TW528959B - System and procedure for protection against the analytical espionage of secret information - Google Patents

System and procedure for protection against the analytical espionage of secret information Download PDF

Info

Publication number
TW528959B
TW528959B TW088110987A TW88110987A TW528959B TW 528959 B TW528959 B TW 528959B TW 088110987 A TW088110987 A TW 088110987A TW 88110987 A TW88110987 A TW 88110987A TW 528959 B TW528959 B TW 528959B
Authority
TW
Taiwan
Prior art keywords
counter
scope
patent application
procedure
secret information
Prior art date
Application number
TW088110987A
Other languages
English (en)
Inventor
Albert Schaal
Helmut Scherzer
Michael Schilling
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=7874201&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=TW528959(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Ibm filed Critical Ibm
Application granted granted Critical
Publication of TW528959B publication Critical patent/TW528959B/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1083Counting of PIN attempts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)

Description

528959 五、發明說明u.) 本發明說明了一種用來避免以分析方式破解電子裝置 (尤其是晶片卡)上的秘密資訊之系統及程序。 密碼係儲存在晶片卡上。這些密碼係用來防止對與安全 相關的功能及資料之存取。因此,係利用一密碼择非編碼 資料轉換成編碼資料。 編碼及解碼時^需要· 個或兩個密碼。如果諸如駿客找 到了一編碼演算法的密碼,則該駭客將可fe經過編碼並因 而受到保護的資料解碼,以便找出資料的内容,並在必要 時改變該内容。 有許多程序可找出一晶片卡上的密碼。這些程序中的一· 種程序涉及利用特別為此一目的而開發的監視技術而找出 密碼。因此,儘量啟動許多次的編碼運算,以便能夠自所 監視的資訊找出密碼。於執行上述步驟時,係利用諸如供 應到晶片卡的電流量測值,而進行秘密資料的分析。然 而,這些量測值係與雜訊重疊。因而需要持續地重複使用 密碼,以便過濾掉重疊的雜訊。 對付此類監視作業的安全預防措施基本上包含不會受到 满的穷瑞。 ,V 4^4 · y 為了達到上述目的,現在有下述使罔現階段最高技藝的I 程序: /f!j ia tf 6S 1示言曼 晶片卡包含一錯誤計數器。如杲晶片卞發生了對密妈的 錯誤使用,例如發生了 因使闬錯誤密碼而未通過身分鑑 別,則該錯誤計數器將開始計數。當該錯誤計數器的計數 _________SI il 1^1 1^1 il li ii 1^1 s!!_i___il 酬 iis_
=!_画圖 ill圈 in il iim 则 ί·!ϋιι»ιι圍si i€ ϋϋρ il i^iϋι ilϋι I I 」i 1— s!!BilBsilllliBiii 第6頁 528959 五、發明說明(2) 到這某一界哏值時,即荼止對該密碼或晶片卞的冉度便 用。 該程序的一個缺點在於:只計算錯誤使用的次數。並不 會計算無錯誤使用的次數。因此,該程序無法防止利用無 錯誤地使用現代監視技術而找tB密碼的破解方式。此種方 式尤其影響到授權使用者對秘密資訊之破解。 德國專利DE 19506921說明了此種羯於行動資料載體(尤 其是晶片卡)的程序。該行動資料載體係與一資群翰入及 輸出裝置通訊。辟輸入該資料輸入及輸出裝置的祕密資料 與該晶4卡中儲存的秘密資料比較。如果該比較偵測到一_ 錯誤,則將計數器的計數遞增。在某一數目的錯誤嘗試之 後,將自動禁止任何後續的使用。 利用使用計數器的保護 ^ 該保護機制包含利用一使用計數器而限制一密碼的使用 次數。因此,也計算合法使用的次數。此種設計的一缺點 在於:如杲設定了太小的容許使用次數,則也有可能禁止 了授權的使用:如果設定了太大的使闬次數,則可以利用 公折方法杂竑統具Κ 士泠Γ式)穷满。
y y l,j / I j · V PI太 t 4!M π Π R Q i卩R贫S.日了 一雜此賴德制,该換ΐ:ί 4!! S — ,丁- _、J 丄 kj w/ ^ / ^ V w y\/\ 'r 4 w<^>* '1 广人 Ί¥ 4 '«4 / 計數器來計算在啟動晶片卡之後的作業次數,並在超過最 人值匕于系jL ί之用 t玄晶乃下 -
m I 5 · -I-之又□ Μ l-r "Zrf -rr 士人-丄 α /4-ϊ· 一 «: 4-r* i^Tt L S 丄·々 ,二G 人二 lr U ㈡ if。, 个芍# “门< 刁疗你,厂·促1穴性业丄逆分4王ΛΓ «,J 取 r. m —r— Z-v ,士 ,,, 二,·^1 χτ 二丄 χ· ^Try rir τ > 〆;· Λ Λ 孑6且个臂1尤;^'笟貝δ亿散敬m· <枉/r汉示劲:ύ .4— rr; -< .! >-/r rm I «.-r- -r-r .>r^r i 4 _-r· .· ·, 、卜 、 Λ _u ^ * ,J_- ,一 甲靖寻利现固弟i項汉弟i 4唄尸/r逑i符傲元欣 j 上逆仗 ϋιιι—Η1ιϋιι11ιιϋιϋ·ι III 111 il ill il il lii il ii ii il il liggggsi㈣ s!!ia!!i_iniilliIil‘il sllliilliHHHiii Hi ill i— ill ill ill ii i— il il ill ill il ill ^^l^l^llufiiw s!!_il 酬 i_〖l_i_i· 第了頁 528959 五、發明說明(.3) 務。本發明之較佳設計形式則述於各附屬權項中。 本發明之優點在於:由於在發生所界定的一事件時,將 計數器自動重定到該計數器之起始點,所以無須經由授權 的單位進行額外的重新啟動。由於每一密碼有分配給該密 碼的計數器,所以可根據每一密碼的功能而為每一密碼建 立不同的使周次數。甴於一晶片卡可為許多不同的應用設 有任何數目的密碼,所以禁止使周只限於受到影響的應 用。 因此’小會全®系止晶片卡的使用:合事彳午可以有封谷 別應周領域而調整的不同之安全性及使周者要求。 { 下文中將參照圖示,而利用一較佳設計實例詳述本發 明,這些圖示有 : 圖1是本發明之一狀態圖。 圖2是根據本發明的各事件與密碼間的各種可能組合 表。 圖1以狀態圖的形式示出本發明將一計數器用於計算一 受保護的資料單元或秘密資訊(尤其是一密碼)的使用次 數 c tf數哭沾把丛仿菩r a、古轿旯它沾一把从'拮r a、。 u/八 U I 口c/ ^ V \ X / >、 n f / | ) | /、 ^ V \ ^ ^ 二1p -Φ--* 乂土广 〇、· P.主,/?*!! λ’古 12--- Ρ 主,nu /古 *7又 -X- ) I -T i I V. <-» y l/ J 入“ / Μ Ίΰ ….,rj —M ,| 乃,J 口么 ~c?~ A f -t -irX. -^4- S?' AA m 台旨 t) 、 -. H r-r-> *C5~ *,iLr· ( V\
,日不 LBL V a次 ό| ^ Q'J T]/^ u j - χυ 个土 cp 不 节 j-p v u 夕 CTJ
Λ “ /士 -kfJ
W、J 過戶/f界έί] 某一最大值I 1¾言1 J-17, / L· /..h , »? U h^· n \ C1.? ^rA 1 /4- 〇3 » -r〇: n — 、上 ΓΪ; 七L / 一 r·^ 益⑦j、%正fj又恐l j ,只1j呆jn 1之巾故在、々巧 ύ 且托;苁行和l 4丁拔苽 -r-rC /-^ ·--*.*· r , ! /. U j·· f 、良 Λτ #-*-» wrc JL— /r-—» . * -fr v 1^· ι I Jk/ 崎尸/f 1示獲的工刀肐。对;^母一始、崎叻_吕,卻名一徊骑誠!丁數 "•rr'fili V«r< m 鼸匯_画_醒漏匯圍
隱 ISSililBS SIISI®·*®»· «μ α,ρ· l* j,ii1·,ι •••mi.·,Lit·,uJi ” _ 电.ί·」一,υ,方靡一··零♦_··!-_-1·1. ·*··υι,β».· j β! ill vr< ·ηππ trrrk rniMkiriVirrr ιπτ·γ· winvmh*_
IlilKiiMiKllMl! 隱 iSiSi» 驄 8: 鬮翮丨 —ιη·Ύ i.n··.山ΛΊιτνk*vfttar«*fh *

Claims (1)

  1. 案號 88110987 修正 A 六、申請專利範圍 1 . 一種防止以分析方式破解秘密資訊之程序,其特徵在 於下列步驟: a )將一計數器分配給秘密資訊(S 1 - S η ),以便建立 秘密資訊之使用次數; b )將該計數器設定為一起始值(A ); c )於每次使用秘密資訊(S 1 - S η )時,即將該計數器 的起始值(Β )遞增所界定的一值; d)當發生所界定的一事件(Ε2、Ε3、Ε4、Εη)時,將 該計數器之值(Β )重定到該起始值(A );以及 e )於到達所界定的最大值(C )時,禁止該秘密資訊 之使用。 2 .如申請專利範圍第1項之程序,進一步包含下列步 驟: f )當出現所界定的一事件(d ),並將該計數器之值 重定到該起始值(A )時,即解除禁止使用該秘密資訊。 3 .如申請專利範圍第1或第2項之程序,其中步驟(d)中 之起始值為一個新的起始值。 4.如申請專利範圍第1或第2項之程序,其中係重複步驟 (c ),直到發生步驟(d )中之所界定該事件為止,或直到到 達步驟(e )中之所界定該最大值為止。 5 .如申請專利範圍第1或第2項之程序,其中係將數件秘 密資訊分配給一計數器。 6 .如申請專利範圍第1或第2項之程序,其中一事件 (E 1 - Ε η )可能是任何技術性、經濟性、或組織性條件,且
    0-\59\59039-911216.ptc 第13頁 I號88110987 〜年月| ?曰 修正系 六、申請專利範圍 可由一是/否決定的呈現而使用該條件。 7 .如申請專利範圍第1或第2項之程序,其中一事件包含 可利用邏輯π及π或邏輯"或π函數而相互組合的一個或多個 部分事件。 8 .如申請專利範圍第1或第2項之程序,其中係將同一事 件分配給不同的計數器。 9 .如申請專利範圍第8項之程序,其中在不同的計數器 中發生一事件時,將使計數器值遞增。 1 0 .如申請專利範圍第8項之程序,其中發生一事件時, 將使一計數器中之計數器值遞增,並將該計數器值重定到 另一計數器中之起始值。 1 1 .如申請專利範圍第1或第2項之程序,其中該秘密資 訊是將資料編碼之一密碼。 1 2 .如申請專利範圍第1或第2項之程序,其中該秘密資 訊是用來在晶片卡上執行與安全相關的作業之一安全功 倉色。 1 3 .如申請專利範圍第1或第2項之程序,其中係將該密 碼儲存在一晶片卡中。 14. 一種電子裝置,用以儲存及處理其中包含如申請專 利範圍第1或第2項的一程序之秘密資訊。 1 5 .如申請專利範圍第1 4項之裝置,其中該該電子裝置 是一晶片卡或安全模組。 1 6 . —種資料載體,該資料載體存有用來執行如申請專 利範圍第1或第2項的程序之一程式。
    O:\59\59039-911216.ptc 第14頁
TW088110987A 1998-07-17 1999-06-29 System and procedure for protection against the analytical espionage of secret information TW528959B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE19831884A DE19831884C2 (de) 1998-07-17 1998-07-17 System und Verfahren zum Schutz gegen analytisches Ausspähen von geheimen Informationen

Publications (1)

Publication Number Publication Date
TW528959B true TW528959B (en) 2003-04-21

Family

ID=7874201

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088110987A TW528959B (en) 1998-07-17 1999-06-29 System and procedure for protection against the analytical espionage of secret information

Country Status (7)

Country Link
US (1) US6711685B1 (zh)
EP (1) EP0973134B1 (zh)
JP (1) JP2000047945A (zh)
KR (1) KR20000011286A (zh)
CN (1) CN1141649C (zh)
DE (2) DE19831884C2 (zh)
TW (1) TW528959B (zh)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002224806A1 (en) * 2000-12-09 2002-06-18 International Business Machines Corporation Aging of electronic payment units
JP3997052B2 (ja) 2000-12-13 2007-10-24 株式会社エヌ・ティ・ティ・ドコモ Icカード及びicカードの情報保護方法並びにicカード発行装置
US7207060B2 (en) * 2001-10-18 2007-04-17 Nokia Corporation Method, system and computer program product for secure ticketing in a communications device
FR2834366B1 (fr) * 2001-12-28 2004-08-20 Ct D Echanges De Donnees Et D Carte a puce autoverrouillable, dispositif de securisation d'une telle carte et procedes associes
DE10218210B4 (de) * 2002-04-24 2017-07-20 Deutsche Telekom Ag Verfahren und Vorrichtung zur Steuerung des Zugriffs auf eine Menge von Informationen und/oder Funktionen in Form eines geheimen Signatur-Schlüssels einer Chipkarte
DE10251265A1 (de) * 2002-11-04 2004-05-13 Giesecke & Devrient Gmbh Verfahren zum Schutz eines tragbaren Datenträgers
US7370268B2 (en) * 2003-08-01 2008-05-06 Migo Software, Inc. Systems and methods for managing and presenting multimedia and content rich data on a removable memory apparatus
DE10360998B4 (de) 2003-12-23 2008-09-04 Infineon Technologies Ag Schutz von Chips gegen Attacken
JP2005204137A (ja) * 2004-01-16 2005-07-28 Mitsubishi Electric Corp 相互認証システム及び管理対象装置及びプログラム
US7480931B2 (en) * 2004-07-24 2009-01-20 Bbs Technologies, Inc. Volume mount authentication
JP4616611B2 (ja) * 2004-10-08 2011-01-19 富士通株式会社 生体認証装置
CN100498641C (zh) * 2004-11-12 2009-06-10 上海电气集团股份有限公司 一种防止智能装置输入密码被破译的密码安全保护方法
EP1843513A1 (en) 2005-01-24 2007-10-10 Matsushita Electric Industrial Co., Ltd. Signature generation device and signature verification device
US7779456B2 (en) * 2005-04-27 2010-08-17 Gary M Dennis System and method for enhanced protection and control over the use of identity
US20070266434A1 (en) * 2006-05-11 2007-11-15 Reifer Consultants, Inc. Protecting Applications Software Against Unauthorized Access, Reverse Engineering or Tampering
DE102005030072A1 (de) * 2005-06-27 2007-01-04 Giesecke & Devrient Gmbh Verfahren zum Schutz vertraulicher Daten
DE102005058878B4 (de) * 2005-12-09 2007-08-09 Infineon Technologies Ag Datentransfervorrichtung und Verfahren zum Senden von Daten
KR20080113277A (ko) * 2006-04-28 2008-12-29 파나소닉 주식회사 프로그램 난독화시스템, 프로그램 난독화장치 및 프로그램 난독화방법
DE102006061338A1 (de) * 2006-12-22 2008-06-26 Giesecke & Devrient Gmbh Authentisierung portabler Datenträger
DE102007008652A1 (de) * 2007-02-20 2008-08-28 Bundesdruckerei Gmbh Chipkarte mit einer Erstnutzerfunktion, Verfahren zur Wahl einer Kennung und Computersystem
FR2926382B1 (fr) 2008-01-11 2010-02-26 Proton World Internat Nv Hierarchisation de cles cryptographiques dans un circuit electronique
DE102008027456A1 (de) 2008-06-09 2009-12-10 Giesecke & Devrient Gmbh Verfahren zum Schutz eines tragbaren Datenträgers
DE102008056332A1 (de) * 2008-11-07 2010-05-20 Giesecke & Devrient Gmbh Sichere kryptographische Berechnung
CN102110205B (zh) * 2010-12-23 2013-06-05 北京握奇数据系统有限公司 一种智能卡的操作权限检查方法及一种智能卡
CN102255901B (zh) * 2011-07-06 2012-07-04 广州汽车集团股份有限公司 车载诊断安全验证方法
JP5971079B2 (ja) * 2012-10-22 2016-08-17 大日本印刷株式会社 携帯記録担体およびコンピュータプログラム
FR2999747B1 (fr) * 2012-12-19 2018-05-04 Idemia France Procede de securisation d'un dispositif apte a communiquer avec un lecteur selon deux protocoles d'authentification
EP3447509B1 (en) * 2017-08-21 2021-05-26 Eshard Method of testing the resistance of a circuit to a side channel analysis

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60207957A (ja) * 1984-03-31 1985-10-19 Toshiba Corp デ−タ保護方式
JPS61210488A (ja) * 1985-03-14 1986-09-18 Toppan Moore Co Ltd Icカ−ド
DE3671119D1 (de) 1985-07-03 1990-06-13 Siemens Ag Integrierte schaltung und verfahren zum sichern von geheimen codedaten.
FR2668278A1 (fr) * 1990-10-19 1992-04-24 Gemplus Card Int Procede pour la ratification de codes secrets pour cartes a memoires.
FR2674647A1 (fr) * 1991-03-29 1992-10-02 Widmer Michel Appareil formant chequier electronique pour transactions financieres et procede d'utilisation d'un tel appareil.
FR2705810B1 (fr) * 1993-05-26 1995-06-30 Gemplus Card Int Puce de carte à puce munie d'un moyen de limitation du nombre d'authentifications.
DE19506921C2 (de) 1995-02-28 1997-03-20 Orga Kartensysteme Gmbh Verfahren zur Durchführung eines Geheimcodevergleiches bei einem mikroprozessorgestützten, tragbaren Datenträger
DE19604349A1 (de) * 1996-02-07 1997-08-14 Deutsche Telekom Ag Verfahren zum Abrechnen elektronischer Geldbörsensysteme mit Chipkarten
JPH1069435A (ja) 1996-08-28 1998-03-10 Dainippon Printing Co Ltd Icカード

Also Published As

Publication number Publication date
EP0973134A1 (en) 2000-01-19
EP0973134B1 (en) 2003-07-09
DE19831884C2 (de) 2001-09-20
DE19831884A1 (de) 2000-01-20
KR20000011286A (ko) 2000-02-25
CN1245311A (zh) 2000-02-23
CN1141649C (zh) 2004-03-10
JP2000047945A (ja) 2000-02-18
DE69909379D1 (de) 2003-08-14
US6711685B1 (en) 2004-03-23
DE69909379T2 (de) 2004-04-15

Similar Documents

Publication Publication Date Title
TW528959B (en) System and procedure for protection against the analytical espionage of secret information
CN111884806B (zh) 用于认证用户或确保交互安全的系统和硬件认证令牌
US11100202B2 (en) Fingerprint recognition method and device for touch screen, and touch screen
US8272040B2 (en) Preventing inadvertent lock-out during password entry dialog
US9413752B2 (en) One-time password operating method
WO2016015448A1 (zh) 一种多系统进入方法、装置及终端
WO2016106989A1 (zh) 多系统安全验证方法、多系统安全验证装置和终端
WO2014079139A1 (zh) 一种移动终端数据的保护方法及系统
WO2015117674A1 (en) Method for unlocking a mobile communication device and a device thereof
EP2936277B1 (en) Method and apparatus for information verification
US20150350202A1 (en) Processing Method For Piecing Together Fingerprint Based on Mobile Terminal and Mobile Terminal
JP4245151B2 (ja) 使用制限機能付携帯電話機および該機を使用制限する方法
WO2017166689A1 (zh) 一种隐私保护的方法及装置
CN103440446A (zh) 智能终端私密内容保护解锁操作方法和装置
US8839360B1 (en) Scope-limited action-specific authorization token
CN106534479B (zh) 基于隐码识别与隐式变换的手机密码保护系统
KR101330113B1 (ko) 자릿값 기반의 인증 장치 및 방법
US20160300416A1 (en) Electronic Lock and Verification Method for Unlocking the Same
Weber Warning-Weak Password: The Courts' Indecipherable Approach to Encryption and the Fifth Amendment
JP2004102635A (ja) ユーザ認証方法、情報システム、文書保存装置及びデジタル複合機
TWI820007B (zh) 聯絡人資訊的顯示方法和裝置以及資訊的顯示方法和裝置
US20100212009A1 (en) Multi-Method Emergency Access
KR101683697B1 (ko) 이중보안기능이 구비된 홍채인식시스템 및 그 제어방법
CN105975841A (zh) 一种基于加密狗锁定/解锁电脑屏幕的方法
Tiefenau et al. " Please enter your PIN"--On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees