JP5107915B2 - 複数の電子デバイス及び1つの保全モジュールを備えるシステム - Google Patents
複数の電子デバイス及び1つの保全モジュールを備えるシステム Download PDFInfo
- Publication number
- JP5107915B2 JP5107915B2 JP2008519858A JP2008519858A JP5107915B2 JP 5107915 B2 JP5107915 B2 JP 5107915B2 JP 2008519858 A JP2008519858 A JP 2008519858A JP 2008519858 A JP2008519858 A JP 2008519858A JP 5107915 B2 JP5107915 B2 JP 5107915B2
- Authority
- JP
- Japan
- Prior art keywords
- electronic device
- interface
- maintenance module
- maintenance
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012423 maintenance Methods 0.000 title claims description 137
- 238000004891 communication Methods 0.000 claims description 64
- 230000003213 activating effect Effects 0.000 claims description 2
- 230000004913 activation Effects 0.000 claims description 2
- 238000013475 authorization Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 230000005672 electromagnetic field Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000013500 data storage Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000005259 measurement Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000002950 deficient Effects 0.000 description 3
- 238000000034 method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000003752 polymerase chain reaction Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Description
2,9,10,14,21 電子デバイス
3,22 保全ユニット
4,5,8,13,23 インターフェース
6,19,20,25,26 ソフトウエア
7 ネットワーク
8,11,12 アンテナコイル
14 ICカード
15,16 切換デバイス
17 電圧検出器
18,24 ソフトウエアスタック
27 キーボード
Claims (21)
- 第1の電子デバイスと、
データを安全に格納するため及び/または暗合法操作を実行するための保全ユニットと、前記第1の電子デバイスと通信するための第1のインターフェースと、第2の電子デバイスとの直接非接触通信を自律的に実行するための第2のインターフェースとを含み、前記第1の電子デバイスのコンポーネントとして提供された保全モジュールであって、前記第1の電子デバイスとは独立の処理を実行可能なように構成された保全モジュールと、
前記第2のインタフェースと通信可能に構成された第2の電子デバイスとを備えたことを特徴とするシステム。 - 前記第1のインターフェースが前記第1の電子デバイスと直流で接続されることを特徴とする請求項1に記載のシステム。
- 前記第2のインターフェースが前記保全ユニットの一体部分として構成されることを特徴とする請求項1または2に記載のシステム。
- 前記第2のインターフェースが受動非接触インターフェースとして構成されることを特徴とする請求項1から3のいずれか1項に記載のシステム。
- 動作に必要なエネルギーが前記受動非接触インターフェースを介して非接触で前記保全モジュールに供給され得ることを特徴とする請求項4に記載のシステム。
- 前記第2のインターフェースが能動非接触インターフェースとして構成されることを特徴とする請求項1から3のいずれか1項に記載のシステム。
- 前記能動非接触インターフェースが様々な通信モードで動作できることを特徴とする請求項6に記載のシステム。
- 前記保全モジュールが受動非接触インターフェース及び能動非接触インターフェースを有することを特徴とする請求項1から3のいずれか1項に記載のシステム。
- 前記保全モジュールが前記受動非接触インターフェースまたは前記能動非接触インターフェースを選択的に起動するための制御デバイスを有することを特徴とする請求項8に記載のシステム。
- 前記制御デバイスが前記保全モジュールに前記第1の電子デバイスから動作電圧が供給されているか否かに依存して前記起動を実施することを特徴とする請求項9に記載のシステム。
- 前記能動非接触インターフェースがNFC標準にしたがって構成されることを特徴とする請求項6から10のいずれか1項に記載のシステム。
- 前記保全ユニットに格納されたデータが前記第2のインターフェースを介して前記第2の電子デバイスに送信されることを特徴とする請求項1から11のいずれか1項に記載のシステム。
- 前記データが前記第1の電子デバイスの診断データまたは暗号法データであることを特徴とする請求項12に記載のシステム。
- 前記第1の電子デバイス及び前記第2の電子デバイスが、相互間のデータ通信がリリースされている、同じ電子デバイスグループのメンバーであるときに限り、前記データが送信されることを特徴とする請求項12または13に記載のシステム。
- 前記第2の電子デバイスが、前記第1の電子デバイスの前記保全モジュールと直接非接触通信を行う、保全モジュールを有することを特徴とする請求項1から14のいずれか1項に記載のシステム。
- 前記第2のインターフェースを介して現金不要支払取引が実施され、これによって前記保全ユニットに格納される認可が取得されることを特徴とする請求項1から15のいずれか1項に記載のシステム。
- 前記第2の電子デバイスに入力されたパスワードが前記第2のインターフェースを介して前記第1の電子デバイスの前記保全モジュールに送信されることを特徴とする請求項1から16のいずれか1項に記載のシステム。
- 前記第1の電子デバイスがコンピュータまたは携帯電話であることを特徴とする請求項1から17のいずれか1項に記載のシステム。
- 前記第2の電子デバイスが、RFID読取デバイス、NFCデバイス、非接触ICカード、コンピュータまたは携帯電話であることを特徴とする請求項1から18のいずれか1項に記載のシステム。
- 前記保全モジュールがTrusted Platform Module(信頼されるプラットフォームモジュール)として機能することを特徴とする請求項1から19のいずれか1項に記載のシステム。
- コンポーネントとして提供される保全モジュールを備えた電子デバイスであって、前記保全モジュールが、
データを安全に格納するため及び/または暗合法操作を実行するための保全ユニット、
前記電子デバイスと通信するための第1のインターフェース、及び、
前記電子デバイスとは独立に外部との非接触通信を自律的に実行するための第2のインターフェースを有することを特徴とする電子デバイス。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102005031629.8 | 2005-07-06 | ||
DE102005031629A DE102005031629A1 (de) | 2005-07-06 | 2005-07-06 | System mit mehreren elektronischen Geräten und einem Sicherheitsmodul |
PCT/EP2006/006565 WO2007003429A1 (de) | 2005-07-06 | 2006-07-05 | System mit mehreren elektronischen geräten und einem sicherheitsmodul |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2009500735A JP2009500735A (ja) | 2009-01-08 |
JP5107915B2 true JP5107915B2 (ja) | 2012-12-26 |
Family
ID=36968652
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2008519858A Expired - Fee Related JP5107915B2 (ja) | 2005-07-06 | 2006-07-05 | 複数の電子デバイス及び1つの保全モジュールを備えるシステム |
Country Status (6)
Country | Link |
---|---|
US (1) | US20080297313A1 (ja) |
EP (1) | EP1902404A1 (ja) |
JP (1) | JP5107915B2 (ja) |
CN (2) | CN101243452A (ja) |
DE (1) | DE102005031629A1 (ja) |
WO (1) | WO2007003429A1 (ja) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007044602A1 (de) * | 2007-09-19 | 2009-04-23 | Continental Automotive Gmbh | Multilayer-Leiterplatte und Verwendung einer Multilayer-Leiterplatte |
JP5289460B2 (ja) * | 2007-11-30 | 2013-09-11 | サムスン エレクトロニクス カンパニー リミテッド | 近距離通信ネットワークにおける安全な通信のためのシステム及び方法 |
KR20100098567A (ko) * | 2007-12-19 | 2010-09-07 | 파이제르트 아베 | 암호화된 데이터를 수신 및 전송하기 위한 시스템 |
DE102010013200A1 (de) * | 2010-03-29 | 2011-09-29 | Giesecke & Devrient Gmbh | System zum Eingeben eines Geheimnisses |
DE102010003581A1 (de) * | 2010-04-01 | 2011-10-06 | Bundesdruckerei Gmbh | Elektronisches Gerät, Datenverarbeitungssystem und Verfahren zum Lesen von Daten aus einem elektronischen Gerät |
US20120294445A1 (en) * | 2011-05-16 | 2012-11-22 | Microsoft Corporation | Credential storage structure with encrypted password |
EP4131113A1 (en) | 2012-02-29 | 2023-02-08 | Apple Inc. | Method, device and secure element for conducting a secured financial transaction on a device |
US9514138B1 (en) * | 2012-03-15 | 2016-12-06 | Emc Corporation | Using read signature command in file system to backup data |
CN103780387A (zh) * | 2012-10-25 | 2014-05-07 | 联芯科技有限公司 | 硬件保密模块与保密终端及其实现方法 |
US9398448B2 (en) * | 2012-12-14 | 2016-07-19 | Intel Corporation | Enhanced wireless communication security |
JP5590274B1 (ja) * | 2013-03-08 | 2014-09-17 | 株式会社村田製作所 | キー入力装置および電子機器 |
DE102013012791A1 (de) * | 2013-07-31 | 2015-02-05 | Giesecke & Devrient Gmbh | Übermittlung einer Zugangskennung |
CN103530161B (zh) * | 2013-10-22 | 2018-03-27 | 北京深思数盾科技股份有限公司 | 一种无线信息安全设备***及安全保护方法 |
CN103532697B (zh) * | 2013-10-22 | 2017-08-25 | 北京深思数盾科技股份有限公司 | 一种无线信息安全设备的实现方法及*** |
DE102014208853A1 (de) * | 2014-05-12 | 2015-11-12 | Robert Bosch Gmbh | Verfahren zum Betreiben eines Steuergeräts |
CN105404820A (zh) * | 2014-09-15 | 2016-03-16 | 深圳富泰宏精密工业有限公司 | 文件安全存取***与方法 |
KR20160035427A (ko) * | 2014-09-23 | 2016-03-31 | 삼성전자주식회사 | 전자 장치 및 액세서리 장치와 액세서리 장치 인증 방법 |
CN105763593B (zh) * | 2014-12-19 | 2020-01-24 | 中兴通讯股份有限公司 | 多用户共享环境下的设备共享方法、装置、服务器及终端 |
CN108536427B (zh) * | 2017-03-06 | 2021-05-14 | 北京小米移动软件有限公司 | 应用程序的编译方法及装置 |
US10698752B2 (en) * | 2017-10-26 | 2020-06-30 | Bank Of America Corporation | Preventing unauthorized access to secure enterprise information systems using a multi-intercept system |
DE102018215361A1 (de) * | 2018-09-10 | 2020-03-12 | MTU Aero Engines AG | Schnittstellenanordnung für einen Triebwerksregler |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01205397A (ja) * | 1988-02-12 | 1989-08-17 | Asahi Chem Ind Co Ltd | Icカード |
US5237609A (en) * | 1989-03-31 | 1993-08-17 | Mitsubishi Denki Kabushiki Kaisha | Portable secure semiconductor memory device |
JPH08221531A (ja) * | 1995-02-16 | 1996-08-30 | Hitachi Ltd | 携帯可能電子装置のグルーピング方法 |
JP3764517B2 (ja) * | 1996-01-26 | 2006-04-12 | 株式会社ルネサステクノロジ | 通信装置 |
US6353406B1 (en) * | 1996-10-17 | 2002-03-05 | R.F. Technologies, Inc. | Dual mode tracking system |
FI981902A (fi) * | 1998-09-04 | 2000-03-05 | Sonera Oyj | Turvamoduuli, turvajärjestelmä ja matkaviestin |
WO2001008111A1 (en) * | 1999-07-22 | 2001-02-01 | Koninklijke Philips Electronics N.V. | Data carrier for the storage of data and circuit arrangement for such a data carrier |
JP3800010B2 (ja) * | 2001-01-26 | 2006-07-19 | 株式会社デンソー | 携帯電話装置並びにicタグ |
JP2002245427A (ja) * | 2001-02-20 | 2002-08-30 | Toshiba Corp | Icカード、icカード端末装置およびicカード複製方法 |
JP2002351623A (ja) * | 2001-05-23 | 2002-12-06 | Fujitsu Ltd | 携帯電話機 |
JP2003067684A (ja) * | 2001-08-24 | 2003-03-07 | Taku Yamaguchi | Icカード、及びicカード機能を具備した通信端末 |
JP2003078516A (ja) * | 2001-08-30 | 2003-03-14 | Dainippon Printing Co Ltd | 電子鍵格納icカード発行管理システム、再発行icカード及び電子鍵格納icカード発行管理プログラム |
US7194762B2 (en) * | 2001-11-30 | 2007-03-20 | Lenovo (Singapore) Pte. Ltd. | Method of creating password list for remote authentication to services |
US20030150915A1 (en) * | 2001-12-06 | 2003-08-14 | Kenneth Reece | IC card authorization system, method and device |
DE10224209B4 (de) * | 2002-05-31 | 2004-09-23 | Infineon Technologies Ag | Autorisierungseinrichtung-Sicherheitsmodul-Terminal-System |
JP2004215225A (ja) * | 2002-12-17 | 2004-07-29 | Sony Corp | 通信システムおよび通信方法、並びにデータ処理装置 |
JP4065525B2 (ja) * | 2003-02-25 | 2008-03-26 | キヤノン株式会社 | 物品管理装置 |
JP2004295710A (ja) * | 2003-03-28 | 2004-10-21 | Hitachi Ltd | 電子乗車券決済方法およびシステム |
JP2005011273A (ja) * | 2003-06-23 | 2005-01-13 | Dainippon Printing Co Ltd | Icカード |
US7472834B2 (en) * | 2003-07-09 | 2009-01-06 | Stmicroelectronics S.A. | Dual-mode smart card |
US8384519B2 (en) * | 2003-07-22 | 2013-02-26 | Nokia Corporation | Reader device for radio frequency identification transponder with transponder functionality |
JP4878744B2 (ja) * | 2003-09-05 | 2012-02-15 | 三星電子株式会社 | 同時に接触方式及び非接触方式動作を有するチップカード |
ATE386972T1 (de) * | 2003-10-06 | 2008-03-15 | Nxp Bv | Verfahren und schaltung zum identifizieren und/oder verifizieren von hardware und/oder software eines geräts und eines mit dem gerät arbeitenden datenträgers |
JP4539071B2 (ja) * | 2003-10-23 | 2010-09-08 | ソニー株式会社 | 携帯無線通信装置。 |
US7298272B2 (en) * | 2005-04-29 | 2007-11-20 | Hewlett-Packard Development Company, L.P. | Remote detection employing RFID |
US8516264B2 (en) * | 2009-10-09 | 2013-08-20 | Lsi Corporation | Interlocking plain text passwords to data encryption keys |
-
2005
- 2005-07-06 DE DE102005031629A patent/DE102005031629A1/de not_active Withdrawn
-
2006
- 2006-07-05 EP EP06776134A patent/EP1902404A1/de not_active Ceased
- 2006-07-05 US US11/988,089 patent/US20080297313A1/en not_active Abandoned
- 2006-07-05 WO PCT/EP2006/006565 patent/WO2007003429A1/de active Application Filing
- 2006-07-05 CN CNA200680030191XA patent/CN101243452A/zh active Pending
- 2006-07-05 CN CN2012100759268A patent/CN102722676A/zh active Pending
- 2006-07-05 JP JP2008519858A patent/JP5107915B2/ja not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
DE102005031629A1 (de) | 2007-01-11 |
US20080297313A1 (en) | 2008-12-04 |
EP1902404A1 (de) | 2008-03-26 |
WO2007003429A1 (de) | 2007-01-11 |
CN101243452A (zh) | 2008-08-13 |
JP2009500735A (ja) | 2009-01-08 |
CN102722676A (zh) | 2012-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5107915B2 (ja) | 複数の電子デバイス及び1つの保全モジュールを備えるシステム | |
US7735132B2 (en) | System and method for encrypted smart card PIN entry | |
TWI391864B (zh) | 臨界保全參數之產生及用於智慧卡記憶體模組的交換系統與方法 | |
CN101351807B (zh) | 用于把嵌入式安全芯片与计算机相关联的方法和*** | |
US9529734B2 (en) | Smart storage device | |
US7861015B2 (en) | USB apparatus and control method therein | |
EP3198518B1 (en) | Prevention of cable-swap security attack on storage devices | |
US20190327093A1 (en) | Cloud-implemented physical token based security | |
US11481523B2 (en) | Secure element | |
JP5806187B2 (ja) | 秘密情報の交換方法およびコンピュータ | |
US20080120510A1 (en) | System and method for permitting end user to decide what algorithm should be used to archive secure applications | |
Morgner et al. | Mobile smart card reader using NFC-enabled smartphones | |
CN110581832A (zh) | 接口数据传输方法及其电子设备 | |
EP1933523A1 (en) | Delegated cryptographic processing | |
KR101410488B1 (ko) | 외장 메모리용 보안 젠더 및 이를 이용한 외장 메모리 관리 방법 | |
CN102402657A (zh) | 用于使能安全处理器上的应用的装置和方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20090702 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20111027 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20111108 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120208 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120222 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120308 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120315 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120409 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120911 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20121004 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5107915 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20151012 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |