DE60330976D1 - Verfahren und vorrichtung zur gewährleistung der softwareintegrität - Google Patents
Verfahren und vorrichtung zur gewährleistung der softwareintegritätInfo
- Publication number
- DE60330976D1 DE60330976D1 DE60330976T DE60330976T DE60330976D1 DE 60330976 D1 DE60330976 D1 DE 60330976D1 DE 60330976 T DE60330976 T DE 60330976T DE 60330976 T DE60330976 T DE 60330976T DE 60330976 D1 DE60330976 D1 DE 60330976D1
- Authority
- DE
- Germany
- Prior art keywords
- center
- new
- modulus
- message hash
- hash value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Operations Research (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Hardware Redundancy (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/259,542 US7240200B2 (en) | 2002-09-26 | 2002-09-26 | System and method for guaranteeing software integrity via combined hardware and software authentication |
PCT/GB2003/004064 WO2004030269A2 (en) | 2002-09-26 | 2003-09-22 | System and method for guaranteeing software integrity |
Publications (1)
Publication Number | Publication Date |
---|---|
DE60330976D1 true DE60330976D1 (de) | 2010-03-04 |
Family
ID=32029514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE60330976T Expired - Lifetime DE60330976D1 (de) | 2002-09-26 | 2003-09-22 | Verfahren und vorrichtung zur gewährleistung der softwareintegrität |
Country Status (10)
Country | Link |
---|---|
US (3) | US7240200B2 (de) |
EP (1) | EP1547305B1 (de) |
JP (1) | JP4793843B2 (de) |
KR (1) | KR100702499B1 (de) |
CN (1) | CN1689269B (de) |
AT (1) | ATE455409T1 (de) |
AU (1) | AU2003264906A1 (de) |
DE (1) | DE60330976D1 (de) |
TW (1) | TWI225195B (de) |
WO (1) | WO2004030269A2 (de) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005293109A (ja) * | 2004-03-31 | 2005-10-20 | Canon Inc | ソフトウェア実行管理装置、ソフトウェア実行管理方法、及び制御プログラム |
US8312431B1 (en) * | 2004-09-17 | 2012-11-13 | Oracle America, Inc. | System and computer readable medium for verifying access to signed ELF objects |
KR100711722B1 (ko) * | 2005-10-04 | 2007-04-25 | 엘지전자 주식회사 | 이동통신 단말기의 소프트웨어 인증 장치 및 그 방법 |
US7389426B2 (en) * | 2005-11-29 | 2008-06-17 | Research In Motion Limited | Mobile software terminal identifier |
US7571377B2 (en) * | 2005-12-22 | 2009-08-04 | International Business Machines Corporation | Method and apparatus for transmitting data in an integrated circuit |
EP2041656A2 (de) * | 2006-07-13 | 2009-04-01 | Nxp B.V. | Sichere aufrüstung eines mobilen geräts mit einer individuellen aufrüstungssoftware per funk |
DE102007056662A1 (de) * | 2007-11-24 | 2009-05-28 | Bayerische Motoren Werke Aktiengesellschaft | System zur Freischaltung der Funktionalität einer Ablaufsteuerung, die in einem Steuergerät eines Kraftfahrzeugs gespeichert ist |
JP4998314B2 (ja) * | 2008-02-19 | 2012-08-15 | コニカミノルタホールディングス株式会社 | 通信制御方法および通信制御プログラム |
US8600896B2 (en) * | 2008-03-28 | 2013-12-03 | Panasonic Corporation | Software updating apparatus, software updating system, invalidation method, and invalidation program |
US8464347B2 (en) * | 2008-03-28 | 2013-06-11 | Panasonic Corporation | Software updating apparatus, software updating system, alteration verification method and alteration verification program |
US8108928B2 (en) | 2008-06-20 | 2012-01-31 | International Business Machines Corporation | Adaptive traitor tracing |
US8949797B2 (en) | 2010-04-16 | 2015-02-03 | International Business Machines Corporation | Optimizing performance of integrity monitoring |
US8782434B1 (en) | 2010-07-15 | 2014-07-15 | The Research Foundation For The State University Of New York | System and method for validating program execution at run-time |
US8904189B1 (en) * | 2010-07-15 | 2014-12-02 | The Research Foundation For The State University Of New York | System and method for validating program execution at run-time using control flow signatures |
US8683579B2 (en) * | 2010-12-14 | 2014-03-25 | Microsoft Corporation | Software activation using digital licenses |
TWI480735B (zh) * | 2012-02-14 | 2015-04-11 | Nuvoton Technology Corp | 具有防複製功能的微處理器晶片及其晶片燒錄系統與電子裝置 |
US9063721B2 (en) | 2012-09-14 | 2015-06-23 | The Research Foundation For The State University Of New York | Continuous run-time validation of program execution: a practical approach |
CN104217141B (zh) * | 2014-09-04 | 2017-02-15 | 东莞理工学院 | 一种增强的虚拟仪器测量软件计量支持方法及装置 |
WO2016051591A1 (ja) * | 2014-10-03 | 2016-04-07 | 株式会社 東芝 | 再暗号化鍵生成装置、再暗号化装置、暗号化装置、復号装置及びプログラム |
CA2874277C (en) * | 2014-10-04 | 2015-08-18 | 2381371 Ontario Inc. | Tamper-evident network messaging method and system, and device configured therefor |
CN107249002B (zh) * | 2017-07-20 | 2021-02-23 | 云南电网有限责任公司电力科学研究院 | 一种提高智能电能表安全性的方法、***及装置 |
CN108173653A (zh) * | 2018-03-13 | 2018-06-15 | 江苏信源久安信息科技有限公司 | 通过标识密码算法生成具有生命周期密钥的方法 |
US11640475B1 (en) * | 2019-11-26 | 2023-05-02 | Gobeep, Inc. | Systems and processes for providing secure client controlled and managed exchange of data between parties |
CN111404952B (zh) * | 2020-03-24 | 2022-06-14 | 中国南方电网有限责任公司 | 变电站数据加密传输方法、装置、计算机设备和存储介质 |
CN116522300B (zh) * | 2023-07-04 | 2023-09-08 | 北京点聚信息技术有限公司 | 一种电子***智能管理*** |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US5266771A (en) * | 1991-12-05 | 1993-11-30 | Amf Irrevocable Trust | Ornament having patterned ornamental indicia thereon, and method and apparatus for fabricating same |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
JP2570136B2 (ja) * | 1993-10-28 | 1997-01-08 | 日本電気株式会社 | 鍵生成装置 |
US5978482A (en) * | 1995-08-21 | 1999-11-02 | International Business Machines Corporation | Method and system for protection of digital information |
JPH09233068A (ja) * | 1996-02-23 | 1997-09-05 | Digital Vision Lab:Kk | 電子認証システム |
US6049671A (en) | 1996-04-18 | 2000-04-11 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer |
US6138236A (en) * | 1996-07-01 | 2000-10-24 | Sun Microsystems, Inc. | Method and apparatus for firmware authentication |
US5919247A (en) * | 1996-07-24 | 1999-07-06 | Marimba, Inc. | Method for the distribution of code and data updates |
CN1197248A (zh) * | 1996-09-25 | 1998-10-28 | 中国工商银行福建省分行 | 一种数字签名方法 |
US6381741B1 (en) * | 1998-05-18 | 2002-04-30 | Liberate Technologies | Secure data downloading, recovery and upgrading |
US6266771B1 (en) | 1997-02-10 | 2001-07-24 | The Regents Of The University Of California | Probabilistic signature scheme |
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US6105137A (en) * | 1998-07-02 | 2000-08-15 | Intel Corporation | Method and apparatus for integrity verification, authentication, and secure linkage of software modules |
US6266429B1 (en) * | 1998-09-23 | 2001-07-24 | Philips Electronics North America Corporation | Method for confirming the integrity of an image transmitted with a loss |
US6389537B1 (en) | 1999-04-23 | 2002-05-14 | Intel Corporation | Platform and method for assuring integrity of trusted agent communications |
DE10008973B4 (de) | 2000-02-25 | 2004-10-07 | Bayerische Motoren Werke Ag | Autorisierungsverfahren mit Zertifikat |
KR100455566B1 (ko) | 2000-06-30 | 2004-11-09 | 인터내셔널 비지네스 머신즈 코포레이션 | 코드 갱신을 위한 장치 및 방법 |
JP3725020B2 (ja) * | 2000-11-22 | 2005-12-07 | 株式会社日立製作所 | 電子データの内容証明方法及びそのシステム |
US20020083318A1 (en) * | 2000-12-26 | 2002-06-27 | Larose Gordon Edward | Method and system for software integrity control using secure hardware assist |
-
2002
- 2002-09-26 US US10/259,542 patent/US7240200B2/en not_active Expired - Fee Related
-
2003
- 2003-07-31 TW TW092121018A patent/TWI225195B/zh not_active IP Right Cessation
- 2003-09-22 WO PCT/GB2003/004064 patent/WO2004030269A2/en active Application Filing
- 2003-09-22 JP JP2004539185A patent/JP4793843B2/ja not_active Expired - Fee Related
- 2003-09-22 KR KR1020057003128A patent/KR100702499B1/ko active IP Right Grant
- 2003-09-22 AT AT03798246T patent/ATE455409T1/de not_active IP Right Cessation
- 2003-09-22 EP EP03798246A patent/EP1547305B1/de not_active Expired - Lifetime
- 2003-09-22 CN CN038212730A patent/CN1689269B/zh not_active Expired - Lifetime
- 2003-09-22 DE DE60330976T patent/DE60330976D1/de not_active Expired - Lifetime
- 2003-09-22 AU AU2003264906A patent/AU2003264906A1/en not_active Abandoned
-
2007
- 2007-06-18 US US11/764,748 patent/US7734921B2/en not_active Expired - Lifetime
-
2008
- 2008-06-05 US US12/134,134 patent/US7721098B2/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
CN1689269A (zh) | 2005-10-26 |
ATE455409T1 (de) | 2010-01-15 |
US7734921B2 (en) | 2010-06-08 |
KR100702499B1 (ko) | 2007-04-02 |
JP4793843B2 (ja) | 2011-10-12 |
EP1547305A2 (de) | 2005-06-29 |
AU2003264906A1 (en) | 2004-04-19 |
US20080215885A1 (en) | 2008-09-04 |
US20080313460A1 (en) | 2008-12-18 |
TWI225195B (en) | 2004-12-11 |
WO2004030269A3 (en) | 2004-08-12 |
TW200406667A (en) | 2004-05-01 |
EP1547305B1 (de) | 2010-01-13 |
CN1689269B (zh) | 2010-04-28 |
AU2003264906A8 (en) | 2004-04-19 |
WO2004030269A2 (en) | 2004-04-08 |
JP2006500843A (ja) | 2006-01-05 |
US7240200B2 (en) | 2007-07-03 |
US20040064695A1 (en) | 2004-04-01 |
KR20050056204A (ko) | 2005-06-14 |
US7721098B2 (en) | 2010-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60330976D1 (de) | Verfahren und vorrichtung zur gewährleistung der softwareintegrität | |
CN108769023B (zh) | 一种应用于群智感知的隐私保护方法及*** | |
CN109743171B (zh) | 一种解决多方数字签名、时间戳及加密的密钥串联方法 | |
JP7147856B2 (ja) | 情報処理装置、情報処理システム、メンバ特定方法、及びプログラム | |
US8285996B2 (en) | Verification of identity based signatures | |
ATE374478T1 (de) | System und verfahren für das erneuern von schlüsseln, welche in public-key kryptographie genutzt werden | |
SE9901671D0 (sv) | Cryptographic method and system | |
WO2008127446A3 (en) | A method and apparatus for time-lapse cryptography | |
WO2019101240A3 (en) | Authentication based on a recoverd public key | |
HK1074125A1 (en) | System and method for indicating the signature andtrust status of a secure message | |
ATE485691T1 (de) | Verfahren zum authentifizieren und verifizieren von sms-übermittlungen | |
MXPA03010476A (es) | Sistema y metodo para transmitir informacion reducida de un certificado para realizar operaciones de encriptacion. | |
CN107094077A (zh) | 一种不限制签名算法的许可链账户*** | |
ATE382229T1 (de) | Verfahren und system zur authentifizierung in einem computernetzwerk | |
JP2018029268A (ja) | 暗号システム、暗号装置、暗号プログラム及び暗号方法 | |
CN110597836A (zh) | 基于区块链网络的信息查询请求响应方法及装置 | |
RU2760633C1 (ru) | Выборочное раскрытие атрибутов и информационных элементов записи | |
CN112162726A (zh) | 目标用户确定方法、装置、设备及存储介质 | |
ATE506797T1 (de) | Datenauthentifizierungsverfahren und agent basiertes system | |
CN100465979C (zh) | 一种基于cpk的数字版权认证保护***和方法 | |
ATE472769T1 (de) | Verbesserte natürliche montgomery- exponentenmaskierung | |
CN103248492A (zh) | 可验证的分布式隐私数据比较与排序方法 | |
GB2447594A (en) | Software product authentication | |
CA2441773A1 (en) | Method for the computer-assisted production of public keys for encoding information and device for carrying out said method | |
GB201222212D0 (en) | Malware detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8320 | Willingness to grant licences declared (paragraph 23) | ||
8364 | No opposition during term of opposition |