[go: up one dir, main page]

EP1035518B1 - Ensemble de protection d'un module de sécurité - Google Patents

Ensemble de protection d'un module de sécurité Download PDF

Info

Publication number
EP1035518B1
EP1035518B1 EP00250065A EP00250065A EP1035518B1 EP 1035518 B1 EP1035518 B1 EP 1035518B1 EP 00250065 A EP00250065 A EP 00250065A EP 00250065 A EP00250065 A EP 00250065A EP 1035518 B1 EP1035518 B1 EP 1035518B1
Authority
EP
European Patent Office
Prior art keywords
security module
voltage
battery
processor
line
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP00250065A
Other languages
German (de)
English (en)
Other versions
EP1035518A3 (fr
EP1035518A2 (fr
Inventor
Peter Post
Dirk Roseneau
Torsten Schlaaff
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Francotyp Postalia GmbH
Original Assignee
Francotyp Postalia GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE19912781A external-priority patent/DE19912781A1/de
Priority claimed from DE19928057A external-priority patent/DE19928057B4/de
Application filed by Francotyp Postalia GmbH filed Critical Francotyp Postalia GmbH
Publication of EP1035518A2 publication Critical patent/EP1035518A2/fr
Publication of EP1035518A3 publication Critical patent/EP1035518A3/fr
Application granted granted Critical
Publication of EP1035518B1 publication Critical patent/EP1035518B1/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00233Housing, e.g. lock or hardened casing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00266Man-machine interface on the apparatus
    • G07B2017/00298Visual, e.g. screens and their layouts
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00266Man-machine interface on the apparatus
    • G07B2017/00306Acoustic, e.g. voice control or speech prompting
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00314Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
    • G07B2017/00346Power handling, e.g. power-down routine
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00362Calculation or computing within apparatus, e.g. calculation of postage value
    • G07B2017/00395Memory organization
    • G07B2017/00403Memory zones protected from unauthorized reading or writing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • G07B2017/00959Cryptographic modules, e.g. a PC encryption board
    • G07B2017/00967PSD [Postal Security Device] as defined by the USPS [US Postal Service]

Definitions

  • the invention relates to an arrangement for protecting a security module, according to claim 1.
  • a postal security module is particularly suitable for use in a postage meter or mail processing machine or computer with mail processing function.
  • Modern franking machines like those from the US 4,746,234 known thermal transfer postage meter, employ a fully electronic digital printing device.
  • Applicants' T1000 meter has a microprocessor surrounded by a secure housing having an opening for delivering a letter.
  • a mechanical letter sensor microwaveswitch
  • the franking imprint includes previously entered and stored postal information for conveying the letter.
  • the control unit of the franking machine carries out a software billing, exercises a monitoring function, possibly with regard to the conditions for a data update, and controls the reloading of a port value credit.
  • thermal transfer franking machine has already been in US 5,606,508 ( DE 42 13 278 B1 ) and in US 5,490,077 proposed a data entry option using smart cards.
  • One of the smart cards loads new data into the postage meter machine and a set of further smart cards allows a setting to be made according to stored data by inserting a chip card.
  • the data loading and the setting of the franking machine can thus be more convenient and faster than by keyboard input.
  • a franking machine for franking mail is provided with a printer for printing the postage stamp on the mail, a controller for controlling the printing and peripheral components of the postage meter, a bill unit for settling postage, at least one nonvolatile memory for storing postage data , equipped with at least one non-volatile memory for storing safety-relevant data and with a calendar / clock.
  • the non-volatile memory of the safety-related data and / or the calender / clock is usually powered by a battery.
  • security-relevant data (cryptographic keys and the like) are saved in nonvolatile memories. These memories are EEPROM, FRAM or battery backed SRAM.
  • Known franking machines often also have an internal real time clock (RTC), which is powered by a battery.
  • RTC real time clock
  • encapsulated modules containing integrated circuits and a lithium battery. These modules must be replaced and disposed of at the end of the life of the battery as a whole. From an economic and ecological point of view, it is better if only the battery needs to be replaced.
  • the security case must be opened and then closed again and sealed, because the security against fraud is essentially based on the secure housing, which encloses the entire machine.
  • EP 660 269 A2 US 5,671,146
  • any required repair of a franking machine is then difficult on site, if the access to the components is difficult or limited.
  • the secured housing will in future be reduced to the so-called postal security module, which can improve the accessibility to the other components.
  • the battery of the security module it would also be desirable that these be relatively simple can be replaced.
  • the battery must be outside the security range of the franking machine.
  • a potential attacker is able to manipulate the battery voltage.
  • Known battery-powered SRAM and RTC have different requirements with regard to their required operating voltage. The voltage required to hold data from SRAM is below the required voltage for operating RTC.
  • the enifernte data center specifies a time credit or a period of time, in particular a number of days, or a specific day up to which the franking device can report via communication link. After unsuccessful expiration of the time credit or the deadline, franking is prevented.
  • Security modules are already known from electronic data processing systems ago. To protect against burglary in an electronic system is in EP 417 447 B1 already proposed a lock, which includes power supply and signal detection means and shielding in the housing.
  • the shielding means is made of encapsulating material and conductive means to which the power supply and signal detection means are connected. The latter responds to a change in the line resistance of the line means.
  • the security module contains an internal battery, a voltage switch from system voltage to battery voltage, a power gate and a short-circuit transistor as well as other sensors. When the voltage falls below a certain limit, the Power Gate responds. If the line resistance, temperature or radiation is changed, the logic will react.
  • the output of the short-circuit transistor is switched to L level, whereby a memory stored in the cryptographic key is deleted.
  • the life of the non-replaceable battery and thus of the security module for use in franking devices or mail processing machines is too small.
  • a larger mail processing machine is, for example, the JetMail®.
  • a franking print is here produced by means of a stationary ink jet printhead in a non-horizontal approximately vertical letter transport.
  • a suitable design for a printing device was already in the DE 196 05 015 C1 proposed.
  • the mailing machine has a meter and a base. If the meter is to be equipped with a housing so that components are more easily accessible, then it must be protected by a postal security module fraud attempts, which at least performs the settlement of postal fees. To exclude influences on the program, has already been in the EP 789 333 A2 under the title: Postage meter proposed to equip a security module with an Application Specific Integrated Circuit ASIC, which has a hardware A réelleaji. The user circuit also controls the print data transfer to the print head.
  • franking machines are also modular. This modularity allows the exchange of modules and components for various reasons. Thus, e.g. defective modules are replaced and replaced by checked, repaired or new modules. Since the utmost care is required in the exchange of assemblies containing safety-relevant data, the replacement usually requires the use of a service technician and measures that prevent its functioning in case of improper use or unauthorized replacement of a security module. The latter is very expensive.
  • the invention has for its object, with little effort to ensure protection against an unauthorized manipulated security module when the security module is arranged interchangeable.
  • the exchange should be possible by anyone in the simplest possible way.
  • the invention assumes, by means of functional units, the exchange, the manipulation and the use of a security module of a franking machine, mail processing device or similar device in order to provide users of the various devices with a guarantee about the correct functioning of the security module and thus of the entire device.
  • Exchanging or damaging the safety module is at least detected and, if necessary, subsequently signaled as a state when the safety module is plugged in again and supplied with a system voltage.
  • the changes in the state of the security module are detected by means of a first functional unit and by means of a detection unit, which has a resettable latching and is powered by a battery.
  • the first functional unit can evaluate the respective state when it is supplied with system voltage again.
  • a second functional unit may optionally monitor the battery voltage to see if its capacity has been exhausted. A required battery change is signaled, of course, a supply must be backed up by the system voltage. It is to be assumed at least then of an improper use of a security module in the exchange, in which not only the system voltage is missing, but also the interchangeable battery is removed. So that the replacement of the lowest possible qualified personnel and in the future can even be performed by the user, the second functional unit monitors the power failure when replacing the battery, the first functional unit, if necessary, first deletes sensitive data and thus restricts the further use of the security module or even prevented. After an on-site inspection of the security module by a service, the original functionality can be restored with the housing intact.
  • the first functional unit enforces a later re-commissioning contact the security module with a remote data center to unlock at least one functional unit. If the entire security module has been exchanged without changing the battery, sensitive data is also first deleted by the second functional unit, but the sensitive data can be reinitialized during the restart. To establish contact methods with a digital or analog transmission link can be used. Also, an inspection of the security module is then by a Service causes. The safety module can signal different states. For example, a distinction can be made as to whether the last contact with the data center was made so long ago that it already seems suspicious or long that reinitialization is no longer permitted. The first functional unit is constantly evaluating a first day loan. When the latter is exhausted, the suspicious state is signaled.
  • the time credit can be variable and vary from security device to security device.
  • the time credit can be specified by the data center and loaded during installation into a memory of the security device.
  • the first functional unit constantly evaluates a second daily loan. When the latter is exhausted, the state "LOST" is signaled. In the latter case, an inspection of the security module by a local service is also required.
  • the security module protection assembly comprises the security module having logic means for supplying the security module with a system voltage or with a voltage from a battery and with a number of monitoring means. It is described by at least a first and a second functional unit and by means for loading at least one time credit specified by the data center and by a signal means connected to a first functional unit, the charging being performed during installation and reloading into a memory of the security device is, and wherein the first functional unit evaluates a day loan on time and the signal means controls, at least to signal the timing, and by means of the second functional unit for deleting sensitive data in memory due improper use or replacement of the security module.
  • FIG. 1 is a block diagram of the security module 100 with the contact groups 101, 102 for connection to an interface 8 and with the battery contact terminals 103 and 104 of a battery interface for a battery 134 shown.
  • the security module 100 is potted with a hard potting compound, the battery 134 of the security module 100 is interchangeably disposed outside of the potting compound on a printed circuit board.
  • the circuit board carries the battery contact terminals 103 and 104 for connecting the poles of the battery 134.
  • the security module 100 is plugged into a corresponding interface 8 of the motherboard (motherboard) 9.
  • the first contact group 101 communicates with the system bus of a control device and the second contact group 102 serves to supply the security module 100 with the system voltage.
  • the first and / or second contact group 101 and / or 102 are / is designed for static and dynamic monitoring of the plugged in the security module 100.
  • the supply of the security module 100 is realized with the system voltage of the motherboard 9 and the pins P1, P2 and P4, a dynamic and static non-detection detected by the security module 100.
  • the latter requires a detection unit 13, which is connected via a conductor loop 192, 194 to the pin P4 of the contact group 102.
  • the conductor loop may be formed as part of the particular secure part of the security module 100 and embedded in sealing compound so that in a mechanical or chemical attack on the aforementioned part of the security module 100, the contact with the pin P4 is interrupted.
  • the security module 100 has, in a manner known per se, a microprocessor 120 which contains an integrated read-only memory (internal ROM) with the special application program (not shown), which is approved for the franking machine by the postal authority or the respective mail carrier. Alternatively, a conventional read-only memory ROM or FLASH memory can be connected to the internal data bus 126.
  • the security module 100 has, in a manner known per se, a reset circuit unit 130, a user circuit ASIC 150 and a logic PAL 160 which serves as the control signal generator for the ASIC.
  • the reset circuit unit 130 and the user circuit ASIC 150 and the logic PAL 160 and possibly other - not shown - memory are supplied via the lines 191 and 129 with system voltage Us +, which is supplied from the motherboard 9 when the franking device is turned on.
  • system voltage Us + which is supplied from the motherboard 9 when the franking device is turned on.
  • the system voltage Us + is also applied via a diode 181 and the line 136 at the input of the voltage monitoring unit 12.
  • a second operating voltage Ub + is supplied, which is available via the line 138.
  • the negative terminal battery contact terminal 104 is connected to ground. From the battery contact terminal 103 lying on the positive pole, battery voltage is supplied via a line 193, via a second diode 182 and the line 136 to the input of the voltage monitoring unit.
  • a commercial circuit can be used as a voltage switch 180.
  • the output of the voltage monitoring unit 12 is connected via a line 138 to an input for this second operating voltage U b + of the processor 120, which leads at least to a RAM memory area 122, 124 and there guarantees non-volatile storage as long as the second operating voltage U b + in the required Height is applied.
  • the processor 120 preferably includes an internal RAM 124 and a real-time clock (RTC) 122.
  • the voltage monitoring unit 12 in the security module has a resettable latching, which can be queried by the processor 120 via a line 164 and reset via a line 135. For a reset of the latching, the voltage monitoring unit 12 has circuit means. The reset can only be triggered when the battery voltage has risen above the predetermined threshold.
  • the lines 135 and 164 are each connected to a pin (pins 1 and 2) of the processor 120. Line 164 provides a status signal to processor 120, and line 135 provides a control signal to voltage monitoring unit 12.
  • the line 136 at the input of the voltage monitoring unit 12 also supplies an unplugged detection unit 13 with operating or battery voltage.
  • the unplugged detection unit 13 outputs on the line 139 a status signal to a pin 5 of the processor 120, which gives an indication of the state of the circuit.
  • the processor 120 queries the state of the unplugged detection unit 13 via the line 139.
  • the processor may reset the unplugged detection unit 13 with a signal output from the pin 4 of the processor 120 via the lead 137.
  • a static check is made for connection.
  • ground potential is queried via a line 192, which is present at the connection P4 of the interface 8 of the postal security module PSM 100 and can only be interrogated if the security module 100 is inserted properly.
  • ground potential of the negative pole 104 of the battery 134 of the postal security module PSM 100 is placed on the port P23 of the interface 8 and is thus interrogated at port P4 of the interface 8 via the line 192 of the unplugged detection unit 13.
  • a line loop which is looped back to the processor 120 via the pins P1 and P2 of the contact group 102 of the interface 8.
  • the processor 120 For dynamic testing of the connectedness of the postal security module PSM 100 to the motherboard 9, the processor 120 generates alternating signal levels at quite irregular time intervals at the pins 6, 7 and looping them back through the loop.
  • the postal security module PSM 100 is equipped with a long-live battery, which also allows monitoring of the use without the security module is connected to a system voltage of a postal processing facility. Proper use, operation, installation or installation in the appropriate environment are those characteristics to be tested by the functional units of the safety module. An initial installation is made by the manufacturer of the postal security module.
  • the processor 120 Since in a mechanical or chemical attack on the security module 100 and for each separation of the security module 100 from the interface unit 8, the storage of this information by the special battery-powered circuitry is ensured, an evaluation of this information can be done at any time, if a restart is desired ,
  • the regular evaluation of this disconnection signal on the line 139 of the detection unit 13 makes it possible for the processor 120 to delete sensitive data without, however, changing the billing and customer data in the NVRAM memories.
  • the current state of the postal security module with the deleted sensitive data can be understood as a maintenance condition, in which usually the replacement, repair or otherwise is made. Since the sensitive data of the functional unit are deleted, an error due to improper handling of the postal security module is excluded.
  • the sensitive data are, for example, cryptographic keys.
  • the processor 120 prevents in the maintenance state a core functionality of the postal security module, which consists for example in the billing and / or calculation of a security code for the security marking in a security print.
  • the postal security module PSM is first inserted and electrically connected to the corresponding interface unit 8 of a mail processing device. Then the device is switched on and thus the postal security module is again supplied with system voltage Us +. Due to the special condition, the proper installation of the postal security module must now be rechecked by its functional unit. For this purpose, a second stage of a test (dynamic plug-in detection) is provided. By means of an operative connection established between the first functional unit (processor 120) and the current loop 18 of the interface unit 8, information is exchanged whose error-free transmission provides proof of the proper installation. This is a prerequisite for a successful restart.
  • FIG. 2 shows a block diagram of a postage meter, which is equipped with a chip card read / write unit 70 for reloading change data by chip card and with a printing device 2, which is controlled by a control device 1.
  • the control device 1 has a motherboard 9 equipped with a microprocessor 91 with associated memories 92, 93, 94, 95.
  • the program memory 92 contains an operating program for at least printing and at least safety-related components of the program for a predetermined format change of a portion of the user data.
  • the RAM RAM 93 is used for volatile intermediate storage of intermediate results.
  • NVM 94 non-volatile memory is used for non-volatile caching of data, such as statistical data organized by cost center.
  • the calendar / clock module 95 also contains addressable but non-volatile memory areas for the non-volatile intermediate storage of intermediate results or also known program parts (for example for the DES algorithm).
  • control device 1 is connected to the chip card write / read unit 70, wherein the microprocessor 91 of the control device 1 is programmed, for example, to load the payload N from the memory area of a chip card 49 for their application in corresponding memory areas of the franking machine ,
  • a first chip card 49 inserted in a slot 72 of the chip card write / read unit 70 allows reloading of a record in the postage meter machine for at least one application.
  • the chip card 49 contains, for example, the postage for all the usual postal carrier services according to the tariff of the postal authority and a post carrier code to generate a stamp image with the franking machine and to stamp the postal items according to the tariff of the postal authority.
  • the control device 1 forms the actual meter with the means 91 to 95 of the aforementioned motherboard 9 and also includes a keyboard 88, a display unit 89 and an application-specific circuit ASIC 90 and the interface 8 for the postal security module PSM 100.
  • the security module PSM 100 is about a control bus to the aforementioned ASIC 90 and the microprocessor 91 and via the parallel ⁇ C bus at least with the means 91 to 95 of the motherboard 9 and connected to the display unit 89.
  • the control bus carries lines for the signals CE, RD and WR between the security module PSM 100 and the aforementioned ASIC 90.
  • the microprocessor 91 preferably has a pin for an output from the security module PSM 100 interrupt signal i, other connections for the keyboard 88, a
  • the serial interface SI-1 for the connection of the chip card write / read unit 70 and a serial interface SI-2 for the optional connection of a MODEM by means of the MODEM can be used to increase the credit stored in the non-volatile memory of the postal security device PSM 100.
  • the postal security device PSM 100 is surrounded by a secured housing. Before each franking imprint, a hardware settlement is carried out in the postal security module PSM 100. Billing is independent of cost centers.
  • the postal security agent PSM 100 can be designed internally as in the European application EP 789 333 A3 was described in more detail. It is contemplated that the ASIC 90 may include a serial interface circuit 98 to a post-stream powered device, a serial interface circuit 96 to the sensors and actuators of the printing device 2, a serial interface circuit 97 to the print control electronics 16 for the printhead 4, and a serial interface circuit 99 to one has the printing device 20 in the post-stream downstream device.
  • the peripheral interface can be removed, which is suitable for multiple peripheral devices (stations). It is entitled: Arrangement for communication between a base station and other stations of a mailing machine and their emergency shutdown.
  • the interface circuit 96 coupled to the machine interface in the interface circuit 14 provides at least one connection to the sensors 6, 7, 17 and to the actuators, for example to Drive motor 15 for the roller 11 and to a cleaning and sealing station RDS 40 for the inkjet printhead 4, as well as the label dispenser 50 in the machine base forth
  • the basic arrangement and the interaction between the inkjet printhead 4 and the RDS 40 are the DE 197 26 642 C2 removable, entitled: Arrangement for positioning an ink jet printhead and a cleaning and sealing device.
  • One of the arranged in the guide plate 20 sensors 7, 17 is the sensor 17 and is used to prepare the pressure release during letter transport.
  • the sensor 7 is used for initial letter recognition for the purpose of triggering the letter transport.
  • the transport device consists of a conveyor belt 10 and two rollers 11,11 '.
  • One of the rollers is equipped with a motor 15 drive roller 11, another is the follower tension roller 11 '.
  • the drive roller 11 is designed as a toothed roller, according to the conveyor belt 10 is designed as a toothed belt, which ensures the unambiguous power transmission.
  • An encoder 5, 6 is coupled to one of the rollers 11, 11 '.
  • the drive roller 11 is firmly seated with an incremental encoder 5 on an axis.
  • the incremental encoder 5 is designed for example as a slotted disk, which cooperates with a light barrier 6, and outputs via the line 19 an encoder signal to the motherboard 9 from.
  • the individual printing elements of the print head are connected within its housing with a print head electronics and that the print head for a purely electronic pressure can be controlled.
  • the pressure control is based on the path control, whereby the selected stamp offset is taken into account, which is entered by keyboard 88 or if necessary by chip card and stored in memory NVM 94 non-volatile.
  • a planned imprint thus results from stamp offset (without printing), the franking print image and possibly further print images for advertising clichés, shipping information (optional prints) and additional editable messages.
  • the nonvolatile memory NVM 94 has a plurality of memory areas. These include those which save the loaded postage fee tables non-volatile.
  • the smart card write / read unit 70 consists of an associated mechanical support for the microprocessor card and contact unit 74. The latter allows a secure mechanical support of the smart card in the read position and clear signaling of reaching the reading position of the smart card in the contacting unit.
  • the microprocessor card with the microprocessor 75 has a programmed read capability for all types of memory cards or smart cards.
  • the interface to the franking machine is a serial interface in accordance with the RS232 standard.
  • the data transfer rate is min. 1.2 K baud.
  • the power supply is switched on by means of a switch 71 connected to the mainboard. After the power supply has been switched on, a self-test function with a ready message takes place.
  • FIG. 3 is a perspective view of the postage meter from behind.
  • the franking machine consists of a meter 1 and a base 2.
  • the latter is equipped with a smart card write / read unit 70, which is arranged behind the guide plate 20 and accessible from the housing upper edge 22.
  • a chip card 49 is inserted from top to bottom in the insertion slot 72.
  • a supplied standing on the edge letter 3, which rests with its surface to be printed on the guide plate is then printed according to the input data with a franking stamp 31.
  • the letter feeding opening is bounded laterally by a transparent plate 21 and the guide plate 20.
  • the status display of the security module 100 inserted on the motherboard 9 of the meter 1 is visible from the outside through an opening 109.
  • the FIG. 4 shows a block diagram of the postal security module PSM 100 in a preferred variant.
  • the negative pole of the battery 134 is connected to ground and a pin P23 of the contact group 102.
  • the positive pole of the battery 134 is connected to the one input of the voltage changeover switch 180 via the line 193, and the system voltage leading line 191 is connected to the other input of the voltage changeover switch 180.
  • the battery 134 is the SL389 / P for a life of up to 3.5 years or the SL-386 / P for a life of up to 6 years with a maximum power consumption by the PSM 100.
  • the voltage switch 180 is a commercially available circuit of type ADM 8693ARN.
  • the output of the voltage changeover switch 180 is connected via the line 136 to the battery monitoring unit 12 and the detection unit 13.
  • the battery monitoring unit 12 and the detection unit 13 communicate with the pins 1, 2, 4 and 5 of the processor 120 via the lines 135, 164 and 137, 139 in communication.
  • the output of the voltage switch 180 is also on the line 136 on Supply input of a first memory SRAM, which is the existing battery 134 to nonvolatile memory NVRAM a first technology.
  • the security module communicates with the postage meter via the system bus 115, 117, 118.
  • the processor 120 may communicate via the system bus and a modem 83 in communication with a remote data center.
  • the billing is performed by the ASIC 150 and checked by the processor 120.
  • the postal billing data is stored in non-volatile memory of different technology.
  • the system voltage is applied to the supply input of a second memory NV-RAM 114.
  • the latter is a nonvolatile NVRAM of a second technology, (SHADOWRAM).
  • This second technology preferably comprises a RAM and an EEPROM, the latter automatically assuming the data contents in the event of system voltage failure.
  • the NVRAM 114 of the second technology is connected to the corresponding address and data inputs of the ASIC 150 via an internal address and data bus 112, 113.
  • the ASIC 150 contains at least one hardware abort unit for the calculation of the postal data to be stored.
  • Programmable Array Logic (PAL) 160 accommodates access logic to ASIC 150.
  • the ASIC 150 is controlled by the PAL 160 logic.
  • An address and control bus 117, 115 from the motherboard 9 is connected to corresponding pins of the PAL 160 logic and the PAL 160 generates at least a control signal for the ASIC 150 and a control signal 119 for the program memory FLASH 128.
  • the processor 120 executes a program stored in the FLASH 128.
  • Processor 120, FLASH 28, ASIC 150, and PAL 160 are interconnected via a module-internal system bus that includes lines 110, 11, 12, 126, 119 for data, address, and control signals.
  • the processor 120 of the security module 100 is connected via a module-internal data bus 126 to a FLASH 128 and to the ASIC 150.
  • the FLASH 128 is supplied with system voltage Us +. For example, it is a 128 Kbyte FLASH memory type AM29F0I0-45EC.
  • the ASIC 150 of the postal security module 100 provides via a module-internal address bus 110, the addresses 0 to 7 to the corresponding address inputs of the FLASH 128.
  • the processor 120 of the security module 100 provides via an internal address bus 111 the Addresses 8 to 15 to the corresponding address inputs of the FLASH 128.
  • the ASIC 150 of the security module 100 is connected via the contact group 101 of the interface 8 with the data bus 118, with the address bus 117 and the control bus 115 of the motherboard 9 in communication.
  • the processor 120 has memory 122, 124 to which an operating voltage Ub + from a voltage monitoring unit 12 is supplied via the line 138.
  • a real-time clock RTC 122 and the memory RAM 124 are supplied by an operating voltage via the line 138.
  • the voltage monitor unit (Battery Observer) 12 also provides a status signal 164 and responds to a control signal 135.
  • the voltage selector 180 as output voltage on the line 136 for the battery observer 12 and memory 116, passes that of its input voltages as a supply voltage which is higher than the other one , Due to the possibility of automatically feeding the described circuit as a function of the magnitude of the voltages Us + and Ub + with the larger of the two, during normal operation the battery 134 can be exchanged without loss of data.
  • the battery 134 of the security module 100 feeds in the rest periods outside normal operation in the aforementioned manner the real-time clock (RTC) 122 with date and / or time registers and / or the static RAM (SRAM) 124, which holds security-relevant data. If the voltage of the battery drops below a certain limit during battery operation, the voltage monitoring unit 12 connects the feed point for the RTC and SRAM to ground until reset. The voltage at the RTC and SRAM is then at 0V. As a result, the SRAM 124, which contains eg important cryptographic keys, is deleted very quickly. At the same time, the registers of RTC 122 are cleared and the current time and date are lost.
  • RTC real-time clock
  • SRAM static RAM
  • This action prevents a potential attacker from stopping the postage meter internal clock 122 by manipulating the battery voltage without losing any security related data. This prevents the attacker from circumventing security measures such as long time timers or watchdogs.
  • security measures are based on the Figures 9 and 10 explained in detail.
  • the RESET unit 130 is connected via the line 131 to the pin 3 of the processor 120 and to a pin of the ASIC 150.
  • the processor 120 and the ASIC 150 are reset by a reset generation in the RESET unit 130 when the supply voltage drops.
  • the described circuit changes into a self-holding state in which it remains even when subsequently increasing the voltage.
  • the processor can query the state of the circuit (status signal) and thus and / or via the evaluation of the contents of the erased memory, conclude that the battery voltage has in the meantime fallen below a certain value.
  • the processor may reset the monitor circuit, i. make a fad.
  • the unplugged detection unit 13 has to measure the input voltage line 192, which is connected via the plug of the security module and interface 8, preferably via a socket on the motherboard 9 of the postage meter to ground. This measurement is used for static monitoring of the arrangement and forms the basis for monitoring at a first stage. It is contemplated that the unplugged detection unit 13 comprises resettable latching means, the latching being triggered when the voltage level on a sense voltage line 192 deviates from a predetermined potential.
  • the evaluation logic includes the processor 120 connected to the other functional units, which is programmed to detect and change the respective state of the security module 100. The state of latching can be queried via the line 139 from the processor 120 of the security module 100.
  • the measuring voltage potential on the line 192 corresponds to ground potential when the security module 100 is properly inserted.
  • On line 139 is operating voltage potential. Ground voltage potential is present on the line 139 when the security module 100 is unplugged.
  • the processor 120 has a fifth pin 5, to which the line 139 is connected in order to query the state of the unplugged detection unit 13, whether it is switched to ground potential with latching. To the state to reset the latching of the unplugged detection unit 13 via the line 137, the processor 120 has a fourth pin 4.
  • a current loop 18 is provided which also connects the pins 6 and 7 of the processor 120 via the plug of the security module and via the socket on the motherboard 9 of the postage meter machine.
  • the lines on the pins 6 and 7 of the processor 120 are closed only to a current loop 18 at a plugged into the motherboard 9 PSM 100. This loop forms the basis for a dynamic monitoring of the plugged-in safety module on a second level.
  • the processor 120 internally comprises a processing unit CPU 121, a real-time clock RTC 122, a RAM unit 124 and an input / output unit 125.
  • the processor 120 is equipped with pins 8, 9 for outputting at least one signal for signaling the status of the security module 100 .
  • I / O ports of the input / output unit 125 to which module-internal signaling means are connected, for example, colored light emitting diode LED's 107, 108, which signal the state of the security module 100.
  • the safety modules can assume different states in their life cycle. So, for example, to detect whether the module contains valid cryptographic keys. Furthermore, it is also important to distinguish whether the module is working or is defective. The exact type and number of module states depends on the implemented functions in the module and on the implementation.
  • the unplugged detection unit 13 has a voltage divider, which consists of a series circuit of resistors 1310, 1312, 1314 and between a tapped by a capacitor 1371 supply voltage potential and a Meßwoodspotential on the line 192 is placed.
  • the circuit is supplied via line 136 with the system or battery voltage.
  • the respective supply voltage from the line 136 passes through a diode 1369 to the capacitor 1371 of the circuit.
  • an inverter 1320, 1398 On the output side of the circuit.
  • the transistor 1320 of the inverter In the normal state, the transistor 1320 of the inverter is disabled and the supply voltage is via the resistor 1398 on the line 139, which therefore logically '1', ie H level in the normal state leads.
  • An L level on line 139 is advantageous as a status signal for unplug because then no current flows into pin 5 of processor 120, increasing battery life.
  • the diode 1369 preferably in conjunction with an electrolytic capacitor 1371, ensures that the circuit upstream of the inverter is supplied with a voltage over a relatively long period of time (> 2 sec), in which its function is ensured, even though the voltage on the line 136 is already high was turned off.
  • the voltage divider 1310, 1312, 1314 has a tap 1304 to which a capacitor 1306 and the noninverting input of a comparator 1300 are connected.
  • the inverting input of the comparator 1300 is connected to a reference voltage source 1302.
  • the output of the comparator 1300 is connected on the one hand via the negator 1324.1398 to the line 139 and on the other hand to the control input of a switching means 1322 for latching.
  • the switching means 1322 is connected in parallel with the resistor 1310 of the voltage divider, and the latching switching means 1316 is connected between the tap 1304 and ground.
  • the tap 1304 of the voltage divider is at the junction of the resistors 1312 and 1314.
  • the capacitor 1306 connected between the tap 1304 and ground prevents vibrations.
  • the voltage at tap 1304 of the voltage divider is compared in comparator 1300 with the reference voltage of source 1302. If the voltage to be compared at tap 1304 is less than the reference voltage of source 1302, 50, the comparator output remains switched low and transistor 1320 of the inverter is disabled. As a result, the line 139 now receives operating voltage potential and the status signal leads logically '1'.
  • the voltage divider is dimensioned so that at ground potential on the line 192, the tap 1304 performs a voltage which is safely below the switching threshold of the comparator 1300.
  • the connection is interrupted and the line 192 is no longer connected to ground, because the security module 100 has been detached from the socket on the motherboard 9 or interface unit 8 of the franking machine, the voltage at the tap 1304 is pulled over the voltage of the reference voltage source 1302 and the Comparator 1300 switches over.
  • the comparator output is switched to H level, and thus the transistor 1320 is turned on.
  • the line 139 is connected to ground potential and the status signal logic '0.
  • a transistor 1322 which is connected in parallel with the resistor 1310 of the voltage divider, a self-holding circuit of the unplugged detection unit 13 is realized.
  • the control input of transistor 1322 is switched to the H level by the comparator output.
  • the transistor 1322 turns on and bridges the resistor 1310.
  • the voltage divider is formed only by the resistors 1312 and 1314.
  • the switching threshold is increased so much that the comparator remains in the switched state when the line 192 again ground potential, because the security module was plugged again.
  • the state of the circuit can be queried via the signal on line 139 from the processor 120.
  • the unplugged detection unit 13 as circuit means comprises a line 137 and a latching resetting means 1316, the reset being triggerable by the processor 120 via a signal on the line 137.
  • the processor 120 can at any time via a user circuit ASIC 150, via a first contact group 101, via a system bus of the controller 1 and for example via the microprocessor 91 via modem 83 to contact a remote data center, which checks the billing data and optionally other data to the Processor 120 transmitted.
  • the user circuit ASIC 150 of the security module 100 is connected to the processor 120 via a module-internal data bus 126.
  • the processor 120 may reset the untagged detection unit if reinitialization could be successfully completed using the transmitted data.
  • transistor 1316 is turned on via the reset signal on line 137, thus pulling the voltage at tap 1304 below the reference voltage of source 1302 and blocking transistors 1320 and 1322. When transistor 1322 is normally off, resistors 1310 and 1312 in series form the upper part of the above voltage divider and the switching threshold is lowered back to the original state.
  • the FIG. 6 shows the mechanical structure of the safety module in side view.
  • the security module is designed as a multi-chip module, that is, a plurality of functional units are interconnected on a printed circuit board 106.
  • the security module 100 is with a hard potting compound 105 shed, wherein the battery 134 of the security module 100 is disposed outside of the potting compound 105 on a printed circuit board 106 interchangeable.
  • it is potted with a potting material 105 that signal means 107, 108 protrude from the potting material at a first location and that the circuit board 106 protrudes laterally with the inserted battery 134 a second location.
  • the printed circuit board 106 also has battery contact terminals 103 and 104 for connecting the poles of the battery 134, preferably on the component side above the printed circuit board 106. It is envisaged that for plugging the postal security module PSM 100 on the main board of the meter 1, the contact groups 101 and 102nd are arranged below the circuit board 106 (trace side) of the security module 100.
  • the user circuit ASIC 150 is via the first contact group 101 - in a manner not shown - in communication with the system bus of a control device 1 and the second contact group 102 serves to supply the security module 100 with the system voltage.
  • the security module is plugged onto the motherboard, then it is preferably arranged within the meter housing in such a way that the signal means 107, 108 near an opening 109 or projects into this.
  • the meter housing is thus advantageously designed so that the user can still see the status of the security module from the outside.
  • the two light emitting diodes 107 and 108 of the signal means are controlled via two output signals of the I / O ports to the pin 8, 9 of the processor 120. Both LEDs are housed in a common component housing (Bicolorleuchtdiode), which is why the dimensions or the diameter of the opening can remain relatively small and is of the order of the signal means. In principle, three different colors can be displayed (red, green, orange).
  • FIG. 7 is a plan view of the postal security module shown.
  • FIGS. 8a or 8b show a view of the security module respectively from the right and from the left.
  • the location of the contact groups 101 and 102 below the printed circuit board 106 is from the FIGS. 8a and 8b combined with FIG. 6 clear.
  • a green LED 107 signals an OK state 220, but a lit LED 108 signals an error state 230 as a result of an at least static self-test.
  • the result of such a known self-test can not be falsified because of the direct signaling via the LEDs 107,108.
  • the ongoing check in dynamic mode would detect the error and signal the status 240 with orange LED's lit. After switching off / on, booting is required, otherwise no other operation can be performed.
  • the case where the installation of a key has been forgotten during manufacture is signaled as state 260, for example with a green blinking LED 107.
  • the first functional unit is the processor 120. This constantly evaluates a second daily loan to see whether the latter is exhausted. That's the case where a long time timer has expired.
  • the long time timer has expired if the data center has not been contacted for too long, for example to recharge a credit.
  • 90 days can be specified by the data center as a time credit and loaded into a memory 124 of the security device during installation or during reloading. At the end of these 90 days, a "LOST" state 250 will be signaled by a flashing red LED.
  • the long time timer is preferably a down counter that is implemented in the processor 120.
  • state 250 also remains when the security module is disconnected from the meter after the "LOST" state has been reached.
  • the suspect state 270 is signaled, preferably a backward counter, also implemented in the processor 120, which constantly evaluates a first daily credit of, say, thirty days to determine whether the latter is exhausted ,
  • states 280 and 290 are optionally provided for various further tests.
  • further functional units in particular a temperature sensor, may be provided in the security module. If, for example, a temperature was exceeded which could lead to damage in the safety module, then this state 280 can be signaled with the LEDs 107, 108, which light up red and flash orange, and thus produce the overall effect of the alternating red / orange flashing.
  • the second functional unit may optionally monitor the battery voltage to see if its capacity has been exhausted.
  • a state 290 for a required battery change can be signaled with the LEDs 107, 108, which light up green and flash orange, thus causing the overall effect of the alternating green / orange flashing.
  • the FIG. 10 shows a representation of the tests in the system for statically and dynamically changeable states.
  • a deactivated system in state 200 after being switched on, transitions via transition Start 201 into state 210, in which a static self-test is performed by the safety module as soon as the operating voltage is present.
  • the state 220 with LED 107 is reached in green.
  • Transition 203 illustrating such tests returns to state 220 LED green at OK.
  • a transition 206 leads to state 240 and the LEDs light orange at an error detected during the dynamic self-test.
  • orange flashing LEDs 107, 108 indicate that the connection to the data center is to be included because the security device is already considered suspect.
  • the state 210 is reached again.
  • the state "LOST" is signaled with the red flashing LED 108.
  • state 260 is reached blinking green LED 107.
  • optional further transitions may lead either to the further state 280 with red flashing / orange flashing LEDs or state 290 to green flashing / orange flashing LEDs.
  • a temperature measurement will result in a need to swap the entire security module. In the latter transition, capacitance measurement of the battery results in a need for battery replacement.
  • FIG. 11 shows the mechanical structure of the security module according to a second variant in side view.
  • the security module is again designed as a multi-chip module and potted with a hard potting compound 105, wherein the battery 134 of the security module 100 is arranged outside of the potting compound 105 on a printed circuit board 106 interchangeable.
  • the potting is performed at a first location with a potting material 105 that the signal means 107, 108 and the inserted battery 134 are mounted externally from the potting material at a second location on the top of the circuit board 106.
  • the circuit board 106 has again battery contact terminals 103 and 104 for connecting the poles of the battery 134, preferably on the component side above the circuit board 106.
  • the two LEDs 107 and 108 of the signal means are separate components in this variant.
  • the two light emitting diodes 107 and 108 of the signal means are controlled via two output signals of the I / O ports to the pin 8, 9 of the processor 120.
  • the LEDs can in turn also be controlled in a flashing manner so that different status groups can be distinguished.
  • the meter housing is also designed again so that the user can see the status display of the security module from the outside, for example through a viewing window or opening 109. It is also envisaged that for plugging the postal security module PSM 100 on the motherboard of the meter 1 the Contact groups 101 and 102 are arranged below the circuit board 106 of the security module 100.
  • a connector 127 includes the contact groups 101 and 102, wherein a connector 127 is disposed on the wiring side of the circuit board 106.
  • FIG. 12 is a plan view of the postal security module of the second variant shown.
  • the potting compound 105 surrounds the first part of the circuit board 106 in a cuboid, while the second part of the circuit board 106 for the two light emitting diodes 107 and 108, the interchangeably arranged battery 134 and the connector 127 (not visible here) remains free of potting compound.
  • the battery contact terminals 103 and 104 are in the FIG. 12 covered by the battery, but as well as the connector 127 in the side view after 13a visible, noticeable.
  • the potting of the first part of the circuit board 106 shows neither openings nor elevations and thus offers fewer points of attack for manipulation in criminal intent.
  • the potting material 105 is preferably a two-component epoxy resin or polymer or plastic. Suitable is a potting compound from STYCAST®2651-40 FR from EMERSON & CUMING with preferably CATALYST 9 as the second component.
  • both components are mixed and applied to both sides of the circuit board 106 in the first part. The latter can be done for example by immersion in the fresh mixture.
  • a protective and / or sensor layer which is not visible from the outside after a final external encapsulation, can be attached, which forms a firm connection with the latter during hardening of the encapsulation material 105.
  • the potting compound hardens to the solid opaque potting material 105.
  • FIGS. 13a or 13b show a view of the security module of the second variant respectively from the right and from the left.
  • the position of the connector 127 with the contact groups 101 and 102 below the circuit board 106 is from the Figures 13a and 13b combined with FIG. 12 more visible.
  • a connector 127 may be mounted on top of the second part of the circuit board 106, not shown.
  • POSTAL SECURITY DEVICE POSTAL SECURITY DEVICE
  • the security module or PSD also have a different design, which makes it possible that it can be plugged, for example, on the motherboard of a personal computer that drives a commercial printer as a PC meter.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Claims (7)

  1. L'invention concerne un module de sécurité équipé d'une logique (120, 150, 160), de moyens d'alimentation du module de sécurité avec une tension de système ou avec une tension d'une batterie (134) et avec un nombre d'éléments de surveillance, comprenant : au moins une première (120) et une deuxième unité de fonction (12) ainsi qu'un élément de chargement d'au moins un crédit-temps prédéterminé par la centrale de données et un élément de signalement (107, 108), lequel est connecté à une première unité de fonction (120) en effectuant le chargement lors de l'installation et du rechargement dans une mémoire (124) de l'appareil de sécurité. Ladite première unité de fonction (120) exploite un crédit/jour sur la temporalisation en cours et commande l'élément de signalement (107, 108), afin de signaler au moins la temporalisation en cours. Comprenant plus précisément : une première conduite (136) pour l'alimentation en tension de la deuxième unité de fonction (12) avec une tension de système ou avec une tension de batterie. Ladite deuxième unité de fonction (12) dégage une tension de service par une deuxième conduite (138) à une mémoire (122, 124) et contribue à l'effacement de données sensibles dans la mémoire (124) en cas de tension de système trop faible, dû à une utilisation non-conforme ou à un changement du module de sécurité.
  2. Module de sécurité selon la revendication 1, caractérisé en ce que la première unité de fonction (120) est un processeur et la deuxième unité de fonction (12) une unité de contrôle de la tension (12).
  3. Module de sécurité selon la revendication 1, caractérisé en ce qu'une troisième unité de fonction (13) est présente sous la forme d'une unité de détection avec des moyens de câblage (1310, 1316, 1322, 1324) pour un verrouillage réinitialisable, lequel est déclenché lorsque le niveau de tension s'éloigne d'un potentiel prédéterminé sur une conduite de tension de mesure (192) et que le processeur (120), raccordé aux unités de fonction (12, 13), est programmé, afin d'établir et de signaler les états respectifs du module de sécurité (100).
  4. Module de sécurité selon l'une quelconque des revendications 2 à 3, caractérisé en ce que le processeur (120) comprend la mémoire (122, 124), à laquelle est amenée une tension de système Ub+ d'une unité de contrôle de la tension (12) via la deuxième conduite (138). Ledit processeur (120) est alimenté avec une tension de système Us+, présentant un quatrième raccord (Pin 4), afin de replacer l'état du verrouillage de l'unité de détection (13) par une troisième conduite (137), comprenant un cinquième raccord (Pin 5), auquel est raccordée une cinquième conduite (139), afin d'interroger l'état de l'unité de détection (13).
  5. Module de sécurité selon l'une quelconque des revendications 1 à 4, caractérisé en ce que le module de sécurité (100) est scellé avec une masse de scellement dure (105). La batterie (134) du module de sécurité (100) est disposée à l'extérieur de la masse de scellement (105) sur une plaquette (106) de manière à être changée. Ladite plaquette (106) présente des bornes de contact de batterie (103 et 104) pour le raccord de la borne de la batterie (134) et un deuxième groupe de contact (102) pour alimenter le module de sécurité (100) avec la tension de système. La masse de scellement est équipée d'éléments qui préviennent le module de sécurité (100) d'une attaque et, le cas échéant, le protègent. En outre, un des groupes de contact (101, 102) au moins est configuré de manière à contrôler statiquement et dynamiquement le branchement et l'attaque du module de sécurité (100)
  6. Module de sécurité selon l'une quelconque des revendications 2 à 5, caractérisé en ce que le processeur (120) du module de sécurité est équipé de raccords (Pins 8, 9) pour la sortie d'au moins un signal pour le signalement de l'état du module de sécurité (100).
  7. Module de sécurité selon la revendication 6, caractérisé en ce que des éléments de signalisation internes à module (107, 108) sont raccordés aux I/O ports d'une unité d'entrée/sortie (125) du processeur (120).
EP00250065A 1999-03-12 2000-02-25 Ensemble de protection d'un module de sécurité Expired - Lifetime EP1035518B1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE19912781 1999-03-12
DE19912781A DE19912781A1 (de) 1999-03-12 1999-03-12 Verfahren zum Schutz eines Sicherheitsmoduls und Anordnung zur Durchführung des Verfahrens
DE19928057A DE19928057B4 (de) 1999-06-15 1999-06-15 Sicherheitsmodul und Verfahren zur Sicherung der Postregister vor Manipulation
DE19928057 1999-06-15

Publications (3)

Publication Number Publication Date
EP1035518A2 EP1035518A2 (fr) 2000-09-13
EP1035518A3 EP1035518A3 (fr) 2000-12-20
EP1035518B1 true EP1035518B1 (fr) 2008-06-25

Family

ID=26052507

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00250065A Expired - Lifetime EP1035518B1 (fr) 1999-03-12 2000-02-25 Ensemble de protection d'un module de sécurité

Country Status (5)

Country Link
US (2) US7194443B1 (fr)
EP (1) EP1035518B1 (fr)
CN (1) CN1156800C (fr)
AU (1) AU2080500A (fr)
DE (1) DE50015220D1 (fr)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20020635U1 (de) * 2000-11-28 2001-03-15 Francotyp-Postalia AG & Co., 16547 Birkenwerder Anordnung zur Stromversorgung für einen Sicherheitsbereich eines Gerätes
DE10061665A1 (de) 2000-12-11 2002-06-20 Francotyp Postalia Gmbh Verfahren zur Ermittlung eines Erfordernis zum Austausch eines Bauteils und Anordnung zur Durchführung des Verfahrens
DE10116703A1 (de) * 2001-03-29 2002-10-10 Francotyp Postalia Ag Verfahren zur Aufzeichnung eines Verbrauchswertes und Verbrauchszähler mit einem Meßwertgeber
DE10136608B4 (de) * 2001-07-16 2005-12-08 Francotyp-Postalia Ag & Co. Kg Verfahren und System zur Echtzeitaufzeichnung mit Sicherheitsmodul
US7440914B2 (en) * 2001-07-27 2008-10-21 Promontory Interfinancial Networks, Llc Method and apparatus for fully insuring large bank deposits
US20040257102A1 (en) * 2003-06-20 2004-12-23 Wong Hong W. Secure content protection for board connections
DE202006008952U1 (de) * 2006-05-31 2006-08-03 Francotyp-Postalia Gmbh Anordnung zum Wechseln von Kundendaten einer Frankiermaschine
US8308819B2 (en) * 2006-12-19 2012-11-13 Pitney Bowes Inc. Method for detecting the removal of a processing unit from a printed circuit board
DE102007011309B4 (de) * 2007-03-06 2008-11-20 Francotyp-Postalia Gmbh Verfahren zur authentisierten Übermittlung eines personalisierten Datensatzes oder Programms an ein Hardware-Sicherheitsmodul, insbesondere einer Frankiermaschine
US8522043B2 (en) * 2007-06-21 2013-08-27 Microsoft Corporation Hardware-based computer theft deterrence
US8850232B2 (en) * 2008-03-19 2014-09-30 Freescale Semiconductor, Inc. Method for protecting a cryptographic module and a device having cryptographic module protection capabilities
US8060453B2 (en) 2008-12-31 2011-11-15 Pitney Bowes Inc. System and method for funds recovery from an integrated postal security device
US8055936B2 (en) * 2008-12-31 2011-11-08 Pitney Bowes Inc. System and method for data recovery in a disabled integrated circuit
US9046570B2 (en) 2012-08-03 2015-06-02 Freescale Semiconductor, Inc. Method and apparatus for limiting access to an integrated circuit (IC)
CN107533433A (zh) * 2015-04-16 2018-01-02 时间防御系统有限责任公司 用于后制作外部硬件附件的自检测的系统和方法

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4217484A (en) * 1977-02-07 1980-08-12 Gerst William J Taximeter
CA1160744A (fr) * 1979-05-09 1984-01-17 Jesse T. Quatse Machine electronique d'affranchissement postal a meilleures surete et tolerance aux erreurs
GB2144081B (en) 1983-07-23 1987-10-28 Pa Consulting Services Postal franking machines
US4575621A (en) * 1984-03-07 1986-03-11 Corpra Research, Inc. Portable electronic transaction device and system therefor
JPS6227843A (ja) 1985-07-29 1987-02-05 Sharp Corp 電子装置
US4804957A (en) 1985-11-27 1989-02-14 Triad Communications, Inc. Utility meter and submetering system
US5097253A (en) * 1989-01-06 1992-03-17 Battelle Memorial Institute Electronic security device
US5027397A (en) 1989-09-12 1991-06-25 International Business Machines Corporation Data protection by detection of intrusion into electronic assemblies
EP0494913A4 (en) * 1989-10-03 1993-01-20 University Of Technology, Sydney Electro-active cradle circuits for the detection of access or penetration
US5091938B1 (en) * 1990-08-06 1997-02-04 Nippon Denki Home Electronics Digital data cryptographic system
US5515540A (en) * 1990-08-27 1996-05-07 Dallas Semiconducter Corp. Microprocessor with single pin for memory wipe
DE4213278C2 (de) 1992-04-16 1998-02-19 Francotyp Postalia Gmbh Anordnung zum Frankieren von Postgut
DE4217830C2 (de) 1992-05-29 1996-01-18 Francotyp Postalia Gmbh Verfahren zum Betreiben einer Datenverarbeitungsanlage
US5490077A (en) 1993-01-20 1996-02-06 Francotyp-Postalia Gmbh Method for data input into a postage meter machine, arrangement for franking postal matter and for producing an advert mark respectively allocated to a cost allocation account
DE4333156C2 (de) 1993-09-29 1995-08-31 Siemens Ag Schaltungsanordnung zum Anschließen einer elektronischen Baugruppe an eine Betriebsspannung
US5548163A (en) * 1993-12-13 1996-08-20 Blade Technologies Inc. Device for securing car audio equipment
DE4344476A1 (de) 1993-12-21 1995-06-22 Francotyp Postalia Gmbh Verfahren zur Verbesserung der Sicherheit von Frankiermaschinen
DE4344471A1 (de) 1993-12-21 1995-08-17 Francotyp Postalia Gmbh Verfahren und Anordnung zur Erzeugung und Überprüfung eines Sicherheitsabdruckes
US5805711A (en) * 1993-12-21 1998-09-08 Francotyp-Postalia Ag & Co. Method of improving the security of postage meter machines
GB9514096D0 (en) * 1995-07-11 1995-09-13 Homewood Clive R Security device
DE19605015C1 (de) 1996-01-31 1997-03-06 Francotyp Postalia Gmbh Vorrichtung zum Bedrucken eines auf einer Kante stehenden Druckträgers
EP0789333B1 (fr) 1996-01-31 2003-08-13 Francotyp-Postalia AG & Co. KG Machine d'affranchissement
DE19610070A1 (de) 1996-03-14 1997-09-18 Siemens Ag Chipkarte
US6065679A (en) * 1996-09-06 2000-05-23 Ivi Checkmate Inc. Modular transaction terminal
CA2271097A1 (fr) * 1996-11-07 1998-05-14 Edward Naclerio Systeme de protection du traitement cryptographique et des ressources en memoire pour machines d'affranchissement postal
US5960084A (en) * 1996-12-13 1999-09-28 Compaq Computer Corporation Secure method for enabling/disabling power to a computer system following two-piece user verification
DE19711998A1 (de) * 1997-03-13 1998-09-17 Francotyp Postalia Gmbh Postverarbeitungssystem mit einer über Personalcomputer gesteuerten druckenden Maschinen-Basisstation
US6019281A (en) * 1997-12-22 2000-02-01 Micro General Corp. Postal security device with display
US6097606A (en) * 1998-05-28 2000-08-01 International Verifact Inc. Financial transaction terminal with limited access

Also Published As

Publication number Publication date
EP1035518A3 (fr) 2000-12-20
CN1156800C (zh) 2004-07-07
US20020194017A1 (en) 2002-12-19
DE50015220D1 (de) 2008-08-07
EP1035518A2 (fr) 2000-09-13
US6954149B2 (en) 2005-10-11
CN1271145A (zh) 2000-10-25
AU2080500A (en) 2000-09-14
US7194443B1 (en) 2007-03-20

Similar Documents

Publication Publication Date Title
EP1035517B1 (fr) Procédé de protection d'un module de sécurité et ensemble pour mettre en oeuvre ledit procédé
EP0969422B1 (fr) Procédé pour l'amélioration de la sécurité des machines à affranchir
EP1035518B1 (fr) Ensemble de protection d'un module de sécurité
EP1035516B1 (fr) Système pour un module de sécurité
EP0762337A2 (fr) Procédé et dispositif pour augmenter la protection contre la manipulation de données critiques
DE69729409T2 (de) Elektronisches Frankiermaschinensystem mit internem Abrechnungssystem und entfernbarem externem Abrechnungssystem
DE69828331T2 (de) Elektronische Frankiermaschine mit mehreren Taktsystemen zur verbesserten Sicherheit
DE3626580A1 (de) Fernfrankiermaschinen-inspektionssystem
EP1103924B1 (fr) Procédé de protection d'un dispositif contre son fonctionnement avec des articles de consommation non autorisés et dispositif pour la mise en oeuvre du procédé
DE69221538T2 (de) Ferndiagnoseverfahren für Frankiermaschine
EP1063619B1 (fr) Module de sécurité et procédé pour protection du registre postal contre la manipulation
EP1035513B1 (fr) Module de sécurité avec signalisation de l'état
EP1103923B1 (fr) Procédé pour commander automatiquement des articles de consommation et dispositif pour la mise en oeuvre du procédé
EP1061479A2 (fr) Dispositif et procédé pour générer un motif destiné à la sécurité
DE19928061C2 (de) Sicherheitsmodul zur Überwachung der Systemsicherheit und Verfahren
EP1213817B1 (fr) Procédé pour la détermination de la nécessité de changer un composant
EP0996097B1 (fr) Procédé pour améliorer la sécurité de machines à affranchir pendant le transfert du crédit
DE19534527C2 (de) Verfahren zur Erhöhung der Manipulationssicherheit von kritischen Daten
DE19534529C2 (de) Verfahren zur Erhöhung der Manipulationssicherheit von kritischen Daten
DE29522056U1 (de) Anordnung zur Erhöhung der Manipulationssicherheit von kritischen Daten

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): CH DE FR GB IT LI

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RIC1 Information provided on ipc code assigned before grant

Free format text: 7G 07B 17/00 A, 7G 07B 17/04 B

17P Request for examination filed

Effective date: 20010417

AKX Designation fees paid

Free format text: CH DE FR GB IT LI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: FRANCOTYP-POSTALIA AG & CO. KG

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: FRANCOTYP-POSTALIA GMBH

17Q First examination report despatched

Effective date: 20060926

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RTI1 Title (correction)

Free format text: ARRANGEMENT FOR THE PROTECTION OF A SECURITY MODULE

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): CH DE FR GB IT LI

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REF Corresponds to:

Ref document number: 50015220

Country of ref document: DE

Date of ref document: 20080807

Kind code of ref document: P

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20090326

REG Reference to a national code

Ref country code: DE

Ref legal event code: R081

Ref document number: 50015220

Country of ref document: DE

Owner name: FRANCOTYP-POSTALIA GMBH, DE

Free format text: FORMER OWNER: FRANCOTYP-POSTALIA GMBH, 16547 BIRKENWERDER, DE

Effective date: 20150330

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 18

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20190218

Year of fee payment: 20

Ref country code: GB

Payment date: 20190218

Year of fee payment: 20

Ref country code: IT

Payment date: 20190225

Year of fee payment: 20

Ref country code: DE

Payment date: 20190110

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20190219

Year of fee payment: 20

REG Reference to a national code

Ref country code: DE

Ref legal event code: R071

Ref document number: 50015220

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: GB

Ref legal event code: PE20

Expiry date: 20200224

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20200224