KR20080020621A - 무결성 보호된 보안 저장의 실행 - Google Patents
무결성 보호된 보안 저장의 실행 Download PDFInfo
- Publication number
- KR20080020621A KR20080020621A KR1020077029050A KR20077029050A KR20080020621A KR 20080020621 A KR20080020621 A KR 20080020621A KR 1020077029050 A KR1020077029050 A KR 1020077029050A KR 20077029050 A KR20077029050 A KR 20077029050A KR 20080020621 A KR20080020621 A KR 20080020621A
- Authority
- KR
- South Korea
- Prior art keywords
- integrated circuit
- key
- secure
- security
- shared
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Computing Systems (AREA)
Abstract
Description
Claims (27)
- 제1 트러스트 존을 형성하고, 보안 프로세서를 포함하는 제1 집적 회로; 및상기 제1 회로와 별개로, 제2 트러스트 존을 형성하고, 상기 제2 트러스트 존 내에 보안 비휘발성 저장장치를 포함하는 제2 집적 회로를 포함하며,상기 보안 프로세서는 상기 제1 트러스트 존으로부터 상기 제2 트러스트 존으로 정보를 보안 방식으로 통신하여, 보안 정보가 상기 보안 비휘발성 저장장치에 안전하게 저장되게 하고,상기 제2 집적 회로는 그 보안 비휘발성 저장장치에 저장된 정보를 상기 제2 트러스트 존으로부터 상기 제1 트러스트 존 내의 상기 보안 프로세서로 보안 방식으로 통신하며,상기 제1 집적 회로와 상기 제2 집적 회로는 장치의 내부의 부분인, 장치.
- 청구항 1에 있어서, 상기 제1 및 제2 집적 회로는 상기 제1 및 제2 트러스트 존 간에 공유되는 고유 보안 키를 안전하게 초기화하는, 장치.
- 청구항 2에 있어서, 보안 키 배포 서버로부터 상기 제1 및 제2 집적 회로에 상기 고유 보안 키의 보안 전달을 위해, 상기 제1 집적 회로는 상기 보안 키 배포 서버와 키를 공유하고, 상기 제2 집적 회로는 상기 보안 키 배포 서버와 다른 키를 공유하는, 장치.
- 청구항 1 내지 3 중 어느 한 항에 있어서, 상기 제1 및 제2 회로는 상기 제1 및 제2 트러스트 존 사이에 사용되는 보안 통신 프로토콜을 확립하는, 장치.
- 청구항 4에 있어서, 상기 보안 통신 프로토콜은 상기 제1 및 제2 트러스트 존 간의 보안 통신을 위해 상기 고유 보안 키를 사용하여 실행되는 암호화 알고리즘을 포함하는, 장치.
- 청구항 4 또는 5에 있어서, 상기 프로토콜은 적어도 판독 및 기입 명령과 키 변경 동작을 포함하는, 장치.
- 청구항 1 내지 6 중 어느 한 항에 있어서, 상기 장치에는 상기 제1 및 제2 트러스트 존 간에 공유되는 하나 이상의 키를 인에이블시키는 키 상태 관리가 제공되는, 장치.
- 청구항 7에 있어서, 상기 제2 트러스트 존의 상기 비휘발성 저장장치는 통신에 사용될 공유 키를 나타내는 적어도 하나의 유지된 키 상태 변수를 포함하는, 장치.
- 청구항 8에 있어서, 상기 제2 집적 회로는 파워 온 동작 시에 상기 키 상태 변수의 현재 값을 판독하여 정확한 키 상태를 선택하는, 장치.
- 청구항 1 내지 6 중 어느 한 항에 있어서, 상기 보안 프로세서는 판독 명령 내의 파라미터로서 난수 값을 포함하여, 상기 제2 집적 회로로부터 수신된 후속 결과가 새로운 것(리플레이되지 않은 것)임을 입증할 수 있도록 하는, 장치.
- 청구항 1 내지 6 또는 10 중 어느 한 항에 있어서, 상기 제2 집적 회로는 그 보안 비휘발성 저장장치의 타깃 메모리 셀의 이전 값이 수신된 기입 명령 내에 파라미터로서 포함되어 있는지의 여부를 체크하고, 이것이 사실인 경우에만 기입 동작을 허용하는, 장치.
- 청구항 1 내지 11 중 어느 한 항에 있어서, 상기 제2 집적 회로는 상기 고유 보안 키를 사용하여 수신된 명령에 대해 응답의 파라미터들을 암호화하고, 상기 파라미터들 내에 외부적으로 예측 불가능한 성분을 포함시켜 동일한 명령이더라도 상이한 응답을 초래하게 하는, 장치.
- 청구항 12에 있어서, 상기 예측 불가능한 성분은 클록에 의해 구동되는 선형 피드백 시프트 레지스터로부터 도출된 값인, 장치.
- 청구항 1 내지 13 중 어느 한 항에 있어서, 상기 제2 집적 회로는 모든 그 암호화 동작에 대해 하나의 암호화 프리미티브(primitive)만을 사용하는, 장치.
- 청구항 1 내지 14 중 어느 한 항에 있어서, 상기 제1 집적 회로는 디지털이고, 상기 제2 집적 회로는 아날로그인, 장치.
- 청구항 1 내지 15 중 어느 한 항에 있어서, 상기 제2 회로는 이동 전화의 에너지 관리 칩 상에 있는, 장치.
- 청구항 1 내지 16 중 어느 한 항에 있어서, 상기 제1 회로 및 상기 제2 회로는 어셈블리 모듈의 부분을 형성하는, 장치.
- 청구항 1 내지 17 중 어느 한 항에 있어서, 상기 보안 정보는 상기 장치의 상태를 나타내는 정보를 포함하는, 장치.
- 청구항 1 내지 18 중 어느 한 항에 있어서, 상기 장치는 상기 보안 정보를 저장하고 키를 사용하여 암호화하는 제2 비휘발성 메모리를 포함하는, 장치.
- 청구항 19에 있어서, 상기 장치는 상기 제2 비휘발성 메모리의 콘텐츠를 상기 제2 트러스트 존의 상기 보안 비휘발성 저장장치의 콘텐츠와 비교하는, 장치.
- 청구항 1 내지 20 중 어느 한 항에 있어서, 상기 장치는 이동 전화와 같은 휴대용 통신 장치인, 장치.
- 제1 집적 회로와 제2 집적 회로 간에 공유되는 보안 키를 초기화하는 방법으로서,상기 제1 집적 회로와 상기 제2 집적 회로 간에 공유되는 상기 보안 키를 보안 키 배포 서버로부터 상기 제1 및 제2 집적 회로에 배포하는 단계를 포함하고, 상기 방법은,상기 보안 키 배포 서버로부터 상기 제1 집적 회로로의 상기 보안 키의 배포를 제1 키를 사용하여 보호하는 단계로서, 상기 제1 키는 상기 제1 집적 회로와 상기 보안 키 배포 서버 간에 사전에 공유된 키인, 단계; 및상기 보안 키 배포 서버로부터 상기 제2 집적 회로로의 상기 보안 키의 배포를 제2 키를 사용하여 보호하는 단계로서, 상기 제2 키는 상기 제2 집적 회로와 상기 보안 키 배포 서버 간에 사전에 공유된 키인, 단계를 포함하는, 보안 키 초기화 방법.
- 집적 회로로서,보안 프로토콜에 따라 다른 집적 회로에 전송될 명령을 발행하여 암호화하는 보안 프로세서를 포함하며,상기 보안 프로토콜은 상기 집적 회로와 상기 다른 집적 회로 간에 공유되는 보안 키가 변경될 수 있게 하는 키 변경 동작을 포함하는, 집적 회로.
- 집적 회로의 보안 프로세서에 의해 실행 가능한 컴퓨터 프로그램으로서,보안 프로토콜에 따라 다른 집적 회로에 전송될 명령을 발행하는 프로그램 코드; 및상기 보안 프로세서가, 상기 집적 회로와 상기 다른 집적 회로 간에 공유되는 보안 키를 변경시키는 키 변경 동작을 개시하게 하는 프로그램 코드를 포함하는, 컴퓨터 프로그램.
- 집적 회로로서,다른 집적 회로로부터 수신된 보안 데이터를 저장하는 비휘발성 메모리; 및상기 비휘발성 메모리에 액세스하는 로직을 포함하며, 상기 집적 회로는 상기 비휘발성 메모리에 저장되고 암호화에 의해 안전하게 된 보안 데이터를 상기 다른 집적 회로에 통신하고,상기 집적 회로는 하나의 암호화 프리미티브를 사용하는, 집적 회로.
- 집적 회로에서 실행 가능한 컴퓨터 프로그램으로서,상기 집적 회로와 다른 집적 회로 간에 공유되는 키를 사용하여 상기 다른 집적 회로와 통신을 보안하는 프로그램 코드; 및다른 보안 레벨의 다른 키 상태들 간에 변경하는 프로그램 코드를 포함하는, 컴퓨터 프로그램.
- 장치의 에너지 관리를 실행하는 에너지 관리 칩으로서, 상기 에너지 관리 칩은 상기 에너지 관리 칩의 외부의 보안 프로세서용 보안 토큰을 제공하기 위해 보안 비휘발성 메모리 및 로직을 포함하는, 에너지 관리 칩.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/128,676 | 2005-05-13 | ||
US11/128,676 US9171187B2 (en) | 2005-05-13 | 2005-05-13 | Implementation of an integrity-protected secure storage |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20080020621A true KR20080020621A (ko) | 2008-03-05 |
Family
ID=37396218
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020077029050A Abandoned KR20080020621A (ko) | 2005-05-13 | 2006-05-11 | 무결성 보호된 보안 저장의 실행 |
Country Status (11)
Country | Link |
---|---|
US (2) | US9171187B2 (ko) |
EP (1) | EP1880368B1 (ko) |
JP (1) | JP2008541591A (ko) |
KR (1) | KR20080020621A (ko) |
CN (1) | CN101176125B (ko) |
BR (1) | BRPI0612024A2 (ko) |
ES (1) | ES2904501T3 (ko) |
MX (1) | MX2007014237A (ko) |
RU (1) | RU2399087C2 (ko) |
WO (1) | WO2006120302A1 (ko) |
ZA (1) | ZA200709711B (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190069763A (ko) * | 2017-12-12 | 2019-06-20 | 주식회사 무한비트 | 하드웨어 인증칩 기반의 경량 암호 알고리즘 보안 장치 |
Families Citing this family (89)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7487363B2 (en) | 2001-10-18 | 2009-02-03 | Nokia Corporation | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage |
WO2018045179A1 (en) * | 2016-09-02 | 2018-03-08 | Frederick Flitsch | Customized smart devices and touchscreen devices and cleanspace manufacturing methods to make them |
US20070230690A1 (en) * | 2006-04-03 | 2007-10-04 | Reuven Elhamias | System for write failure recovery |
US7835518B2 (en) * | 2006-04-03 | 2010-11-16 | Sandisk Corporation | System and method for write failure recovery |
US8826023B1 (en) * | 2006-06-30 | 2014-09-02 | Symantec Operating Corporation | System and method for securing access to hash-based storage systems |
US8607058B2 (en) * | 2006-09-29 | 2013-12-10 | Intel Corporation | Port access control in a shared link environment |
US8539238B2 (en) * | 2007-05-09 | 2013-09-17 | Intel Corporation | Authenticated nonvolatile memory signing operations |
US8661552B2 (en) | 2007-06-28 | 2014-02-25 | Microsoft Corporation | Provisioning a computing system for digital rights management |
US8689010B2 (en) * | 2007-06-28 | 2014-04-01 | Microsoft Corporation | Secure storage for digital rights management |
US8646096B2 (en) | 2007-06-28 | 2014-02-04 | Microsoft Corporation | Secure time source operations for digital rights management |
US8989705B1 (en) | 2009-06-18 | 2015-03-24 | Sprint Communications Company L.P. | Secure placement of centralized media controller application in mobile access terminal |
WO2011064883A1 (ja) | 2009-11-27 | 2011-06-03 | 株式会社東芝 | メモリチップ |
US8683204B2 (en) * | 2009-12-04 | 2014-03-25 | Alcatel Lucent | Efficient techniques for achieving secure transactions using tamper-resistant tokens |
US9098730B2 (en) * | 2010-01-28 | 2015-08-04 | Bdo Usa, Llp | System and method for preserving electronically stored information |
US20120303533A1 (en) * | 2011-05-26 | 2012-11-29 | Michael Collins Pinkus | System and method for securing, distributing and enforcing for-hire vehicle operating parameters |
JP5370424B2 (ja) | 2011-07-15 | 2013-12-18 | 横河電機株式会社 | 無線通信装置及び暗号鍵漏洩防止方法 |
US9037852B2 (en) | 2011-09-02 | 2015-05-19 | Ivsc Ip Llc | System and method for independent control of for-hire vehicles |
US20130060721A1 (en) | 2011-09-02 | 2013-03-07 | Frias Transportation Infrastructure, Llc | Systems and methods for pairing of for-hire vehicle meters and medallions |
EP2820851A1 (en) | 2012-03-01 | 2015-01-07 | Ologn Technologies AG | Systems, methods and apparatuses for the secure transmission and restricted use of media content |
US9559845B2 (en) | 2012-03-01 | 2017-01-31 | Ologn Technologies Ag | Systems, methods and apparatuses for the secure transmission of media content |
US20130253999A1 (en) | 2012-03-22 | 2013-09-26 | Frias Transportation Infrastructure Llc | Transaction and communication system and method for vendors and promoters |
CA2870283C (en) * | 2012-04-13 | 2021-07-06 | Ologn Technologies Ag | Apparatuses, methods and systems for computer-based secure transactions |
EP2836956B1 (en) | 2012-04-13 | 2019-06-26 | OLogN Technologies AG | Secure zone for digital communications |
TW201403375A (zh) | 2012-04-20 | 2014-01-16 | 歐樂岡科技公司 | 用於安全購買之安全區 |
US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US9066230B1 (en) | 2012-06-27 | 2015-06-23 | Sprint Communications Company L.P. | Trusted policy and charging enforcement function |
JP5911456B2 (ja) | 2012-06-27 | 2016-04-27 | 日本電波工業株式会社 | 電子機器 |
US8649770B1 (en) | 2012-07-02 | 2014-02-11 | Sprint Communications Company, L.P. | Extended trusted security zone radio modem |
US8667607B2 (en) | 2012-07-24 | 2014-03-04 | Sprint Communications Company L.P. | Trusted security zone access to peripheral devices |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US9215180B1 (en) | 2012-08-25 | 2015-12-15 | Sprint Communications Company L.P. | File retrieval in real-time brokering of digital content |
US9015068B1 (en) | 2012-08-25 | 2015-04-21 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
US8954588B1 (en) | 2012-08-25 | 2015-02-10 | Sprint Communications Company L.P. | Reservations in real-time brokering of digital content delivery |
US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
US9161227B1 (en) | 2013-02-07 | 2015-10-13 | Sprint Communications Company L.P. | Trusted signaling in long term evolution (LTE) 4G wireless communication |
US9104840B1 (en) | 2013-03-05 | 2015-08-11 | Sprint Communications Company L.P. | Trusted security zone watermark |
US9613208B1 (en) | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
US9049186B1 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone re-provisioning and re-use capability for refurbished mobile devices |
US9049013B2 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone containers for the protection and confidentiality of trusted service manager data |
US9021585B1 (en) | 2013-03-15 | 2015-04-28 | Sprint Communications Company L.P. | JTAG fuse vulnerability determination and protection using a trusted execution environment |
CA3234925A1 (en) | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Systems, methods and apparatuses for securely storing and providing payment information |
US9374363B1 (en) | 2013-03-15 | 2016-06-21 | Sprint Communications Company L.P. | Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device |
US8984592B1 (en) | 2013-03-15 | 2015-03-17 | Sprint Communications Company L.P. | Enablement of a trusted security zone authentication for remote mobile device management systems and methods |
US9191388B1 (en) * | 2013-03-15 | 2015-11-17 | Sprint Communications Company L.P. | Trusted security zone communication addressing on an electronic device |
US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
US9171243B1 (en) | 2013-04-04 | 2015-10-27 | Sprint Communications Company L.P. | System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device |
US9454723B1 (en) | 2013-04-04 | 2016-09-27 | Sprint Communications Company L.P. | Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device |
US9838869B1 (en) | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
US9443088B1 (en) | 2013-04-15 | 2016-09-13 | Sprint Communications Company L.P. | Protection for multimedia files pre-downloaded to a mobile device |
US9069952B1 (en) | 2013-05-20 | 2015-06-30 | Sprint Communications Company L.P. | Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory |
US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
US9183606B1 (en) | 2013-07-10 | 2015-11-10 | Sprint Communications Company L.P. | Trusted processing location within a graphics processing unit |
CA2918596C (en) | 2013-08-02 | 2023-03-07 | Ologn Technologies Ag | A secure server on a system with virtual machines |
US9208339B1 (en) | 2013-08-12 | 2015-12-08 | Sprint Communications Company L.P. | Verifying Applications in Virtual Environments Using a Trusted Security Zone |
US9185626B1 (en) | 2013-10-29 | 2015-11-10 | Sprint Communications Company L.P. | Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning |
US9191522B1 (en) | 2013-11-08 | 2015-11-17 | Sprint Communications Company L.P. | Billing varied service based on tier |
US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
US9118655B1 (en) | 2014-01-24 | 2015-08-25 | Sprint Communications Company L.P. | Trusted display and transmission of digital ticket documentation |
US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
US9621549B2 (en) * | 2014-07-25 | 2017-04-11 | Qualcomm Incorporated | Integrated circuit for determining whether data stored in external nonvolative memory is valid |
US9230085B1 (en) | 2014-07-29 | 2016-01-05 | Sprint Communications Company L.P. | Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services |
RU2584755C2 (ru) * | 2014-08-12 | 2016-05-20 | Юрий Владимирович Косолапов | Способ защиты доступности и конфиденциальности хранимых данных и система настраиваемой защиты хранимых данных |
US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
KR20160118794A (ko) | 2015-04-03 | 2016-10-12 | 삼성전자주식회사 | 시큐어 엘리먼트를 이용한 데이터 통신 방법 및 이를 적용한 전자 시스템 |
US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
JP6426060B2 (ja) * | 2015-06-30 | 2018-11-21 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
US10262164B2 (en) | 2016-01-15 | 2019-04-16 | Blockchain Asics Llc | Cryptographic ASIC including circuitry-encoded transformation function |
US20180012037A1 (en) * | 2016-07-05 | 2018-01-11 | Nxp B.V. | Secure operation apparatuses and methods therefor |
US10057255B2 (en) | 2016-07-20 | 2018-08-21 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using multi-device authentication techniques |
US10057249B2 (en) | 2016-07-20 | 2018-08-21 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using tokenized authentication techniques |
US10148646B2 (en) | 2016-07-20 | 2018-12-04 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using tokenized authentication techniques |
EP3364329B1 (en) * | 2017-02-21 | 2023-07-26 | Mastercard International Incorporated | Security architecture for device applications |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
US10372943B1 (en) | 2018-03-20 | 2019-08-06 | Blockchain Asics Llc | Cryptographic ASIC with combined transformation and one-way functions |
US10256974B1 (en) * | 2018-04-25 | 2019-04-09 | Blockchain Asics Llc | Cryptographic ASIC for key hierarchy enforcement |
US11210664B2 (en) | 2018-10-02 | 2021-12-28 | Capital One Services, Llc | Systems and methods for amplifying the strength of cryptographic algorithms |
US11494502B2 (en) * | 2018-10-25 | 2022-11-08 | Microsoft Technology Licensing, Llc | Privacy awareness for personal assistant communications |
EP3663957A1 (en) * | 2018-12-03 | 2020-06-10 | Nagravision S.A. | Remote enforcement of device memory |
US11018861B2 (en) * | 2019-04-17 | 2021-05-25 | Piston Vault Pte. Ltd. | System and method for storage and management of confidential information |
EP3877884A1 (en) * | 2019-08-29 | 2021-09-15 | Google LLC | Securing external data storage for a secure element integrated on a system-on-chip |
KR20210069473A (ko) | 2019-12-03 | 2021-06-11 | 삼성전자주식회사 | 사용자에 대한 인증을 통해 유저 데이터에 대한 권한을 부여하는 시큐리티 프로세서 및 이를 포함하는 컴퓨팅 시스템 |
CN112446058B (zh) * | 2020-12-16 | 2022-04-29 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | 一种数据安全防护装置 |
US11924354B2 (en) * | 2021-03-19 | 2024-03-05 | Jpmorgan Chase Bank, N.A. | Data center recovery pod systems and methods |
US11438555B1 (en) * | 2022-05-02 | 2022-09-06 | Vincent A Dobbins | Method for verifying tampering of an electronic device |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
JPH06243046A (ja) * | 1993-02-19 | 1994-09-02 | Sansei Denshi Japan Kk | 情報保護方法及び情報メディア |
WO1997005551A1 (en) * | 1995-07-31 | 1997-02-13 | Verifone, Inc. | Method and apparatus for operating resources under control of a security module or other secure processor |
DE19600081C2 (de) * | 1996-01-03 | 1999-11-18 | Ibm | Sicherung der Datenintegrität bei Datenträgerkarten |
GB2311880A (en) * | 1996-04-03 | 1997-10-08 | Advanced Risc Mach Ltd | Partitioned cache memory |
US5828753A (en) * | 1996-10-25 | 1998-10-27 | Intel Corporation | Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package |
DE69805155T2 (de) * | 1998-01-14 | 2002-09-05 | Irdeto Access B.V., Hoofddorp | Integrierte Schaltung und Chipkarte mit einer solchen Schaltung |
US6510515B1 (en) * | 1998-06-15 | 2003-01-21 | Telefonaktlebolaget Lm Ericsson | Broadcast service access control |
US6294936B1 (en) * | 1998-09-28 | 2001-09-25 | American Microsystems, Inc. | Spread-spectrum modulation methods and circuit for clock generator phase-locked loop |
CA2280571A1 (en) * | 1998-11-30 | 2000-05-30 | Daimlerchrysler Corporation | J1850 application specific integrated circuit (asic) and messaging technique |
US6594760B1 (en) * | 1998-12-21 | 2003-07-15 | Pitney Bowes Inc. | System and method for suppressing conducted emissions by a cryptographic device |
US6820203B1 (en) | 1999-04-07 | 2004-11-16 | Sony Corporation | Security unit for use in memory card |
US6516415B1 (en) * | 1999-04-23 | 2003-02-04 | Geneticware Co., Ltd | Device and method of maintaining a secret code within an integrated circuit package |
US6708272B1 (en) | 1999-05-20 | 2004-03-16 | Storage Technology Corporation | Information encryption system and method |
WO2001039140A1 (fr) * | 1999-11-25 | 2001-05-31 | Fujitsu Limited | Dispositif de securite et programme de securite de stockage sur support lisible par ordinateur |
US7062658B1 (en) * | 2001-07-26 | 2006-06-13 | Cisco Technology, Inc | Secure digital appliance and method for protecting digital content |
US7178041B2 (en) | 2001-10-18 | 2007-02-13 | Nokia Corporation | Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device |
US20030076957A1 (en) * | 2001-10-18 | 2003-04-24 | Nadarajah Asokan | Method, system and computer program product for integrity-protected storage in a personal communication device |
US20030145203A1 (en) * | 2002-01-30 | 2003-07-31 | Yves Audebert | System and method for performing mutual authentications between security tokens |
DE10247794B4 (de) | 2002-10-14 | 2008-05-08 | Giesecke & Devrient Gmbh | Verwalten eines Fehlversuchszählers in einem tragbaren Datenträger |
JP4668619B2 (ja) * | 2002-10-28 | 2011-04-13 | ノキア コーポレイション | 装置鍵 |
US20040255145A1 (en) * | 2003-05-06 | 2004-12-16 | Jerry Chow | Memory protection systems and methods for writable memory |
JP4307227B2 (ja) * | 2003-12-03 | 2009-08-05 | キヤノン株式会社 | 設定方法 |
US20060098900A1 (en) * | 2004-09-27 | 2006-05-11 | King Martin T | Secure data gathering from rendered documents |
US7940932B2 (en) * | 2004-04-08 | 2011-05-10 | Texas Instruments Incorporated | Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor |
US7111972B2 (en) * | 2004-06-23 | 2006-09-26 | Osram Sylvania Inc. | LED lamp with central optical light guide |
-
2005
- 2005-05-13 US US11/128,676 patent/US9171187B2/en active Active
-
2006
- 2006-05-11 JP JP2008510604A patent/JP2008541591A/ja not_active Withdrawn
- 2006-05-11 BR BRPI0612024-5A patent/BRPI0612024A2/pt not_active IP Right Cessation
- 2006-05-11 KR KR1020077029050A patent/KR20080020621A/ko not_active Abandoned
- 2006-05-11 RU RU2007141753/09A patent/RU2399087C2/ru not_active IP Right Cessation
- 2006-05-11 CN CN2006800162921A patent/CN101176125B/zh active Active
- 2006-05-11 ES ES06743545T patent/ES2904501T3/es active Active
- 2006-05-11 WO PCT/FI2006/050186 patent/WO2006120302A1/en active Application Filing
- 2006-05-11 MX MX2007014237A patent/MX2007014237A/es unknown
- 2006-05-11 EP EP06743545.3A patent/EP1880368B1/en active Active
-
2007
- 2007-11-12 ZA ZA200709711A patent/ZA200709711B/xx unknown
-
2015
- 2015-10-27 US US14/924,026 patent/US10565400B2/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190069763A (ko) * | 2017-12-12 | 2019-06-20 | 주식회사 무한비트 | 하드웨어 인증칩 기반의 경량 암호 알고리즘 보안 장치 |
Also Published As
Publication number | Publication date |
---|---|
CN101176125B (zh) | 2012-06-06 |
MX2007014237A (es) | 2008-02-05 |
ZA200709711B (en) | 2008-08-27 |
CN101176125A (zh) | 2008-05-07 |
WO2006120302A1 (en) | 2006-11-16 |
US10565400B2 (en) | 2020-02-18 |
BRPI0612024A2 (pt) | 2010-10-13 |
US20060259790A1 (en) | 2006-11-16 |
ES2904501T3 (es) | 2022-04-05 |
RU2399087C2 (ru) | 2010-09-10 |
US20160205075A1 (en) | 2016-07-14 |
US9171187B2 (en) | 2015-10-27 |
EP1880368B1 (en) | 2021-09-29 |
JP2008541591A (ja) | 2008-11-20 |
RU2007141753A (ru) | 2009-06-20 |
EP1880368A1 (en) | 2008-01-23 |
EP1880368A4 (en) | 2013-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10565400B2 (en) | Implementation of an integrity-protected secure storage | |
US10482291B2 (en) | Secure field-programmable gate array (FPGA) architecture | |
US7178041B2 (en) | Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device | |
US9609024B2 (en) | Method and system for policy based authentication | |
US7861097B2 (en) | Secure implementation and utilization of device-specific security data | |
JP3999655B2 (ja) | レベル化された機密保護があるアクセス制御のための方法及び装置 | |
EP1636664B1 (en) | Proof of execution using random function | |
CN103339958A (zh) | 密钥传输协议 | |
JP2007027896A (ja) | 通信カード、機密情報処理システム、機密情報転送方法およびプログラム | |
US20030076957A1 (en) | Method, system and computer program product for integrity-protected storage in a personal communication device | |
CN112787813A (zh) | 一种基于可信执行环境的身份认证方法 | |
JP2010231404A (ja) | 秘密情報管理システム、秘密情報管理方法、および秘密情報管理プログラム | |
Schleiffer et al. | Secure key management-a key feature for modern vehicle electronics | |
Maletsky | Designing in A Trusted Platform Module (TPM) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
PA0105 | International application |
Patent event date: 20071212 Patent event code: PA01051R01D Comment text: International Patent Application |
|
PA0201 | Request for examination | ||
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20090928 Patent event code: PE09021S01D |
|
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20100528 Patent event code: PE09021S01D |
|
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20101130 |
|
NORF | Unpaid initial registration fee | ||
PC1904 | Unpaid initial registration fee |