CN1183684A - Apparatus and method for providing secured communications - Google Patents

Apparatus and method for providing secured communications Download PDF

Info

Publication number
CN1183684A
CN1183684A CN 95119476 CN95119476A CN1183684A CN 1183684 A CN1183684 A CN 1183684A CN 95119476 CN95119476 CN 95119476 CN 95119476 A CN95119476 A CN 95119476A CN 1183684 A CN1183684 A CN 1183684A
Authority
CN
China
Prior art keywords
semiconductor device
information
key
certificate
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 95119476
Other languages
Chinese (zh)
Inventor
D·L·戴维斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to CN 95119476 priority Critical patent/CN1183684A/en
Publication of CN1183684A publication Critical patent/CN1183684A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A semiconductor device for storing encryption/decryption keys at manufacture in combination with digital certificates to ensure secured communications between the semiconductor device and another device. The semiconductor device comprising a non-volatile memory for storing the encryption/decryption keys and at least one digital certificate, internal memory for temporarily storing information input into the semicondcutor device from the other device and possibly encryption and decryption algorithms, a processor for processing the information and a random number generator for generating the encryption/decryption keys completely internal to the hardware agent.

Description

The apparatus and method of secure communication are provided
The present invention relates to a kind of apparatus and method that are used for data confidentiality, or rather, the present invention relates to semiconductor device during fabrication a kind of and/or storage encryption/decruption key when making subsequently, with guarantee the system that this semiconductor device is installed and be in far-end and the device of this system communication between carry out secure communication.
In current society, more and more need a kind of to legitimate receiver in clear and unambiguous mode, any illegal recipient is then transmitted digital information from a place to another place in unclean mode.Therefore, described information is typically encrypted by the application software of carrying out some predetermined cryptographic algorithm, and sends to legitimate receiver with the form of encrypting.Legitimate receiver then to the decrypts information of this transmission so that use.This encrypt/decrypt transmission course is widely used in the government department that sends sensitive information and commercial department's application.
The encrypt/decrypt of information often is that the symmetric key encryption art by as shown in Figure 1 realizes.In this symmetric key encryption art, identical key 1 (promptly, a serial data that is commonly referred to as " symmetric key ") is used in legitimate sender 2 and legitimate sender 3 both sides, so that to sender 2 with send out a message 4 sending between the pass person 3 (promptly, information) carry out encryption and decryption, this encryption and decryption be by known common algorithm such as RAS, DES etc. finish, and pass through for example general network of a PD 5, telephone wire etc. send with the form of encrypting.
Though the symmetric key encryption art is calculated simple, it needs complex key management.Basically, each sender needs a different symmetric key to communicate by letter with each legitimate receiver, if can not accomplish, it will be difficult using in having a large amount of employees' company.For example, (for example, the employee in) the commerce, suppose that each legal entity can both communicate by letter with any other legal entity in this commerce, then the individual key in maximum 499,500 (1000 * 999/2) needs management to have 1000 legal entities at one.In addition, it is difficult implementing the symmetric key encryption art in a network or global environment, because lack a kind of safe and simple method that sends symmetric key from legitimate sender 2 to legitimate sender 3.
The another kind of method of encrypt/decrypt is to use two keys that separate (being called the " key to "), wherein right first key (public keys " of ") of key is used as the encryption from the message 12 of legitimate sender 13, and the deciphering that right second key (private key " of ") of this key is used as message 12 by legitimate receiver 14, as shown in Figure 2.The asymmetric " of the so-called " of this method (or public) secret key encryption art.An advantage of asymmetric-key encryption art is that it has alleviated the related heavy cipher key management considerations of symmetric key encryption art.Continue above-mentioned example, the required key of asymmetric-key encryption art equals 1000 to quantity, i.e. the entire quantity of legal entity.Yet as everybody knows, in this communication system, the purpose of secret information is got for destruction work flow process or reed by illegal mechanism (for example, corporate espionage) can be by sending swindle message to attempt to palm off legal entity to another legal entity.So, in asymmetric key system, use extra agreement usually to guarantee message and sender's confirmation.
When communication is when setting up between prior ignorant user at first, sender's confirmation (sender who promptly confirms a public keys in fact is the real owner of this public keys) is a problem.This problem is normally avoided by add a digital certificate 15 in the message 12 that sends, as shown in Figure 3.This digital certificate by the management organization 16 of a mutual trust (for example, bank, government organs, trade organization, or the like) promulgation, thereby use the swindle attempt of another public keys only can cause unreadable message.Related user is depended in the management organization 16 of described mutual trust.For example, because two each and every one cognition that same company is employed are all believed the certificate by security department's promulgation of the said firm.Yet, the employee of two independent commercial undertakings will be not only need be from the certificate of each security department, and need be from the certificate of some the industrial trade tissue that for example proves described commercial undertaking.This digital certificate 16 maneuvers have been tethered to public keys 10 " in the mechanism (for example, employee).
In the past few years, existing many at the method that " key " information is stolen by unauthorized user.One of its method is to use the release mechanism of machinery.Especially can be easy to special-purpose pocket computer.For example, some company has introduced the folded formula computer of " safety " of a kind of TAMPER-of use testing agency, if just key material is wiped so that should folded formula case of computer be opened.Yet, exist several shortcomings relevant with mechanical safety device.
A basic shortcoming relevant with mechanical safety device is that they can be overthrown by inversion technique (REVERSE-ENGINEERING).Another shortcoming is the design and the manufacturing expense height of mechanical safety device.Another shortcoming is the influence that they are subject to the accidental deletion of key information.
As a result, many companies can only rely on the application software of utilizing the encrypt/decrypt agreement.Yet along with the technology fast development, these encrypt/decrypt application software are provided with unnecessary restriction to the transmission speed of communication system, because relevant to the execution speed of the speed and instruction of information encryption or deciphering.
This specific hardware of using in custom system also is used in the " text distribution " that develops rapidly, i.e. the electron distributions field of information with the method that prevents those keys and do not revealed.Some known text compartment systems comprise (i) through modulator-demodulator or other electronic installation selling softwares with (ii) sell the each several part of the information that is distributed by CD dish, or the like.The use of decruption key is often depended in this electronic marketing, with the customizing messages " decoding " to relating to.For example, user can freely visit the CD dish of the file that comprises a plurality of encrypted data, but in fact only buy one he bought the specific file of the decruption key of corresponding document.Yet, use a basic problem of specific hardware protection key to be that this hardware need be by comprehensively management and control of informant, to prevent any potential unauthorized use.
According to the above, be sought after developing a kind of semiconductor device, this semiconductor device have at least one processing unit and this memory cell of non-volatile memory device be used for depositing in during fabrication a public/private key to and at least one digital certificate and/or provide safer communicating by letter between a system that described semiconductor device has been installed and another far end system subsequently.Therefore, an object of the present invention is to provide a kind of semiconductor device, this semiconductor device has reduced to reveal accidentally to illegal recipient the danger of this public/private key information basically.
Another object of the present invention provides and a kind ofly can inner produce a unique right semiconductor device of public/private key.
A further object of the present invention provides a kind of semiconductor device of storing private key, uses this private key to prevent the other unsafe semiconductor device in any outside.
Another purpose of the present invention provides a kind of right storage of public/private key in integrated circuit and semiconductor device safe in utilization of making, so that it is right to prevent to detect this key through inversion technique basically.
Also purpose of the present invention provides a kind of unique digital certificate that has, and is used for the semiconductor device that far-end (electronically) authenticates this device and identification discrete cell.
Also purpose of the present invention provides a kind of device, this device by its unique characteristic and the discriminating of himself can Executive Agent's distal end body (for example, text distributor) assurance function.
A further object of the present invention provides a kind of device with cost-effectively benefit that makes data communication and storage security.
Described semiconductor device is hardware medium, it comprises a processing unit of carrying out the identifying purpose operation, a memory cell, this memory cell have at least one be used to store a unique public/private key to at least one nonvolatile memory of discerning the digital certificate of the right authenticity of this key, be used for the memory of storage encryption art algorithm and be used to store the volatile random access memory of ephemeral data.These hardware medium also comprise an interface, so that from other device reception information (encryption or deciphering) and/or to other device transmission information.
By following detailed description of the present invention, it is clear that purpose of the present invention, character and advantage all will become.
Fig. 1 is the block diagram of traditional symmetric key encryption of explanation and decrypting process.
Fig. 2 is the block diagram of traditional asymmetric secret key encryption of explanation and decrypting process.
Fig. 3 is process is confirmed in explanation from the numeral of a trust authority a block diagram.
Fig. 4 is the block diagram that the computer system that is one embodiment of the invention is installed.
Fig. 5 is the block diagram of one embodiment of the present of invention.
Fig. 6 be explanation in the semiconductor device, implement a key to the flow chart of the method for digital certificate.
Fig. 7 is the flow chart of this hardware medium work of explanation.
Fig. 8 is the flow chart that explanation uses the far-end of the hardware medium of second level affirmation to verify.
The present invention relates to a kind of hardware medium and its corresponding at safe storage in these hardware medium self and use public/private key to the method for operating of at least one digital certificate.A " device certificate " as digital certificate that shows this device legitimacy that is provided by the manufacturer of device can be provided described digital certificate, one third-party as the " second level certificate " of digital certificate or the set of two certificates from what trusted, in the following description, a large amount of details such as some element of these hardware medium have been described, so that provide to complete understanding of the present invention.Yet very clear, implementing the present invention does not for a person skilled in the art need these details.In other examples, to known circuit, element, and similarly parts do not describe in detail, so that avoid to error understanding of the present invention.
With reference to figure 4, show an embodiment who utilizes computer system 20 of the present invention.This computer system 20 comprises a system bus 21 that can carry out information communication between a plurality of bus bodies, and described bus body comprises at least one primary processor 22 and hardware medium 23.Primary processor 22 (preferably an Inter arithmetic processor, but be not absolute) is connected with system bus 21 through a processor bus interface 24.Though only show primary processor 22 in the present embodiment, can expect, in this computer system 20, can use a plurality of processors.
As further shown in Figure 4, system bus 21 provides the access to a storage system 25 and an I/O (" I/O ") subsystem 26.This storage system 25 comprises a storage control 27 that is connected to system bus 21, read-only memory (" ROM "), video RAM (" VROM ") and similar device.Described storage control 27 provides the interface of control at least one storage device 28 such as dynamic random access memory of access (" DROM ").Described storage device 28 is primary processor 22 stored informations and instruction.
I/O subsystem 26 comprises an I/O controller 29 that is connected with system bus 21 and a general I/O bus 30.This I/O controller 29 is the interfaces between I/O bus 30 and system bus 21, and it provides communication path (that is path) to allow the device exchange message on system bus 21 or I/O bus 30 lines.The communication information between this I/O bus 30 at least one ancillary equipment in computer system 20, described ancillary equipment include but not limited to a display unit 31 (for example, cathode ray tube, LCD etc.) that is used for displayed image; One to the alphabetical input unit 32 of primary processor 22 communication informations and command selection (for example, an alphabetic keypad, or the like): the cursor control device 33 that moves of control cursor is (for example, mouse, trace ball, or the like): the mass data storage device of stored information and instruction is (for example, tape, hard disk drive, floppy disk, etc.); One be used for from computer system 20 to another device transmission information and from information transmit-receive letter machine 35 of another device reception information (for example, facsimile machine, modulator-demodulator, scanner, etc.); But with a touch that is used to provide information, the hard reproducing unit 36 of visual representation (for example, plotter, printer, etc.).Can expect, some or all shown in the computer system shown in Fig. 4 can be used in the parts, or use with shown in different parts.
Come with reference to the one embodiment of the present of invention shown in the figure 5 now, hardware medium 23 are connected with system bus 21, to set up a communication path with primary processor 22.These hardware medium 23 comprise a single integrated circuit (for example, a microprocessor), and this integrated circuit preferably is encapsulated in the semiconductor device plug-in unit 41 hermetically with the form of chip 40, avoid the infringement of dangerous and objectionable impurities to protect this chip 40.Chip 40 comprises 42, one bus interface 44 of a processing unit that is connected with memory cell 43 and a number generator 45.This bus interface 44 can be communicated by letter to another device (for example, primary processor 22) from hardware item 23.Carry out internal arithmetic in the security context of this processing unit 42 in chip 40, to confirm and the relevant validity of a receiver of checking and approving.This computing comprises carries out some algorithm and agreement, start the public/private key that is used to produce specific device to and the circuit of similar key (for example, being preferably in is at random number generator 45 in nature).This processing unit is placed in the chip 40, to prevent that corroding by virus is the universal method that interference calculation machine system obtains its private key by the access of virus erosion to private key.
Memory cell 43 comprises a non-volatile memory device 46, it store this public/private key to at least one digital certificate.Use nonvolatile memory 46 mainly to be because it is keeping wherein content when power interruptions.Memory cell 43 also comprises random access memory (" RAM ") 47, so that storage is from some result and the suitable algorithm of processing unit 42.
Though the ancillary equipment that is used as on the system bus 21 of these hardware medium 23 is realized for greater safety, but can expect, these hardware medium 23 can for example be realized as Magnetic Disk Controler or pcmcia card in several other modes by PC platform grade, so that automatically decipher and/or encrypt to the information of input with from the information of hard disk output.For hardware medium 23, another interchangeable embodiment is to adopt parts that comprise the multi-chip module of primary processor 22, as following description.In addition, even described hardware medium 23 are relevant with the PC platform, but can expect, described hardware medium 23 can be such as facsimile machine in any I/O (" I/O ") external equipment, realize in printer and the similar devices, or realizing on the communication path between computer and this I/O external equipment.
With reference to figure 6, show and be used to make operational flowchart of the present invention.At first, in step 100, make the chip of these hardware medium according to traditional known semiconductor fabrication.Then, this wafer is encapsulated in the semiconductor package, is placed in the affirmation system so that form the described hardware medium of these hardware medium (step 105) itself, and this affirmation system is established to the electrical connection (step 110) of described hardware item and this affirmation system.Described affirmation system is a carrier that is connected with a printed circuit board (PCB) basically, this printed circuit board (PCB) produces and receives the electronic signal of the affirmation that is used for the hardware medium, the device that described affirmation system comprises a private key that produces before being used to be stored in (for example, a database), to guarantee the generation of unique key.After this, this affirmation system provides power initiation a configurator to these hardware medium.During this program, the random number generator internally produces the public/private key of a specific device to (step 115) in this hardware item.
The public keys that described public/private key is right is output to this affirmation system (step 120), there the public keys in preceding generation from the hardware medium of prior manufacturing in itself and the storage device is compared (step 125).In extremely impossible incident, promptly this public keys is with when the public keys of preceding generation is identical (step 130).These hardware medium are signaled to produce another such public/private key to (step 135) and the continuation process in step 120 by this affirmation system.This process guarantees that each public/private key is to being unique.The storage device of described public keys in preceding generation was by should be new, unique public keys renewal (step 140).After this, in step 145, the secret private key of this use manufacturer of affirmation system (that is, in general, with this public keys of private key encryption of manufacturer) represent digitally that by " this public keys of " generates a unique device certificate.This certificate is imported into described hardware medium (step 150), this hardware item with described unique public/private key to the device certificate for good and all be programmed in its nonvolatile memory (step 155).At this moment, this device is actual unique, and at this moment can prove its authenticity.
With reference to figure 7, it shows the flow chart of hardware medium far-end checking.In step 200, between a system (" hardware media system ") that these hardware medium have been installed and a far end system (for example, one another hardware medium or and the system of the operating software of described hardware media communication being installed), set up a communication link.These hardware medium are exported its unique device certificate and are given described far end system (step 205).Because the public keys of manufacturer will be disclosed also or be extensive use of, so this far end system is encrypted to obtain the public keys (step 210) of these hardware medium the device certificate.
After this, in step 215, this far end system produces a random enquire (that is data sequence that is used for test purpose) and this random enquire is sent to described hardware media system (step 220).In step 225, these hardware medium produce a response (that is, with the private key of these hardware medium this inquiry being encrypted) and this response are sent to described far end system (step 230).Then, this far end system uses the public keys of hardware medium by what the device certificate that is sent by these hardware medium in advance determined (step 235) to be deciphered in described response.In step 240, this far end system with the response ratio of original inquiry and this deciphering, if consistent, communicating by letter between this system and the described far end system is safe and keeps (step 245).Otherwise communication is terminated (step 250).At this moment, this far end system is guaranteed that it is to be contacted directly by the specific device (having known features) of particular manufacturer manufacturing with one.At this moment this far end system can point to this hardware medium, serves as that specific function is carried out on the basis in goal systems with the interests of this far-end.The confidentiality of these functional integrity and related data is guaranteed.Described function can comprise the reception and the use of distribution of content key, the keeping of charge information, etc.
Along with the appearance of distribution of content accident, and the use of other information provider units, it is not that the additional assurance of counterfeit may become necessary that the hardware medium are provided.This can by to the reputable third-party institution such as another mechanism trusty, government department for example, bank, mechanisms such as committee on trade send and comprise that the semiconductor device of described hardware medium realizes.In a kind of mode same as described above, unique third party's digital certificate (second level certificate) of this third-party institution is transfused to these hardware medium.After this, these hardware medium nonvolatile memory that will be programmed into it to this second level certificate of following and this possible device certificate by public/private key.The result, by described device certificate and this second level certificate these hardware medium are legalized, with the validity that guarantees these hardware medium with prevent from these hardware medium are forged, thereby prevented unlikely by acting in collusion between the manufacturer of the third-party institution and these hardware medium.
With reference to figure 8, show a far-end that comprises the hardware medium of the discriminating of using second level certificate and confirm flow chart.In step 300, between hardware medium and far-end, set up a communication link.These hardware medium are exported its unique device certificate and second level certificate (step 305) to this far end system.Then, this far end system uses the disclosed public keys of manufacturer to this device certificate deciphering, to obtain the public keys (step 310) of these hardware medium.Similarly, this far end system uses a third-party known public keys to this second level certificate deciphering, to obtain to be stored in the public keys (step 315) of hardware medium wherein.
After this, the public keys of two versions of these hardware medium is compared (step 320), if these two versions are inequality, then communication stops (step 325).Yet if these two versions are identical, this far end system produces a random enquire and sends this random enquire to described hardware medium (step 330).These hardware medium produce a response, promptly with the private key of these hardware medium (step 335) encrypted in this inquiry, and this response is sent to far end system (step 340).Then, this far end system with the public keys of these hardware medium that send by described hardware medium in advance to this response deciphering (step 345).As in step 350, this far end system compares the response of original inquiry and deciphering, if consistent, the reliable communications between this system and this far end system also is held (step 355).Otherwise communication is terminated (step 360).
The present invention described herein can adopt multiple diverse ways and use multiple different structure to design.Though invention has been described with various embodiment, can expect other embodiment for a person skilled in the art, and not break away from the spirit and scope of the present invention.Thereby the present invention should limit with appended claim.

Claims (24)

1. semiconductor device comprises:
Processing unit is used for process information in described semiconductor device;
First storage device, the key that is used to store a unique appointment to at least one digital certificate, described first storage device is connected to described processing unit;
Second storage device is used to store the described information of being handled by described processing unit at least, and described second storage device is connected to described processing unit; With
Interface arrangement is used for and can communicates by letter between described semiconductor device and one second semiconductor device, and described interface arrangement is connected to described processing unit.
2. according to the semiconductor device of claim 1, wherein said storage device comprises nonvolatile memory, the key that is used to keep described unique appointment to described at least one digital certificate, even when non-power supply state.
3. according to the semiconductor device of claim 2, wherein said at least one digital certificate comprises a device certificate.
4. according to the semiconductor device of claim 3, wherein said at least one digital certificate comprises a second level certificate.
5. according to the semiconductor device of claim 2, wherein said storage device also comprises and is used for storing the random access memory of described information temporarily.
6. according to the semiconductor device of claim 5, further comprise the right device of key that produces described unique appointment, described generation device is connected to described processing unit.
7. according to the semiconductor device of claim 6, wherein said generation device comprises a random number generator.
8. according to the semiconductor device of claim 7, wherein said interface arrangement comprises an interface that is connected with a bus, so that between described semiconductor device and described second semiconductor device, provide a communication link, described semiconductor device sends to the information of described semiconductor device and can encrypt and send information so that can be deciphered and store from described second semiconductor device from described semiconductor device to described second semiconductor device.
9. one kind is used for information coding and decoding semiconductor device, and described semiconductor device comprises:
Nonvolatile memory, the key that is used to store a unique appointment to at least one digital certificate;
Random access memory is used to store described information;
A processing unit is used at least internally handling described information, and described processing unit is connected to described nonvolatile memory and described random access memory; With
An interface is used to make described semiconductor device to communicate by letter with at least one second semiconductor device, and described interface is connected with described processing unit.
10. according to the semiconductor device of claim 9, further comprise a right random number generator of key that is used to produce described unique appointment, described random number generator is connected to described processing unit.
11. according to the semiconductor device of claim 10, wherein said nonvolatile memory has a device certificate.
12. according to the semiconductor device of claim 11, wherein said nonvolatile memory also has a second level certificate.
13. semiconductor device according to claim 10, wherein said interface provides a communication link between described semiconductor device and described second semiconductor device, so that described semiconductor device can be deciphered and store the information that sends to described semiconductor device and can encrypt and send information from described semiconductor device to described second semiconductor device.
14. a system comprises:
Storage device is used for storage encryption and decrypted program;
Primary processing unit is used to carry out described encryption and decryption program;
Bus unit is used to connect described primary processing unit and described storage device;
Media apparatus is connected with described bus unit, is used for internally deciphering input information and encrypts output information, and described media apparatus comprises:
Processing unit is used for handling described input and output information in described media apparatus;
First storage device, the key that is used to store a unique appointment to at least one digital certificate, in order to encrypt to described input information deciphering with to described output information, described first storage device is connected to described processing unit;
Second storage device is used for storing described at least input and output information temporarily; With
Interface arrangement is used for and can communicates by letter between a described system and a far end system, and described interface arrangement is connected to described processing unit.
15. according to the system of claim 14, wherein said first storage device comprises nonvolatile memory, the key that is used for when non-power supply state, storing described unique appointment to described at least one digital certificate.
16. according to the system of claim 15, wherein said at least one digital certificate comprises a device certificate.
17. according to the system of claim 16, wherein said at least one digital certificate comprises a second level certificate.
18. according to the system of claim 15, wherein said second storage device comprises the random access memory that is used for storing described information and at least one encryption and decryption program temporarily.
19., also comprise the right device of key that is used to produce described unique appointment according to the system of claim 18.
20. according to the system of claim 19, wherein said generation device comprises a random number generator.
21. a system comprises:
Memory unit is used for storage encryption and decrypted program;
Primary processor is used to carry out described encryption and decryption program;
Be used to connect the bus of described primary processing unit and described storage device;
The hardware medium are connected with described bus unit, are used for from the internally deciphering input information of far end device system and are used to send to far end device encrypting output information, and described hardware medium comprise:
A processor is used for handling described input and output information in described hardware medium;
A non-volatile memory component, the key that is used to store a unique appointment to at least one digital certificate, they the two be used to encrypt to described input information deciphering with to described output information, described non-volatile memory component is connected to described processor;
Volatile storage parts are used for storing described at least input and output information temporarily; With
A random number generator, the key that is used to produce described unique appointment is right; With
An interface is used for and can communicates by letter between described hardware medium and described far end system, and described interface is connected to described processor.
22. a manufacturing is used to guarantee and the method for the hardware medium of another far end device secure communication that this method comprises the following steps:
Described hardware medium are placed in the affirmation system, are connected so that described hardware medium are set up an electronics with described affirmation system;
Begin to described hardware medium provide power initiation one configurator, wherein to produce a specific device key right for a random number generator in described hardware medium;
Confirm that described specific device key is to being unique; With
With described specific device key to depositing a non-volatile memory component in the described hardware medium in.
23. the method according to claim 22 further comprises the following steps;
Generate a unique device certificate;
Import described device certificate to described hardware medium; With
Described device certificate is deposited in the described non-volatile memory component of described hardware medium.
24. the method according to claim 23 further comprises the following steps:
Generate unique second level certificate;
Import described second level certificate to described hardware medium; With
Described second level certificate is deposited in the described non-volatile memory component of described hardware medium.
CN 95119476 1995-12-30 1995-12-30 Apparatus and method for providing secured communications Pending CN1183684A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 95119476 CN1183684A (en) 1995-12-30 1995-12-30 Apparatus and method for providing secured communications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 95119476 CN1183684A (en) 1995-12-30 1995-12-30 Apparatus and method for providing secured communications

Publications (1)

Publication Number Publication Date
CN1183684A true CN1183684A (en) 1998-06-03

Family

ID=5082024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 95119476 Pending CN1183684A (en) 1995-12-30 1995-12-30 Apparatus and method for providing secured communications

Country Status (1)

Country Link
CN (1) CN1183684A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1774061B (en) * 1998-07-28 2013-01-16 株式会社日立制作所 Digital signal processing apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1774061B (en) * 1998-07-28 2013-01-16 株式会社日立制作所 Digital signal processing apparatus

Similar Documents

Publication Publication Date Title
US5539828A (en) Apparatus and method for providing secured communications
US6185546B1 (en) Apparatus and method for providing secured communications
US5568552A (en) Method for providing a roving software license from one node to another node
US7353393B2 (en) Authentication receipt
US6918042B1 (en) Secure configuration of a digital certificate for a printer or other network device
KR100455327B1 (en) Document authentication system and method
US6058478A (en) Apparatus and method for a vetted field upgrade
US8332652B2 (en) Computing device that securely runs authorized software
US20050123142A1 (en) Method and apparatus for secure key replacement
US20070208952A1 (en) System And Method For Data Source Authentication And Protection System Using Biometrics For Openly Exchanged Computer Files
CN1439207A (en) A platform and method for establishing provable identities while maintaining privacy
WO2007106798A2 (en) Systems and methods for authoring and protecting digital property
WO2005119557A2 (en) Secure communication and real-time watermarking using mutating identifiers
EP1323258A1 (en) System for protecting objects distributed over a network
CA2308755A1 (en) Reconfigurable secure hardware apparatus and method of operation
EP1636664A2 (en) Proof of execution using random function
CN114175580B (en) Enhanced secure encryption and decryption system
WO2004001540A2 (en) Method and system for protecting digital objects distributed over a network using an electronic mail interface
JPH09200194A (en) Device and method for security communication
US7721100B2 (en) Granting an access to a computer-based object
CN112866216B (en) Method and system for encrypting file
KR100239865B1 (en) Apparatus and method for providing secured communications
CN1183684A (en) Apparatus and method for providing secured communications
EP0784256A1 (en) Method and apparatus for public-key cryptography using a secure semiconductor device
JPH11122237A (en) Ciphering device and data protection device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication