+

AU7940400A - Centralised cryptographic system and method with high cryptographic rate - Google Patents

Centralised cryptographic system and method with high cryptographic rate Download PDF

Info

Publication number
AU7940400A
AU7940400A AU79404/00A AU7940400A AU7940400A AU 7940400 A AU7940400 A AU 7940400A AU 79404/00 A AU79404/00 A AU 79404/00A AU 7940400 A AU7940400 A AU 7940400A AU 7940400 A AU7940400 A AU 7940400A
Authority
AU
Australia
Prior art keywords
cryptographic
units
security
module
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU79404/00A
Other versions
AU777158B2 (en
Inventor
Nicolas Grosclaude
David Guhl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nagravision SARL
Original Assignee
Nagravision SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagravision SA filed Critical Nagravision SA
Publication of AU7940400A publication Critical patent/AU7940400A/en
Application granted granted Critical
Publication of AU777158B2 publication Critical patent/AU777158B2/en
Anticipated expiration legal-status Critical
Expired legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/4424Monitoring of the internal components or processes of the client device, e.g. CPU or memory load, processing speed, timer, counter or percentage of the hard disk space used
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/127Shopping or accessing services according to a time-limitation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • G06Q20/145Payments according to the detected use or quantity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0014Coin-freed apparatus for hiring articles; Coin-freed facilities or services for vending, access and use of specific services not covered anywhere else in G07F17/00
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • H04N21/4181External card to be used in combination with the client device, e.g. for conditional access for conditional access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42607Internal components of the client ; Characteristics thereof for processing the incoming bitstream
    • H04N21/42623Internal components of the client ; Characteristics thereof for processing the incoming bitstream involving specific decryption arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/426Internal components of the client ; Characteristics thereof
    • H04N21/42684Client identification by a unique number or address, e.g. serial number, MAC address, socket ID
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/43607Interfacing a plurality of external cards, e.g. through a DVB Common Interface [DVB-CI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/162Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
    • H04N7/163Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Power Engineering (AREA)
  • Economics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Exchange Systems With Centralized Control (AREA)

Description

CENTRALISED CRYPTOGRAPHIC SYSTEM AND METHOD WITH HIGH CRYPTOGRAPHIC RATE This invention concerns a centralised cryptographic procedure and system, particularly intended for applications that need high flux cryptographic. 5 In a service system distributed as, for example, pay-television, payment by credit card or by means of Internet, the information exchanged between the operating centre and the user modules uses cryptographic means to guarantee the authenticity and confidentiality of the data. Depending on the type of application, the number of user modules can be high, and 10 each of these modules sends the information by means of a concentrator to one or several operating centres in charge of authentifying and carrying out the transactions. These operations are based on encrypted communications and need cryptographic means, on the one hand for the user modules and on the other hand for the operating centre. It can easily be imagined that if a great number of user modules 15 have to be processed, the cryptographic means of the operating centre will have to be very powerful, while those of the user modules, being particular of each user, do not have the same needs. For this reason, while a processor contained in a smart card is capable of processing these data at the user module level, powerful computers have to be installed at the 20 operating centre. A fundamental point concerns the cryptographic keys. At the operating centre the cryptographic operations take place in a specialised cryptographic module, where particular attention is paid to security. These modules consist of a high capacity processor, which carries out the cryptographic operations, and a memory that 25 contains the keys. For security reasons, these modules are either situated in a protected enclosure, such as a safe or a closed room, or they are encapsulated in a box, which, if opened by whatever means, will erase the sensitive data. Although these measures have undeniable qualities, these modules suffer weaknesses in their electronic structure, and can be vulnerable to an operator with 30 bad intentions. In fact, the employee who has the key to the door of the room where -2 the cryptographic modules are situated can easily gain access to the memory where the cryptographic keys are stored. Such a damage can be catastrophic for the system's security and for the credibility of the supplier of the service. Furthermore, although these cryptographic modules have a great processing 5 capacity, they are not flexible when higher capacities are needed. For example, a 10% power increase involves the doubling of the cryptographic module, which in fact means increasing the capacity by 100%. Another aspect concerns the updating of these modules, which is difficult for a card especially developed for this purpose. It is known to use more than one smart card for the decoding operations in the 10 subscriber module, and this configuration is described in WO 96/07267 and in EBU Review Technical N 266 "Functional Model of a Conditional Access System". However, the presence of these multiple cards on the receiver's side is due to the fact that it is necessary to decode several sources using different keys, even different cryptographic functions. The presence of these cards does not solve the problem of 15 processing an important flux of data, it only ensures the compatibility with various standards. This invention intends to solve the problem of finding a cryptographic module that offers high security against intrusion, both at the physical and logical level, a great flexibility depending on the cryptographic flux necessities, and that allows an easy 20 updating. This objective is totally achieved by a centralised cryptographic system, comprising a control module and at least one cryptographic module, characterised in that each cryptographic module comprises one or several interface modules on which are one or several monolithic security units. 25 A monolithic security unit is a unit that includes all the necessary elements for the cryptographic operations located on a single support in order to ensure security. They generally consist of a single electronic smart card that has a mechanical or electronic anti-intrusion protection. However, other structures consisting of, for example, two electronic chips are also included in the denomination "monolithic" as 30 long as they are intimately linked and supplied by the distributors as a single element.
-3 According to the invention, the cryptographic module comprises a first control module in charge of administrating the entry/exit of the data to be processed. It allows to determine the cryptographic flux that is desirable and knows the cryptographic capabilities that are available. This control module can be material or logical. It has 5 one or several interface modules on which are monolithic security units in order to process the data. Each of these units consist of a cryptographic calculating unit, a memory containing at least a part of the cryptographic keys and means to communicate with the interface module. The keys appear decoded only in the security units, which have, as indicated previously, a high level of security. This level 10 is achieved by the fact that they consist of a single standardised card designed for this purpose. Their structures do not allow them to achieve high processing capacities. For this reason the increase in cryptographic flux is ensured by using a great number of these units. The more the necessary flux of the cryptographic system increases, the more the number of these working units will increase. 15 This configuration allows to ensure a great flexibility as to the cryptographic flux of the system by adding security units depending on the needs. This configuration allows to attend the demand by adding the necessary security units. According to one embodiment, the monolithic security units are set on the interface modules in an removable way. This allows an easy updating of the latter, as 20 technology progresses rapidly. Another advantage of this solution is their cost, because these security units are manufactured in large quantities and thus have attractive prices. According to one embodiment, the security units are smart cards following the norms ISO 7816. 25 The present invention includes also a method of centralised cryptographic processing of data consisting in transmitting the data to be processed to a cryptographic module, said module comprising one or several interface modules and transmitting the data by means of said interface modules to one or several monolithic security modules in charge of the cryptographic operations according to the flux of the data. 30 According to this method, the number of security units in service depend on the flux of the data required to the cryptographic module. In fact, because each unit has not -4 enough power to process a great number of cryptographic operations in a short time it is necessary to use several security units. The control module and the interface module allow the parallel processing of the resources of the security units. One of the functions of the interface module is the administration of the resources 5 that are further available. The interface module carries out in an initialisation phase the inventory of the security units that are attached to it, as well as their characteristics. This resource file will be able to direct the requests according to the characteristics of these units. According to another embodiment of the invention, this method consists in executing 10 the same cryptographic operations by means of several security units and comparing the various results. If the results are different, the control module sends an error message to the console. This console can react in different ways, for example, establishing which of the security units is responsible of the error, by using either a reference security unit or several security units and detecting which unit sends a 15 different result. The result of this test will be notified to the resource list so that the defective unit or units are not used any more. In the hypothetical case that the error is not in one of the security units but concerns all the units of a same interface module, the parallel cryptographic operations are 20 executed by two security units situated in two different interface modules. In fact, some parameters are stored on the interface module, and their modification can produce a malfunction of all the security units. In order to ensure a good functioning of the various modules, it is possible to execute test operations on the security units that are not being used. These tests can be 25 carried out with reference data of which the result is known in advance, or they can be executed by testing in parallel several modules with randomly generated data and comparing the results. The invention will be better understood with the following detailed description that makes reference to the annexed figures, which are given as a non-limiting example, 30 in which: -5 - Figure 1 represents a centralised cryptographic system according to the state of the art; - Figure 2 represents a cryptographic system according to the invention; In Figure 1 are represented diagrammatically the various blocks of the system that is 5 responsible for the encryption in the operating centre. The data to be encrypted are on the bus, which communicates the various information that are necessary for the functioning of the operating centre. When such an operation is required by the operating centre, the specialised cryptographic system is used, which is represented here by the control module block CM and the cryptographic module block EM. The 10 mission of the control module CM is to filter the access to the cryptographic module EM, that is to say, it offers protection against attacks coming from the exterior by means of the communication bus. It is not conceived to resist a local attack, be it physical or "programming", for example, of the operator. This control module CM, after having filtered the data, sends them to the 15 cryptographic module EM to be processed. As mentioned above, it has powerful cryptographic means in order to satisfy the high flux of the central bus. To achieve this, it has clear readable keys in its memory. In this example, the module is situated in a physically protected enclosure in order to prevent any non-authorised person from taking out the keys or from modifying the software in his/her own benefit. 20 In Figure 2 the architecture of the system according to the invention is represented. We find again the control module CM that works as a software filter against external damage. As indicated in Figure 2, this module communicates with several interface modules IM. These modules have a software protection, that is to say, a certain number of operations (for example, the reading) are simply not possible. These 25 modules, on the other hand, are not physically protected. This function is left to the security units PIM. Each interface module IM has a certain number of these PIM units in order to increase the cryptographic flux. Another task of this CM module is to direct the requests coming from the central bus towards the security units. When the desired operation is finished (for example, the 30 coding) the result is transmitted to the CM module, which informs the entity that has required this operation. In order to ensure the distribution of the requests, the CM -6 module has a list of the available resources. When an error has been detected, the unit that is responsible for the error is disabled in the resource list. It is not necessary that all the security units be of the same type. Some may have a cryptographic calculation unit based on a different algorithm than the other units. In 5 this example, some units have, for example, a unit of the type RSA; others have a unit of the type DES or IDEA. These information are contained in the resource list stored in the CM module. This module directs the requests depending on the availability and the capability of the security units. 10 According to another embodiment, the interface modules are cards of the PCI type and the security units are smart cards of the ISO 7816 type. Although this invention concerns in the first place the coding of data, the architecture described above is equally applicable to the decoding of a flux of data. In fact, it is possible that during an emission purchase many users accede the operating centre, 15 generating in this way an important flux to be decoded. The security units are then used for data decoding operations.

Claims (13)

1. A centralised cryptographic system comprising a control module (CM) and at least one cryptographic module (EM), characterised in that each cryptographic module comprises one or several interface modules (IM) on which are connected one or several monolithic security units (PIM).
2. A system according to Claim 1 characterised in that the security unit comprises at least one calculation unit for the cryptographic functions, a memory containing the cryptographic keys, and communication means to the interface module.
3. A system according to Claims 1 or 2 characterised in that the security unit is set in an removable way on the interface module.
4. A system according to Claims 1 to 3 characterised in that the security unit is in the form of a smart card.
5. A system according to Claim 4 characterised in that said smart card follows the norms ISO 7816.
6. A system according to any of the preceding Claims characterised in that the monolithic security units (PIM) have cryptographic calculation units of a different type, such as RSA, DES, T-DES, or IDEA.
7. A system according to any of the preceding Claims characterised in that the control module (CM) has a resource list of the monolithic units comprising the available number, their state, their version, and their cryptographic capability.
8. A centralised data cryptographic method consisting in transmitting data to be coded or decoded to a control module (CM), said module comprising one or several interface modules and transmitting by means of said interface modules the data to be coded or decoded to one or several monolithic security units in charge of cryptographic operations depending on the flux of the data.
9. A cryptographic processing method according to Claim 8 characterised in that it consists in transmitting to several security units the same data to be processed, -8 comparing the data when returning from the security units, and informing an external entity if their values differ.
10. A cryptographic processing method according to Claim 9 characterised in that it consists in transmitting the data to be processed to security units situated on different interface modules.
11. A cryptographic processing method according to Claim 8 characterised in that it consists in carrying out test operations on one or several security units that are not currently in use and comparing the result with a reference result.
12. A cryptographic processing method according to Claim 8 characterised in that it consists in carrying out test operations on at least three security units that are not currently in use and comparing the results in order to determine if these units are operative.
13. A cryptographic processing method according to Claims 8 to 12 characterised in that it consists in administrating the security units by means of a resource list situated in the control module (CM), this list comprising the number of available units, their state, their version, and their cryptographic capacity.
AU79404/00A 1999-11-08 2000-11-02 Centralised cryptographic system and method with high cryptographic rate Expired AU777158B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CH204599 1999-11-08
CH2045/99 1999-11-08
PCT/IB2000/001589 WO2001035659A1 (en) 1999-11-08 2000-11-02 Centralised cryptographic system and method with high cryptographic rate

Publications (2)

Publication Number Publication Date
AU7940400A true AU7940400A (en) 2001-06-06
AU777158B2 AU777158B2 (en) 2004-10-07

Family

ID=4224654

Family Applications (1)

Application Number Title Priority Date Filing Date
AU79404/00A Expired AU777158B2 (en) 1999-11-08 2000-11-02 Centralised cryptographic system and method with high cryptographic rate

Country Status (27)

Country Link
EP (1) EP1228642B1 (en)
JP (1) JP2003514461A (en)
KR (1) KR100740737B1 (en)
CN (1) CN1214639C (en)
AP (1) AP2002002502A0 (en)
AR (1) AR026368A1 (en)
AT (1) ATE306788T1 (en)
AU (1) AU777158B2 (en)
BR (1) BR0015408B1 (en)
CA (1) CA2390239C (en)
CO (1) CO5300378A1 (en)
CZ (1) CZ20021513A3 (en)
DE (1) DE60023170T2 (en)
DZ (1) DZ3242A1 (en)
EA (1) EA004077B1 (en)
ES (1) ES2250199T3 (en)
IL (2) IL149303A0 (en)
MA (1) MA25503A1 (en)
MX (1) MXPA02004517A (en)
MY (1) MY128057A (en)
OA (1) OA12581A (en)
PL (1) PL199982B1 (en)
SI (1) SI1228642T1 (en)
TR (1) TR200201242T2 (en)
TW (1) TW480886B (en)
WO (1) WO2001035659A1 (en)
ZA (1) ZA200202938B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100525198C (en) * 2003-12-12 2009-08-05 宏碁股份有限公司 Portable storage device and method for logging in remote instant messaging server system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MY125706A (en) * 1994-08-19 2006-08-30 Thomson Consumer Electronics High speed signal processing smart card

Also Published As

Publication number Publication date
CA2390239A1 (en) 2001-05-17
DZ3242A1 (en) 2001-05-17
PL355575A1 (en) 2004-05-04
KR100740737B1 (en) 2007-07-19
TR200201242T2 (en) 2002-10-21
EA200200408A1 (en) 2002-10-31
DE60023170T2 (en) 2006-06-22
ES2250199T3 (en) 2006-04-16
EP1228642B1 (en) 2005-10-12
CN1387728A (en) 2002-12-25
MA25503A1 (en) 2002-07-01
CA2390239C (en) 2009-06-30
AU777158B2 (en) 2004-10-07
AP2002002502A0 (en) 2002-06-30
IL149303A0 (en) 2002-11-10
BR0015408A (en) 2002-07-02
WO2001035659A1 (en) 2001-05-17
OA12581A (en) 2006-06-07
AR026368A1 (en) 2003-02-05
KR20020049034A (en) 2002-06-24
CO5300378A1 (en) 2003-07-31
IL149303A (en) 2007-06-17
EA004077B1 (en) 2003-12-25
MXPA02004517A (en) 2004-09-10
DE60023170D1 (en) 2005-11-17
EP1228642A1 (en) 2002-08-07
PL199982B1 (en) 2008-11-28
ZA200202938B (en) 2003-06-25
MY128057A (en) 2007-01-31
SI1228642T1 (en) 2006-02-28
TW480886B (en) 2002-03-21
CN1214639C (en) 2005-08-10
ATE306788T1 (en) 2005-10-15
BR0015408B1 (en) 2014-08-19
HK1050447A1 (en) 2003-06-20
CZ20021513A3 (en) 2002-08-14
JP2003514461A (en) 2003-04-15

Similar Documents

Publication Publication Date Title
CA2026739C (en) Transaction system security method and apparatus
Jurgensen et al. Smart cards: the developer's toolkit
EP0981807B1 (en) Integrated circuit card with application history list
EP0743602B1 (en) Circuit device for function usage control in an integrated circuit
CN101506815A (en) Bi-processor architecture for secure systems
US20040123132A1 (en) Enhancing data integrity and security in a processor-based system
JP2005196411A (en) Data communication device and memory management method for data communication device
CA2330534A1 (en) Terminal and system for implementing secure electronic transactions
US7353403B2 (en) Computer systems such as smart cards having memory architectures that can protect security information, and methods of using same
US6163612A (en) Coding device, decoding device and IC circuit
US20100211488A1 (en) License enforcement
CA2390239C (en) Centralised cryptographic system and method with high cryptographic rate
Hassler Java Card for e-payment Applications
KR20040092669A (en) A rfid terminal and a tag with security function
CA2610049A1 (en) Mobile terminal for secure electronic transactions and secure electronic transaction system
JP2877316B2 (en) Transaction processing equipment
CN118153126B (en) RFID smart card information interaction method, device and system with privacy protection
KR20040092670A (en) A method for certifying a rfid tag with security function
HK1050447B (en) Centralised cryptographic system and method with high cryptographic rate
Fifield Smartcards outsmart computer crime
Chaumette et al. Extended secure memory for a java card in the context of the java card grid project
HK1026762B (en) Terminal and system for implementing secure electronic transactions
Fadiran Oladipo SMART CARDS: SMART SECURITY?
HK1024768B (en) Integrated circuit card with application history list

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase
TH Corrigenda

Free format text: IN VOL 15, NO 35, PAGE(S) 7527-7530 UNDER THE HEADING APPLICATIONS LAPSED, REFUSED OR WITHDRAWN PLEASE DELETE ALL REFERENCE TO APPLICATION NO. 17007/00, 64588/00, 79240/00, 79404/00, 79413/00, 10275/01, 10285/01, 10459/01, 10468/01, 11547/01, 11577/01, 11581/01, 11588/01, 11595/01, 11596/01, 11602/01, 11608/01, 11626/01, 11640/01, 11646/01, 11651/01, 11671/01, 11672/01, 11765/01, 12861/01, 12867/01, 12869/01, 12877/01, 12941/01, 13883/01, 13929/01, 14003/01, 14004/01, 14018/01, 14084/01, 14094/01, 15179/01, 15184/01, 15423/01, 15602/01, 16984/01, 17032/01, 17404/01, 17406/01, 17407/01, 17414/01, 18215/01, 18225/01, 19941/01, 19951/01, 19982/01, 21486/01, 21498/01, 21548/01, 21557/01, 2155

MK14 Patent ceased section 143(a) (annual fees not paid) or expired
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载