EP0857382A1 - Sicherheitschip - Google Patents

Sicherheitschip

Info

Publication number
EP0857382A1
EP0857382A1 EP96932453A EP96932453A EP0857382A1 EP 0857382 A1 EP0857382 A1 EP 0857382A1 EP 96932453 A EP96932453 A EP 96932453A EP 96932453 A EP96932453 A EP 96932453A EP 0857382 A1 EP0857382 A1 EP 0857382A1
Authority
EP
European Patent Office
Prior art keywords
chip
security
security chip
ami
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP96932453A
Other languages
German (de)
English (en)
French (fr)
Inventor
Günther EBERHARD
Jürgen GESSNER
Wolf-Dietrich Moeller
Manfred Schäfer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Daimler Benz AG
Original Assignee
Daimler Benz AG
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Daimler Benz AG, Siemens AG filed Critical Daimler Benz AG
Publication of EP0857382A1 publication Critical patent/EP0857382A1/de
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • cryptographic algorithms are used to encrypt the actual communication data.
  • Various algorithms are used, for example, to ensure the integrity, confidentiality or authenticity of the transmitted data or the communication partner.
  • Special security modules designed for individual applications are known, for example a security module for secure fax transmissions (Siemens, data security module DSM-Fax, secure fax transmissions, Siemens area security technology) or also for encryption of telephone conversations (Siemens, DSM -Voice-Telephoning in Confidence, Sie ⁇ mens area security technology; Luis Cypher, LC-1 The digital voice encryptor for tap-proof telephone calls).
  • a security module for secure fax transmissions Siemens, data security module DSM-Fax, secure fax transmissions, Siemens area security technology
  • DSM-Voice-Telephoning in Confidence, Sie ⁇ mens area security technology Siemens area security technology
  • Luis Cypher Luis Cypher
  • LC-1 The digital voice encryptor for tap-proof telephone calls).
  • the invention is therefore based on the problem of specifying a security chip which avoids the disadvantages mentioned above.
  • the security chip is completely decoupled from the application hardware and can only be “addressed” via a data interface and a command interface. Because the security chip also has its own processor, an on-chip bus to which the application hardware cannot access, and different algorithm modules which the most diverse security services based on asymmetrical and symmetrical algorithms perform, is the security universally applicable and does not provide any security-relevant information to the application hardware.
  • the application hardware and the application software could be loaded, configured and adapted as desired without endangering the security of the various crypto functions that are carried out with the algorithm modules.
  • the development of the security chip according to claim 6 implements an extension of the algorithm modules by additional security services and thus extends the applicability of the security chip.
  • Figure 1 is a sketch describing a possible arrangement of the security chip
  • FIG. 2 shows a block diagram describing possible algorithm modules
  • FIG. 3 shows an arrangement which represents the construction of a safe timer module. The invention is explained further with reference to FIGS. 1 to 3.
  • FIG. 1 An arrangement of a security chip SC is shown in FIG.
  • the security chip SC has at least the following components:
  • a secure command interface BS which is either led into a chip-internal data bus DB or directly into the processor P,
  • the chip-internal data bus DB via which the plurality VZ of independent algorithm modules AMi is coupled to the data interface DS, and
  • the encryption performance is no longer dependent on the processor P.
  • the chip internal data from the chip internal bus IB cannot be intercepted by an unauthorized third party, in particular at the data interface DS or manipulated.
  • the security chip SC can have the following components:
  • a wide variety of communication protocols can be used for communication between the individual components, that is to say for sequence control, of course independently of the communication protocol used by an application hardware AHW.
  • the data interface DS and the command interface BS are the only access points for the application hardware AHW on the security chip SC.
  • the application hardware AHW has no possibility of accessing the security chip SC and thus also the security-relevant data that are used and / or stored in the security chip SC.
  • the processor P can be any processor with a suitable speed which results directly from the requirements of the planned application.
  • the algorithm modules AMi are independent modules, each of which is “responsible” for a cryptographic protocol or method. These include, for example, methods or protocols for the encryption and decryption of user data, for integrity protection, or for digital signature (signature) or hash value formation.
  • the index i uniquely identifies each algorithm module AMi. It is any natural number in the range from 1 to n. Here n is the number of different Algorithm modules AMi implemented on the security chip SC.
  • An algorithm module AMi is, for example, a module that is specifically designed to carry out a cryptographic symmetrical method SV, for example the data description standard method (DES method).
  • the module can also be designed such that it can carry out the DES process with different key lengths, for example also the triple DES process.
  • DES method data description standard method
  • asymmetrical cryptographic algorithms AV are also carried out in the algorithm modules AMi.
  • Examples of asymmetric cryptographic algorithms AV are well known to any person skilled in the art, for example the RSA method.
  • algorithm modules AMi of the same type can also be provided on the security chip SC to carry out the same method, for example to increase the performance of the security chip SC.
  • This can e.g., it can also be provided in a way that an algorithm module AMi for processing an incoming data stream and another algorithm module AMi of the same design for processing an outgoing data stream is provided.
  • the algorithm modules AMi are used, among other things, for the encryption of user data, which are placed in plain text by the application hardware AHW on a chip-internal data bus DB via the data interface DS and with any encryption method defined by the application hardware AHW via the command interface BS that the algorithm module AMi used is selected from the plurality VZ of the independent algorithm modules AMi are encrypted.
  • the user data encrypted in the respective algorithm module AMi are again transmitted to the application hardware AHW via the chip-internal data bus DB and the data interface DS, now in encrypted form.
  • the parameters of the respective encryption request for the user data are made known to the security chip SC by the application hardware AHW via the command interface BS.
  • This can be, for example, the encryption algorithm to be used, the key length, or similar parameters that are necessary for the encryption of user data.
  • the method ie for example encryption of user data, is started by the application hardware AHW via the command interface BS.
  • the processor P controls the administrative processes for encrypting data in the security chip SC and also cryptographic protocols described below.
  • the processor P does not necessarily transport the encrypted, decrypted or processed with cryptographic methods user data. If not transported by the processor P, these are usually transported via the on-chip data bus DB and, which leads to a further advantage of the security chip SC, that the encryption performance SC is not dependent on the processor P.
  • the decoupling of the chip-internal data bus DS from the chip-internal bus IB ensures that the internal data which are transported via the chip-internal bus IB are not listened to or manipulated at the data interface DS.
  • Both unencrypted data and data that have to be buffered in order to carry out cryptographic algorithms are stored in the memory SP, for example intermediate keys in methods that work on the principle of exponential key exchange or intermediate keys that are used in the DES method be used, .
  • Additional algorithm modules AMi can be provided to carry out different security services, for example from known authentication protocols, or also to carry out methods for key exchange or for key generation of cryptographic keys.
  • the sensor module SM detects physical attacks on the security chip SC, possibly evaluates them and reports them to the processor P via the chip-internal bus IB.
  • the ZM timer module has at least the following components:
  • a timer interface SIO a timer controller ZC
  • the counting circuit ZS having at least:
  • the ZM timer module carries out autonomous tasks, for example to provide time stamps.
  • the time stamps are made available to other applications of the SC security chip via the ZIO timer interface.
  • the timer controller ZC controls the processes of the timer module ZM.
  • the timer interface ZIO represents the bus interface of the timer module ZM to the on-chip bus IB.
  • the timer interface ZIO is primarily required to handle communication with external controllers, in the case of the security chip SC with the processor P.
  • Connections are therefore provided to control the sequence of the cryptographic communication protocol, that is to say to control communication with other controllers, that is to say with the processor P. Furthermore, a connection is provided via which the timer module ZM attempts to tamper with the sensor module SM, be reported, e.g. B. manipulations on the clock. Additional connections are provided for exchanging the data of the timer module ZM, that is to say an absolute or relative time which is determined by the timer module ZM. No crypto-algorithms are carried out in the timer module ZM itself.
  • the other modules of the security chip SC are responsible for handling authentication protocols and other security functions.
  • the processor P must decide and monitor who is allowed to access the timer module ZM in what way via the timer interface ZIO.
  • the timer controller ZC controls the timer interface ZIO and the counter circuit ZS. In addition, the timer controller ZC receives logic commands from the processor P via the timer interface ZIO.
  • the logic commands of the processor P are interpreted by the timer controller ZC and implemented in the internal control of the timer module ZM.
  • the timer controller ZC thus monitors the functional sequence of the entire module. It thus represents the control unit of the timer module.
  • Commands with which the timer controller ZC influences the sequence of the timer module ZM can include the following functions, for example:
  • a data access control and a function access control are carried out by the timer controller ZC.
  • this includes, for example:
  • - Access to the timer module ZM is only permitted after a secret number has been successfully checked; - Access is only allowed after successful authentication;
  • the counter circuit ZS of the timer module ZM has, as described in the previous, among other things the real time counter RZ.
  • the real-time counter RZ is a counting circuit that is made up of cascaded modulo counters.
  • the cascading and synchronization of the real-time counter RZ can take into account the peculiarities of time jumps, for example caused by summer time or leap years, etc.
  • a counting of the “relative” time ie a monotone counting binary counter of sufficient length corresponding to the required time, is also provided.
  • the clock adaptation TA is used to generate a suitable time base for the time measurement in the timer module ZM with an external clock supply, as is the case, for example, with chip cards customary today.
  • the data buffer DB is used to store data that is required in the timer module ZM.
  • the algorithm modules AMi are designed in such a way that the key management is supported directly in hardware. This offers considerable performance advantages, especially in the case of rapid key changes between differently encrypted data streams. This is of particular importance in the area of packet-oriented telecommunications or data connections or in application sharing systems or multimedia applications, for example in a local area network (LAN) in which many packets are transmitted to different communication partners and processed differently by cryptography Need to become.
  • LAN local area network

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
EP96932453A 1995-10-25 1996-09-25 Sicherheitschip Ceased EP0857382A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19539700 1995-10-25
DE19539700A DE19539700C1 (de) 1995-10-25 1995-10-25 Sicherheitschip
PCT/DE1996/001813 WO1997016003A1 (de) 1995-10-25 1996-09-25 Sicherheitschip

Publications (1)

Publication Number Publication Date
EP0857382A1 true EP0857382A1 (de) 1998-08-12

Family

ID=7775724

Family Applications (1)

Application Number Title Priority Date Filing Date
EP96932453A Ceased EP0857382A1 (de) 1995-10-25 1996-09-25 Sicherheitschip

Country Status (6)

Country Link
EP (1) EP0857382A1 (ja)
JP (1) JPH11513864A (ja)
DE (1) DE19539700C1 (ja)
RU (1) RU2180987C2 (ja)
UA (1) UA46064C2 (ja)
WO (1) WO1997016003A1 (ja)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000045546A2 (en) * 1999-01-29 2000-08-03 Gen Instrument Corp Multiple level public key hierarchy for performance and high security
CA2372391A1 (en) * 1999-05-07 2000-11-16 Stephen L. Wasson Apparatus and method for a programmable security processor
US7073069B1 (en) 1999-05-07 2006-07-04 Infineon Technologies Ag Apparatus and method for a programmable security processor
TW546935B (en) 1999-08-30 2003-08-11 Nagracard Sa Multi-module encryption method
CN100448193C (zh) * 1999-08-30 2008-12-31 纳格拉卡德股份有限公司 多模块加密方法
DE10040854A1 (de) 2000-08-21 2002-03-21 Infineon Technologies Ag Chipkarte
DE10061997A1 (de) 2000-12-13 2002-07-18 Infineon Technologies Ag Kryptographieprozessor
DE10138014A1 (de) * 2001-08-02 2003-02-20 Kostal Leopold Gmbh & Co Kg Schlüssellose Zugangsberechtigungskontrolleinrichtung
JP2003316263A (ja) 2002-04-19 2003-11-07 Sony Corp 演算装置および演算方法
US20040190721A1 (en) * 2003-03-24 2004-09-30 Microsoft Corporation Renewable conditional access system
CN100566251C (zh) 2007-08-01 2009-12-02 西安西电捷通无线网络通信有限公司 一种增强安全性的可信网络连接方法
CN100512313C (zh) 2007-08-08 2009-07-08 西安西电捷通无线网络通信有限公司 一种增强安全性的可信网络连接系统
JP4631935B2 (ja) * 2008-06-06 2011-02-16 ソニー株式会社 情報処理装置、情報処理方法、プログラム及び通信システム
CN103605929B (zh) * 2013-11-17 2016-05-25 北京工业大学 一种支持多用户的可信硬件设备及其使用方法
CN109150534B (zh) * 2017-06-19 2021-10-01 华为技术有限公司 终端设备及数据处理方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2821306B2 (ja) * 1992-03-06 1998-11-05 三菱電機株式会社 Icカードと端末機との間の認証方法およびそのシステム

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9716003A1 *

Also Published As

Publication number Publication date
WO1997016003A1 (de) 1997-05-01
JPH11513864A (ja) 1999-11-24
DE19539700C1 (de) 1996-11-28
UA46064C2 (uk) 2002-05-15
RU2180987C2 (ru) 2002-03-27

Similar Documents

Publication Publication Date Title
DE19539700C1 (de) Sicherheitschip
DE60314060T2 (de) Verfahren und Vorrichtung zur Schlüsselverwaltung für gesicherte Datenübertragung
DE60200081T2 (de) Sichere Benutzer- und Datenauthenifizierung über ein Kommunikationsnetzwerk
EP0903026B1 (de) Verfahren zur Aushandlung einer Sicherheitspolitik zwischen einer ersten Computereinheit und einer zweiten Computereinheit
EP1777913B1 (de) Verfahren zur Verschlüsselung bzw. Entschlüsselung von Datenpaketen eines Datenstroms
DE60119857T2 (de) Verfahren und Vorrichtung zur Ausführung von gesicherten Transaktionen
US6981156B1 (en) Method, server system and device for making safe a communication network
EP1105998B1 (de) Verfahren und anordnung zur bildung eines geheimen kommunikationsschlüssels zu einem zuvor ermittelten asymmetrischen kryptographischen schlüsselpaar
DE102004024002B4 (de) Verfahren zur Authentifizierung von Sensordaten und zugehörigem Sensor
DE10212619A1 (de) Sichere Benutzerauthentisierung über ein Kommunikationsnetzwerk
EP1278332B1 (de) Verfahren und System zur Echtzeitaufzeichnung mit Sicherheitsmodul
DE3321910A1 (de) Vorrichtung und verfahren zum schuetzen von software
AT504634B1 (de) Verfahren zum transferieren von verschlüsselten nachrichten
EP3465513B1 (de) Nutzerauthentifizierung mittels eines id-tokens
EP0923826B1 (de) Anordnung und verfahren zur kryptographischen bearbeitung eines digitalen datenstroms, der eine beliebige anzahl von daten aufweist
EP1287655B1 (de) Verfahren zur authentizitätssicherung von hard- und software in einem vernetzten system
EP3648430A1 (de) Hardware-sicherheitsmodul
DE102006025369B4 (de) Verfahren und Vorrichtung zur Sicherung der Integrität und/oder Nichtabstreitbarkeit von paketbasierter, zeitkritischer Kommunkation
EP1801724A2 (de) Verfahren und Anordnung zum Bereitstellen sicherheitsrelevanter Dienste durch ein Sicherheitsmodul einer Frankiermaschine
DE19703970B4 (de) Verfahren zur Erfassung von Daten und deren Übermittlung in authentischer Form
DE112021004459T5 (de) Informationsverifizierungsvorrichtung, elektronische steuervorrichtung und informationsverifizierungsverfahren
DE10355865B4 (de) Verfahren und Chip zur kryptographischen Verschlüsselung von Daten
EP1054364A2 (de) Verfahren zur Erhöhung der Sicherheit bei digitalen Unterschriften
DE19642371C1 (de) Verfahren zum Austausch kryptographischen Schlüsselmaterials zwischen mindestens einer ersten Computereinheit und einer zweiten Computereinheit
DE19548387C1 (de) Verfahren zur kryptographischen Sicherung der rechnergestützten digitalen Kommunikation zwischen einem Programm und mindestens einer Benutzereinheit

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19980420

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT CH DE DK ES FR GB IT LI NL

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: DAIMLER-BENZ AKTIENGESELLSCHAFT

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: DAIMLERCHRYSLER AG

17Q First examination report despatched

Effective date: 20000224

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20000911