EP1035518B1 - Ensemble de protection d'un module de sécurité - Google Patents
Ensemble de protection d'un module de sécurité Download PDFInfo
- Publication number
- EP1035518B1 EP1035518B1 EP00250065A EP00250065A EP1035518B1 EP 1035518 B1 EP1035518 B1 EP 1035518B1 EP 00250065 A EP00250065 A EP 00250065A EP 00250065 A EP00250065 A EP 00250065A EP 1035518 B1 EP1035518 B1 EP 1035518B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security module
- voltage
- battery
- processor
- line
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00193—Constructional details of apparatus in a franking system
- G07B2017/00233—Housing, e.g. lock or hardened casing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00193—Constructional details of apparatus in a franking system
- G07B2017/00266—Man-machine interface on the apparatus
- G07B2017/00298—Visual, e.g. screens and their layouts
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00193—Constructional details of apparatus in a franking system
- G07B2017/00266—Man-machine interface on the apparatus
- G07B2017/00306—Acoustic, e.g. voice control or speech prompting
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00314—Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
- G07B2017/00346—Power handling, e.g. power-down routine
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00185—Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
- G07B17/00362—Calculation or computing within apparatus, e.g. calculation of postage value
- G07B2017/00395—Memory organization
- G07B2017/00403—Memory zones protected from unauthorized reading or writing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B17/00—Franking apparatus
- G07B17/00733—Cryptography or similar special procedures in a franking system
- G07B2017/00959—Cryptographic modules, e.g. a PC encryption board
- G07B2017/00967—PSD [Postal Security Device] as defined by the USPS [US Postal Service]
Definitions
- the invention relates to an arrangement for protecting a security module, according to claim 1.
- a postal security module is particularly suitable for use in a postage meter or mail processing machine or computer with mail processing function.
- Modern franking machines like those from the US 4,746,234 known thermal transfer postage meter, employ a fully electronic digital printing device.
- Applicants' T1000 meter has a microprocessor surrounded by a secure housing having an opening for delivering a letter.
- a mechanical letter sensor microwaveswitch
- the franking imprint includes previously entered and stored postal information for conveying the letter.
- the control unit of the franking machine carries out a software billing, exercises a monitoring function, possibly with regard to the conditions for a data update, and controls the reloading of a port value credit.
- thermal transfer franking machine has already been in US 5,606,508 ( DE 42 13 278 B1 ) and in US 5,490,077 proposed a data entry option using smart cards.
- One of the smart cards loads new data into the postage meter machine and a set of further smart cards allows a setting to be made according to stored data by inserting a chip card.
- the data loading and the setting of the franking machine can thus be more convenient and faster than by keyboard input.
- a franking machine for franking mail is provided with a printer for printing the postage stamp on the mail, a controller for controlling the printing and peripheral components of the postage meter, a bill unit for settling postage, at least one nonvolatile memory for storing postage data , equipped with at least one non-volatile memory for storing safety-relevant data and with a calendar / clock.
- the non-volatile memory of the safety-related data and / or the calender / clock is usually powered by a battery.
- security-relevant data (cryptographic keys and the like) are saved in nonvolatile memories. These memories are EEPROM, FRAM or battery backed SRAM.
- Known franking machines often also have an internal real time clock (RTC), which is powered by a battery.
- RTC real time clock
- encapsulated modules containing integrated circuits and a lithium battery. These modules must be replaced and disposed of at the end of the life of the battery as a whole. From an economic and ecological point of view, it is better if only the battery needs to be replaced.
- the security case must be opened and then closed again and sealed, because the security against fraud is essentially based on the secure housing, which encloses the entire machine.
- EP 660 269 A2 US 5,671,146
- any required repair of a franking machine is then difficult on site, if the access to the components is difficult or limited.
- the secured housing will in future be reduced to the so-called postal security module, which can improve the accessibility to the other components.
- the battery of the security module it would also be desirable that these be relatively simple can be replaced.
- the battery must be outside the security range of the franking machine.
- a potential attacker is able to manipulate the battery voltage.
- Known battery-powered SRAM and RTC have different requirements with regard to their required operating voltage. The voltage required to hold data from SRAM is below the required voltage for operating RTC.
- the enifernte data center specifies a time credit or a period of time, in particular a number of days, or a specific day up to which the franking device can report via communication link. After unsuccessful expiration of the time credit or the deadline, franking is prevented.
- Security modules are already known from electronic data processing systems ago. To protect against burglary in an electronic system is in EP 417 447 B1 already proposed a lock, which includes power supply and signal detection means and shielding in the housing.
- the shielding means is made of encapsulating material and conductive means to which the power supply and signal detection means are connected. The latter responds to a change in the line resistance of the line means.
- the security module contains an internal battery, a voltage switch from system voltage to battery voltage, a power gate and a short-circuit transistor as well as other sensors. When the voltage falls below a certain limit, the Power Gate responds. If the line resistance, temperature or radiation is changed, the logic will react.
- the output of the short-circuit transistor is switched to L level, whereby a memory stored in the cryptographic key is deleted.
- the life of the non-replaceable battery and thus of the security module for use in franking devices or mail processing machines is too small.
- a larger mail processing machine is, for example, the JetMail®.
- a franking print is here produced by means of a stationary ink jet printhead in a non-horizontal approximately vertical letter transport.
- a suitable design for a printing device was already in the DE 196 05 015 C1 proposed.
- the mailing machine has a meter and a base. If the meter is to be equipped with a housing so that components are more easily accessible, then it must be protected by a postal security module fraud attempts, which at least performs the settlement of postal fees. To exclude influences on the program, has already been in the EP 789 333 A2 under the title: Postage meter proposed to equip a security module with an Application Specific Integrated Circuit ASIC, which has a hardware A réelleaji. The user circuit also controls the print data transfer to the print head.
- franking machines are also modular. This modularity allows the exchange of modules and components for various reasons. Thus, e.g. defective modules are replaced and replaced by checked, repaired or new modules. Since the utmost care is required in the exchange of assemblies containing safety-relevant data, the replacement usually requires the use of a service technician and measures that prevent its functioning in case of improper use or unauthorized replacement of a security module. The latter is very expensive.
- the invention has for its object, with little effort to ensure protection against an unauthorized manipulated security module when the security module is arranged interchangeable.
- the exchange should be possible by anyone in the simplest possible way.
- the invention assumes, by means of functional units, the exchange, the manipulation and the use of a security module of a franking machine, mail processing device or similar device in order to provide users of the various devices with a guarantee about the correct functioning of the security module and thus of the entire device.
- Exchanging or damaging the safety module is at least detected and, if necessary, subsequently signaled as a state when the safety module is plugged in again and supplied with a system voltage.
- the changes in the state of the security module are detected by means of a first functional unit and by means of a detection unit, which has a resettable latching and is powered by a battery.
- the first functional unit can evaluate the respective state when it is supplied with system voltage again.
- a second functional unit may optionally monitor the battery voltage to see if its capacity has been exhausted. A required battery change is signaled, of course, a supply must be backed up by the system voltage. It is to be assumed at least then of an improper use of a security module in the exchange, in which not only the system voltage is missing, but also the interchangeable battery is removed. So that the replacement of the lowest possible qualified personnel and in the future can even be performed by the user, the second functional unit monitors the power failure when replacing the battery, the first functional unit, if necessary, first deletes sensitive data and thus restricts the further use of the security module or even prevented. After an on-site inspection of the security module by a service, the original functionality can be restored with the housing intact.
- the first functional unit enforces a later re-commissioning contact the security module with a remote data center to unlock at least one functional unit. If the entire security module has been exchanged without changing the battery, sensitive data is also first deleted by the second functional unit, but the sensitive data can be reinitialized during the restart. To establish contact methods with a digital or analog transmission link can be used. Also, an inspection of the security module is then by a Service causes. The safety module can signal different states. For example, a distinction can be made as to whether the last contact with the data center was made so long ago that it already seems suspicious or long that reinitialization is no longer permitted. The first functional unit is constantly evaluating a first day loan. When the latter is exhausted, the suspicious state is signaled.
- the time credit can be variable and vary from security device to security device.
- the time credit can be specified by the data center and loaded during installation into a memory of the security device.
- the first functional unit constantly evaluates a second daily loan. When the latter is exhausted, the state "LOST" is signaled. In the latter case, an inspection of the security module by a local service is also required.
- the security module protection assembly comprises the security module having logic means for supplying the security module with a system voltage or with a voltage from a battery and with a number of monitoring means. It is described by at least a first and a second functional unit and by means for loading at least one time credit specified by the data center and by a signal means connected to a first functional unit, the charging being performed during installation and reloading into a memory of the security device is, and wherein the first functional unit evaluates a day loan on time and the signal means controls, at least to signal the timing, and by means of the second functional unit for deleting sensitive data in memory due improper use or replacement of the security module.
- FIG. 1 is a block diagram of the security module 100 with the contact groups 101, 102 for connection to an interface 8 and with the battery contact terminals 103 and 104 of a battery interface for a battery 134 shown.
- the security module 100 is potted with a hard potting compound, the battery 134 of the security module 100 is interchangeably disposed outside of the potting compound on a printed circuit board.
- the circuit board carries the battery contact terminals 103 and 104 for connecting the poles of the battery 134.
- the security module 100 is plugged into a corresponding interface 8 of the motherboard (motherboard) 9.
- the first contact group 101 communicates with the system bus of a control device and the second contact group 102 serves to supply the security module 100 with the system voltage.
- the first and / or second contact group 101 and / or 102 are / is designed for static and dynamic monitoring of the plugged in the security module 100.
- the supply of the security module 100 is realized with the system voltage of the motherboard 9 and the pins P1, P2 and P4, a dynamic and static non-detection detected by the security module 100.
- the latter requires a detection unit 13, which is connected via a conductor loop 192, 194 to the pin P4 of the contact group 102.
- the conductor loop may be formed as part of the particular secure part of the security module 100 and embedded in sealing compound so that in a mechanical or chemical attack on the aforementioned part of the security module 100, the contact with the pin P4 is interrupted.
- the security module 100 has, in a manner known per se, a microprocessor 120 which contains an integrated read-only memory (internal ROM) with the special application program (not shown), which is approved for the franking machine by the postal authority or the respective mail carrier. Alternatively, a conventional read-only memory ROM or FLASH memory can be connected to the internal data bus 126.
- the security module 100 has, in a manner known per se, a reset circuit unit 130, a user circuit ASIC 150 and a logic PAL 160 which serves as the control signal generator for the ASIC.
- the reset circuit unit 130 and the user circuit ASIC 150 and the logic PAL 160 and possibly other - not shown - memory are supplied via the lines 191 and 129 with system voltage Us +, which is supplied from the motherboard 9 when the franking device is turned on.
- system voltage Us + which is supplied from the motherboard 9 when the franking device is turned on.
- the system voltage Us + is also applied via a diode 181 and the line 136 at the input of the voltage monitoring unit 12.
- a second operating voltage Ub + is supplied, which is available via the line 138.
- the negative terminal battery contact terminal 104 is connected to ground. From the battery contact terminal 103 lying on the positive pole, battery voltage is supplied via a line 193, via a second diode 182 and the line 136 to the input of the voltage monitoring unit.
- a commercial circuit can be used as a voltage switch 180.
- the output of the voltage monitoring unit 12 is connected via a line 138 to an input for this second operating voltage U b + of the processor 120, which leads at least to a RAM memory area 122, 124 and there guarantees non-volatile storage as long as the second operating voltage U b + in the required Height is applied.
- the processor 120 preferably includes an internal RAM 124 and a real-time clock (RTC) 122.
- the voltage monitoring unit 12 in the security module has a resettable latching, which can be queried by the processor 120 via a line 164 and reset via a line 135. For a reset of the latching, the voltage monitoring unit 12 has circuit means. The reset can only be triggered when the battery voltage has risen above the predetermined threshold.
- the lines 135 and 164 are each connected to a pin (pins 1 and 2) of the processor 120. Line 164 provides a status signal to processor 120, and line 135 provides a control signal to voltage monitoring unit 12.
- the line 136 at the input of the voltage monitoring unit 12 also supplies an unplugged detection unit 13 with operating or battery voltage.
- the unplugged detection unit 13 outputs on the line 139 a status signal to a pin 5 of the processor 120, which gives an indication of the state of the circuit.
- the processor 120 queries the state of the unplugged detection unit 13 via the line 139.
- the processor may reset the unplugged detection unit 13 with a signal output from the pin 4 of the processor 120 via the lead 137.
- a static check is made for connection.
- ground potential is queried via a line 192, which is present at the connection P4 of the interface 8 of the postal security module PSM 100 and can only be interrogated if the security module 100 is inserted properly.
- ground potential of the negative pole 104 of the battery 134 of the postal security module PSM 100 is placed on the port P23 of the interface 8 and is thus interrogated at port P4 of the interface 8 via the line 192 of the unplugged detection unit 13.
- a line loop which is looped back to the processor 120 via the pins P1 and P2 of the contact group 102 of the interface 8.
- the processor 120 For dynamic testing of the connectedness of the postal security module PSM 100 to the motherboard 9, the processor 120 generates alternating signal levels at quite irregular time intervals at the pins 6, 7 and looping them back through the loop.
- the postal security module PSM 100 is equipped with a long-live battery, which also allows monitoring of the use without the security module is connected to a system voltage of a postal processing facility. Proper use, operation, installation or installation in the appropriate environment are those characteristics to be tested by the functional units of the safety module. An initial installation is made by the manufacturer of the postal security module.
- the processor 120 Since in a mechanical or chemical attack on the security module 100 and for each separation of the security module 100 from the interface unit 8, the storage of this information by the special battery-powered circuitry is ensured, an evaluation of this information can be done at any time, if a restart is desired ,
- the regular evaluation of this disconnection signal on the line 139 of the detection unit 13 makes it possible for the processor 120 to delete sensitive data without, however, changing the billing and customer data in the NVRAM memories.
- the current state of the postal security module with the deleted sensitive data can be understood as a maintenance condition, in which usually the replacement, repair or otherwise is made. Since the sensitive data of the functional unit are deleted, an error due to improper handling of the postal security module is excluded.
- the sensitive data are, for example, cryptographic keys.
- the processor 120 prevents in the maintenance state a core functionality of the postal security module, which consists for example in the billing and / or calculation of a security code for the security marking in a security print.
- the postal security module PSM is first inserted and electrically connected to the corresponding interface unit 8 of a mail processing device. Then the device is switched on and thus the postal security module is again supplied with system voltage Us +. Due to the special condition, the proper installation of the postal security module must now be rechecked by its functional unit. For this purpose, a second stage of a test (dynamic plug-in detection) is provided. By means of an operative connection established between the first functional unit (processor 120) and the current loop 18 of the interface unit 8, information is exchanged whose error-free transmission provides proof of the proper installation. This is a prerequisite for a successful restart.
- FIG. 2 shows a block diagram of a postage meter, which is equipped with a chip card read / write unit 70 for reloading change data by chip card and with a printing device 2, which is controlled by a control device 1.
- the control device 1 has a motherboard 9 equipped with a microprocessor 91 with associated memories 92, 93, 94, 95.
- the program memory 92 contains an operating program for at least printing and at least safety-related components of the program for a predetermined format change of a portion of the user data.
- the RAM RAM 93 is used for volatile intermediate storage of intermediate results.
- NVM 94 non-volatile memory is used for non-volatile caching of data, such as statistical data organized by cost center.
- the calendar / clock module 95 also contains addressable but non-volatile memory areas for the non-volatile intermediate storage of intermediate results or also known program parts (for example for the DES algorithm).
- control device 1 is connected to the chip card write / read unit 70, wherein the microprocessor 91 of the control device 1 is programmed, for example, to load the payload N from the memory area of a chip card 49 for their application in corresponding memory areas of the franking machine ,
- a first chip card 49 inserted in a slot 72 of the chip card write / read unit 70 allows reloading of a record in the postage meter machine for at least one application.
- the chip card 49 contains, for example, the postage for all the usual postal carrier services according to the tariff of the postal authority and a post carrier code to generate a stamp image with the franking machine and to stamp the postal items according to the tariff of the postal authority.
- the control device 1 forms the actual meter with the means 91 to 95 of the aforementioned motherboard 9 and also includes a keyboard 88, a display unit 89 and an application-specific circuit ASIC 90 and the interface 8 for the postal security module PSM 100.
- the security module PSM 100 is about a control bus to the aforementioned ASIC 90 and the microprocessor 91 and via the parallel ⁇ C bus at least with the means 91 to 95 of the motherboard 9 and connected to the display unit 89.
- the control bus carries lines for the signals CE, RD and WR between the security module PSM 100 and the aforementioned ASIC 90.
- the microprocessor 91 preferably has a pin for an output from the security module PSM 100 interrupt signal i, other connections for the keyboard 88, a
- the serial interface SI-1 for the connection of the chip card write / read unit 70 and a serial interface SI-2 for the optional connection of a MODEM by means of the MODEM can be used to increase the credit stored in the non-volatile memory of the postal security device PSM 100.
- the postal security device PSM 100 is surrounded by a secured housing. Before each franking imprint, a hardware settlement is carried out in the postal security module PSM 100. Billing is independent of cost centers.
- the postal security agent PSM 100 can be designed internally as in the European application EP 789 333 A3 was described in more detail. It is contemplated that the ASIC 90 may include a serial interface circuit 98 to a post-stream powered device, a serial interface circuit 96 to the sensors and actuators of the printing device 2, a serial interface circuit 97 to the print control electronics 16 for the printhead 4, and a serial interface circuit 99 to one has the printing device 20 in the post-stream downstream device.
- the peripheral interface can be removed, which is suitable for multiple peripheral devices (stations). It is entitled: Arrangement for communication between a base station and other stations of a mailing machine and their emergency shutdown.
- the interface circuit 96 coupled to the machine interface in the interface circuit 14 provides at least one connection to the sensors 6, 7, 17 and to the actuators, for example to Drive motor 15 for the roller 11 and to a cleaning and sealing station RDS 40 for the inkjet printhead 4, as well as the label dispenser 50 in the machine base forth
- the basic arrangement and the interaction between the inkjet printhead 4 and the RDS 40 are the DE 197 26 642 C2 removable, entitled: Arrangement for positioning an ink jet printhead and a cleaning and sealing device.
- One of the arranged in the guide plate 20 sensors 7, 17 is the sensor 17 and is used to prepare the pressure release during letter transport.
- the sensor 7 is used for initial letter recognition for the purpose of triggering the letter transport.
- the transport device consists of a conveyor belt 10 and two rollers 11,11 '.
- One of the rollers is equipped with a motor 15 drive roller 11, another is the follower tension roller 11 '.
- the drive roller 11 is designed as a toothed roller, according to the conveyor belt 10 is designed as a toothed belt, which ensures the unambiguous power transmission.
- An encoder 5, 6 is coupled to one of the rollers 11, 11 '.
- the drive roller 11 is firmly seated with an incremental encoder 5 on an axis.
- the incremental encoder 5 is designed for example as a slotted disk, which cooperates with a light barrier 6, and outputs via the line 19 an encoder signal to the motherboard 9 from.
- the individual printing elements of the print head are connected within its housing with a print head electronics and that the print head for a purely electronic pressure can be controlled.
- the pressure control is based on the path control, whereby the selected stamp offset is taken into account, which is entered by keyboard 88 or if necessary by chip card and stored in memory NVM 94 non-volatile.
- a planned imprint thus results from stamp offset (without printing), the franking print image and possibly further print images for advertising clichés, shipping information (optional prints) and additional editable messages.
- the nonvolatile memory NVM 94 has a plurality of memory areas. These include those which save the loaded postage fee tables non-volatile.
- the smart card write / read unit 70 consists of an associated mechanical support for the microprocessor card and contact unit 74. The latter allows a secure mechanical support of the smart card in the read position and clear signaling of reaching the reading position of the smart card in the contacting unit.
- the microprocessor card with the microprocessor 75 has a programmed read capability for all types of memory cards or smart cards.
- the interface to the franking machine is a serial interface in accordance with the RS232 standard.
- the data transfer rate is min. 1.2 K baud.
- the power supply is switched on by means of a switch 71 connected to the mainboard. After the power supply has been switched on, a self-test function with a ready message takes place.
- FIG. 3 is a perspective view of the postage meter from behind.
- the franking machine consists of a meter 1 and a base 2.
- the latter is equipped with a smart card write / read unit 70, which is arranged behind the guide plate 20 and accessible from the housing upper edge 22.
- a chip card 49 is inserted from top to bottom in the insertion slot 72.
- a supplied standing on the edge letter 3, which rests with its surface to be printed on the guide plate is then printed according to the input data with a franking stamp 31.
- the letter feeding opening is bounded laterally by a transparent plate 21 and the guide plate 20.
- the status display of the security module 100 inserted on the motherboard 9 of the meter 1 is visible from the outside through an opening 109.
- the FIG. 4 shows a block diagram of the postal security module PSM 100 in a preferred variant.
- the negative pole of the battery 134 is connected to ground and a pin P23 of the contact group 102.
- the positive pole of the battery 134 is connected to the one input of the voltage changeover switch 180 via the line 193, and the system voltage leading line 191 is connected to the other input of the voltage changeover switch 180.
- the battery 134 is the SL389 / P for a life of up to 3.5 years or the SL-386 / P for a life of up to 6 years with a maximum power consumption by the PSM 100.
- the voltage switch 180 is a commercially available circuit of type ADM 8693ARN.
- the output of the voltage changeover switch 180 is connected via the line 136 to the battery monitoring unit 12 and the detection unit 13.
- the battery monitoring unit 12 and the detection unit 13 communicate with the pins 1, 2, 4 and 5 of the processor 120 via the lines 135, 164 and 137, 139 in communication.
- the output of the voltage switch 180 is also on the line 136 on Supply input of a first memory SRAM, which is the existing battery 134 to nonvolatile memory NVRAM a first technology.
- the security module communicates with the postage meter via the system bus 115, 117, 118.
- the processor 120 may communicate via the system bus and a modem 83 in communication with a remote data center.
- the billing is performed by the ASIC 150 and checked by the processor 120.
- the postal billing data is stored in non-volatile memory of different technology.
- the system voltage is applied to the supply input of a second memory NV-RAM 114.
- the latter is a nonvolatile NVRAM of a second technology, (SHADOWRAM).
- This second technology preferably comprises a RAM and an EEPROM, the latter automatically assuming the data contents in the event of system voltage failure.
- the NVRAM 114 of the second technology is connected to the corresponding address and data inputs of the ASIC 150 via an internal address and data bus 112, 113.
- the ASIC 150 contains at least one hardware abort unit for the calculation of the postal data to be stored.
- Programmable Array Logic (PAL) 160 accommodates access logic to ASIC 150.
- the ASIC 150 is controlled by the PAL 160 logic.
- An address and control bus 117, 115 from the motherboard 9 is connected to corresponding pins of the PAL 160 logic and the PAL 160 generates at least a control signal for the ASIC 150 and a control signal 119 for the program memory FLASH 128.
- the processor 120 executes a program stored in the FLASH 128.
- Processor 120, FLASH 28, ASIC 150, and PAL 160 are interconnected via a module-internal system bus that includes lines 110, 11, 12, 126, 119 for data, address, and control signals.
- the processor 120 of the security module 100 is connected via a module-internal data bus 126 to a FLASH 128 and to the ASIC 150.
- the FLASH 128 is supplied with system voltage Us +. For example, it is a 128 Kbyte FLASH memory type AM29F0I0-45EC.
- the ASIC 150 of the postal security module 100 provides via a module-internal address bus 110, the addresses 0 to 7 to the corresponding address inputs of the FLASH 128.
- the processor 120 of the security module 100 provides via an internal address bus 111 the Addresses 8 to 15 to the corresponding address inputs of the FLASH 128.
- the ASIC 150 of the security module 100 is connected via the contact group 101 of the interface 8 with the data bus 118, with the address bus 117 and the control bus 115 of the motherboard 9 in communication.
- the processor 120 has memory 122, 124 to which an operating voltage Ub + from a voltage monitoring unit 12 is supplied via the line 138.
- a real-time clock RTC 122 and the memory RAM 124 are supplied by an operating voltage via the line 138.
- the voltage monitor unit (Battery Observer) 12 also provides a status signal 164 and responds to a control signal 135.
- the voltage selector 180 as output voltage on the line 136 for the battery observer 12 and memory 116, passes that of its input voltages as a supply voltage which is higher than the other one , Due to the possibility of automatically feeding the described circuit as a function of the magnitude of the voltages Us + and Ub + with the larger of the two, during normal operation the battery 134 can be exchanged without loss of data.
- the battery 134 of the security module 100 feeds in the rest periods outside normal operation in the aforementioned manner the real-time clock (RTC) 122 with date and / or time registers and / or the static RAM (SRAM) 124, which holds security-relevant data. If the voltage of the battery drops below a certain limit during battery operation, the voltage monitoring unit 12 connects the feed point for the RTC and SRAM to ground until reset. The voltage at the RTC and SRAM is then at 0V. As a result, the SRAM 124, which contains eg important cryptographic keys, is deleted very quickly. At the same time, the registers of RTC 122 are cleared and the current time and date are lost.
- RTC real-time clock
- SRAM static RAM
- This action prevents a potential attacker from stopping the postage meter internal clock 122 by manipulating the battery voltage without losing any security related data. This prevents the attacker from circumventing security measures such as long time timers or watchdogs.
- security measures are based on the Figures 9 and 10 explained in detail.
- the RESET unit 130 is connected via the line 131 to the pin 3 of the processor 120 and to a pin of the ASIC 150.
- the processor 120 and the ASIC 150 are reset by a reset generation in the RESET unit 130 when the supply voltage drops.
- the described circuit changes into a self-holding state in which it remains even when subsequently increasing the voltage.
- the processor can query the state of the circuit (status signal) and thus and / or via the evaluation of the contents of the erased memory, conclude that the battery voltage has in the meantime fallen below a certain value.
- the processor may reset the monitor circuit, i. make a fad.
- the unplugged detection unit 13 has to measure the input voltage line 192, which is connected via the plug of the security module and interface 8, preferably via a socket on the motherboard 9 of the postage meter to ground. This measurement is used for static monitoring of the arrangement and forms the basis for monitoring at a first stage. It is contemplated that the unplugged detection unit 13 comprises resettable latching means, the latching being triggered when the voltage level on a sense voltage line 192 deviates from a predetermined potential.
- the evaluation logic includes the processor 120 connected to the other functional units, which is programmed to detect and change the respective state of the security module 100. The state of latching can be queried via the line 139 from the processor 120 of the security module 100.
- the measuring voltage potential on the line 192 corresponds to ground potential when the security module 100 is properly inserted.
- On line 139 is operating voltage potential. Ground voltage potential is present on the line 139 when the security module 100 is unplugged.
- the processor 120 has a fifth pin 5, to which the line 139 is connected in order to query the state of the unplugged detection unit 13, whether it is switched to ground potential with latching. To the state to reset the latching of the unplugged detection unit 13 via the line 137, the processor 120 has a fourth pin 4.
- a current loop 18 is provided which also connects the pins 6 and 7 of the processor 120 via the plug of the security module and via the socket on the motherboard 9 of the postage meter machine.
- the lines on the pins 6 and 7 of the processor 120 are closed only to a current loop 18 at a plugged into the motherboard 9 PSM 100. This loop forms the basis for a dynamic monitoring of the plugged-in safety module on a second level.
- the processor 120 internally comprises a processing unit CPU 121, a real-time clock RTC 122, a RAM unit 124 and an input / output unit 125.
- the processor 120 is equipped with pins 8, 9 for outputting at least one signal for signaling the status of the security module 100 .
- I / O ports of the input / output unit 125 to which module-internal signaling means are connected, for example, colored light emitting diode LED's 107, 108, which signal the state of the security module 100.
- the safety modules can assume different states in their life cycle. So, for example, to detect whether the module contains valid cryptographic keys. Furthermore, it is also important to distinguish whether the module is working or is defective. The exact type and number of module states depends on the implemented functions in the module and on the implementation.
- the unplugged detection unit 13 has a voltage divider, which consists of a series circuit of resistors 1310, 1312, 1314 and between a tapped by a capacitor 1371 supply voltage potential and a Meßwoodspotential on the line 192 is placed.
- the circuit is supplied via line 136 with the system or battery voltage.
- the respective supply voltage from the line 136 passes through a diode 1369 to the capacitor 1371 of the circuit.
- an inverter 1320, 1398 On the output side of the circuit.
- the transistor 1320 of the inverter In the normal state, the transistor 1320 of the inverter is disabled and the supply voltage is via the resistor 1398 on the line 139, which therefore logically '1', ie H level in the normal state leads.
- An L level on line 139 is advantageous as a status signal for unplug because then no current flows into pin 5 of processor 120, increasing battery life.
- the diode 1369 preferably in conjunction with an electrolytic capacitor 1371, ensures that the circuit upstream of the inverter is supplied with a voltage over a relatively long period of time (> 2 sec), in which its function is ensured, even though the voltage on the line 136 is already high was turned off.
- the voltage divider 1310, 1312, 1314 has a tap 1304 to which a capacitor 1306 and the noninverting input of a comparator 1300 are connected.
- the inverting input of the comparator 1300 is connected to a reference voltage source 1302.
- the output of the comparator 1300 is connected on the one hand via the negator 1324.1398 to the line 139 and on the other hand to the control input of a switching means 1322 for latching.
- the switching means 1322 is connected in parallel with the resistor 1310 of the voltage divider, and the latching switching means 1316 is connected between the tap 1304 and ground.
- the tap 1304 of the voltage divider is at the junction of the resistors 1312 and 1314.
- the capacitor 1306 connected between the tap 1304 and ground prevents vibrations.
- the voltage at tap 1304 of the voltage divider is compared in comparator 1300 with the reference voltage of source 1302. If the voltage to be compared at tap 1304 is less than the reference voltage of source 1302, 50, the comparator output remains switched low and transistor 1320 of the inverter is disabled. As a result, the line 139 now receives operating voltage potential and the status signal leads logically '1'.
- the voltage divider is dimensioned so that at ground potential on the line 192, the tap 1304 performs a voltage which is safely below the switching threshold of the comparator 1300.
- the connection is interrupted and the line 192 is no longer connected to ground, because the security module 100 has been detached from the socket on the motherboard 9 or interface unit 8 of the franking machine, the voltage at the tap 1304 is pulled over the voltage of the reference voltage source 1302 and the Comparator 1300 switches over.
- the comparator output is switched to H level, and thus the transistor 1320 is turned on.
- the line 139 is connected to ground potential and the status signal logic '0.
- a transistor 1322 which is connected in parallel with the resistor 1310 of the voltage divider, a self-holding circuit of the unplugged detection unit 13 is realized.
- the control input of transistor 1322 is switched to the H level by the comparator output.
- the transistor 1322 turns on and bridges the resistor 1310.
- the voltage divider is formed only by the resistors 1312 and 1314.
- the switching threshold is increased so much that the comparator remains in the switched state when the line 192 again ground potential, because the security module was plugged again.
- the state of the circuit can be queried via the signal on line 139 from the processor 120.
- the unplugged detection unit 13 as circuit means comprises a line 137 and a latching resetting means 1316, the reset being triggerable by the processor 120 via a signal on the line 137.
- the processor 120 can at any time via a user circuit ASIC 150, via a first contact group 101, via a system bus of the controller 1 and for example via the microprocessor 91 via modem 83 to contact a remote data center, which checks the billing data and optionally other data to the Processor 120 transmitted.
- the user circuit ASIC 150 of the security module 100 is connected to the processor 120 via a module-internal data bus 126.
- the processor 120 may reset the untagged detection unit if reinitialization could be successfully completed using the transmitted data.
- transistor 1316 is turned on via the reset signal on line 137, thus pulling the voltage at tap 1304 below the reference voltage of source 1302 and blocking transistors 1320 and 1322. When transistor 1322 is normally off, resistors 1310 and 1312 in series form the upper part of the above voltage divider and the switching threshold is lowered back to the original state.
- the FIG. 6 shows the mechanical structure of the safety module in side view.
- the security module is designed as a multi-chip module, that is, a plurality of functional units are interconnected on a printed circuit board 106.
- the security module 100 is with a hard potting compound 105 shed, wherein the battery 134 of the security module 100 is disposed outside of the potting compound 105 on a printed circuit board 106 interchangeable.
- it is potted with a potting material 105 that signal means 107, 108 protrude from the potting material at a first location and that the circuit board 106 protrudes laterally with the inserted battery 134 a second location.
- the printed circuit board 106 also has battery contact terminals 103 and 104 for connecting the poles of the battery 134, preferably on the component side above the printed circuit board 106. It is envisaged that for plugging the postal security module PSM 100 on the main board of the meter 1, the contact groups 101 and 102nd are arranged below the circuit board 106 (trace side) of the security module 100.
- the user circuit ASIC 150 is via the first contact group 101 - in a manner not shown - in communication with the system bus of a control device 1 and the second contact group 102 serves to supply the security module 100 with the system voltage.
- the security module is plugged onto the motherboard, then it is preferably arranged within the meter housing in such a way that the signal means 107, 108 near an opening 109 or projects into this.
- the meter housing is thus advantageously designed so that the user can still see the status of the security module from the outside.
- the two light emitting diodes 107 and 108 of the signal means are controlled via two output signals of the I / O ports to the pin 8, 9 of the processor 120. Both LEDs are housed in a common component housing (Bicolorleuchtdiode), which is why the dimensions or the diameter of the opening can remain relatively small and is of the order of the signal means. In principle, three different colors can be displayed (red, green, orange).
- FIG. 7 is a plan view of the postal security module shown.
- FIGS. 8a or 8b show a view of the security module respectively from the right and from the left.
- the location of the contact groups 101 and 102 below the printed circuit board 106 is from the FIGS. 8a and 8b combined with FIG. 6 clear.
- a green LED 107 signals an OK state 220, but a lit LED 108 signals an error state 230 as a result of an at least static self-test.
- the result of such a known self-test can not be falsified because of the direct signaling via the LEDs 107,108.
- the ongoing check in dynamic mode would detect the error and signal the status 240 with orange LED's lit. After switching off / on, booting is required, otherwise no other operation can be performed.
- the case where the installation of a key has been forgotten during manufacture is signaled as state 260, for example with a green blinking LED 107.
- the first functional unit is the processor 120. This constantly evaluates a second daily loan to see whether the latter is exhausted. That's the case where a long time timer has expired.
- the long time timer has expired if the data center has not been contacted for too long, for example to recharge a credit.
- 90 days can be specified by the data center as a time credit and loaded into a memory 124 of the security device during installation or during reloading. At the end of these 90 days, a "LOST" state 250 will be signaled by a flashing red LED.
- the long time timer is preferably a down counter that is implemented in the processor 120.
- state 250 also remains when the security module is disconnected from the meter after the "LOST" state has been reached.
- the suspect state 270 is signaled, preferably a backward counter, also implemented in the processor 120, which constantly evaluates a first daily credit of, say, thirty days to determine whether the latter is exhausted ,
- states 280 and 290 are optionally provided for various further tests.
- further functional units in particular a temperature sensor, may be provided in the security module. If, for example, a temperature was exceeded which could lead to damage in the safety module, then this state 280 can be signaled with the LEDs 107, 108, which light up red and flash orange, and thus produce the overall effect of the alternating red / orange flashing.
- the second functional unit may optionally monitor the battery voltage to see if its capacity has been exhausted.
- a state 290 for a required battery change can be signaled with the LEDs 107, 108, which light up green and flash orange, thus causing the overall effect of the alternating green / orange flashing.
- the FIG. 10 shows a representation of the tests in the system for statically and dynamically changeable states.
- a deactivated system in state 200 after being switched on, transitions via transition Start 201 into state 210, in which a static self-test is performed by the safety module as soon as the operating voltage is present.
- the state 220 with LED 107 is reached in green.
- Transition 203 illustrating such tests returns to state 220 LED green at OK.
- a transition 206 leads to state 240 and the LEDs light orange at an error detected during the dynamic self-test.
- orange flashing LEDs 107, 108 indicate that the connection to the data center is to be included because the security device is already considered suspect.
- the state 210 is reached again.
- the state "LOST" is signaled with the red flashing LED 108.
- state 260 is reached blinking green LED 107.
- optional further transitions may lead either to the further state 280 with red flashing / orange flashing LEDs or state 290 to green flashing / orange flashing LEDs.
- a temperature measurement will result in a need to swap the entire security module. In the latter transition, capacitance measurement of the battery results in a need for battery replacement.
- FIG. 11 shows the mechanical structure of the security module according to a second variant in side view.
- the security module is again designed as a multi-chip module and potted with a hard potting compound 105, wherein the battery 134 of the security module 100 is arranged outside of the potting compound 105 on a printed circuit board 106 interchangeable.
- the potting is performed at a first location with a potting material 105 that the signal means 107, 108 and the inserted battery 134 are mounted externally from the potting material at a second location on the top of the circuit board 106.
- the circuit board 106 has again battery contact terminals 103 and 104 for connecting the poles of the battery 134, preferably on the component side above the circuit board 106.
- the two LEDs 107 and 108 of the signal means are separate components in this variant.
- the two light emitting diodes 107 and 108 of the signal means are controlled via two output signals of the I / O ports to the pin 8, 9 of the processor 120.
- the LEDs can in turn also be controlled in a flashing manner so that different status groups can be distinguished.
- the meter housing is also designed again so that the user can see the status display of the security module from the outside, for example through a viewing window or opening 109. It is also envisaged that for plugging the postal security module PSM 100 on the motherboard of the meter 1 the Contact groups 101 and 102 are arranged below the circuit board 106 of the security module 100.
- a connector 127 includes the contact groups 101 and 102, wherein a connector 127 is disposed on the wiring side of the circuit board 106.
- FIG. 12 is a plan view of the postal security module of the second variant shown.
- the potting compound 105 surrounds the first part of the circuit board 106 in a cuboid, while the second part of the circuit board 106 for the two light emitting diodes 107 and 108, the interchangeably arranged battery 134 and the connector 127 (not visible here) remains free of potting compound.
- the battery contact terminals 103 and 104 are in the FIG. 12 covered by the battery, but as well as the connector 127 in the side view after 13a visible, noticeable.
- the potting of the first part of the circuit board 106 shows neither openings nor elevations and thus offers fewer points of attack for manipulation in criminal intent.
- the potting material 105 is preferably a two-component epoxy resin or polymer or plastic. Suitable is a potting compound from STYCAST®2651-40 FR from EMERSON & CUMING with preferably CATALYST 9 as the second component.
- both components are mixed and applied to both sides of the circuit board 106 in the first part. The latter can be done for example by immersion in the fresh mixture.
- a protective and / or sensor layer which is not visible from the outside after a final external encapsulation, can be attached, which forms a firm connection with the latter during hardening of the encapsulation material 105.
- the potting compound hardens to the solid opaque potting material 105.
- FIGS. 13a or 13b show a view of the security module of the second variant respectively from the right and from the left.
- the position of the connector 127 with the contact groups 101 and 102 below the circuit board 106 is from the Figures 13a and 13b combined with FIG. 12 more visible.
- a connector 127 may be mounted on top of the second part of the circuit board 106, not shown.
- POSTAL SECURITY DEVICE POSTAL SECURITY DEVICE
- the security module or PSD also have a different design, which makes it possible that it can be plugged, for example, on the motherboard of a personal computer that drives a commercial printer as a PC meter.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Claims (7)
- L'invention concerne un module de sécurité équipé d'une logique (120, 150, 160), de moyens d'alimentation du module de sécurité avec une tension de système ou avec une tension d'une batterie (134) et avec un nombre d'éléments de surveillance, comprenant : au moins une première (120) et une deuxième unité de fonction (12) ainsi qu'un élément de chargement d'au moins un crédit-temps prédéterminé par la centrale de données et un élément de signalement (107, 108), lequel est connecté à une première unité de fonction (120) en effectuant le chargement lors de l'installation et du rechargement dans une mémoire (124) de l'appareil de sécurité. Ladite première unité de fonction (120) exploite un crédit/jour sur la temporalisation en cours et commande l'élément de signalement (107, 108), afin de signaler au moins la temporalisation en cours. Comprenant plus précisément : une première conduite (136) pour l'alimentation en tension de la deuxième unité de fonction (12) avec une tension de système ou avec une tension de batterie. Ladite deuxième unité de fonction (12) dégage une tension de service par une deuxième conduite (138) à une mémoire (122, 124) et contribue à l'effacement de données sensibles dans la mémoire (124) en cas de tension de système trop faible, dû à une utilisation non-conforme ou à un changement du module de sécurité.
- Module de sécurité selon la revendication 1, caractérisé en ce que la première unité de fonction (120) est un processeur et la deuxième unité de fonction (12) une unité de contrôle de la tension (12).
- Module de sécurité selon la revendication 1, caractérisé en ce qu'une troisième unité de fonction (13) est présente sous la forme d'une unité de détection avec des moyens de câblage (1310, 1316, 1322, 1324) pour un verrouillage réinitialisable, lequel est déclenché lorsque le niveau de tension s'éloigne d'un potentiel prédéterminé sur une conduite de tension de mesure (192) et que le processeur (120), raccordé aux unités de fonction (12, 13), est programmé, afin d'établir et de signaler les états respectifs du module de sécurité (100).
- Module de sécurité selon l'une quelconque des revendications 2 à 3, caractérisé en ce que le processeur (120) comprend la mémoire (122, 124), à laquelle est amenée une tension de système Ub+ d'une unité de contrôle de la tension (12) via la deuxième conduite (138). Ledit processeur (120) est alimenté avec une tension de système Us+, présentant un quatrième raccord (Pin 4), afin de replacer l'état du verrouillage de l'unité de détection (13) par une troisième conduite (137), comprenant un cinquième raccord (Pin 5), auquel est raccordée une cinquième conduite (139), afin d'interroger l'état de l'unité de détection (13).
- Module de sécurité selon l'une quelconque des revendications 1 à 4, caractérisé en ce que le module de sécurité (100) est scellé avec une masse de scellement dure (105). La batterie (134) du module de sécurité (100) est disposée à l'extérieur de la masse de scellement (105) sur une plaquette (106) de manière à être changée. Ladite plaquette (106) présente des bornes de contact de batterie (103 et 104) pour le raccord de la borne de la batterie (134) et un deuxième groupe de contact (102) pour alimenter le module de sécurité (100) avec la tension de système. La masse de scellement est équipée d'éléments qui préviennent le module de sécurité (100) d'une attaque et, le cas échéant, le protègent. En outre, un des groupes de contact (101, 102) au moins est configuré de manière à contrôler statiquement et dynamiquement le branchement et l'attaque du module de sécurité (100)
- Module de sécurité selon l'une quelconque des revendications 2 à 5, caractérisé en ce que le processeur (120) du module de sécurité est équipé de raccords (Pins 8, 9) pour la sortie d'au moins un signal pour le signalement de l'état du module de sécurité (100).
- Module de sécurité selon la revendication 6, caractérisé en ce que des éléments de signalisation internes à module (107, 108) sont raccordés aux I/O ports d'une unité d'entrée/sortie (125) du processeur (120).
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19912781 | 1999-03-12 | ||
DE19912781A DE19912781A1 (de) | 1999-03-12 | 1999-03-12 | Verfahren zum Schutz eines Sicherheitsmoduls und Anordnung zur Durchführung des Verfahrens |
DE19928057A DE19928057B4 (de) | 1999-06-15 | 1999-06-15 | Sicherheitsmodul und Verfahren zur Sicherung der Postregister vor Manipulation |
DE19928057 | 1999-06-15 |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1035518A2 EP1035518A2 (fr) | 2000-09-13 |
EP1035518A3 EP1035518A3 (fr) | 2000-12-20 |
EP1035518B1 true EP1035518B1 (fr) | 2008-06-25 |
Family
ID=26052507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP00250065A Expired - Lifetime EP1035518B1 (fr) | 1999-03-12 | 2000-02-25 | Ensemble de protection d'un module de sécurité |
Country Status (5)
Country | Link |
---|---|
US (2) | US7194443B1 (fr) |
EP (1) | EP1035518B1 (fr) |
CN (1) | CN1156800C (fr) |
AU (1) | AU2080500A (fr) |
DE (1) | DE50015220D1 (fr) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE20020635U1 (de) * | 2000-11-28 | 2001-03-15 | Francotyp-Postalia AG & Co., 16547 Birkenwerder | Anordnung zur Stromversorgung für einen Sicherheitsbereich eines Gerätes |
DE10061665A1 (de) | 2000-12-11 | 2002-06-20 | Francotyp Postalia Gmbh | Verfahren zur Ermittlung eines Erfordernis zum Austausch eines Bauteils und Anordnung zur Durchführung des Verfahrens |
DE10116703A1 (de) * | 2001-03-29 | 2002-10-10 | Francotyp Postalia Ag | Verfahren zur Aufzeichnung eines Verbrauchswertes und Verbrauchszähler mit einem Meßwertgeber |
DE10136608B4 (de) * | 2001-07-16 | 2005-12-08 | Francotyp-Postalia Ag & Co. Kg | Verfahren und System zur Echtzeitaufzeichnung mit Sicherheitsmodul |
US7440914B2 (en) * | 2001-07-27 | 2008-10-21 | Promontory Interfinancial Networks, Llc | Method and apparatus for fully insuring large bank deposits |
US20040257102A1 (en) * | 2003-06-20 | 2004-12-23 | Wong Hong W. | Secure content protection for board connections |
DE202006008952U1 (de) * | 2006-05-31 | 2006-08-03 | Francotyp-Postalia Gmbh | Anordnung zum Wechseln von Kundendaten einer Frankiermaschine |
US8308819B2 (en) * | 2006-12-19 | 2012-11-13 | Pitney Bowes Inc. | Method for detecting the removal of a processing unit from a printed circuit board |
DE102007011309B4 (de) * | 2007-03-06 | 2008-11-20 | Francotyp-Postalia Gmbh | Verfahren zur authentisierten Übermittlung eines personalisierten Datensatzes oder Programms an ein Hardware-Sicherheitsmodul, insbesondere einer Frankiermaschine |
US8522043B2 (en) * | 2007-06-21 | 2013-08-27 | Microsoft Corporation | Hardware-based computer theft deterrence |
US8850232B2 (en) * | 2008-03-19 | 2014-09-30 | Freescale Semiconductor, Inc. | Method for protecting a cryptographic module and a device having cryptographic module protection capabilities |
US8060453B2 (en) | 2008-12-31 | 2011-11-15 | Pitney Bowes Inc. | System and method for funds recovery from an integrated postal security device |
US8055936B2 (en) * | 2008-12-31 | 2011-11-08 | Pitney Bowes Inc. | System and method for data recovery in a disabled integrated circuit |
US9046570B2 (en) | 2012-08-03 | 2015-06-02 | Freescale Semiconductor, Inc. | Method and apparatus for limiting access to an integrated circuit (IC) |
CN107533433A (zh) * | 2015-04-16 | 2018-01-02 | 时间防御系统有限责任公司 | 用于后制作外部硬件附件的自检测的系统和方法 |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4217484A (en) * | 1977-02-07 | 1980-08-12 | Gerst William J | Taximeter |
CA1160744A (fr) * | 1979-05-09 | 1984-01-17 | Jesse T. Quatse | Machine electronique d'affranchissement postal a meilleures surete et tolerance aux erreurs |
GB2144081B (en) | 1983-07-23 | 1987-10-28 | Pa Consulting Services | Postal franking machines |
US4575621A (en) * | 1984-03-07 | 1986-03-11 | Corpra Research, Inc. | Portable electronic transaction device and system therefor |
JPS6227843A (ja) | 1985-07-29 | 1987-02-05 | Sharp Corp | 電子装置 |
US4804957A (en) | 1985-11-27 | 1989-02-14 | Triad Communications, Inc. | Utility meter and submetering system |
US5097253A (en) * | 1989-01-06 | 1992-03-17 | Battelle Memorial Institute | Electronic security device |
US5027397A (en) | 1989-09-12 | 1991-06-25 | International Business Machines Corporation | Data protection by detection of intrusion into electronic assemblies |
EP0494913A4 (en) * | 1989-10-03 | 1993-01-20 | University Of Technology, Sydney | Electro-active cradle circuits for the detection of access or penetration |
US5091938B1 (en) * | 1990-08-06 | 1997-02-04 | Nippon Denki Home Electronics | Digital data cryptographic system |
US5515540A (en) * | 1990-08-27 | 1996-05-07 | Dallas Semiconducter Corp. | Microprocessor with single pin for memory wipe |
DE4213278C2 (de) | 1992-04-16 | 1998-02-19 | Francotyp Postalia Gmbh | Anordnung zum Frankieren von Postgut |
DE4217830C2 (de) | 1992-05-29 | 1996-01-18 | Francotyp Postalia Gmbh | Verfahren zum Betreiben einer Datenverarbeitungsanlage |
US5490077A (en) | 1993-01-20 | 1996-02-06 | Francotyp-Postalia Gmbh | Method for data input into a postage meter machine, arrangement for franking postal matter and for producing an advert mark respectively allocated to a cost allocation account |
DE4333156C2 (de) | 1993-09-29 | 1995-08-31 | Siemens Ag | Schaltungsanordnung zum Anschließen einer elektronischen Baugruppe an eine Betriebsspannung |
US5548163A (en) * | 1993-12-13 | 1996-08-20 | Blade Technologies Inc. | Device for securing car audio equipment |
DE4344476A1 (de) | 1993-12-21 | 1995-06-22 | Francotyp Postalia Gmbh | Verfahren zur Verbesserung der Sicherheit von Frankiermaschinen |
DE4344471A1 (de) | 1993-12-21 | 1995-08-17 | Francotyp Postalia Gmbh | Verfahren und Anordnung zur Erzeugung und Überprüfung eines Sicherheitsabdruckes |
US5805711A (en) * | 1993-12-21 | 1998-09-08 | Francotyp-Postalia Ag & Co. | Method of improving the security of postage meter machines |
GB9514096D0 (en) * | 1995-07-11 | 1995-09-13 | Homewood Clive R | Security device |
DE19605015C1 (de) | 1996-01-31 | 1997-03-06 | Francotyp Postalia Gmbh | Vorrichtung zum Bedrucken eines auf einer Kante stehenden Druckträgers |
EP0789333B1 (fr) | 1996-01-31 | 2003-08-13 | Francotyp-Postalia AG & Co. KG | Machine d'affranchissement |
DE19610070A1 (de) | 1996-03-14 | 1997-09-18 | Siemens Ag | Chipkarte |
US6065679A (en) * | 1996-09-06 | 2000-05-23 | Ivi Checkmate Inc. | Modular transaction terminal |
CA2271097A1 (fr) * | 1996-11-07 | 1998-05-14 | Edward Naclerio | Systeme de protection du traitement cryptographique et des ressources en memoire pour machines d'affranchissement postal |
US5960084A (en) * | 1996-12-13 | 1999-09-28 | Compaq Computer Corporation | Secure method for enabling/disabling power to a computer system following two-piece user verification |
DE19711998A1 (de) * | 1997-03-13 | 1998-09-17 | Francotyp Postalia Gmbh | Postverarbeitungssystem mit einer über Personalcomputer gesteuerten druckenden Maschinen-Basisstation |
US6019281A (en) * | 1997-12-22 | 2000-02-01 | Micro General Corp. | Postal security device with display |
US6097606A (en) * | 1998-05-28 | 2000-08-01 | International Verifact Inc. | Financial transaction terminal with limited access |
-
2000
- 2000-02-25 EP EP00250065A patent/EP1035518B1/fr not_active Expired - Lifetime
- 2000-02-25 DE DE50015220T patent/DE50015220D1/de not_active Expired - Lifetime
- 2000-03-10 US US09/522,619 patent/US7194443B1/en not_active Expired - Lifetime
- 2000-03-10 CN CNB001038710A patent/CN1156800C/zh not_active Expired - Lifetime
- 2000-03-10 AU AU20805/00A patent/AU2080500A/en not_active Abandoned
-
2002
- 2002-08-12 US US10/217,247 patent/US6954149B2/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
EP1035518A3 (fr) | 2000-12-20 |
CN1156800C (zh) | 2004-07-07 |
US20020194017A1 (en) | 2002-12-19 |
DE50015220D1 (de) | 2008-08-07 |
EP1035518A2 (fr) | 2000-09-13 |
US6954149B2 (en) | 2005-10-11 |
CN1271145A (zh) | 2000-10-25 |
AU2080500A (en) | 2000-09-14 |
US7194443B1 (en) | 2007-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1035517B1 (fr) | Procédé de protection d'un module de sécurité et ensemble pour mettre en oeuvre ledit procédé | |
EP0969422B1 (fr) | Procédé pour l'amélioration de la sécurité des machines à affranchir | |
EP1035518B1 (fr) | Ensemble de protection d'un module de sécurité | |
EP1035516B1 (fr) | Système pour un module de sécurité | |
EP0762337A2 (fr) | Procédé et dispositif pour augmenter la protection contre la manipulation de données critiques | |
DE69729409T2 (de) | Elektronisches Frankiermaschinensystem mit internem Abrechnungssystem und entfernbarem externem Abrechnungssystem | |
DE69828331T2 (de) | Elektronische Frankiermaschine mit mehreren Taktsystemen zur verbesserten Sicherheit | |
DE3626580A1 (de) | Fernfrankiermaschinen-inspektionssystem | |
EP1103924B1 (fr) | Procédé de protection d'un dispositif contre son fonctionnement avec des articles de consommation non autorisés et dispositif pour la mise en oeuvre du procédé | |
DE69221538T2 (de) | Ferndiagnoseverfahren für Frankiermaschine | |
EP1063619B1 (fr) | Module de sécurité et procédé pour protection du registre postal contre la manipulation | |
EP1035513B1 (fr) | Module de sécurité avec signalisation de l'état | |
EP1103923B1 (fr) | Procédé pour commander automatiquement des articles de consommation et dispositif pour la mise en oeuvre du procédé | |
EP1061479A2 (fr) | Dispositif et procédé pour générer un motif destiné à la sécurité | |
DE19928061C2 (de) | Sicherheitsmodul zur Überwachung der Systemsicherheit und Verfahren | |
EP1213817B1 (fr) | Procédé pour la détermination de la nécessité de changer un composant | |
EP0996097B1 (fr) | Procédé pour améliorer la sécurité de machines à affranchir pendant le transfert du crédit | |
DE19534527C2 (de) | Verfahren zur Erhöhung der Manipulationssicherheit von kritischen Daten | |
DE19534529C2 (de) | Verfahren zur Erhöhung der Manipulationssicherheit von kritischen Daten | |
DE29522056U1 (de) | Anordnung zur Erhöhung der Manipulationssicherheit von kritischen Daten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): CH DE FR GB IT LI |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
RIC1 | Information provided on ipc code assigned before grant |
Free format text: 7G 07B 17/00 A, 7G 07B 17/04 B |
|
17P | Request for examination filed |
Effective date: 20010417 |
|
AKX | Designation fees paid |
Free format text: CH DE FR GB IT LI |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: FRANCOTYP-POSTALIA AG & CO. KG |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: FRANCOTYP-POSTALIA GMBH |
|
17Q | First examination report despatched |
Effective date: 20060926 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RTI1 | Title (correction) |
Free format text: ARRANGEMENT FOR THE PROTECTION OF A SECURITY MODULE |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): CH DE FR GB IT LI |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REF | Corresponds to: |
Ref document number: 50015220 Country of ref document: DE Date of ref document: 20080807 Kind code of ref document: P |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20090326 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 50015220 Country of ref document: DE Owner name: FRANCOTYP-POSTALIA GMBH, DE Free format text: FORMER OWNER: FRANCOTYP-POSTALIA GMBH, 16547 BIRKENWERDER, DE Effective date: 20150330 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 18 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 19 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20190218 Year of fee payment: 20 Ref country code: GB Payment date: 20190218 Year of fee payment: 20 Ref country code: IT Payment date: 20190225 Year of fee payment: 20 Ref country code: DE Payment date: 20190110 Year of fee payment: 20 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20190219 Year of fee payment: 20 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R071 Ref document number: 50015220 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: PE20 Expiry date: 20200224 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION Effective date: 20200224 |