AU4552600A - Protection of the core part of a computer against external manipulation - Google Patents
Protection of the core part of a computer against external manipulationInfo
- Publication number
- AU4552600A AU4552600A AU45526/00A AU4552600A AU4552600A AU 4552600 A AU4552600 A AU 4552600A AU 45526/00 A AU45526/00 A AU 45526/00A AU 4552600 A AU4552600 A AU 4552600A AU 4552600 A AU4552600 A AU 4552600A
- Authority
- AU
- Australia
- Prior art keywords
- check sum
- protection
- core part
- against external
- cpu
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mathematical Physics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Detection And Correction Of Errors (AREA)
- Executing Machine-Instructions (AREA)
- Information Transfer Systems (AREA)
- Hardware Redundancy (AREA)
- Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
- Saccharide Compounds (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19918620 | 1999-04-23 | ||
| DE19918620A DE19918620A1 (de) | 1999-04-23 | 1999-04-23 | Sicherung eines Rechnerkerns gegen äußere Manipulationen |
| PCT/EP2000/003530 WO2000065442A1 (de) | 1999-04-23 | 2000-04-19 | Sicherung eines rechnerkerns gegen äussere manipulationen |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU4552600A true AU4552600A (en) | 2000-11-10 |
Family
ID=7905707
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU45526/00A Abandoned AU4552600A (en) | 1999-04-23 | 2000-04-19 | Protection of the core part of a computer against external manipulation |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US6959391B1 (enExample) |
| EP (1) | EP1190319B1 (enExample) |
| JP (1) | JP4693245B2 (enExample) |
| CN (1) | CN1173264C (enExample) |
| AT (1) | ATE235082T1 (enExample) |
| AU (1) | AU4552600A (enExample) |
| DE (2) | DE19918620A1 (enExample) |
| ES (1) | ES2190966T3 (enExample) |
| RU (1) | RU2249247C2 (enExample) |
| WO (1) | WO2000065442A1 (enExample) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2327048A1 (en) * | 2000-11-28 | 2002-05-28 | Olivier Benoit | Method for verifying data integrity in electronic device data processing |
| DE10105987A1 (de) | 2001-02-09 | 2002-08-29 | Infineon Technologies Ag | Datenverarbeitungsvorrichtung |
| DE10122505A1 (de) | 2001-05-10 | 2002-11-14 | Giesecke & Devrient Gmbh | Verfahren zum Schützen eines Rechners gegen Manipulation von Registerinhalten und Rechner zum Durchführen des Verfahrens |
| US7363547B2 (en) * | 2003-07-09 | 2008-04-22 | Stmicroeletronics S.A. | Error-detection cell for an integrated processor |
| RU2265241C2 (ru) * | 2004-01-20 | 2005-11-27 | Ардашев Дмитрий Васильевич | Способ вызова процедуры на основе двойного стека |
| DE102004021088A1 (de) * | 2004-04-29 | 2005-11-17 | Giesecke & Devrient Gmbh | Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe |
| KR20060067584A (ko) * | 2004-12-15 | 2006-06-20 | 삼성전자주식회사 | 해킹 방지 기능이 있는 스마트 카드 |
| DE102005016801B4 (de) * | 2005-04-12 | 2018-04-26 | Robert Bosch Gmbh | Verfahren und Rechnereinheit zur Fehlererkennung und Fehlerprotokollierung in einem Speicher |
| DE102006037810A1 (de) | 2006-08-11 | 2008-02-14 | Giesecke & Devrient Gmbh | Sichere Programmcodeausführung |
| US20090187507A1 (en) * | 2006-12-20 | 2009-07-23 | Brown Kerry D | Secure financial transaction network |
| US8549260B2 (en) * | 2009-01-29 | 2013-10-01 | Infineon Technologies Ag | Apparatus for processing data and method for generating manipulated and re-manipulated configuration data for processor |
| EP2262259A1 (en) | 2009-06-08 | 2010-12-15 | Nagravision S.A. | Method for monitoring execution of data processing program instructions in a security module |
| CN105117298A (zh) * | 2015-08-10 | 2015-12-02 | 中颖电子股份有限公司 | 一种用于显屏驱动芯片的静电释放保护系统以及方法 |
| US11386234B2 (en) * | 2019-12-17 | 2022-07-12 | Nuvoton Technology Corporation | Security systems and methods for integrated circuits |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4727544A (en) * | 1986-06-05 | 1988-02-23 | Bally Manufacturing Corporation | Memory integrity checking system for a gaming device |
| DE3644248A1 (de) * | 1986-12-23 | 1988-07-07 | Siemens Ag | Verfahren zur ueberwachung des programmlaufs eines mikroprozessors |
| JPH03124278A (ja) * | 1989-10-04 | 1991-05-27 | Fukoku:Kk | 超音波モータ |
| JPH052654A (ja) * | 1991-06-25 | 1993-01-08 | Nissan Motor Co Ltd | マイクロコンピユータの故障検知方法および回路 |
| JP3013868B2 (ja) * | 1992-09-02 | 2000-02-28 | 船井電機株式会社 | コードレス電話におけるメモリ揮発防止システム |
| RU2067313C1 (ru) * | 1995-03-29 | 1996-09-27 | Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" | Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм |
| DE19610976A1 (de) * | 1995-04-05 | 1996-10-17 | Siemens Ag | Verfahren zum Erkennen von Computerviren |
| WO1997004394A1 (en) * | 1995-07-14 | 1997-02-06 | Christopher Nathan Drake | Computer software authentication, protection, and security system |
-
1999
- 1999-04-23 DE DE19918620A patent/DE19918620A1/de not_active Withdrawn
-
2000
- 2000-04-19 ES ES00926991T patent/ES2190966T3/es not_active Expired - Lifetime
- 2000-04-19 AU AU45526/00A patent/AU4552600A/en not_active Abandoned
- 2000-04-19 DE DE50001510T patent/DE50001510D1/de not_active Expired - Lifetime
- 2000-04-19 WO PCT/EP2000/003530 patent/WO2000065442A1/de not_active Ceased
- 2000-04-19 JP JP2000614120A patent/JP4693245B2/ja not_active Expired - Fee Related
- 2000-04-19 RU RU2001130347/09A patent/RU2249247C2/ru not_active IP Right Cessation
- 2000-04-19 CN CNB008066345A patent/CN1173264C/zh not_active Expired - Fee Related
- 2000-04-19 US US09/926,376 patent/US6959391B1/en not_active Expired - Lifetime
- 2000-04-19 EP EP00926991A patent/EP1190319B1/de not_active Expired - Lifetime
- 2000-04-19 AT AT00926991T patent/ATE235082T1/de not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| CN1173264C (zh) | 2004-10-27 |
| EP1190319A1 (de) | 2002-03-27 |
| ATE235082T1 (de) | 2003-04-15 |
| JP2002543492A (ja) | 2002-12-17 |
| DE19918620A1 (de) | 2000-10-26 |
| RU2249247C2 (ru) | 2005-03-27 |
| CN1348562A (zh) | 2002-05-08 |
| US6959391B1 (en) | 2005-10-25 |
| EP1190319B1 (de) | 2003-03-19 |
| JP4693245B2 (ja) | 2011-06-01 |
| WO2000065442A1 (de) | 2000-11-02 |
| DE50001510D1 (de) | 2003-04-24 |
| ES2190966T3 (es) | 2003-09-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU4552600A (en) | Protection of the core part of a computer against external manipulation | |
| US5860099A (en) | Stored program system with protected memory and secure signature extraction | |
| TWI282230B (en) | Apparatus and method for secure hash algorithm | |
| US8539210B2 (en) | Context switching with automatic saving of special function registers memory-mapped to all banks | |
| MY146723A (en) | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container | |
| BR9708455A (pt) | Processo de carregamento deguro de comandos em um cartão inteligente, e cartão compreendendo um substrato e um circuito integrado. | |
| HK1048855A1 (zh) | 信息系統 | |
| WO1999026132A3 (en) | Processor configured to generate lookahead results from collapsed moves, compares and simple arithmetic instructions | |
| PL356340A1 (en) | Controlling access to a resource by a program using a digital signature | |
| EP1102163A3 (en) | Microprocessor with improved instruction set architecture | |
| WO1998049628A3 (en) | Method for preventing buffer deadlock in dataflow computations | |
| TWI332158B (en) | Method, computer program product, and system for excuting a message authentication code instruction in a computer system | |
| US7996651B2 (en) | Enhanced microprocessor or microcontroller | |
| EP3948548A1 (en) | Processor having multiple operating modes | |
| TW200506731A (en) | Computer system with multiple basic input/output system (BIOS) memory blocks | |
| NO20034816D0 (no) | Mekanisme for sekvens-nummerering, for sikring av integritet for eksekveringsrekkefölge ved innbyrdes avhengige anvendelser av smartkort | |
| Diehl et al. | Side-channel resistant soft core processor for lightweight block ciphers | |
| US20250258673A1 (en) | Hardware Verification of Dynamically Generated Code | |
| TW325552B (en) | Data processing condition code flags | |
| TWI313433B (en) | Method for operating digital system including graphics display and digital system thereof | |
| EP1573517A3 (en) | Method and apparatus for processing transactions in a data processing system | |
| GB0126137D0 (en) | Data access in a processor | |
| US20030056115A1 (en) | System for and method of protecting data in firmware modules of embedded systems | |
| BR0211375A (pt) | Processo para proteger um software vulnerável contra o seu uso não autorizado; sistema para a implementação do processo; unidade pré-personalizada; unidade que permite executar um software protegido e impedir sua utilização não autorizada; conjunto de unidades; conjunto de distribuição de um software protegido; unidade de processamento e de memorização e conjunto de unidades de processamento e de memorização | |
| EP1686459B1 (en) | Method and system for controlling access in memory devices, computer program product therefor |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |