AU2002220786A1 - Method and device for making secure data processing - Google Patents
Method and device for making secure data processingInfo
- Publication number
- AU2002220786A1 AU2002220786A1 AU2002220786A AU2078602A AU2002220786A1 AU 2002220786 A1 AU2002220786 A1 AU 2002220786A1 AU 2002220786 A AU2002220786 A AU 2002220786A AU 2078602 A AU2078602 A AU 2078602A AU 2002220786 A1 AU2002220786 A1 AU 2002220786A1
- Authority
- AU
- Australia
- Prior art keywords
- data processing
- secure data
- making secure
- making
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/105—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Mathematical Physics (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Development Economics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Read Only Memory (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002326036A CA2326036A1 (en) | 2000-11-16 | 2000-11-16 | Method for securing electronic device data processing |
CA2326036 | 2000-11-16 | ||
PCT/FR2001/003582 WO2002041151A1 (en) | 2000-11-16 | 2001-11-15 | Method and device for making secure data processing |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002220786A1 true AU2002220786A1 (en) | 2002-05-27 |
Family
ID=4167673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002220786A Abandoned AU2002220786A1 (en) | 2000-11-16 | 2001-11-15 | Method and device for making secure data processing |
Country Status (6)
Country | Link |
---|---|
US (2) | US8006058B2 (en) |
EP (1) | EP1344137A1 (en) |
CN (1) | CN1484791A (en) |
AU (1) | AU2002220786A1 (en) |
CA (1) | CA2326036A1 (en) |
WO (1) | WO2002041151A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW554268B (en) * | 2001-12-28 | 2003-09-21 | Via Tech Inc | Data storage security method |
CN1293485C (en) * | 2003-07-23 | 2007-01-03 | 凌阳科技股份有限公司 | Processor device and method for protecting data by obfuscating data blocks |
EP1612639A1 (en) * | 2004-06-30 | 2006-01-04 | ST Incard S.r.l. | Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card |
CN1985244B (en) * | 2005-06-24 | 2010-05-12 | 捷讯研究有限公司 | System and method for managing memory in a mobile device |
JP2009515449A (en) * | 2005-11-04 | 2009-04-09 | ジェムプリュス | Method for securely processing data during execution of cryptographic algorithms on embedded systems |
KR20090043823A (en) * | 2007-10-30 | 2009-05-07 | 삼성전자주식회사 | Memory system that can detect external attacks |
JPWO2009118829A1 (en) * | 2008-03-25 | 2011-07-21 | 三菱電機株式会社 | Cryptographic operation apparatus, cryptographic operation program, and recording medium |
US9449197B2 (en) * | 2013-06-13 | 2016-09-20 | Global Foundries Inc. | Pooling entropy to facilitate mobile device-based true random number generation |
CN104766117B (en) * | 2014-01-07 | 2019-04-26 | 国民技术股份有限公司 | Smart card and data processing method thereof |
US9418231B2 (en) * | 2014-06-03 | 2016-08-16 | Empire Technology Development Llc | Perturbation of field programmable gate array code to prevent side channel attack |
CN116226673B (en) * | 2023-05-05 | 2023-07-07 | 中国人民解放军国防科技大学 | Training method for buffer vulnerability identification model, vulnerability detection method and device |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5081675A (en) | 1989-11-13 | 1992-01-14 | Kitti Kittirutsunetorn | System for protection of software in memory against unauthorized use |
JP2933090B2 (en) * | 1990-04-25 | 1999-08-09 | 富士通株式会社 | Nonvolatile semiconductor memory device |
US5313582A (en) * | 1991-04-30 | 1994-05-17 | Standard Microsystems Corporation | Method and apparatus for buffering data within stations of a communication network |
JPH07503564A (en) * | 1992-05-12 | 1995-04-13 | インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン | Method and apparatus for reducing memory wear in computer systems |
US5969632A (en) * | 1996-11-22 | 1999-10-19 | Diamant; Erez | Information security method and apparatus |
US6115760A (en) * | 1998-08-24 | 2000-09-05 | 3Com Corporation | Intelligent scaleable FIFO buffer circuit for interfacing between digital domains |
JP2002529635A (en) | 1998-10-30 | 2002-09-10 | ポーレット メルモス ウォルターズ,クリストファー | Valve control mechanism |
FR2787216B1 (en) * | 1998-12-11 | 2001-07-27 | Bull Cp8 | METHOD FOR STORAGE AND OPERATION OF INFORMATION UNITS IN A SECURITY MODULE, AND ASSOCIATED SECURITY MODULE |
-
2000
- 2000-11-16 CA CA002326036A patent/CA2326036A1/en not_active Abandoned
-
2001
- 2001-11-15 AU AU2002220786A patent/AU2002220786A1/en not_active Abandoned
- 2001-11-15 EP EP01996790A patent/EP1344137A1/en not_active Ceased
- 2001-11-15 US US10/416,754 patent/US8006058B2/en not_active Expired - Fee Related
- 2001-11-15 CN CNA018217729A patent/CN1484791A/en active Pending
- 2001-11-15 WO PCT/FR2001/003582 patent/WO2002041151A1/en not_active Application Discontinuation
-
2011
- 2011-08-22 US US13/214,501 patent/US20110307650A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
CN1484791A (en) | 2004-03-24 |
EP1344137A1 (en) | 2003-09-17 |
US20040093306A1 (en) | 2004-05-13 |
US20110307650A1 (en) | 2011-12-15 |
US8006058B2 (en) | 2011-08-23 |
CA2326036A1 (en) | 2002-05-16 |
WO2002041151A1 (en) | 2002-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU7458301A (en) | Information processing device and processing method | |
AU2001265910A1 (en) | Data processing system and method | |
AU2001284328A1 (en) | Information processing apparatus and method | |
AU2001277755A1 (en) | Device and method for processing substrate | |
HK1046961B (en) | Data processing system and data processing method | |
AU2001262552A1 (en) | System and method for acquiring data | |
IL155217A0 (en) | Method and apparatus for data processing | |
HK1045202A1 (en) | Data processing apparatus and data processing method | |
AU2001257586A1 (en) | Apparatus and method for gathering and utilizing data | |
AU9260801A (en) | Method and apparatus for varying automated data processing | |
AU2322000A (en) | Time-series data processing device and method | |
AU2001272094A1 (en) | Data transfer method and apparatus | |
AU7209501A (en) | Data transfer method and apparatus | |
AU7460701A (en) | Data transmission apparatus and data transmission method | |
HK1056454A1 (en) | Information processing device and information processing method | |
AU2001293170A1 (en) | Method and apparatus for linking data and objects | |
AU4263301A (en) | Data processing apparatus | |
AU2002222639A1 (en) | Processing method and processing apparatus | |
AU2001261775A1 (en) | Apparatus and method for secure object access | |
AU2001244813A1 (en) | Apparatus and method for processing status information | |
GB0002181D0 (en) | Method and apparatus for processing configuration-sensitive data | |
AU5974700A (en) | Device for processing data and corresponding method | |
AU4109301A (en) | Data transmitting apparatus and data transmitting method | |
AU2002220786A1 (en) | Method and device for making secure data processing | |
AU5506201A (en) | Information processing method and system |