MX356293B - Sistemas y métodos con seguridad de programa de criptografía y resistencia a uso indebido. - Google Patents
Sistemas y métodos con seguridad de programa de criptografía y resistencia a uso indebido.Info
- Publication number
- MX356293B MX356293B MX2016009066A MX2016009066A MX356293B MX 356293 B MX356293 B MX 356293B MX 2016009066 A MX2016009066 A MX 2016009066A MX 2016009066 A MX2016009066 A MX 2016009066A MX 356293 B MX356293 B MX 356293B
- Authority
- MX
- Mexico
- Prior art keywords
- utility device
- access levels
- cryptography
- critical data
- key
- Prior art date
Links
- 230000000873 masking effect Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01D—MEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
- G01D4/00—Tariff metering apparatus
- G01D4/002—Remote reading of utility meters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/18—Network protocols supporting networked applications, e.g. including control of end-device applications over a network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Mathematical Physics (AREA)
Abstract
Se proporciona un sistema de automatización arbitrario para comunicaciones seguras; el sistema incluye un dispositivo de una compañía proveedora de servicios configurado para procesamiento datos críticos asociados con el sistema de automatización arbitrario, los datos críticos son estructurados de acuerdo con los niveles de acceso al dispositivo de la compañía proveedora de servicios; también se incluye un módulo de administración de claves para: (i) proporcionar una clave de protección de datos (DPK) para proteger los datos críticos de acuerdo con cada uno de los niveles de acceso al dispositivo de la compañía proveedora de servicios, y (ii) generar una clave de encriptado de clave de usuario (UKEK) para encriptado de la DPK en base en los niveles de acceso del dispositivo; el sistema adicionalmente incluye un módulo de software configurado para ocultar un estado de ejecución del software dentro del dispositivo de la compañía proveedora de servicios y el módulo de administración de claves por medio de principios de evasión y resistencia.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/152,167 US20150199530A1 (en) | 2014-01-10 | 2014-01-10 | Systems and Methods With Cryptography and Tamper Resistance Software Security |
PCT/US2015/010747 WO2015106057A1 (en) | 2014-01-10 | 2015-01-09 | Systems and methods with cryptography and tamper resistance software security |
Publications (2)
Publication Number | Publication Date |
---|---|
MX2016009066A MX2016009066A (es) | 2017-01-16 |
MX356293B true MX356293B (es) | 2018-05-21 |
Family
ID=52462409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2016009066A MX356293B (es) | 2014-01-10 | 2015-01-09 | Sistemas y métodos con seguridad de programa de criptografía y resistencia a uso indebido. |
Country Status (5)
Country | Link |
---|---|
US (2) | US20150199530A1 (es) |
EP (1) | EP3092592A1 (es) |
CA (1) | CA2935780C (es) |
MX (1) | MX356293B (es) |
WO (1) | WO2015106057A1 (es) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102012206272A1 (de) * | 2012-04-17 | 2013-10-17 | Beckhoff Automation Gmbh | Feldbus-Datenübertragung |
US10657262B1 (en) * | 2014-09-28 | 2020-05-19 | Red Balloon Security, Inc. | Method and apparatus for securing embedded device firmware |
SG10201507834SA (en) * | 2015-09-21 | 2017-04-27 | Yokogawa Electric Corp | Mobile based on collaborative and interactive operations with smart mobile devices |
US10313383B2 (en) * | 2016-06-01 | 2019-06-04 | Mastercard International Incorporated | Systems and methods for use in evaluating vulnerability risks associated with payment applications |
EP3364329B1 (en) * | 2017-02-21 | 2023-07-26 | Mastercard International Incorporated | Security architecture for device applications |
DE102017114874A1 (de) * | 2017-07-04 | 2019-01-10 | Qundis Gmbh | Verfahren zur Herstellung einer Verbrauchswerterfassungsvorrichtung |
US10476869B2 (en) * | 2017-07-17 | 2019-11-12 | General Electric Company | Apparatus and method for obtaining up-to-date security credentials |
EP3442124B1 (de) * | 2017-08-07 | 2020-02-05 | Siemens Aktiengesellschaft | Verfahren zum schützen der daten in einem datenspeicher vor einer unerkannten veränderung und datenverarbeitungsanlage |
WO2021021949A1 (en) | 2019-07-29 | 2021-02-04 | Intertrust Technologies Corporation | Systems and methods for managing state |
CN111526012B (zh) * | 2020-04-17 | 2023-07-21 | 云南电网有限责任公司电力科学研究院 | Ami***智能终端密钥管理方法及*** |
CN111953685B (zh) * | 2020-08-12 | 2022-12-13 | 珠海市鸿瑞信息技术股份有限公司 | 一种动态电力监控网络安全分析*** |
CN112134696B (zh) * | 2020-08-21 | 2024-07-16 | 杭州海兴电力科技股份有限公司 | 一种电能表动态密码生成、通讯方法及其通讯*** |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6292790B1 (en) * | 1997-10-20 | 2001-09-18 | James E. Krahn | Apparatus for importing and exporting partially encrypted configuration data |
US6684330B1 (en) * | 1998-10-16 | 2004-01-27 | Tecsec, Inc. | Cryptographic information and flow control |
US7380120B1 (en) * | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7584354B2 (en) * | 2003-01-31 | 2009-09-01 | Intel Corporation | Implementing portable content protection to secure secrets |
WO2005041475A1 (en) * | 2003-10-24 | 2005-05-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Arrangements and methods relating to security in networks supporting communication of packet data |
JP2008535109A (ja) * | 2005-04-07 | 2008-08-28 | ロバート レーン スーパーアニュエイション プロプライエタリー リミテッド | 真正性の判定 |
US20100095118A1 (en) * | 2006-10-12 | 2010-04-15 | Rsa Security Inc. | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users |
US8315394B2 (en) * | 2007-10-24 | 2012-11-20 | Hitachi Global Storage Technologies Netherlands, B.V. | Techniques for encrypting data on storage devices using an intermediate key |
KR100957779B1 (ko) * | 2007-12-18 | 2010-05-13 | 한국전자통신연구원 | 화상회의 시스템에서의 그룹 키 분배 방법 및 시스템 |
TW201105083A (en) * | 2009-03-25 | 2011-02-01 | Pacid Technologies Llc | Token for securing communication |
US9141787B2 (en) * | 2009-05-06 | 2015-09-22 | Irdeto B.V. | Interlocked binary protection using whitebox cryptography |
US20120089494A1 (en) * | 2010-10-08 | 2012-04-12 | Microsoft Corporation | Privacy-Preserving Metering |
US8984295B2 (en) * | 2011-03-31 | 2015-03-17 | Echostar Technologies L.L.C. | Secure access to electronic devices |
EP2523139A1 (en) * | 2011-05-10 | 2012-11-14 | Nagravision S.A. | Method for handling privacy data |
US10303860B2 (en) * | 2011-10-04 | 2019-05-28 | Electro Industries/Gauge Tech | Security through layers in an intelligent electronic device |
-
2014
- 2014-01-10 US US14/152,167 patent/US20150199530A1/en not_active Abandoned
-
2015
- 2015-01-09 WO PCT/US2015/010747 patent/WO2015106057A1/en active Application Filing
- 2015-01-09 CA CA2935780A patent/CA2935780C/en active Active
- 2015-01-09 EP EP15703140.2A patent/EP3092592A1/en active Pending
- 2015-01-09 MX MX2016009066A patent/MX356293B/es active IP Right Grant
-
2016
- 2016-03-22 US US15/076,818 patent/US9647834B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3092592A1 (en) | 2016-11-16 |
US9647834B2 (en) | 2017-05-09 |
CA2935780A1 (en) | 2015-07-16 |
MX2016009066A (es) | 2017-01-16 |
WO2015106057A1 (en) | 2015-07-16 |
US20150199530A1 (en) | 2015-07-16 |
US20160204935A1 (en) | 2016-07-14 |
CA2935780C (en) | 2020-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2016009066A (es) | Sistemas y metodos con seguridad de programa de criptografia y resistencia a uso indebido. | |
AU2018256568A1 (en) | Systems and methods for software based encryption | |
MX2016016008A (es) | Sistema de gestion de credenciales electronicas. | |
BR112017002747A2 (pt) | método implementado por computador, e, sistema de computador. | |
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
WO2013068843A8 (en) | Multi-key cryptography for encrypting file system acceleration | |
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
SG10201810140QA (en) | Remote server encrypted data provisioning system and methods | |
BR112017014632A2 (pt) | ?método implementado por computador, e, sistema de computador? | |
PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
MY190913A (en) | Device and method for secure connection | |
PH12018502160A1 (en) | Systems and methods for secure storage of user information in a user profile | |
EP3627843A3 (en) | Systems and methods for performing transport i/o | |
NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
WO2013022647A3 (en) | System and method for wireless data protection | |
WO2016126332A3 (en) | Data security operations with expectations | |
IN2014DN09465A (es) | ||
NZ720190A (en) | System and methods for encrypting data | |
WO2014116956A3 (en) | System and method for differential encryption | |
AU2011355202B2 (en) | Device and method for protecting a security module from manipulation attempts in a field device | |
WO2014113132A3 (en) | Method for secure symbol comparison | |
BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
PH12014502633A1 (en) | Network based management of protected data sets | |
TW201614541A (en) | Method of bus protection with improved key entropy and electronic device using the same | |
MX2021002904A (es) | Sistemas y metodos para autentificacion criptografica de tarjetas sin contacto. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Grant or registration |