WO1997004395A1 - Method and apparatus for encryption key creation - Google Patents

Method and apparatus for encryption key creation Download PDF

Info

Publication number
WO1997004395A1
WO1997004395A1 PCT/US1996/011915 US9611915W WO9704395A1 WO 1997004395 A1 WO1997004395 A1 WO 1997004395A1 US 9611915 W US9611915 W US 9611915W WO 9704395 A1 WO9704395 A1 WO 9704395A1
Authority
WO
WIPO (PCT)
Prior art keywords
random
ofthe
generating
data module
component
Prior art date
Application number
PCT/US1996/011915
Other languages
French (fr)
Inventor
Wendell L. Little
Stephen M. Curry
Bryan M. Armstrong
Christopher W. Fox
Donald W. Loomis
Peter Schweitzer
Original Assignee
Dallas Semiconductor Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dallas Semiconductor Corporation filed Critical Dallas Semiconductor Corporation
Priority to AU67619/96A priority Critical patent/AU6761996A/en
Publication of WO1997004395A1 publication Critical patent/WO1997004395A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • G06F21/87Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30098Register arrangements
    • G06F9/3012Organisation of register space, e.g. banked or distributed register file
    • G06F9/30134Register stacks; shift registers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C5/00Details of stores covered by group G11C11/00
    • G11C5/06Arrangements for interconnecting storage elements electrically, e.g. by wiring
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C5/00Details of stores covered by group G11C11/00
    • G11C5/14Power supply arrangements, e.g. power down, chip selection or deselection, layout of wirings or power grids, or multiple supply levels
    • G11C5/143Detection of memory cassette insertion or removal; Continuity checks of supply or ground lines; Detection of supply variations, interruptions or levels ; Switching between alternative supplies
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C7/00Arrangements for writing information into, or reading information out from, a digital store
    • G11C7/24Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C8/00Arrangements for selecting an address in a digital store
    • G11C8/20Address safety or protection circuits, i.e. arrangements for preventing unauthorized or accidental access
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L23/00Details of semiconductor or other solid state devices
    • H01L23/57Protection from inspection, reverse engineering or tampering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/026Arrangements for coupling transmitters, receivers or transceivers to transmission lines; Line drivers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/10Bump connectors; Manufacturing methods related thereto
    • H01L2224/15Structure, shape, material or disposition of the bump connectors after the connecting process
    • H01L2224/16Structure, shape, material or disposition of the bump connectors after the connecting process of an individual bump connector
    • H01L2224/161Disposition
    • H01L2224/16151Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive
    • H01L2224/16221Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked
    • H01L2224/16225Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked the item being non-metallic, e.g. insulating substrate with or without metallisation
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/15Details of package parts other than the semiconductor or other solid state devices to be connected
    • H01L2924/161Cap
    • H01L2924/1615Shape
    • H01L2924/16152Cap comprising a cavity for hosting the device, e.g. U-shaped cap
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/30Technical effects
    • H01L2924/301Electrical effects
    • H01L2924/3011Impedance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S257/00Active solid-state devices, e.g. transistors, solid-state diodes
    • Y10S257/922Active solid-state devices, e.g. transistors, solid-state diodes with means to prevent inspection of or tampering with an integrated circuit, e.g. "smart card", anti-tamper

Definitions

  • the present invention relates to secure portable data carriers and, in particular, to a method and apparatus for creation of keys used in an asymmetric encryption scheme incorporated in an electronic data module.
  • Cryptography deals with the transformation of text (“plaintext”) into coded form (“ciphertext”) by encryption, and transformation of ciphertext into plaintext by decryption. Normally these transformations are parameterized by one or more keys.
  • the motive of encrypting text is security for transmissions over insecure channels.
  • secrecy refers to denial of access to information by unauthorized individuals.
  • Authenticity refers to validating the source of a message, that is, that the message is transmitted by a properly identified sender and is not a replay of a previously transmitted message.
  • Integrity refers to assurance that a message was not modified accidentally or deliberately in transit, by replacement, insertion, or deletion.
  • a fourth service of increasing prominence which may be provided, is nonrepudiation of origin, that is, protection against a sender of a message later denying transmission.
  • E must be a trap-door one-way function. That is, E should be easy to compute from the public key material but hard to invert unless one possesses the corresponding D, or equivalently, the private key material.
  • RSA Rivest-Shamir- Adelman
  • two-key cryptosystems overcome some ofthe problems associated with conventional one-key systems that have curtailed their wide-spread use, the use of two-key systems has not proliferated in applications such as large-scale electronic commerce because currently there is no feasible solution that combines secrecy, authentication, integrity and attack-immunity in a single individualized portable solution that maximizes user convenience.
  • a public key system such as the RSA system
  • P and Q two large random prime numbers
  • any secure transaction solution that proposes to implement a known public key system such as the RSA system must at least be able to generate large random numbers that are prime such that (i) the random numbers are truly "random," that is, there is virtually no predictability ofthe numbers, and (ii) computations, modular arithmetic or otherwise, necessary for implementing the cryptosystem are not so time-consuming as to render the the solution practically useless, and (iii) the portability aspect ofthe solution is not compromised.
  • various random number generators and modular arithmetic techniques have been extant for sometime, no portable secure transaction solution incorporating a public key system such as the RSA system is known to have all ofthe advantages and novel features ofthe present invention described, and claimed, hereinbelow.
  • the present invention generates a truly unique, random number in a clandestine secretive environment so that no one can access the number.
  • the numbers are created and stored within a highly protected microcircuit wherein the circuitry is not accessible.
  • the random, unique number may also be a concatenation of a unique number, which is preferably 56 bits long, with a random number, which is 1024 - 56 bits long (968 bits long).
  • the unique number can be created a variety of ways.
  • the unique number can be stored in a permanent manner in the circuitry of the exemplary embodiment of the present invention.
  • the unique number is laser etched into a memory circuit.
  • the unique number may be concatenated to a random number such that the unique number comprises the least significant bits ofthe 1024 bit unique, random number.
  • one when creating an RSA key set, one generates two random, odd numbers then adds two to each number repeatedly, if necessary, until they are both prime numbers. The two prime numbers are then multiplied together to produce the 1024 bit number that is part of the RSA public encryption key. (Optionally, additional tests can be performed on the two prime factors to insure that they are "good” primes, such that primes which fail the additional tests can be disregarded.) Therefore, in one exemplary embodiment ofthe present invention, to generate a 1024 bit RSA key, one first concatenates the 56 bit unique registration number with the 968 bit random number to produce a unique random number, with the 56 bit unique number as the upper, most significant, bits and the 968 bit random number as the lower or least significant bits.
  • This number should be split approximately in half, the two halves should be made odd, and the two halves should be tested for primality and incremented by two as necessary until they are both prime.
  • P and Q the product ofthese two primes creates a public key which will also be unique. It is understood that it is extremely improbable that the process of incrementing by two until a prime is reached will alter the most significant 56 bits. In the unlikely event that this were to happen, the process should simply be tried again.
  • the primes, P and Q may be generated without regard to a unique number.
  • N which is part ofthe public key
  • E which may preferably be a large number.
  • E can also be a small number such as 3 or 65537.
  • the exemplary embodiment and method is capable of producing a true random number and then using that random number to create new truly random numbers ("on the fly").
  • the present invention in one exemplary embodiment, provides a crystal oscillator that is operable at a preselected operating frequency. Further, in the exemplary embodiment the frequency is approximately 32 KHZ.
  • the crystal oscillator is connected to a series of counters. Preferably, the first counter is an 8-bit counter. Other counters can be incorporated into the circuit thereby establishing a real-time clock.
  • the crystal oscillator and counter circuitry are always running. That is, once the microprocessor circuit is manufactured and the oscillator circuitry is connected to a battery, the oscillator is not disconnected from the battery for the entire life ofthe product.
  • the microprocessor portion ofthe circuit can be powered up and down by transmitting power from a host system to the exemplary embodiment.
  • the microprocessor can communicate with the host system via a one-wire interface.
  • the 8-bit counter of the real time clock cannot be turned off.
  • the real time clock will run continuously. It is noted that a memory circuit is also powered by the battery so that memory data is maintained while the microprocessor is not powered up.
  • the output of the 8-bit counter could be sampled each time the microprocessor is powered up. As long as the count at the outputs ofthe 8-bit counter and the powering up and down ofthe microprocessor are uncorrelated to each other then a truly random 8-bit number will be at the outputs of the 8-bit counter. This number can be stored as a portion of a first random number in memory. The first 8-bit random number can remain in memory while the microprocessor is powered down. Upon powering up the microprocessor again a second random number can be acquired from the 8-bit counter and concatenated to the first 8-bit random number.
  • This process can continue until a random number having a predetermined bit length is created.
  • the predetermined random number is 968 bits long.
  • the microprocessor must be powered up and down 121 times to create enough 8-bit numbers to be concatenated into a 968-bit number.
  • a quantum mechanical or other naturally random technique exterior to the microprocessor circuitry, can be used to randomly power up and power down the microprocessor.
  • the microprocessor could be powered up in accordance with peak electromagnetic wave signals from outer space.
  • the truly random number is created by the asynchronous relationship between powering up and down the microprocessor and the output ofthe 8-bit counter running at 32 KHZ.
  • Another aspect of the exemplary encryption key generation apparatus is its ability to create new random numbers from the originally created random number by simply applying known mathematical properties of large math to the original random number.
  • the apparatus can generate new public and private keys when requested to do so.
  • the new random numbers can be concatenated to the unique number, as described above, thereby creating new unique, random numbers that can uniquely identify someone or something.
  • the present invention provides an electronic data module having an accumulator wherein the contents thereof are first seeded with at least one clock sample. By multiplying the seed value by a pre-selected set of prime numbers, the contents ofthe accumulator are then expanded to a pre-determined size. Randomization is admixed into the accumulator contents by performing a series of cyclic redundancy check ("CRC") operations and bit-level manipulations that are uncorrelated to program cycle times. The contents are randomized further by using clock samples that are uncorrelated to an external event such as a power-up of the electronic data module. The large random prime numbers, P and Q, are then generated by using random bytes of a pre-selected sub-group ofthe contents ofthe accumulator.
  • CRC cyclic redundancy check
  • the present invention comprises a plurality of memory locations for storing information; a first structure for generating information, said information being loadable into said plurality of memory locations; a second structure for increasing entropy of the contents of a sub-group of said plurality of memory locations; and, a third structure for providing a segment of information upon demand, the segment of information being obtained from the contents ofthe sub-group of the plurality of memory locations.
  • the first structure further comprises a cyclic redundancy check generator; and a real-time clock, having at least one 8-bit counter, wherein said at least one 8-bit counter provides at least one sample of information to said cyclic redundancy check generator.
  • the present invention relates to a method of generating an two-key encryption key set comprising a private component and a public component, the method comprising the steps of: generating a first random prime number; generating a second random prime number; producing a modulus by multiplying said first random number by said second random prime number; generating a first exponent by solving a first modular arithmetic equation; generating a second exponent which is a modular inverse to said first exponent, by solving a second modular arithmetic equation; and securely storing either the first exponent or the second exponent in at least one memory location.
  • FIG. 1 is a block diagram depicting an arrangement between a sample-able real ⁇ time clock and a processing block having a one-wire interface in accordance with the present invention
  • FIG. 2A illustrates a functional block of an exemplary embodiment of a monolithic semiconductor chip incorporating the teachings ofthe present invention
  • FIG. 2B illustrates a functional block of another exemplary embodiment of a monolithic semiconductor chip incorporating the teachings ofthe present invention
  • FIG. 2C illustrates a functional block of yet another exemplary embodiment of a monolithic semiconductor chip incorporating the teachings ofthe present invention
  • FIG. 3 is a cross-sectional view of an exemplary embodiment of an portable electronic data module that may be used for encasing a monolithic semiconductor chip incorporating the teachings ofthe present invention
  • FIGS. 4 A and 4B depict an exemplary flow diagram for accumulator initialization used in random number generation in accordance with the present invention
  • FIG. 5 depicts an exemplary flow diagram for enhancing entropy of the accumulator contents by coupling to external stochastic events such as random power- ups and power-downs of an exemplary electronic data module;
  • FIG. 6 depicts an exemplary flow diagram used generating a control byte on demand in accordance with the present invention
  • FIGS. 7 A and 7B depict an exemplary flow chart comprising steps for a random byte request
  • FIG. 8 depicts an exemplary flow chart for producing random numbers having large bit fields
  • FIG. 9 depicts an exemplary flow chart for generating a set of encryption keys in accordance with the present invention.
  • reference numeral 60 refers to a block diagram of an arrangement between a sample- able real-time clock 30 (or, a true time clock, as it is also known in the art; hence these terms will be used hereinafter synonymously and interchangeably) and a processing block 20 coupled to a one-wire interface 15 for communicating therethrough with a host or master 10.
  • the real-time clock 30 is in data communication with the processor block 20 and a storage block 25 through a first bus 50.
  • the processor block 20 is in data communication with the storage block 25 and a random number generator 65 via a second bus 35.
  • the random number generator 65 serves in accordance with the teachings of the present invention to produce true random numbers that are prime and have extremely large magnitudes, preferably 512 bits or more in length.
  • the initialization portion of the random number generation process is coupled to the sampling ofthe real-time clock 30 via one of its plurality of clock counters, ofwhich a clock counter is labeled as 45.
  • the real-time clock 30 comprises at least one crystal oscillator 40, the output ofwhich is provided to a divider block 55 that successively fractionalizes the frequency associated with the crystal oscillator 40.
  • the successively fractionalized time outputs are provided to the clock counters, ranging from the least significant counter to the most significant counter, for example, the least significant clock counter 45.
  • each these clock counters provides outputs of 8 bits of data, it is understood herein that clock counters providing outputs of difterent bit length, for example, 16 bits or 32 bits, may also be employed within the scope of the present invention.
  • the output ofthe least significant clock counter, for example, counter 45 varies most rapidly in comparison with the rest ofthe counters. Still continuing to refer to refer to FIG.
  • the processor block 20, the random number generator 65, the storage block 25, the real ⁇ time clock 30 and the one-wire interface 15 may all preferably be integrated on a single monolithic semiconductor chip such that the chip may be conveniently encased in a portable electronic data module.
  • the exemplary embodiments of such a monolithic semiconductor chip and its carrier are described hereinbelow in reference to FIGS. 2 A,
  • the sampling ofthe real ⁇ time clock 30 is coupled to the random event of power-up or power-down ofthe data module in which the semiconductor chip having the processor block 20 is disposed.
  • a power-up is defined to be the event in which the host 10 issues a command via the one- wire interface 15 to the processor block 20 to do something. What may be done by the processor block 20 in response to the command is designed to consume an indeterminate number of processor cycles so that inter-power-up durations are random.
  • Such randomness in clock counter sampling will be enhanced tremendously by the techniques provided in accordance with the teachings of the present invention.
  • the increased entropy ofthe sampled data will then be used for creating attack-immune encryption keys suitable for such secure transactions as involving, for example, electronic commerce.
  • FIGS. 2A, 2B, and 2C depict three architectural embodiments of a monolithic semiconductor chip 135 (shown in FIG. 3) in which the teachings of the present invention are incorporated.
  • the disclosed embodiments include a power monitor 575, a one-wire Universal Asynchronous Receiver and Transmitter ("UART") 540, a true time clock (or, a real-time clock) 535, a co-processor 525, and a timed access block 520.
  • the exemplary embodiments also include a program/data pointer block 565 and an accumulator/arithmetic logic unit (“ALU”) block 555 such that both blocks 565 and 555 are coupled to a data bus 500.
  • ALU accumulator/arithmetic logic unit
  • a program memory 510 which may preferably be of read-only-memory (“ROM”) type, and a battery-backed nonvolatile data memory 515 are operably disposed on the data bus 500.
  • An address bus 505 is provided for addressing the memory locations in the program memory 510 and the data memory 515.
  • SFR Special Function Register
  • SFR decoder 550 is electrically connected to the data bus 500.
  • the true time clock 535 is connected to two crystals, 571 and 572.
  • the true time clock 535 comprises a 47-bit counter and two groups of byte-wide registers (not shown), one group for seconds and the other for subseconds.
  • the true time clock 535 is not programmable, but is designed to start from an all-zero point when enabled during the manufacturing of a product embodying the present invention.
  • the true time clock 535 is further designed to provide an alarm that is used to establish an interrupt to the chip 135 (shown in FIG. 3) to indicate that the processor block 20(shown in FIG.
  • the timed access block 520 which is disposed on the data bus 500, is designed to provide system control verification of system functions which are considered vital to proper system-level operation ofthe semiconductor chip 135 (shown in FIG. 3).
  • the purpose ofthe timed access block 520 is to guarantee that the processor block 20 (shown in FIG. 1) is under system software control when writing to specific SFR control bits.
  • the power monitor 575 monitors the presence of voltage internal to the chip 135 (shown in FIG. 3) in the electronic data module 100 (shown in FIG. 3).
  • the internal voltage is referenced against an internal bandgap reference, Nrst, such that whenever the internal voltage falls below Nrst, a RESET signal is issued to halt any program code that is being executed at that time and place the processor block 20 (shown in FIG. 1), including the co-processor 525, in a STOP mode.
  • a cyclic redundancy check (“CRC") generator 530 and a random number generator 560 are operably disposed on the data bus 500.
  • the CRC generator 530 is provided as a 32-bit CRC, although it can be appreciated that a 16-bit CRC may also be provided within the scope ofthe present invention.
  • the mechanism of memory verification of either the 16-bit CRC or 32-bit CRC is accomplished essentially in a similar manner.
  • the random number generator 560 is implemented by utilizing the random power-up relationship of the electronic data module 100 for sampling the output ofthe true time clock 535.
  • the architectural embodiment depicted in FIG. 2B comprises an extension of the data bus 500 so that an emulation/test interface block 590, a multiplexed emulation address/data block 585 and a port logic block 580 are operably disposed thereon.
  • the emulation/test interface block 590 is connected to a plurality of terminals or pads, for example, pad 596, for providing electrical control signals between an external emulation/test circuit (not shown) that may be used for testing and emulating external memory and the semiconductor chip 135 ofthe electronic data module 100 (shown in FIG. 3).
  • the emulation address/data block 585 is preferably a 8-bit multiplexed bus for providing an address/data path therebetween, of which a single pad 597 is labeled.
  • the port logic block 580 is preferably provided with three port pins, 593, 594,
  • the semiconductor chip 135 may be externally connectable to other known compatible electronic devices in a known manner.
  • FIG. 3 there is shown a cross-sectional view of a presently preferred exemplary embodiment of an electronic data module 100 having a semiconductor chip 135 that includes memory, a microprocessor/microcomputer, a real-time (or, true time) clock, a math co-processor, and a random number generator according to the teachings ofthe present invention.
  • the electronic data module 100 which may be substantially token-shaped or button-shaped, is designed to hermetically house the monolithic semiconductor chip 135.
  • a housing 160 ofthe electronic data module 100 preferably comprises a male conductive surface 110 and a female conductive surface 105 that are designed so that the male conductive surface 110 is inserted into the female conductive surface 105 which is lined with an insulator 115.
  • both the female conductive surface 105 and the male conductive surface 110 comprise stainless steel surfaces.
  • the monolithic semiconductor chip 135 is preferably affixed to a substrate 130 by means of a plurality of solder bumps, for example, solder bump 140, such that a top passivated side 155 ofthe monolithic semiconductor chip 135 is positioned facing the substrate 130.
  • a back side or bulk side 150 of the monolithic semiconductor chip 135 is preferably encapsulated with a conventional epoxy resin (not shown).
  • the gap 145 between the monolithic semiconductor chip 135 and the substrate 130 is also preferably filled with a conventional resinous filling medium by capillary phenomenon.
  • the substrate 130 of the presently preferred exemplary electronic data module 100 are at least one crystal 125 to at least provide a time base, and a battery 120.
  • the substrate 130 of the exemplary electronic data module 100 may be a conventional printed circuit board or the like.
  • the substrate 130 may be another semiconductor chip disposed on a printed circuit board that is affixed to the cavity created by the housing 160.
  • the substrate 130 may be a printed circuit board disposed on a top surface of another semiconductor chip, thereby creating a "semiconductor sandwich" in the cavity ofthe housing 160.
  • FIGS. 4 A and 4B depict an exemplary flow diagram, called INIT, for creating the contents of a random number seed accumulator ("ACC") in accordance with the teachings ofthe present invention.
  • the ACC which in the exemplary embodiment is a 32-byte storage structure, may be implemented either in the data memory 515 or as a separate register.
  • the steps comprising INIT may be implemented as either software, hardware, or firmware structures that may reside in the random number generator 560 (shown in FIGS. 2A and 2B).
  • the contents ofthe 32- byte ACC are initialized only once during the manufacture of a product or device embodying the present invention. It is also possible, however, to modify the ACC after the initialization, should a user desire to do so, by optionally adding, byte by byte, a pre-loaded value which may be entirely arbitrary, and may preferably comprise 32 bytes in size.
  • a decision step 651 allows a user to initiate his own, presumably proprietary, loading of a 8-bit data segment into a work space, Wl, as indicated in step 653.
  • Wl is loaded with a sample provided by an 8-bit clock counter, for example, counter 45, of the real-time clock 30 (shown in FIG. 1).
  • a second work space W2 is subsequently loaded with another 8-bit clock counter sample, as indicated in step 654.
  • a dummy variable NPRIME is initialized to zero, for subsequent computations.
  • Step 656 is a composite step involving several actions. First, the contents of Wl are multiplied by the first 32 primes which are preferably stored in the data memory 515 (shown in FIGS. 2A, 2B and 2C). That is, Wl is multiplied by 1, 3, 5, 7, 11, 13 et cetera, the multiplications being performed by a modulo 256 machine.
  • step 658 the contents ofthe 32-byte ACC are left-rotated by one bit with wraparound so that 32 carry flags ("CF"), one for each of the 32 bytes, are obtained as indicated in step 657.
  • Two additional variables are defined in step 658 based on the 32 carry flag bits obtained in step 657.
  • One local variable is denoted by n that is set to be equal to the number of l's among the 32 CF bits.
  • N an intermediate value, N is computed as ⁇ n(
  • the previously initialized NPRIME (in step 655) is then replaced by the value computed as (NPRIME+(N/ ⁇ ) MOD 256 ⁇ where ⁇ is a constant.
  • is a constant.
  • the contents of the second work space, W2 is left-rotated, depending upon the three least significant bits ofthe contents of Wl . If all three are set, then W2 is left-rotated 7 times, and if none is set, it is not left-rotated at all. It should be noted herein that the resultant work space is denoted by W2PRIME, and these left- rotations are preferably circular rotations with wraparound.
  • decision block 662 a decision is made based on if the bit 7 (b7) ofthe Wl work space is set. If b7 of Wl is set, then the contents of the second work space
  • step 664 W2PRIME are complemented, as indicated in step 664.
  • step 663 which is reached either after complementing the contents of W2PRIME, or by taking the NOT SET path from decision step 662, the contents ofthe dummy variable VPRIME are compared against the contents ofthe W2PRIME. If the value of VPRIME is less than the value of W2PRIME, then the flow control is passed back to step 657 wherein the contents of ACC are left-rotated once again. On the other hand, if the value of VPRIME is NOT less than the value of W2PRIME, then a pre-initialized loop counter is decremented as provided in step 665.
  • step 653 a user may optionally add, byte by byte preferably, a pre ⁇ loaded value to the contents ofthe ACC. Since this step 653 is preferably designed to be optional, it may be bypassed in the initialization process that occurs during the manufacture of a product or device embodying the present invention.
  • a subset ofthe first 28 bytes ofthe 32-byte ACC are either segmented into or otherwise designated as a plurality of sub-blocks, for example, a linear feedback shift register ("LFSR") of 4 bytes; an additive cyclic group register (“ACGR”) of 4 bytes; a random accumulator (“RACC”) of 16 bytes; and another register denoted as "GG” of 4 bytes, as provided in step 667.
  • LFSR linear feedback shift register
  • ACGR additive cyclic group register
  • RRC random accumulator
  • GG random accumulator
  • step 666 the control is passed back to step 652 wherein the first work space Wl get loaded again with an 8-bit clock counter sample to start the initialization process all over again.
  • this process is done preferably only once during the initial manufacture of the device embodying the present invention.
  • two implementational options exist after a user acquires the device: first, preferably, the
  • INIT sub-process may be executed, starting with loading two clock samples into respective work spaces and manipulating the sample data until a 32-byte value is subsequently added to the pre-existing contents ofthe ACC, as in step 656; or, second, the clock data loading and subsequent data manipulation may be bypassed. Either way, however, the user has the option of adding a pre-selected value into the contents ofthe ACC, as provided in step 653.
  • the outer loop involving a loop counter (that is, taking the NO path from decision block 666 back to step 652 where the first work space Wl gets loaded with a fresh 8-bit clock counter sample) is executed a fixed number of times depending on the initial value ofthe loop counter. In the exemplary embodiment, this value is chosen to be 16. Also, the time period between successive outer loops may be seen to be dependent upon the number of times the inner loop (that is, by taking the YES path from decision block 663 to step 657 where the contents ofthe ACC are left-rotated) and the cycle time associated therewith.
  • FIG. 5 therein is depicted an exemplary flow diagram for further enhancing the entropy of the 16-byte RACC contents by coupling the manipulation thereof to external stochastic events such as random power-ups ofthe exemplary electronic data module 100 (shown in FIG. 3).
  • the sub-process labeled as PWRUP 730, immediately leads to a decision block 731 where a decision is made as to whether or not there should be a delay before the real-time clock counter is sampled.
  • STEP SG 732 is entered.
  • SG is a sequence generator that is a combination ofthe 4-byte LFSR and the 4-byte ACGR obtained in the INIT sub-process as described in the foregoing.
  • stepping the SG involves two events: the cycling ofthe ACGR wherein the GG value, which is held as a constant, is added to the value of ACGR using modular arithmetic; and the cycling ofthe LFSR by one step. Then, by using a sub-process GEN CB, a control byte ("CB") and associated flags are created in step 702.
  • GEN CB 702 will be described in greater detail hereinbelow in specific reference to FIG. 6.
  • the flow control is then passed to a decision block 733 where the status of one ofthe flags, Parity Flag ("PF"), is checked. This determination is employed in deciding how the 8-bit clock counter samples will be used in creating a work space called CLK, the contents ofwhich will be subsequently used how the contents ofthe 16-byte RACC will be manipulated. If PF is set then by taking the YES path from decision block 733, the CLK space is loaded with the result obtained from adding one 8-bit clock counter sample to the next one by modular arithmetic, as indicated in step 735. On the other hand, if the NO path is taken from decision block 733, then the CLK space is loaded with just the first 8-bit clock counter sample.
  • PF Parity Flag
  • step 736 is subsequently entered wherein the contents in one of the bytes ofthe 16-byte RACC are replaced by that byte's original contents added to the contents ofthe CLK space by modular arithmetic.
  • Which byte ofthe 16-byte RACC is chosen for this purpose is determined by the right nibble of the control byte CB generated by the sub-process GEN_CB in step 702.
  • step 737 the contents of another byte ofthe 16-byte RACC are replaced by that byte's original contents XOR'ed to the contents ofthe CLK space. This time, however, which byte is chosen is determined by the left nibble of the control byte generated by the sub- process GEN_CB.
  • step 739 the sequence generator is stepped in step 739 as described in the foregoing. Then, a control byte, CB is created in step 740 (much the same way as in GEN_CB 702) without considering any associated flags. The contents ofthe CB are stored in a pre- determined location, as indicated in step 741. Subsequently stepping the sequence generator, as provided in step 742 and creating another control byte CB in step 743, a decision block 744 is entered. In decision block 744, arbitrarily selected 3 bits ofthe second CB generated in step 743 are compared with the same 3 bits ofthe stored CB in step 741.
  • step 745 If the 3 -bit mask matches, the delay is set to ZERO, as provided in step 745. Otherwise, the control is passed back to step 742 where the sequence generator is stepped again for producing another control byte. Still continuing to refer to FIG. 5, after the delay is set to ZERO in step 745, the control is passed to step 732 for eventually replacing the contents of two bytes selected from the 16-byte RACC as described in the foregoing. It should be noted herein that although there is a possibility that the same two bytes may be selected for the aforementioned manipulation, that will not diminish the added entropy in the contents of the RACC.
  • FIG. 6 depicts an exemplary flow diagram used in the GEN_CB sub-process for generating a control byte on demand in accordance with the present invention.
  • step 751 the contents ofthe third byte ofthe LFSR are added to the contents ofthe second byte ofthe ACGR by modular arithmetic. The result is denoted as the control byte, CB.
  • flags such as, for example, a Carry Flag ("CF'), a Parity Flag (“PF”), an Auxiliary Carry Flag (“ACF”) and an OVerflow
  • OVF OVF Flag
  • the delay status is checked in decision block 753 to determine if it is set or not. If the YES path is taken from the decision block 753, then the control is simply returned without further consideration ofthe flags set in step 752.
  • the respective status ofthe ACF and CF bits are checked to decide whether they are set or not, as provided in 754 and 755. If either is not set, then the control is simply returned again. If both are set, a further decision is made as provided in step 756 to check if bits 7 and 4 ofthe CB equal bits 1 and bits 0 ofthe 16- byte RACC. If they are not equal, the control is returned once again. Otherwise, the bits match between the CB and the RACC, and the delay flag is set as indicated in step
  • the control is returned to a location in the sub-process where GEN_CB is invoked. It can be appreciated that since only two bits are being compared between the CB and RACC, the delay flag is in general going to be set relatively rarely, and that the setting is based on multiple unpredictable events, such as, for example, the contents ofthe LFSR, or the ACGR and the contents ofthe lower order bytes in the
  • RACC Referring now to FIGS. 7 A and 7B, therein is depicted an exemplary flow chart for a random byte request sub-process, RB YTEREQ 700, that generates a random byte on demand.
  • a control byte, CB is created by invoking the GEN_CB sub-process in step 702. Based on the contents ofthe bit locations 4, 5, and 6 ofthe CB, the contents of the RACC are left-rotated, as indicated in 703. For example, if all the three bit locations (b4, b5, and b7) are set in the CB, then the RACC is left-rotated 7 times.
  • a work space, COMBYTE is loaded with the contents of a selected byte of the 16-byte RACC.
  • Which RACC byte is selected is dependent upon the contents of the right nibble ofthe CB, that is, bO - b3. Subsequently, the b7 location ofthe CB is checked in decision block 705 to determine if it is set or not. If b7 ofthe CB is set, then by taking the YES path therefrom, the contents of COMBYTE are complemented, as indicated in step 710. If the b7 is not set, or subsequent to the complementing ofthe COMBYTE, either at least one or two stepping operations ofthe sequence generator are taken (as indicated in steps 707, 709, and 718), depending upon whether the ONF and CF are set or not, as determined by the decision blocks 706 and 708, respectively.
  • both ofthe flags are set, then two stepping operations are undertaken via steps 707 and 709; and, if only one ofthe flags is set, or if neither ofthe flags is set, then, only one stepping operation is chosen.
  • the usage logic of these flags may be modified without substantially deviating from the teachings ofthe present invention.
  • the logic may also be implemented as follows: if both flags are set, then only one stepping operation is undertaken; otherwise, two stepping operations may be undertaken if neither flag is set, or, if either flag is set.
  • a work space denoted by CHOSE ⁇ _BYTEl
  • CHOSE ⁇ _BYTEl is loaded with the contents of a selected byte ofthe 4-byte LFSR.
  • the exact byte that is selected is dependent on the contents of the bO and bl locations of the COMBYTE.
  • a second work space denoted by CHOSEN_BYTE2
  • the exact byte that is selected is dependent on the contents ofthe b2 and b3 locations ofthe COMBYTE.
  • the contents ofthese two work spaces, CHOSEN_BYTEl and CHOSEN BYTE2, are further manipulated depending upon whether the b4 of COMBYTE is set or not, as determined in decision block 713. It the b4 bit is not set, then the contents ofthe CHOSEN BYTE1 are left- rotated, the rotation being dependent upon the b5, b6 and b7 ofthe CB, as indicated in step 714. Otherwise, the contents of the CHOSEN BYTE2 are left-rotated, the rotation again being dependent upon the b5, b6 and b7 ofthe CB, as indicated in step 715. Subsequently, a random byte, RNDMBYTE is returned whose contents are the result ofthe XOR operation between CHOSEN_BYTEl and CHOSEN_BYTE2, as provided in step 716.
  • FIG. 8 therein is depicted an exemplary flow chart utilized for a sub-process RNDMPRM, for producing prime random numbers having a large bit field, preferably about 512 bits or more.
  • RNDMPRM sub-process RNDMPRM
  • the RBYTEREQ sub- process is invoked several times, as provided in step 801.
  • the exact number (denoted "n") preferably depends upon user needs, and in the exemplary embodiment, n equals 64, thereby producing 64 random bytes. These random bytes are then concatenated to produce a 512-bit number, which is denoted by P, as indicated in step 802.
  • P the least significant bit and the two most significant bits of P are set, as shown in step 803.
  • nprime a pre-determined number (denoted by "nprime") of times, as provided in step 805. It is preferred that nprime be less than n, and further, in the presently preferred exemplary embodiment, nprime is one less than n. These nprime bytes are then concatenated to produce another number, A, as also provided in step 805.
  • P is checked for primality by verifying the congruency of the following modular arithmetic equation: ⁇ A ⁇ Mod P ⁇ 1 ⁇ .
  • P is not prime, that is, A is a witness to the compositeness of P
  • an even number preferably 2 is added to P, as provided in step 807.
  • a loop counter preferably initialized to 50, is decremented and a pre-determined end of loop counter is tested in decision block 808.
  • control is passed back to generating another A by sequentially invoking the RBYTEREQ sub-process as in step 805.
  • P satisfies the primality condition in step 806, the control is simply returned.
  • FIG. 9 depicts an exemplary flow chart for a sub-process called KEYSET, for generating a set of encryption keys, usable preferably for the RSA encryption scheme.
  • N is equal to P times Q
  • PHI equals (P-l) times (Q-l).
  • step 903 the RBYTEREQ sub-process is sequentially invoked again for a number of times such that the number is greater than n, the number of bytes in P and Q.
  • the RBYTEREQ sub-process is sequentially invoked 65 times and the random bytes obtained therefrom are concatenated so that a 65-byte number, called a first exponent, D, as shown in 903.
  • D the most significant bit and the least significant bit of D are set.
  • a second exponent, E which is simply the modular inverse of D, is computed by verifying the congruency ofthe following equation: ⁇ E.D ⁇ 1 Mod (PHI) ⁇ , as provided in steps 905 and 906. It is understood that there are several known methods by which the congruency of this equation is verified, such as, for example, the extended Euclidian algorithm. In the exemplary embodiment, however, this computation is performed by using the binary extended greatest common divisor ("GCD”) algorithm.
  • GCD binary extended greatest common divisor
  • E is discarded or otherwise disposed of and the control passes back to creating a new D by invoking the RBYTEREQ sub-process as provided in step 903.
  • the intermediate value PHJ can be discarded and either E or D may be privatized by storing one ofthe exponents (denoted as private exponent) in the secure data memory 515 (shown in FIGS. 2 A, 2B, and 2C) such that access thereto is denied.
  • any host or master such as, for example, the host 10 (shown in FIG. 1) will be able to access the other exponent, denoted as public exponent and N.
  • the encryption and decryption are straight-forward, as follows. If, for example, D is the private exponent and E is the public exponent, then the "encryption" key set comprises ⁇ E;N ⁇ , whereas the "decryption” key set comprises ⁇ D;N ⁇ .
  • the host 10 can send an encrypted message to the electronic data module 100 (shown in FIG. 1) having the decryption key, D, stored internally thereto, by computing M E Mod N, where M denotes the plaintext.
  • the data module 100 upon receiving the ciphertext, C, can decrypt by computing C D Mod N using the stored decryption key, D.
  • the digital signature may then be transmitted either in an encrypted mode or in a non-encrypted mode.
  • the signature from the sender may be verified by an intended recipient by first decrypting the encrypted S itself, if necessary. Then, by computing ⁇ S E Mod N ⁇ using the sender's public exponent, the recipient can see if it matches M, the message sent by the sender. If they match, then the signature is authentic, thereby precluding repudiation by the sender.
  • the present invention as described in detail hereinabove provides an individualized portable data carrier having a virtually impenetrable communication system that is well-suited for applications requiring secrecy and authentication such as electronic-cash (e-cash) transactions.
  • the privatized key exponent stored in the secure memory is unbreakable because of: (i) the extreme entropy admixed into the seed numbers that are used for generating key exponents and the associated modulus, and (ii) the inherent tremendous computational difficulty in computing a private exponent once its associated public exponent and the modulus are known.
  • the method of generating large random prime numbers may also be used in other public-key cryptosystems, such as, for example, the knapsack systems and the ElGamal scheme.
  • the two primes, namely, P and Q are the same size, it is not required that this condition be satisfied in order to practice the present invention.
  • a low-exponent RSA scheme may also be used in accordance with the present invention without having to compute one ofthe large- valued exponents.

Abstract

A portable electronic data module for secure transactions, the electronic data module having a random number generator and an optimized co-processor for producing unbreakable key sets for a two-key cryptosystem. A real-time clock is sampled depending upon an external random event series such as power-ups of the data module by a host apparatus, and based upon the contents of the sample thus obtained, the entropy of a previously-loaded accumulator is further enhanced to achieve a pool of true random numbers. By repeatedly requesting randon bytes of information from said pool of random numbers, large random numbers are created which are then rendered prime and used for key set creation.

Description

METHOD AND APPARATUS FOR ENCRYPTION KEY CREATION
PRIORITY UNDER 35 U.S.C. §119(e) & 37 CF R. § 1.78(a)
This nonprovisional application claims priority based upon the following prior U.S. Provisional Patent Applications: (i) entitled "Method And Apparatus For
Encryption Key Creation," Serial No.: 60/001,277 (Attorney Docket Number 20661/00421), filed July 20, 1995, in the names of Wendell Little and Stephen Curry; (ii) entitled "Microcircuit With Memory That Is Protected by Both Hardware and Software," Serial No.: 60/001,279 (Attorney Docket Number 20661/00420), filed July 20, 1995, in the names of Wendell Little, Rick Fieseler, Steve Hass, and Brad
Harrington; (iii) entitled "Single Chip Microprocessor, Math Co-Processor, Random Number Generator, Real-Time Clock, and RAM Having A 1-Wire Interface," Serial No.: 60/001,278 (Attorney Docket Number 20661/00423), filed July 20, 1995, in the names of Wendell Little and Andreas Curiger.
CROSS-REFERENCE TO RELATED APPLICATIONS
This application hereby incorporates by reference the following co-assigned patent applications, concurrently filed herewith, which describe related subject matter:
Serial No./ Title Inventor(s) Docket No.
20661-00420 Microcircuit With Memory Little, et al.
That Is Protected By Both Hardware And Software
20661-00423 Single Chip Micro Processor, Little, et al.
Math Co-Processor, Random Number Generator, Real- Time Clock, and RAM Having A 1 -Wire Interface
20661-00432 Secure Module With Little, et al.
Microprocessor And Co- Processor BACKGROUND OF THE INVENTION Technical Field ofthe Invention
The present invention relates to secure portable data carriers and, in particular, to a method and apparatus for creation of keys used in an asymmetric encryption scheme incorporated in an electronic data module.
Description of Related Art
Cryptography deals with the transformation of text ("plaintext") into coded form ("ciphertext") by encryption, and transformation of ciphertext into plaintext by decryption. Normally these transformations are parameterized by one or more keys. The motive of encrypting text is security for transmissions over insecure channels.
Three ofthe most important services provided by cyptosystems are secrecy, authenticity, and integrity. Secrecy refers to denial of access to information by unauthorized individuals. Authenticity refers to validating the source of a message, that is, that the message is transmitted by a properly identified sender and is not a replay of a previously transmitted message. Integrity refers to assurance that a message was not modified accidentally or deliberately in transit, by replacement, insertion, or deletion.
A fourth service of increasing prominence, which may be provided, is nonrepudiation of origin, that is, protection against a sender of a message later denying transmission.
Classical cryptography deals mainly with the secrecy aspect. More recently, however, two new trends have emerged: (a) authenticity as a consideration which rivals and sometimes exceeds secrecy in importance, and (b) the notion that some prespecified portion of a key need not be secret.
The first trend has arisen in connection with applications such as electronic mail systems and electronic transfer of funds. In such settings, an electronic equivalent of the handwritten signature may be desirable. Also, since intruders into a system often gain entry by masquerading as legitimate users, cryptography presents an alternative to password systems for access control.
The second trend addresses the difficulties which have traditionally accompanied the management of secret keys. Conventional cryptosystems, also known as "symmetric" encryption systems, require that there be a single secret key shared by a pair of users. In these methods, therefore, the security and authenticity are provided only to the extent that the single key is known to both users and is kept secret. One of the well-known examples of a conventional cryptosystem is the Data Encryption Standard ("DES"). It can be appreciated that because of the requirements of prior exchange ofthe key and two-party secrecy, the conventional cryptosystems have not been found to be very useful in applications such as electronic commerce.
Public-key systems, also called two-key or asymmetric cryptosystems, differ from conventional systems in that there is no longer a single secret key shared by a pair of users. Rather, each user has his own key set. Furthermore, the key set of each user comprises two portions: a private component and a public component. If a plaintext message is denoted by M, then the public component generates a public transformation ofthe message, E, whereas, the private component generates a private transformation, D. Using conventional cryptological terminology, E and D might be termed encryption and decryption functions, respectively. However, it should be noted that this is imprecise: in any given cryptosystem it may be possible to have D{E{M}} = M; E{D{M}} = M; or both.
A useful requirement of two-key cryptosystems is that E must be a trap-door one-way function. That is, E should be easy to compute from the public key material but hard to invert unless one possesses the corresponding D, or equivalently, the private key material. To support both secrecy and authentication, the transformations of a public-key system must satisfy D{E{M}} = M = E{D{M}}. One of the most versatile public-key cryptosystems that satisfies this relationship is the Rivest-Shamir- Adelman ("RSA") scheme.
Although two-key cryptosystems overcome some ofthe problems associated with conventional one-key systems that have curtailed their wide-spread use, the use of two-key systems has not proliferated in applications such as large-scale electronic commerce because currently there is no feasible solution that combines secrecy, authentication, integrity and attack-immunity in a single individualized portable solution that maximizes user convenience. As is well-known in the art, to use a public key system such as the RSA system, a user must first choose two large random prime numbers, P and Q. These numbers are then used in computing a
Modulus, N (N = P times Q). Subsequently, a private exponent, D, and a public exponent, E, are computed according to known techniques. To survive intruder attacks on ciphertext with a high degree of reliability, both E and D are required to be large and random. Therefore, any secure transaction solution that proposes to implement a known public key system such as the RSA system must at least be able to generate large random numbers that are prime such that (i) the random numbers are truly "random," that is, there is virtually no predictability ofthe numbers, and (ii) computations, modular arithmetic or otherwise, necessary for implementing the cryptosystem are not so time-consuming as to render the the solution practically useless, and (iii) the portability aspect ofthe solution is not compromised. Although various random number generators and modular arithmetic techniques have been extant for sometime, no portable secure transaction solution incorporating a public key system such as the RSA system is known to have all ofthe advantages and novel features ofthe present invention described, and claimed, hereinbelow.
SUMMARY OF THE INVENTION
The present invention generates a truly unique, random number in a clandestine secretive environment so that no one can access the number. The numbers are created and stored within a highly protected microcircuit wherein the circuitry is not accessible. In one aspect of the present invention, the random, unique number may also be a concatenation of a unique number, which is preferably 56 bits long, with a random number, which is 1024 - 56 bits long (968 bits long).
The unique number can be created a variety of ways. In the preferred embodiment ofthe present invention, the unique number can be stored in a permanent manner in the circuitry of the exemplary embodiment of the present invention. Preferably the unique number is laser etched into a memory circuit.
In one embodiment of the present invention, the unique number may be concatenated to a random number such that the unique number comprises the least significant bits ofthe 1024 bit unique, random number.
It is noted that generally, when creating an RSA key set, one generates two random, odd numbers then adds two to each number repeatedly, if necessary, until they are both prime numbers. The two prime numbers are then multiplied together to produce the 1024 bit number that is part of the RSA public encryption key. (Optionally, additional tests can be performed on the two prime factors to insure that they are "good" primes, such that primes which fail the additional tests can be disregarded.) Therefore, in one exemplary embodiment ofthe present invention, to generate a 1024 bit RSA key, one first concatenates the 56 bit unique registration number with the 968 bit random number to produce a unique random number, with the 56 bit unique number as the upper, most significant, bits and the 968 bit random number as the lower or least significant bits. This number should be split approximately in half, the two halves should be made odd, and the two halves should be tested for primality and incremented by two as necessary until they are both prime. As long as the 56 bits ofthe unique number in the most significant bit position of one ofthese two primes, P and Q, is unchanged by the incrementing process, then the product ofthese two primes creates a public key which will also be unique. It is understood that it is extremely improbable that the process of incrementing by two until a prime is reached will alter the most significant 56 bits. In the unlikely event that this were to happen, the process should simply be tried again.
In a further aspect, the primes, P and Q, may be generated without regard to a unique number. After calculating the product ofthe primes, N, which is part ofthe public key, it is also necessary to choose and make public the number E, which may preferably be a large number. E can also be a small number such as 3 or 65537. These are popular choices because they speed up the mathematical portion ofthe encryption process. It is, therefore, not essential that E be a large number. Having chosen E and knowing the two prime factors which were multiplied to get N, then the secret key, D, can be calculated by a well defined and rapid mathematical process. It is not practical at all to determine D if only E and N are known.
The exemplary embodiment and method is capable of producing a true random number and then using that random number to create new truly random numbers ("on the fly").
The present invention, in one exemplary embodiment, provides a crystal oscillator that is operable at a preselected operating frequency. Further, in the exemplary embodiment the frequency is approximately 32 KHZ. The crystal oscillator is connected to a series of counters. Preferably, the first counter is an 8-bit counter. Other counters can be incorporated into the circuit thereby establishing a real-time clock. In the preferred exemplary embodiment the crystal oscillator and counter circuitry are always running. That is, once the microprocessor circuit is manufactured and the oscillator circuitry is connected to a battery, the oscillator is not disconnected from the battery for the entire life ofthe product.
Conversely, the microprocessor portion ofthe circuit can be powered up and down by transmitting power from a host system to the exemplary embodiment. The microprocessor can communicate with the host system via a one-wire interface. Referring to the counter circuitry, the 8-bit counter of the real time clock cannot be turned off. As a result, there is a continuous stream of data at the outputs ofthe 8-bit counter whether the microprocessor is powered up or not. As long as there is a battery connected to the circuit the real time clock will run continuously. It is noted that a memory circuit is also powered by the battery so that memory data is maintained while the microprocessor is not powered up.
If the microprocessor is subjected to a power-up and power-down at indeterminate intervals, from time to time, the output of the 8-bit counter could be sampled each time the microprocessor is powered up. As long as the count at the outputs ofthe 8-bit counter and the powering up and down ofthe microprocessor are uncorrelated to each other then a truly random 8-bit number will be at the outputs of the 8-bit counter. This number can be stored as a portion of a first random number in memory. The first 8-bit random number can remain in memory while the microprocessor is powered down. Upon powering up the microprocessor again a second random number can be acquired from the 8-bit counter and concatenated to the first 8-bit random number. This process can continue until a random number having a predetermined bit length is created. In one embodiment the predetermined random number is 968 bits long. Thus, the microprocessor must be powered up and down 121 times to create enough 8-bit numbers to be concatenated into a 968-bit number.
A quantum mechanical or other naturally random technique, exterior to the microprocessor circuitry, can be used to randomly power up and power down the microprocessor. For example the microprocessor could be powered up in accordance with peak electromagnetic wave signals from outer space. In a nutshell, the truly random number is created by the asynchronous relationship between powering up and down the microprocessor and the output ofthe 8-bit counter running at 32 KHZ.
Another aspect of the exemplary encryption key generation apparatus is its ability to create new random numbers from the originally created random number by simply applying known mathematical properties of large math to the original random number. Thus, the apparatus can generate new public and private keys when requested to do so. The new random numbers can be concatenated to the unique number, as described above, thereby creating new unique, random numbers that can uniquely identify someone or something.
In a yet another aspect, the present invention provides an electronic data module having an accumulator wherein the contents thereof are first seeded with at least one clock sample. By multiplying the seed value by a pre-selected set of prime numbers, the contents ofthe accumulator are then expanded to a pre-determined size. Randomization is admixed into the accumulator contents by performing a series of cyclic redundancy check ("CRC") operations and bit-level manipulations that are uncorrelated to program cycle times. The contents are randomized further by using clock samples that are uncorrelated to an external event such as a power-up of the electronic data module. The large random prime numbers, P and Q, are then generated by using random bytes of a pre-selected sub-group ofthe contents ofthe accumulator.
After computing the modulus, a first exponent and a second exponent are computed in a known manner. Thereafter, one ofthe two exponents is privatized and stored in a secure memory, thereby rendering it the private-key component such that access thereto is prohibited. In a still further embodiment, the present invention comprises a plurality of memory locations for storing information; a first structure for generating information, said information being loadable into said plurality of memory locations; a second structure for increasing entropy of the contents of a sub-group of said plurality of memory locations; and, a third structure for providing a segment of information upon demand, the segment of information being obtained from the contents ofthe sub-group of the plurality of memory locations. Further, the first structure further comprises a cyclic redundancy check generator; and a real-time clock, having at least one 8-bit counter, wherein said at least one 8-bit counter provides at least one sample of information to said cyclic redundancy check generator.
In a yet further embodiment, the present invention relates to a method of generating an two-key encryption key set comprising a private component and a public component, the method comprising the steps of: generating a first random prime number; generating a second random prime number; producing a modulus by multiplying said first random number by said second random prime number; generating a first exponent by solving a first modular arithmetic equation; generating a second exponent which is a modular inverse to said first exponent, by solving a second modular arithmetic equation; and securely storing either the first exponent or the second exponent in at least one memory location.
BRIEF DESCRIPTION OF THE DRAWINGS A more complete understanding ofthe method and apparatus ofthe present invention may be had by reference to the following Detailed Description when taken in conjunction with the accompanying Drawings wherein:
FIG. 1 is a block diagram depicting an arrangement between a sample-able real¬ time clock and a processing block having a one-wire interface in accordance with the present invention;
FIG. 2A illustrates a functional block of an exemplary embodiment of a monolithic semiconductor chip incorporating the teachings ofthe present invention; FIG. 2B illustrates a functional block of another exemplary embodiment of a monolithic semiconductor chip incorporating the teachings ofthe present invention; FIG. 2C illustrates a functional block of yet another exemplary embodiment of a monolithic semiconductor chip incorporating the teachings ofthe present invention; FIG. 3 is a cross-sectional view of an exemplary embodiment of an portable electronic data module that may be used for encasing a monolithic semiconductor chip incorporating the teachings ofthe present invention; FIGS. 4 A and 4B depict an exemplary flow diagram for accumulator initialization used in random number generation in accordance with the present invention;
FIG. 5 depicts an exemplary flow diagram for enhancing entropy of the accumulator contents by coupling to external stochastic events such as random power- ups and power-downs of an exemplary electronic data module;
FIG. 6 depicts an exemplary flow diagram used generating a control byte on demand in accordance with the present invention;
FIGS. 7 A and 7B depict an exemplary flow chart comprising steps for a random byte request;
FIG. 8 depicts an exemplary flow chart for producing random numbers having large bit fields; and
FIG. 9 depicts an exemplary flow chart for generating a set of encryption keys in accordance with the present invention.
DETAILED DESCRIPTION OF THE DRAWINGS
Referring now to the Drawings wherein like or similar elements are designated with identical reference numerals throughout the several views, and wherein the various elements depicted are not necessarily drawn to scale, and more particularly to FIG. 1, reference numeral 60 refers to a block diagram of an arrangement between a sample- able real-time clock 30 (or, a true time clock, as it is also known in the art; hence these terms will be used hereinafter synonymously and interchangeably) and a processing block 20 coupled to a one-wire interface 15 for communicating therethrough with a host or master 10. The real-time clock 30 is in data communication with the processor block 20 and a storage block 25 through a first bus 50. Further, the processor block 20 is in data communication with the storage block 25 and a random number generator 65 via a second bus 35. It is understood that the processor block 20 may preferably comprise a microprocessor, or a microcomputer, in addition to computation optimizers and accelerators such as, for example, a math co-processor. The storage block 25 may be any known type of memory, arranged in any known configuration. The storage block 25 may further be partitioned into sub-blocks such as, for example, data memory, program memory and special function registers and accumulators.
Continuing to refer to FIG. 1, the random number generator 65 serves in accordance with the teachings of the present invention to produce true random numbers that are prime and have extremely large magnitudes, preferably 512 bits or more in length. As will be seen hereinbelow in reference to FIGS. 4A et seq., the initialization portion of the random number generation process is coupled to the sampling ofthe real-time clock 30 via one of its plurality of clock counters, ofwhich a clock counter is labeled as 45. The real-time clock 30 comprises at least one crystal oscillator 40, the output ofwhich is provided to a divider block 55 that successively fractionalizes the frequency associated with the crystal oscillator 40. The successively fractionalized time outputs are provided to the clock counters, ranging from the least significant counter to the most significant counter, for example, the least significant clock counter 45. Although in the preferred embodiment ofthe present invention each these clock counters provides outputs of 8 bits of data, it is understood herein that clock counters providing outputs of difterent bit length, for example, 16 bits or 32 bits, may also be employed within the scope of the present invention. Further, it can be readily appreciated that the output ofthe least significant clock counter, for example, counter 45, varies most rapidly in comparison with the rest ofthe counters. Still continuing to refer to FIG. 1, it can be further appreciated that the processor block 20, the random number generator 65, the storage block 25, the real¬ time clock 30 and the one-wire interface 15 may all preferably be integrated on a single monolithic semiconductor chip such that the chip may be conveniently encased in a portable electronic data module. The exemplary embodiments of such a monolithic semiconductor chip and its carrier are described hereinbelow in reference to FIGS. 2 A,
2B, 2C and 3.
In an exemplary embodiment ofthe present invention, the sampling ofthe real¬ time clock 30 is coupled to the random event of power-up or power-down ofthe data module in which the semiconductor chip having the processor block 20 is disposed. In accordance with the teachings ofthe present invention, a power-up is defined to be the event in which the host 10 issues a command via the one- wire interface 15 to the processor block 20 to do something. What may be done by the processor block 20 in response to the command is designed to consume an indeterminate number of processor cycles so that inter-power-up durations are random. As will be seen below, such randomness in clock counter sampling will be enhanced tremendously by the techniques provided in accordance with the teachings of the present invention. The increased entropy ofthe sampled data will then be used for creating attack-immune encryption keys suitable for such secure transactions as involving, for example, electronic commerce.
FIGS. 2A, 2B, and 2C depict three architectural embodiments of a monolithic semiconductor chip 135 (shown in FIG. 3) in which the teachings of the present invention are incorporated. Broadly, the disclosed embodiments include a power monitor 575, a one-wire Universal Asynchronous Receiver and Transmitter ("UART") 540, a true time clock (or, a real-time clock) 535, a co-processor 525, and a timed access block 520. Further, the exemplary embodiments also include a program/data pointer block 565 and an accumulator/arithmetic logic unit ("ALU") block 555 such that both blocks 565 and 555 are coupled to a data bus 500. Further, a program memory 510, which may preferably be of read-only-memory ("ROM") type, and a battery-backed nonvolatile data memory 515 are operably disposed on the data bus 500. An address bus 505 is provided for addressing the memory locations in the program memory 510 and the data memory 515. Also provided in each of the embodiments is a Special Function Register ("SFR") memory 545 that is decoded by an SFR decoder 550. It can be readily seen that the SFR decoder 550 is electrically connected to the data bus 500.
Continuing to refer to FIGS. 2A, 2B, and 2C, the true time clock 535 is connected to two crystals, 571 and 572. In a presently preferred implementation, the true time clock 535 comprises a 47-bit counter and two groups of byte-wide registers (not shown), one group for seconds and the other for subseconds. Preferably, the true time clock 535 is not programmable, but is designed to start from an all-zero point when enabled during the manufacturing of a product embodying the present invention. The true time clock 535 is further designed to provide an alarm that is used to establish an interrupt to the chip 135 (shown in FIG. 3) to indicate that the processor block 20(shown in FIG. 1) is directed to enter into a STOP mode and wait for a one- wire communication segment with the one-wire UART 540. Once the communication segment has been completed, the host 10 (shown in FIG. 1) will issue an interrupt/command to restart the processor block 20. Still continuing to refer to FIGS. 2 A, 2B and 2C, the timed access block 520, which is disposed on the data bus 500, is designed to provide system control verification of system functions which are considered vital to proper system-level operation ofthe semiconductor chip 135 (shown in FIG. 3). The purpose ofthe timed access block 520, in presently preferred implementation, is to guarantee that the processor block 20 (shown in FIG. 1) is under system software control when writing to specific SFR control bits.
The power monitor 575 monitors the presence of voltage internal to the chip 135 (shown in FIG. 3) in the electronic data module 100 (shown in FIG. 3). The internal voltage is referenced against an internal bandgap reference, Nrst, such that whenever the internal voltage falls below Nrst, a RESET signal is issued to halt any program code that is being executed at that time and place the processor block 20 (shown in FIG. 1), including the co-processor 525, in a STOP mode.
Referring now specifically to FIG. 2A and 2B, a cyclic redundancy check ("CRC") generator 530 and a random number generator 560 are operably disposed on the data bus 500. In presently preferred implementation, the CRC generator 530 is provided as a 32-bit CRC, although it can be appreciated that a 16-bit CRC may also be provided within the scope ofthe present invention. As is well-known in the art, the mechanism of memory verification of either the 16-bit CRC or 32-bit CRC is accomplished essentially in a similar manner. Continuing now to refer to FIGS. 2 A and 2B specifically, the random number generator 560 is implemented by utilizing the random power-up relationship of the electronic data module 100 for sampling the output ofthe true time clock 535. As the electronic data module 100 is subjected to a number of power-up and power-down conditions, the monolithic chip 135 in the electronic data module 100 will be able to accumulate a large collection of random values which can then be transmuted into a single random number having a large value, for example, a value that can be expressed as a 1024-bit long binary number. As will be seen below, such large random numbers will be operated upon by the co-processor 525 for creating necessary keys for encryption. It can be readily appreciated that since the mathematical numbers that will be used for the modular arithmetic computations by the co-processor 525 are so large that there is no chance that the numbers will repeat themselves.
The architectural embodiment depicted in FIG. 2B comprises an extension of the data bus 500 so that an emulation/test interface block 590, a multiplexed emulation address/data block 585 and a port logic block 580 are operably disposed thereon. The emulation/test interface block 590 is connected to a plurality of terminals or pads, for example, pad 596, for providing electrical control signals between an external emulation/test circuit (not shown) that may be used for testing and emulating external memory and the semiconductor chip 135 ofthe electronic data module 100 (shown in FIG. 3). The emulation address/data block 585 is preferably a 8-bit multiplexed bus for providing an address/data path therebetween, of which a single pad 597 is labeled. Further, the port logic block 580 is preferably provided with three port pins, 593, 594,
595, such that the semiconductor chip 135 may be externally connectable to other known compatible electronic devices in a known manner.
Referring now to FIG. 3, there is shown a cross-sectional view of a presently preferred exemplary embodiment of an electronic data module 100 having a semiconductor chip 135 that includes memory, a microprocessor/microcomputer, a real-time (or, true time) clock, a math co-processor, and a random number generator according to the teachings ofthe present invention. The electronic data module 100, which may be substantially token-shaped or button-shaped, is designed to hermetically house the monolithic semiconductor chip 135. A housing 160 ofthe electronic data module 100 preferably comprises a male conductive surface 110 and a female conductive surface 105 that are designed so that the male conductive surface 110 is inserted into the female conductive surface 105 which is lined with an insulator 115. In a presently preferred exemplary embodiment, both the female conductive surface 105 and the male conductive surface 110 comprise stainless steel surfaces. The monolithic semiconductor chip 135 is preferably affixed to a substrate 130 by means of a plurality of solder bumps, for example, solder bump 140, such that a top passivated side 155 ofthe monolithic semiconductor chip 135 is positioned facing the substrate 130. According to the exemplary embodiment, a back side or bulk side 150 of the monolithic semiconductor chip 135 is preferably encapsulated with a conventional epoxy resin (not shown). Further, the gap 145 between the monolithic semiconductor chip 135 and the substrate 130 is also preferably filled with a conventional resinous filling medium by capillary phenomenon.
Also affixed to the substrate 130 ofthe presently preferred exemplary electronic data module 100 are at least one crystal 125 to at least provide a time base, and a battery 120. It can be readily appreciated that the substrate 130 of the exemplary electronic data module 100 may be a conventional printed circuit board or the like. In a further aspect ofthe exemplary electronic data module 100, the substrate 130 may be another semiconductor chip disposed on a printed circuit board that is affixed to the cavity created by the housing 160. In a yet another aspect, the substrate 130 may be a printed circuit board disposed on a top surface of another semiconductor chip, thereby creating a "semiconductor sandwich" in the cavity ofthe housing 160.
FIGS. 4 A and 4B depict an exemplary flow diagram, called INIT, for creating the contents of a random number seed accumulator ("ACC") in accordance with the teachings ofthe present invention. The ACC, which in the exemplary embodiment is a 32-byte storage structure, may be implemented either in the data memory 515 or as a separate register. The steps comprising INIT may be implemented as either software, hardware, or firmware structures that may reside in the random number generator 560 (shown in FIGS. 2A and 2B). As will be described hereinbelow, the contents ofthe 32- byte ACC are initialized only once during the manufacture of a product or device embodying the present invention. It is also possible, however, to modify the ACC after the initialization, should a user desire to do so, by optionally adding, byte by byte, a pre-loaded value which may be entirely arbitrary, and may preferably comprise 32 bytes in size.
The ACC contents, which are sufficiently random to begin with, will be segmented regardless of the optional modification into sub-blocks which will be manipulated further based on random power-ups ofthe electronic data module 100 as will be described in detail in reference to FIG. 5. Continuing to refer to FIGS. 4 A and 4B, a decision step 651 allows a user to initiate his own, presumably proprietary, loading of a 8-bit data segment into a work space, Wl, as indicated in step 653. On the other hand, by taking the NO path from the decision step 651, it is understood that the initial loading is done by the manufacturer, as shown in step 652 where Wl is loaded with a sample provided by an 8-bit clock counter, for example, counter 45, of the real-time clock 30 (shown in FIG. 1). A second work space W2 is subsequently loaded with another 8-bit clock counter sample, as indicated in step 654. In step 655, a dummy variable NPRIME is initialized to zero, for subsequent computations. Step 656 is a composite step involving several actions. First, the contents of Wl are multiplied by the first 32 primes which are preferably stored in the data memory 515 (shown in FIGS. 2A, 2B and 2C). That is, Wl is multiplied by 1, 3, 5, 7, 11, 13 et cetera, the multiplications being performed by a modulo 256 machine. Then, these 8-bit products are provided to a CRC32 generator, byte by byte, such that after every four bytes thus provided thereto, the CRC32 generates a 4-byte result. This 4-byte result is then loaded into the ACC. Accordingly, after 8 such CRC32 operations, a full complement of 32 bytes are loaded into the ACC.
Still continuing to refer to FIGS. 4A and 4B, the contents ofthe 32-byte ACC are left-rotated by one bit with wraparound so that 32 carry flags ("CF"), one for each of the 32 bytes, are obtained as indicated in step 657. Two additional variables are defined in step 658 based on the 32 carry flag bits obtained in step 657. One local variable is denoted by n that is set to be equal to the number of l's among the 32 CF bits. The other local variable, rn, is set to be equal to the number of O's. If, on the other hand, m = 32 (that is, all 32 CF bits are O's only), then the value of n is set as 1 in the exemplary embodiment. Still continuing to refer to FIGS. 4 A and 4B, an intermediate value, N is computed as {n(|n-m|)+l }, as indicated in step 659. In step 660, the previously initialized NPRIME (in step 655) is then replaced by the value computed as (NPRIME+(N/δ) MOD 256} where δ is a constant. Favorable results have been obtained in a presently preferred exemplary embodiment using a value of 7 for δ. In step 661, the contents of the second work space, W2, is left-rotated, depending upon the three least significant bits ofthe contents of Wl . If all three are set, then W2 is left-rotated 7 times, and if none is set, it is not left-rotated at all. It should be noted herein that the resultant work space is denoted by W2PRIME, and these left- rotations are preferably circular rotations with wraparound.
In decision block 662, a decision is made based on if the bit 7 (b7) ofthe Wl work space is set. If b7 of Wl is set, then the contents of the second work space
W2PRIME are complemented, as indicated in step 664. In step 663, which is reached either after complementing the contents of W2PRIME, or by taking the NOT SET path from decision step 662, the contents ofthe dummy variable VPRIME are compared against the contents ofthe W2PRIME. If the value of VPRIME is less than the value of W2PRIME, then the flow control is passed back to step 657 wherein the contents of ACC are left-rotated once again. On the other hand, if the value of VPRIME is NOT less than the value of W2PRIME, then a pre-initialized loop counter is decremented as provided in step 665. If a pre-determined end of loop counter is reached, by taking the YES path from step 666, the flow control is passed to an optional step 653 wherein a user may optionally add, byte by byte preferably, a pre¬ loaded value to the contents ofthe ACC. Since this step 653 is preferably designed to be optional, it may be bypassed in the initialization process that occurs during the manufacture of a product or device embodying the present invention. From the contents ofthe ACC, regardless ofthe optional byte-by-byte addition, a subset ofthe first 28 bytes ofthe 32-byte ACC are either segmented into or otherwise designated as a plurality of sub-blocks, for example, a linear feedback shift register ("LFSR") of 4 bytes; an additive cyclic group register ("ACGR") of 4 bytes; a random accumulator ("RACC") of 16 bytes; and another register denoted as "GG" of 4 bytes, as provided in step 667. The remaining four bytes may be either discarded or stored for any additional use. If, on the other hand, the NO path is taken from the decision block 666, then the control is passed back to step 652 wherein the first work space Wl get loaded again with an 8-bit clock counter sample to start the initialization process all over again. As stated in the foregoing, this process is done preferably only once during the initial manufacture of the device embodying the present invention. However, two implementational options exist after a user acquires the device: first, preferably, the
INIT sub-process may be executed, starting with loading two clock samples into respective work spaces and manipulating the sample data until a 32-byte value is subsequently added to the pre-existing contents ofthe ACC, as in step 656; or, second, the clock data loading and subsequent data manipulation may be bypassed. Either way, however, the user has the option of adding a pre-selected value into the contents ofthe ACC, as provided in step 653.
It should be noted in reference to the foregoing that the outer loop involving a loop counter (that is, taking the NO path from decision block 666 back to step 652 where the first work space Wl gets loaded with a fresh 8-bit clock counter sample) is executed a fixed number of times depending on the initial value ofthe loop counter. In the exemplary embodiment, this value is chosen to be 16. Also, the time period between successive outer loops may be seen to be dependent upon the number of times the inner loop (that is, by taking the YES path from decision block 663 to step 657 where the contents ofthe ACC are left-rotated) and the cycle time associated therewith. Because of the coupling of the inherent uncertainness of these control loops, the resultant contents ofthe 32-byte ACC at the end are not only extremely unpredictable and but have a statistically well-distributed hamming weight. It can be readily appreciated that even a one-bit difference in any ofthe initially loaded samples will be radically amplified at the end of process such that values with extreme unpredictability are obtained.
Referring now to FIG. 5, therein is depicted an exemplary flow diagram for further enhancing the entropy of the 16-byte RACC contents by coupling the manipulation thereof to external stochastic events such as random power-ups ofthe exemplary electronic data module 100 (shown in FIG. 3). The sub-process, labeled as PWRUP 730, immediately leads to a decision block 731 where a decision is made as to whether or not there should be a delay before the real-time clock counter is sampled. By taking the NO path therefrom, STEP SG 732 is entered. SG is a sequence generator that is a combination ofthe 4-byte LFSR and the 4-byte ACGR obtained in the INIT sub-process as described in the foregoing. Basically, stepping the SG involves two events: the cycling ofthe ACGR wherein the GG value, which is held as a constant, is added to the value of ACGR using modular arithmetic; and the cycling ofthe LFSR by one step. Then, by using a sub-process GEN CB, a control byte ("CB") and associated flags are created in step 702. The GEN_CB 702 will be described in greater detail hereinbelow in specific reference to FIG. 6.
Continuing to refer to FIG. 5, the flow control is then passed to a decision block 733 where the status of one ofthe flags, Parity Flag ("PF"), is checked. This determination is employed in deciding how the 8-bit clock counter samples will be used in creating a work space called CLK, the contents ofwhich will be subsequently used how the contents ofthe 16-byte RACC will be manipulated. If PF is set then by taking the YES path from decision block 733, the CLK space is loaded with the result obtained from adding one 8-bit clock counter sample to the next one by modular arithmetic, as indicated in step 735. On the other hand, if the NO path is taken from decision block 733, then the CLK space is loaded with just the first 8-bit clock counter sample. In either case, step 736 is subsequently entered wherein the contents in one of the bytes ofthe 16-byte RACC are replaced by that byte's original contents added to the contents ofthe CLK space by modular arithmetic. Which byte ofthe 16-byte RACC is chosen for this purpose is determined by the right nibble of the control byte CB generated by the sub-process GEN_CB in step 702. In analogous fashion, in step 737, the contents of another byte ofthe 16-byte RACC are replaced by that byte's original contents XOR'ed to the contents ofthe CLK space. This time, however, which byte is chosen is determined by the left nibble of the control byte generated by the sub- process GEN_CB.
Referring back to the decision block 731, by taking the YES path therefrom, the sequence generator is stepped in step 739 as described in the foregoing. Then, a control byte, CB is created in step 740 (much the same way as in GEN_CB 702) without considering any associated flags. The contents ofthe CB are stored in a pre- determined location, as indicated in step 741. Subsequently stepping the sequence generator, as provided in step 742 and creating another control byte CB in step 743, a decision block 744 is entered. In decision block 744, arbitrarily selected 3 bits ofthe second CB generated in step 743 are compared with the same 3 bits ofthe stored CB in step 741. If the 3 -bit mask matches, the delay is set to ZERO, as provided in step 745. Otherwise, the control is passed back to step 742 where the sequence generator is stepped again for producing another control byte. Still continuing to refer to FIG. 5, after the delay is set to ZERO in step 745, the control is passed to step 732 for eventually replacing the contents of two bytes selected from the 16-byte RACC as described in the foregoing. It should be noted herein that although there is a possibility that the same two bytes may be selected for the aforementioned manipulation, that will not diminish the added entropy in the contents of the RACC. Accordingly, each time a power-up of the electronic data module, as contemplated in the present invention, is effectuated, the PWRUP 730 sub- process is executed thereby mixing additional randomization into the contents ofthe 16-byte RACC. FIG. 6 depicts an exemplary flow diagram used in the GEN_CB sub-process for generating a control byte on demand in accordance with the present invention. In step 751, the contents ofthe third byte ofthe LFSR are added to the contents ofthe second byte ofthe ACGR by modular arithmetic. The result is denoted as the control byte, CB. Based on this modular arithmetic addition, flags such as, for example, a Carry Flag ("CF'), a Parity Flag ("PF"), an Auxiliary Carry Flag ("ACF") and an OVerflow
Flag ("OVF") are set, as indicated in step 752. Subsequently, the delay status is checked in decision block 753 to determine if it is set or not. If the YES path is taken from the decision block 753, then the control is simply returned without further consideration ofthe flags set in step 752. On the other hand, if the delay is not set, then via successive determinations the respective status ofthe ACF and CF bits are checked to decide whether they are set or not, as provided in 754 and 755. If either is not set, then the control is simply returned again. If both are set, a further decision is made as provided in step 756 to check if bits 7 and 4 ofthe CB equal bits 1 and bits 0 ofthe 16- byte RACC. If they are not equal, the control is returned once again. Otherwise, the bits match between the CB and the RACC, and the delay flag is set as indicated in step
757. Subsequently, the control is returned to a location in the sub-process where GEN_CB is invoked. It can be appreciated that since only two bits are being compared between the CB and RACC, the delay flag is in general going to be set relatively rarely, and that the setting is based on multiple unpredictable events, such as, for example, the contents ofthe LFSR, or the ACGR and the contents ofthe lower order bytes in the
RACC. Referring now to FIGS. 7 A and 7B, therein is depicted an exemplary flow chart for a random byte request sub-process, RB YTEREQ 700, that generates a random byte on demand. A control byte, CB, is created by invoking the GEN_CB sub-process in step 702. Based on the contents ofthe bit locations 4, 5, and 6 ofthe CB, the contents of the RACC are left-rotated, as indicated in 703. For example, if all the three bit locations (b4, b5, and b7) are set in the CB, then the RACC is left-rotated 7 times. In step 704, a work space, COMBYTE, is loaded with the contents of a selected byte of the 16-byte RACC. Which RACC byte is selected is dependent upon the contents of the right nibble ofthe CB, that is, bO - b3. Subsequently, the b7 location ofthe CB is checked in decision block 705 to determine if it is set or not. If b7 ofthe CB is set, then by taking the YES path therefrom, the contents of COMBYTE are complemented, as indicated in step 710. If the b7 is not set, or subsequent to the complementing ofthe COMBYTE, either at least one or two stepping operations ofthe sequence generator are taken (as indicated in steps 707, 709, and 718), depending upon whether the ONF and CF are set or not, as determined by the decision blocks 706 and 708, respectively.
Accordingly, if both ofthe flags are set, then two stepping operations are undertaken via steps 707 and 709; and, if only one ofthe flags is set, or if neither ofthe flags is set, then, only one stepping operation is chosen. It is understood that the usage logic of these flags may be modified without substantially deviating from the teachings ofthe present invention. For example, the logic may also be implemented as follows: if both flags are set, then only one stepping operation is undertaken; otherwise, two stepping operations may be undertaken if neither flag is set, or, if either flag is set.
Continuing to refer to FIGS. 7 A and 7B, a work space, denoted by CHOSEΝ_BYTEl, is loaded with the contents of a selected byte ofthe 4-byte LFSR. As indicated in step 711, the exact byte that is selected is dependent on the contents of the bO and bl locations of the COMBYTE. Analogously, a second work space, denoted by CHOSEN_BYTE2, is loaded with the contents of a selected byte ofthe 4- byte ACGR. As indicated in step 712, the exact byte that is selected is dependent on the contents ofthe b2 and b3 locations ofthe COMBYTE. The contents ofthese two work spaces, CHOSEN_BYTEl and CHOSEN BYTE2, are further manipulated depending upon whether the b4 of COMBYTE is set or not, as determined in decision block 713. It the b4 bit is not set, then the contents ofthe CHOSEN BYTE1 are left- rotated, the rotation being dependent upon the b5, b6 and b7 ofthe CB, as indicated in step 714. Otherwise, the contents of the CHOSEN BYTE2 are left-rotated, the rotation again being dependent upon the b5, b6 and b7 ofthe CB, as indicated in step 715. Subsequently, a random byte, RNDMBYTE is returned whose contents are the result ofthe XOR operation between CHOSEN_BYTEl and CHOSEN_BYTE2, as provided in step 716.
Referring now to FIG. 8, therein is depicted an exemplary flow chart utilized for a sub-process RNDMPRM, for producing prime random numbers having a large bit field, preferably about 512 bits or more. As will be seen below in the description regarding FIG. 9, these large random primes will be used in generating encryption key sets in accordance with the teachings ofthe present invention.
After entering the RNDMPRM sub-process at 800, the RBYTEREQ sub- process, described in detail hereinabove in specific reference to FIGS. 7 A and 7B, is invoked several times, as provided in step 801. The exact number (denoted "n") preferably depends upon user needs, and in the exemplary embodiment, n equals 64, thereby producing 64 random bytes. These random bytes are then concatenated to produce a 512-bit number, which is denoted by P, as indicated in step 802. In accordance with the teachings ofthe present invention, the least significant bit and the two most significant bits of P are set, as shown in step 803.
Continunig to refer to FIG. 8, the RBYTEREQ sub-process is invoked again for a pre-determined number (denoted by "nprime") of times, as provided in step 805. It is preferred that nprime be less than n, and further, in the presently preferred exemplary embodiment, nprime is one less than n. These nprime bytes are then concatenated to produce another number, A, as also provided in step 805. In decision block 806, P is checked for primality by verifying the congruency of the following modular arithmetic equation: {A^ Mod P ≡ 1 }. If P is not prime, that is, A is a witness to the compositeness of P, then an even number, preferably 2, is added to P, as provided in step 807. Subsequently, a loop counter, preferably initialized to 50, is decremented and a pre-determined end of loop counter is tested in decision block 808.
If the pre-determined end of loop counter is not reached, then the control is passed back to generating another A by sequentially invoking the RBYTEREQ sub-process as in step 805. On the other hand, if P satisfies the primality condition in step 806, the control is simply returned.
FIG. 9 depicts an exemplary flow chart for a sub-process called KEYSET, for generating a set of encryption keys, usable preferably for the RSA encryption scheme.
Upon invoking the KEYSET sub-process, two large random primes of 64 bytes, P and Q, are created by invoking twice the RNDMPRM sub-process described hereinabove. A modulus, N, and an intermediate value, PHJ, are then computed as shown in step 902. N is equal to P times Q, whereas, PHI equals (P-l) times (Q-l). At this point, the user has an option to discard or otherwise dispose ofthe large random primes, P and
Q. In step 903, the RBYTEREQ sub-process is sequentially invoked again for a number of times such that the number is greater than n, the number of bytes in P and Q. In the presently preferred exemplary embodiment, the RBYTEREQ sub-process is sequentially invoked 65 times and the random bytes obtained therefrom are concatenated so that a 65-byte number, called a first exponent, D, as shown in 903. In step 904, the most significant bit and the least significant bit of D are set. A second exponent, E, which is simply the modular inverse of D, is computed by verifying the congruency ofthe following equation: {E.D ≡ 1 Mod (PHI)}, as provided in steps 905 and 906. It is understood that there are several known methods by which the congruency of this equation is verified, such as, for example, the extended Euclidian algorithm. In the exemplary embodiment, however, this computation is performed by using the binary extended greatest common divisor ("GCD") algorithm.
If, on the other hand, a modular inverse for D does not exist, then D is discarded or otherwise disposed of and the control passes back to creating a new D by invoking the RBYTEREQ sub-process as provided in step 903. Once E and D are computed, however, the intermediate value PHJ can be discarded and either E or D may be privatized by storing one ofthe exponents (denoted as private exponent) in the secure data memory 515 (shown in FIGS. 2 A, 2B, and 2C) such that access thereto is denied. On the other hand, any host or master, such as, for example, the host 10 (shown in FIG. 1) will be able to access the other exponent, denoted as public exponent and N. The encryption and decryption are straight-forward, as follows. If, for example, D is the private exponent and E is the public exponent, then the "encryption" key set comprises {E;N}, whereas the "decryption" key set comprises {D;N}. The host 10 can send an encrypted message to the electronic data module 100 (shown in FIG. 1) having the decryption key, D, stored internally thereto, by computing MEMod N, where M denotes the plaintext. The data module 100, upon receiving the ciphertext, C, can decrypt by computing CDMod N using the stored decryption key, D.
For providing a digital signature (S) to a message (M), S can be computed as {S = MDMod N} by a sender possessing the electronic data module with the private exponent. The digital signature may then be transmitted either in an encrypted mode or in a non-encrypted mode. The signature from the sender may be verified by an intended recipient by first decrypting the encrypted S itself, if necessary. Then, by computing {SEMod N} using the sender's public exponent, the recipient can see if it matches M, the message sent by the sender. If they match, then the signature is authentic, thereby precluding repudiation by the sender. It can be readily appreciated by those skilled in the art that the present invention as described in detail hereinabove provides an individualized portable data carrier having a virtually impenetrable communication system that is well-suited for applications requiring secrecy and authentication such as electronic-cash (e-cash) transactions. By providing a tamper-proof housing for the electronic data module, the privatized key exponent stored in the secure memory is unbreakable because of: (i) the extreme entropy admixed into the seed numbers that are used for generating key exponents and the associated modulus, and (ii) the inherent tremendous computational difficulty in computing a private exponent once its associated public exponent and the modulus are known. Although a preferred embodiment ofthe method and apparatus ofthe present invention has been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit ofthe invention as set forth and defined by the following claims. For example, the method of generating large random prime numbers may also be used in other public-key cryptosystems, such as, for example, the knapsack systems and the ElGamal scheme. Further, although the presently preferred exemplary embodiment discloses that the two primes, namely, P and Q, are the same size, it is not required that this condition be satisfied in order to practice the present invention. In a similar fashion, a low-exponent RSA scheme may also be used in accordance with the present invention without having to compute one ofthe large- valued exponents.

Claims

WHAT IS CLAIMED IS:
1. An electronic data module, comprising: a housing; a substrate disposed in said housing; and a monolithic semiconductor chip ofthe type having a one-wire interface, and further supporting an encryption key, said monolithic semiconductor chip being affixed to said substrate.
2. The electronic data module as recited in claim 1, wherein said housing further comprises: a first conductive surface; a second conductive surface; and an insulator, said insulator disposed between said first conductive surface and said conductive surface.
3. The electronic data module as recited in claim 1, further comprising: a plurality of memory locations for storing infoπnation; a first structure for generating information, said information being loadable into said plurality of memory locations; and a second structure for increasing entropy ofthe contents of a sub-group of said plurality of memory locations; a third structure for providing a segment of information upon demand, said segment of information being obtained from the contents of said sub-group of said plurality of memory locations.
4. The electronic data module as recited in claim 3, wherein said first structure further comprises: a cyclic redundancy check generator; and a real-time clock, said real-time clock having at least one counter, said at least one counter for providing at least one sample of information to said cyclic redundancy check generator.
5. The electronic data module as recited in claim 3, wherein said second structure further comprises: power-up means for powering said monolithic semiconductor chip via said one-wire interface; and means for manipulating the contents of said sub-group of said plurality of memory locations.
6. A method of generating a two-key encryption key set comprising a private component and a public component, the method comprising the steps of: generating a first random prime number; generating a second random prime number; producing a modulus by multiplying said first random number by said second random prime number; generating a first exponent by solving a first modular arithmetic equation; generating a second exponent, said second exponent being a modular inverse to said first exponent, by solving a second modular arithmetic equation; and securely storing at least one of said first exponent, said second exponent, and said modulus in at least one memory location.
7. The method of generating a two-key encryption key set as recited in claim 6, wherein said step of generating said first random prime number further comprises the steps of: generating a plurality of random segments of fixed length containing binary data; concatenating said plurality of random segments to thereby obtain a concatenated random number; and verifying that said concatenated random number is a prime by solving a third modular arithmetic equation.
8. The method of generating a two-key encryption key set as recited in claim 6, wherein said step of generating said second random prime number further comprises the steps of: generating a plurality of random segments of fixed length containing binary data; concatenating said plurality of random segments to thereby obtain a concatenated random number; and verifying that said concatenated random number is a prime by solving a third modular arithmetic equation.
9. A secure electronic data module, comprising: means for computing a key set having a first component and a second component, said key set corresponding to a two-key cryptosystem; and means for privatizing one of said first component and said second component.
10. The secure electronic data module as recited in claim 9, further comprising: means for generating large random prime numbers.
11. The secure electronic data module as recited in claim 10, wherein said means for generating large random prime numbers further comprises: means for creating random bytes of data upon demand; means for concatenating said random bytes of data thereby to produce a concatenated random number; and means for determining that said concatenated random number is a prime number.
12. The secure electronic data module as recited in claim 9, wherein said means for privatizing one of said first component and said second component further comprises: a plurality of battery-backed memory locations; means for writing one of said first component and said second component to said plurality of battery-backed memory locations; and means for denying access to the contents of said plurality of battery- backed memory locations after one of said first component and said second component is provided to said plurality of battery-backed memory locations.
PCT/US1996/011915 1995-07-20 1996-07-19 Method and apparatus for encryption key creation WO1997004395A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU67619/96A AU6761996A (en) 1995-07-20 1996-07-19 Method and apparatus for encryption key creation

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US127795P 1995-07-20 1995-07-20
US127995P 1995-07-20 1995-07-20
US127895P 1995-07-20 1995-07-20
US60/001,278 1995-07-20
US60/001,279 1995-07-20
US60/001,277 1995-07-20

Publications (1)

Publication Number Publication Date
WO1997004395A1 true WO1997004395A1 (en) 1997-02-06

Family

ID=27356886

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/US1996/011951 WO1997004376A1 (en) 1995-07-20 1996-07-19 Secure module with microprocessor and co-processor
PCT/US1996/011915 WO1997004395A1 (en) 1995-07-20 1996-07-19 Method and apparatus for encryption key creation
PCT/US1996/011952 WO1997004377A1 (en) 1995-07-20 1996-07-19 Single chip microprocessor, math co-processor, random number generator, real-time clock and ram having a one-wire interface
PCT/US1996/011953 WO1997004378A1 (en) 1995-07-20 1996-07-19 Microcircuit with memory that is protected by both hardware and software

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/US1996/011951 WO1997004376A1 (en) 1995-07-20 1996-07-19 Secure module with microprocessor and co-processor

Family Applications After (2)

Application Number Title Priority Date Filing Date
PCT/US1996/011952 WO1997004377A1 (en) 1995-07-20 1996-07-19 Single chip microprocessor, math co-processor, random number generator, real-time clock and ram having a one-wire interface
PCT/US1996/011953 WO1997004378A1 (en) 1995-07-20 1996-07-19 Microcircuit with memory that is protected by both hardware and software

Country Status (4)

Country Link
US (5) US5998858A (en)
EP (3) EP0852032A1 (en)
AU (4) AU6762196A (en)
WO (4) WO1997004376A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7545930B1 (en) 1999-09-01 2009-06-09 Ncr Corporation Portable terminal

Families Citing this family (284)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6219797B1 (en) 1993-02-09 2001-04-17 Dallas Semiconductor Corporation Microcontroller with selectable oscillator source
WO1997004376A1 (en) * 1995-07-20 1997-02-06 Dallas Semiconductor Corporation Secure module with microprocessor and co-processor
US5805702A (en) * 1995-09-29 1998-09-08 Dallas Semiconductor Corporation Method, apparatus, and system for transferring units of value
JPH1079000A (en) 1996-09-03 1998-03-24 Hitachi Ltd Program writable ic card
US6337909B1 (en) * 1996-10-10 2002-01-08 Certicom Corp. Generation of session keys for El Gamal-like protocols from low hamming weight integers
US5861662A (en) * 1997-02-24 1999-01-19 General Instrument Corporation Anti-tamper bond wire shield for an integrated circuit
US6704871B1 (en) * 1997-09-16 2004-03-09 Safenet, Inc. Cryptographic co-processor
US6708273B1 (en) * 1997-09-16 2004-03-16 Safenet, Inc. Apparatus and method for implementing IPSEC transforms within an integrated circuit
US6122738A (en) * 1998-01-22 2000-09-19 Symantec Corporation Computer file integrity verification
US6128741A (en) * 1998-03-05 2000-10-03 Rainbow Technologies, Inc. Compact transparent dongle device
US7028014B1 (en) * 1998-03-18 2006-04-11 Ascom Hasler Mailing Systems Tamper resistant postal security device with long battery life
US6775778B1 (en) * 1998-05-29 2004-08-10 Texas Instruments Incorporated Secure computing device having boot read only memory verification of program code
EP0964361A1 (en) * 1998-06-08 1999-12-15 International Business Machines Corporation Protection of sensitive information contained in integrated circuit cards
US6493825B1 (en) * 1998-06-29 2002-12-10 Emc Corporation Authentication of a host processor requesting service in a data processing network
US6418420B1 (en) * 1998-06-30 2002-07-09 Sun Microsystems, Inc. Distributed budgeting and accounting system with secure token device access
US6311270B1 (en) * 1998-09-14 2001-10-30 International Business Machines Corporation Method and apparatus for securing communication utilizing a security processor
FR2787900B1 (en) * 1998-12-28 2001-02-09 Bull Cp8 INTELLIGENT INTEGRATED CIRCUIT
US6182235B1 (en) 1998-12-30 2001-01-30 Dallas Semiconductor Corporation Microcontroller with a user configurable pulse width modulator
US6836847B1 (en) * 1999-03-05 2004-12-28 The Johns Hokins University Software protection for single and multiple microprocessor systems
US6820203B1 (en) * 1999-04-07 2004-11-16 Sony Corporation Security unit for use in memory card
US6298066B1 (en) 1999-04-14 2001-10-02 Maxim Integrated Products, Inc. Single wire bus interface for multidrop applications
US6519841B1 (en) * 1999-06-15 2003-02-18 Geneticware Co., Ltd. Method of IC packing/unpacking for preserving and updating data within the IC and the structure thereof
US6529884B1 (en) * 1999-07-14 2003-03-04 Lucent Technologies, Inc. Minimalistic electronic commerce system
US7006633B1 (en) * 1999-07-16 2006-02-28 Global Encryption Standard Corporation Global encryption system
DE19935286A1 (en) * 1999-07-27 2001-02-01 Deutsche Telekom Ag Process for the secure distributed generation of an encryption key
JP2001066989A (en) * 1999-08-31 2001-03-16 Fuji Xerox Co Ltd Unidirectional function generating method, unidirectional function generating device, certification device, authentication method and authentication device
JP3822768B2 (en) * 1999-12-03 2006-09-20 株式会社ルネサステクノロジ IC card manufacturing method
AU2001229547A1 (en) * 2000-01-18 2001-07-31 Sunrisetek, Llc Dual-sided, surface mountable integrated circuit package
US6414884B1 (en) * 2000-02-04 2002-07-02 Lucent Technologies Inc. Method and apparatus for securing electronic circuits
WO2001059544A2 (en) * 2000-02-14 2001-08-16 Rainbow Technologies B.V., Netherlands Security module system, apparatus and process
US6820105B2 (en) * 2000-05-11 2004-11-16 Cyberguard Corporation Accelerated montgomery exponentiation using plural multipliers
US6895506B1 (en) * 2000-05-16 2005-05-17 Loay Abu-Husein Secure storage and execution of processor control programs by encryption and a program loader/decryption mechanism
US7280663B1 (en) * 2000-05-22 2007-10-09 University Of Southern California Encryption system based on crossed inverse quasigroups
FR2810425A1 (en) * 2000-06-20 2001-12-21 Groupe Ecoles Telecomm Secure data transfer between processor and memory uses encryption and addition of electronic signature to prevent copying of data
JP2002014872A (en) * 2000-06-29 2002-01-18 Fujitsu Ltd Cipher controller
AU2001284667A1 (en) * 2000-07-25 2002-02-05 Dutec, Inc. System, device and method for comprehensive input/output interface between process or machine transducers and controlling device or system
US6986057B1 (en) 2000-08-07 2006-01-10 Dallas Semiconductor Corporation Security device and method
US6732266B1 (en) * 2000-08-28 2004-05-04 Advanced Micro Devices, Inc. Method and apparatus for reconfiguring circuit board and integrated circuit packet arrangement with one-time programmable elements
US6864802B2 (en) * 2000-09-01 2005-03-08 Ut-Battelle, Llc Wireless spread-spectrum telesensor chip with synchronous digital architecture
DE10058078C1 (en) * 2000-11-23 2002-04-11 Infineon Technologies Ag Integrated circuit with analyzer protection has gaps left by first group of conducting tracks in wiring plane and filled by second group of conducting tracks provided for protection of IC
US7058980B1 (en) * 2000-11-27 2006-06-06 Stmicroelectronics S.A. Device and method for protecting memory data against illicit access
US7215781B2 (en) * 2000-12-22 2007-05-08 Intel Corporation Creation and distribution of a secret value between two devices
US20020131592A1 (en) * 2001-03-16 2002-09-19 Harris Hinnant Entropy sources for encryption key generation
AUPR389801A0 (en) * 2001-03-22 2001-04-12 Eracom Pty Ltd An encryption module
AU785229B2 (en) * 2001-03-22 2006-11-23 Safenet Australia Pty Limited An encryption module
US7099970B1 (en) * 2001-04-03 2006-08-29 Electronic Label Technology, Inc. Apparatus and method to enhance a one-wire bus
US7133921B2 (en) * 2001-04-06 2006-11-07 Mks Instruments, Inc. Portable devices for different control interfaces
US6691141B2 (en) 2001-04-13 2004-02-10 Science Applications International Corp. Method and apparatus for generating random number generators
US6895518B2 (en) 2001-05-31 2005-05-17 Koninklijke Philips Electronics N.V. Power and frequency adjustable UART device
DE60142801D1 (en) * 2001-06-15 2010-09-23 St Microelectronics Sa INTEGRATED CIRCUIT WITH LOW POWER AND WIRE COMMUNICATION INTERFACE
DE10129241B4 (en) * 2001-06-18 2008-04-30 Infineon Technologies Ag Multifunctional calculator
CN1296854C (en) 2001-06-29 2007-01-24 安全系统有限公司 Security system and method for computers
JP2003023421A (en) * 2001-07-09 2003-01-24 C4 Technology Inc Encryption method, program thereof, recording medium recorded with the program, encryption device, decoding method, and decoder
US7139397B2 (en) * 2001-07-20 2006-11-21 Stmicroelectronics S.R.L. Hybrid architecture for realizing a random numbers generator
US20040124996A1 (en) * 2001-07-27 2004-07-01 James Andersen Data transmission apparatus and method
GB0118573D0 (en) * 2001-07-31 2001-09-19 Stonewood Electronics Ltd Flag stone
US6990471B1 (en) * 2001-08-02 2006-01-24 Oracle International Corp. Method and apparatus for secure electronic commerce
US6665782B2 (en) 2001-08-16 2003-12-16 International Business Machines Corporation Method and apparatus for preventing unauthorized access of memory devices
JP2003110587A (en) * 2001-09-30 2003-04-11 Yoshiki Mori Two-line bus type transmission method sharing power supply and data transmission and apparatus therefor
FR2831327B1 (en) * 2001-10-22 2004-06-25 Commissariat Energie Atomique MICRO OR NANO-ELECTRONIC COMPONENT COMPRISING AN ENERGY SOURCE AND MEANS FOR PROTECTING THE ENERGY SOURCE
US7490250B2 (en) * 2001-10-26 2009-02-10 Lenovo (Singapore) Pte Ltd. Method and system for detecting a tamper event in a trusted computing environment
US8189591B2 (en) * 2001-10-30 2012-05-29 Exar Corporation Methods, systems and computer program products for packet ordering for parallel packet transform processing
US20030081772A1 (en) * 2001-10-30 2003-05-01 Blaker David M. Parallel random number determinations for a stream cipher utilizing a common S-box
US7076663B2 (en) * 2001-11-06 2006-07-11 International Business Machines Corporation Integrated system security method
JP3904432B2 (en) * 2001-11-16 2007-04-11 株式会社ルネサステクノロジ Information processing device
GB2382420A (en) * 2001-11-22 2003-05-28 Ubinetics Ltd Method and apparatus for determining the modulo of non-power of two numbers
JP3673213B2 (en) * 2001-11-30 2005-07-20 株式会社東芝 Disk storage device and data erasing method applied to the same
DE10161874A1 (en) * 2001-12-14 2003-06-26 Bayerische Motoren Werke Ag Sound transmission device charges engine and holds membrane so that it can vibrate about defined central pressure in induction manifold
FR2834154B1 (en) * 2001-12-21 2005-03-11 Oberthur Card Syst Sa ELECTRONIC UNIT INCLUDING CRYPTOGRAPHIC MEANS CAPABLE OF PROCESSING HIGH-SPEED INFORMATION
US6865515B2 (en) * 2002-01-24 2005-03-08 Engius, L.L.C. Method and device for securely storing data
US20030154312A1 (en) * 2002-02-13 2003-08-14 International Business Machines Corporation Architecture for connection and aggregation of components within a rack
US6742061B1 (en) * 2002-03-08 2004-05-25 Nokia Corporation Accessory control interface
FR2837304B1 (en) * 2002-03-13 2004-05-28 Commissariat Energie Atomique SECURE ELECTRONIC DEVICE
AU2003225881A1 (en) * 2002-03-15 2003-09-29 Lynk Labs, Inc. Method and apparatus for wireless public internet access
US7899753B1 (en) 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US20030196081A1 (en) * 2002-04-11 2003-10-16 Raymond Savarda Methods, systems, and computer program products for processing a packet-object using multiple pipelined processing modules
US7519005B2 (en) * 2002-05-08 2009-04-14 Semtech Corp. Single-wire communication bus for miniature low-power systems
US7003713B2 (en) * 2002-05-16 2006-02-21 Broadcom Corporation Variable Hamming error correction for a one-time-programmable-ROM
AU2003231894A1 (en) * 2002-06-04 2003-12-19 Nds Limited Prevention of tampering in electronic devices
JP2004047596A (en) * 2002-07-10 2004-02-12 Renesas Technology Corp Method of manufacturing semiconductor device
WO2004008282A2 (en) * 2002-07-12 2004-01-22 Privaris, Inc. Personal authentication software and systems for travel privilege assignation and verification
US20060233364A1 (en) * 2002-07-29 2006-10-19 Jan Camenisch Fine-grained forward-secure signature scheme
DE10234973A1 (en) * 2002-07-31 2004-02-19 Giesecke & Devrient Gmbh Generate result values with a specified property
TWI236264B (en) * 2002-09-05 2005-07-11 Winbond Electronics Corp Single wire serial communication protocol method and circuit
US7200758B2 (en) * 2002-10-09 2007-04-03 Intel Corporation Encapsulation of a TCPA trusted platform module functionality within a server management coprocessor subsystem
KR100453821B1 (en) * 2002-10-09 2004-10-20 한국전자통신연구원 Data bus system for micro controller
US20060267194A1 (en) * 2002-10-15 2006-11-30 Sehat Sutardja Integrated circuit package with air gap
AU2002952106A0 (en) * 2002-10-15 2002-10-31 Silverbrook Research Pty Ltd Methods and systems (npw008)
US7512989B2 (en) * 2002-10-22 2009-03-31 Geocodex Llc Data loader using location identity to provide secure communication of data to recipient devices
DE10262035B4 (en) * 2002-10-29 2006-03-23 Oasis Silicon Systems Ag Intelligent network interface controller
US7231476B2 (en) * 2002-11-18 2007-06-12 Arm Limited Function control for a processor
US20040247116A1 (en) * 2002-11-20 2004-12-09 Boren Stephen Laurence Method of generating a stream cipher using multiple keys
US7111322B2 (en) 2002-12-05 2006-09-19 Canon Kabushiki Kaisha Automatic generation of a new encryption key
US20040109567A1 (en) * 2002-12-05 2004-06-10 Canon Kabushiki Kaisha Encryption key generation in embedded devices
US7200233B1 (en) 2002-12-10 2007-04-03 L-3 Communications Corporation System and method for fast data encryption/decryption using time slot numbering
KR101063119B1 (en) * 2002-12-18 2011-09-07 엔엑스피 비 브이 Array of MRAM cells and how to prevent unauthorized reads
US7712147B2 (en) * 2002-12-18 2010-05-04 Nxp B.V. Method and device for protection of an mram device against tampering
US6853093B2 (en) * 2002-12-20 2005-02-08 Lipman Electronic Engineering Ltd. Anti-tampering enclosure for electronic circuitry
EP1586016A1 (en) * 2003-01-10 2005-10-19 Philips Intellectual Property & Standards GmbH Circuit arrangement and method for protecting electronic components against illicit manipulation
US7042357B2 (en) * 2003-03-26 2006-05-09 Proximities, Inc. Non-reusable identification device
US7406100B2 (en) * 2003-05-21 2008-07-29 Atmel Corporation Bi-directional single wire interface
US7444668B2 (en) * 2003-05-29 2008-10-28 Freescale Semiconductor, Inc. Method and apparatus for determining access permission
WO2004109454A2 (en) * 2003-05-30 2004-12-16 Privaris, Inc. A man-machine interface for controlling access to electronic devices
US7286976B2 (en) * 2003-06-10 2007-10-23 Mentor Graphics (Holding) Ltd. Emulation of circuits with in-circuit memory
US7606955B1 (en) * 2003-09-15 2009-10-20 National Semiconductor Corporation Single wire bus for connecting devices and methods of operating the same
US7421462B2 (en) * 2003-11-12 2008-09-02 Hewlett-Packard Development Company, L.P. Method and apparatus for generating a random bit stream
DE10355790B4 (en) * 2003-11-26 2006-07-13 Senstronic Deutschland Gmbh Distributor for automation with a memory module therefor
FR2863746B1 (en) * 2003-12-10 2006-08-11 Innova Card INTEGRATED CIRCUIT PROTECTED BY ACTIVE SHIELD
US7243221B1 (en) * 2004-02-26 2007-07-10 Xilinx, Inc. Method and apparatus for controlling a processor in a data processing system
US7657755B2 (en) * 2004-03-23 2010-02-02 Harris Corporation Modular cryptographic device providing status determining features and related methods
US9003199B2 (en) * 2004-03-23 2015-04-07 Harris Corporation Modular cryptographic device providing multi-mode wireless LAN operation features and related methods
US20050213762A1 (en) * 2004-03-23 2005-09-29 Harris Corporation Modular cryptographic device and coupling therefor and related methods
US7711963B2 (en) * 2004-03-23 2010-05-04 Harris Corporation Modular cryptographic device providing enhanced interface protocol features and related methods
US7644289B2 (en) * 2004-03-23 2010-01-05 Harris Corporation Modular cryptographic device providing enhanced communication control features and related methods
US7877595B2 (en) * 2004-03-23 2011-01-25 Harris Corporation Modular cryptographic device and related methods
US8175345B2 (en) 2004-04-16 2012-05-08 Validity Sensors, Inc. Unitized ergonomic two-dimensional fingerprint motion tracking device and method
US8447077B2 (en) 2006-09-11 2013-05-21 Validity Sensors, Inc. Method and apparatus for fingerprint motion tracking using an in-line array
US8358815B2 (en) 2004-04-16 2013-01-22 Validity Sensors, Inc. Method and apparatus for two-dimensional finger motion tracking and control
US8229184B2 (en) 2004-04-16 2012-07-24 Validity Sensors, Inc. Method and algorithm for accurate finger motion tracking
US8131026B2 (en) 2004-04-16 2012-03-06 Validity Sensors, Inc. Method and apparatus for fingerprint image reconstruction
US20050257041A1 (en) * 2004-05-14 2005-11-17 Cory Wallenstein Method and apparatus for remote computer reboot
JP4276981B2 (en) * 2004-06-30 2009-06-10 株式会社リコー Serial communication apparatus, communication method thereof, and system apparatus using the serial communication apparatus
JP2006059100A (en) 2004-08-19 2006-03-02 Ricoh Co Ltd Serial communication system device
US8234686B2 (en) * 2004-08-25 2012-07-31 Harris Corporation System and method for creating a security application for programmable cryptography module
DE602005022900D1 (en) 2004-10-04 2010-09-23 Validity Sensors Inc FINGERPRINTER CONSTRUCTIONS WITH ONE SUBSTRATE
US7388493B2 (en) * 2004-10-08 2008-06-17 Bartronics America, Inc. Method and system for preventing unauthorized removal and use of an RFID apparatus
US7519763B2 (en) * 2004-10-21 2009-04-14 International Business Machines Corporation Apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device
JP2006128975A (en) * 2004-10-28 2006-05-18 Matsushita Electric Ind Co Ltd Semiconductor device
US20060117122A1 (en) * 2004-11-04 2006-06-01 Intel Corporation Method and apparatus for conditionally obfuscating bus communications
JP4367337B2 (en) * 2004-12-28 2009-11-18 セイコーエプソン株式会社 Multimedia processing system and multimedia processing method
US7607019B2 (en) * 2005-02-03 2009-10-20 Apple Inc. Small memory footprint fast elliptic encryption
FR2880972B1 (en) * 2005-01-14 2007-07-13 Noel Vogt ANTI-PIRATORY DEVICE FOR SECURING AND / OR PROTECTING DEVICES FORMED FROM A PLURALITY OF ELECTRONIC COMPONENTS
FR2880973A1 (en) * 2005-01-14 2006-07-21 Noel Vogt Electronic component e.g. RAM memory, protecting device for electronic device e.g. Sony Playstation type video game console, has detection unit to render electronic device unusable upon detecting attack and/or intended attack of component
US8065443B1 (en) * 2005-05-20 2011-11-22 Intermec Ip Corp Computerized device for data collection and communication
US9652637B2 (en) 2005-05-23 2017-05-16 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for allowing no code download in a code download scheme
US7587047B2 (en) * 2005-06-22 2009-09-08 Apple Inc. Chaos generator for accumulation of stream entropy
US7761773B2 (en) * 2005-06-30 2010-07-20 Sigmatel, Inc. Semiconductor device including a unique identifier and error correction code
US7562445B2 (en) * 2005-07-18 2009-07-21 Bartronics America, Inc. Method of manufacture of an identification wristband construction
US8127142B2 (en) * 2005-09-09 2012-02-28 University Of South Florida Method of authenticating a user on a network
ITTO20050623A1 (en) * 2005-09-14 2007-03-15 Indesit Co Spa APPLIANCES FOR THE TREATMENT OF TEXTILE ITEMS WITH DISPLACEMENT SENSOR
US7385491B2 (en) * 2005-09-28 2008-06-10 Itt Manufacturing Enterprises, Inc. Tamper monitor circuit
WO2007044540A2 (en) * 2005-10-05 2007-04-19 Tolli William D Electronic communication devices and methods
US7535356B2 (en) * 2005-11-29 2009-05-19 Bartronics America, Inc. Identification band using a conductive fastening for enhanced security and functionality
US20080013721A1 (en) * 2005-11-30 2008-01-17 Jing-Jang Hwang Asymmetric cryptography with discretionary private key
US7499552B2 (en) * 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
US20080088016A1 (en) * 2006-02-14 2008-04-17 Ming-Ling Ho Chip with bump structure
US9904809B2 (en) 2006-02-27 2018-02-27 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for multi-level security initialization and configuration
US9177176B2 (en) * 2006-02-27 2015-11-03 Broadcom Corporation Method and system for secure system-on-a-chip architecture for multimedia data processing
CA2682386A1 (en) * 2006-03-30 2007-11-01 Reserve Power Cell, Llc Battery monitoring, warranty, and performance tracking system
US9489318B2 (en) 2006-06-19 2016-11-08 Broadcom Corporation Method and system for accessing protected memory
US20100070549A1 (en) * 2006-06-20 2010-03-18 Nxp B.V. Random number generator system, method for generating random numbers
US8083808B2 (en) * 2006-07-12 2011-12-27 Tecsec, Inc. Container security
US7784691B2 (en) * 2006-12-08 2010-08-31 Verifone Inc. Security functionality for magnetic card readers and point of sales devices
US7497378B2 (en) * 2006-12-08 2009-03-03 Verifone, Inc. Anti-tampering protection for magnetic stripe reader
US7898413B2 (en) * 2007-01-25 2011-03-01 Verifone, Inc. Anti-tamper protected enclosure
US7826525B2 (en) * 2007-02-16 2010-11-02 Illinois Tool Works, Inc. Pulse-based communication for devices connected to a bus
US20080235513A1 (en) * 2007-03-19 2008-09-25 Microsoft Corporation Three Party Authentication
US8290150B2 (en) * 2007-05-11 2012-10-16 Validity Sensors, Inc. Method and system for electronically securing an electronic device using physically unclonable functions
US7782240B2 (en) * 2007-05-29 2010-08-24 Atmel Corporation Device and method of supplying power to targets on single-wire interface
US7723998B2 (en) * 2007-06-12 2010-05-25 Itt Manufacturing Enterprises, Inc. Integrated circuit protection and detection grid
US8472620B2 (en) * 2007-06-15 2013-06-25 Sony Corporation Generation of device dependent RSA key
US7843339B2 (en) 2007-08-27 2010-11-30 Verifone, Inc. Secure point of sale device employing capacitive sensors
US9704817B2 (en) * 2007-09-06 2017-07-11 Qortek, Inc. Integrated laser auto-destruct system for electronic components
US8489659B2 (en) * 2007-10-19 2013-07-16 Schneider Electric USA, Inc. Pseudorandom number generation
US8014976B2 (en) * 2007-10-24 2011-09-06 Microsoft Corporation Secure digital forensics
US7878397B2 (en) 2007-11-15 2011-02-01 Verifone, Inc. Enhanced security magnetic card reader especially useful in point of sale devices
US7812428B2 (en) * 2007-12-05 2010-10-12 Atmel Rousset S.A.S. Secure connector grid array package
US8204281B2 (en) 2007-12-14 2012-06-19 Validity Sensors, Inc. System and method to remove artifacts from fingerprint sensor scans
US8276816B2 (en) 2007-12-14 2012-10-02 Validity Sensors, Inc. Smart card system with ergonomic fingerprint sensor and method of using
US7772514B2 (en) * 2007-12-20 2010-08-10 Verifone, Inc. Capacitive user-interface switches
US8250127B2 (en) * 2008-01-07 2012-08-21 Aruba Networks, Inc. Harvesting entropy from trusted cryptographic sources
US8595514B2 (en) 2008-01-22 2013-11-26 Verifone, Inc. Secure point of sale terminal
US9013336B2 (en) 2008-01-22 2015-04-21 Verifone, Inc. Secured keypad devices
US8116540B2 (en) 2008-04-04 2012-02-14 Validity Sensors, Inc. Apparatus and method for reducing noise in fingerprint sensing circuits
US8607034B2 (en) * 2008-05-24 2013-12-10 Via Technologies, Inc. Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US8819839B2 (en) * 2008-05-24 2014-08-26 Via Technologies, Inc. Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
EP2146287B1 (en) * 2008-07-16 2012-01-25 STMicroelectronics (Rousset) SAS Interface between a two-wire bus and a single-wire bus
WO2010036445A1 (en) 2008-07-22 2010-04-01 Validity Sensors, Inc. System, device and method for securing a device component
BRPI0805784A8 (en) * 2008-10-22 2015-04-28 Tecvan Informatica Ltda IMPROVEMENTS INTRODUCED IN MAGNETIC CARD READING DEVICE WITH PROTECTION AGAINST THERMAL AND EXOTHERMIC CHEMICAL ATTACK AND PROCESS AND ASSEMBLY
US8391568B2 (en) 2008-11-10 2013-03-05 Validity Sensors, Inc. System and method for improved scanning of fingerprint edges
US8380989B2 (en) 2009-03-05 2013-02-19 Sybase, Inc. System and method for second factor authentication
US9209994B2 (en) * 2008-12-31 2015-12-08 Sybase, Inc. System and method for enhanced application server
US8903434B2 (en) * 2008-12-31 2014-12-02 Sybase, Inc. System and method for message-based conversations
US9100222B2 (en) * 2008-12-31 2015-08-04 Sybase, Inc. System and method for mobile user authentication
US8600122B2 (en) 2009-01-15 2013-12-03 Validity Sensors, Inc. Apparatus and method for culling substantially redundant data in fingerprint sensing circuits
US8278946B2 (en) 2009-01-15 2012-10-02 Validity Sensors, Inc. Apparatus and method for detecting finger activity on a fingerprint sensor
US8374407B2 (en) 2009-01-28 2013-02-12 Validity Sensors, Inc. Live finger detection
US20100199233A1 (en) * 2009-01-30 2010-08-05 Petunin Vladimir V Uniquely Marking Products And Product Design Data
US8432300B2 (en) * 2009-03-26 2013-04-30 Hypercom Corporation Keypad membrane security
US8971530B2 (en) * 2009-06-24 2015-03-03 Intel Corporation Cryptographic key generation using a stored input value and a stored count value
US9274553B2 (en) 2009-10-30 2016-03-01 Synaptics Incorporated Fingerprint sensor and integratable electronic display
US9336428B2 (en) 2009-10-30 2016-05-10 Synaptics Incorporated Integrated fingerprint sensor and display
US8452989B1 (en) * 2009-12-09 2013-05-28 Emc Corporation Providing security to an electronic device
US8421890B2 (en) 2010-01-15 2013-04-16 Picofield Technologies, Inc. Electronic imager using an impedance sensor grid array and method of making
US8866347B2 (en) 2010-01-15 2014-10-21 Idex Asa Biometric image sensing
US8791792B2 (en) 2010-01-15 2014-07-29 Idex Asa Electronic imager using an impedance sensor grid array mounted on or about a switch and method of making
US9666635B2 (en) 2010-02-19 2017-05-30 Synaptics Incorporated Fingerprint sensing circuit
US8716613B2 (en) 2010-03-02 2014-05-06 Synaptics Incoporated Apparatus and method for electrostatic discharge protection
US8358218B2 (en) 2010-03-02 2013-01-22 Verifone, Inc. Point of sale terminal having enhanced security
US8559180B2 (en) * 2010-03-23 2013-10-15 Alcatel Lucent Removable IC package stiffening brace and method
US8812875B1 (en) 2010-04-12 2014-08-19 Stephen Melvin Virtual self-destruction of stored information
US8275996B1 (en) 2010-04-12 2012-09-25 Stephen Waller Melvin Incremental encryption of stored information
US8429420B1 (en) 2010-04-12 2013-04-23 Stephen Waller Melvin Time-based key management for encrypted information
US8330606B2 (en) 2010-04-12 2012-12-11 Verifone, Inc. Secure data entry device
US9001040B2 (en) 2010-06-02 2015-04-07 Synaptics Incorporated Integrated fingerprint sensor and navigation device
US8405506B2 (en) 2010-08-02 2013-03-26 Verifone, Inc. Secure data entry device
US8331096B2 (en) 2010-08-20 2012-12-11 Validity Sensors, Inc. Fingerprint acquisition expansion card apparatus
JP2012074674A (en) * 2010-09-02 2012-04-12 Canon Inc Semiconductor integrated circuit device
FR2965648B1 (en) * 2010-09-30 2013-05-17 Ingenico Sa PROTECTIVE DEVICE, ELECTRONIC PAYMENT TERMINAL AND CORRESPONDING MAGNETIC READING HEAD.
US8593824B2 (en) 2010-10-27 2013-11-26 Verifone, Inc. Tamper secure circuitry especially for point of sale terminal
US8621235B2 (en) 2011-01-06 2013-12-31 Verifone, Inc. Secure pin entry device
US8594393B2 (en) 2011-01-26 2013-11-26 Validity Sensors System for and method of image reconstruction with dual line scanner using line counts
US8538097B2 (en) 2011-01-26 2013-09-17 Validity Sensors, Inc. User input utilizing dual line scanner apparatus and method
GB2489100A (en) 2011-03-16 2012-09-19 Validity Sensors Inc Wafer-level packaging for a fingerprint sensor
FR2974207B1 (en) * 2011-04-14 2013-05-24 In Webo Technologies METHOD AND SYSTEM FOR SECURING A SOFTWARE
EP2512061A1 (en) * 2011-04-15 2012-10-17 Hanscan IP B.V. System for conducting remote biometric operations
US9312400B2 (en) 2011-07-01 2016-04-12 Tyco Electronics Corporation Power harvesting device
US8884757B2 (en) 2011-07-11 2014-11-11 Verifone, Inc. Anti-tampering protection assembly
US8971536B2 (en) * 2011-07-21 2015-03-03 Vixs Systems, Inc. Balanced entropy random number generator
US10043052B2 (en) 2011-10-27 2018-08-07 Synaptics Incorporated Electronic device packages and methods
US9195877B2 (en) 2011-12-23 2015-11-24 Synaptics Incorporated Methods and devices for capacitive image sensing
US11144630B2 (en) 2011-12-30 2021-10-12 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US9467297B2 (en) 2013-08-06 2016-10-11 Bedrock Automation Platforms Inc. Industrial control system redundant communications/control modules authentication
US8971072B2 (en) 2011-12-30 2015-03-03 Bedrock Automation Platforms Inc. Electromagnetic connector for an industrial control system
US9600434B1 (en) 2011-12-30 2017-03-21 Bedrock Automation Platforms, Inc. Switch fabric having a serial communications interface and a parallel communications interface
US9727511B2 (en) 2011-12-30 2017-08-08 Bedrock Automation Platforms Inc. Input/output module with multi-channel switching capability
US9437967B2 (en) 2011-12-30 2016-09-06 Bedrock Automation Platforms, Inc. Electromagnetic connector for an industrial control system
US11314854B2 (en) 2011-12-30 2022-04-26 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US10834820B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Industrial control system cable
US9191203B2 (en) 2013-08-06 2015-11-17 Bedrock Automation Platforms Inc. Secure industrial control system
US10834094B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Operator action authentication in an industrial control system
US8868813B2 (en) 2011-12-30 2014-10-21 Bedrock Automation Platforms Inc. Communications control system with a serial communications interface and a parallel communications interface
US9785299B2 (en) 2012-01-03 2017-10-10 Synaptics Incorporated Structures and manufacturing methods for glass covered electronic devices
US9137438B2 (en) 2012-03-27 2015-09-15 Synaptics Incorporated Biometric object sensor and method
US9251329B2 (en) 2012-03-27 2016-02-02 Synaptics Incorporated Button depress wakeup and wakeup strategy
US9268991B2 (en) 2012-03-27 2016-02-23 Synaptics Incorporated Method of and system for enrolling and matching biometric data
US9600709B2 (en) 2012-03-28 2017-03-21 Synaptics Incorporated Methods and systems for enrolling biometric data
US9152838B2 (en) 2012-03-29 2015-10-06 Synaptics Incorporated Fingerprint sensor packagings and methods
EP2836960B1 (en) 2012-04-10 2018-09-26 Idex Asa Biometric sensing
FR2990203B1 (en) 2012-05-03 2014-09-12 Commissariat Energie Atomique ENCAPSULE ACTIVE ELEMENT COMPONENT AND IMPLANTABLE MEDICAL DEVICE COMPRISING SUCH A COMPONENT
US9691066B2 (en) 2012-07-03 2017-06-27 Verifone, Inc. Location-based payment system and method
US9235545B2 (en) 2012-08-03 2016-01-12 Microsoft Technology Licensing, Llc Single wire concurrent bi-directional communication for PSU
US8775691B1 (en) * 2012-12-18 2014-07-08 International Business Machines Corporation Detecting firmware version for an input/output adapter
US9076018B2 (en) * 2012-12-19 2015-07-07 Clevx, Llc Encryption key generation in encrypted storage devices
US9665762B2 (en) 2013-01-11 2017-05-30 Synaptics Incorporated Tiered wakeup strategy
US9710806B2 (en) 2013-02-27 2017-07-18 Fiserv, Inc. Systems and methods for electronic payment instrument repository
ES2523423B1 (en) * 2013-04-10 2015-11-24 Crypto Solutions, S.L. SYMMETRIC ENCRYPTION DEVICE AND EMPLOYED PROCEDURE
FR3004562A1 (en) * 2013-04-12 2014-10-17 Ingenico Sa SECURE CONNECTOR.
US9542156B2 (en) * 2013-05-15 2017-01-10 Synopsys, Inc. Automatic control system and method for a true random number generator
US10613567B2 (en) 2013-08-06 2020-04-07 Bedrock Automation Platforms Inc. Secure power supply for an industrial control system
US9800407B2 (en) * 2013-08-30 2017-10-24 Qualcomm Incorporated Methods and apparatuses for prime number generation and storage
US9213869B2 (en) 2013-10-04 2015-12-15 Verifone, Inc. Magnetic stripe reading device
US9651676B2 (en) 2013-10-09 2017-05-16 Samsung Electronics Co., Ltd. Digital real time clock monitor for a GNSS receiver and single pin signalling for power-on reset and wake-up interrupt
US9817670B2 (en) * 2013-12-13 2017-11-14 International Business Machines Corporation Framework to provide time bound execution of co-processor commands
US10282269B2 (en) 2013-12-18 2019-05-07 Qorvo Us, Inc. Read technique for a bus interface system
US9680647B2 (en) * 2014-03-24 2017-06-13 Infineon Technologies Ag Method of using a token in cryptography
US20160026275A1 (en) 2014-07-23 2016-01-28 Verifone, Inc. Data device including ofn functionality
EP3051411B1 (en) * 2015-01-27 2018-05-16 Neopost Technologies Hardware non-deterministic random byte generator
US10375070B2 (en) * 2015-04-20 2019-08-06 Certicom Corp. Generating cryptographic function parameters from compact source code
US10361844B2 (en) 2015-04-20 2019-07-23 Certicom Corp. Generating cryptographic function parameters based on an observed astronomical event
US9595174B2 (en) 2015-04-21 2017-03-14 Verifone, Inc. Point of sale terminal having enhanced security
USD776664S1 (en) * 2015-05-20 2017-01-17 Chaya Coleena Hendrick Smart card
US9891183B2 (en) 2015-07-07 2018-02-13 Nxp B.V. Breach sensor
US9929858B2 (en) * 2015-09-21 2018-03-27 Nxp B.V. Method and system for detecting fault attacks
CN108780489B (en) * 2015-11-03 2022-09-30 Ictk控股有限公司 Identification key generation device and method
US20170161527A1 (en) * 2015-12-04 2017-06-08 Lockheed Martin Corporation Systems and methods of protecting intellectual property
US10698847B2 (en) 2016-03-01 2020-06-30 Qorvo Us, Inc. One wire bus to RFFE translation system
US10579128B2 (en) 2016-03-01 2020-03-03 Qorvo Us, Inc. Switching power supply for subus slaves
CN107066235B (en) * 2017-04-24 2021-05-14 北京华大信安科技有限公司 Calculation method and device
US10740499B2 (en) 2018-03-12 2020-08-11 Nuvoton Technology Corporation Active shield portion serving as serial keypad
DE102018208851A1 (en) * 2018-06-05 2019-12-05 Infineon Technologies Ag Apparatus and method for converting input bit strings
US10544923B1 (en) 2018-11-06 2020-01-28 Verifone, Inc. Devices and methods for optical-based tamper detection using variable light characteristics
US10599601B1 (en) * 2019-01-16 2020-03-24 Qorvo Us, Inc. Single-wire bus (SuBUS) slave circuit and related apparatus
US11119958B2 (en) 2019-04-18 2021-09-14 Qorvo Us, Inc. Hybrid bus apparatus
US11226924B2 (en) 2019-04-24 2022-01-18 Qorvo Us, Inc. Single-wire bus apparatus supporting slave-initiated operation in a master circuit
US10706800B1 (en) * 2019-07-02 2020-07-07 A.U. Vista, Inc. Bendable flexible active matrix display panel
US11761733B1 (en) 2019-09-19 2023-09-19 Todd Philip Meyrath Single-wire communications system for device operation and calibration
US10983942B1 (en) 2019-12-11 2021-04-20 Qorvo Us, Inc. Multi-master hybrid bus apparatus
CN113437639B (en) * 2020-03-20 2022-11-18 中国科学院半导体研究所 Near-degenerate multimode microcavity laser, random number generation device and application
US11409677B2 (en) 2020-11-11 2022-08-09 Qorvo Us, Inc. Bus slave circuit and related single-wire bus apparatus
US11489695B2 (en) 2020-11-24 2022-11-01 Qorvo Us, Inc. Full-duplex communications over a single-wire bus
US11906256B2 (en) 2021-06-23 2024-02-20 Darryl Satten Digital recording of firearm identification
CN113378119B (en) * 2021-06-25 2023-04-07 成都卫士通信息产业股份有限公司 Software authorization method, device, equipment and storage medium
US11706048B1 (en) 2021-12-16 2023-07-18 Qorvo Us, Inc. Multi-protocol bus circuit

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4853884A (en) * 1987-09-11 1989-08-01 Motorola, Inc. Random number generator with digital feedback
US5045675A (en) * 1989-05-15 1991-09-03 Dallas Semiconductor Corporation Serial port interface to low-voltage low-power data module
US5117380A (en) * 1989-03-15 1992-05-26 Oki Electric Industry Co., Ltd. Random number generator driven by independent clock pulses asynchronously with system clock pulses
US5228084A (en) * 1991-02-28 1993-07-13 Gilbarco, Inc. Security apparatus and system for retail environments
US5323338A (en) * 1990-02-22 1994-06-21 Enfranchise Sixty Limited Pseudo-random sequence generators

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4145760A (en) * 1978-04-11 1979-03-20 Ncr Corporation Memory device having a reduced number of pins
US4249034A (en) * 1978-11-27 1981-02-03 General Electric Company Semiconductor package having strengthening and sealing upper chamber
US4405826A (en) * 1981-09-24 1983-09-20 Allen-Bradley Company Enclosure sealing well construction
JPS58158950A (en) * 1982-03-16 1983-09-21 Nec Corp Semiconductor device
NL8202547A (en) * 1982-06-23 1984-01-16 Philips Nv METHOD FOR GENERATING A PSEUDO-RANDOM SERIES OF LARGE SERIES LENGTHS
DE3483410D1 (en) * 1983-10-14 1990-11-22 Toshiba Kawasaki Kk ONE-CHIP MICROCOMPUTER WITH LOCKABLE FUNCTION OF THE PROGRAM MEMORY.
US4633388A (en) * 1984-01-18 1986-12-30 Siemens Corporate Research & Support, Inc. On-chip microprocessor instruction decoder having hardware for selectively bypassing on-chip circuitry used to decipher encrypted instruction codes
US4823308A (en) * 1984-02-02 1989-04-18 Knight Technology Ltd. Microcomputer with software protection
US4577056A (en) * 1984-04-09 1986-03-18 Olin Corporation Hermetically sealed metal package
US4747139A (en) * 1984-08-27 1988-05-24 Taaffe James L Software security method and systems
JPS6297355A (en) * 1985-10-23 1987-05-06 Toshiba Corp Hermetic seal type semiconductor
GB2182467B (en) * 1985-10-30 1989-10-18 Ncr Co Security device for stored sensitive data
US4996411A (en) * 1986-07-24 1991-02-26 Schlumberger Industries Method of manufacturing a card having electronic memory and a card obtained by performing said method
US5134460A (en) * 1986-08-11 1992-07-28 International Business Machines Corporation Aluminum bump, reworkable bump, and titanium nitride structure for tab bonding
JPS6345826A (en) * 1986-08-11 1988-02-26 インターナショナル・ビジネス・マシーンズ・コーポレーシヨン Connection structure of semiconductor integrated circuit device
US4927505A (en) * 1988-07-05 1990-05-22 Motorola Inc. Metallization scheme providing adhesion and barrier properties
US5155299A (en) * 1988-10-05 1992-10-13 Olin Corporation Aluminum alloy semiconductor packages
US4933898A (en) * 1989-01-12 1990-06-12 General Instrument Corporation Secure integrated circuit chip with conductive shield
US5210846B1 (en) * 1989-05-15 1999-06-29 Dallas Semiconductor One-wire bus architecture
FR2651347A1 (en) * 1989-08-22 1991-03-01 Trt Telecom Radio Electr SINGLE NUMBER GENERATION METHOD FOR MICROCIRCUIT BOARD AND APPLICATION TO COOPERATION OF THE BOARD WITH A HOST SYSTEM.
US5027397A (en) * 1989-09-12 1991-06-25 International Business Machines Corporation Data protection by detection of intrusion into electronic assemblies
FR2653914A1 (en) * 1989-10-27 1991-05-03 Trt Telecom Radio Electr SYSTEM FOR AUTHENTICATING A MICROCIRCUIT CARD BY A PERSONAL MICROCOMPUTER, AND METHOD FOR ITS IMPLEMENTATION
US5619066A (en) * 1990-05-15 1997-04-08 Dallas Semiconductor Corporation Memory for an electronic token
US5053992A (en) * 1990-10-04 1991-10-01 General Instrument Corporation Prevention of inspection of secret data stored in encapsulated integrated circuit chip
US5175609A (en) * 1991-04-10 1992-12-29 International Business Machines Corporation Structure and method for corrosion and stress-resistant interconnecting metallurgy
US5072331A (en) * 1991-04-26 1991-12-10 Hughes Aircraft Company Secure circuit structure
US5297099A (en) * 1991-07-10 1994-03-22 Dallas Semiconductor Corp. Integrated circuit with both battery-powered and signal-line-powered areas
EP0529503A1 (en) * 1991-08-22 1993-03-03 Hewlett-Packard Company Flexible attachment flip-chip assembly
JP3141364B2 (en) * 1992-05-06 2001-03-05 住友電気工業株式会社 Semiconductor chip
JPH06236447A (en) * 1993-02-09 1994-08-23 Mitsubishi Electric Corp Microcomputer for ic card
US5514946A (en) * 1993-03-19 1996-05-07 Compaq Computer Corp. Battery pack including static memory and a timer for charge management
US5339222A (en) * 1993-04-06 1994-08-16 The Whitaker Corporation Shielded printed circuit card holder
US5420460A (en) * 1993-08-05 1995-05-30 Vlsi Technology, Inc. Thin cavity down ball grid array package based on wirebond technology
JP3361881B2 (en) * 1994-04-28 2003-01-07 株式会社東芝 Semiconductor device and manufacturing method thereof
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
JP3238011B2 (en) * 1994-07-27 2001-12-10 株式会社東芝 Semiconductor device
US5559889A (en) * 1995-03-31 1996-09-24 International Business Machines Corporation System and methods for data encryption using public key cryptography
US5574628A (en) * 1995-05-17 1996-11-12 The Whitaker Corporation Rigid PCMCIA frame kit
WO1997004376A1 (en) * 1995-07-20 1997-02-06 Dallas Semiconductor Corporation Secure module with microprocessor and co-processor
US5548485A (en) * 1995-09-29 1996-08-20 Itt Corporation IC card rigidized cover
JP2828055B2 (en) * 1996-08-19 1998-11-25 日本電気株式会社 Flip chip manufacturing method
US5903721A (en) * 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US6003135A (en) * 1997-06-04 1999-12-14 Spyrus, Inc. Modular security device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4853884A (en) * 1987-09-11 1989-08-01 Motorola, Inc. Random number generator with digital feedback
US5117380A (en) * 1989-03-15 1992-05-26 Oki Electric Industry Co., Ltd. Random number generator driven by independent clock pulses asynchronously with system clock pulses
US5045675A (en) * 1989-05-15 1991-09-03 Dallas Semiconductor Corporation Serial port interface to low-voltage low-power data module
US5323338A (en) * 1990-02-22 1994-06-21 Enfranchise Sixty Limited Pseudo-random sequence generators
US5228084A (en) * 1991-02-28 1993-07-13 Gilbarco, Inc. Security apparatus and system for retail environments

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"SOFT MICROCONTROLLER DATA BOOK", 6 October 1993, DALLAS SEMICONDUCTOR, DALLAS, US, XP002020287 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7545930B1 (en) 1999-09-01 2009-06-09 Ncr Corporation Portable terminal

Also Published As

Publication number Publication date
EP0850440A1 (en) 1998-07-01
US20010011353A1 (en) 2001-08-02
US6219789B1 (en) 2001-04-17
AU6502896A (en) 1997-02-18
US6412072B2 (en) 2002-06-25
EP0852032A1 (en) 1998-07-08
WO1997004377A1 (en) 1997-02-06
US5998858A (en) 1999-12-07
US5832207A (en) 1998-11-03
AU6762196A (en) 1997-02-18
AU6761996A (en) 1997-02-18
EP0839344A1 (en) 1998-05-06
AU6762296A (en) 1997-02-18
WO1997004378A1 (en) 1997-02-06
WO1997004376A1 (en) 1997-02-06
US5850450A (en) 1998-12-15

Similar Documents

Publication Publication Date Title
US5850450A (en) Method and apparatus for encryption key creation
US5414772A (en) System for improving the digital signature algorithm
Kapoor et al. Elliptic curve cryptography
EP0634038B1 (en) A cryptographic communications method and system
M'Raihi et al. Hotp: An hmac-based one-time password algorithm
Wu Remote login authentication scheme based on a geometric approach
US5799088A (en) Non-deterministic public key encrypton system
EP0202768B1 (en) Technique for reducing rsa crypto variable storage
EP0963635B1 (en) Cyclotomic polynomial construction of discrete logarithm cryptosystems over finite fields
US6226382B1 (en) Method for implementing a private-key communication protocol between two processing devices
JP3558488B2 (en) Cryptographic communication system
US9852572B2 (en) Cryptographic token with leak-resistant key derivation
WO2005036811A2 (en) Data converter
KR20000057713A (en) Method and system for securely handling information between two information processing devices
US8090097B2 (en) Device, system and method for cryptographic key exchange
M'Raihi et al. RFC 4226: HOTP: An HMAC-based one-time password algorithm
US5007083A (en) Secure computer
US8098815B2 (en) Device, system and method for cryptographic key exchange
US20030165238A1 (en) A method for encoding long messages for electronic signature schemes based on rsa
Ramkumar Trustworthy computing under resource constraints with the DOWN policy
CN100492402C (en) Double-interface electronic key
AU7659598A (en) Pseudo-random generator based on a hash coding function for cryptographic systems requiring random drawing
US20020188850A1 (en) Method for accelerated transmission of electronic signature
Sarkar A sketch of modern cryptology
Kim et al. Design on mobile secure electronic transaction protocol with component based development

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase