JP2013175179A - 少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法 - Google Patents

少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法 Download PDF

Info

Publication number
JP2013175179A
JP2013175179A JP2013026948A JP2013026948A JP2013175179A JP 2013175179 A JP2013175179 A JP 2013175179A JP 2013026948 A JP2013026948 A JP 2013026948A JP 2013026948 A JP2013026948 A JP 2013026948A JP 2013175179 A JP2013175179 A JP 2013175179A
Authority
JP
Japan
Prior art keywords
encrypted
instruction
key
software application
session key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
JP2013026948A
Other languages
English (en)
Japanese (ja)
Other versions
JP2013175179A5 (https=
Inventor
Karroumi Mohamed
カローミ モハメド
Alain Durand
デュラン アライン
Alessio Davide
アレッシオ ダビデ
Marc Joye
ジョイ マルク
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Licensing SAS
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Publication of JP2013175179A publication Critical patent/JP2013175179A/ja
Publication of JP2013175179A5 publication Critical patent/JP2013175179A5/ja
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
JP2013026948A 2012-02-14 2013-02-14 少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法 Withdrawn JP2013175179A (ja)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP12305163.3 2012-02-14
EP12305163.3A EP2629223A1 (en) 2012-02-14 2012-02-14 System, devices and methods for collaborative execution of a software application comprising at least one encrypted instruction

Publications (2)

Publication Number Publication Date
JP2013175179A true JP2013175179A (ja) 2013-09-05
JP2013175179A5 JP2013175179A5 (https=) 2016-03-31

Family

ID=47666062

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2013026948A Withdrawn JP2013175179A (ja) 2012-02-14 2013-02-14 少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法

Country Status (5)

Country Link
US (1) US20140140504A1 (https=)
EP (2) EP2629223A1 (https=)
JP (1) JP2013175179A (https=)
KR (1) KR20130093557A (https=)
CN (1) CN103258152A (https=)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101527329B1 (ko) * 2014-09-12 2015-06-09 삼성에스디에스 주식회사 데이터 암호화 장치 및 방법
GB201418815D0 (en) * 2014-10-22 2014-12-03 Irdeto Bv Providing access to content
CN104320248A (zh) * 2014-11-14 2015-01-28 中国建设银行股份有限公司 一种系统间密钥同步的方法及系统
US10205710B2 (en) * 2015-01-08 2019-02-12 Intertrust Technologies Corporation Cryptographic systems and methods
WO2017096599A1 (zh) * 2015-12-10 2017-06-15 深圳市大疆创新科技有限公司 安全通信系统、方法及装置
US11362824B2 (en) 2018-05-25 2022-06-14 Intertrust Technologies Corporation Content management systems and methods using proxy reencryption
CN111865565B (zh) * 2019-04-24 2022-05-06 云丁智能科技(北京)有限公司 秘钥管理方法、智能设备、服务器和移动终端
CN112434322B (zh) * 2020-12-03 2024-05-07 深圳市欢太科技有限公司 数据加密方法、装置、计算机设备及计算机可读存储介质
US12592913B2 (en) 2024-01-31 2026-03-31 Bank Of America Corporation System and method to dynamically encrypt data
US12470527B2 (en) 2024-01-31 2025-11-11 Bank Of America Corporation System and method to dynamically decrypt data

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2149944A (en) * 1983-11-14 1985-06-19 Softnet Inc Software distribution
CN1898623A (zh) * 2003-12-22 2007-01-17 皇家飞利浦电子股份有限公司 使用动态实体的软件执行保护
US7697691B2 (en) * 2004-07-14 2010-04-13 Intel Corporation Method of delivering Direct Proof private keys to devices using an on-line service
US7668313B2 (en) * 2005-10-31 2010-02-23 Texas Instruments Incorporated Recipient-encrypted session key cryptography
US8532293B2 (en) * 2007-09-27 2013-09-10 The Directv Group, Inc. Method and system for securely providing and storing content in a multiple dwelling unit system
AU2009209554B2 (en) 2008-02-01 2015-07-09 Thomson Licensing Copy-protected software cartridge

Also Published As

Publication number Publication date
KR20130093557A (ko) 2013-08-22
CN103258152A (zh) 2013-08-21
US20140140504A1 (en) 2014-05-22
EP2629223A1 (en) 2013-08-21
EP2629225A1 (en) 2013-08-21

Similar Documents

Publication Publication Date Title
JP2013175179A (ja) 少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法
AU2017396530B2 (en) Addressing a trusted execution environment using encryption key
US10972265B2 (en) Addressing a trusted execution environment
EP3174238B1 (en) Protecting white-box feistel network implementation against fault attack
AU2017396531B2 (en) Addressing a trusted execution environment using signing key
CN103608820B (zh) 用于使得软件应用能够在硬件设备上执行的计算机实现方法和硬件
CN109075976A (zh) 取决于密钥认证的证书发布
BR102018015221A2 (pt) Método para compartilhamento seguro de informações e sistema relacionado
TWI420339B (zh) 軟體授權系統及方法
US20160261592A1 (en) Method and device for the secure authentication and execution of programs
CN112189197B (zh) 分发和执行许可证的方法和存储介质
US7636441B2 (en) Method for secure key exchange
US7835521B1 (en) Secure keyboard
US8774407B2 (en) System and method for executing encrypted binaries in a cryptographic processor
US10700849B2 (en) Balanced encoding of intermediate values within a white-box implementation
CN111656345B (zh) 启用容器文件中加密的软件模块
WO2016177843A1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
JP2007515723A (ja) アクティブなエンティティを使用するソフトウェア実行保護
CN107278357B (zh) 密码系统和方法
CN115081000B (zh) 保护远程目标程序源码的方法、系统、设备和存储介质
Carelli et al. Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems
JP7385025B2 (ja) 暗号化コプロセッサにおけるエンティティ固有の暗号化コードの実行
CN117978399A (zh) 基于智能密码钥匙的软件身份校验方法、装置及存储介质
KR100959380B1 (ko) 플래시 컨텐츠 제공 방법
TW201337633A (zh) 參與共同執行軟體應用之第一方法和第一裝置以及第二方法和第二裝置

Legal Events

Date Code Title Description
A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20160215

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20160215

A761 Written withdrawal of application

Free format text: JAPANESE INTERMEDIATE CODE: A761

Effective date: 20160404