MY136255A - Hacking susceptibility - Google Patents
Hacking susceptibilityInfo
- Publication number
- MY136255A MY136255A MYPI20012701A MY136255A MY 136255 A MY136255 A MY 136255A MY PI20012701 A MYPI20012701 A MY PI20012701A MY 136255 A MY136255 A MY 136255A
- Authority
- MY
- Malaysia
- Prior art keywords
- private
- public key
- key pair
- generated
- secure hardware
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
DISCLOSED IS A METHOD AND SYSTEM FOR REDUCING THE SUSCEPTIBILITY OF HACKING A PRIVATE KEY OF A PRIVATE/PUBLIC KEY PAIR. THE PRIVATE/PUBLIC KEY PAIR IS GENERATED OR PLACE INSIDE SECURE HARDWARE (302) INSIDE A FISCAL PRINTER (441) AT THE TIME OF MANUFACTURE. THE PUBLIC KEY IS SENT EXTERNAL TO THE FISCAL PRINTER TO ALL "NEED TO KNOW" USERS. THE SECURE HARDWARE HAS ALGORITHMS THAT DETERMINE THE VIABILITY OF A GENERATED PRIVATE/PUBLIC KEY PAIR BY ANALYZING INPUTTED PARAMETRIC DATA COMPRISING TECHNOLOGY ADVANCES, LENGTH TIME A KEY PAIR HAS BEEN IN EXISTENCE, ECONOMIC FACTORS, SECURITY VALUE OF PROTECTED DATA, ETC. PRIVATE/PUBLIC KEY PAIRS ARE CONTINUOUSLY TESTED AND NEW PAIRS ARE GENERATED WHEREBY AN OPTIMIZATION IS MAINTAINED REGARDING THE VIABILITY OF AN EXISTING KEY PAIR AND PARAMETRIC FACTORS. ALSO DISCLOSED IS A METHOD AND SYSTEM FOR ERASING A GENERATED PRIVATE KEY IF THE SECURE HARDWARE OF A FISCAL PRINTER IS TAMPERED WITH OR ENTERED IN AN UNAUTHORIZED MANNER.FIG.2
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59597300A | 2000-06-16 | 2000-06-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
MY136255A true MY136255A (en) | 2008-09-30 |
Family
ID=24385468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI20012701 MY136255A (en) | 2000-06-16 | 2001-06-11 | Hacking susceptibility |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1290822A2 (en) |
AU (1) | AU2001276363A1 (en) |
CA (1) | CA2405613A1 (en) |
MY (1) | MY136255A (en) |
WO (1) | WO2001097441A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10255053A1 (en) * | 2002-09-10 | 2004-03-18 | Wincor Nixdorf International Gmbh | Printer, especially a voucher printer for secure printing of transactions arising from a payment till or automatic cash dispenser, has a cryptographic unit for processing a cryptographic signature received with the print data |
US8214296B2 (en) | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
US9819495B2 (en) | 2014-10-02 | 2017-11-14 | Qualcomm Incorporated | Systems and methods of dynamically adapting security certificate-key pair generation |
JP2016116134A (en) * | 2014-12-16 | 2016-06-23 | パナソニックIpマネジメント株式会社 | Signature verification device, signature generation device, signature processing system, signature verification method, and signature generation method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6199049B1 (en) * | 1998-09-30 | 2001-03-06 | International Business Machines Corporation | Verifiable electronic journal for a point of sale device and methods for using the same |
-
2001
- 2001-06-11 MY MYPI20012701 patent/MY136255A/en unknown
- 2001-06-13 CA CA002405613A patent/CA2405613A1/en not_active Abandoned
- 2001-06-13 AU AU2001276363A patent/AU2001276363A1/en not_active Abandoned
- 2001-06-13 WO PCT/EP2001/006668 patent/WO2001097441A2/en not_active Application Discontinuation
- 2001-06-13 EP EP01953977A patent/EP1290822A2/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2001097441A2 (en) | 2001-12-20 |
AU2001276363A1 (en) | 2001-12-24 |
WO2001097441A3 (en) | 2002-05-16 |
EP1290822A2 (en) | 2003-03-12 |
CA2405613A1 (en) | 2001-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1998059457A3 (en) | Method and system for performing secure electronic monetary transactions | |
NO970084L (en) | Procedure for the secure use of digital signatures in a commercial cryptography system | |
TWI268688B (en) | System and method for acoustic two factor authentication | |
CA2197027A1 (en) | Apparatus and method to provide security for a keypad processor of a transaction terminal | |
WO2003048906A3 (en) | System and method for secure replacement of the master key in a personal security device | |
AU2002212345A1 (en) | Method and system for web-based cross-domain single-sign-on authentication | |
WO2002056155A3 (en) | Security system for preventing a personal computer from being used by unauthorized people | |
IL160757A0 (en) | Virus detection system | |
ATE346333T1 (en) | METHOD AND APPARATUS FOR MANAGING SECURITY-SENSITIVE COLLABORATIVE TRANSACTIONS | |
CN110446105A (en) | Video-encryption, decryption method and device | |
WO2004027622A3 (en) | Method and system for secure distribution | |
CN116090024B (en) | Reliable data storage device, system and method | |
CN111259079A (en) | Block chain-based limited personal data sharing and trading method | |
MY136255A (en) | Hacking susceptibility | |
CN109918921A (en) | A kind of network communication data concerning security matters detection method | |
CN116579006A (en) | Key data destruction method and system and electronic equipment | |
Saini | A survey on watermarking web contents for protecting copyright | |
Awodiran et al. | Cybercrime consciousness among undergraduate students | |
Bernhard | Breaching system security | |
SE9202427D0 (en) | SETTING AND DEVICE FOR THE PREVENTION OF UNAUTHORIZED ACCESS TO COMPUTER SYSTEM | |
WO2000059286A3 (en) | Method and system for administrating context | |
TH73320A (en) | Ease of penetration into computer systems | |
Souvignet et al. | From Lucky Luke to Lock Bits | |
Mandal et al. | Information Hiding in Text Steganography: A Different Approach | |
Henson et al. | End User Computing and Information Security: a retrospective look at the de-centralisation of data processing and emerging organisational information risk |