JP2564593B2 - プログラムを機密保護し且つ機密保護されたプログラムを保全制御する方法 - Google Patents
プログラムを機密保護し且つ機密保護されたプログラムを保全制御する方法Info
- Publication number
- JP2564593B2 JP2564593B2 JP63040545A JP4054588A JP2564593B2 JP 2564593 B2 JP2564593 B2 JP 2564593B2 JP 63040545 A JP63040545 A JP 63040545A JP 4054588 A JP4054588 A JP 4054588A JP 2564593 B2 JP2564593 B2 JP 2564593B2
- Authority
- JP
- Japan
- Prior art keywords
- program
- check number
- computer
- component
- security component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1008—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Selective Calling Equipment (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19873705736 DE3705736A1 (de) | 1987-02-23 | 1987-02-23 | Verfahren zum sichern von programmen und zur integritaetskontrolle gesicherter programme |
| DE3705736,7 | 1987-02-23 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JPS63240629A JPS63240629A (ja) | 1988-10-06 |
| JP2564593B2 true JP2564593B2 (ja) | 1996-12-18 |
Family
ID=6321565
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP63040545A Expired - Fee Related JP2564593B2 (ja) | 1987-02-23 | 1988-02-23 | プログラムを機密保護し且つ機密保護されたプログラムを保全制御する方法 |
Country Status (5)
| Country | Link |
|---|---|
| EP (1) | EP0280035B1 (enExample) |
| JP (1) | JP2564593B2 (enExample) |
| AT (1) | ATE103402T1 (enExample) |
| DE (2) | DE3705736A1 (enExample) |
| ES (1) | ES2050671T3 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8732480B2 (en) | 2010-09-24 | 2014-05-20 | Kabushiki Kaisha Toshiba | Memory management device and memory management method |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4845715A (en) * | 1984-10-29 | 1989-07-04 | Francisco Michael H | Method for maintaining data processing system securing |
| FR2647924B1 (fr) * | 1989-06-06 | 1994-06-17 | Bull Cp8 | Procede pour verifier l'integrite d'un logiciel ou de donnees, et systeme pour la mise en oeuvre de ce procede |
| WO1993023807A1 (de) * | 1992-05-14 | 1993-11-25 | Gruno, Gerhard | Programmsicherungsverfahren zum schutz einer datenverarbeitungsanlage |
| DE4234165C1 (de) * | 1992-10-09 | 1994-03-03 | Detecon Gmbh | Verfahren zur Ermöglichung der nachträglichen Überprüfung bereits übermittelter Daten |
| DE4339075C2 (de) * | 1993-11-16 | 1997-07-24 | Dallmeier Dieter | Verfahren sowie Kamera-Überwachungsvorrichtung zum Erzeugen eines digitalen Bildes |
| US5598470A (en) * | 1994-04-25 | 1997-01-28 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block |
| DE19539793A1 (de) * | 1995-10-26 | 1997-04-30 | Roland Man Druckmasch | Rechner für den Leitstand einer Druckmaschine |
| FI981232L (fi) * | 1998-06-01 | 1999-12-02 | Nokia Mobile Phones Ltd | Menetelmä sulautetun järjestelmän ohjelmiston suojaamiseksi ja sulautettu järjestelmä |
| DE10000503A1 (de) * | 2000-01-08 | 2001-07-12 | Philips Corp Intellectual Pty | Datenverarbeitungseinrichtung und Verfahren zu dessen Betrieb |
| CN1162783C (zh) * | 2001-11-09 | 2004-08-18 | 汪文虎 | 一种信息安全方法 |
| US20050223241A1 (en) * | 2002-06-14 | 2005-10-06 | Matsushita Electric Industrial Co. Ltd | Semiconductor intergrated circuit device, data storage verification device, and data storage verification method |
| US7725740B2 (en) | 2003-05-23 | 2010-05-25 | Nagravision S.A. | Generating a root key for decryption of a transmission key allowing secure communications |
| DE102006057297A1 (de) * | 2006-12-05 | 2008-06-12 | Giesecke & Devrient Gmbh | Verfahren zur Überwachung des Ablaufs eines Programms |
| CN114764347B (zh) * | 2022-04-14 | 2024-09-27 | 重庆长安汽车股份有限公司 | 一种多核控制器的程序校验系统、校验方法及存储介质 |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE2650795A1 (de) * | 1976-11-03 | 1978-05-11 | Licentia Gmbh | Verfahren zur ueberwachung des speicherinhaltes eines rechners |
| US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
| JPS6054046A (ja) * | 1983-09-05 | 1985-03-28 | Mitsubishi Electric Corp | ソフトウエア保護方法 |
| DE3335387A1 (de) * | 1983-09-29 | 1985-04-11 | Siemens Ag | Verfahren zur verhinderung des ablaufs eines programms auf fuer den ablauf dieses programms nicht zugelassenen rechnern |
-
1987
- 1987-02-23 DE DE19873705736 patent/DE3705736A1/de active Granted
-
1988
- 1988-01-20 AT AT88100810T patent/ATE103402T1/de not_active IP Right Cessation
- 1988-01-20 EP EP88100810A patent/EP0280035B1/de not_active Expired - Lifetime
- 1988-01-20 DE DE88100810T patent/DE3888556D1/de not_active Expired - Fee Related
- 1988-01-20 ES ES88100810T patent/ES2050671T3/es not_active Expired - Lifetime
- 1988-02-23 JP JP63040545A patent/JP2564593B2/ja not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8732480B2 (en) | 2010-09-24 | 2014-05-20 | Kabushiki Kaisha Toshiba | Memory management device and memory management method |
Also Published As
| Publication number | Publication date |
|---|---|
| EP0280035A2 (de) | 1988-08-31 |
| DE3705736C2 (enExample) | 1988-12-01 |
| ATE103402T1 (de) | 1994-04-15 |
| EP0280035A3 (en) | 1990-05-16 |
| JPS63240629A (ja) | 1988-10-06 |
| DE3888556D1 (de) | 1994-04-28 |
| DE3705736A1 (de) | 1988-09-01 |
| ES2050671T3 (es) | 1994-06-01 |
| EP0280035B1 (de) | 1994-03-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5224160A (en) | Process for securing and for checking the integrity of the secured programs | |
| CN111095213B (zh) | 嵌入式程序的安全引导方法、装置、设备及存储介质 | |
| CN101894224B (zh) | 保护客户端平台上的内容 | |
| JP2564593B2 (ja) | プログラムを機密保護し且つ機密保護されたプログラムを保全制御する方法 | |
| US11132468B2 (en) | Security processing unit of PLC and bus arbitration method thereof | |
| TWI438686B (zh) | 用於使用狀態確認來保護作業系統啟動過程的系統及方法 | |
| JP2710754B2 (ja) | チップ・カードのキーを保護する装置 | |
| US8407488B2 (en) | Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method | |
| JP4498735B2 (ja) | オペレーティングシステムおよびカスタマイズされた制御プログラムとインタフェースする安全なマシンプラットフォーム | |
| JP3689431B2 (ja) | 暗号化キーの安全処理のための方法及び装置 | |
| US8843766B2 (en) | Method and system for protecting against access to a machine code of a device | |
| US20080205651A1 (en) | Secure processor system without need for manufacturer and user to know encryption information of each other | |
| KR100792287B1 (ko) | 자체 생성한 암호화키를 이용한 보안방법 및 이를 적용한보안장치 | |
| CN103038745A (zh) | 扩展完整性测量 | |
| CN101427259A (zh) | 对软件版本的安装的授权 | |
| KR20090095843A (ko) | 보안 기능을 갖는 프로세서 장치 | |
| US20060080537A1 (en) | Illegal analysis / falsification preventing system | |
| US5561767A (en) | Safety critical processor and processing method for a data processing system | |
| KR20180007717A (ko) | 이중보안기능을 가지는 SoC 및 SoC의 이중보안방법 | |
| JP4791250B2 (ja) | マイクロコンピュータおよびそのソフトウェア改竄防止方法 | |
| US10796007B2 (en) | Method for operating semiconductor device, capable of dumping a memory with security | |
| CN112861137A (zh) | 安全固件 | |
| EP0962850A2 (en) | A method for protecting embedded system software and embedded system | |
| CN114816549B (zh) | 一种保护bootloader及其环境变量的方法及系统 | |
| CN108345804A (zh) | 一种可信计算环境中的存储方法和装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| LAPS | Cancellation because of no payment of annual fees |