MY136255A - Hacking susceptibility - Google Patents
Hacking susceptibilityInfo
- Publication number
- MY136255A MY136255A MYPI20012701A MY136255A MY 136255 A MY136255 A MY 136255A MY PI20012701 A MYPI20012701 A MY PI20012701A MY 136255 A MY136255 A MY 136255A
- Authority
- MY
- Malaysia
- Prior art keywords
- private
- public key
- key pair
- generated
- secure hardware
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
DISCLOSED IS A METHOD AND SYSTEM FOR REDUCING THE SUSCEPTIBILITY OF HACKING A PRIVATE KEY OF A PRIVATE/PUBLIC KEY PAIR. THE PRIVATE/PUBLIC KEY PAIR IS GENERATED OR PLACE INSIDE SECURE HARDWARE (302) INSIDE A FISCAL PRINTER (441) AT THE TIME OF MANUFACTURE. THE PUBLIC KEY IS SENT EXTERNAL TO THE FISCAL PRINTER TO ALL "NEED TO KNOW" USERS. THE SECURE HARDWARE HAS ALGORITHMS THAT DETERMINE THE VIABILITY OF A GENERATED PRIVATE/PUBLIC KEY PAIR BY ANALYZING INPUTTED PARAMETRIC DATA COMPRISING TECHNOLOGY ADVANCES, LENGTH TIME A KEY PAIR HAS BEEN IN EXISTENCE, ECONOMIC FACTORS, SECURITY VALUE OF PROTECTED DATA, ETC. PRIVATE/PUBLIC KEY PAIRS ARE CONTINUOUSLY TESTED AND NEW PAIRS ARE GENERATED WHEREBY AN OPTIMIZATION IS MAINTAINED REGARDING THE VIABILITY OF AN EXISTING KEY PAIR AND PARAMETRIC FACTORS. ALSO DISCLOSED IS A METHOD AND SYSTEM FOR ERASING A GENERATED PRIVATE KEY IF THE SECURE HARDWARE OF A FISCAL PRINTER IS TAMPERED WITH OR ENTERED IN AN UNAUTHORIZED MANNER.FIG.2
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59597300A | 2000-06-16 | 2000-06-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
MY136255A true MY136255A (en) | 2008-09-30 |
Family
ID=24385468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI20012701 MY136255A (en) | 2000-06-16 | 2001-06-11 | Hacking susceptibility |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1290822A2 (en) |
AU (1) | AU2001276363A1 (en) |
CA (1) | CA2405613A1 (en) |
MY (1) | MY136255A (en) |
WO (1) | WO2001097441A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10255053A1 (en) * | 2002-09-10 | 2004-03-18 | Wincor Nixdorf International Gmbh | Printer, especially a voucher printer for secure printing of transactions arising from a payment till or automatic cash dispenser, has a cryptographic unit for processing a cryptographic signature received with the print data |
US8214296B2 (en) | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
US9819495B2 (en) | 2014-10-02 | 2017-11-14 | Qualcomm Incorporated | Systems and methods of dynamically adapting security certificate-key pair generation |
JP2016116134A (en) * | 2014-12-16 | 2016-06-23 | パナソニックIpマネジメント株式会社 | Signature verification device, signature generation device, signature processing system, signature verification method, and signature generation method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6199049B1 (en) * | 1998-09-30 | 2001-03-06 | International Business Machines Corporation | Verifiable electronic journal for a point of sale device and methods for using the same |
-
2001
- 2001-06-11 MY MYPI20012701 patent/MY136255A/en unknown
- 2001-06-13 AU AU2001276363A patent/AU2001276363A1/en not_active Abandoned
- 2001-06-13 EP EP01953977A patent/EP1290822A2/en not_active Withdrawn
- 2001-06-13 WO PCT/EP2001/006668 patent/WO2001097441A2/en not_active Application Discontinuation
- 2001-06-13 CA CA002405613A patent/CA2405613A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
EP1290822A2 (en) | 2003-03-12 |
WO2001097441A2 (en) | 2001-12-20 |
AU2001276363A1 (en) | 2001-12-24 |
WO2001097441A3 (en) | 2002-05-16 |
CA2405613A1 (en) | 2001-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
NO970084L (en) | Procedure for the secure use of digital signatures in a commercial cryptography system | |
CA2197027A1 (en) | Apparatus and method to provide security for a keypad processor of a transaction terminal | |
WO2003048906A3 (en) | System and method for secure replacement of the master key in a personal security device | |
WO2002056155A3 (en) | Security system for preventing a personal computer from being used by unauthorized people | |
WO2004061628A3 (en) | Attestation using both fixed token and portable token | |
IL160757A0 (en) | Virus detection system | |
ATE346333T1 (en) | METHOD AND APPARATUS FOR MANAGING SECURITY-SENSITIVE COLLABORATIVE TRANSACTIONS | |
HK1090998A1 (en) | Portable security transaction protocol | |
CN110446105A (en) | Video-encryption, decryption method and device | |
WO2004027622A3 (en) | Method and system for secure distribution | |
CN116090024B (en) | Reliable data storage device, system and method | |
CN109543432A (en) | Facial image encrypts anti-tamper and retrieval method in a kind of video | |
CN111259079A (en) | Block chain-based limited personal data sharing and trading method | |
MY136255A (en) | Hacking susceptibility | |
CN109918921A (en) | A kind of network communication data concerning security matters detection method | |
Saini | A survey on watermarking web contents for protecting copyright | |
Awodiran et al. | Cybercrime consciousness among undergraduate students | |
SE9202427D0 (en) | SETTING AND DEVICE FOR THE PREVENTION OF UNAUTHORIZED ACCESS TO COMPUTER SYSTEM | |
TH73320A (en) | Ease of penetration into computer systems | |
Souvignet et al. | From Lucky Luke to Lock Bits | |
Henson et al. | End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk | |
McKenna | Security technology fundamentally flawed, says ex White House CIO | |
Venumula et al. | High Data Security Using Asymmetric Key Cryptography and Linguistic Method Steganography | |
Steinman | Diversinet follows old-world example | |
CN115906175A (en) | Consumption data management method, system and equipment supporting privacy protection |