CN1121221A - 认证可进行事务处理或存取的数据载体的方法和装置 - Google Patents

认证可进行事务处理或存取的数据载体的方法和装置 Download PDF

Info

Publication number
CN1121221A
CN1121221A CN95103259A CN95103259A CN1121221A CN 1121221 A CN1121221 A CN 1121221A CN 95103259 A CN95103259 A CN 95103259A CN 95103259 A CN95103259 A CN 95103259A CN 1121221 A CN1121221 A CN 1121221A
Authority
CN
China
Prior art keywords
carrier
information
authentication value
algorithm
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN95103259A
Other languages
English (en)
Other versions
CN1088872C (zh
Inventor
雅克·帕特里安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CP & Technologies
Original Assignee
Bull CP8 SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull CP8 SA filed Critical Bull CP8 SA
Publication of CN1121221A publication Critical patent/CN1121221A/zh
Application granted granted Critical
Publication of CN1088872C publication Critical patent/CN1088872C/zh
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4093Monitoring of device authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0866Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor

Abstract

认证数据载体的方法及装置,该载体能在某一服务部门或某一地点进行事务处理或存取。有两种认证方法。其一是常用的与专门机构脱开的方法,其二是周期联机的方法。按脱开方式,将与非对称算法(F)相关的并使用公共关键词(Kp)的算法(G)用于载体上读出的认证值(VA),以便一方面检查认证值(VA)是否与固有序列号(Ns)和信息(I)相容,另一方面检查事务处理或所请求的服务是否与信息(I)相容。按联机方式,还可另外改变载体的认证值。

Description

认证可进行事务处理或存取的 数据载体的方法和装置
本发明涉及的是用于认证数据载体或装置是否出自专门(授权)机构的方法,该载体或装置用于在与所述机构相连(联网)的分配器附近的服务部门或场所进行事务处理或存取,该机构的一个文件中包括装在每个载体中的当前权利的内容,本方法在于将某一固有(特有)号码(Ns)分配给所述载体,该号码可以将此载体从所述机构生产的一批载体中区分开,本方法还在于把该号码装到所述载体上。本发明的目的就是提供这样一种方法,即在载体本身中和在与载体相配合的分配器的一个可行终端中采用一些极简单的器件(设备)。例如当载体为电子载体时,就希望除了所连接的计算电路外,它仅由一个存储器构成,而且希望该存储器的体积尽可能的小。也希望载体和所连的终端都没有保密关键词(识别符号),这种关键词会被作弊者解密。
根据本发明,这些目的是用开头所述的方法完成的,此外,该方法还在于,在所述机构内启动所述载体或装置,与此同时将信息(1)分配给了载体,该信息根据所述文件的内容确实装到该载体上的权利,并根据固有号码(Ns)及信息(1)用非对称算法(F)和秘密关键词(Ks)计算认证值(VA),同时将此认证值加到载体上,当每次使用载体时由所述分配器按着与专门机构不相连的方法认证该载体,同时采用与所述非对称算法(F)相关的算法(G)计算与所述秘密关键词(Ks)相关的公共关键词(Kp)及载体上读出的认证值(VA),这样一方面可以检查该认证值(VA)是否与固有号码(NS)及信息(1)相容,另一方面可以检查所述事务处理或所请求的服务部门是否与信息(1)相容;
周期性地或视事务处理或服务部门的类型而由分配器以与专门机构相连的方式对该载体进行认证,同时首先由分配器或专门机构认证该载体,所述专门机构检查该载体上读到的认证值(VA)是否与固有号码(Ns)和信息(1)相容,如果认证肯定,则由专门机构根据所述文件的当前状态证实该载体还具有权利,在证实过程中,如果有必要改变信息(I)来表示其当前的权利状态,则根据固有号码(Ns)和新的信息(I)用非对称算法(F)及保密关键词(Ks)计算新的认证值(VA′),并将该新的数值加到载体上。使用非对称算法可以在只有作认证值(VA)的记录时才要求用保密关键词,而该值的常规检查只需要公共关键词。
但通过采用与专门机构周期性相连的方法可以对装入各载体中的权利进行更完全的检查,如有必要可对载体进行当天处理。
本发明还涉及与上述方法相关的各种装置。
本发明的其它细节和优点将结合唯一的一幅附图在对非限定的较佳实施例的描述中显示出来,该图用图解的方法示出了与专门机构的终端相配合的便携式信息目标以及装在销售处的终端。
在图中,用1表示便携式的信息目标,该信息目标主要是指装有EEPROM存储器2的电子卡(插件),该存储器由接口3与外部连接。电子卡没有微处理器那种处理回路。存储器2中主要有两个信息,即一个电子卡的序列号(Ns),制造时该序列号就给了电子卡,还有一个就是用于证实电子卡是否来自专门机构的认证值(VA),下面将描述(VA)值的计算。
用4表示能传输或整理当天电子卡的专门机构的中心计算机。它主要包括处理回路5和连通各回路之间并与接口7进行连接的存储器6。存储器6中装有加密的非对称算法F的程序,这种算法为公知技术,它要求使用存储式的保密关键词(Ks)来对数据进行编码(译成密码)而译码只要求用对应的公共关键词(Kp)。在存储器6中还有一个包括被安装到每个来自专门机构的载体上的当前权利的文件。重要的是计算认证值(VA),并将该值送入电子卡中,需要使用两个数据,即该电子卡的序列号(Ns)以及确定装到该电子卡上的权利的信息I。信息I根据文件所含内容进行设计。例如它可以采用下面的任一种形式:
1.能够算出限定权利日期的参考日期:尤其在所涉及的日期中,电子卡持有人在限定的期限内确定所给出的服务项目,也可以直接确定在该服务部门进行存取的限定日期;
2.如下消息(启示):“不接受任何超过100法郎金额的事务处理”;
3.消息:“至今某先生的权利有效”;
4.1至10之间的数据,它确定该机构在电子卡持有人中所具有的信任程度,信息I不保密,但最好用数字编码形式表示,以便保住某些秘密。
因此可以写成:
VA=F(Ns,I,Ks)
注意:VA可以认为是由序列号Ns和信息I构成的非对称消息标记。
此外,序列号Ns可以由其它能够单独认证电子卡1的号码构成。
用8表示销售处的终端,用以分配利益或服务项目或者付服务报酬。它包括处理回路9和在各回路之间与接口11通过合适的连接法进行配合的存储器10。该存储器包括与上述算法F相结合的算法G的程序以及与保密关键词Ks相结合的公共关键词Kp。
根据第一种实施形式,采用“具有消息补偿”式的程序(即能够补偿消息内容),在此情况下,算法F的基础在于因子分解问题。而终端所包括的算法G是由算法F的倒数的算法(F-1)构成的。为确保VA计算的保密性,电子卡1的存储器2中的VA的维数最好至少等于512比特。
因此,用下面的方法终端就能得到一对值Ns,1:
(Ns,I)=F-1(VA,Kp)
对于算法F,主要可以用RSA(Rivest,Shamir,Adleman)式算法,例如它为如下形式:
VA = ( Ns , I ) 3 模数n,其中(Ns,I)表示Ns和I的级联(并置);
n表示公共关键词Kp;n=p×q,p和q是构成保密关键词Ks的前两个保密数值。在该情况中,F1表示为:
(NS,I)=VA3模数n。
认证电子卡的方法首先包括在专门机构中的初始化阶段,在该阶段,专门机构的中心计算机4算出该电子卡的第一个值VA,并将该值返送到电子卡的存储器2中。
在使用时,并入专门机构的各个销售处的终端8以相对于该机构的中心计算机4脱开的方法对同一电子卡1连续进行一定次数的检查,这种检查次数对应于要求进行事务处理的次数。在每次检查过程中,由应用于电子卡存储器中读到的VA值的算法F-1来反复计算Ns和I这两个数。这样一方面可以检查电子卡存储器中读到的序列号Ns是否对应于计算的序列号,另一方面又可以检查计算的信息I是否完全为它本身的相关信息,也就是说该信息是否构成可以理解的信号,以及它是否与请求的事务处理相容。如果答案肯定,则销售处的终端可以允许进行事务处理。
通过参照上述给定的信息I实例的编号,相容性检查例如可以确保;
1.在事务处理的那一天,不超过限定的权利日期;
2.事务处理的金额不超100法郎;
3.考虑到原先的核准已经过时,某先生的权利不要求由专门机构重新核准;
4.根据所给出的数目,确定事务处理的性质。
反之,所读的Ns和计算的Ns之间的差或计算出的信息I的不相关性表示电子卡并不出自专门的机构,以便销售处的终端拒绝事务处理。
例如每月一次的总结算时,销售处的终端与专门机构的中心计算机“连接”进行检查。在第一阶段要保证电子卡受到很好的认证。这可以用两种方法进行。或由销售处的终端如上述那样以脱开方式对VA值进行检查,或由专门机构从事这一工作:具有所有单元的专门机构允许终端把认证值VA给予电子卡,通过与文件中的内容进行直接比较,它就很容易对电子卡上读到的数值VA进行检查,在所述文件中,它将记录认证值VA,序列号Ns和信息1。对前面所述情况,也可以通过与反复计算的值VA进行比较对电子卡上读到的数值进行检查。
在第二阶段,在任何情况的运行都是“连接”运行,在查阅文件时,机构的中心计算机检查带有经反复计算的序列号Ns的电子卡是否还有权利。例如它检查:
---没有异议提出后启用电子卡:
---电子卡显示出有权利的银行帐户并不透支;等等。
在第三阶段,根据需要,所述机构“修正”认证值VA,以便根据电子卡所具有的权利或根据最后接触所签署的新权利而延长有效限定期。为此,机构的中心计算机根据新的信息I计算新的VA值,该新信息考虑到了权利的这一变化:
VA′=F(Ns,I′,Ks)
再把该值VA′记录在电子卡存储器2的当前值VA的地方,这样就停止了程序。
根据本发明的第二种实施方式,采用“无消息补偿”(即不能补偿消息内容)式的程序。在此情况下,算法F例如是基于不连续对数的问题,而终端中所包括的算法G并不是由F的倒数F-1的算法构成,而仅仅是与F有关的算法,从而使它能够检查认证值VA是否根据序列号Ns和信息I进行过正确计算。例如G算法可以是公知的DSS(Digital Signature Standard)算法,该算法可以根据认证值VA,公共关键词Kp,也可以根据序列号Ns和信息I来检查VA与Ns及I是否相容。此外,不可能由终端再算出Ns和I。反之,电子卡1的存储器2中的VA值最好至少等于320比特,这样就足以保证VA的安全性能。
在该第二种实施方案中,终端进行的相容性计算要求该终端认出序列号Ns和信息I。至于序列号可由终端的电子卡1读出。而对于信息I,可有两种情况:
-该信息存在电子卡的存储器2中,而由终端读该信息;
-终端暗含地认出该信息,这是因为对于顾客给出的整个范畴来说此信息是唯一的;可以涉及如下形式的信息:“所从事的事务处理达1000法郎”。
在使用过程中,每个销售点的终端8可以以脱开的方式连续检查同一电子卡1。一旦用G算法检查了值VA与值Ns、I之间的相容性,这三个值就由电子卡读出,或对于信息I,则由终端隐含地认出。对于肯定的情况,就可以进行事务处理。正如第一个实施方式那样,终端可以检查信息I与所请求的事务处理的相容性。
以连接方式进行的运行类似于第一个实施方式所描述的运行,唯一的差别在于,如果对电子卡检查其可靠性的第一阶段是由销售点的终端完成,则所考虑的值NS和I就是电子卡上读到的值,而不再是重新计算的值。如果被装到电子卡中的权利应当进行改变。专门机构的中心计算机就记录新的认证值VA′,如有必要,还要在当前数据的位置记录新的信息I′。
本发明不仅实用于认证存储器卡,而且更普遍地适用于认证所有电子或非电子式的数据载体(上面登记了序列号Ns和认证值VA的身分证或资格证明)。
数据载体也可以由加有序列号Ns或认证值VA的便携计算机这样的装置构成。

Claims (9)

1.一种用于认证数据载体或装置是否出自专门(授权)机构的方法,该载体或装置用于在与所述机构相连的分配器附近的服务部门或场所进行事务处理或存取,该机构的一个文件中包括装在每个载体中的当前权利的内容,本方法在于将某一固有(特有)号码(Ns)分配给所述载体,该号码可以将该载体从所述机构生产的一批载体中区分开,本方法还在于把该号装到所述载体上,其特征另外还在于:
-在所述机构内启动载体或装置,将信息(I)分配到该载体上,该信息根据所述文件的内容确定装到该载体上的权利,并根据固有号码(Ns)以及信息(I)用非对称算法(F)和秘密关键词(Ks)计算认证值(VA),将此认证值加到载体上;
-当每次使用载体时,由所述分配器以与专门机构不相连的方法认证该载体,同时采用与所述非对称算法(F)相关的算法(G)对与所述秘密关键词(Ks)相关的公共关键词(Kp)以及载体上读出的认证值(VA)进行计算,这样一方面可以检查该认证值(VA)是否与固有号码(Vs)及信息(I)相容,另一方面可以检查所述事务处理或所请求的服务部门是否与信息(I)相容;
-周期性地或者视事务处理或服务部门的类型而由分配器以与专门机构相连的方式对该载体进行认证,首先由分配器或专门机构认证该载体,所述专门机构检查该载体上读到的认证值(VA)是否与固有号码(Ns)和信息(I)相容,如果认证肯定,则由专门机构根据所述文件的当前状态证实该载体还具有权利,在证实过程中,如果有必要改变信息(I)来表示其当前的权利状态,则根据固有号码(Ns)和新的信息(I)用非对称算法(F)及保密关键词(Ks)计算新的认证值(VA′),并将该新的数值加到载体上,使用非对称算法可以在只有作认证值(VA)的记录时才要求用保密关键词,而该值的常规检查只需要公共关键词。
2.根据权利要求1的方法,其中与非对称算法(F)相关的算法(G)包括非对称算法的倒数算法(F-1),当每次使用载体时,在用该算法根据载体上读到的认证值(VA)计算与该载体相关的固有序列号(NS)和信息(I)时进行所述的认证,然后再检查所读的固有序列号(NS)是否与计算的序列号相同,并检查计算的信息(I)是否与本身信息一致,而且是否与所要求的事务处理或事务部门相容。
3.根据权利要求1的方法,其中与非对称算法(F)相关的所述算法(G)应使所述的认证要求能认识信息(I)和固有序列号(NS),信息(I)可以装在载体上,也可以由分配器暗含地识别,每次使用载体时,另外再通过把载体上读出的固有序列号(NS)和载体上读出的或暗含认出的信息(I)用到相关的算法(G)中进行上述计算。
4.根据上述任一权利要求的方法,其中所述信息(I)包括能够计算装到载体上的限定权利日期的参考日期,在进行请求的事务处理或服务的那一天,当每次认证时,就检查限定的权利日期是否超过。
5.一种数据载体或装置它含有能检查该载体是否来自专门机构的认证器,该载体或装置用于在与所述机构相连的分配器附近的服务部门或场所进行事务处理或存取,该机构的一个文件中包括装在每个载体中的当前权利的内容,该载体装有能将其与该机构生产出的一批载体区分开来的序列号(NS),其特征在于:它还有一个由保密关键词(KS),固有序列号(NS)和信息(I)用非对称算法(F)计算出的认证值(VA)。该信息能根据文件中的内容确定装入载体中的权利。
6.根据权利要求5的载体,其中所述非对称算法(F)应使所述的载体认证必需能认识信息(I)和固有序列号(NS),信息(I)对于每个载体都是特定的并记入该载体上。
7.根据权利要求5或6的载体,它包括装有EEPROM电子存储器的便携目标,所述认证值(VA)存在该存储器中。
8.在一个分配器中能与权利要求5-7中任一权利要求的数据载体或装置相配合的终端,其特征在于:它包括可存储与所述非对称算法(F)相关的算法(G)以及与保密关键词(Ks)相结合的公共关键词(Kp)的存储器;该终端还在于将公共关键词(Kp)和载体上读到的认证值(VA)用于相关的算法(G)从而进行计算,以便一方面检查认证值(VA)是否与固有序列号(Ns)和信息(I)相容。另一方面检查事务处理或所请求的服务是否与信息(I)相容。
9.在一个专门机构中能与权利要求5-7中任一权利要求的数据载体或装置相配合的中心装置,其特征在于:它包括一些可将所述文件,所述不对称算法(F)和所述保密关键词(KS)进行存储的设备;根据所述文件的当前状态该装置可证实载体是否还具有权利,如果答复肯定,则检查要求信息(I)的改变是否为显示当前权利状态所必须的,根据固有序列号(Ns)和新的信息(I)用非对称算法(F)及保密关键词(Ks)计算出新的认证值(VA′),并将该新值装入载体中。
CN95103259A 1994-03-09 1995-03-08 认证可进行事务处理或存取的数据载体的方法和装置 Expired - Fee Related CN1088872C (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9402717 1994-03-09
FR9402717A FR2717286B1 (fr) 1994-03-09 1994-03-09 Procédé et dispositif pour authentifier un support de données destiné à permettre une transaction ou l'accès à un service ou à un lieu, et support correspondant.

Publications (2)

Publication Number Publication Date
CN1121221A true CN1121221A (zh) 1996-04-24
CN1088872C CN1088872C (zh) 2002-08-07

Family

ID=9460842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN95103259A Expired - Fee Related CN1088872C (zh) 1994-03-09 1995-03-08 认证可进行事务处理或存取的数据载体的方法和装置

Country Status (12)

Country Link
US (1) US5867577A (zh)
EP (1) EP0671712B1 (zh)
JP (1) JP3326040B2 (zh)
KR (1) KR0168481B1 (zh)
CN (1) CN1088872C (zh)
AT (1) ATE223094T1 (zh)
AU (1) AU1470795A (zh)
CA (1) CA2144124C (zh)
DE (1) DE69527867T2 (zh)
FR (1) FR2717286B1 (zh)
NO (1) NO309345B1 (zh)
TW (1) TW301095B (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1312620C (zh) * 2003-01-08 2007-04-25 Kddi株式会社 内容文件制作者的认证方式及其程序
CN100566246C (zh) * 2003-01-24 2009-12-02 法国电讯 保护电子芯片免受欺骗的公钥加密方法
CN103460186A (zh) * 2011-03-31 2013-12-18 德国捷德有限公司 用于更新数据载体的方法

Families Citing this family (111)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7260834B1 (en) 1999-10-26 2007-08-21 Legal Igaming, Inc. Cryptography and certificate authorities in gaming machines
US6272223B1 (en) * 1997-10-28 2001-08-07 Rolf Carlson System for supplying screened random numbers for use in recreational gaming in a casino or over the internet
US7690043B2 (en) * 1994-12-19 2010-03-30 Legal Igaming, Inc. System and method for connecting gaming devices to a network for remote play
DE19514084C1 (de) * 1995-04-13 1996-07-11 Siemens Ag Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit U und einer Netzcomputereinheit N
US5832090A (en) * 1995-08-10 1998-11-03 Hid Corporation Radio frequency transponder stored value system employing a secure encryption protocol
FR2745406B1 (fr) * 1996-02-23 1998-06-26 Sligos Carte de gestion de comptes multiples et procede de mise en oeuvre
FR2750274B1 (fr) * 1996-06-21 1998-07-24 Arditti David Procede de prise en compte d'une demande d'utilisation d'une carte prepayee virtuelle permettant la reutilisation de son numero de serie
FR2751104B1 (fr) * 1996-07-11 1998-12-31 Stoffel Laurent Procede de controle de transactions securisees independantes utilisant un dispositif physique unique
JPH1063722A (ja) * 1996-08-14 1998-03-06 Toshiba Corp カード取引システム及びカード取引方法
EP0851396A1 (en) * 1996-12-23 1998-07-01 Koninklijke KPN N.V. System for increasing a value of an electronic payment card
HUP0001504A3 (en) * 1997-03-06 2001-01-29 Deutsche Telekom Ag Data carrier, especially a chip card
AUPO799197A0 (en) * 1997-07-15 1997-08-07 Silverbrook Research Pty Ltd Image processing method and apparatus (ART01)
FR2761840B1 (fr) * 1997-04-03 2000-04-07 Gemplus Card Int Procede de certification d'un cumul dans un lecteur
DE19716068A1 (de) * 1997-04-17 1998-10-22 Giesecke & Devrient Gmbh Verfahren zur Erzeugung eines Guthabens mittels eines vorausbezahlten Wertgutscheins
FR2771528B1 (fr) * 1997-11-25 2000-01-14 Gemplus Card Int Procede de gestion des donnees dans une carte a puce
US6185685B1 (en) * 1997-12-11 2001-02-06 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
DE19757501C1 (de) * 1997-12-23 1999-09-16 Ibm Verfahren zum Schutz von Transaktionsdaten
JP4176181B2 (ja) 1998-03-13 2008-11-05 富士通株式会社 電子財布管理システム、端末装置及び電子財布管理プログラムを記録したコンピュータ読み取り可能な記録媒体
DE19913931B4 (de) * 1999-03-26 2010-12-30 Scheuermann, Carl H. Überprüfungsverfahren und elektromechanisches Schließsystem
DE19920744A1 (de) * 1999-05-05 2000-11-16 Siemens Ag Verfahren zur Sicherung der Echtheit von Produkten
US8397058B1 (en) 1999-07-28 2013-03-12 Mondex International Limited System and method for communication between smart cards
US6708049B1 (en) * 1999-09-28 2004-03-16 Nellcor Puritan Bennett Incorporated Sensor with signature of data relating to sensor
FR2800220B1 (fr) 1999-10-26 2002-02-15 France Telecom Procede de transaction electronique securisee
FI107769B (fi) * 1999-12-23 2001-09-28 Setec Oy Salaisen avaimen käsittely
US6571276B1 (en) 2000-02-23 2003-05-27 International Business Machines Corporation System for managing asset access in a distributed storage system
US7013481B1 (en) 2000-03-31 2006-03-14 Intel Corporation Attestation key memory device and bus
US6760441B1 (en) 2000-03-31 2004-07-06 Intel Corporation Generating a key hieararchy for use in an isolated execution environment
US7089418B1 (en) 2000-03-31 2006-08-08 Intel Corporation Managing accesses in a processor for isolated execution
US6934817B2 (en) * 2000-03-31 2005-08-23 Intel Corporation Controlling access to multiple memory zones in an isolated execution environment
US6754815B1 (en) 2000-03-31 2004-06-22 Intel Corporation Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
US6769058B1 (en) 2000-03-31 2004-07-27 Intel Corporation Resetting a processor in an isolated execution environment
US7194634B2 (en) * 2000-03-31 2007-03-20 Intel Corporation Attestation key memory device and bus
US7013484B1 (en) 2000-03-31 2006-03-14 Intel Corporation Managing a secure environment using a chipset in isolated execution mode
US7043642B1 (en) 2000-05-22 2006-05-09 Gemplus Process to manage data in a chip card
US6976162B1 (en) * 2000-06-28 2005-12-13 Intel Corporation Platform and method for establishing provable identities while maintaining privacy
US7389427B1 (en) 2000-09-28 2008-06-17 Intel Corporation Mechanism to secure computer output from software attack using isolated execution
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
FR2815747A1 (fr) * 2000-10-19 2002-04-26 Sequoias Procede pour garantir l'authenticite d'un article pourvu d'un element d'enregistrement et de stockage d'informations
US7215781B2 (en) 2000-12-22 2007-05-08 Intel Corporation Creation and distribution of a secret value between two devices
US7035963B2 (en) * 2000-12-27 2006-04-25 Intel Corporation Method for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7818808B1 (en) 2000-12-27 2010-10-19 Intel Corporation Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US6907600B2 (en) 2000-12-27 2005-06-14 Intel Corporation Virtual translation lookaside buffer
US7225441B2 (en) * 2000-12-27 2007-05-29 Intel Corporation Mechanism for providing power management through virtualization
US7272831B2 (en) 2001-03-30 2007-09-18 Intel Corporation Method and apparatus for constructing host processor soft devices independent of the host processor operating system
US7191440B2 (en) 2001-08-15 2007-03-13 Intel Corporation Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US7024555B2 (en) 2001-11-01 2006-04-04 Intel Corporation Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7103771B2 (en) * 2001-12-17 2006-09-05 Intel Corporation Connecting a virtual token to a physical token
US7308576B2 (en) 2001-12-31 2007-12-11 Intel Corporation Authenticated code module
FR2835636A1 (fr) * 2002-02-07 2003-08-08 Carmel Giacopino Systeme permettant d'effectuer des echanges d'information et des transactions
US7480806B2 (en) 2002-02-22 2009-01-20 Intel Corporation Multi-token seal and unseal
US7124273B2 (en) * 2002-02-25 2006-10-17 Intel Corporation Method and apparatus for translating guest physical addresses in a virtual machine environment
US7631196B2 (en) * 2002-02-25 2009-12-08 Intel Corporation Method and apparatus for loading a trustable operating system
US7069442B2 (en) * 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US7028149B2 (en) 2002-03-29 2006-04-11 Intel Corporation System and method for resetting a platform configuration register
US7127548B2 (en) 2002-04-16 2006-10-24 Intel Corporation Control register access virtualization performance improvement in the virtual-machine architecture
JP4326189B2 (ja) * 2002-06-10 2009-09-02 健 坂村 自律型icカード及び通信システム
US7142674B2 (en) * 2002-06-18 2006-11-28 Intel Corporation Method of confirming a secure key exchange
US7124327B2 (en) 2002-06-29 2006-10-17 Intel Corporation Control over faults occurring during the operation of guest software in the virtual-machine architecture
US6996748B2 (en) 2002-06-29 2006-02-07 Intel Corporation Handling faults associated with operation of guest software in the virtual-machine architecture
US7296267B2 (en) 2002-07-12 2007-11-13 Intel Corporation System and method for binding virtual machines to hardware contexts
US20130260879A1 (en) 2002-10-09 2013-10-03 Michael W. Saunders System and Method for Connecting Gaming Devices to a Network for Remote Play
US7165181B2 (en) 2002-11-27 2007-01-16 Intel Corporation System and method for establishing trust without revealing identity
US20040117532A1 (en) * 2002-12-11 2004-06-17 Bennett Steven M. Mechanism for controlling external interrupts in a virtual machine system
US7073042B2 (en) 2002-12-12 2006-07-04 Intel Corporation Reclaiming existing fields in address translation data structures to extend control over memory accesses
US20040128345A1 (en) * 2002-12-27 2004-07-01 Robinson Scott H. Dynamic service registry
US7900017B2 (en) 2002-12-27 2011-03-01 Intel Corporation Mechanism for remapping post virtual machine memory pages
US20040128465A1 (en) * 2002-12-30 2004-07-01 Lee Micheil J. Configurable memory bus width
US7415708B2 (en) * 2003-06-26 2008-08-19 Intel Corporation Virtual machine management using processor state information
US20050044292A1 (en) * 2003-08-19 2005-02-24 Mckeen Francis X. Method and apparatus to retain system control when a buffer overflow attack occurs
US7287197B2 (en) * 2003-09-15 2007-10-23 Intel Corporation Vectoring an interrupt or exception upon resuming operation of a virtual machine
US7424709B2 (en) 2003-09-15 2008-09-09 Intel Corporation Use of multiple virtual machine monitors to handle privileged events
US7739521B2 (en) * 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US7610611B2 (en) * 2003-09-19 2009-10-27 Moran Douglas R Prioritized address decoder
US7237051B2 (en) 2003-09-30 2007-06-26 Intel Corporation Mechanism to control hardware interrupt acknowledgement in a virtual machine system
US20050080934A1 (en) 2003-09-30 2005-04-14 Cota-Robles Erik C. Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US7177967B2 (en) * 2003-09-30 2007-02-13 Intel Corporation Chipset support for managing hardware interrupts in a virtual machine system
US7636844B2 (en) * 2003-11-17 2009-12-22 Intel Corporation Method and system to provide a trusted channel within a computer system for a SIM device
US20050108534A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Providing services to an open platform implementing subscriber identity module (SIM) capabilities
US20050108171A1 (en) * 2003-11-19 2005-05-19 Bajikar Sundeep M. Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
US20050152539A1 (en) * 2004-01-12 2005-07-14 Brickell Ernie F. Method of protecting cryptographic operations from side channel attacks
BRPI0506465A (pt) * 2004-01-23 2007-02-21 Mastercard International Inc método e sistema para rastrear o comportamento de compra de um cliente
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US20050216920A1 (en) * 2004-03-24 2005-09-29 Vijay Tewari Use of a virtual machine to emulate a hardware device
US7356735B2 (en) * 2004-03-30 2008-04-08 Intel Corporation Providing support for single stepping a virtual machine in a virtual machine environment
US7620949B2 (en) 2004-03-31 2009-11-17 Intel Corporation Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US7305592B2 (en) * 2004-06-30 2007-12-04 Intel Corporation Support for nested fault in a virtual machine environment
DE102004045978A1 (de) * 2004-09-22 2006-03-30 Siemens Ag Verfahren und System zur Überprüfung und Einräumung einer Zugangsberechtigung für einen Benutzer
US7840962B2 (en) * 2004-09-30 2010-11-23 Intel Corporation System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US8146078B2 (en) 2004-10-29 2012-03-27 Intel Corporation Timer offsetting mechanism in a virtual machine environment
US8924728B2 (en) * 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US8640259B2 (en) * 2005-01-20 2014-01-28 The Invention Science Fund I, Llc Notarizable electronic paper
US7774606B2 (en) 2005-01-20 2010-08-10 The Invention Science Fund I, Inc Write accessibility for electronic paper
US7865734B2 (en) * 2005-05-12 2011-01-04 The Invention Science Fund I, Llc Write accessibility for electronic paper
US8063878B2 (en) 2005-01-20 2011-11-22 The Invention Science Fund I, Llc Permanent electronic paper
US7643005B2 (en) * 2005-01-20 2010-01-05 Searete, Llc Semi-permanent electronic paper
US7669245B2 (en) * 2005-06-08 2010-02-23 Searete, Llc User accessibility to electronic paper
US8281142B2 (en) * 2005-01-20 2012-10-02 The Invention Science Fund I, Llc Notarizable electronic paper
US7739510B2 (en) * 2005-05-12 2010-06-15 The Invention Science Fund I, Inc Alert options for electronic-paper verification
US7856555B2 (en) * 2005-01-20 2010-12-21 The Invention Science Fund I, Llc Write accessibility for electronic paper
US7395405B2 (en) * 2005-01-28 2008-07-01 Intel Corporation Method and apparatus for supporting address translation in a virtual machine environment
WO2006120364A2 (fr) * 2005-05-12 2006-11-16 France Telecom Transfert d'un code de carte prepayee vers un serveur d'operateur de cartes
US8219829B2 (en) * 2005-12-08 2012-07-10 Intel Corporation Scheme for securing locally generated data with authenticated write operations
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
US20080132222A1 (en) * 2006-11-30 2008-06-05 Brady Colin P Wireless communication using a picocell station having its own phone number
DE102010010950A1 (de) * 2010-03-10 2011-09-15 Giesecke & Devrient Gmbh Verfahren zum Authentisieren eines portablen Datenträgers
DE102011054637A1 (de) 2011-10-20 2013-04-25 Marc Gaston Zacher Verfahren zum Konfigurieren eines elektromechanischen Schlosses
US10546293B2 (en) * 2014-05-29 2020-01-28 Apple Inc. Apparatuses and methods for using a random authorization number to provide enhanced security for a secure element

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2350418A1 (de) * 1973-10-08 1975-04-10 Gretag Ag Verfahren und einrichtung zur erstellung und auswertung von faelschungssicheren maschinell lesbaren zahlungsbelegen
GB2078410A (en) * 1980-06-19 1982-01-06 Racal Transcom Ltd Card transaction verification
ATE22498T1 (de) * 1980-06-20 1986-10-15 Plessey Overseas Verfahren und einrichtung zum pruefen von muenzen.
US4453074A (en) * 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards
US4626669A (en) * 1983-12-28 1986-12-02 Fairview Partners Intercept system for intercepting stolen, lost and fraudulent cards
US4748668A (en) * 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
FR2618002B1 (fr) * 1987-07-10 1991-07-05 Schlumberger Ind Sa Procede et systeme d'authentification de cartes a memoire electronique
CA2100576A1 (en) * 1991-01-18 1992-07-19 David Naccache Method and apparatus for access control and/or identification

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1312620C (zh) * 2003-01-08 2007-04-25 Kddi株式会社 内容文件制作者的认证方式及其程序
CN100566246C (zh) * 2003-01-24 2009-12-02 法国电讯 保护电子芯片免受欺骗的公钥加密方法
CN103460186A (zh) * 2011-03-31 2013-12-18 德国捷德有限公司 用于更新数据载体的方法

Also Published As

Publication number Publication date
US5867577A (en) 1999-02-02
KR0168481B1 (ko) 1999-01-15
AU1470795A (en) 1995-10-05
ATE223094T1 (de) 2002-09-15
NO950896L (no) 1995-09-11
CA2144124C (fr) 1999-11-30
TW301095B (zh) 1997-03-21
JP3326040B2 (ja) 2002-09-17
CN1088872C (zh) 2002-08-07
EP0671712B1 (fr) 2002-08-28
NO309345B1 (no) 2001-01-15
FR2717286B1 (fr) 1996-04-05
FR2717286A1 (fr) 1995-09-15
NO950896D0 (no) 1995-03-08
JPH0879238A (ja) 1996-03-22
DE69527867T2 (de) 2003-02-13
KR950033921A (ko) 1995-12-26
EP0671712A1 (fr) 1995-09-13
CA2144124A1 (fr) 1995-09-10
DE69527867D1 (de) 2002-10-02

Similar Documents

Publication Publication Date Title
CN1121221A (zh) 认证可进行事务处理或存取的数据载体的方法和装置
KR102636102B1 (ko) 블록체인 기반의 암호화폐를 위한 토큰을 검증하는 컴퓨터로 구현된 방법 및 시스템
US6434238B1 (en) Multi-purpose transaction card system
CN108352016B (zh) 数据确证和存储
US7000118B1 (en) Asymmetric system and method for tamper-proof storage of an audit trial for a database
US6904416B2 (en) Signature verification using a third party authenticator via a paperless electronic document platform
CN1161922C (zh) 文件认证系统及方法
CN1290291C (zh) 经过认证的文件的电子传输、存储及检索系统与方法
US20020026578A1 (en) Secure usage of digital certificates and related keys on a security token
RU2351978C2 (ru) Способ обеспечения целостности набора записей данных
US20030023851A1 (en) Methods for generating a verifiable audit record and performing an audit
US20100063932A1 (en) Forming Credentials
JPH10504150A (ja) 商用暗号システムにおけるディジタル署名を安全に使用するための方法
CN110800254A (zh) 用于生成数字标记的系统和方法
CN1215489A (zh) 将命令安全装入一张智能卡中的办法
EP2348444A1 (en) Data processing apparatus
EP0500749A1 (en) Method for personal identification using proofs of legitimacy
CN1266521A (zh) 验证数据载体真实性的方法
US6981151B1 (en) Digital data storage systems, computers, and data verification methods
US11818271B2 (en) Linking transactions
CN111198888A (zh) 一种数字货币冠字号码动态生成及监管的方法和系统
CN111369338A (zh) 基于区块链的数据处理方法及装置
US6757827B1 (en) Autonomously secured image data
CN111460499A (zh) 一种保护隐私的基于Merkletree的区块链用户属性集核验方法
CN114866260B (zh) 一种变色龙哈希分布式身份使用方法和系统

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: CP8 TECHNOLOGY CO.,LTD.

Free format text: FORMER OWNER: BULL CP8

Effective date: 20050819

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20050819

Address after: French Rowan F Nass

Patentee after: CP & Technologies

Address before: France's Louvre

Patentee before: Bull CP8

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20020807

Termination date: 20140308