CN1173264C - 保护计算机的核心免受外部窜改的方法 - Google Patents
保护计算机的核心免受外部窜改的方法 Download PDFInfo
- Publication number
- CN1173264C CN1173264C CNB008066345A CN00806634A CN1173264C CN 1173264 C CN1173264 C CN 1173264C CN B008066345 A CNB008066345 A CN B008066345A CN 00806634 A CN00806634 A CN 00806634A CN 1173264 C CN1173264 C CN 1173264C
- Authority
- CN
- China
- Prior art keywords
- instruction
- cpu
- verification
- processing unit
- central processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mathematical Physics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Detection And Correction Of Errors (AREA)
- Executing Machine-Instructions (AREA)
- Hardware Redundancy (AREA)
- Information Transfer Systems (AREA)
- Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
- Saccharide Compounds (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19918620A DE19918620A1 (de) | 1999-04-23 | 1999-04-23 | Sicherung eines Rechnerkerns gegen äußere Manipulationen |
| DE19918620.0 | 1999-04-23 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1348562A CN1348562A (zh) | 2002-05-08 |
| CN1173264C true CN1173264C (zh) | 2004-10-27 |
Family
ID=7905707
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB008066345A Expired - Fee Related CN1173264C (zh) | 1999-04-23 | 2000-04-19 | 保护计算机的核心免受外部窜改的方法 |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US6959391B1 (enExample) |
| EP (1) | EP1190319B1 (enExample) |
| JP (1) | JP4693245B2 (enExample) |
| CN (1) | CN1173264C (enExample) |
| AT (1) | ATE235082T1 (enExample) |
| AU (1) | AU4552600A (enExample) |
| DE (2) | DE19918620A1 (enExample) |
| ES (1) | ES2190966T3 (enExample) |
| RU (1) | RU2249247C2 (enExample) |
| WO (1) | WO2000065442A1 (enExample) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2327048A1 (en) * | 2000-11-28 | 2002-05-28 | Olivier Benoit | Method for verifying data integrity in electronic device data processing |
| DE10105987A1 (de) | 2001-02-09 | 2002-08-29 | Infineon Technologies Ag | Datenverarbeitungsvorrichtung |
| DE10122505A1 (de) * | 2001-05-10 | 2002-11-14 | Giesecke & Devrient Gmbh | Verfahren zum Schützen eines Rechners gegen Manipulation von Registerinhalten und Rechner zum Durchführen des Verfahrens |
| US7363547B2 (en) * | 2003-07-09 | 2008-04-22 | Stmicroeletronics S.A. | Error-detection cell for an integrated processor |
| RU2265241C2 (ru) * | 2004-01-20 | 2005-11-27 | Ардашев Дмитрий Васильевич | Способ вызова процедуры на основе двойного стека |
| DE102004021088A1 (de) * | 2004-04-29 | 2005-11-17 | Giesecke & Devrient Gmbh | Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe |
| KR20060067584A (ko) * | 2004-12-15 | 2006-06-20 | 삼성전자주식회사 | 해킹 방지 기능이 있는 스마트 카드 |
| DE102005016801B4 (de) * | 2005-04-12 | 2018-04-26 | Robert Bosch Gmbh | Verfahren und Rechnereinheit zur Fehlererkennung und Fehlerprotokollierung in einem Speicher |
| DE102006037810A1 (de) | 2006-08-11 | 2008-02-14 | Giesecke & Devrient Gmbh | Sichere Programmcodeausführung |
| US20090187507A1 (en) * | 2006-12-20 | 2009-07-23 | Brown Kerry D | Secure financial transaction network |
| US8549260B2 (en) * | 2009-01-29 | 2013-10-01 | Infineon Technologies Ag | Apparatus for processing data and method for generating manipulated and re-manipulated configuration data for processor |
| EP2262259A1 (en) | 2009-06-08 | 2010-12-15 | Nagravision S.A. | Method for monitoring execution of data processing program instructions in a security module |
| CN105117298A (zh) * | 2015-08-10 | 2015-12-02 | 中颖电子股份有限公司 | 一种用于显屏驱动芯片的静电释放保护系统以及方法 |
| US11386234B2 (en) * | 2019-12-17 | 2022-07-12 | Nuvoton Technology Corporation | Security systems and methods for integrated circuits |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4727544A (en) * | 1986-06-05 | 1988-02-23 | Bally Manufacturing Corporation | Memory integrity checking system for a gaming device |
| DE3644248A1 (de) * | 1986-12-23 | 1988-07-07 | Siemens Ag | Verfahren zur ueberwachung des programmlaufs eines mikroprozessors |
| JPH03124278A (ja) * | 1989-10-04 | 1991-05-27 | Fukoku:Kk | 超音波モータ |
| JPH052654A (ja) * | 1991-06-25 | 1993-01-08 | Nissan Motor Co Ltd | マイクロコンピユータの故障検知方法および回路 |
| JP3013868B2 (ja) * | 1992-09-02 | 2000-02-28 | 船井電機株式会社 | コードレス電話におけるメモリ揮発防止システム |
| RU2067313C1 (ru) * | 1995-03-29 | 1996-09-27 | Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" | Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм |
| DE19610976A1 (de) * | 1995-04-05 | 1996-10-17 | Siemens Ag | Verfahren zum Erkennen von Computerviren |
| WO1997004394A1 (en) * | 1995-07-14 | 1997-02-06 | Christopher Nathan Drake | Computer software authentication, protection, and security system |
-
1999
- 1999-04-23 DE DE19918620A patent/DE19918620A1/de not_active Withdrawn
-
2000
- 2000-04-19 DE DE50001510T patent/DE50001510D1/de not_active Expired - Lifetime
- 2000-04-19 AU AU45526/00A patent/AU4552600A/en not_active Abandoned
- 2000-04-19 CN CNB008066345A patent/CN1173264C/zh not_active Expired - Fee Related
- 2000-04-19 RU RU2001130347/09A patent/RU2249247C2/ru not_active IP Right Cessation
- 2000-04-19 ES ES00926991T patent/ES2190966T3/es not_active Expired - Lifetime
- 2000-04-19 US US09/926,376 patent/US6959391B1/en not_active Expired - Lifetime
- 2000-04-19 JP JP2000614120A patent/JP4693245B2/ja not_active Expired - Fee Related
- 2000-04-19 WO PCT/EP2000/003530 patent/WO2000065442A1/de not_active Ceased
- 2000-04-19 AT AT00926991T patent/ATE235082T1/de not_active IP Right Cessation
- 2000-04-19 EP EP00926991A patent/EP1190319B1/de not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| JP4693245B2 (ja) | 2011-06-01 |
| US6959391B1 (en) | 2005-10-25 |
| ATE235082T1 (de) | 2003-04-15 |
| RU2249247C2 (ru) | 2005-03-27 |
| DE50001510D1 (de) | 2003-04-24 |
| CN1348562A (zh) | 2002-05-08 |
| DE19918620A1 (de) | 2000-10-26 |
| EP1190319A1 (de) | 2002-03-27 |
| ES2190966T3 (es) | 2003-09-01 |
| JP2002543492A (ja) | 2002-12-17 |
| EP1190319B1 (de) | 2003-03-19 |
| AU4552600A (en) | 2000-11-10 |
| WO2000065442A1 (de) | 2000-11-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1173264C (zh) | 保护计算机的核心免受外部窜改的方法 | |
| US7757098B2 (en) | Method and apparatus for verifying authenticity of initial boot code | |
| CN104704503B (zh) | 在安全域与次安全域之间进行转换时保护安全数据和程序代码免受非安全访问的数据处理装置和方法 | |
| CN1144126C (zh) | 保护程序流的方法 | |
| US8099636B2 (en) | System and method for protecting memory stacks using a debug unit | |
| WO2009138892A1 (en) | A method for secure data reading and a data handling system | |
| JP2006522968A (ja) | 携帯型データ・キャリアのバーチャル・マシン向けプログラムの制御実行 | |
| EP2996034B1 (en) | Execution flow protection in microcontrollers | |
| EP3454216A1 (en) | Method for protecting unauthorized data access from a memory | |
| US10915402B2 (en) | Software fault monitoring | |
| US20230359523A1 (en) | Memory integrity check | |
| WO2001097010A2 (en) | Data processing method and device for protected execution of instructions | |
| US9652232B2 (en) | Data processing arrangement and method for data processing | |
| CN101263502B (zh) | 对长微扰造成的故障的检测 | |
| US20130268934A1 (en) | Dynamic method for controlling the integrity of the execution of an executable code | |
| JP2008287449A (ja) | データプロセッサ | |
| CN114641769A (zh) | 一种处理器的安全度量装置及方法 | |
| EP4213443A1 (en) | Method for detecting a fault injection in a data processing system | |
| CN113434247B (zh) | 一种java卡虚拟机的安全防护方法 | |
| EP1271317A1 (en) | System-on-chip with time redundancy operation | |
| US8161293B2 (en) | Protection of the execution of a program executed by an integrated circuit | |
| JP7247638B2 (ja) | 電子情報記憶媒体、icカード、改竄チェック方法、及びプログラム | |
| US8763138B2 (en) | Method and device for security loading a memory and an associated memory | |
| EP3460702A1 (en) | Method to detect an attack by fault injection on a sensitive operation | |
| EP4524788A1 (en) | Method for securely protecting execution of a software code against fault injection attacks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C19 | Lapse of patent right due to non-payment of the annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |