RU2249247C2 - Защита ядра вычислительного устройства от несанкционированных изменений извне - Google Patents

Защита ядра вычислительного устройства от несанкционированных изменений извне Download PDF

Info

Publication number
RU2249247C2
RU2249247C2 RU2001130347/09A RU2001130347A RU2249247C2 RU 2249247 C2 RU2249247 C2 RU 2249247C2 RU 2001130347/09 A RU2001130347/09 A RU 2001130347/09A RU 2001130347 A RU2001130347 A RU 2001130347A RU 2249247 C2 RU2249247 C2 RU 2249247C2
Authority
RU
Russia
Prior art keywords
checksum
command
execution
contents
processor
Prior art date
Application number
RU2001130347/09A
Other languages
English (en)
Russian (ru)
Other versions
RU2001130347A (ru
Inventor
Михаэль БАЛЬДИШВАЙЛЕР (DE)
Михаэль БАЛЬДИШВАЙЛЕР
Original Assignee
Гизеке Унд Девриент Гмбх
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Гизеке Унд Девриент Гмбх filed Critical Гизеке Унд Девриент Гмбх
Publication of RU2001130347A publication Critical patent/RU2001130347A/ru
Application granted granted Critical
Publication of RU2249247C2 publication Critical patent/RU2249247C2/ru

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Detection And Correction Of Errors (AREA)
  • Executing Machine-Instructions (AREA)
  • Hardware Redundancy (AREA)
  • Information Transfer Systems (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
  • Saccharide Compounds (AREA)
RU2001130347/09A 1999-04-23 2000-04-19 Защита ядра вычислительного устройства от несанкционированных изменений извне RU2249247C2 (ru)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19918620A DE19918620A1 (de) 1999-04-23 1999-04-23 Sicherung eines Rechnerkerns gegen äußere Manipulationen
DE19918620.0 1999-04-23

Publications (2)

Publication Number Publication Date
RU2001130347A RU2001130347A (ru) 2003-08-20
RU2249247C2 true RU2249247C2 (ru) 2005-03-27

Family

ID=7905707

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2001130347/09A RU2249247C2 (ru) 1999-04-23 2000-04-19 Защита ядра вычислительного устройства от несанкционированных изменений извне

Country Status (10)

Country Link
US (1) US6959391B1 (enExample)
EP (1) EP1190319B1 (enExample)
JP (1) JP4693245B2 (enExample)
CN (1) CN1173264C (enExample)
AT (1) ATE235082T1 (enExample)
AU (1) AU4552600A (enExample)
DE (2) DE19918620A1 (enExample)
ES (1) ES2190966T3 (enExample)
RU (1) RU2249247C2 (enExample)
WO (1) WO2000065442A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327048A1 (en) * 2000-11-28 2002-05-28 Olivier Benoit Method for verifying data integrity in electronic device data processing
DE10105987A1 (de) 2001-02-09 2002-08-29 Infineon Technologies Ag Datenverarbeitungsvorrichtung
DE10122505A1 (de) * 2001-05-10 2002-11-14 Giesecke & Devrient Gmbh Verfahren zum Schützen eines Rechners gegen Manipulation von Registerinhalten und Rechner zum Durchführen des Verfahrens
US7363547B2 (en) * 2003-07-09 2008-04-22 Stmicroeletronics S.A. Error-detection cell for an integrated processor
RU2265241C2 (ru) * 2004-01-20 2005-11-27 Ардашев Дмитрий Васильевич Способ вызова процедуры на основе двойного стека
DE102004021088A1 (de) * 2004-04-29 2005-11-17 Giesecke & Devrient Gmbh Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe
KR20060067584A (ko) * 2004-12-15 2006-06-20 삼성전자주식회사 해킹 방지 기능이 있는 스마트 카드
DE102005016801B4 (de) * 2005-04-12 2018-04-26 Robert Bosch Gmbh Verfahren und Rechnereinheit zur Fehlererkennung und Fehlerprotokollierung in einem Speicher
DE102006037810A1 (de) 2006-08-11 2008-02-14 Giesecke & Devrient Gmbh Sichere Programmcodeausführung
US20090187507A1 (en) * 2006-12-20 2009-07-23 Brown Kerry D Secure financial transaction network
US8549260B2 (en) * 2009-01-29 2013-10-01 Infineon Technologies Ag Apparatus for processing data and method for generating manipulated and re-manipulated configuration data for processor
EP2262259A1 (en) 2009-06-08 2010-12-15 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
CN105117298A (zh) * 2015-08-10 2015-12-02 中颖电子股份有限公司 一种用于显屏驱动芯片的静电释放保护系统以及方法
US11386234B2 (en) * 2019-12-17 2022-07-12 Nuvoton Technology Corporation Security systems and methods for integrated circuits

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device
RU2067313C1 (ru) * 1995-03-29 1996-09-27 Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм
RU96119983A (ru) * 1995-02-08 1998-12-27 Сега Энтерпрайсиз, Лтд. Устройство обработки информации с функцией защитного контроля

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3644248A1 (de) * 1986-12-23 1988-07-07 Siemens Ag Verfahren zur ueberwachung des programmlaufs eines mikroprozessors
JPH03124278A (ja) * 1989-10-04 1991-05-27 Fukoku:Kk 超音波モータ
JPH052654A (ja) * 1991-06-25 1993-01-08 Nissan Motor Co Ltd マイクロコンピユータの故障検知方法および回路
JP3013868B2 (ja) * 1992-09-02 2000-02-28 船井電機株式会社 コードレス電話におけるメモリ揮発防止システム
DE19610976A1 (de) * 1995-04-05 1996-10-17 Siemens Ag Verfahren zum Erkennen von Computerviren
WO1997004394A1 (en) * 1995-07-14 1997-02-06 Christopher Nathan Drake Computer software authentication, protection, and security system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device
RU96119983A (ru) * 1995-02-08 1998-12-27 Сега Энтерпрайсиз, Лтд. Устройство обработки информации с функцией защитного контроля
RU2067313C1 (ru) * 1995-03-29 1996-09-27 Акционерное общество закрытого типа "Особое конструкторское бюро систем автоматизированного проектирования" Устройство защиты от несанкционированного доступа к информации, хранимой в персональной эвм

Also Published As

Publication number Publication date
JP4693245B2 (ja) 2011-06-01
US6959391B1 (en) 2005-10-25
ATE235082T1 (de) 2003-04-15
DE50001510D1 (de) 2003-04-24
CN1348562A (zh) 2002-05-08
DE19918620A1 (de) 2000-10-26
EP1190319A1 (de) 2002-03-27
ES2190966T3 (es) 2003-09-01
JP2002543492A (ja) 2002-12-17
EP1190319B1 (de) 2003-03-19
CN1173264C (zh) 2004-10-27
AU4552600A (en) 2000-11-10
WO2000065442A1 (de) 2000-11-02

Similar Documents

Publication Publication Date Title
RU2249247C2 (ru) Защита ядра вычислительного устройства от несанкционированных изменений извне
US6202176B1 (en) Method of monitoring the correct execution of software programs
US5860099A (en) Stored program system with protected memory and secure signature extraction
CA1153474A (en) Hardware memory write lock circuit
US4405982A (en) Arrangement for monitoring the function of a programmable electronic switching circuit
US4763296A (en) Watchdog timer
US5249294A (en) Determination of time of execution of predetermined data processing routing in relation to occurrence of prior externally observable event
US5559992A (en) Apparatus and method for protecting data in a memory address range
US7228463B2 (en) Method to secure the execution of a program against attacks by radiation or other
CA2037857C (en) Prevention of determination of time of execution of predetermined data processing routine in relation to occurrence of prior observable external event
KR20010042797A (ko) 액세스 제어 기능을 가지는 주변 장치
KR100578459B1 (ko) 예측 불가능 마이크로프로세서 또는 마이크로컴퓨터
US20070136565A1 (en) Stack underflow debug with sticky base
RU2001130347A (ru) Защита ядра вычислительного устройства от несанкционированных изменений извне
CN1488090A (zh) 在基于微处理器的电子模块中安全执行程序的方法,以及相关电子模块和微电路卡
US5440604A (en) Counter malfunction detection using prior, current and predicted parity
US8161293B2 (en) Protection of the execution of a program executed by an integrated circuit
CN113434247B (zh) 一种java卡虚拟机的安全防护方法
US20040098608A1 (en) Processor secured against traps
JPS62106552A (ja) ル−プ検出装置
JP7247638B2 (ja) 電子情報記憶媒体、icカード、改竄チェック方法、及びプログラム
JPS63163943A (ja) メモリ書き込み制御方法
JPH0471218B2 (enExample)
US20210049261A1 (en) Method for activating sensors in a multi-unit device
JP2002366391A (ja) Cpu異常監視装置

Legal Events

Date Code Title Description
MM4A The patent is invalid due to non-payment of fees

Effective date: 20070420