprozessors
JPH03124278A (ja) * 1989-10-04 1991-05-27 Fukoku:Kk 超音波モータ
JPH052654A (ja) * 1991-06-25 1993-01-08 Nissan Motor Co Ltd マイクロコンピユータの故障検知方法および回路
JP3013868B2 (ja) * 1992-09-02 2000-02-28 船井電機株式会社 コードレス電話におけるメモリ揮発防止システム
RU2067313C1 (ru) * 1995-03-29 1996-09-27 Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм
DE19610976A1 (de) * 1995-04-05 1996-10-17 Siemens Ag Verfahren zum Erkennen von Computerviren
WO1997004394A1 (en) * 1995-07-14 1997-02-06 Christopher Nathan Drake Computer software authentication, protection, and security system

Also Published As

Publication number Publication date
JP4693245B2 (ja) 2011-06-01
US6959391B1 (en) 2005-10-25
RU2249247C2 (ru) 2005-03-27
DE50001510D1 (de) 2003-04-24
CN1348562A (zh) 2002-05-08
DE19918620A1 (de) 2000-10-26
EP1190319A1 (de) 2002-03-27
ES2190966T3 (es) 2003-09-01
JP2002543492A (ja) 2002-12-17
EP1190319B1 (de) 2003-03-19
CN1173264C (zh) 2004-10-27
AU4552600A (en) 2000-11-10
WO2000065442A1 (de) 2000-11-02

Similar Documents

Publication Publication Date Title
ATE235082T1 (de) Sicherung eines rechnerkerns gegen äussere manipulationen
US12001842B2 (en) Hardware apparatuses and methods to switch shadow stack pointers
TWI781588B (zh) 包含用於控制流向終止的模式特定結束分支之設備、系統及方法
DE602006014596D1 (de) Softwaregestützte verschachtelte hardware-transaktionen
WO2007118154A3 (en) System and method for checking the integrity of computer program code
US20200050471A1 (en) Detecting bus locking conditions and avoiding bus locks
US20170024559A1 (en) Marking valid return targets
TWI332158B (en) Method, computer program product, and system for excuting a message authentication code instruction in a computer system
US20230259605A1 (en) Authentication code generation/checking instructions
EP3948548A1 (en) Processor having multiple operating modes
US7996651B2 (en) Enhanced microprocessor or microcontroller
WO2000023875A1 (en) System with wide operand architecture, and method
NO20034816L (no) Mekanisme for sekvens-nummerering, for sikring av integritet for eksekveringsrekkefolge ved innbyrdes avhengige anvendelser av smartkort
TW200508967A (en) Method and data processor with reduced stalling due to operand dependencies
ES2389894T3 (es) Equipo de extracción de tiempo de CPU
US20050278507A1 (en) Long displacement instruction formats
US20250258673A1 (en) Hardware Verification of Dynamically Generated Code
TWI313433B (en) Method for operating digital system including graphics display and digital system thereof
JPH0454638A (ja) 電子計算機
EP4246316B1 (en) Cryptographic enforcement of borrow checking across groups of pointers
US12008374B2 (en) Cryptographic enforcement of borrow checking
Wang Models of Embedded Systems
JPH0192840A (ja) データ処理装置
Chu et al. A top-down parsing co-processor for compilation
Zhang et al. ZtCore: Zero-waste tiny core for real-time control within FPGA

Legal Events

Date Code Title Description
REN Ceased due to non-payment of the annual fee