RU2249247C2 - Защита ядра вычислительного устройства от несанкционированных изменений извне - Google Patents
Защита ядра вычислительного устройства от несанкционированных изменений извне Download PDFInfo
- Publication number
- RU2249247C2 RU2249247C2 RU2001130347/09A RU2001130347A RU2249247C2 RU 2249247 C2 RU2249247 C2 RU 2249247C2 RU 2001130347/09 A RU2001130347/09 A RU 2001130347/09A RU 2001130347 A RU2001130347 A RU 2001130347A RU 2249247 C2 RU2249247 C2 RU 2249247C2
- Authority
- RU
- Russia
- Prior art keywords
- checksum
- command
- execution
- contents
- processor
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mathematical Physics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Detection And Correction Of Errors (AREA)
- Executing Machine-Instructions (AREA)
- Hardware Redundancy (AREA)
- Information Transfer Systems (AREA)
- Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
- Saccharide Compounds (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19918620A DE19918620A1 (de) | 1999-04-23 | 1999-04-23 | Sicherung eines Rechnerkerns gegen äußere Manipulationen |
| DE19918620.0 | 1999-04-23 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| RU2001130347A RU2001130347A (ru) | 2003-08-20 |
| RU2249247C2 true RU2249247C2 (ru) | 2005-03-27 |
Family
ID=7905707
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| RU2001130347/09A RU2249247C2 (ru) | 1999-04-23 | 2000-04-19 | Защита ядра вычислительного устройства от несанкционированных изменений извне |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US6959391B1 (enExample) |
| EP (1) | EP1190319B1 (enExample) |
| JP (1) | JP4693245B2 (enExample) |
| CN (1) | CN1173264C (enExample) |
| AT (1) | ATE235082T1 (enExample) |
| AU (1) | AU4552600A (enExample) |
| DE (2) | DE19918620A1 (enExample) |
| ES (1) | ES2190966T3 (enExample) |
| RU (1) | RU2249247C2 (enExample) |
| WO (1) | WO2000065442A1 (enExample) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2327048A1 (en) * | 2000-11-28 | 2002-05-28 | Olivier Benoit | Method for verifying data integrity in electronic device data processing |
| DE10105987A1 (de) | 2001-02-09 | 2002-08-29 | Infineon Technologies Ag | Datenverarbeitungsvorrichtung |
| DE10122505A1 (de) * | 2001-05-10 | 2002-11-14 | Giesecke & Devrient Gmbh | Verfahren zum Schützen eines Rechners gegen Manipulation von Registerinhalten und Rechner zum Durchführen des Verfahrens |
| US7363547B2 (en) * | 2003-07-09 | 2008-04-22 | Stmicroeletronics S.A. | Error-detection cell for an integrated processor |
| RU2265241C2 (ru) * | 2004-01-20 | 2005-11-27 | Ардашев Дмитрий Васильевич | Способ вызова процедуры на основе двойного стека |
| DE102004021088A1 (de) * | 2004-04-29 | 2005-11-17 | Giesecke & Devrient Gmbh | Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe |
| KR20060067584A (ko) * | 2004-12-15 | 2006-06-20 | 삼성전자주식회사 | 해킹 방지 기능이 있는 스마트 카드 |
| DE102005016801B4 (de) * | 2005-04-12 | 2018-04-26 | Robert Bosch Gmbh | Verfahren und Rechnereinheit zur Fehlererkennung und Fehlerprotokollierung in einem Speicher |
| DE102006037810A1 (de) | 2006-08-11 | 2008-02-14 | Giesecke & Devrient Gmbh | Sichere Programmcodeausführung |
| US20090187507A1 (en) * | 2006-12-20 | 2009-07-23 | Brown Kerry D | Secure financial transaction network |
| US8549260B2 (en) * | 2009-01-29 | 2013-10-01 | Infineon Technologies Ag | Apparatus for processing data and method for generating manipulated and re-manipulated configuration data for processor |
| EP2262259A1 (en) | 2009-06-08 | 2010-12-15 | Nagravision S.A. | Method for monitoring execution of data processing program instructions in a security module |
| CN105117298A (zh) * | 2015-08-10 | 2015-12-02 | 中颖电子股份有限公司 | 一种用于显屏驱动芯片的静电释放保护系统以及方法 |
| US11386234B2 (en) * | 2019-12-17 | 2022-07-12 | Nuvoton Technology Corporation | Security systems and methods for integrated circuits |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4727544A (en) * | 1986-06-05 | 1988-02-23 | Bally Manufacturing Corporation | Memory integrity checking system for a gaming device |
| RU2067313C1 (ru) * | 1995-03-29 | 1996-09-27 | Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" | Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм |
| RU96119983A (ru) * | 1995-02-08 | 1998-12-27 | Сега Энтерпрайсиз, Лтд. | Устройство обработки информации с функцией защитного контроля |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE3644248A1 (de) * | 1986-12-23 | 1988-07-07 | Siemens Ag | Verfahren zur ueberwachung des programmlaufs eines mikroprozessors |
| JPH03124278A (ja) * | 1989-10-04 | 1991-05-27 | Fukoku:Kk | 超音波モータ |
| JPH052654A (ja) * | 1991-06-25 | 1993-01-08 | Nissan Motor Co Ltd | マイクロコンピユータの故障検知方法および回路 |
| JP3013868B2 (ja) * | 1992-09-02 | 2000-02-28 | 船井電機株式会社 | コードレス電話におけるメモリ揮発防止システム |
| DE19610976A1 (de) * | 1995-04-05 | 1996-10-17 | Siemens Ag | Verfahren zum Erkennen von Computerviren |
| WO1997004394A1 (en) * | 1995-07-14 | 1997-02-06 | Christopher Nathan Drake | Computer software authentication, protection, and security system |
-
1999
- 1999-04-23 DE DE19918620A patent/DE19918620A1/de not_active Withdrawn
-
2000
- 2000-04-19 DE DE50001510T patent/DE50001510D1/de not_active Expired - Lifetime
- 2000-04-19 AU AU45526/00A patent/AU4552600A/en not_active Abandoned
- 2000-04-19 CN CNB008066345A patent/CN1173264C/zh not_active Expired - Fee Related
- 2000-04-19 RU RU2001130347/09A patent/RU2249247C2/ru not_active IP Right Cessation
- 2000-04-19 ES ES00926991T patent/ES2190966T3/es not_active Expired - Lifetime
- 2000-04-19 US US09/926,376 patent/US6959391B1/en not_active Expired - Lifetime
- 2000-04-19 JP JP2000614120A patent/JP4693245B2/ja not_active Expired - Fee Related
- 2000-04-19 WO PCT/EP2000/003530 patent/WO2000065442A1/de not_active Ceased
- 2000-04-19 AT AT00926991T patent/ATE235082T1/de not_active IP Right Cessation
- 2000-04-19 EP EP00926991A patent/EP1190319B1/de not_active Expired - Lifetime
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4727544A (en) * | 1986-06-05 | 1988-02-23 | Bally Manufacturing Corporation | Memory integrity checking system for a gaming device |
| RU96119983A (ru) * | 1995-02-08 | 1998-12-27 | Сега Энтерпрайсиз, Лтд. | Устройство обработки информации с функцией защитного контроля |
| RU2067313C1 (ru) * | 1995-03-29 | 1996-09-27 | Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" | Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм |
Also Published As
| Publication number | Publication date |
|---|---|
| JP4693245B2 (ja) | 2011-06-01 |
| US6959391B1 (en) | 2005-10-25 |
| ATE235082T1 (de) | 2003-04-15 |
| DE50001510D1 (de) | 2003-04-24 |
| CN1348562A (zh) | 2002-05-08 |
| DE19918620A1 (de) | 2000-10-26 |
| EP1190319A1 (de) | 2002-03-27 |
| ES2190966T3 (es) | 2003-09-01 |
| JP2002543492A (ja) | 2002-12-17 |
| EP1190319B1 (de) | 2003-03-19 |
| CN1173264C (zh) | 2004-10-27 |
| AU4552600A (en) | 2000-11-10 |
| WO2000065442A1 (de) | 2000-11-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| RU2249247C2 (ru) | Защита ядра вычислительного устройства от несанкционированных изменений извне | |
| US6202176B1 (en) | Method of monitoring the correct execution of software programs | |
| US5860099A (en) | Stored program system with protected memory and secure signature extraction | |
| CA1153474A (en) | Hardware memory write lock circuit | |
| US4405982A (en) | Arrangement for monitoring the function of a programmable electronic switching circuit | |
| US4763296A (en) | Watchdog timer | |
| US5249294A (en) | Determination of time of execution of predetermined data processing routing in relation to occurrence of prior externally observable event | |
| US5559992A (en) | Apparatus and method for protecting data in a memory address range | |
| US7228463B2 (en) | Method to secure the execution of a program against attacks by radiation or other | |
| CA2037857C (en) | Prevention of determination of time of execution of predetermined data processing routine in relation to occurrence of prior observable external event | |
| KR20010042797A (ko) | 액세스 제어 기능을 가지는 주변 장치 | |
| KR100578459B1 (ko) | 예측 불가능 마이크로프로세서 또는 마이크로컴퓨터 | |
| US20070136565A1 (en) | Stack underflow debug with sticky base | |
| RU2001130347A (ru) | Защита ядра вычислительного устройства от несанкционированных изменений извне | |
| CN1488090A (zh) | 在基于微处理器的电子模块中安全执行程序的方法,以及相关电子模块和微电路卡 | |
| US5440604A (en) | Counter malfunction detection using prior, current and predicted parity | |
| US8161293B2 (en) | Protection of the execution of a program executed by an integrated circuit | |
| CN113434247B (zh) | 一种java卡虚拟机的安全防护方法 | |
| US20040098608A1 (en) | Processor secured against traps | |
| JPS62106552A (ja) | ル−プ検出装置 | |
| JP7247638B2 (ja) | 電子情報記憶媒体、icカード、改竄チェック方法、及びプログラム | |
| JPS63163943A (ja) | メモリ書き込み制御方法 | |
| JPH0471218B2 (enExample) | ||
| US20210049261A1 (en) | Method for activating sensors in a multi-unit device | |
| JP2002366391A (ja) | Cpu異常監視装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | The patent is invalid due to non-payment of fees |
Effective date: 20070420 |