CN1088872C - 认证可进行事务处理或存取的数据载体的方法和装置 - Google Patents

认证可进行事务处理或存取的数据载体的方法和装置 Download PDF

Info

Publication number
CN1088872C
CN1088872C CN95103259A CN95103259A CN1088872C CN 1088872 C CN1088872 C CN 1088872C CN 95103259 A CN95103259 A CN 95103259A CN 95103259 A CN95103259 A CN 95103259A CN 1088872 C CN1088872 C CN 1088872C
Authority
CN
China
Prior art keywords
carrier
information
data carrier
particular number
authentication value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN95103259A
Other languages
English (en)
Other versions
CN1121221A (zh
Inventor
雅克·帕特里安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CP & Technologies
Original Assignee
Bull CP8 SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull CP8 SA filed Critical Bull CP8 SA
Publication of CN1121221A publication Critical patent/CN1121221A/zh
Application granted granted Critical
Publication of CN1088872C publication Critical patent/CN1088872C/zh
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4093Monitoring of device authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0866Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor

Abstract

认证数据载体的方法及装置,该载体能在某一服务部门或某一地点进行事务处理或存取。有两种认证方法。其一是常用的与专门机构脱开的方法,其二是周期联机的方法。按脱开方式,将与非对称算法(F)相关的并使用公共关键词(Kp)的算法(G)用于载体上读出的认证值(VA),以便一方面检查认证值(VA)是否与固有序列号(Ns)和信息(I)相容,另一方面检查事务处理或所请求的服务是否与信息(I)相容。按联机方式,还可另外改变载体的认证值。

Description

认证数据载体的方法、数据载体及有关终端和中央装置
本发明涉及的是用于认证数据载体或装置是否出自专门(授权)机构的方法,该载体或装置用于在与所述机构相连(联网)的分配器附近的服务部门或场所进行事务处理或存取,该机构的一个文件中包括装在每个载体中的当前权利的内容,本方法在于将某一固有(特有)号码(Ns)分配给所述载体,该号码可以将此载体从所述机构生产的一批载体中区分开,本方法还在于把该号码装到所述载体上。
本发明的目的在于提供这样一种方法,即在载体本身中和在与载体相配合的销售商可选终端中采用一些尽可能简单的装置。例如当载体为电子载体时,希望除了所连接的计算电路外,它仅由一个存储器构成,而且希望该存储器的体积尽可能小。还希望载体和所连的终端都没有秘密密钥,因为这种密钥可能被作弊发现。
根据本发明,这些目的是用开头所述的方法完成的,此外,该方法还在于,在所述机构内启动所述载体或装置,与此同时将信息(I)分配给了载体,该信息根据所述文件的内容限定附到该载体上的权利,并根据固有号码(Ns)及信息(I)用非对称算法(F)和秘密关键词(Ks)计算认证值(VA),同时将此认证值加到载体上,在每次使用所述载体时,通过对与所述秘密密钥(Ks)关联的公共密钥(Kp)以及从载体读出的当前认证值(VA)应用与所述非对称算法(F)相关的算法(G),进行计算,由所述销售商在一种不连接于授权机构的方式下执行对载体的认证,以验证认证值(VA)是否与特定号码(Ns)和信息(I)相容,并且验证所请求的交易或服务是否与信息(I)相容;
周期性地或视事务处理或服务部门的类型而由分配器以与专门机构相连的方式对该载体进行认证,同时首先由分配器或专门机构认证该载体,所述专门机构检查该载体上读到的认证值(VA)是否与固有号码(Ns)和信息(I)相容,如果认证肯定,则由专门机构根据所述文件的当前状态证实该载体还具有权利,在证实过程中,如果有必要改变信息(I)来表示其当前的权利状态,则根据固有号码(Ns)和新的信息(I)用非对称算法(F)及保密关键词(Ks)计算新的认证值(VA′),并将该新的数值加到载体上。使用非对称算法可以在只有作认证值(VA)的记录时才要求用保密关键词,而该值的常规检查只需要公共关键词。
但通过采用与专门机构周期性相连的方法可以对装入各载体中的权利进行更完全的检查,如有必要可对载体进行当天处理。
本发明还涉及与上述方法相关的各种装置。
本发明的其它细节和优点将结合唯一的一幅附图在对非限定的较佳实施例的描述中显示出来,该图用图解的方法示出了与专门机构的终端相配合的便携式信息目标以及装在销售处的终端。
在图中,用1表示便携式的信息目标,该信息目标主要是指装有EEPROM存储器2的电子卡(插件),该存储器由接口3与外部连接。电子卡没有微处理器那种处理回路。存储器2中主要有两个信息,即一个电子卡的序列号(Ns),制造时该序列号就给了电子卡,还有一个就是用于证实电子卡是否来自专门机构的认证值(VA),下面将描述(VA)值的计算。
用4表示能传输或整理当天电子卡的专门机构的中心计算机。它主要包括处理回路5和连通各回路之间并与接口7进行连接的存储器6。存储器6中装有加密的非对称算法F的程序,这种算法为公知技术,它要求使用存储式的保密关键词(Ks)来对数据进行编码(译成密码)而译码只要求用对应的公共关键词(Kp)。在存储器6中还有一个包括被安装到每个来自专门机构的载体上的当前权利的文件。重要的是计算认证值(VA),并将该值送入电子卡中,需要使用两个数据,即该电子卡的序列号(Ns)以及确定装到该电子卡上的权利的信息I。信息I根据文件所含内容进行设计。例如它可以采用下面的任一种形式:
1.能够算出限定权利日期的参考日期:尤其在所涉及的日期中,电子卡持有人在限定的期限内确定所给出的服务项目,也可以直接确定在该服务部门进行存取的限定日期;
2.如下消息(启示):“不接受任何超过100法郎金额的事务处理”;
3.消息:“至今某先生的权利有效”;
4.  1至10之间的数据,它确定该机构在电子卡持有人中所具有的信任程度,信息I不保密,但最好用数字编码形式表示,以便保住某些秘密。
因此可以写成:
VA=F(Ns,I,Ks)
注意:VA可以认为是由序列号Ns和信息I构成的非对称消息标记。
此外,序列号Ns可以由其它能够单独认证电子卡1的号码构成。
用8表示销售处的终端,用以分配利益或服务项目或者付服务报酬。它包括处理回路9和在各回路之间与接口11通过合适的连接法进行配合的存储器10。该存储器包括与上述算法F相结合的算法G的程序以及与保密关键词Ks相结合的公共关键词Kp。
根据第一种实施形式,采用“具有消息补偿”式的程序(即能够补偿消息内容),在此情况下,算法F的基础在于因子分解问题。而终端所包括的算法G是由算法F的倒数的算法(F-1)构成的。为确保VA计算的保密性,电子卡1的存储器2中的VA的维数最好至少等于512比特。
因此,用下面的方法终端就能得到一对值Ns,1:
(Ns,I)=F-1(VA,Kp)
对于算法F,主要可以用RSA(Rivest,Shamir,Adleman)式算法,例如它为如下形式:
Figure C9510325900101
其中(Ns,I)表示Ns和I的级联(并置);
n表示公共关键词Kp;n=p×q,p和q是构成保密关键词Ks的前两个保密数值。在该情况中,F1表示为:
(Ns,I)=VA3模数n,
认证电子卡的方法首先包括在专门机构中的初始化阶段,在该阶段,专门机构的中心计算机4算出该电子卡的第一个值VA,并将该值返送到电子卡的存储器2中。
在使用时,并入专门机构的各个销售处的终端8以相对于该机构的中心计算机4脱开的方法对同一电子卡1连续进行一定次数的检查,这种检查次数对应于要求进行事务处理的次数。在每次检查过程中,由应用于电子卡存储器中读到的VA值的算法F-1来反复计算Ns和I这两个数。这样一方面可以检查电子卡存储器中读到的序列号Ns是否对应于计算的序列号,另一方面又可以检查计算的信息I是否完全为它本身的相关信息,也就是说该信息是否构成可以理解的信号,以及它是否与请求的事务处理相容。如果答案肯定,则销售处的终端可以允许进行事务处理。
通过参照上述给定的信息I实例的编号,相容性检查例如可以确保;
1.在事务处理的那一天,不超过限定的权利日期;
2.事务处理的金额不超100法郎;
3.考虑到原先的核准已经过时,某先生的权利不要求由专门机构重新核准;
4.根据所给出的数目,确定事务处理的性质。
反之,所读的Ns和计算的Ns之间的差或计算出的信息I的不相关性表示电子卡并不出自专门的机构,以便销售处的终端拒绝事务处理。
例如每月一次的总结算时,销售处的终端与专门机构的中心计算机“连接”进行检查。在第一阶段要保证电子卡受到很好的认证。这可以用两种方法进行。或由销售处的终端如上述那样以脱开方式对VA值进行检查,或由专门机构从事这一工作:具有所有单元的专门机构允许终端把认证值VA给予电子卡,通过与文件中的内容进行直接比较,它就很容易对电子卡上读到的数值VA进行检查,在所述文件中,它将记录认证值VA,序列号Ns和信息1。对前面所述情况,也可以通过与反复计算的值VA进行比较对电子卡上读到的数值进行检查。
在第二阶段,在任何情况的运行都是“连接”运行,在查阅文件时,机构的中心计算机检查带有经反复计算的序列号Ns的电子卡是否还有权利。例如它检查:
---没有异议提出后启用电子卡:
---电子卡显示出有权利的银行帐户并不透支;等等。
在第三阶段,根据需要,所述机构“修正”认证值VA,以便根据电子卡所具有的权利或根据最后接触所签署的新权利而延长有效限定期。为此,机构的中心计算机根据新的信息I计算新的VA值,该新信息考虑到了权利的这一变化:
VA′=F(Ns,I′,Ks)
再把该值VA′记录在电子卡存储器2的当前值VA的地方,这样就停止了程序。
根据本发明的第二种实施方式,采用“无消息补偿”(即不能补偿消息内容)式的程序。在此情况下,算法F例如是基于不连续对数的问题,而终端中所包括的算法G并不是由F的倒数F-1的算法构成,而仅仅是与F有关的算法,从而使它能够检查认证值VA是否根据序列号Ns和信息I进行过正确计算。例如G算法可以是公知的DSS(Digital Signature Standard)算法,该算法可以根据认证值VA,公共关键词Kp,也可以根据序列号Ns和信息I来检查VA与Ns及I是否相容。此外,不可能由终端再算出Ns和I。反之,电子卡1的存储器2中的VA值最好至少等于320比特,这样就足以保证VA的安全性能。
在该第二种实施方案中,终端进行的相容性计算要求该终端认出序列号Ns和信息I。至于序列号可由终端的电子卡1读出。而对于信息I,可有两种情况:
-该信息存在电子卡的存储器2中,而由终端读该信息;
-终端暗含地认出该信息,这是因为对于顾客给出的整个范畴来说此信息是唯一的;可以涉及如下形式的信息:“所从事的事务处理达1000法郎”。
在使用过程中,每个销售点的终端8可以以脱开的方式连续检查同一电子卡1。一旦用G算法检查了值VA与值Ns、I之间的相容性,这三个值就由电子卡读出,或对于信息I,则由终端隐含地认出。对于肯定的情况,就可以进行事务处理。正如第一个实施方式那样,终端可以检查信息I与所请求的事务处理的相容性。
以连接方式进行的运行类似于第一个实施方式所描述的运行,唯一的差别在于,如果对电子卡检查其可靠性的第一阶段是由销售点的终端完成,则所考虑的值NS和I就是电子卡上读到的值,而不再是重新计算的值。如果被装到电子卡中的权利应当进行改变。专门机构的中心计算机就记录新的认证值VA′,如有必要,还要在当前数据的位置记录新的信息I′。
本发明不仅实用于认证存储器卡,而且更普遍地适用于认证所有电子或非电子式的数据载体(上面登记了序列号Ns和认证值VA的身分证或资格证明)。
数据载体也可以由加有序列号Ns或认证值VA的便携计算机这样的装置构成

Claims (15)

1.一种对确实由授权机构发行的数据载体进行认证的方法,可以在所述机构的附属销售商处操作所述载体以便进行交易或者使得能够获得某种服务或进入某个场所,该机构具有一个限定赋予所述载体的当前权利的文件,该方法的特征在于包括以下步骤:
为所述载体分配一个特定号码(Ns),该号码使得所述载体区别于所述机构生产的一组载体;
将所述特定号码输入该载体;
通过向所述载体分配一种信息(I)、利用非对称算法(F)和秘密密钥(Ks)根据所述特定号码(Ns)和所述信息(I)计算一个当前认证值(VA)并将所述当前认证值输入所述载体,在该机构初始化所述载体,其中信息(I)是所述文件内容的函数并且限定了赋予所述载体的当前权利;
在每次使用所述载体时,通过对与所述秘密密钥(Ks)关联的公共密钥(Kp)以及从载体读出的当前认证值(VA)应用与所述非对称算法(F)相关的算法(G),进行计算,由所述附属销售商在一种不连接于授权机构的方式下执行对载体的认证,以验证认证值(VA)是否与特定号码(Ns)和信息(I)相容,并且验证所请求的交易或服务是否与信息(I)相容;
根据限定何时必须在将终端连接于授权机构的方式下对数据载体进行认证的预定条件,在所述连接于授权机构的方式下有选择地执行对数据载体的认证,首先由销售商或授权机构对载体进行认证,这验证了从载体读出的当前认证值(VA)与特定号码(Ns)和信息(I)相容,并且如果认证是确实的,则由授权机构确认载体仍然拥有作为所述文件当前状态的函数的权利,然后如果确认是肯定的并且为了变换当前权利状态需要改变信息(I)时,利用非对称算法(F)和秘密密钥(Ks)根据特定号码(Ns)和更新的信息(I’)计算更新的认证值(VA’),并且将这个更新的值输入载体。
2.根据权利要求1的方法,其特征在于与非对称算法(F)相关的算法(G)包括一个是非对称算法的逆算法的算法(F-1),每次使用载体时,这样来执行认证:使用从所述载体读出的当前认证值(VA)利用所述算法(F-1)计算与载体相关的特定号码(Ns)和信息(I)、并且然后验证所读的特定号码(Ns)与所计算的特定号码相同并且验证所计算的信息(I)构成可理解的消息并且与所请求的交易或服务相容。
3.根据权利要求1的方法,其特征在于与非对称算法(F)相关的算法(G)使得所述认证需要了解信息(I)和特定号码(Ns),信息(I)或者是输入在载体中的或者是销售商已知的,并且每次使用载体时,通过进一步向该相关的算法(G)施加信息(I)和从载体读出的特定号码(Ns)来进行所述计算。
4.根据权利要求1的方法,其特征在于所述信息(I)包括一个参考日期,使得能够计算赋予载体的权利的到期日期,并且在每次认证时,在所请求的交易或服务的日期,验证权利的到期日期是否已过。
5.根据权利要求1的方法,其特征在于所述预定条件限定必须在将终端连接于授权机构的方式下周期性地对数据载体进行认证。
6.根据权利要求1的方法,其特征在于所述预定条件限定作为某类交易或服务的功能必须在将终端连接于授权机构的方式下对数据载体进行认证。
7.一种数据载体,包括:
一个存储在其中的特定号码(Ns),使得所述数据载体区别于授权机构生产的一组载体;
一个存储在其中的当前认证值(VA),它是通过非对称算法(F)根据秘密密钥(Ks)、所述特定号码(Ns)和一种信息(I)计算得到的,信息(I)是所述授权机构拥有的一个文件的内容的函数,该文件限定赋予所述数据载体的当前权利,所述认证值(VA)在修改了赋予所述数据载体的所述当前权利后由所述授权机构更新。
8.根据权利要求7的载体,其特征在于非对称算法(F)使得认证载体需要了解信息(I)以及特定号码(Ns),该信息(I)对于每个载体是特定的并且输入于载体中。
9.根据权利要求8的载体,其特征在于所述载体是一个装备有电子EEPROM存储器的便携式物体,其中存储有所述当前认证值(VA)。
10.根据权利要求7的载体,其特征在于所述载体是一个装备有电子EEPROM存储器的便携式物体,其中存储有所述当前认证值(VA)。
11.一种用于与数据载体配合以便提供交易或服务的终端,所述数据载体存储有一个特定号码(Ns)和一个当前认证值(VA),该特定号码(Ns)使得所述数据载体区别于授权机构生产的一组载体,当前认证值(VA)是通过非对称算法(F)根据秘密密钥(Ks)、所述特定号码(Ns)和一种信息(I)计算得到的,信息(I)是所述授权机构拥有的一个文件的内容的函数,该文件限定赋予所述数据载体的当前权利,所述终端的特征在于包括:
用于存储一个与所述非对称算法(F)相关的算法(G)、与秘密密钥(Ks)相关联的公共密钥(Kp)以及一个预定条件的装置,该预定条件限定何时必须在将终端连接于授权机构的方式下对数据载体进行认证;
用于利用算法(G)、公共密钥(Kp)以及读自数据载体的当前认证值(VA)进行计算以便验证当前认证值(VA)与特定号码(Ns)和信息(I)相容并验证所请求的交易或服务与信息(I)相容的装置;
用于在考虑所述预定条件时判定是否必须在将终端连接于授权机构的方式下对数据载体进行认证的装置;以及
用于如果必须在所述方式下进行认证则请求授权机构检查当前认证值(VA)的装置。
12.根据权利要求11的终端,其特征在于所述预定条件限定必须在将终端连接于授权机构的方式下周期性地对数据载体进行认证。
13.根据权利要求11的终端,其特征在于所述预定条件限定作为某类交易或服务的功能必须在将终端连接于授权机构的方式下对数据载体进行认证。
14.授权机构中用于与数据载体进行配合的中央装置,数据载体具有用于存储有一个特定号码(Ns)和一个当前认证值(VA)的装置,该特定号码(Ns)使得所述数据载体区别于所述授权机构生产的一组载体,当前认证值(VA)是通过非对称算法(F)根据秘密密钥(Ks)、所述特定号码(Ns)和一种信息(I)计算得到的,信息(I)是所述授权机构拥有的一个文件的内容的函数,该文件限定赋予所述数据载体的当前权利,所述中央装置的特征在于包括:
用于存储所述文件、所述非对称算法(F)以及所述秘密密钥(Ks)的装置;
用于检查数据载体是否仍然具有权利以及作为所述文件当前状态的函数是否必须更新数据载体上的所述当前认证值(VA)的装置;
用于利用非对称算法(F)和秘密密钥(Ks)根据读自所述文件的更新的信息(I’)和特定号码(Ns)计算更新的认证值(VA’)的装置;以及
用于将所述更新的认证值(VA’)输入所述数据载体的装置。
15.根据权利要求14的中央装置,该中央装置通过一个终端与所述数据载体配合,所述终端与所述中央装置远程连接,所述数据载体与所述终端本地连接。
CN95103259A 1994-03-09 1995-03-08 认证可进行事务处理或存取的数据载体的方法和装置 Expired - Fee Related CN1088872C (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9402717 1994-03-09
FR9402717A FR2717286B1 (fr) 1994-03-09 1994-03-09 Procédé et dispositif pour authentifier un support de données destiné à permettre une transaction ou l'accès à un service ou à un lieu, et support correspondant.

Publications (2)

Publication Number Publication Date
CN1121221A CN1121221A (zh) 1996-04-24
CN1088872C true CN1088872C (zh) 2002-08-07

Family

ID=9460842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN95103259A Expired - Fee Related CN1088872C (zh) 1994-03-09 1995-03-08 认证可进行事务处理或存取的数据载体的方法和装置

Country Status (12)

Country Link
US (1) US5867577A (zh)
EP (1) EP0671712B1 (zh)
JP (1) JP3326040B2 (zh)
KR (1) KR0168481B1 (zh)
CN (1) CN1088872C (zh)
AT (1) ATE223094T1 (zh)
AU (1) AU1470795A (zh)
CA (1) CA2144124C (zh)
DE (1) DE69527867T2 (zh)
FR (1) FR2717286B1 (zh)
NO (1) NO309345B1 (zh)
TW (1) TW301095B (zh)

Families Citing this family (114)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7260834B1 (en) 1999-10-26 2007-08-21 Legal Igaming, Inc. Cryptography and certificate authorities in gaming machines
US6272223B1 (en) * 1997-10-28 2001-08-07 Rolf Carlson System for supplying screened random numbers for use in recreational gaming in a casino or over the internet
US7690043B2 (en) * 1994-12-19 2010-03-30 Legal Igaming, Inc. System and method for connecting gaming devices to a network for remote play
DE19514084C1 (de) * 1995-04-13 1996-07-11 Siemens Ag Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit U und einer Netzcomputereinheit N
US5832090A (en) * 1995-08-10 1998-11-03 Hid Corporation Radio frequency transponder stored value system employing a secure encryption protocol
FR2745406B1 (fr) * 1996-02-23 1998-06-26 Sligos Carte de gestion de comptes multiples et procede de mise en oeuvre
FR2750274B1 (fr) * 1996-06-21 1998-07-24 Arditti David Procede de prise en compte d'une demande d'utilisation d'une carte prepayee virtuelle permettant la reutilisation de son numero de serie
FR2751104B1 (fr) * 1996-07-11 1998-12-31 Stoffel Laurent Procede de controle de transactions securisees independantes utilisant un dispositif physique unique
JPH1063722A (ja) * 1996-08-14 1998-03-06 Toshiba Corp カード取引システム及びカード取引方法
EP0851396A1 (en) * 1996-12-23 1998-07-01 Koninklijke KPN N.V. System for increasing a value of an electronic payment card
HUP0001504A3 (en) * 1997-03-06 2001-01-29 Deutsche Telekom Ag Data carrier, especially a chip card
AUPO799197A0 (en) * 1997-07-15 1997-08-07 Silverbrook Research Pty Ltd Image processing method and apparatus (ART01)
FR2761840B1 (fr) * 1997-04-03 2000-04-07 Gemplus Card Int Procede de certification d'un cumul dans un lecteur
DE19716068A1 (de) * 1997-04-17 1998-10-22 Giesecke & Devrient Gmbh Verfahren zur Erzeugung eines Guthabens mittels eines vorausbezahlten Wertgutscheins
FR2771528B1 (fr) * 1997-11-25 2000-01-14 Gemplus Card Int Procede de gestion des donnees dans une carte a puce
US6185685B1 (en) * 1997-12-11 2001-02-06 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
DE19757501C1 (de) * 1997-12-23 1999-09-16 Ibm Verfahren zum Schutz von Transaktionsdaten
JP4176181B2 (ja) 1998-03-13 2008-11-05 富士通株式会社 電子財布管理システム、端末装置及び電子財布管理プログラムを記録したコンピュータ読み取り可能な記録媒体
DE19913931B4 (de) * 1999-03-26 2010-12-30 Scheuermann, Carl H. Überprüfungsverfahren und elektromechanisches Schließsystem
DE19920744A1 (de) * 1999-05-05 2000-11-16 Siemens Ag Verfahren zur Sicherung der Echtheit von Produkten
US8397058B1 (en) 1999-07-28 2013-03-12 Mondex International Limited System and method for communication between smart cards
US6708049B1 (en) * 1999-09-28 2004-03-16 Nellcor Puritan Bennett Incorporated Sensor with signature of data relating to sensor
FR2800220B1 (fr) 1999-10-26 2002-02-15 France Telecom Procede de transaction electronique securisee
FI107769B (fi) * 1999-12-23 2001-09-28 Setec Oy Salaisen avaimen käsittely
US6571276B1 (en) 2000-02-23 2003-05-27 International Business Machines Corporation System for managing asset access in a distributed storage system
US7013481B1 (en) 2000-03-31 2006-03-14 Intel Corporation Attestation key memory device and bus
US6760441B1 (en) 2000-03-31 2004-07-06 Intel Corporation Generating a key hieararchy for use in an isolated execution environment
US7089418B1 (en) 2000-03-31 2006-08-08 Intel Corporation Managing accesses in a processor for isolated execution
US6934817B2 (en) * 2000-03-31 2005-08-23 Intel Corporation Controlling access to multiple memory zones in an isolated execution environment
US6754815B1 (en) 2000-03-31 2004-06-22 Intel Corporation Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
US6769058B1 (en) 2000-03-31 2004-07-27 Intel Corporation Resetting a processor in an isolated execution environment
US7194634B2 (en) * 2000-03-31 2007-03-20 Intel Corporation Attestation key memory device and bus
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US7043642B1 (en) 2000-05-22 2006-05-09 Gemplus Process to manage data in a chip card
US6976162B1 (en) * 2000-06-28 2005-12-13 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
US7389427B1 (en) 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
FR2815747A1 (fr) * 2000-10-19 2002-04-26 Sequoias Procede pour garantir l'authenticite d'un article pourvu d'un element d'enregistrement et de stockage d'informations
US7215781B2 (en) 2000-12-22 2007-05-08 Intel Corporation Creation and distribution of a secret value between two devices
US7035963B2 (en) * 2000-12-27 2006-04-25 Intel Corporation Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7818808B1 (en) 2000-12-27 2010-10-19 Intel Corporation Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US6907600B2 (en) 2000-12-27 2005-06-14 Intel Corporation Virtual translation lookaside buffer
US7225441B2 (en) * 2000-12-27 2007-05-29 Intel Corporation Mechanism for providing power management through virtualization
US7272831B2 (en) 2001-03-30 2007-09-18 Intel Corporation Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US7191440B2 (en) 2001-08-15 2007-03-13 Intel Corporation Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US7024555B2 (en) 2001-11-01 2006-04-04 Intel Corporation Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7103771B2 (en) * 2001-12-17 2006-09-05 Intel Corporation Connecting a virtual token to a physical token
US7308576B2 (en) 2001-12-31 2007-12-11 Intel Corporation Authenticated code module
FR2835636A1 (fr) * 2002-02-07 2003-08-08 Carmel Giacopino Systeme permettant d'effectuer des echanges d'information et des transactions
US7480806B2 (en) 2002-02-22 2009-01-20 Intel Corporation Multi-token seal and unseal
US7124273B2 (en) * 2002-02-25 2006-10-17 Intel Corporation Method and apparatus for translating guest physical addresses in a virtual machine environment
US7631196B2 (en) * 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
US7069442B2 (en) * 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US7028149B2 (en) 2002-03-29 2006-04-11 Intel Corporation System and method for resetting a platform configuration register
US7127548B2 (en) 2002-04-16 2006-10-24 Intel Corporation Control register access virtualization performance improvement in the virtual-machine architecture
JP4326189B2 (ja) * 2002-06-10 2009-09-02 健 坂村 自律型icカード及び通信システム
US7142674B2 (en) * 2002-06-18 2006-11-28 Intel Corporation Method of confirming a secure key exchange
US7124327B2 (en) 2002-06-29 2006-10-17 Intel Corporation Control over faults occurring during the operation of guest software in the virtual-machine architecture
US6996748B2 (en) 2002-06-29 2006-02-07 Intel Corporation Handling faults associated with operation of guest software in the virtual-machine architecture
US7296267B2 (en) 2002-07-12 2007-11-13 Intel Corporation System and method for binding virtual machines to hardware contexts
US20130260879A1 (en) 2002-10-09 2013-10-03 Michael W. Saunders System and Method for Connecting Gaming Devices to a Network for Remote Play
US7165181B2 (en) 2002-11-27 2007-01-16 Intel Corporation System and method for establishing trust without revealing identity
US20040117532A1 (en) * 2002-12-11 2004-06-17 Bennett Steven M. Mechanism for controlling external interrupts in a virtual machine system
US7073042B2 (en) 2002-12-12 2006-07-04 Intel Corporation Reclaiming existing fields in address translation data structures to extend control over memory accesses
US20040128345A1 (en) * 2002-12-27 2004-07-01 Robinson Scott H. Dynamic service registry
US7900017B2 (en) 2002-12-27 2011-03-01 Intel Corporation Mechanism for remapping post virtual machine memory pages
US20040128465A1 (en) * 2002-12-30 2004-07-01 Lee Micheil J. Configurable memory bus width
JP2004234641A (ja) * 2003-01-08 2004-08-19 Kddi Corp コンテンツファイル制作者の認証方式およびそのプログラム
FR2850479B1 (fr) * 2003-01-24 2005-04-29 France Telecom Procede cryptographique a cle publique pour la protection d'une puce contre la fraude
US7415708B2 (en) * 2003-06-26 2008-08-19 Intel Corporation Virtual machine management using processor state information
US20050044292A1 (en) * 2003-08-19 2005-02-24 Mckeen Francis X. Method and apparatus to retain system control when a buffer overflow attack occurs
US7287197B2 (en) * 2003-09-15 2007-10-23 Intel Corporation Vectoring an interrupt or exception upon resuming operation of a virtual machine
US7424709B2 (en) 2003-09-15 2008-09-09 Intel Corporation Use of multiple virtual machine monitors to handle privileged events
US7739521B2 (en) * 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US7610611B2 (en) * 2003-09-19 2009-10-27 Moran Douglas R Prioritized address decoder
US7237051B2 (en) 2003-09-30 2007-06-26 Intel Corporation Mechanism to control hardware interrupt acknowledgement in a virtual machine system
US20050080934A1 (en) 2003-09-30 2005-04-14 Cota-Robles Erik C. Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US7177967B2 (en) * 2003-09-30 2007-02-13 Intel Corporation Chipset support for managing hardware interrupts in a virtual machine system
US7636844B2 (en) * 2003-11-17 2009-12-22 Intel Corporation Method and system to provide a trusted channel within a computer system for a SIM device
US20050108534A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Providing services to an open platform implementing subscriber identity module (SIM) capabilities
US20050108171A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
US20050152539A1 (en) * 2004-01-12 2005-07-14 Brickell Ernie F. Method of protecting cryptographic operations from side channel attacks
BRPI0506465A (pt) * 2004-01-23 2007-02-21 Mastercard International Inc método e sistema para rastrear o comportamento de compra de um cliente
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US20050216920A1 (en) * 2004-03-24 2005-09-29 Vijay Tewari Use of a virtual machine to emulate a hardware device
US7356735B2 (en) * 2004-03-30 2008-04-08 Intel Corporation Providing support for single stepping a virtual machine in a virtual machine environment
US7620949B2 (en) 2004-03-31 2009-11-17 Intel Corporation Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US7305592B2 (en) * 2004-06-30 2007-12-04 Intel Corporation Support for nested fault in a virtual machine environment
DE102004045978A1 (de) * 2004-09-22 2006-03-30 Siemens Ag Verfahren und System zur Überprüfung und Einräumung einer Zugangsberechtigung für einen Benutzer
US7840962B2 (en) * 2004-09-30 2010-11-23 Intel Corporation System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US8146078B2 (en) 2004-10-29 2012-03-27 Intel Corporation Timer offsetting mechanism in a virtual machine environment
US8924728B2 (en) * 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US8640259B2 (en) * 2005-01-20 2014-01-28 The Invention Science Fund I, Llc Notarizable electronic paper
US7774606B2 (en) 2005-01-20 2010-08-10 The Invention Science Fund I, Inc Write accessibility for electronic paper
US7865734B2 (en) * 2005-05-12 2011-01-04 The Invention Science Fund I, Llc Write accessibility for electronic paper
US8063878B2 (en) 2005-01-20 2011-11-22 The Invention Science Fund I, Llc Permanent electronic paper
US7643005B2 (en) * 2005-01-20 2010-01-05 Searete, Llc Semi-permanent electronic paper
US7669245B2 (en) * 2005-06-08 2010-02-23 Searete, Llc User accessibility to electronic paper
US8281142B2 (en) * 2005-01-20 2012-10-02 The Invention Science Fund I, Llc Notarizable electronic paper
US7739510B2 (en) * 2005-05-12 2010-06-15 The Invention Science Fund I, Inc Alert options for electronic-paper verification
US7856555B2 (en) * 2005-01-20 2010-12-21 The Invention Science Fund I, Llc Write accessibility for electronic paper
US7395405B2 (en) * 2005-01-28 2008-07-01 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
WO2006120364A2 (fr) * 2005-05-12 2006-11-16 France Telecom Transfert d'un code de carte prepayee vers un serveur d'operateur de cartes
US8219829B2 (en) * 2005-12-08 2012-07-10 Intel Corporation Scheme for securing locally generated data with authenticated write operations
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
US20080132222A1 (en) * 2006-11-30 2008-06-05 Brady Colin P Wireless communication using a picocell station having its own phone number
DE102010010950A1 (de) * 2010-03-10 2011-09-15 Giesecke & Devrient Gmbh Verfahren zum Authentisieren eines portablen Datenträgers
DE102011015710A1 (de) * 2011-03-31 2012-10-04 Giesecke & Devrient Gmbh Verfahren zum Aktualisieren eines Datenträgers
DE102011054637A1 (de) 2011-10-20 2013-04-25 Marc Gaston Zacher Verfahren zum Konfigurieren eines elektromechanischen Schlosses
US10546293B2 (en) * 2014-05-29 2020-01-28 Apple Inc. Apparatuses and methods for using a random authorization number to provide enhanced security for a secure element

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4453074A (en) * 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2350418A1 (de) * 1973-10-08 1975-04-10 Gretag Ag Verfahren und einrichtung zur erstellung und auswertung von faelschungssicheren maschinell lesbaren zahlungsbelegen
GB2078410A (en) * 1980-06-19 1982-01-06 Racal Transcom Ltd Card transaction verification
ATE22498T1 (de) * 1980-06-20 1986-10-15 Plessey Overseas Verfahren und einrichtung zum pruefen von muenzen.
US4626669A (en) * 1983-12-28 1986-12-02 Fairview Partners Intercept system for intercepting stolen, lost and fraudulent cards
US4748668A (en) * 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
FR2618002B1 (fr) * 1987-07-10 1991-07-05 Schlumberger Ind Sa Procede et systeme d'authentification de cartes a memoire electronique
CA2100576A1 (en) * 1991-01-18 1992-07-19 David Naccache Method and apparatus for access control and/or identification

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4453074A (en) * 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards

Also Published As

Publication number Publication date
US5867577A (en) 1999-02-02
KR0168481B1 (ko) 1999-01-15
AU1470795A (en) 1995-10-05
ATE223094T1 (de) 2002-09-15
NO950896L (no) 1995-09-11
CA2144124C (fr) 1999-11-30
TW301095B (zh) 1997-03-21
JP3326040B2 (ja) 2002-09-17
CN1121221A (zh) 1996-04-24
EP0671712B1 (fr) 2002-08-28
NO309345B1 (no) 2001-01-15
FR2717286B1 (fr) 1996-04-05
FR2717286A1 (fr) 1995-09-15
NO950896D0 (no) 1995-03-08
JPH0879238A (ja) 1996-03-22
DE69527867T2 (de) 2003-02-13
KR950033921A (ko) 1995-12-26
EP0671712A1 (fr) 1995-09-13
CA2144124A1 (fr) 1995-09-10
DE69527867D1 (de) 2002-10-02

Similar Documents

Publication Publication Date Title
CN1088872C (zh) 认证可进行事务处理或存取的数据载体的方法和装置
KR102636102B1 (ko) 블록체인 기반의 암호화폐를 위한 토큰을 검증하는 컴퓨터로 구현된 방법 및 시스템
US20190280875A1 (en) Systems and methods for blockchain-based digital lottery ticket generation and distribution
US6904416B2 (en) Signature verification using a third party authenticator via a paperless electronic document platform
US6434238B1 (en) Multi-purpose transaction card system
US6957336B2 (en) Establishing initial PuK-linked account database
US6983368B2 (en) Linking public key of device to information during manufacture
GB2597592A (en) Computer-implemented control system and method
US20020026578A1 (en) Secure usage of digital certificates and related keys on a security token
JPH0622030B2 (ja) 取引の正当性確認方式
CN1266521A (zh) 验证数据载体真实性的方法
JP4234916B2 (ja) 独立型本人認証装置におけるメモリレンタルサービスシステム
US20040249765A1 (en) Use of a kiosk to provide verifiable identification using cryptographic identifiers
CN111369338A (zh) 基于区块链的数据处理方法及装置
US20060193475A1 (en) Method for signing a dataset in a public key system and data processing system for carrying out said method
US8631475B1 (en) Ordering inputs for order dependent processing
CN111859431A (zh) 电子文件签章方法、装置、电子设备及存储介质
CN111277407A (zh) 基于秘密共享的抗量子计算联盟链投票系统及方法
WO2000008610A1 (en) Offline verification of integrated circuit card using hashed revocation list
JP4334021B2 (ja) 読取り装置内の累積の証明方法
JP2000251050A (ja) Icカード、icカード情報読取装置、icカード情報集中管理装置、icカードの不正記録情報検知方法及びシステム
JP2007065727A (ja) Icカード利用システム
CN117786766A (zh) 一种带时间有效性验证的自动化信息审核方法及装置
JPH08202774A (ja) 電子領収書つづりカード及び同カードにアクセスするための装置
WO2022261649A2 (en) Composite cryptographic systems with variable configuration parameters and memory bound functions

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: CP8 TECHNOLOGY CO.,LTD.

Free format text: FORMER OWNER: BULL CP8

Effective date: 20050819

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20050819

Address after: French Rowan F Nass

Patentee after: CP & Technologies

Address before: France's Louvre

Patentee before: Bull CP8

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20020807

Termination date: 20140308