DE60203909D1 - Kryptographisches verfahren zum schutz eines elektronischen chips gegen betrug - Google Patents

Kryptographisches verfahren zum schutz eines elektronischen chips gegen betrug

Info

Publication number
DE60203909D1
DE60203909D1 DE60203909T DE60203909T DE60203909D1 DE 60203909 D1 DE60203909 D1 DE 60203909D1 DE 60203909 T DE60203909 T DE 60203909T DE 60203909 T DE60203909 T DE 60203909T DE 60203909 D1 DE60203909 D1 DE 60203909D1
Authority
DE
Germany
Prior art keywords
electronic chip
state
against fraud
chip against
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60203909T
Other languages
English (en)
Other versions
DE60203909T2 (de
Inventor
David Arditti
Jacques Burger
Henri Gilbert
Marc Girault
Jean-Claude Pailles
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom SA filed Critical France Telecom SA
Application granted granted Critical
Publication of DE60203909D1 publication Critical patent/DE60203909D1/de
Publication of DE60203909T2 publication Critical patent/DE60203909T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Credit Cards Or The Like (AREA)
  • Fittings On The Vehicle Exterior For Carrying Loads, And Devices For Holding Or Mounting Articles (AREA)
  • Slot Machines And Peripheral Devices (AREA)
DE60203909T 2001-06-26 2002-06-07 Kryptographisches verfahren zum schutz eines elektronischen chips gegen betrug Expired - Lifetime DE60203909T2 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0108586A FR2826531B1 (fr) 2001-06-26 2001-06-26 Procede cryptographique pour la protection d'une puce electronique contre la fraude
FR0108586 2001-06-26
PCT/FR2002/001956 WO2003001464A1 (fr) 2001-06-26 2002-06-07 Procede cryptographique pour la protection d'une puce electronique contre la fraude

Publications (2)

Publication Number Publication Date
DE60203909D1 true DE60203909D1 (de) 2005-06-02
DE60203909T2 DE60203909T2 (de) 2006-02-16

Family

ID=8864902

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60203909T Expired - Lifetime DE60203909T2 (de) 2001-06-26 2002-06-07 Kryptographisches verfahren zum schutz eines elektronischen chips gegen betrug

Country Status (14)

Country Link
US (1) US7526648B2 (de)
EP (1) EP1399896B1 (de)
JP (1) JP2004531163A (de)
KR (1) KR100906518B1 (de)
CN (1) CN1221928C (de)
AT (1) ATE294430T1 (de)
BR (1) BRPI0210673B1 (de)
CA (1) CA2451034C (de)
DE (1) DE60203909T2 (de)
ES (1) ES2240766T3 (de)
FR (1) FR2826531B1 (de)
IL (2) IL157947A0 (de)
MX (1) MXPA03010308A (de)
WO (1) WO2003001464A1 (de)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2850479B1 (fr) 2003-01-24 2005-04-29 France Telecom Procede cryptographique a cle publique pour la protection d'une puce contre la fraude
FR2867335A1 (fr) * 2004-03-02 2005-09-09 France Telecom Procede cryptographique notamment a cle publique
FR2867289A1 (fr) * 2004-03-02 2005-09-09 France Telecom Procede et dispositif pour accomplir une operation cryptographique
JP4612461B2 (ja) * 2004-06-24 2011-01-12 株式会社東芝 マイクロプロセッサ
TW200708027A (en) * 2005-04-29 2007-02-16 Sean O'neil Process of and apparatus for hashing
US8484481B2 (en) * 2009-07-14 2013-07-09 International Business Machines Corporation Chip lockout protection scheme for integrated circuit devices and insertion thereof
DE102011007572A1 (de) * 2011-04-18 2012-10-18 Siemens Aktiengesellschaft Verfahren zur Überwachung eines Tamperschutzes sowie Überwachungssystem für ein Feldgerät mit Tamperschutz
EP2983156B1 (de) * 2014-08-06 2019-07-24 Secure-IC SAS System und verfahren zum schutz von schaltkreisen

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1321649C (en) * 1988-05-19 1993-08-24 Jeffrey R. Austin Method and system for authentication
FR2650097B1 (fr) 1989-07-19 1992-12-31 Pailles Jean Claude Carte a microcircuit cable et procede de transaction entre une carte a microcircuit cable correspondante et un terminal
TW200624B (en) 1992-04-06 1993-02-21 American Telephone & Telegraph A universal authentication device for use over telephone lines
FR2739706B1 (fr) 1995-10-09 1997-11-21 Inside Technologies Perfectionnements aux cartes a memoire
FR2739994B1 (fr) 1995-10-17 1997-11-14 Henri Gilbert Procede cryptographique de protection contre la fraude
CH690530A5 (de) * 1995-12-11 2000-09-29 Ip Tpg Holdco Sarl Verfahren zur Echtheitskontrolle eines bei einer Transaktion verwendeten vorausbezahlten Zahlungsmittels.
DE19622533A1 (de) * 1996-06-05 1997-12-11 Deutsche Telekom Ag Verfahren und Vorrichtung zum Laden von Inputdaten in einen Algorithmus bei der Authentikation
US6233685B1 (en) * 1997-08-29 2001-05-15 Sean William Smith Establishing and employing the provable untampered state of a device
DE19737693A1 (de) * 1997-08-29 1999-03-04 Philips Patentverwaltung Verfahren zur Überprüfung der Unverfälschtheit einer elektrischen Schaltung
DE69938045T2 (de) * 1998-06-03 2009-01-15 Cryptography Research Inc., San Francisco Verwendung von unvorhersagbarer Information zur Leckminimierung von Chipkarten und anderen Kryptosystemen
US6757832B1 (en) * 2000-02-15 2004-06-29 Silverbrook Research Pty Ltd Unauthorized modification of values in flash memory
FR2806858B1 (fr) * 2000-03-22 2002-05-03 France Telecom Procede cryptographique de protection contre la fraude
FR2807245B1 (fr) 2000-03-30 2002-05-24 France Telecom Procede de protection d'une puce electronique contre la fraude

Also Published As

Publication number Publication date
BR0210673A (pt) 2004-09-21
CN1520583A (zh) 2004-08-11
ATE294430T1 (de) 2005-05-15
EP1399896A1 (de) 2004-03-24
FR2826531B1 (fr) 2003-10-24
IL157947A0 (en) 2004-03-28
ES2240766T3 (es) 2005-10-16
DE60203909T2 (de) 2006-02-16
EP1399896B1 (de) 2005-04-27
WO2003001464A1 (fr) 2003-01-03
JP2004531163A (ja) 2004-10-07
KR100906518B1 (ko) 2009-07-07
IL157947A (en) 2007-03-08
CA2451034C (fr) 2013-01-08
FR2826531A1 (fr) 2002-12-27
CN1221928C (zh) 2005-10-05
US20040107353A1 (en) 2004-06-03
MXPA03010308A (es) 2004-02-17
CA2451034A1 (fr) 2003-01-03
BRPI0210673B1 (pt) 2016-01-12
US7526648B2 (en) 2009-04-28
KR20040010639A (ko) 2004-01-31

Similar Documents

Publication Publication Date Title
ATE265767T1 (de) Verfahren und vorrichtung zum erzeugen eines datenstroms und verfahren und vorrichtung zum abspielen eines datenstroms
EA200501559A1 (ru) Способ (варианты) и система (варианты) защиты данных в сети
ATE386304T1 (de) Computersystemschutz
NO20035272L (no) Perforeringkanon omfattende et instrument for overvaking eller maling i en bronn, samt fremgangsmate for komplettering.
DE60310065D1 (de) Verfahren und einrichtung zum schutz von text
DE60223771D1 (de) Schutz für Server-Computervorrichtung, Verfahren, Programmprodukt und Server-Computervorrichtung
EP1571529A3 (de) Schutz einer Datenverarbeitungsschaltung
DE60203909D1 (de) Kryptographisches verfahren zum schutz eines elektronischen chips gegen betrug
DE60234609D1 (de) Vorrichtung und verfahren zum erkennen wenigstens einer person, zugriffskontrollvorrichtung und -system und entsprechende anwendungen
ATE268034T1 (de) Kryptografisches verfahren zum schutz gegen betrug
ATE497197T1 (de) Feldgerät
DE602004011965D1 (de) Verfahren und schaltung zum identifizieren und/oder verifizieren von hardware und/oder software eines geräts und eines mit dem gerät arbeitenden datenträgers
ATE491189T1 (de) Chipkarte und verfahren zum schützen einer chipkarte
JO2271B1 (en) A method of encoding a multiple unit of measurement
DE60103523D1 (de) Verfahren zum schutz eines elektronischen bausteines gegen betrug
ATE367691T1 (de) Übergang von einer booleschen maskierung zu einer arithmetischen maskierung
EP1271992A3 (de) Verfahren zum Schutz eines elektronisches Gerätes, und elektronisches Gerät
ATE529968T1 (de) Vorrichtung und verfahren zur ausführung eines kryptographischen algorithmus
DE50107611D1 (de) Verfahren und Generierungsmodul zur Ermittlung von Filtermasken zur Relevanzprüfung von Kennzeichnern
ATE315816T1 (de) Verfahren , vorrichtung und terminal zum beglaubigen des ergebnisses eines datenträgerbefehls
JP2004246899A (ja) 集積回路により実行されるアルゴリズムの不正防止方法
EA200400057A1 (ru) Способ защиты программы от её неавторизованного использования при помощи так называемого принципа переменной
WO2003079164A3 (de) Vorrichtung zum schutz gegen unauthorisierte benutzung von software
FR2828965B1 (fr) Dispositif de signature par cryptage/decryptage de messages, tels que des messages electroniques ou telephoniques
EP1460796A3 (de) Erzeugung und Verteilung eines Schlüssels zur Verschlüsselung/Entschlüsselung

Legal Events

Date Code Title Description
8364 No opposition during term of opposition