TW405098B - The security procedure of a security module and the related security module - Google Patents

The security procedure of a security module and the related security module Download PDF

Info

Publication number
TW405098B
TW405098B TW086119900A TW86119900A TW405098B TW 405098 B TW405098 B TW 405098B TW 086119900 A TW086119900 A TW 086119900A TW 86119900 A TW86119900 A TW 86119900A TW 405098 B TW405098 B TW 405098B
Authority
TW
Taiwan
Prior art keywords
test
security module
counter
induction
security
Prior art date
Application number
TW086119900A
Other languages
Chinese (zh)
Inventor
Michel Hazard
Original Assignee
Bull Cp8
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull Cp8 filed Critical Bull Cp8
Application granted granted Critical
Publication of TW405098B publication Critical patent/TW405098B/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1466Key-lock mechanism
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/0826Embedded security module

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention relates to a security procedure of a security module (8) designated to cooperate with an information processing device. The module being installed to execute an ensemble of operations including at least a sensible operation (23). According to the invention, the procedure comprising the steps consists of: execute, on the occasion of each execution of the sensible operation and in its up-steam portion, a first supplementary sequence of operations (22) designated at activating the signal device. And in the down-stream portion of the sensible operation, a second supplementary sequence of operations (24) designated at disactivating the signal device; verify, on the occasion of each execution of the sensible operation and in the up-stream portion of the first supplementary sequence of operations (22), if the signal devices are disactivated; interdict, in case the signal devices are activated, interdict the sensible operation.

Description

405098 B7 經濟部中央標準局員工消費合作社印製 五、發明説明( 1 ) 1 1 本 發 明 是 一 種 與 資 訊 處 理 裝 置 配 合 之 保 全 模 組 的 保 全 1 I 方 法 〇 此 模 組 包 括 資 訊 處 理 裝 置 以 及 資 訊 記 憶 裝 置 i 其 1 I 設置用來執行- -組作業, 其中包括至少- -個感應作業。 /-—^ 請 先 1 ! 感 作 吾 人 瞭 解 « 應 業 這 名 詞 是 指 所 有 的 作 業 其 執 行 對 下 閲 I 讀 1 列 事 項 重 要 的 反 應 背 Λ | 之 1 -- —* 般 性 的 保 全 尤 其 是 有 關 所 有 的 作 業 » 旨 在 查 核 注 意 1 事 1 某 人 進 入 某 些 資 訊 » 服 務 或 功 能 的 授 權 〇 項 再 填 1 —— 有 關 待 殊 的 應 用 尤 其 是 有 關 所 有 的 作 業 9 其 旨 在 寫 本 定 義 或 修 改 某 有 關 使 用 者 對 於 某 項 應 用 作 業 之 基 本 權 頁 s_^ 1 Γ 利 義 務 之 特 性 參 數 〇 此 項 應 用 作 業 I 例 如 銀 行 陣 ,/U&lt;、 用 9 旨 1 在 顯 露 帳 餘 額 的 作 業 〇 1 * I ”保全模组” 被 取 這 名 稱 9 在 其 古 典 意 義 是 指 在 資 訊 m 1 訂 I 或 通 信 m 之 中 的 一 項 裝 置 其 使 命 是 由 一 Μ 管 理 機 構 來 1 1 監 控 網 路 &gt; 以 及 儲 存 此 網 路 基 本 而 秘 密 參 數 之 保 護 之 方 1 1 法 ) 以 致 於 此 等 密 碼 之 匙 t 如 同 指 出 是 非 常 簡 β0 早 的 一 1 種 裝 置 t 給 與 網 路 上 各 種 各 樣 的 使 用 者 並 且 允 許 他 們 k I 每 一 個 人 進 入 此 網 路 〇 此 最 新 的 裝 置 能 夠 掌 握 此 等 秘 密 1 1 參 數 〇 此 保 全 模 組 可 以 以 可 攜 帶 的 物 件 9 如 I C卡的形式 1 1 出 現 〇 1 | 此 項 發 明 旨 在 解 決 的 問 題 是 ; 在 執 行 之 中 避 免 感 應 作 I I 業 的 中 斷 而 使 其 不 發 生 9 或 至 少 能 夠 控 制 可 能 出 現 中 斷 I 的 次 數 〇 此 項 發 明 尤 其 涉 及 欺 詐 作 弊 性 的 中 斷 i 不 過 i 1 也 没 有 排 除 外 的 中 斷 〇 這 危 3- 險 是 此 等 作 業 旨 在 保 全 執 1 1 1 I 1 本紙沬尺度適用中國國家標準(CNS ) A4現格(210X297公釐) 405098 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明( ) 1 1 行 上 述 所 有 的 作 業 9 在 此 它 是 有 關 1 例 如 使 用 者 所 提 出 1 I 的 密 碼 的 測 試 程 式 〇 它 是 有 關 於 比 較 結 果 之 登 錄 作 業 〇 1 1 而 它 是 為 了 達 到 限 制 被 授 權 允 許 試 次 數 的 巨 的 〇 如 果 ✓—S 請 1 1 I 欺 詐 作 弊 的 使 用 者 &gt; 终 於 能 在 fcb 較 結 果 之 後 f 但 在 登 錄 先 閲 I 結 果 之 前 中 止 此 程 式 ; 則 他 可 以 重 新 輸 入 許 許 多 多 次 新 背 $3 1 % ( 之 1 的 密 碼 而 可 能 利 用 在 保 全 模 組 終 端 掃 m 上 出 現 之 電 子 訊 注 意 1 事 1 號 之 觀 測 值 ; 而 這 電 子 訊 號 實 際 上 總 是 被 計 算 或 結 果 項 再 1 的 性 質 所 影 m 〇 如 果 能 獲 得 作 弊 的 使 用 者 以 如 此 觀 測 方 填 寫 本 1 式 而 所 儲 存 的 · 値 重 要 號 碼 » 以 及 一 痼 統 計 分 析 資 料 &gt; 頁 ______ 1 這 樣 就 可 能 辨 認 出 使 用 者 正 確 的 密 碼 〇 1 11 · 此 項 問 題 可 藉 由 此 發 明 而 獲 得 解 決 9 由 於 採 取 事 先 的 • 準 備 &gt; 而 由 保 全 模 組 所 允 許 的 查 核 措 施 來 判 別 t 是 否 一 訂 1 個 或 多 個 先 前 動 的 感 應 作 業 已 被 兀 全 執 行 〇 如 果 是 否 1 1 9 則 禁 止 執 行 更 多 的 此 後 之 感 應 作 業 〇 1 1 更 精 確 地 說 t 根 據 此 項 發 明 的 方 法 1 其 所 包 含 的 步 驟 1 包 括 線 1 - 執 行 9 在 執 行 每 項 感 應 作 業 以 及 其 上 游 作 業 之 中 1 1 9 一 個 第 一 項 作 業 補 充 程 序 &gt; 動 此 等 信 號 裝 置 〇 而 在 1 1 上 述 的 感 應 作 業 下 游 &gt; 第 二 項 作 業 補 充 程 序 中 止 上 述 的 ! | 信 號 裝 置 〇 1 I -- 登 記 入 帳 , 計 算 每 一 項 中 止 的 ¥ 試 $ 其 感 應 作 業 被 1 歆 動 参 但 未 被 執 行 9 而 使 得 信 號 裝 置 首 先 被 動 f 但 隨 j I 後 未 被 中 止 〇 以 便 定 義 一 個 觀 測 之 ¥ 試 中 止 次 數 h S 0 | - 4- 1 1 1 本紙張尺度適用中國國家標準(CNS ) Λ4規格(210X297公釐) 405098 A7 _ B7_ 五、發明説明(3 ) --定義一値允許I試中止次數nrsa。 (請先閲讀背面之注意事項再填寫本頁) --比較,當在執行每一個感應作業及在其上游,上述 觀測之嘗試中止次數hrs,以及上述被充許嘗試中止次數 nrsa° --中止,如果上述觀測之嘗試中止次數大於上述之被 允許嘗試中止次數,則中止感應作業。 此項發明也有關一種保金模組,其設置是用來執行此 種方法。 此項發明其他的細節和優點,出現在以下的描述,是 一種較理想受偏好的執行模式,但不僅限於此。其有關 的附圖如下: 圖式簡單說明 第一画是一保全模組的示意圖,其上指出此項發明, 而與一項資訊處理裝置配合。 第二圖是執行感應作業之程序方塊圖。 圖3a至3c及4a, 4b代表在執行一個或數個感應作業過 程之中,在不同的時刻,程序中止計數器CRS之狀態。 經濟部智慧財產局員工消費合作社印製 第一圖所代表的’資訊處理裝置1’其本身包括熟悉的方 式,一値黴處理器2,其被連接至一個記億體R0M3,以及 一値記憶體RAM4,及裝置5以便與保全模組8配合;以 及連接至一値傳輸介面7,以使得此資訊處理裝置能與其 他相似的裝置,以直接或經由通信網的方式.互通訊息。 装置1可能還配備了記億儲存裝置,如磁Η或可移動 -5- 本紙張尺度適用中國國家標準(CNS &gt; Α4規格(2丨ΟΧ297公釐) 經濟部中央標準局貝工消費合作社印製 405098 A7 _B7_ 五、發明説明(—) /不可移動磁碟。以及登錄裝置,像是一個鍵盤及/或老 鼠型式的標記裝置(滑鼠),及顯示裝置。這些不同的裝. 置沒有出現於第1圖。 此項資訊處理裝置也許全由資訊器材所組成,而裝設 於私人或公眾場所;以便適合於供應資訊管理設備或提 供各種資訊或服務。此種裝置可以是固定式的也可以是 攜帶式的,尤其可能是關於電信的裝置。 從另一方面而言,保全模組8包括資訊處理裝置9 , 内容不消失記億體組合10,以及裝置13,與此資訊處理 装置配合。此模組被設置用來定義規定,在記億體10之 内有一個秘密區域11。在其中資料一旦登錄,即無法從 模組之外進入,而只能從資訊處理裝置9進入;以及從 一自由區12,它能讓讀者從模組外進入及/或作資訊登錄 之用。每-記憶區可包含一個不可拭去的唯讀記億體ROM ,以及一個可拭去的記憶體EPROM, EEPR0M,或是由’快 閃式’的記億體RAM所組成。這即是說呈現出這種EEP ROM 的特性,以及還有進入此種傳統式RAM所須的時間。一 値内容可拭去的記億體RAM ,並未顯示,可從別處參考 〇 由於保全模組8 ,吾人尤其能使用一徹處理機來記億 不可消失而自動産生的電腦程式。就像在美國國家標準 4.382.279中所描述者。如同其中第一頁第5至17行 所示,此記億體之自動産生程式之特性。相對應到此可 ' -6- 本紙張尺度適用中國國家標準(CNS ) Λ4規格(210X297公釐) ΊI ; r V 裝 ^ I ^ I &quot; * 線 (請先閱讀背面之注意事項再填寫本頁' ) ' 經濟部中央標隼局員工消費合作社印製 405098 A7 ΒΊ_ 五、發明説明(5 ) 能性,即此記億體中之一程式fi,可以去修改同樣在此 記憶體内在程式gj内之另一程式fj,雖然為了實現這項 自動産生電腦程式此功能所使用的裝置,可能由於構思 ,資訊處理裝置9所蓮用的技術不同,而可能改變,在 此種情況之下,可以說,此項資訊處理裝置是由一個微 處理機構成,並與一値内容不消失記億體配合。而根據 上述標準,此項裝置可以包括: --與此記億體配合之數據及位址之記憶缓衝器 --此記億體内之一登錄程式,本身載入記億體,並且 尤其包含指令一方面允許此記億體維持其程式蓮作所須 之電壓;另一方面,允許書寫數據及其位址。不過,释 以時日,此登錄程式,能被自動登錄通輯電路所取代。 以其中的一個變異的形式而言,保全模組8的徹處理 機被植入在一張矽晶Η上半導體的邏輯電路所取代--或 至少被補足完整。事實上,這種電路適合執行這些計算 ,尤其是簽名的確認;這是由於電子電親;而非徹程式 設計之故。它尤其是具備了 ASIC的形式(英文〈特殊用途 積體電路 &gt;)&lt;Application Specific Integrated Circuit〉。作為例子,其提供了可在SLE4436的參考之下 ,列舉SIEMENS商業公司的結構組成,以及在ST1335的參 考之下,來列舉SGS-THOMSON商業公司的結構組成成分。 保全模組8可以被合適地設想為是在一塊矽晶K上, 以獨立整塊的形狀出現。 本纸張尺度適用中國國家標準(CNS ) A4規格(210X297公釐} I 裝— — I I I I 訂— — I —. I .線 * ' - (請先閲讀背面之注意事項再填寫本) - 405098 A7 B7 經濟部中央標準局員工消費合作社印策405098 B7 Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention (1) 1 1 The present invention is a security 1 I method for a security module that cooperates with an information processing device. This module includes an information processing device and information memory. The device i has a 1 I setting for performing--group jobs, including at least--sensing jobs. / -— ^ Please first 1! Feel like I understand «The term job refers to all the tasks whose execution is important to the next reading I read the first column of matters. Back 1 |-* * General security especially About all assignments »To check for attention 1 Things 1 Someone has access to certain information» Authorization of services or functions 0 Refill 1-for pending applications, especially for all assignments 9 It is intended to write this definition or modify Some basic parameters of the user's basic right to an application s_ ^ 1 Γ The characteristic parameters of the profit and obligation 〇 This application I, such as the bank, / U &lt;, use 9 purpose 1 to reveal the balance of the account 〇1 * I "security module" was taken as the name 9. In its classical meaning, it means that I or I A device in m whose mission is to be monitored by an M management agency 1 1 and to protect the basic and secret parameters of the network 1 1 method) so that the keys t of these passwords are as indicated It is very simple. Β0 An early 1 device t gives a variety of users on the network and allows them k I everyone to enter this network. 0 This latest device can grasp these secrets 1 1 parameters. 0 This security model The group can appear in the form of a portable item 9 such as an IC card 1 1 〇1 | The problem this invention aims to solve is to avoid interruption of the induction operation II so that it does not occur 9 or at least can be controlled during execution The number of possible interruptions I. This invention relates in particular to fraudulent and fraudulent interruptions i, but i 1 does not rule out interruptions. This danger is that these operations are intended to protect Fully executed 1 1 1 I 1 This paper scale is applicable to Chinese National Standards (CNS) A4 is present (210X297 mm) 405098 A7 B7 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention () 1 1 All of the above Assignment 9 Here it is a test program related to the password of 1 I proposed by the user. It is a registration operation about the comparison result. 0 1 1 And it is to reach the limit of the number of authorized trial attempts. If ✓ —S Please 1 1 I fraudulent user &gt; Finally, I can stop this program after fcb compares the result f but before I log in to read the first result; then he can re-enter many times to renew $ 3 1% (of 1 password may use the electronic message appearing on the terminal scan m of the security module to note the observed value of 1 matter 1; and this electronic signal is always always calculated or the result The effect of the nature of re 1 m 〇 If the user who can cheat can fill out the formula 1 stored in this way, 値 important numbers »and 痼 statistical analysis data &gt; page ______ 1 so that it is possible to identify the use The correct password of the user is 〇1 11 · This problem can be solved by this invention. 9 Due to the prior • preparation &gt; the verification measures allowed by the security module to determine whether t is ordered one or more of the previous The active sensing operation has been performed. If it is 1 1 9 then more subsequent sensing operations are prohibited. 1 1 More precisely t According to the method 1 of the invention, it includes step 1 including line 1- Execute 9 In the execution of each induction job and its upstream operations 1 1 9 A first job supplementary program> Activate these signaling devices. Downstream of the above 1 induction operation &gt; The second operation supplementary procedure suspends the above! | Signaling device 〇1 I-Register the account and calculate the ¥ trial $ of each suspension. The induction operation is automatically participated by 1 The signal device was not implemented f but was not implemented 9 but was not suspended after j I in order to define the number of trial suspensions h S 0 |-4- 1 1 1 This paper size applies Chinese National Standard (CNS) Λ4 Specifications (210X297 mm) 405098 A7 _ B7_ V. Description of the invention (3)-Defines the number of interruptions of I test allowed nrsa. (Please read the notes on the back before filling this page) --Comparison, when performing each induction operation and upstream, the number of aborted attempts hrs of the above observation, and the number of aborted attempts nrsa ° above-aborted If the number of suspension attempts of the above observation is greater than the number of suspension attempts allowed above, the induction operation is suspended. This invention is also related to a deposit module which is set up to perform this method. Other details and advantages of this invention, which appear in the following description, are an ideal and preferred execution mode, but not limited to this. The related drawings are as follows: Brief description of the drawing The first drawing is a schematic diagram of a security module, which points out the invention and cooperates with an information processing device. The second figure is a block diagram of a procedure for performing a sensing operation. Figures 3a to 3c and 4a, 4b represent the state of the program suspension counter CRS at different times during the execution of one or more sensing operations. The "Information Processing Device 1" represented by the first picture printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs includes a familiar method, a mold processor 2, which is connected to a memory device ROM3, and a memory The RAM 4 and the device 5 so as to cooperate with the security module 8; and connected to a transmission interface 7 so that the information processing device can communicate with other similar devices directly or through a communication network. Device 1 may also be equipped with billion-dollar storage devices, such as magnetic cards or removable-5- This paper size applies to Chinese national standards (CNS &gt; Α4 size (2 丨 〇 × 297 mm) Printed by the Bayer Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs System 405098 A7 _B7_ 5. Description of the invention (-) / Non-removable disk. And the registration device, such as a keyboard and / or mouse-type marking device (mouse), and display device. These different devices are not shown. In Figure 1. This information processing device may be composed of information equipment and installed in private or public places; it is suitable for supplying information management equipment or providing various information or services. Such devices can be fixed or It can be portable, especially for telecommunication devices. On the other hand, the security module 8 includes an information processing device 9, the content does not disappear, the billion body combination 10, and the device 13, which cooperates with this information processing device . This module is set to define the regulations, there is a secret area 11 within the record billion body 10. Once the data is registered in it, it cannot be accessed from outside the module, and It can be accessed from the information processing device 9; and from a free area 12, which allows readers to access from outside the module and / or for information registration. Each memory area can contain a non-erasable read-only memory ROM , And an erasable memory EPROM, EEPR0M, or is composed of 'flash' memory of billions of body RAM. This means that it displays the characteristics of this EEP ROM, and also enters this traditional type The time required for the RAM. The memory of the billion-body RAM, which can be erased, is not shown, and you can refer to it elsewhere. Because of the security module 8, we can especially use a complete processor to record the computer that is automatically generated. Program. As described in the US National Standard 4.382.279. As shown in lines 5 to 17 of the first page, the characteristics of the automatic generation program of this billion body. Corresponding to this can be '-6- 本Paper size applies Chinese National Standard (CNS) Λ4 specification (210X297 mm) ΊI; r V ^ ^ I ^ I &quot; * line (Please read the notes on the back before filling this page ')' Central Bureau of Standards, Ministry of Economic Affairs Printed by employee consumer cooperatives 405098 A7 ΒΊ_ V. Invention Ming (5) performance, that is, one of the programs fi in this memory can modify another program fj in the same program in the memory gj, although this function is used to automatically generate a computer program. The device may be changed due to different concepts and technologies used by the information processing device 9. In this case, it can be said that the information processing device is composed of a microprocessor and is not related to the content According to the above standards, this device can include:-a memory buffer of data and addresses that are compatible with this memory-a registration program in this memory Recording billions, and especially containing instructions, on the one hand, allow this recording to maintain the voltage required for its programming; on the other hand, it allows writing data and its address. However, over time, this registration program can be replaced by an automatic registration circuit. In one of these variants, the full processor of the security module 8 is replaced by a semiconductor logic circuit embedded in a silicon wafer—or at least complemented. In fact, this kind of circuit is suitable for performing these calculations, especially for the confirmation of signatures; this is due to electronic prototyping; rather than thorough programming. In particular, it has a form of ASIC (English <Special Purpose Integrated Circuits>) <Application Specific Integrated Circuit>. As an example, it provides the structural composition of SIEMENS commercial company under the reference of SLE4436, and the structural composition of SGS-THOMSON commercial company under the reference of ST1335. The security module 8 can be suitably conceived as being formed on a single piece of silicon K in the shape of a single block. This paper size applies to China National Standard (CNS) A4 (210X297mm) I Pack — — IIII Order — — I —. I. Thread * '-(Please read the precautions on the back before filling out this)-405098 A7 B7 Imprint of the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs

五、發明説明( ) 1 1 在 如 上 所 描 述 的 徹 處 理 機 記 憶 體 不 同 的 形 式 -- -不 消 失 1 | » 白 動 産 生 程 式 &gt; 此 保 全 模 組 所 具 備 的 隱 密 特 性 1 造 成 1 I 其 處 於 一 値 不 可 侵 入 的 封 閉 位 置 〇 讀 1 1 前 述 的 信 號 裝 置 至 少 包 含 一 個 程 序 中 止 計 數 器 C RS 先 閱 讀 1 I 其 設 置 是 用 來 計 算 在 執 行 感 應 作 業 過 程 之 中 所 發 生 之 背 I 之 1 程 序 中 止 次 數 〇 這 即 是 說 9 在 執 行 此 作 業 之 中 所 逐 步 發 意 1 生 的 中 斷 〇 此 計 數 器 是 被 納 入 保 全 模 組 8 之 資 訊 處 理 装 事 項 再 \ 置 9 之 中 〇 根 據 第 2 圖 的 程 序 可 區 別 為 以 下 兩 個 參 考 填 寫 本 1 裝 數 f 即 所 觀 測 之 程 序 中 止 次 數 NRS * 以及此程序被允許中 頁 1 1 止 之 次 數 nrsa 〇 此 第 一 値 數 字 相 對 應 於 從 某 個 特 定 時 刻 - 1 開 始 y 在 執 行 一 感 m 作 業 中 所 發 生 的 程 序 中 止 次 數 〇 而 1 1 第 二 個 數 字 相 應 於 此 程 序 中 止 所 發 生 之 最 大 次 數 t 而 没 訂 有 引 發 保 全 模 組 之 將 其 中 斷 阻 止 〇 1 1 一 般 而 從 一 開 始 4 此 程 序 的 中 止 次 數 nrs ’ 是被相 1 1 m 於 此 保 全 模 組 首 次 被 使 用 者 使 用 而 開 始 計 算 〇 此 數 字 ! nrs記錄了所有從目前此刻直到被決定的某- 』天, 此程序 線 I 發 生 之 所 有 的 中 斷 〇 至 於 被 允 許 的 程 序 中 止 次 數 nrsa &gt; 1 ! 此 數 字 被 一 位 具 有 CM; 職 權 的 權 威 者 所 決 定 f 以 便 計 算 總 共 1 1 加 總 的 程 序 中 止 次 數 〇 它 不 代 表 一 種 舞 弊 欺 詐 行 為 而 1 I 是 顯 示 保 全 模 組 功 能 之 偏 差 反 常 t Ιη 在 其 整 個 生 命 週 期 1 | 内 是 可 能 自 發 性 的 發 生 〇 白 然 地 h SA m vu&lt;、 被 選 的 小 1 如 果 ! 不 是 如 此 的 話 9 一 個 欺 詐 舞 弊 者 可 受 益 於 許 多 次 舒 適 輕 1 易 的 t 試 » 企 圖 違 反 此 保 全 模 組 〇 作 為 例 子 &gt; nrsa 應 小 1 I 垂 8- 1 1 I 本紙張尺度適用中國國家橾率(CNS ) A4说格(210 X 297公釐) 405098 A7 B7 經濟部中央標準局貝工消費合作社印製 五、發明説明( ) 1 1 於 20 , 尤 其 小 於 10 〇 1 I 在 執 行 感 應 作 業 之 程 序 方 塊 圖 之 一 輸 入 XU/ 9 第 一 個 步 1 1 驟 包 含 查 核 是 否 此 程 序 中 止 次 數 nrs 小 於 或 等 於 被 允 許 '—S 請 1 1 I 之 程 序 中 止 次 數 nrsa 〇 如 果 是 否 的 話 1 則 進 行 由 其 引 發 先 閲 讀 1 1 之 程 序 中 止 &gt; 而 *太 示 止 執 行 感 應 作 業 〇 此 中 止 可 能 是 決 定 背 | 之 1 性 的 f 因 為 它 阻 止 此 後 所 有 此 等 感 應 作 業 之 執 行 甚 至 意 1 事 1 停 止 保 全 模 組 此 後 所 有 的 功 能 &gt; 不 論 是 可 預 見 的 作 業 或 項 再 填 1 是 暫 時 性 的 作 業 〇 如 果 可 預 見 此 感 應 作 業 或 許 能 在 未 來 寫 本 裝 重 新 被 執 行 &gt; 當 此 程 序 中 止 9 次 數 N RS 被 一 有 資 格 的 職 Ν^ 1 I 權 權 威 者 所 重 新 更 新 設 定 之 後 〇 相 反 地 * 如 果 此 程 序 中 1 1 - 止 次 數 N RS 非 常 小 於 或 等 於 此 程 序 被 允 許 中 止 的 次 數 1 N RSA, 則第二値步驟22包含將此程序 中 止 次 數 計 數 器 之 1 訂 1 值 增 加 1 〇 以 下 作 業 包 含 執 行 感 應 作 業 本 身 〇 如 果 此 項 1 1 作 業 全 部 展 開 進 行 f m 即 是 說 9 有 一 個 因 外 或 4BP 舜 弊 欺 1 1 詐 的 程 序 中 止 發 生 〇 在 步 驟 24 &gt; 將 程 序 中止計數器CRS 1 所 含 之 值 減 少 1 9 以 便 重 回 其 在 執 行 感 應 作 業 開 始 之 前 線 | 所 有 的 數 值 〇 1 1 而 另 以 不 同 的 方 式 用 於 測 試 程 序 中 止 次 數 之 值 的 步 1 I 驟 21 也 許 可 以 在 步 驟 22將程序中 止 計 數 器 C RS 所 含 之 1 | 值 增 加 1 之 後 被 執 行 〇 1 I 圖 3 a 至 圖 3c 顯 示 在 執 行 感 m 作 業 上 游 時 9 程 序 中撕計 1 數 器 C RS 所 採 取 的 連 續 相 m 的 狀 態 〇 此 計 數 器 由 置 於 數 1 個 (至少三個)位置之環狀卡片 -9- 框 所 構 成 〇 在 每 個 位 置 1 1 1 1 1 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 405098 A7 B7 經濟部中央標準局員工消費合作社印製 五、發明説明( % ) 1 1 是 藉 由 至 少 一 個 這 樣 的 記 憶體 而 實 現 構 成 〇 在 此 例 之中 1 1 y 此 等 位 置 的 數 巨 等 於 8 ,编 號 從 1 到 8 〇 在 每 一 個位 1 I 置 1 記 億 箸 此 程 序 中 止 數 目之 值 N RS 〇 除 了 在 一 個 位置 請 1 1 1 (此處是位置5)沒有 因為其不含值&lt; 万有沒有值的位置 先 閱 1 1 | 是 以 記 號 Φ 中 來 標 記 〇 背 Λ I 之 1 圖 3 a 代 表 著 在 第 2 圖 中 ,程 序 方 塊 圖 中 之 上 游 步 驟22 注 意 畫 1 I 之 計 數 器 的 狀 態 〇 在 位 於 此空 白 位 置 上 面 的 位 置 (此處是 爭 項 矣 填 1 位 置 4) 儲 存 著 相 當 於 計 數 器所 含 實 際 值 之 —* 個 現 有 M Nrs〇 寫 本 裝 而 從 1到3 &gt; 然 後 從 6到8 , 這6 個 位 置 各 白 分 別 儲 存 著不 I t 同 的 值 〇 隨 著 時 間 而 連 績 的重 新 上 升 I 即 N R s + 1給位置3 - 1 9 NRS給位置2 等 9 … 直 SI hrs 給最先開始的位置6。 1 這 位 置 相 對 於 連 缠 感 應 作業 的 某 一 個 數 字 〇 1 訂 | 我 們 可 以 了 ft7J m 位 置 2到4相對 於 以 下 事 件 1 1 -- 位 置 2 : 在 第 2 圖 步 驟22之 前 計 數 器 之 狀 態 〇 1 1 一- 位 置 3 正 好 在 步 驟 22之 後 計 數 器 的 狀 態 (增加1) 1 -- 位 置 4 : 正 好 在 步 驟 24之 後 計 數 器 的 狀 態 (減少υ | 這 顯 示 任 何 一個 糸 列 的 中 止 不 論 是 故 意的 1 1 或 是 意 外 的 ,在 Ιξ 感 應 作 業 的 執 行 中 不發 1 I 生 〇 1 | 相 反 地 &gt; 我 們 了 tK73 m 位 置 7和8 &gt; 相 對 於 下 列 事 件 : I I -- 位 置 7 ; 在 第 2 圖 步 驟22之 前 計 數 器 的 狀 態 〇 1 -- 位 置 8 ·· 正 好 在 步 驟 22之 後 計 數 器 之 狀 態 (ί| ,加1) 1 -- 知 道 下 __. 個 位 置 » 不 相對 於 有 關 位 置 8 減 少 1 (即 1 1 10- 1 1 1 本紙張尺度適用中國國家標準(CNS ) A4規格(2丨0X297公釐) 經濟部中央標隼局員工消費合作社印製 405098 a? B7 五、發明説明(3 ) % -1) 我們可以下結論說一個程序中斷,不論是故意或是意 外,在這執行感應作業過程中確實發生;以致使得在正 常狀況下預定的步驟24,不被執行。總之,我們不能進 行一個計數器值的新的登錄。因為該值並未改變。 致於關於位置6 ,它相對應於正好在步驟24之前此計 數器的狀態。當此時感應作業的執行仍然太早。事實上 ,它所含的值,相對應於位置7的值,增加了 1 。 回到正在執行之中的感應作業。圖3b顯示,在執行第 2圖,程序方塊圖中步驟2 2之初步階段中,程序中止計 數器的狀態。保全模組的資訊處理裝置9己進行拭去位 於在空白位置5之下位置6的内容,如此定義出一個新 的空白位置。在圖3c,資訊處理裝置9己執行過第2圖 步驟22,而將位置4現有值NRS增加1 ,並儲存其結果值 NRS+1在其下的位置5 。 圖4a,圖4b顯示在第2圖中,在執行感應作業23下游 之中,程序中止計數器cRS所採取的相繼連續的狀態。 圖4a顯示在第2圖中在執行步驟24的一個初步階段中 ,程序中止計數器之狀態。保全模组之資訊處理裝置9 已進行消除了位於新空白位置6之下的位置7的内容。 在圖4b,資訊處理裝置9已執行了第2圖中步驟24,而 從位置5之現有值NRS + 1中刪除1 ,並儲存其結果NRS在 以下的位置6之中。 -11 - 本紙張尺度適用中國固家標準(CNS ) A4規格(210X297公釐) .—„ 訂 線 - - - - (請先閲讀背面之注意事項再填寫本頁} - 405098 A7 B7 經濟部中央標準局員工消費合作社印裝 五、發明説明( 1〇 ) 1 1 我 們 注 意 到 t 在 第 2 圖到圖4b的例子 中 t 其 信 號 的 功 1 1 能 * 以 適 宜 有 益 的 方 式 t 與 一 個 唯 一 設 備 的 裝 置 , 即 程 1 I 序 中 止 計 數 器 cRS緊密地交叉聯繫者£ ) /—\ 請 1 1 很 先 適 宜 地 f 步驟21 , 22及 24之 中 f 程 序 中 止 計 數 器 所 閲 ik 1 含 值 的 增 加 及 減 少 可 以 被 設 想 為 感 應 作 業 所 構 成 主 要 程 背 Sj 1 之 1 1 式 其 本 身 所 附 屬 之 副 程 式 〇 在 此 情 況 之 中 ) 引 入 一 個 參 注 意 1 | 考 值 或 是 計 數 器 的 位 址 ) 作 為 當 此 副 程 式 被 呼 叫 時 的 參 項 再 填 1 數 〇 此 種 運 作 模 式 9 增 加 了 其 作 業 程 序 布 局 設 計 的 靈 活 寫 木 頁 1 性 〇 在 某 情 況 之 下 t 我 們 希 望 確 保 有 數 個 區 別 不 同 的 感 1 應 作 業 〇 巨 的 在 使 其 彼 此 獨 立 地 被 執 行 〇 我 們 可 以 定 義 1 I 出 如 同 作 業 數 巨 一 樣多的程序中止計數器CRS, 每— -個用 訂 1 以 查 驗 所 設 定 的 感 應 作 業 的 良 好 執 行 〇 儘 管 如 此 9 根 據 1 1 較 理 想 的 模 式 9 我 們 僅 只 定 義 出 唯 一 共 同 的 計 數 器 f 而 1 1 當 執 行 任 何 __. 個 此 等 感 應 作 業 它 的 值 原 則 上 &quot;COT1 增 加 1 減 少 〇 • 線 I 本 發 明 之 項 重 要 令 人 憂 慮 的 事 情 是 » 以 上 所 描 述 的 1 1 保 全 程 序 9 並 不 能 達 到 減 少 9 甚 至 封 鎖 了 保 全 模 組 的 蓮 1 1 作 功 能 〇 由 於 吾 人 觀 察 了 解 此 保 全 模 組 的 運 作 期 間 9 自 1 | 始 至 終 有 不 可 避 免 的 思 外 中 斷 發 生 9 此 不 僅 是 有 關 於 感 1 I 應 作 業 &gt; 而 且 關 於 一 般 性 作 業 亦 如 此 〇 例 如 那 Jit. 有 關 於 1 相 關 的 應 用 作 業 (財務應用, 服務提供, 等等-· •) t 其 未 1 1 被 執 行 既 不 影 m 一 般 性 的 安 全 i 也 不 影 m 在 相 關 的 應 用 1 -12- 1 1 1 本紙張尺度適用中國國家揉準(CNS ) A4規格(2丨0·〆297公釐) 經濟部智慧財產局員工消費合作社印製 __^050.9^_B7 五、發明説明(II ) 作 業 中 使 用 者 基 本 的 權 利 和 義 務 〇 事 實 上 9 隨 著 大 數 量 的 作 業 如 此 受 到 保 全 9 其 所 觀 察 到 相 應 外 性 中 止 的 次 數 可 能 大 幅 增 加 〇 而 所 被 允 許 的 程 序 中 止 次 數 nRSA 很 快 被 逹 到 9 以 致 使 得 安 全 模 組 的 一 部 份 或 全 部 被 阻 IW 斷 的 現 象 也 同 樣 地 快 速 發 生 〇 我 們 依 據 只 有 確 實 符 合 此 等 感 應 作 業 中 , 才 執 行 此 項 發 明 所 描 述 的 保 全 程 序 9 而 獲 得 此 項 顯 著 的 成 果 〇 本 發 明 之 一 項 改 善 措 施 於 其 被 允 許 中 止 的 嘗 試 次 數 nrsa 包 含 一 項 未 定 數 〇 此 未 定 數 隨 著 毎 次 一 待 定 數 百 的 感 應 作 業 被 m. 動 而 改 變 〇 因 此 9 nrsa 這 數 字 隨 箸 特 定 的 頻 率 次 數 而 改 變 &gt; 但 是 其 所 取 得 的 連 缠 值 是 不 可 預 見 的 〇 此 種 作 法 可 干 擾 欺 詐 舞 弊 者 欲 觀 測 安 全 模 組 行 為 模 式 的 企 圖 Ο 而 此 未 定 數 可 以 根 據 美 國 專 利 號 碼 N0 5 .177 .7 90或 N0 5 .365 .4 66其 中 之 一 所 描 述 的 邏 輯 程 序 而 由 保 全 模 組 適 宜 地 産 生 〇 而 依 照 不 同 的 變 異 方 式 9 此 被 允 許 嘗 試 中 止 的 次 數 nrsa 9 是 由 一 個 定 數 加 上 一 個 未 知 數 而 構 成 〇 主 要 元 件 符 號 說 明 1 資 訊 處 理 裝 置 2 撒 處 理 器 3 R 0 Μ記憶體 4 RAM記億體 5 裝 置 7 傳 輸 介 面 8 保 全 模 組 9 資 訊 處 理 裝 置 10 不 消 失 記 億 體 組 合 11 秘 密 區 域 12 白 由 區 13 裝 置 21,22,23,24 步驟 (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)V. Description of the invention () 1 1 In the different form of the processor memory as described above--does not disappear 1 | »White motion generating program &gt; The hidden characteristics of this security module 1 causes 1 I its It is in an inaccessible closed position. Read 1 1 The aforementioned signal device contains at least a program abort counter C RS Read 1 1 Its setting is used to calculate the back I 1 that occurs during the execution of the induction operation. Program abort Number of times. This means that 9 interrupts that were gradually noticed during the execution of this operation. This counter is included in the information processing equipment of the security module 8. Then, it is set to 9. According to the procedure in Figure 2 It can be distinguished as the following two references. Fill in this 1 pack number f, which is the number of times that the program was suspended NRS * and the number of times this program is allowed to stop on page 1 1 nrsa 〇 The first number corresponds to the number of program interruptions that occurred in the execution of a job from a certain time point-1 and the second number corresponds to the maximum number of program interruptions that occur. There is no order to trigger the security module to prevent its interruption. 0 1 1 Normal and from the beginning 4 The number of interruptions of this process nrs' is phase 1 1 m. This security module is used by the user for the first time and the calculation begins. This number ! nrs records all the interruptions that occurred in this program line I from now until the determined day-as to the number of allowed program interruptions nrsa &gt; 1! This number is authorized by a CM; authority The operator decides f in order to calculate a total of 1 1 sum of the number of program suspensions. It does not represent a fraud and fraud and 1 I is an abnormal anomaly t Ιη showing the function of the security module throughout its life. Life cycle 1 | Within is possible to happen spontaneously 〇 White h h m m vu &lt; selected small 1 if! If not so 9 a fraudster can benefit from many times comfort 1 easy t test »Attempt Violation of this security module 0 as an example> nrsa should be small 1 I vertical 8- 1 1 I This paper size is applicable to China National Standard (CNS) A4 format (210 X 297 mm) 405098 A7 B7 Central Bureau of Standards, Ministry of Economic Affairs Printed by Shelley Consumer Cooperatives 5. Description of the invention () 1 1 at 20, especially less than 10 001 I Enter XU / 9 in one of the program block diagrams of the induction operation. The first step 1 1 step includes checking whether the program is suspended The number of times nrs is less than or equal to the allowable '-S Please 1 1 I The number of program suspensions nrsa 〇 If it is 1, then the program will be triggered to read the 1 1 first and the program will be aborted &gt; and * Too much to stop performing the induction operation 〇 This suspension may be possible It is decided to back up the nature of f because it prevents the execution of all such inductive operations from now on, even to the point that it will stop all the functions of the security module afterwards &gt; whether it is a foreseeable operation or refilling the item 1 is temporary Assignment 〇 If it is foreseeable that this induction assignment may be re-executed in the future, when this procedure is suspended 9 times, N RS is re-updated by a qualified professional N ^ 1 I authoritative authority. On the contrary * if * In this program, 1 1-number of stops N RS is very less than or equal to the number of times that this program is allowed to be suspended 1 N RSA, then the second step 22 includes increasing the value of 1 of the program's number of suspension counters by 1 and increasing the value by 1 〇 The following jobs include execution The induction operation itself. If this 1 1 operation is all carried out for fm, it means that 9 has an external cause or 4BP. Deceit 1 1 Fraudulent suspension of the procedure occurred. At step 24 &gt; Decrease the value contained in the procedure abort counter CRS 1 by 1 9 in order to return to the line before the start of the induction operation | all values 〇 1 1 and a different The method is used to test the value of the number of program aborts. Step 1 I Step 21 It may be possible to execute the program abort counter C RS after the value of 1 in step 22 is incremented by 1. 〇1 I Figure 3a to Figure 3c show the sense of execution m When the job is upstream, the state of continuous phase m taken by 1 counter C RS in the program 9 is used. This counter consists of a ring-shaped card -9-box placed at several (at least three) positions. Locations 1 1 1 1 1 This paper size applies to Chinese National Standard (CNS) A4 specifications (210X297 mm) 405098 A7 B7 Printed by the Consumers' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of invention (%) 1 1 One like this In this example, 1 1 y The number of these positions is equal to 8 and the number is from 1 to 8 〇 At each bit 1 I is set to 1 billion. The value of the number of aborted programs N RS 〇 Except in one position, please 1 1 1 (here is position 5). There is no value because it has no value &lt; the position with no value is read first 1 1 | It is marked with the symbol Φ 〇 Λ I 1 Figure 3 a represents the upstream step 22 in the program block diagram in Figure 2. Note the state of the counter of 1 I. 0 is located above this blank position (here is the contention item, fill 1 position 4) and stores the equivalent The counter contains the actual value-* existing M Nrs 0 copybooks, from 1 to 3 &gt; then from 6 to 8, each of these 6 positions stores different values of I t. Successive results over time Re-rising I of NR s + 1 to position 3-1 9 NRS 2 ... 9 straight position other SI hrs 6 to the first start position. 1 This position is relative to a certain number of the continuous induction operation. 〇1 Order | We can set ft7J m Position 2 to 4 relative to the following event 1 1-Position 2: The state of the counter before step 22 in Figure 2 〇1 1 1-Position 3 (counter by 1) just after step 22 1-Position 4: Counter status (by decrement υ just after step 24) | This shows that any queue stop was deliberately 1 1 or Unexpectedly, 1 I did not occur in the execution of the Ιξ induction job. Conversely &gt; we have tK73 m positions 7 and 8 &gt; relative to the following events: II-position 7; before step 22 in Figure 2 The status of the counter 〇1-Position 8 · The status of the counter just after step 22 (ί |, plus 1) 1-Know the next __. Positions »Do not decrement by 1 relative to the relevant position 8 (ie 1 1 10 - 1 1 1 This paper size is in accordance with Chinese National Standard (CNS) A4 (2 丨 0X297 mm) Printed by the Staff Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy 405098 a? B7 V. Description of the invention (3)% -1) We can It is concluded that a program interruption, whether intentional or accidental, does occur during the execution of the induction operation; so that the predetermined step 24 under normal conditions is not executed. In short, we cannot perform a new counter value Log in. Because the value has not changed. As for position 6, it corresponds to the state of this counter just before step 24. At this time, the execution of the induction job is still too early. In fact, the value it contains, relative to The value corresponding to position 7 is increased by 1. Return to the sensing operation in progress. Figure 3b shows that during the initial stage of executing step 2 2 in the block diagram of Figure 2, the program aborts the state of the counter. Security The module's information processing device 9 has erased the content located at the position 6 below the blank position 5, thus defining a new blank position. In Figure 3c, the information processing device 9 has Line through the second step of FIG. 22, but will increase the value of the position prior the NRS 14, and stores the resulting value NRS + 1 position 5 thereunder. Fig. 4a and Fig. 4b show the successive states taken by the program suspension counter cRS during the execution of the sensing operation 23 downstream in the second diagram. Fig. 4a shows the state of the program abort counter in Fig. 2 during a preliminary stage of step 24. The information processing device 9 of the security module has performed the elimination of the contents of the position 7 located below the new blank position 6. In Fig. 4b, the information processing device 9 has performed step 24 in Fig. 2 and deleted 1 from the existing value NRS + 1 at position 5 and stored the result NRS in position 6 below. -11-This paper size is applicable to China Solid Standard (CNS) A4 specification (210X297mm) .— „Thread----(Please read the precautions on the back before filling this page}-405098 A7 B7 Central Ministry of Economic Affairs Standard Bureau employee consumer cooperatives' printing V. Description of invention (1〇) 1 1 We noticed that in the examples in Figure 2 to Figure 4b, the work of its signal 1 1 can * in a suitable and beneficial way t with a unique device The device, ie the procedure 1 I sequence suspension counter cRS closely cross-linked £) /-\ please 1 1 first appropriate f steps in steps 21, 22 and 24 f program suspension counter reading ik 1 increase in value and The reduction can be conceived as a subroutine attached to the Sj 1 1 1 formula of the main process of induction operation. In this case) the introduction of a reference 1 | evaluation value or the address of a counter) as this Subroutine Fill in the number of parameters when calling. This operation mode 9 increases the flexibility of writing the layout of the operating procedure. 1 In certain circumstances, we want to ensure that there are several different senses. In order to make them be executed independently of each other, we can define 1 I to output as many program interrupt counters CRS as there are huge numbers of jobs, order 1 to check the good execution of the set sensing job. Nonetheless 9 according to 1 1 The ideal mode 9 We only define the only common counter f and 1 1 when performing any of these __. These sensing operations its value in principle &quot; COT1 increase by 1 decrease ○ line I The item of the invention is important The worrying thing is that »The 1 1 security procedure 9 described above does not achieve a reduction 9 Even the lotus 1 1 function of the security module was blocked. As I observe and understand the operation period of this security module 9 From 1 | From the beginning to the end, there are unavoidable unexpected interruptions 9 This is not only about the sense 1 I should Homework> And the same is true for general homework. For example, Jit. About 1 related application homework (financial applications, service provision, etc.-·) t 1 1 is not executed without affecting m general security i 影 影 m In related applications 1 -12- 1 1 1 This paper size applies to China National Standard (CNS) A4 (2 丨 0 · 〆297 mm) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs_ _ ^ 050.9 ^ _B7 V. Description of the invention (II) Basic rights and obligations of users in the operation. In fact 9 As a large number of operations are so preserved 9 the number of corresponding external sexual suspensions may be significantly increased. 0 Allowed procedures The number of interruptions nRSA was quickly reduced to 9 so that part or all of the security module was blocked by IW interruption. It also happened quickly. We based on the description of this invention only if it actually meets these sensing operations. This remarkable result was obtained by the security procedure 9 of the present invention. An improvement of the present invention is that the number of attempts nrsa allowed to be suspended includes an undefined number. This undecided number is changed as the number of sensing operations to be determined hundreds of times. . The number of 9 nrsa changes with the frequency of a specific frequency. However, the serial value obtained is unpredictable. This practice can interfere with attempts by fraudsters to observe the behavior of security modules. 〇 And this undecided number can be based on the logic program described in one of the U.S. Patent Nos. 0 5 .177.7 90 or 0 5 .365.4 66 Appropriately generated by the security module. 0 According to different variations. 9 The number of allowed attempts to stop nrsa 9 is composed of a fixed number and an unknown number. 0 Symbol description of the main components 1 Information processing device 2 Spreader 3 R 0 MEM memory 4 RAM memory device 5 device 7 transmission interface 8 security module 9 information processing device 10 memory device combination that does not disappear 11 secret area 12 Baiyou area 13 device 21, 22, 23, 24 steps (please read first Note on the back, please fill out this page again) This paper size is applicable to China National Standard (CNS) A4 specification (210X297 mm)

Claims (1)

A8 Βδ C8 D8 、申請專利範 第86119900號「保全模組之保全方法及其保全模組」專 利 (88年10月修正) 杰申請專利範圍 1. 一種保全模組(8)之保全方法其設置是用來與資訊處理 裝置(1)配合,此模組包含資訊處理裝置(9,2)以及資 訊記億裝置(10;3, 4),其設置是用來執行一組作業, 包括至少一艏感應作業(23),其所包含步驟之待點包 括: --執行,在執行毎一個感應作業以及在其上游之時, 此作業之笫一補充序列(22)目的在歆動此等信號裝置 ,以及在感應作業之下游時,此作業之第二補充序列 (24),目的在中止上述信號裝置; --計算每一個中止的|試,其感應作業被歆動,但未 被執行,以致使得信號裝置首先被敗動,但隨後沒有 被停止;以便定義一値觀測之舊·試中止次數Nrs; --定義一値被允許嘗試中止次數\5/1 ; (請先閲讀背面之注意事項再填寫本頁) 線 經濟部智慧財產局員工消費合作社印製 時 之 游 上 其 在 及 以, S 業 hr 作數 應次 感止 個中及 一 試 以 每 言 ; 行之 執測NP 當觀數 在述次 , 上 止 較較中 比 比 試 - , 霄 許 允 被 述 上 及 以 允 作 被 應 述 感 上 個 於 一 大。每 數業行 次作執 止應當 中感中 試其其 嘗 止 , 之中法 測則方 觀 ,之 述數 1 上次圍 如止範 假中利 , 試專 止嘗請 中之申 I 許 如 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) A8 B8 C8 _405098 D8_ 々、申請專利範圍 業並在其上游之時,記錄每一個¥試的中止,並將計 數器之值增加1,假如感應作業已被執行,在感應作 業下游,將計數器之值減少1 。 3. 如申諳專利範圍1之方法,其中上述被允許蒈試中止 次數NRSA包含一未定數,它隨著感應作業(23)被歆動 一個預定數目的次數,而每次改變。 4. 如申請專利範圍1之方法,其中設置保全模組(8)用來 執行數個不同之感應作業(23),並將其登錄之,經由 相同的觀測之嘗試中止次數Nu,每一値嘗試中止是 有關於此等感應作業之中的任何一個。 5. —種保全模組(8)的設置,是用來與資訊處理裝置(1) 配合;並包含資訊處理裝置(9,2)以及資訊記億裝置 (10;3,4),其設置是用來執行一組作業,包括至少一 個感應作業(23),而其包括的特點如下: --信號裝置,其設置用來逹到一種狀態,於其中,它 1 果 另如 到, 達止 及停 以被 - 游 護下 保的 來業 用作 , 應 動感 S 在 被它 游, 上中 的其 業於 作’ 應態 感狀 E EPL· 在種 經濟部智慧財產局員工消費合作社印製 類號 這 信 於得 對使 , 致 試以 嘗 ; 的行 止執 中被 個未 一 但 每 , 錄動 登 敗 來被 用業 行 ,作 執置應 被裝感 經數 , 已計試 它 | 嘗 置 裝 億 記 訊 資 述 止上 停而 被S* 未^2-後數_ 隨次 但止 , 中 動試 飲 嘗 被之 先測 首觀 置個 裝 一 義 定 以 此 因 本紙張尺度適用中國國家梂準(CNS ) Α4規格(210Χ297公嫠) 申請賴賴8 A8 B8 C8 D8 (10;3,4)儲存被允許嘗試中止次數^%; 比較裝置用來比較,當每行感窸作業,並在其 上游之時,比較上述觀測 被允許官試中止次數fT 經濟部智慧財產局員工消費合作社印製 ------------'--卜訂------線 V (請先聞讀背面之注意事項再填寫本頁) * 1 * 大於上述被允許嘗試中jfeA8 Βδ C8 D8, Patent Application No. 86119900 "Security Module Security Method and Security Module" Patent (Amended in October 88) Jie Application Patent Scope 1. A Security Module (8) Security Method and Its Settings It is used to cooperate with the information processing device (1). This module contains the information processing device (9, 2) and the information recording device (10; 3, 4). Its settings are used to perform a set of operations, including at least one (2) Inductive operation (23), the steps included in the steps include:-Execute, when performing an inductive operation and upstream of it, a supplementary sequence (22) of this operation is to move these signals Device, and downstream of the induction operation, the second supplementary sequence (24) of this operation, the purpose is to suspend the above-mentioned signal device;-Calculate each suspended | test, the induction operation was mobilized, but not performed, So that the signaling device was defeated first, but then it was not stopped; in order to define the number of old test suspensions Nrs;-to define the number of attempts to be suspended \ 5/1; (Please read the note on the back first Matters refill this page ) The employees of the Intellectual Property Bureau of the Ministry of Online Economics and Consumers Co-operatives printed on it during the printing, and the S industry hr made several attempts to stop the test, and tried every word; , Shangzhi compares with the middle-comparison test-Xiao Xiaoyun is described as above and Yiyun is said to be a big one. The termination of every number of business operations should be its sense of the middle-term test, the test of the middle law, the number of views, the number of the first 1 last round as far as the standard leave in the profit, try to stop the application of the application I Xu Ruben The paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) A8 B8 C8 _405098 D8_ 々, when applying for a patent scope and upstream, record the termination of each ¥ test, and increase the value of the counter by 1, If a sensing operation has been performed, the value of the counter is decreased by 1 downstream of the sensing operation. 3. The method of claiming patent scope 1, wherein the number of allowed trial suspensions NRSA includes an undefined number, which changes each time the induction operation (23) is moved a predetermined number of times. 4. For the method of applying for patent scope 1, the security module (8) is set to perform several different induction operations (23), and it is registered, and the number of aborted attempts Nu through the same observation, each 値Attempt to abort is related to any of these induction operations. 5. — The setting of the security module (8) is used to cooperate with the information processing device (1); and includes the information processing device (9, 2) and the information recording device (10; 3, 4), and its settings It is used to perform a group of tasks, including at least one induction task (23), and its features are as follows: --Signal device, which is set to switch to a state, in which it is as good as another, up to And stop to be used by-You Huo Xia Bao to the industry, should be dynamic S in the other, it's used in the industry's "Emotional state E EPL" in the Ministry of Economic Affairs Intellectual Property Bureau employee consumer cooperative printed This type of letter is so right that I tried to try it out; I did n’t know how to do it. I tried to use it as a disapproval. I have been tested for it. | The information on the taste of the installation of the device was stopped and stopped by S * Wei ^ 2-after the number _ followed by the cessation, the test of the first trial of the test of the taste of the first installation of the device is determined to apply this paper to China National Standards (CNS) Α4 size (210 × 297 males) Application depends on 8 A8 B8 C8 D8 (10 ; 3,4) Stores the number of attempts allowed to be discontinued ^%; The comparison device is used to compare the number of times the above observations are allowed to be discontinued in official trials when each row of sensing operations is upstream and compared to the above. Printed by Consumer Cooperatives ------------'-- Bu Ding ------ Line V (Please read the notes on the back before filling in this page) * 1 * Greater than the above is allowed Try jfe 中止次數N RS,以及 中止裝置用來中止,假如觀測之霄試中止次數 RS 業 r S A,則中止感應作 .如申請專利範圍5之保金模組〇的設置,其中在其上 述之信號裝置及計數裝置包含一計數器,其設置是來 用,當在執行一個感應作業並在其上游之時,將此計 數器之值加1 ,而假如此感應作業已被執行,則在此 感應作業的下游,將此計數器之值減1 。 本紙張尺度適用中國國家標準(CNS &gt; A4規格(210X297公釐)The number of suspensions N RS, and the suspension device are used to suspend, if the number of observations of the suspension test RS industry r SA, then the induction operation is suspended. For example, the setting of the security module 0 of the scope of patent application 5, where the above-mentioned signal device And the counting device includes a counter, which is set to be used, when a sensing operation is performed and it is upstream, the value of this counter is increased by 1, and if such a sensing operation has been performed, it is downstream of this sensing operation , Decrement the value of this counter by one. This paper size applies to Chinese national standards (CNS &gt; A4 size (210X297 mm)
TW086119900A 1996-12-31 1997-12-29 The security procedure of a security module and the related security module TW405098B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR9616257A FR2757972B1 (en) 1996-12-31 1996-12-31 METHOD FOR SECURING A SECURITY MODULE, AND RELATED SECURITY MODULE

Publications (1)

Publication Number Publication Date
TW405098B true TW405098B (en) 2000-09-11

Family

ID=9499336

Family Applications (1)

Application Number Title Priority Date Filing Date
TW086119900A TW405098B (en) 1996-12-31 1997-12-29 The security procedure of a security module and the related security module

Country Status (12)

Country Link
EP (1) EP0891587A1 (en)
JP (1) JPH11505055A (en)
KR (1) KR19990087418A (en)
CN (1) CN1212770A (en)
AR (1) AR009852A1 (en)
AU (1) AU5668398A (en)
BR (1) BR9707881A (en)
CA (1) CA2247475A1 (en)
FR (1) FR2757972B1 (en)
NO (1) NO983960D0 (en)
TW (1) TW405098B (en)
WO (1) WO1998029813A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6289457B1 (en) * 1998-07-17 2001-09-11 Amdahl Corporation Value data system having containers for theft deterrent repositories
FR2793904B1 (en) * 1999-05-21 2001-07-27 St Microelectronics Sa METHOD AND DEVICE FOR MANAGING AN ELECTRONIC CIRCUIT
JP2003316263A (en) * 2002-04-19 2003-11-07 Sony Corp Arithmetic unit and operation method
FR2857473B1 (en) 2003-07-11 2005-09-16 Oberthur Card Syst Sa METHOD FOR SECURING THE EXECUTION OF A COMPUTER PROGRAM, IN PARTICULAR IN A MICROCIRCUIT BOARD
EP1605333B1 (en) * 2004-06-07 2008-12-10 Proton World International N.V. Program execution control
EP1698958A1 (en) * 2005-02-25 2006-09-06 Axalto SA Method for securing the writing in memory against radiation attacks or other attacks
FR2891654A1 (en) * 2005-10-05 2007-04-06 Proton World Int Nv Event counting method for e.g. kilometric counter of motor vehicle, involves arithmetically adding values contained in different words of memory cells to obtain counting result, and incrementing/decrementing one word
JP4882006B2 (en) 2007-01-05 2012-02-22 プロトン ワールド インターナショナル エヌ.ヴィ. Restricting access to electronic circuit resources
CN101606162A (en) 2007-01-05 2009-12-16 质子世界国际公司 The interim locking of electronic circuit
US8566931B2 (en) 2007-01-05 2013-10-22 Proton World International N.V. Protection of information contained in an electronic circuit
DE102010044687A1 (en) * 2010-09-08 2012-03-08 Giesecke & Devrient Gmbh Portable data carrier with misoperation counter
DE102010054446A1 (en) 2010-12-14 2012-06-14 Giesecke & Devrient Gmbh Portable data carrier with misoperation counter

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60207957A (en) * 1984-03-31 1985-10-19 Toshiba Corp Data protecting system
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
FR2674647A1 (en) * 1991-03-29 1992-10-02 Widmer Michel Apparatus forming an electronic cheque-book for financial transactions and process for using such an apparatus
US5282247A (en) * 1992-11-12 1994-01-25 Maxtor Corporation Apparatus and method for providing data security in a computer system having removable memory
EP0602867A1 (en) * 1992-12-17 1994-06-22 NCR International, Inc. An apparatus for securing a system platform
DE4341887C2 (en) * 1993-12-08 1996-12-19 Siemens Ag Method for preventing an unauthorized data change in a device with a non-volatile memory

Also Published As

Publication number Publication date
JPH11505055A (en) 1999-05-11
NO983960L (en) 1998-08-28
WO1998029813A1 (en) 1998-07-09
KR19990087418A (en) 1999-12-27
CN1212770A (en) 1999-03-31
AR009852A1 (en) 2000-05-03
FR2757972A1 (en) 1998-07-03
CA2247475A1 (en) 1998-07-09
FR2757972B1 (en) 1999-02-19
BR9707881A (en) 1999-07-27
AU5668398A (en) 1998-07-31
NO983960D0 (en) 1998-08-28
EP0891587A1 (en) 1999-01-20

Similar Documents

Publication Publication Date Title
TW405098B (en) The security procedure of a security module and the related security module
JPH0844805A (en) Security managing method for card type storage medium, card type storage medium and transaction device for card type storage medium
TWI267280B (en) Method for encryption backup and method for decryption restoration
US7555460B1 (en) Payment system and method using tokens
JP4187844B2 (en) Methods for protecting executable computer programs from unauthorized use
US20020138761A1 (en) Authentication system
CN104104673B (en) Method for realizing security payment through third party unified dynamic authorization code
US20100146264A1 (en) Method and system for authenticating a user
KR950033921A (en) Methods and apparatus for assuring data carriers that enable access or transactions to a service or location and corresponding carriers
TW200844792A (en) System and Method for Using a Hypervisor to Control Access to a Rental Computer
JP2005284679A (en) Resource use log acquisition program
JPH09512368A (en) Data transmission system having terminal and portable data carrier device and method of recharging data carrier device portable by terminal
CN101686129A (en) Novel method for strong safety service and user resource management
CN101304315B (en) Method for improving identification authentication security based on password card
JPH0464129A (en) Software managing system
US20130036160A1 (en) License issuing system, client terminal, server, and license issuing method
WO1985003584A1 (en) Security and usage monitoring
US8020773B2 (en) Method for personalizing chip cards
EP0493943A2 (en) Postage meter monitoring and control
CN101304316B (en) Method for improving identification authentication security based on password card
CN101304422B (en) Method for improving identification authentication security based on password card
JPH04117548A (en) Prevention system for illicit use of program
JP2002245189A (en) Individual license certification system
JP4328599B2 (en) Electronic ticket management method, electronic ticket management system, and electronic ticket and electronic ticket management device constituting electronic ticket management system
US8073781B2 (en) Method and device for franking postal deliveries

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees