ATE305683T1 - Verfahren zur sicheren verteilung von software - Google Patents

Verfahren zur sicheren verteilung von software

Info

Publication number
ATE305683T1
ATE305683T1 AT99920709T AT99920709T ATE305683T1 AT E305683 T1 ATE305683 T1 AT E305683T1 AT 99920709 T AT99920709 T AT 99920709T AT 99920709 T AT99920709 T AT 99920709T AT E305683 T1 ATE305683 T1 AT E305683T1
Authority
AT
Austria
Prior art keywords
data
multiplication
secure distribution
software
programs
Prior art date
Application number
AT99920709T
Other languages
German (de)
English (en)
Inventor
Martin Seysen
Original Assignee
Giesecke & Devrient Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke & Devrient Gmbh filed Critical Giesecke & Devrient Gmbh
Application granted granted Critical
Publication of ATE305683T1 publication Critical patent/ATE305683T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)
AT99920709T 1998-05-08 1999-04-19 Verfahren zur sicheren verteilung von software ATE305683T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19820605A DE19820605A1 (de) 1998-05-08 1998-05-08 Verfahren zur sicheren Verteilung von Software
PCT/EP1999/002630 WO1999059287A1 (de) 1998-05-08 1999-04-19 Verfahren zur sicheren verteilung von software

Publications (1)

Publication Number Publication Date
ATE305683T1 true ATE305683T1 (de) 2005-10-15

Family

ID=7867089

Family Applications (1)

Application Number Title Priority Date Filing Date
AT99920709T ATE305683T1 (de) 1998-05-08 1999-04-19 Verfahren zur sicheren verteilung von software

Country Status (6)

Country Link
US (1) US6405923B1 (enExample)
EP (1) EP1080559B1 (enExample)
JP (1) JP4708565B2 (enExample)
AT (1) ATE305683T1 (enExample)
DE (2) DE19820605A1 (enExample)
WO (1) WO1999059287A1 (enExample)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1010616C2 (nl) * 1998-11-20 2000-05-23 Ptt Post Holdings Bv Werkwijze en inrichtingen voor het afdrukken van een frankeerkenmerk op een document.
US6681212B1 (en) 1999-04-23 2004-01-20 Nianning Zeng Internet-based automated system and a method for software copyright protection and sales
DE10008973B4 (de) * 2000-02-25 2004-10-07 Bayerische Motoren Werke Ag Autorisierungsverfahren mit Zertifikat
DE10140721A1 (de) 2001-08-27 2003-03-20 Bayerische Motoren Werke Ag Verfahren zur Bereitstellung von Software zur Verwendung durch ein Steuergerät eines Fahrzeugs
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
US20060242406A1 (en) 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US8176564B2 (en) 2004-11-15 2012-05-08 Microsoft Corporation Special PC mode entered upon detection of undesired state
US7694153B2 (en) * 2004-11-15 2010-04-06 Microsoft Corporation Changing product behavior in accordance with license
FR2880149B1 (fr) * 2004-12-23 2007-03-30 Oberthur Card Syst Sa Procede de traitement de donnees et dispositif associe
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8353046B2 (en) 2005-06-08 2013-01-08 Microsoft Corporation System and method for delivery of a modular operating system
US20100332576A1 (en) * 2007-09-10 2010-12-30 Electronics And Telecommunications Research Institute Apparatus and method of calculating square root in finite extension field
DE102012005427A1 (de) * 2012-03-16 2013-09-19 Giesecke & Devrient Gmbh Verfahren und System zur gesicherten Kommunikation zwischen einen RFID-Tag und einem Lesegerät

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3619566A1 (de) * 1986-06-11 1987-12-17 Omikron Systemhaus Gesellschft Verfahren und system zur datenuebertragung
DE3822540A1 (de) * 1988-07-04 1990-01-11 Deutsche Bundespost Anordnung zum ueberpruefen und zum beeinflussen von datenaustauschvorgaengen zwischen einer chip-karte und einem datenendgeraet
IL101623A (en) * 1992-04-16 1997-06-10 Fortress U & T 2000 Ltd Digital signature device
DE69320715T2 (de) * 1992-06-29 1999-01-21 Thomson Multimedia, Boulogne, Cedex Verfahren zur Ausführung einer Geheimübertragung mit öffentlichem Schlüssel
EP0578059B1 (en) * 1992-06-30 2003-07-30 THOMSON multimedia Method for executing number-theoretic cryptographic and/or error-correcting protocols
US5513133A (en) * 1992-11-30 1996-04-30 Fortress U&T Ltd. Compact microelectronic device for performing modular multiplication and exponentiation over large numbers
US5299263A (en) * 1993-03-04 1994-03-29 Bell Communications Research, Inc. Two-way public key authentication and key agreement for low-cost terminals
US5825880A (en) * 1994-01-13 1998-10-20 Sudia; Frank W. Multi-step digital signature method and system
US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
FR2724741B1 (fr) * 1994-09-21 1996-12-20 Sgs Thomson Microelectronics Circuit electronique de calcul modulaire dans un corps fini
FR2733379B1 (fr) * 1995-04-20 1997-06-20 Gemplus Card Int Procede de generation de signatures electroniques, notamment pour cartes a puces
FR2739469B1 (fr) * 1995-10-03 1997-12-26 Gemplus Card Int Procede de cryptographie a cle publique base sur le logarithme discret
US5742543A (en) 1996-08-19 1998-04-21 Intel Corporation Flash memory device having a page mode of operation
JP2937982B2 (ja) * 1997-01-27 1999-08-23 株式会社東芝 モンゴメリ除算装置及びモンゴメリ逆元計算装置並びにモンゴメリ除算方法及びモンゴメリ逆元計算方法
US5987131A (en) * 1997-08-18 1999-11-16 Picturetel Corporation Cryptographic key exchange using pre-computation
US6163841A (en) * 1998-06-23 2000-12-19 Microsoft Corporation Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures

Also Published As

Publication number Publication date
US6405923B1 (en) 2002-06-18
WO1999059287A1 (de) 1999-11-18
EP1080559A1 (de) 2001-03-07
DE19820605A1 (de) 1999-11-11
DE59912605D1 (de) 2005-11-03
JP2002515614A (ja) 2002-05-28
JP4708565B2 (ja) 2011-06-22
EP1080559B1 (de) 2005-09-28

Similar Documents

Publication Publication Date Title
ATE305683T1 (de) Verfahren zur sicheren verteilung von software
ATE409920T1 (de) System und verfahren zum schutz eines computers und eines netzes gegen feindliche herunterladbare programme
EP0778522A3 (en) System and method for generating trusted, architecture specific, compiled versions of architecture neutral programs
ATE312382T1 (de) Verfahren und vorrichtung zum dynamischen zuweisen von benutzungsrechten zu digitalen werken
DE69820877D1 (de) Vorrichtung zur durchführung von nachweisen an reaktionsstellen
ATE161980T1 (de) System zum betrieb von anwendungs-software in einer sicherheitskritischen umgebung
ATE233918T1 (de) Anpassungsfaehige anordnung und anpassungsfaehiges verfahren zur auswahl von gegenmassnahmen
DE59912351D1 (de) System und verfahren zur identifizierung und authentifizierung von zubehör, hilfs- und/oder betriebsstoffen für technische geräte
FI990461A7 (fi) Menetelmä ohjelmiston lataamiseksi palvelimelta päätelaitteeseen
ATE419586T1 (de) Systeme und verfahren zur gesicherten transaktionsverwaltung und elektronischem rechtsschutz
DE69624757D1 (de) Vorrichtung zur Koordinatenermittlung, Verfahren hierzu und Steuervorrichtung für den Rechner
DE69634684D1 (de) Vorrichtung und Verfahren zur Ausführung nachprüfbarer Programme mit Möglichkeit zur Nutzung von nicht-nachprüfbaren Programmen aus vertrauten Quellen
DE69818210D1 (de) Vorrichtung und Verfahren zur Erzeugung von Ton und Bild auf Basis von einer Aufführungsdatei.
ATE392660T1 (de) Verfahren, system, gerät und programm zur verteilung und einführung von software-upgrade
DE69926820D1 (de) Verfahren, Anordnung und Rechnerprogrammprodukt zur Verriegelung von verbundenen Datenstrukturen in einer multithreading-fähigen Rechnerumgebung
DE69836178D1 (de) Kryptographieverfahren und -vorrichtung zur Beschränkung des Zugriffs auf den Inhalt von übertragenen Programmen durch Programmidentifizierer
BR9915737A (pt) Aparelho e processo de gerenciamento de poço
DE69610168D1 (de) Verfahren und Vorrichtung zur einmaligen Anmeldung in einer Umgebung für verteilte Berechnungen
ATE261356T1 (de) Verfahren zur bilderzeugung auf substraten und sicherheitsdokument
DE60219706D1 (de) Verfahren und Vorrichtung zum Anfügen einer elektronischen Unterschrift an ein strukturiertes Dokument
DE69935974D1 (de) Verfahren und system zur behandlung von gerichtetem schall in einer akustisch-virtuellen umgegung
ATE292302T1 (de) Vorrichtung und verfahren in einer büroapplikation zur bereitstellung von inhaltsabhängiger hilfeinformation
DE60103131D1 (de) Verfahren und vorrichtung zur automatischen wahrnehmung
ATE186790T1 (de) Verfahren zur synchronisation von programmen auf unterschiedlichen computern eines verbundes
ATE236427T1 (de) Verfahren zur erzeugung von isa simulatoren und assemblierern aus einer maschinenbeschreibung

Legal Events

Date Code Title Description
REN Ceased due to non-payment of the annual fee