WO2005119583A2 - Composant pour module de sécurité - Google Patents
Composant pour module de sécurité Download PDFInfo
- Publication number
- WO2005119583A2 WO2005119583A2 PCT/EP2005/052519 EP2005052519W WO2005119583A2 WO 2005119583 A2 WO2005119583 A2 WO 2005119583A2 EP 2005052519 W EP2005052519 W EP 2005052519W WO 2005119583 A2 WO2005119583 A2 WO 2005119583A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- processor
- cpu
- memory
- eeprom
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
Definitions
- the present invention relates to the field of security modules containing at least one processor and memories generally in the form of smart cards. These are available with or without contacts and are used in various applications requiring secure transactions such as payment, confidential data exchange or access control.
- the security module can be made essentially in three distinct forms.
- One of them is a microprocessor card, a smart card, or more generally an electronic module (having a shape of key, badge, ).
- Such a module is generally removable and connectable to a digital pay-TV decoder.
- the form with electrical contacts is the most used, but does not exclude a contactless connection, for example type ISO 14443.
- a second known form is that of an integrated circuit package placed, generally definitively and irremovably in the housing of the decoder.
- a variant consists of a welded circuit or mounted on a base or a connector such as a SIM module connector.
- the security module is integrated in an integrated circuit package also having another function, for example in a descrambling module of the decoder or the microprocessor of the decoder.
- these security modules are in the form of cards. They serve as a means of personalizing and securing access to encrypted programs received by decoders installed at subscribers.
- a pay-TV decoder is equipped with a card reader with two mouths in each of which is inserted a smart card.
- the first card includes an identification element including partially encrypted personal and official information.
- the second smart card includes an application element containing access keys and algorithms for accessing the information contained in the identification element of the first card.
- the chips or integrated circuits of each of the two cards are grouped on a single medium thus constituting a single card whose integrated circuits are accessible separately by the card reader.
- This map includes the necessary data defining several levels of decryption allowing access to the data contained in one or the other of the two integrated circuits.
- the object of the present invention is to optimally improve the security of smart cards by preventing the fraudulent control of the cryptographic processor (s) by means of external signals that disturb the normal progress of the tasks of the processor (s).
- a security module component comprising at least two processors each connected to program memories, non-volatile programmable and erasable memories (EEPROM) containing data and to random access memories (RAM) for temporary storage of data being processed, the first processor having an interface bus with the outside of the component, characterized in that the second processor is connected to the first processor via an exchange memory (DPR), the programmable and erasable non-volatile memory of the first processor being only read access for said first processor, the second processor having a read and write access to said non-volatile programmable and erasable memory of the first processor.
- DPR exchange memory
- a component is a unit that includes all the elements necessary for cryptographic operations and is grouped together on a single medium to ensure its security. These components are generally composed of a single chip, chip that has a mechanical or electronic intrusion protection. Other structures composed for example of two electronic chips are also likened to the term "component" as long as they are intimately linked and provided by distributors as a single element.
- This component preferably manufactured on a single silicon chip is generally implanted in a portable medium, usually a removable smart card.
- the latter is equipped with accesses connected to the first processor constituted either by a set of contacts disposed on one of the faces of the card according to the ISO 7816 standard, or by an antenna allowing a data exchange by channel.
- electromagnetic non - contact (ISO 14443) with a suitable read - write device.
- the latter is a part of a larger electronic module comprising encrypted data processing functionalities.
- Part of this module for example deals with encrypted data DVB and the component is only part of the silicon in charge of these treatments.
- the electronic module can either be mounted in the receiving unit or be removably connected to said receiving unit.
- the configuration of the component according to the present invention makes it possible to totally isolate the second processor with respect to the external accesses. Indeed, there is no direct connection between the two processors that would allow access to the second processor using adequate instructions transmitted to the first processor via external access.
- the memories connecting the two processors act as a barrier blocking unwanted commands from external accesses and secondly, they prevent the analysis, via the same accesses, signals that pass between the two processors.
- the first processor can not modify its program itself. Any modification of its program must be verified by the second processor.
- the second processor can thus perform cryptographic operations independently of the operations performed by the first processor. In addition, it can not perform certain critical security tasks without the permission of the second processor.
- FIG. 1 illustrates a block diagram of a security module component comprising two processors each connected to a set of memories and interconnected by an exchange memory.
- the IC component of FIG. 1 is generally produced on a single chip which is mounted on a portable support constituted, according to a preferred embodiment, by a card provided with ACC access in the form of contacts or an antenna.
- the component IC comprises two processors CPU A, CPU B connected via an exchange RAM DPR and a non-volatile memory programmable and erasable EEPROM A.
- the first CPU A is connected on the one hand to ACC access and secondly to a RAM RAM A and a ROM A.
- the second processor CPU B is also connected to a RAM RAM B and a ROM ROM B as well as a non-volatile memory. volatile programmable and erasable EEPROM B.
- a programmable and erasable non-volatile additional memory STAT may be connected in R / W read / write mode to the first processor CPU A. It serves to store, for example, component operating history data that would be accessible in read from outside via ACC access.
- connection of the first processor CPU A with the non-volatile programmable and erasable EEPROM memory A is configured as read-only R while the connection with the second processor CPU B is configured at the same time. times in read and write R / W.
- Another aspect of this invention is the presence of the exchange RAM DPR whose connections to each of the processors CPU A and CPU B are configured read and write R / W.
- the first processor A CPU of this component accessible from the outside, is responsible for performing tasks known security modules that is to say such as the management of CW control words and ECM control messages and than the verification of the rights of the card.
- secure operations such as authentication, decryption of EMM management message or key management and decryption algorithms are reserved for the second CPU B processor.
- the second processor CPU B manages and executes all the secure operations using encryption / decryption keys stored, for example, in the ROM B.
- the non-volatile programmable and erasable EEPROM memory B contains the programs as well as the algorithms necessary for decryption according to instructions communicated by the first processor CPU A via the exchange RAM DPR.
- the contents of the non-volatile programmable and erasable EEPROM memory A can not be modified from the outside. Any instruction of the processor resulting from commands received via the accesses ACC is stored temporarily in the exchange RAM DPR and its execution is verified by the second processor CPU B before the resulting data is stored by said second processor CPU B in the memory Non-volatile EEPROM A via the R / W port.
- the CPU B processor can directly control the processor CPU A by means of a connection C without going through the exchange memory DPR.
- Such a control allows for example a fast activation or blocking of the processor CPU A according to the result of a check performed by the processor CPU B.
- a card comprising a component as described above may be used in a digital pay television decoder where a high security is required on the one hand, in terms of access rights to encrypted data of a broadcast audio video stream by cable or satellite and on the other hand, at the level of the operating software of the card.
- a function of the card is to control access to encrypted data of an audio video stream received by the decoder by checking ECM control messages accompanying said encrypted data. When this verification is successful, the decryption of the data of the stream is authorized according to the rights of access to the audio video data included in the ECM message.
- the management center sends EMM administration messages that are generally individual, namely encrypted by a unique key for this user.
- this type message can not be decrypted by the processor CPU A since it does not have the unique personal key of the user.
- This key can be symmetrical or asymmetrical (private key and public key).
- the memory that will contain this right is the EEPROM memory A in our example. Since this memory is only writable by the CPU B processor, the CPU A processor will transmit the EMM administration message to the CPU B processor via the DPR exchange memory. The CPU B processor will start its message decryption cycle, and after verification, will update the EEPROM A with the new rights.
- the downloading of the software of the card stored in the non-volatile memory EEPROM A or the updating of this software is managed with increased security in a card equipped with a component according to the invention. Indeed, it will not be possible to store software in such a card via ACC access and CPU A processor without performing checks through CPU B processor.
- the software or an update is received by the decoder in the form of encrypted blocks which will then be routed one by one to the first processor CPU A via ACC access of the card.
- the CPU A processor can not decrypt because it does not have the corresponding key.
- These blocks are transmitted to the CPU B via the exchange memory DPR.
- the CPU B will launch a decryption process in a secure mode so uninterruptible.
- the result of this operation is stored in the CPU B specific memory ie EEPROM B.
- the CPU B receives this message via the exchange memory DPR and will be able to calculate the signature of the previously decrypted data block and compare it with this received in the message. Only once this check is made, the CPU B will initiate a write cycle of the memory of the CPU A namely EEPROM A.
- the processor CPU B transfers them to the EEPROM memory A.
- the processor CPU A then takes care of the installation and the commissioning of the new software.
- all the blocks stored in the EEPROM memory B can still be verified by the processor CPU B by calculating a print on all the blocks. The comparison is then carried out with the global signature of the software obtained, also via an EMM message.
- the EMM management messages are processed by the CPU A. It should be noted that during each session for decrypting these EMM messages, the CPU A processor requests the key needed by the processor B for direct execution. of the decryption. Once the decryption is complete, the key is erased and stored only in RAM RAM A of CPU A. There is therefore no intermediate storage of the key in non-volatile memory EEPROM A which would thus be accessible for reading via ACC access. Only intermediate results of calculations are stored in the RAM RAM A and the processor CPU A transfers the final data (rights for example) in the memory STAT.
- each additional processor would be connected to a two-port DPR exchange RAM memory, one of which would be connected to the first processor having access to the outside.
- the separation RAM DPR can comprise as many additional ports as is necessary for the connection of additional processors.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Description
Claims
Priority Applications (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05752825A EP1766588B1 (fr) | 2004-06-03 | 2005-06-02 | Composant pour module de sécurité |
DK05752825T DK1766588T3 (da) | 2004-06-03 | 2005-06-02 | Sikkerhedsmodulkomponent |
BRPI0511213-3A BRPI0511213B1 (pt) | 2004-06-03 | 2005-06-02 | Safety module component |
KR1020067025380A KR101136163B1 (ko) | 2004-06-03 | 2005-06-02 | 보안 모듈 컴포넌트 |
CA2568831A CA2568831C (fr) | 2004-06-03 | 2005-06-02 | Composant pour module de securite |
JP2007513964A JP2008502039A (ja) | 2004-06-03 | 2005-06-02 | セキュリティモジュール用コンポーネント |
PL05752825T PL1766588T3 (pl) | 2004-06-03 | 2005-06-02 | Składnik modułu bezpieczeństwa |
AU2005251025A AU2005251025B2 (en) | 2004-06-03 | 2005-06-02 | Security module component |
MXPA06014008A MXPA06014008A (es) | 2004-06-03 | 2005-06-02 | Componente para modulo de seguridad. |
NZ551633A NZ551633A (en) | 2004-06-03 | 2005-06-02 | Security module component |
DE602005009192T DE602005009192D1 (de) | 2004-06-03 | 2005-06-02 | Sicherheitsmodul-komponente |
IL179720A IL179720A (en) | 2004-06-03 | 2006-11-30 | Security module component |
NO20065821A NO337437B1 (no) | 2004-06-03 | 2006-12-15 | Sikkerhetsmodulkomponent |
HK07104158A HK1098564A1 (en) | 2004-06-03 | 2007-04-20 | Security module component |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04102505A EP1603088A1 (fr) | 2004-06-03 | 2004-06-03 | Composant pour module de sécurité |
EP04102505.7 | 2004-06-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2005119583A2 true WO2005119583A2 (fr) | 2005-12-15 |
WO2005119583A3 WO2005119583A3 (fr) | 2006-03-16 |
Family
ID=34929167
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2005/052519 WO2005119583A2 (fr) | 2004-06-03 | 2005-06-02 | Composant pour module de sécurité |
Country Status (26)
Country | Link |
---|---|
US (1) | US7313665B2 (fr) |
EP (2) | EP1603088A1 (fr) |
JP (1) | JP2008502039A (fr) |
KR (1) | KR101136163B1 (fr) |
CN (1) | CN100562903C (fr) |
AR (1) | AR049348A1 (fr) |
AT (1) | ATE405903T1 (fr) |
AU (1) | AU2005251025B2 (fr) |
BR (1) | BRPI0511213B1 (fr) |
CA (1) | CA2568831C (fr) |
DE (1) | DE602005009192D1 (fr) |
DK (1) | DK1766588T3 (fr) |
ES (1) | ES2311991T3 (fr) |
HK (1) | HK1098564A1 (fr) |
IL (1) | IL179720A (fr) |
MX (1) | MXPA06014008A (fr) |
MY (1) | MY142952A (fr) |
NO (1) | NO337437B1 (fr) |
NZ (1) | NZ551633A (fr) |
PL (1) | PL1766588T3 (fr) |
PT (1) | PT1766588E (fr) |
RU (1) | RU2377655C2 (fr) |
SI (1) | SI1766588T1 (fr) |
TW (1) | TWI351607B (fr) |
WO (1) | WO2005119583A2 (fr) |
ZA (1) | ZA200700029B (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009520294A (ja) * | 2005-12-19 | 2009-05-21 | アクサルト・エス・アー | ペアレンタルコントロール付きのパーソナルトークン |
US8793502B2 (en) | 2007-11-26 | 2014-07-29 | Nagravision S.A. | Method for evaluating user's rights stored in a security module |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI280026B (en) * | 2004-07-02 | 2007-04-21 | Univ Chang Gung | RSA with personalized secret |
US20080019517A1 (en) * | 2006-04-06 | 2008-01-24 | Peter Munguia | Control work key store for multiple data streams |
WO2008001344A2 (fr) | 2006-06-27 | 2008-01-03 | Waterfall Solutions Ltd | Liaison unidirectionnelle sécurisée |
IL180748A (en) * | 2007-01-16 | 2013-03-24 | Waterfall Security Solutions Ltd | Secure archive |
FR2914459B1 (fr) | 2007-03-30 | 2009-07-03 | Oberthur Card Syst Sa | Carte a microprocesseurs |
US8613081B2 (en) | 2007-05-11 | 2013-12-17 | Nagrastar Llc | Apparatus for controlling processor execution in a secure environment |
FR2923632B1 (fr) | 2007-11-13 | 2010-01-08 | Oberthur Card Syst Sa | Carte a microprocesseur, telephone comprenant une telle carte et procede de traitement dans une telle carte. |
FR2923634B1 (fr) | 2007-11-13 | 2010-06-18 | Oberthur Card Syst Sa | Carte a microprocesseur, telephone comprenant une telle carte et procede d'execution d'une commande dans une telle carte. |
FR2923633B1 (fr) | 2007-11-13 | 2010-06-18 | Oberthur Card Syst Sa | Carte a microprocesseur, telephone comprenant une telle carte et procede d'execution d'une commande dans une telle carte. |
EP2129115B1 (fr) * | 2008-05-29 | 2019-05-01 | Nagravision S.A. | Méthode de mise à jour de données de sécurité dans un module de sécurité et module de sécurité pour la mise en oeuvre de cette méthode |
FR2960322B1 (fr) * | 2010-05-20 | 2012-07-27 | P1G | Equipement portable de communication, systeme et procede de communication entre un terminal local et une pluralite d'equipements portables |
US8839001B2 (en) * | 2011-07-06 | 2014-09-16 | The Boeing Company | Infinite key memory transaction unit |
US9635037B2 (en) | 2012-09-06 | 2017-04-25 | Waterfall Security Solutions Ltd. | Remote control of secure installations |
US9419975B2 (en) | 2013-04-22 | 2016-08-16 | Waterfall Security Solutions Ltd. | Bi-directional communication over a one-way link |
CN103391190A (zh) * | 2013-07-30 | 2013-11-13 | 东莞宇龙通信科技有限公司 | 终端和数据处理方法 |
CN104678757A (zh) * | 2013-12-02 | 2015-06-03 | 景德镇昌航航空高新技术有限责任公司 | 一种直升机发动机双余度燃油调节控制器 |
CN103888446A (zh) * | 2014-02-28 | 2014-06-25 | 西南交通大学 | 面向铁路信号控制网络的协议安全隔离系统 |
FR3024927B1 (fr) * | 2014-08-14 | 2016-08-26 | Zodiac Aero Electric | Systeme de distribution electrique pour un aeronef |
IL235175A (en) | 2014-10-19 | 2017-08-31 | Frenkel Lior | Secure desktop remote control |
IL250010B (en) | 2016-02-14 | 2020-04-30 | Waterfall Security Solutions Ltd | Secure connection with protected facilities |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5666412A (en) | 1994-10-03 | 1997-09-09 | News Datacom Ltd. | Secure access systems and methods utilizing two access cards |
DE19811646A1 (de) | 1998-03-18 | 1999-09-23 | Kathrin Schier | Multifunktions-Chipkarte |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5839849A (en) * | 1997-02-21 | 1998-11-24 | Pacholok; David R. | Mechanical tire deflating device |
FR2787900B1 (fr) * | 1998-12-28 | 2001-02-09 | Bull Cp8 | Circuit integre intelligent |
US6829711B1 (en) * | 1999-01-26 | 2004-12-07 | International Business Machines Corporation | Personal website for electronic commerce on a smart java card with multiple security check points |
FR2795838B1 (fr) * | 1999-06-30 | 2001-08-31 | Bull Cp8 | Procede de securisation du traitement d'une information sensible dans un module de securite monolithique, et module de securite associe |
JP2001216284A (ja) * | 1999-11-25 | 2001-08-10 | Denso Corp | 電子制御装置 |
AU1586500A (en) * | 1999-12-06 | 2001-06-12 | Sun Microsystems, Inc. | Computer arrangement using non-refreshed dram |
DE10107373A1 (de) * | 2001-02-16 | 2002-08-29 | Infineon Technologies Ag | Sicherheitsmodul mit flüchtigem Speicher zur Speicherung eines Algorithmuscodes |
US7502817B2 (en) * | 2001-10-26 | 2009-03-10 | Qualcomm Incorporated | Method and apparatus for partitioning memory in a telecommunication device |
FR2834154B1 (fr) * | 2001-12-21 | 2005-03-11 | Oberthur Card Syst Sa | Unite electronique incluant des moyens de cryptographie capables de traiter des informations a haut debit |
FR2843154B1 (fr) | 2002-08-01 | 2005-08-19 | Fors Ind | Dispositif et procede antivol pour articles comportant au moins une extremite ou une section de forme sensiblement cylindrique |
GB0324364D0 (en) * | 2003-10-17 | 2003-11-19 | Nokia Corp | Authentication of messages in a communication system |
-
2004
- 2004-06-03 EP EP04102505A patent/EP1603088A1/fr not_active Withdrawn
-
2005
- 2005-05-26 TW TW094117299A patent/TWI351607B/zh not_active IP Right Cessation
- 2005-06-01 MY MYPI20052504A patent/MY142952A/en unknown
- 2005-06-02 DE DE602005009192T patent/DE602005009192D1/de active Active
- 2005-06-02 MX MXPA06014008A patent/MXPA06014008A/es active IP Right Grant
- 2005-06-02 ES ES05752825T patent/ES2311991T3/es active Active
- 2005-06-02 ZA ZA200700029A patent/ZA200700029B/en unknown
- 2005-06-02 WO PCT/EP2005/052519 patent/WO2005119583A2/fr active IP Right Grant
- 2005-06-02 PL PL05752825T patent/PL1766588T3/pl unknown
- 2005-06-02 JP JP2007513964A patent/JP2008502039A/ja not_active Withdrawn
- 2005-06-02 SI SI200530437T patent/SI1766588T1/sl unknown
- 2005-06-02 BR BRPI0511213-3A patent/BRPI0511213B1/pt active IP Right Grant
- 2005-06-02 AU AU2005251025A patent/AU2005251025B2/en not_active Ceased
- 2005-06-02 KR KR1020067025380A patent/KR101136163B1/ko not_active IP Right Cessation
- 2005-06-02 DK DK05752825T patent/DK1766588T3/da active
- 2005-06-02 EP EP05752825A patent/EP1766588B1/fr active Active
- 2005-06-02 US US11/142,309 patent/US7313665B2/en active Active
- 2005-06-02 CA CA2568831A patent/CA2568831C/fr active Active
- 2005-06-02 CN CNB2005800210920A patent/CN100562903C/zh active Active
- 2005-06-02 NZ NZ551633A patent/NZ551633A/en not_active IP Right Cessation
- 2005-06-02 PT PT05752825T patent/PT1766588E/pt unknown
- 2005-06-02 AT AT05752825T patent/ATE405903T1/de active
- 2005-06-02 RU RU2006141602/09A patent/RU2377655C2/ru not_active IP Right Cessation
- 2005-06-03 AR ARP050102275A patent/AR049348A1/es not_active Application Discontinuation
-
2006
- 2006-11-30 IL IL179720A patent/IL179720A/en not_active IP Right Cessation
- 2006-12-15 NO NO20065821A patent/NO337437B1/no not_active IP Right Cessation
-
2007
- 2007-04-20 HK HK07104158A patent/HK1098564A1/xx not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5666412A (en) | 1994-10-03 | 1997-09-09 | News Datacom Ltd. | Secure access systems and methods utilizing two access cards |
US5774546A (en) | 1994-10-03 | 1998-06-30 | News Datacom Ltd. | Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of security levels |
DE19811646A1 (de) | 1998-03-18 | 1999-09-23 | Kathrin Schier | Multifunktions-Chipkarte |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009520294A (ja) * | 2005-12-19 | 2009-05-21 | アクサルト・エス・アー | ペアレンタルコントロール付きのパーソナルトークン |
US8793502B2 (en) | 2007-11-26 | 2014-07-29 | Nagravision S.A. | Method for evaluating user's rights stored in a security module |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1766588B1 (fr) | Composant pour module de sécurité | |
EP0707290B1 (fr) | Procédé de chargement d'une zone mémoire protégée d'un dispositif de traitement de l'information et dispositif associé | |
EP0475837B1 (fr) | Procédé de gestion d'un programme d'application chargé dans un support à microcircuit | |
EP0426541B1 (fr) | Procédé de protection contre l'utilisation frauduleuse de cartes à microprocesseur, et dispositif de mise en oeuvre | |
EP2060117B1 (fr) | Processeur de securite et procede et support d'enregistrement pour configurer le comportement de ce processeur | |
FR2704341A1 (fr) | Dispositif de protection des clés d'une carte à puce. | |
EP0606792B1 (fr) | Procédé d'authentification d'un ensemble informatique par un autre ensemble informatique | |
EP0893751A1 (fr) | Circuit intégré et méthode de traitement sûr de données utilisant ce circuit intégré | |
EP2107808A1 (fr) | Module de sécurité (SM) pour unité de traitement de données audio/vidéo | |
EP1353511B1 (fr) | Procédé de gestion de droits d'accès à des services de télévision | |
EP1773055B1 (fr) | Méthode de vérification de droits contenus dans un module de sécurité | |
EP1961225A1 (fr) | Processeur de securite et procedes d'inscription de titres d'acces et de cles cryptographiques | |
EP1609326B1 (fr) | Procede de protection d'un terminal de telecommunication de type telephone mobile | |
EP2053532A1 (fr) | Procédé d'ouverture sécurisée à des tiers d'une carte à microcircuit | |
EP0889450B1 (fr) | Méthode de chargement de donnees dans une carte à microprocesseur | |
EP1451784B1 (fr) | Systeme de controle d'acces a un reseau et procede de controle d'acces correspondant | |
FR2856815A1 (fr) | Procede d'authentification de donnees contenues dans un objet a memoire | |
WO2004093019A1 (fr) | Entite electronique securisee avec compteur modifiable d'utilisations d’une donnee secrete | |
EP1850259A2 (fr) | Dispositif de protection des données et codes exécutables d'un système informatique | |
WO2003065181A1 (fr) | Procede de controle de l'exploitation de contenus numeriques par un module de securite ou une carte a puce comprenant ledit module | |
FR2870019A1 (fr) | Plate forme electronique a acces securise, et procede de securisation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 551633 Country of ref document: NZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2006/014008 Country of ref document: MX Ref document number: 2005251025 Country of ref document: AU Ref document number: 179720 Country of ref document: IL Ref document number: 2007513964 Country of ref document: JP Ref document number: 2568831 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067025380 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12006502437 Country of ref document: PH |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005752825 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580021092.0 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1638/MUMNP/2006 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007/00029 Country of ref document: ZA Ref document number: 200700029 Country of ref document: ZA |
|
ENP | Entry into the national phase |
Ref document number: 2005251025 Country of ref document: AU Date of ref document: 20050602 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2005251025 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006141602 Country of ref document: RU |
|
WWP | Wipo information: published in national office |
Ref document number: 1020067025380 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005752825 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: PI0511213 Country of ref document: BR |
|
WWG | Wipo information: grant in national office |
Ref document number: 2005752825 Country of ref document: EP |