MY136255A - Hacking susceptibility - Google Patents

Hacking susceptibility

Info

Publication number
MY136255A
MY136255A MYPI20012701A MY136255A MY 136255 A MY136255 A MY 136255A MY PI20012701 A MYPI20012701 A MY PI20012701A MY 136255 A MY136255 A MY 136255A
Authority
MY
Malaysia
Prior art keywords
private
public key
key pair
generated
secure hardware
Prior art date
Application number
Inventor
Wayne Roger Hucaby
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Publication of MY136255A publication Critical patent/MY136255A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

DISCLOSED IS A METHOD AND SYSTEM FOR REDUCING THE SUSCEPTIBILITY OF HACKING A PRIVATE KEY OF A PRIVATE/PUBLIC KEY PAIR. THE PRIVATE/PUBLIC KEY PAIR IS GENERATED OR PLACE INSIDE SECURE HARDWARE (302) INSIDE A FISCAL PRINTER (441) AT THE TIME OF MANUFACTURE. THE PUBLIC KEY IS SENT EXTERNAL TO THE FISCAL PRINTER TO ALL "NEED TO KNOW" USERS. THE SECURE HARDWARE HAS ALGORITHMS THAT DETERMINE THE VIABILITY OF A GENERATED PRIVATE/PUBLIC KEY PAIR BY ANALYZING INPUTTED PARAMETRIC DATA COMPRISING TECHNOLOGY ADVANCES, LENGTH TIME A KEY PAIR HAS BEEN IN EXISTENCE, ECONOMIC FACTORS, SECURITY VALUE OF PROTECTED DATA, ETC. PRIVATE/PUBLIC KEY PAIRS ARE CONTINUOUSLY TESTED AND NEW PAIRS ARE GENERATED WHEREBY AN OPTIMIZATION IS MAINTAINED REGARDING THE VIABILITY OF AN EXISTING KEY PAIR AND PARAMETRIC FACTORS. ALSO DISCLOSED IS A METHOD AND SYSTEM FOR ERASING A GENERATED PRIVATE KEY IF THE SECURE HARDWARE OF A FISCAL PRINTER IS TAMPERED WITH OR ENTERED IN AN UNAUTHORIZED MANNER.FIG.2
MYPI20012701 2000-06-16 2001-06-11 Hacking susceptibility MY136255A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US59597300A 2000-06-16 2000-06-16

Publications (1)

Publication Number Publication Date
MY136255A true MY136255A (en) 2008-09-30

Family

ID=24385468

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI20012701 MY136255A (en) 2000-06-16 2001-06-11 Hacking susceptibility

Country Status (5)

Country Link
EP (1) EP1290822A2 (en)
AU (1) AU2001276363A1 (en)
CA (1) CA2405613A1 (en)
MY (1) MY136255A (en)
WO (1) WO2001097441A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10255053A1 (en) * 2002-09-10 2004-03-18 Wincor Nixdorf International Gmbh Printer, especially a voucher printer for secure printing of transactions arising from a payment till or automatic cash dispenser, has a cryptographic unit for processing a cryptographic signature received with the print data
US8214296B2 (en) 2006-02-14 2012-07-03 Microsoft Corporation Disaggregated secure execution environment
US9819495B2 (en) 2014-10-02 2017-11-14 Qualcomm Incorporated Systems and methods of dynamically adapting security certificate-key pair generation
JP2016116134A (en) * 2014-12-16 2016-06-23 パナソニックIpマネジメント株式会社 Signature verification device, signature generation device, signature processing system, signature verification method, and signature generation method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199049B1 (en) * 1998-09-30 2001-03-06 International Business Machines Corporation Verifiable electronic journal for a point of sale device and methods for using the same

Also Published As

Publication number Publication date
WO2001097441A2 (en) 2001-12-20
AU2001276363A1 (en) 2001-12-24
WO2001097441A3 (en) 2002-05-16
EP1290822A2 (en) 2003-03-12
CA2405613A1 (en) 2001-12-20

Similar Documents

Publication Publication Date Title
WO1998059457A3 (en) Method and system for performing secure electronic monetary transactions
NO970084L (en) Procedure for the secure use of digital signatures in a commercial cryptography system
TWI268688B (en) System and method for acoustic two factor authentication
CA2197027A1 (en) Apparatus and method to provide security for a keypad processor of a transaction terminal
WO2003048906A3 (en) System and method for secure replacement of the master key in a personal security device
AU2002212345A1 (en) Method and system for web-based cross-domain single-sign-on authentication
WO2002056155A3 (en) Security system for preventing a personal computer from being used by unauthorized people
IL160757A0 (en) Virus detection system
ATE346333T1 (en) METHOD AND APPARATUS FOR MANAGING SECURITY-SENSITIVE COLLABORATIVE TRANSACTIONS
CN110446105A (en) Video-encryption, decryption method and device
WO2004027622A3 (en) Method and system for secure distribution
CN116090024B (en) Reliable data storage device, system and method
CN111259079A (en) Block chain-based limited personal data sharing and trading method
MY136255A (en) Hacking susceptibility
CN109918921A (en) A kind of network communication data concerning security matters detection method
CN116579006A (en) Key data destruction method and system and electronic equipment
Saini A survey on watermarking web contents for protecting copyright
Awodiran et al. Cybercrime consciousness among undergraduate students
Bernhard Breaching system security
SE9202427D0 (en) SETTING AND DEVICE FOR THE PREVENTION OF UNAUTHORIZED ACCESS TO COMPUTER SYSTEM
WO2000059286A3 (en) Method and system for administrating context
TH73320A (en) Ease of penetration into computer systems
Souvignet et al. From Lucky Luke to Lock Bits
Mandal et al. Information Hiding in Text Steganography: A Different Approach
Henson et al. End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk