WO2009010919A2 - Clé électronique pour un test fonctionnel d'un dispositif électronique - Google Patents

Clé électronique pour un test fonctionnel d'un dispositif électronique Download PDF

Info

Publication number
WO2009010919A2
WO2009010919A2 PCT/IB2008/052833 IB2008052833W WO2009010919A2 WO 2009010919 A2 WO2009010919 A2 WO 2009010919A2 IB 2008052833 W IB2008052833 W IB 2008052833W WO 2009010919 A2 WO2009010919 A2 WO 2009010919A2
Authority
WO
WIPO (PCT)
Prior art keywords
dongle
electronic device
interface
communication
functional test
Prior art date
Application number
PCT/IB2008/052833
Other languages
English (en)
Other versions
WO2009010919A3 (fr
Inventor
Harald Bauer
Patrick Fulcheri
Jean-Philippe Perrin
Original Assignee
Nxp B.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nxp B.V. filed Critical Nxp B.V.
Publication of WO2009010919A2 publication Critical patent/WO2009010919A2/fr
Publication of WO2009010919A3 publication Critical patent/WO2009010919A3/fr

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/31719Security aspects, e.g. preventing unauthorised access during test
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Definitions

  • the invention relates to a dongle. Beyond this, the invention relates to an electronic device.
  • the invention relates to a communication system formed by a dongle and an electronic device.
  • the invention relates to a method of functionally testing an electronic device.
  • Portable electronic devices become more and more important. Particularly, an increasing number of users buy mobile phones and headphone-based audio players.
  • Debugging is a methodical process of finding and reducing the number of bugs, or defects, in a computer program or a piece of electronic hardware thus making it behave as expected.
  • US 7,103,782 discloses a secure memory and processing system for use in various types of communication devices.
  • the secure processing system provides for the encryption and storage of sensitive data in a storage medium external to the secure processing system.
  • the encrypted data is decrypted with encryption logic circuitry within the secure memory and transferred to a zeroizable memory for use by a host processor.
  • the secure memory uses a laser-scribed encryption key coupled to encryption logic circuitry within the secure memory for encrypting and decrypting the sensitive information.
  • a dongle for functionally testing (for instance controlling debugging of) an electronic device
  • the dongle comprises a device interface adapted for a communicative connection with the electronic device, and a device communication unit adapted for exchanging communication messages with an electronic device being communicatively connected to the device interface in such a manner, that execution of a functional test for analyzing a function of the electronic device is selectively enabled when the electronic device is communicatively connected to the device interface.
  • an electronic device comprising a dongle interface adapted for a communicative connection with a dongle for functionally testing the electronic device, and a dongle communication unit adapted for exchanging communication messages with a dongle being communicatively connected to the dongle interface in such a manner, that execution of a functional test for analyzing a function or operation of the electronic device is selectively enabled when the dongle is communicatively connected to the dongle interface.
  • a communication system for functionally testing an electronic device comprising a dongle having the above mentioned features and an electronic device having the above mentioned features, wherein the device interface of the dongle is adapted for a communicative connection with the dongle interface of the electronic device, and wherein the device communication unit is adapted for exchanging communication messages with the dongle communication unit of the electronic device when the device interface of the dongle is communicatively connected to the dongle interface of the electronic device.
  • a method of functionally testing an electronic device comprises communicatively connecting a dongle with the electronic device, and exchanging communication messages between the dongle and the electronic device in such a manner that execution of a functional test for analyzing a function of the electronic device is selectively enabled when the electronic device is communicatively connected to the dongle.
  • a program element for instance a software routine, in source code or in executable code
  • a processor when being executed by a processor, is adapted to control or carry out a functional test method having the above mentioned features.
  • a computer- readable medium for instance a CD, a DVD, a USB stick, a floppy disk or a harddisk
  • a computer program is stored which, when being executed by a processor, is adapted to control or carry out a functional test method having the above mentioned features.
  • Data processing for functional test control purposes which may be performed according to embodiments of the invention can be realized by a computer program, that is by software, or by using one or more special electronic optimization circuits, that is in hardware, or in hybrid form, that is by means of software components and hardware components.
  • the term "functional test” may particularly denote performing a routine which analyzes the electronic device regarding proper function or possible bugs. In case of the retrieval of one or more of such bugs, the functional test may or may not include performing activities for removing or eliminating bugs.
  • the functional test may therefore refer to a trace and debug mechanism, or - in a test mode - to the performance of a pure test routine. Thus embodiments of the invention can be used to enable access to any kind of "test modes" only if the dongle is present.
  • the term “tracing and debugging” may particularly denote a methodical process of finding and reducing the number of bugs, or defects, in a computer program or a piece of electronic hardware thus making it behave as expected.
  • It may denote a procedure of detecting, locating, and removing mistakes or imperfections from a program code or any system component. It may denote the process of correcting errors in the execution of a task or a function of a device, which may be helped by error diagnostics.
  • the term "dongle” may particularly denote a small hardware device or a periphery device that connects to an electronic device and acts as an authentication key for a particular piece of tracing and/or debugging software.
  • this software protection dongle is present, the tracing and/or debugging software will run properly; when it is not, the tracing and/or debugging program will not run, will run in a restricted mode or will refuse to start.
  • a tracing and/or debugging dongle may denote a hardware unit detachably connectable to the electronic device for temporarily enabling the execution of a tracing and/or debugging routine being disabled in the absence of the tracing and/or debugging dongle.
  • the term "communicative connection” may particularly denote a coupling between two entities which coupling brings the two entities in an operation state in which unidirectional or bidirectional signal or information transmission/exchange is possible between the two entities.
  • exchange communication messages may particularly denote the activity of a first communication partner of sending messages to and/or receiving messages from a communicatively coupled second communication partner, which messages may be encoded/encrypted or non-encoded/non-encrypted messages.
  • a hardware dongle may be provided for an electronic device (such as a portable device, more particularly a mobile phone) which dongle is capable to trigger a mechanism to enable debug features of a component of the electronic device, particularly of a secure baseband integrated circuit
  • BB-IC which may be used in a mobile phone.
  • a debug feature may be enabled only if the hardware dongle has been connected to an already existing hardware interface of the component to be debugged, in the present example the BB-IC. Therefore, an apparatus and a method for tracing and/or debugging an integrated circuit of a portable electronic device (such as a mobile telephone) is provided. After inserting (or mounting) the hardware dongle in an interface (which may be a standard interface which may also be used for at least one further function) of the mobile phone, tracing and/or debugging can be carried out.
  • Enhanced security requirements to mobile phones may require secure baseband ICs
  • exemplary embodiments of the invention provide a tool (which may be denoted as a dongle) by means of which it is possible to enable a tracing and/or debugging of a secure baseband IC of a mobile phone.
  • the dongle may be connected to an interface (for instance a conventional interface such as an IOM-2 interface) of the mobile phone.
  • the baseband IC may send query data to the dongle via the interface.
  • the dongle may respond data to the baseband IC by using a secret key and/or cryptographic algorithms which are known to the baseband IC. If the baseband IC determines that the responded data from the dongle are correct, a tracing and/or debugging of the baseband IC may be enabled. Otherwise, tracing and/or debugging of the baseband IC may remain disabled.
  • a conventional interface such as an IOM-2 interface
  • IOM-2 interface of a conventional data bus (for instance an IOM-2 bus) on a mobile phone is usable (so that no additional hardware interface is necessary). This may have the effect that only authorized persons will get access to the dongle. Tracing and/or debugging may be only enabled, when the dongle is present. Thus, it may be possible to provide enhanced security features for mobile phones.
  • a method is provided enabling tracing and/or debugging of a secure baseband IC. Under normal conditions tracing and/or debugging of the secure BB-IC is disabled. To enable tracing and/or debugging, a hardware dongle must be connected to an already existing hardware interface (no additional hardware interface is needed to connect the hardware dongle). Tracing and/or debugging may be enabled only when the hardware dongle is present. Only authorized persons have access to the hardware dongle.
  • the dongle may be adapted for disabling execution of the functional test when the electronic device is not communicatively connected to the device interface. Therefore, as a default mode, the performance of the functional test may be disabled for security reasons. Only if an authorized dongle is inserted into/connected to the corresponding interface of the electronic device, execution of a debugging routine will be enabled. Such a function may be provided by a hardware debug port which may be enabled or disabled. However, such a function may also be provided by a software procedure.
  • the device communication unit may be adapted for exchanging the communication messages with the electronic device for performing an authorization procedure.
  • a purpose of exchanging communication messages between electronic device and dongle may be that only upon successful authorization, the electronic device will allow the dongle to trigger execution of the functional test.
  • Such an authorization procedure may include receiving, by the dongle, a query message from the electronic device and, in response to the query message, sending, by the dongle, a response message to the electronic device upon receipt of the query message. Only when the response message fulfils certain conditions, for instance shows that the dongle has been able to decode the query message so that the dongle is considered as an authorized dongle, the performance of the tracing and/or debugging may be initiated.
  • the device communication unit may be adapted for performing the authorization procedure by exchanging cryptographic communication messages with the electronic device. This may involve the use of a specific cryptographic scheme (for instance encryption scheme, digital signature, etc.) which is known to both, the dongle and the electronic device, and/or the use of a secret password known to the dongle and/or to the electronic device. By taking this measure, the reliability and security of the system may be further increased.
  • a specific cryptographic scheme for instance encryption scheme, digital signature, etc.
  • the device communication unit may be adapted to start exchanging the communication messages with the electronic device only upon powering up the electronic device.
  • powering up/switching on the electronic device for instance by a user pressing a "power” button or an “on” button of the electronic device
  • the communication messages may be exchanged. Therefore, unnecessary or useless data exchange may be prevented, since communication is only triggered when the presence of a dongle has been positively detected directly after switching on the electronic device.
  • the device communication unit may further be adapted to stop a communicative connection with the electronic device after having exchanged (successfully or non- successfully) the communication messages with the electronic device.
  • a functional test is performed, the presence of (or a data exchange with) the dongle is no longer required.
  • the interface may be released from the dongle communication task for an alternative use.
  • Such an embodiment may be particularly advantageous in a scenario in which an interface is used synergetically for both communicating with a dongle and performing an additional function, for instance to exchange audio data.
  • the device communication unit may be adapted to stop/terminate a communicative connection with the electronic device after a predetermined time interval after powering up/switching on the electronic device has elapsed.
  • the debugging trigger scheme may be terminated when a certain time interval after powering up the device has expired. In other words, when a user switches on her or his mobile phone, a certain time interval will be reserved or awaited during which the dongle recognition communication may occur. After expiry of this time interval, the corresponding interface is given free for an alternative application.
  • the device interface may be adapted for one of the group consisting of a contactless (for instance wireless) and/or a contacting (for instance wired) connection with the electronic device.
  • a contactless for instance wireless
  • a contacting for instance wired
  • NFC Near Field Communication
  • the electronic device may comprise a processor (such as a microprocessor or a CPU, central processing unit) which may be adapted for executing the functional test (only) when the dongle is communicatively connected to the dongle interface.
  • the processor may have processing capabilities and, if desired, may have access to storage capabilities, and may have the capacity to carry out the functional test using instructions or commands which are already included in the electronic device (or alternatively are included in the dongle).
  • starting tracing and/or debugging may depend on the presence of the dongle.
  • the electronic device may comprise a hardware unit adapted for performing the functional test procedure. Particularly, debugging may be done via a dedicated hardware debug interface which may be based on JTAG.
  • the electronic device may be a portable device.
  • portable devices it may be necessary or desired to perform tracing and/or debugging at once (for instance in the field). Therefore, no connection to a secure tracing and/or debugging system may be possible, so that the presence of the dongle is sufficient to trigger secure tracing and/or debugging.
  • the device interface of the dongle may be adapted for a mechanical connection with the dongle interface of the electronic device.
  • the dongle may have female connection elements, and the electronic device may have male connection elements, or vice versa, wherein a mechanical connection of the connection elements may realize the mechanical connection for subsequent secure tracing and/or debugging.
  • electronic device and dongle may function as a plug and socket system, or may provide a form closure/positive locking.
  • the interfaces of the dongle and of the electronic device may be shaped/designed to correspond/match to one another so that at least a part of the dongle may be inserted into at least a part of the electronic device, or vice versa.
  • the device for processing audio data may be realized as a mobile phone, a PDA, a headset, a headphone playback apparatus, a hearing aid, a television device, a video recorder, a monitor, a gaming device, a laptop, an audio player, a DVD player, a CD player, a harddisk-based media player, a radio device, an internet radio device, a public entertainment device, an MP3 player, a hi-fi system, a vehicle entertainment device, a car entertainment device, a medical communication system, a body-worn device, a speech communication device, an ambiance creation device, or a subwoofer.
  • Other applications are possible as well.
  • Fig. 1 and Fig. 2 illustrate communication systems according to exemplary embodiments of the invention.
  • FIG. 1 a communication system 100 comprising an electronic device 120 (such as a mobile phone) and a dongle 110 will be explained.
  • the dongle 110 is adapted for controlling tracing and/or debugging of the mobile phone 120 and comprises a mobile phone interface 111 (which may also be called a device interface) designed as a protrusion and adapted for a communicative connection with the mobile phone 120.
  • a device communication unit 112 of the dongle 110 is adapted for exchanging communication messages with the mobile phone 120 when being communicatively connected to the mobile phone interface 111. Execution of a functional test for tracing and/or debugging the mobile phone 120 (for instance in case of failure) is selectively enabled when the mobile phone 120 is communicatively connected to the device interface 111.
  • the dongle 110 is adapted for disabling execution of the functional test as a default, particularly when the mobile phone 120 is not communicatively connected to the mobile phone interface 111. In other words, if a tracing and/or debugging shall be enabled, dongle 110 and mobile phone 120 need to be plugged together.
  • the mobile phone 120 comprises a dongle interface 121 adapted for a communicative connection with the dongle 110 for controlling tracing and/or debugging of the mobile phone 120 in case of the occurrence of bugs.
  • a dongle communication unit 122 is provided and adapted for exchanging communication messages with the dongle 110 when being communicatively connected to the dongle interface 121 in such a manner that the execution of a functional test for tracing and/or debugging the mobile phone 120 is selectively enabled when the dongle 110 is communicatively connected to the dongle interface 121.
  • the mobile phone communication unit 112 of the dongle 110 is adapted for exchanging the communication messages with the dongle communication unit 122 of the mobile phone 120 via the interfaces 111, 121 for performing an authorization procedure.
  • Such an authorization procedure may involve that the dongle 110 receives a query message from the mobile phone 120 by which the mobile phone 120 indicates that it wished to get the authorization to perform a functional test.
  • the authorization procedure may further involve that the dongle 110 sends back a response message to the mobile phone 120 upon receipt of the query message, wherein the response message may indicate that a permission to perform a functional test is granted or not.
  • the performance of the authorization procedure may involve the exchange of cryptographic communication messages between the dongle 110 and the electronic device 120, for the sake of security.
  • the processor 123 checks whether a dongle interface 111 is inserted into the correspondingly shaped slot 121, by detecting whether metallic contacts 125 of the dongle interface 121 are in electrically conductive connection with correspondingly arranged metallic contacts 113 of the mobile phone interface 111. Only upon switching on the mobile phone 120, the check procedure will be carried out to determine whether the dongle 110 is inserted into the slot 121 of the mobile phone 120. After a predetermined time interval, for instance Is, after switching on the mobile phone 120 by actuating the power button 124, any communication between the mobile phone 120 and the dongle 110 is disabled, and the tracing and/or debugging status remains disabled.
  • a predetermined time interval for instance Is
  • the connector can be inside the phone 120, that is, it is also possible to attach the dongle 110 when opening the phone 120. It may even be that the dongle 110 needs to be soldered to some test points on a printed circuit board (PCB).
  • PCB printed circuit board
  • the mobile phone 120 comprises conventional components required for a mobile phone function, such as a display 145, an antenna 126, keyboard 127, a microphone 129, and a loudspeaker (not shown).
  • a display 145 an antenna 126, keyboard 127, a microphone 129, and a loudspeaker (not shown).
  • the processor 123 may further access a memory 128 to get access to cryptographic schemes, passwords, data indicative of a tracing and/or debugging algorithm, etc.
  • the communication unit 112 may be coupled to a processor 114 which may have access to a memory 115 for fulfilling data processing and data storage tasks.
  • a communication system 200 according to another exemplary embodiment of the invention will be explained.
  • the hardware dongle 110 is shown in communicative connection with a baseband integrated circuit 201 (BB-IC), and with a power management unit 202.
  • BB-IC baseband integrated circuit
  • a number of exchanged signals DD, DU, DCL, FSC, RSTBB are indicated in Fig. 2 as well.
  • DD indicates a data down (serial data from BB-IC 201 to dongle 110) signal
  • DU denotes a data up (serial data from dongle 110 to BB-IC 201) signal
  • DCL indicates a data clock signal
  • FSC indicates a frame sync signal.
  • Reference numeral 203 denotes an IOM-2 interface unit
  • reference numeral 204 denotes a reset unit
  • reference numeral 205 denotes a baseband and audio interface unit.
  • a standard audio IOM-2 interface 203 (Siemens AG, "IOM®-2 Interface Reference Guide", Original Version 1.90, Edition 3.91, 1991) may be used to connect the hardware dongle 110.
  • Other interfaces of the BB-IC 201 can be used as well (for instance audio PCM interface which is frequently used in a similar way than the IOM-2 interface 203).
  • An advantage of this audio interface is that it is usually present on every BB-IC 201 to allow digital audio tests, which are part of full type approval requested by standards (for instance ETSI documents for GSM).
  • the IOM-2 interface 203 is activated for several consecutive IOM-2 frames.
  • the BB-IC 201 is sending query data (on DD) to the dongle 110.
  • the dongle 110 calculates from the query data a response by using a secret algorithm and an internal secret key.
  • the BB-IC 201 receives the dongle response (on DU).
  • the BB-IC 201 generates several 16 bit words using an on- chip true random number generator. These words are sent to the IOM-2 dongle 110 and the dongle response is received.
  • the BB-IC 201 knows secret algorithm and the secret key used by the dongle 110 and calculates the expected response and checks whether the received response is correct. If the received response is correct, then tracing and/or debugging is enabled, otherwise tracing and/or debugging remains disabled.
  • the dongle 110 After the query procedure, the dongle 110 disables itself, that is its serial data output connected to DU goes into the three state and the dongle 110 does no longer listen to data on DD.
  • a new dongle query is only possible after a hardware reset (RSTBB). This means that the IOM-2 interface unit 203 can be used for normal application.
  • IOM-2 link use multiple time slots, it is also possible to keep the dongle 110 active on a specific time slot while regular data is sent/received on the other time slots. This can be used to check dongle presence by the application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Test And Diagnosis Of Digital Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne une clé électronique (110) pour un test fonctionnel d'un dispositif électronique (120), la clé électronique (110) comportant un interface de dispositif (111) adaptée pour une connexion de communication avec le dispositif électronique (120), et une unité de communication de dispositif (112) adaptée pour l'échange de messages de communication avec un dispositif électronique (120) en connexion de communication avec l'interface de dispositif (111) de sorte que l'exécution d'un test fonctionnel pour analyser une fonction du dispositif électronique (20) est activée de manière sélective lorsque le dispositif électronique est en connexion de communication avec le dispositif d'interface (111).
PCT/IB2008/052833 2007-07-18 2008-07-15 Clé électronique pour un test fonctionnel d'un dispositif électronique WO2009010919A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP07112680.9 2007-07-18
EP07112680 2007-07-18

Publications (2)

Publication Number Publication Date
WO2009010919A2 true WO2009010919A2 (fr) 2009-01-22
WO2009010919A3 WO2009010919A3 (fr) 2009-05-22

Family

ID=40139109

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2008/052833 WO2009010919A2 (fr) 2007-07-18 2008-07-15 Clé électronique pour un test fonctionnel d'un dispositif électronique

Country Status (1)

Country Link
WO (1) WO2009010919A2 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2244230A1 (fr) * 2009-04-20 2010-10-27 Kapsch TrafficCom AG Composants et procédé de mesure de la fonctionnalité d'un système de péage routier
US9171456B2 (en) 2013-10-11 2015-10-27 RB Distribution, Inc. Key fob dongle
US9384604B1 (en) 2015-09-24 2016-07-05 RB Distribution, Inc. Transfer dongle for stored vehicle information

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282734A1 (en) * 2005-05-23 2006-12-14 Arm Limited Test access control for secure integrated circuits
US20070044158A1 (en) * 2005-04-20 2007-02-22 Honeywell International Inc. Hardware key control of debug interface

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070044158A1 (en) * 2005-04-20 2007-02-22 Honeywell International Inc. Hardware key control of debug interface
US20060282734A1 (en) * 2005-05-23 2006-12-14 Arm Limited Test access control for secure integrated circuits

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BUSKEY R F ET AL: "Protected JTAG" PARALLEL PROCESSING WORKSHOPS, 2006. ICPP 2006 WORKSHOPS. 2006 INTERNA TIONAL CONFERENCE ON COLUMBUS, OH, USA 14-18 AUG. 2006, PISCATAWAY, NJ, USA,IEEE, 14 August 2006 (2006-08-14), pages 405-414, XP010938142 ISBN: 978-0-7695-2637-9 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2244230A1 (fr) * 2009-04-20 2010-10-27 Kapsch TrafficCom AG Composants et procédé de mesure de la fonctionnalité d'un système de péage routier
US9171456B2 (en) 2013-10-11 2015-10-27 RB Distribution, Inc. Key fob dongle
US9311815B2 (en) 2013-10-11 2016-04-12 RB Distribution, Inc. Key fob dongle
US9836904B2 (en) 2013-10-11 2017-12-05 RB Distribution, Inc. Key fob dongle
US9384604B1 (en) 2015-09-24 2016-07-05 RB Distribution, Inc. Transfer dongle for stored vehicle information
US9584502B1 (en) 2015-09-24 2017-02-28 RB Distribution, Inc. Transfer dongle for stored vehicle information

Also Published As

Publication number Publication date
WO2009010919A3 (fr) 2009-05-22

Similar Documents

Publication Publication Date Title
JP4981887B2 (ja) デバイス認証のための通信プロトコル
JP5269949B2 (ja) アクセサリを認証するための方法及びシステム
US8925069B2 (en) Accessory device authentication using list of known good devices maintained by host device
JP5786013B2 (ja) 電子デバイスのためのアクセサリ認証
CN101984575B (zh) 一种保护移动终端软件的方法和装置
WO2017034312A1 (fr) Appareil et procédé permettant des transactions de paiement sécurisées basées sur un environnement d'exécution de confiance
AU2006321928B2 (en) Method and apparatus for authenticating a mobile phone accessory
US20090165111A1 (en) Method and apparatus for secure management of debugging processes within communication devices
US7971058B2 (en) System and method for generating a plaintext / cyphertext database for use in device authentication
JP2011508528A (ja) ポータブル通信デバイスに関係するモジュールの監視およびトラブルシューティング
WO2009010919A2 (fr) Clé électronique pour un test fonctionnel d'un dispositif électronique
CN111680336B (zh) 固件安全防护方法和装置、系统及设备
WO2007059701A1 (fr) Procede de cryptage systeme par micro-ordinateur mono-circuit polyvalent d'appoint
CN110581832A (zh) 接口数据传输方法及其电子设备
CN111090894B (zh) 一种锁卡数据重建的方法和装置
AU2011253604B2 (en) Method and system for authenticating an accessory
WO2013056522A1 (fr) Dispositif et procédé pour exécuter un blocage d'accès à un réseau pour un terminal mobile
CN116156502A (zh) 一种基于网络隧道的网络连接系统、方法、电子设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08789304

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 08789304

Country of ref document: EP

Kind code of ref document: A2