FI991617A - Procedure for generating a response - Google Patents

Procedure for generating a response Download PDF

Info

Publication number
FI991617A
FI991617A FI991617A FI991617A FI991617A FI 991617 A FI991617 A FI 991617A FI 991617 A FI991617 A FI 991617A FI 991617 A FI991617 A FI 991617A FI 991617 A FI991617 A FI 991617A
Authority
FI
Finland
Prior art keywords
response
input
output
key
rnd
Prior art date
Application number
FI991617A
Other languages
Finnish (fi)
Swedish (sv)
Other versions
FI115259B (en
Inventor
Lauri Paatero
Original Assignee
Setec Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Setec Oy filed Critical Setec Oy
Priority to FI991617A priority Critical patent/FI115259B/en
Priority to DE60026531T priority patent/DE60026531T2/en
Priority to EP00949509A priority patent/EP1197033B1/en
Priority to CNB008104352A priority patent/CN1168260C/en
Priority to AT00949509T priority patent/ATE320123T1/en
Priority to PCT/FI2000/000649 priority patent/WO2001006700A1/en
Priority to AU62841/00A priority patent/AU6284100A/en
Publication of FI991617A publication Critical patent/FI991617A/en
Priority to US10/047,193 priority patent/US7107616B2/en
Application granted granted Critical
Publication of FI115259B publication Critical patent/FI115259B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]

Abstract

The present invention relates to a device ( 1 ) comprising an input for receiving an input; calculation means (P) for producing a response (OUTPUT) in response to the input (INPUT) and a secret key (A) by utilizing a first predetermined function (f), and an output ( 3 ) for feeding said response (OUTPUT) further. In order for an attacker not be able to find out the secret key, the device further comprises a memory (M) in which the key-specific number (RND) is stored, and means for retrieving the key-specific number (RND) from the memory (M) and for feeding it to the calculation means (P') for carrying out predetermined calculation operations (f 2 ) on the basis of the key-specific number (RND) when producing said response (OUTPUT).
FI991617A 1999-07-16 1999-07-16 Procedure for generating a response FI115259B (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
FI991617A FI115259B (en) 1999-07-16 1999-07-16 Procedure for generating a response
DE60026531T DE60026531T2 (en) 1999-07-16 2000-07-14 METHOD FOR GENERATING AN ANSWER FOR USE IN AN AUTHENTICATION PROCESS
EP00949509A EP1197033B1 (en) 1999-07-16 2000-07-14 Method of producing a response for use in an authentication process
CNB008104352A CN1168260C (en) 1999-07-16 2000-07-14 Method of producing a response
AT00949509T ATE320123T1 (en) 1999-07-16 2000-07-14 METHOD FOR GENERATING A RESPONSE FOR USE IN AN AUTHENTICATION PROCESS
PCT/FI2000/000649 WO2001006700A1 (en) 1999-07-16 2000-07-14 Method of producing a response
AU62841/00A AU6284100A (en) 1999-07-16 2000-07-14 Method of producing a response
US10/047,193 US7107616B2 (en) 1999-07-16 2002-01-15 Method of producing a response

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI991617 1999-07-16
FI991617A FI115259B (en) 1999-07-16 1999-07-16 Procedure for generating a response

Publications (2)

Publication Number Publication Date
FI991617A true FI991617A (en) 2001-01-17
FI115259B FI115259B (en) 2005-03-31

Family

ID=8555086

Family Applications (1)

Application Number Title Priority Date Filing Date
FI991617A FI115259B (en) 1999-07-16 1999-07-16 Procedure for generating a response

Country Status (8)

Country Link
US (1) US7107616B2 (en)
EP (1) EP1197033B1 (en)
CN (1) CN1168260C (en)
AT (1) ATE320123T1 (en)
AU (1) AU6284100A (en)
DE (1) DE60026531T2 (en)
FI (1) FI115259B (en)
WO (1) WO2001006700A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI112013B (en) * 2000-07-11 2003-10-15 Setec Oy Procedure for processing a secret key and device
US20050005093A1 (en) * 2003-07-01 2005-01-06 Andrew Bartels Methods, systems and devices for securing supervisory control and data acquisition (SCADA) communications
JP6354172B2 (en) * 2014-01-20 2018-07-11 富士通株式会社 Semiconductor integrated circuit and authentication system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4234932A (en) * 1978-09-05 1980-11-18 Honeywell Information Systems Inc. Security system for remote cash dispensers
US4799258A (en) * 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
US5546463A (en) * 1994-07-12 1996-08-13 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5604801A (en) * 1995-02-03 1997-02-18 International Business Machines Corporation Public key data communications system under control of a portable security device
CA2316227C (en) * 1998-01-02 2009-08-11 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus

Also Published As

Publication number Publication date
FI115259B (en) 2005-03-31
WO2001006700A1 (en) 2001-01-25
AU6284100A (en) 2001-02-05
ATE320123T1 (en) 2006-03-15
CN1361959A (en) 2002-07-31
DE60026531D1 (en) 2006-05-04
US7107616B2 (en) 2006-09-12
CN1168260C (en) 2004-09-22
EP1197033B1 (en) 2006-03-08
EP1197033A1 (en) 2002-04-17
DE60026531T2 (en) 2006-10-12
US20020095575A1 (en) 2002-07-18

Similar Documents

Publication Publication Date Title
FI955155A0 (en) Digital transmitter receiver with an encrypted key memory
WO2001091366A3 (en) Cryptographic communications using pseudo-randomly generated cryptography keys
EP0856820A3 (en) IC card, IC card processing system, and IC card authentication method
DE69938045D1 (en) Use of unpredictable leak minimization information from smart cards and other cryptosystems
AU2002368304A1 (en) Device keys
NO20005917L (en) Method and system for transmitting information from a host system to a mobile data communication device
EP0905942A3 (en) Decrypting device
BR9808167A (en) Electronic data processing device and system
KR940022267A (en) Data storage
NZ333067A (en) Anti-theft device for computer component, has memory which stores access password
DK1188151T3 (en) Devices and methods for biometric authentication
AU1046800A (en) Self-corrector randomizer-encryptor system and method
SE9801115D0 (en) Electrical device
DE59914861D1 (en) Interface device
FI991617A (en) Procedure for generating a response
GB0017398D0 (en) Alert signal generation
ATE386381T1 (en) ONE'S COMPLEMENT ENCRYPTION COMBINATOR
KR930016629A (en) Electronic code lock mounting electronic circuit device
EP1164787A3 (en) Video transmission apparatus
AU2002218372A1 (en) Authenticating method and device
SE9701894L (en) Method and apparatus for computer systems
TW200520499A (en) A system and method for encryption keys quick dispatch
TW345641B (en) User behavior recording device and method
KR950030134A (en) Karaoke Device
KR970058237A (en) Remote control powered on by specific sound

Legal Events

Date Code Title Description
FG Patent granted

Ref document number: 115259

Country of ref document: FI

PC Transfer of assignment of patent

Owner name: GEMALTO OY

MA Patent expired