AU4216997A - Method and apparatus for operating resources under control of a security module or other secure processor - Google Patents

Method and apparatus for operating resources under control of a security module or other secure processor

Info

Publication number
AU4216997A
AU4216997A AU42169/97A AU4216997A AU4216997A AU 4216997 A AU4216997 A AU 4216997A AU 42169/97 A AU42169/97 A AU 42169/97A AU 4216997 A AU4216997 A AU 4216997A AU 4216997 A AU4216997 A AU 4216997A
Authority
AU
Australia
Prior art keywords
under control
security module
secure processor
resources under
operating resources
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU42169/97A
Inventor
Marius Carloganu
John Sheets
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verifone Inc
Original Assignee
Verifone Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verifone Inc filed Critical Verifone Inc
Publication of AU4216997A publication Critical patent/AU4216997A/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Multi Processors (AREA)
AU42169/97A 1996-07-23 1996-07-23 Method and apparatus for operating resources under control of a security module or other secure processor Abandoned AU4216997A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB1996/001507 WO1998003903A2 (en) 1996-07-23 1996-07-23 Method and apparatus for operating resources under control of a security module or other secure processor

Publications (1)

Publication Number Publication Date
AU4216997A true AU4216997A (en) 1998-02-10

Family

ID=11004512

Family Applications (1)

Application Number Title Priority Date Filing Date
AU42169/97A Abandoned AU4216997A (en) 1996-07-23 1996-07-23 Method and apparatus for operating resources under control of a security module or other secure processor

Country Status (2)

Country Link
AU (1) AU4216997A (en)
WO (1) WO1998003903A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9922665D0 (en) * 1999-09-25 1999-11-24 Hewlett Packard Co A method of enforcing trusted functionality in a full function platform
CN104040555B (en) 2011-11-14 2017-02-22 威斯科数据安全国际有限公司 A smart card reader with a secure logging feature
IT201700050086A1 (en) * 2017-05-09 2018-11-09 St Microelectronics Srl SAFETY HARDWARE MODULE, ITS PROCESSING SYSTEM, INTEGRATED CIRCUIT, DEVICE AND PROCEDURE
CN110825534B (en) * 2019-09-18 2023-11-28 深圳云盈网络科技有限公司 Method for realizing inter-module communication MSG command set

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5048085A (en) * 1989-10-06 1991-09-10 International Business Machines Corporation Transaction system security method and apparatus
JPH0821024B2 (en) * 1989-12-06 1996-03-04 富士通株式会社 Command file creation processing method and execution right grant processing method
CA2078020C (en) * 1992-09-11 2000-12-12 Rodney G. Denno Combination pin pad and terminal
WO1997005551A1 (en) * 1995-07-31 1997-02-13 Verifone, Inc. Method and apparatus for operating resources under control of a security module or other secure processor

Also Published As

Publication number Publication date
WO1998003903A2 (en) 1998-01-29
WO1998003903A3 (en) 1998-04-30

Similar Documents

Publication Publication Date Title
AU7572998A (en) Gaming device security system: apparatus and method
EP0850523B8 (en) Document authentication system and method
AU1905395A (en) Method and control device for authentication
GB2329542B (en) Security control system and method of operation
AU5471398A (en) Natural language meta-search system and method
AU3982797A (en) Program guide system and method of operation
SG43259A1 (en) System and method for data security
AU8398998A (en) System and method for automatically verifying identity of a subject
AU5250298A (en) Software release document process control system and method
AU4273497A (en) Method and system for integrating additional functionality into a login system
AU3837595A (en) Security apparatus and method
AU6390196A (en) Method and apparatus for enhancing performance of a processor
AU4667497A (en) Software release control system and method
EP0825511A3 (en) Method and apparatus for trusted processing
GB2303721B (en) Personal computer having security function,security method therefor,security device installation and detachment methods
AU6646298A (en) Data security system and method
GB9523922D0 (en) Method of authenticating an application program and a system therefor
AU4262797A (en) Method and system for electronic document certification
AU9129198A (en) Method and apparatus for concurrent execution of operating systems
AU4503596A (en) A method and apparatus for arteriotomy closure
AU4568299A (en) Method and apparatus for assessing the security of a computer system
AU2019897A (en) Method, apparatus and system for verification of patterns
AU2245397A (en) Method and system for implementing data transfers
AU6850798A (en) Antivirus system and method
AU2651497A (en) Method and system for transmitting data