CN1303553A - 配置与登记密码设备的电路和方法 - Google Patents
配置与登记密码设备的电路和方法 Download PDFInfo
- Publication number
- CN1303553A CN1303553A CN98811411A CN98811411A CN1303553A CN 1303553 A CN1303553 A CN 1303553A CN 98811411 A CN98811411 A CN 98811411A CN 98811411 A CN98811411 A CN 98811411A CN 1303553 A CN1303553 A CN 1303553A
- Authority
- CN
- China
- Prior art keywords
- encryption device
- key
- volatile memory
- private key
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Abstract
一种用于配置和登记密码设备(150)的系统和方法,配置状态包含将设备编号(DSER)和对称钥匙(SK)加载到密码设备(150)的非挥发性存贮器(215)中。非挥发性存贮器(215)被集成在密码设备(150)的处理逻辑内。DSER由外部源提供而SK在密码设备(150)内生成,登记状态包含提供DSER给数据库(415,420),其中包含与每台所制造的密码设备(150)有关的密码信息。密码信息包括至少一个公共钥匙和一个用SK加密的私人钥匙。DSER用于安置相应的密码信息,以便将密码信息发送到具有密码设备(150)的一个电子系统。
Description
发明背景
1.发明领域
本发明涉及密码领域。更具体而言,本发明涉及用于配置与登记密码设备的电路和方法。
2.与本发明有关的现有技术的描述
当前,许多个人正在利用个人计算机用数字格式存贮和发送敏感信息(例如,机密的、专有的,等),例如,信用卡帐户信息有时可在互联网上被传送供购物和/或服务。同样,利用在线银行传送银行帐号和银行帐户馀额。由于这种信息的敏感性质,已经采取措施在计算机的物理边界外部保护该信息的“完整性”;也就是,保证没有授权的情况下不变更信息。然而,这样的措施不能保护计算机内的信息。
正如在转让给Intel公司,本发明的受让人的美国专利NO.5,539,828中所描述的那样,可通过利用保密硬件来保护计算机内的信息。该保密硬件包括一个集成电路(IC)包,含有处理逻辑和专用的,在IC包中的非挥发性(NV)存贮器(称为“设备NV存贮器”)。典型情况下,该密码硬件在制造设备上经受一种穷举的配置阶段,其中设备NV存贮器被配置成包含为密码设备的安全功能必要的唯一的密码信息,例如,公共/私人钥匙对和数字证书。
当密码技术更加先进时,这种类型的结构将会觉得有些不足。一个缺点是需要较大,较贵的包,因为为了存贮较大数量的密码信息需要较大数量的设备NV存贮器。因此,支持位于系统其它地方,在此称为“系统NV存贮器的NV存贮器,大大减少位于密码设备中的NV存贮器数量是有成本效率的。系统NV存贮器的例子包括硬盘,位于母板或子卡上的NV存贮器,等。
当前,不可能使用系统NV存贮器。原因是为保证用对某个密码硬件唯一的密码信息配置与编程的系统NV存贮器将在具有密码硬件的电子系统内实现,一种可靠的,有成本效率的技术还未开发出来。
发明概述
一种用于配置和/或登记密码设备的方法,关于配置设计的一种实施方案,设备编号被装入该密码设备的非挥发性存贮器。该密码设备的内部,生成一种钥匙并被加载到密码设备的非挥发性存贮器中。
附图简述
通过以下的本发明详述将使本发明的特征与优点变得更明显,其中:
图1是用作说明的一个电子系统的方框图,包括作为一个桥路部件应用的多片模块;
图2是最适合作为图1的桥路部件示出的多片模块最佳实施方案的方框图;
图3是用作说明的一个包括密码设备的图1中的处理子系统实施方案;
图4是用作说明的一种图3基板的实施方案;
图5是由图2的密码设备执行的配置方案流程图;
图6是由图2的密码设备执行的登记方案流程图。
最佳实施方案描述
本发明涉及用于利用非常驻,非挥发性(NV)存贮器配置密码设备和从远处登记密码设备的系统与技术,在以下的描述中,某些术语通常被用来描述本发明的某些特性。例如,“电子系统”通常被定义为具有信息处理功能的任何硬件产品,例如,计算机,传真机和打印机。“信息”通常被定义为一位或多位数据,地址,和/或控制信息。
另外,以下的术语被用于识别不同类型的密码信息。“钥匙”是一种由常规的密码功能使用的编码和/或解码参数,例如对称钥匙密码功能(例如,基于数据密码标准“DES”的功能)或公共钥匙密码功能(例如,基于Rivest,Shamir和Adleman(RSA)的功能)。“数字证书”通常被定义为用于用户证明的任何信息(例如,公共钥匙)。用证明授权的私人钥匙(PRKCA)对信息编码,授权者也就是任何个人或者处于信托地位担保或保证数字证明的任何实体,例如银行,政府部门,贸易社团,原始设备制造商,等。
参考图1,示出一个用作说明的应用本发明的电子系统100的实施方案。在此实施方案中,电子系统100包括将许多子系统互连的片组110。这些子系统的例子可以包括,但并不限于,处理子系统120,存贮器子系统130,输入/输出(I/O)子系统140。这些子系统120,130和140合起来控制电子子系统100的功能。
更具体而言,作为一个用作说明的实施方案,处理子系统120包括至少一个中央处理单元(CPU)121。CPU121通过主总线122连到片组110。存贮器子系统130通常包括一个或多个挥发性存贮器组(未示出),例如任何类型的动态随机存取存贮器(DRAM),和/或静态随机存取存贮器(SRAM)。然而,打算,系统NV存贮器可被用于存贮器子系统130替代或补充挥发性存贮器。
而且,I/O子系统140包括“n”个连到I/O总线142的外围设备1411-141n(n是一个正整数),外围设备的例子包括大容量存贮设备1411(例如,硬盘驱动器,数字带驱动器,软盘驱动器,和数字多用途盘“DVD”播放器)。
为了提供保密功能,保密设备150可通过专用总线160连到片组110。当然,作为一种替代的系统实施方案,密码设备150可被放置为与计算机100中任何总线通信,例如主总线121或另一个基于处理器的总线,如后部总线(未示出),或也许是I/O总线142。
参考图2,示出一种用作说明的图1中的密码设备150的实施方案,密码设备150包括一个集成电路(IC)设备200,包含在一个保护IC设备200免受危险和有害污染的封套205内。IC设备200包括与少量设备NV存贮器215集成在一起的处理单元210,作为选项,随机数发生器220可被制作在封套205内作为一个分离设备通过内部总线225(如图所示)连到处理单元210或者集成在处理单元210内。当密码设备150在配置模式中工作时,随机数发生器220被用于产生一个或多个钥匙。
虽然示于图2中的密码设备150的实施方案可作为一个协处理器来实现,然而可以选择各种各样的不同实施方案。例如,密码设备150可被实现在一个盘控制器内,在一个“智能”卡上(部分像信用卡形状但具有微控制器的形式),或者在包括CPU121的盒式处理器封套内,如以下图3-4中所示。其它的替代实施方案可以包括将密码设备的功能并入片组或CPU121内。
参考图3,示出将密码设备150实现在处理子系统120内的一种替代的系统实施方案的透视图。IC部件(包括密码设备150)被安放在由任何类型的材料组成的处理器基板300上,IC部件(未示出)可通过熟知的技术(例如焊接,等)贴附在上面。处理器基板300大部分由一个矩形封套310盖住,以便保护IC部件免受危险或有害污染,处理器基板300包括连接器320,最好适合于例如,建立与母板的机械和电气连接。正如所示,连接器320可以包括一个标准的公的边缘连接器(如图所示)或也许是一个母的边缘连接器。
如图4中所示,处理器基板300中的IC部件包括,但并不限于,CPU121,存贮器330和密码器150。为了与CPU121通信,密码设备150可以放在(ⅰ)后部总线上,通常与存贮器330相连,(ⅱ)前部总线上,通常与外部连接器320相连,或者(ⅲ)专用内部总线上。当然,只要执行时间和其它必不可少的条件被保持,这种密码设备150的安放是随意的。虽然未示出,分立元件(例如,电容,振荡器,电阻,电感,等)以一种有选择的方式贴附在处理器基板300上,特别是要最大限度地提高路由能力并减少这些IC部件之间的通信线路的长度。
现在参考图5,示出一种由密码设备使用的配置方案的最佳实施方案。在制造时,密码设备经受一种配置状态,以便仅将有限数量的密码信息加载到它的集成化的设备NV存贮器中,对于这种配置状态的一种实施方案包括使用一种证明系统,包括(ⅰ)具有一种尺寸容纳下密码设备的设备载体的编程机构,和(ⅱ)从编程机构接收密码信息的数据库(例如,服务器,个人计算机,主帧,等)。为了避免使本发明含糊不清,将只描述编程机构的功能操作。
当接通时,编程机构开始供电并通过设备载体将预定的控制信息提供给密码设备的相应引线。这种控制信息将密码设备放入配置模式(步骤400)。在放入配置模式以后,密码设备开始从编程机构接收唯一的设备串号(DSER)(步骤405)。通常利用足够数量的位以避免重复(例如,32或64位),DSER被存贮在密码设备的集成化设备NV存贮器中并提供给数据库(步骤410)。DSER被数据库用作指针表的索引。每个指针负责对存贮器中一个或多个位置寻址,包含与由它的DSER识别的密码设备唯一有关的密码信息。
此外,通过对密码设备供电,随机数发生器被供电,产生随机数用于生成唯一的对称钥匙(SK)和公共/私人钥匙对(步骤415)。公共钥匙(PUK)被输出到数据库未经受任何修改(步骤420)。然而,私人钥匙(PRK)被利用密码算法加密(例如,预加载在密码设备的存贮器中的DES),然后,输出到数据库(步骤425)。更具体而言,PRK在输出到数据库以前用SK加密(产生ESK(PRK))。结果,密码设备包含最少数量的密码信息,也就是SK和DSER,而数据库中被检索的位置包括大多数的密码信息。
有时,如虚线所示,可以设想,与PUK和DSER有关的数字证书可在稍后的时间里装入数据库,甚至在密码设备已被送到原始设备制造商(OEM)以供放入电子系统(步骤430)以后。数字证书包括至少用在本实施方案中的制造商的私人钥匙加密的PUK,可用作密码设备的后续授权。然而,可以设想,DSER可被包括在数字证书中。
在密码设备已经装入具有足够系统NV存贮器的电子系统以后,可为登记的目的建立到制造商数据库的通信。这种登记方案不需要安全的通信信道,因为PRK已被加密。可由任何下游用户执行登记,包括装运电子系统到最终用户以前的OEM,或者最终用户,对于后一种情况,电子系统可用具有登记子程序的系统软件来加载。在由系统软件对电子系统初始化期间,登记子程序可帮助建立与数据库的通信,以便恢复和下载对电子系统唯一的密码信息。这种登记方案对于最终用户可以是透明的或者在与某些项目和条件的符合方面要求最终用户有效参与(例如,解除制造商的责任,等)。
现在参考图6,示出一种在制造商的数据库与下游用户(OEM,最终用户,等)之间登记方案的实施方案。首先,在数据库与用密码设备实现的电子系统之间必须建立通信信道(步骤600)。这可以通过专用电话线路在互联网或者在任何其它的通信链路上实现。接着,电子系统将包括从它的密码设备得到的DSER的消息在通信信道上发送到数据库(步骤605)。数据库接收此消息并利用DSER作为索引,搜索与由DSER识别的密码设备有关的密码信息(步骤610)。这种密码信息(PUK,ESX(PRK),和数字证书)被在通信信道上发送到电子系统并加载到电子系统的系统NV存贮器中(步骤615-620)。因此,现在密码设备完全有功能去支持公共钥匙加密,因为它具有对它的PUK和PRK的入口,ESK(PRK)可利用已经在它的设备NV存贮器中集成的SK来解密。
虽然已描述了某些示范性实施方案并示于附图中,但应该理解,这样的一些实施方案仅仅是用作说明而并不是对本发明的限制,本发明并不限于所示的和所描述的具体结构和安排,因为对于本领域的技术人员来说,可能有各种各样的其它的修改方案。
Claims (23)
1.一种用于配置密码设备的方法包括以下步骤:
将设备串号加载到密码设备的非挥发性存贮器中;
在密码设备内生成对称钥匙;和
将对称钥匙加载到密码设备的非挥发性存贮器中。
2.如权利要求1的方法还包括以下步骤:
在设备串号和对称钥匙已被加载以后,在密码设备的非挥发性存贮器内停止任何进一步的信息加载。
3.如权利要求1的方法还包括以下步骤:
将设备串号从密码设备加载到位于远处的数据库中。
4.如权利要求3的方法还包括以下步骤:
在密码设备内生成至少一个公共钥匙和一个私人钥匙;
发送公共钥匙到数据库;
用此钥匙将私人钥匙加密,产生加密的私人钥匙;和
发送加密的私人钥匙到数据库。
5.如权利要求4的方法还包括以下步骤:
提供公共钥匙给证明授权者;和
用证明授权者的私人钥匙将公共钥匙加密产生数字证书;和
将数字证书发送到数据库伴随公共钥匙和加密的私人钥匙。
6.如权利要求1的方法,其中设备编号是唯一的并与其它密码设备的设备串号不同。
7.如权利要求1的方法,其中钥匙是对称钥匙。
8.如权利要求7的方法,其中对称钥匙是唯一的并与其它密码设备有关的其它对称钥匙不同。
9.如权利要求1的方法,其中非挥发性存贮器被集成在密码设备的处理逻辑内。
10.一种用于登记密码设备的方法包括以下步骤:
在数据库和用密码设备实现的电子系统之间建立通信信道,密码设备包括存贮钥匙和设备串号的非挥发存贮器;
将消息发送到数据库,消息包括包含在密码设备中的设备串号;和
接收公共钥匙和用与密码设备有关的钥匙加密的私人钥匙。
11.如权利要求10的方法还包括以下步骤:
将公共钥匙和用此钥匙加密的私人钥匙加载到电子系统的非挥发性存贮器部件中。
12.如权利要求10的方法,其中通信信道不是安全的。
13.如权利要求10的方法,其中钥匙是对称钥匙。
14.如权利要求10的方法,其中在接收步骤以前,本方法还包括以下步骤。
数据库接收包括设备串号的消息;
利用设备串号作为查看索引;和
发送公共钥匙和用此钥匙加密的私人钥匙到电子系统。
15.如权利要求10的方法还包括以下步骤:
接收成为用证明授权者的私人钥匙加密的公共钥匙的数字证书。
16.一种系统包括:
一个片组;
一个连到片组的非挥发性存贮器;和
一个连到片组的密码设备,密码设备包括具有少量设备非挥发性存贮器的处理逻辑,非挥发性存贮器包含设备串号和对称钥匙。
17.如权利要求16的系统,其中非挥发性存贮器包括至少一个与密码设备有关的公共钥匙和用对称钥匙加密的私人钥匙。
18.如权利要求16的系统,其中本系统能建立与数据库的通信,以便将公共钥匙和加密的私人钥匙加载到非挥发性存贮器中。
19.一种处理子系统包括:
一个基板;
一个连到基板的处理器;
一个连到基板的密码设备;和
一个将处理器和密码设备互连的总线。
20.如权利要求19的处理子系统,其中密码设备包括:
一个处理单元;
一个集成在处理单元中的非挥发性存贮器,非挥发性存贮器包括一个钥匙和设备串号;和
一个随机数发生器。
21.如权利要求19的处理子系统,其中密码设备的随机数发生器被集成在处理单元内。
22.如权利要求19的处理子系统,其中总线是后部总线。
23.如权利要求19的处理子系统还包括一个塑料盒,通常装入基板而连接器位于基板的边缘。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/938,491 US5970147A (en) | 1997-09-30 | 1997-09-30 | System and method for configuring and registering a cryptographic device |
US08/938491 | 1997-09-30 | ||
US08/938,491 | 1997-09-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1303553A true CN1303553A (zh) | 2001-07-11 |
CN1254040C CN1254040C (zh) | 2006-04-26 |
Family
ID=25471518
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB988114119A Expired - Fee Related CN1254040C (zh) | 1997-09-30 | 1998-06-24 | 配置与登记密码设备的电路和方法 |
Country Status (11)
Country | Link |
---|---|
US (1) | US5970147A (zh) |
EP (1) | EP1021886B1 (zh) |
KR (1) | KR100358596B1 (zh) |
CN (1) | CN1254040C (zh) |
AU (1) | AU8567598A (zh) |
BR (1) | BR9814793A (zh) |
DE (1) | DE69831586T2 (zh) |
HK (1) | HK1028505A1 (zh) |
MY (1) | MY133547A (zh) |
TW (1) | TW436747B (zh) |
WO (1) | WO1999017495A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101496337B (zh) * | 2005-04-13 | 2013-03-13 | 微软公司 | 硬盘驱动器认证 |
Families Citing this family (153)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6542610B2 (en) | 1997-01-30 | 2003-04-01 | Intel Corporation | Content protection for digital transmission systems |
US6314521B1 (en) | 1997-11-26 | 2001-11-06 | International Business Machines Corporation | Secure configuration of a digital certificate for a printer or other network device |
US6148279A (en) * | 1997-12-04 | 2000-11-14 | Cypress Semiconductor Corporation | Apparatus for recording and/or reading program history |
US6513117B2 (en) * | 1998-03-04 | 2003-01-28 | Gemstar Development Corporation | Certificate handling for digital rights management system |
US6639577B2 (en) | 1998-03-04 | 2003-10-28 | Gemstar-Tv Guide International, Inc. | Portable information display device with ergonomic bezel |
US7055034B1 (en) * | 1998-09-25 | 2006-05-30 | Digimarc Corporation | Method and apparatus for robust embedded data |
EP1121779A4 (en) * | 1998-10-07 | 2004-09-15 | Nuvomedia Inc | MANIPULATION OF CERTIFICATES FOR A DIGITAL RIGHTS MANAGEMENT SYSTEM |
WO2000025466A1 (en) * | 1998-10-23 | 2000-05-04 | L-3 Communications Corporation | Apparatus and methods for managing key material in heterogeneous cryptographic assets |
US6820202B1 (en) | 1998-11-09 | 2004-11-16 | First Data Corporation | Account authority digital signature (AADS) system |
US7047416B2 (en) * | 1998-11-09 | 2006-05-16 | First Data Corporation | Account-based digital signature (ABDS) system |
US6389537B1 (en) | 1999-04-23 | 2002-05-14 | Intel Corporation | Platform and method for assuring integrity of trusted agent communications |
US6549935B1 (en) * | 1999-05-25 | 2003-04-15 | Silverbrook Research Pty Ltd | Method of distributing documents having common components to a plurality of destinations |
WO2001031841A1 (en) | 1999-10-27 | 2001-05-03 | Visa International Service Association | Method and apparatus for leveraging an existing cryptographic infrastructure |
DE10008974B4 (de) * | 2000-02-25 | 2005-12-29 | Bayerische Motoren Werke Ag | Signaturverfahren |
US7073071B1 (en) | 2000-03-31 | 2006-07-04 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
US6760441B1 (en) | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
US7356817B1 (en) | 2000-03-31 | 2008-04-08 | Intel Corporation | Real-time scheduling of virtual machines |
US6957332B1 (en) | 2000-03-31 | 2005-10-18 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
US7194634B2 (en) * | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
US6990579B1 (en) | 2000-03-31 | 2006-01-24 | Intel Corporation | Platform and method for remote attestation of a platform |
US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US6754815B1 (en) | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US6769058B1 (en) | 2000-03-31 | 2004-07-27 | Intel Corporation | Resetting a processor in an isolated execution environment |
US7013481B1 (en) * | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
US6996710B1 (en) | 2000-03-31 | 2006-02-07 | Intel Corporation | Platform and method for issuing and certifying a hardware-protected attestation key |
US7082615B1 (en) | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
US6473706B1 (en) | 2000-07-06 | 2002-10-29 | International Business Machines Corporation | Self-configuring and self-calibrating automated system |
US7082533B2 (en) * | 2000-08-04 | 2006-07-25 | First Data Corporation | Gauging risk in electronic communications regarding accounts in ABDS system |
US6978369B2 (en) * | 2000-08-04 | 2005-12-20 | First Data Corporation | Person-centric account-based digital signature system |
EP1316171A4 (en) * | 2000-08-04 | 2006-05-03 | First Data Corp | PERSONNEL AND CONTOUR DIGITAL SIGNATURE SYSTEM |
US6789189B2 (en) * | 2000-08-04 | 2004-09-07 | First Data Corporation | Managing account database in ABDS system |
US7096354B2 (en) * | 2000-08-04 | 2006-08-22 | First Data Corporation | Central key authority database in an ABDS system |
US7010691B2 (en) * | 2000-08-04 | 2006-03-07 | First Data Corporation | ABDS system utilizing security information in authenticating entity access |
US6983368B2 (en) * | 2000-08-04 | 2006-01-03 | First Data Corporation | Linking public key of device to information during manufacture |
US7558965B2 (en) | 2000-08-04 | 2009-07-07 | First Data Corporation | Entity authentication in electronic communications by providing verification status of device |
US6434682B1 (en) | 2000-09-28 | 2002-08-13 | International Business Machines Corporation | Data management system with shortcut migration via efficient automatic reconnection to previously migrated copy |
US6604160B1 (en) | 2000-09-28 | 2003-08-05 | International Business Machines Corporation | Computing system arbitrating and selectively providing resource-seeking tasks with takeaway of non-shareable resources |
US7793111B1 (en) | 2000-09-28 | 2010-09-07 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
US7389427B1 (en) | 2000-09-28 | 2008-06-17 | Intel Corporation | Mechanism to secure computer output from software attack using isolated execution |
US6446160B1 (en) | 2000-09-28 | 2002-09-03 | International Business Machines Corporation | Multi-drive data storage system with analysis and selected demounting of idle data storage media |
US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
US6948065B2 (en) | 2000-12-27 | 2005-09-20 | Intel Corporation | Platform and method for securely transmitting an authorization secret |
US7818808B1 (en) | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US7225441B2 (en) | 2000-12-27 | 2007-05-29 | Intel Corporation | Mechanism for providing power management through virtualization |
US7272831B2 (en) | 2001-03-30 | 2007-09-18 | Intel Corporation | Method and apparatus for constructing host processor soft devices independent of the host processor operating system |
US7096497B2 (en) | 2001-03-30 | 2006-08-22 | Intel Corporation | File checking using remote signing authority via a network |
US7603703B2 (en) * | 2001-04-12 | 2009-10-13 | International Business Machines Corporation | Method and system for controlled distribution of application code and content data within a computer network |
US20030005317A1 (en) * | 2001-06-28 | 2003-01-02 | Audebert Yves Louis Gabriel | Method and system for generating and verifying a key protection certificate |
US20040128508A1 (en) * | 2001-08-06 | 2004-07-01 | Wheeler Lynn Henry | Method and apparatus for access authentication entity |
JP4969745B2 (ja) * | 2001-09-17 | 2012-07-04 | 株式会社東芝 | 公開鍵基盤システム |
US7024555B2 (en) | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
KR100445406B1 (ko) * | 2001-11-30 | 2004-08-25 | 주식회사 하이닉스반도체 | 데이터 암호화 장치 및 그 방법 |
US7305556B2 (en) * | 2001-12-05 | 2007-12-04 | Canon Kabushiki Kaisha | Secure printing with authenticated printer key |
US20030115467A1 (en) * | 2001-12-19 | 2003-06-19 | Aull Kenneth W. | Public key infrastructure token issuance and binding |
US7475250B2 (en) * | 2001-12-19 | 2009-01-06 | Northrop Grumman Corporation | Assignment of user certificates/private keys in token enabled public key infrastructure system |
US20030126454A1 (en) * | 2001-12-28 | 2003-07-03 | Glew Andrew F. | Authenticated code method and apparatus |
US7308576B2 (en) | 2001-12-31 | 2007-12-11 | Intel Corporation | Authenticated code module |
US7124273B2 (en) * | 2002-02-25 | 2006-10-17 | Intel Corporation | Method and apparatus for translating guest physical addresses in a virtual machine environment |
US7631196B2 (en) | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
US20030191943A1 (en) * | 2002-04-05 | 2003-10-09 | Poisner David I. | Methods and arrangements to register code |
US7076669B2 (en) * | 2002-04-15 | 2006-07-11 | Intel Corporation | Method and apparatus for communicating securely with a token |
US7058807B2 (en) * | 2002-04-15 | 2006-06-06 | Intel Corporation | Validation of inclusion of a platform within a data center |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US6820177B2 (en) | 2002-06-12 | 2004-11-16 | Intel Corporation | Protected configuration space in a protected environment |
US7392415B2 (en) * | 2002-06-26 | 2008-06-24 | Intel Corporation | Sleep protection |
DE60204776T2 (de) * | 2002-08-30 | 2006-05-24 | Siemens Ag | Verfahren und Vorrichtung für sicheren Zugriff auf Daten oder Funktionalität eines Gerätes |
US20040101141A1 (en) | 2002-11-27 | 2004-05-27 | Jukka Alve | System and method for securely installing a cryptographic system on a secure device |
US7318235B2 (en) | 2002-12-16 | 2008-01-08 | Intel Corporation | Attestation using both fixed token and portable token |
US7900017B2 (en) | 2002-12-27 | 2011-03-01 | Intel Corporation | Mechanism for remapping post virtual machine memory pages |
US20040128465A1 (en) * | 2002-12-30 | 2004-07-01 | Lee Micheil J. | Configurable memory bus width |
US7076802B2 (en) * | 2002-12-31 | 2006-07-11 | Intel Corporation | Trusted system clock |
US7415708B2 (en) | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
US7287197B2 (en) * | 2003-09-15 | 2007-10-23 | Intel Corporation | Vectoring an interrupt or exception upon resuming operation of a virtual machine |
US7739521B2 (en) | 2003-09-18 | 2010-06-15 | Intel Corporation | Method of obscuring cryptographic computations |
US20050080934A1 (en) | 2003-09-30 | 2005-04-14 | Cota-Robles Erik C. | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
US8156343B2 (en) | 2003-11-26 | 2012-04-10 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
US7519274B2 (en) | 2003-12-08 | 2009-04-14 | Divx, Inc. | File format for multiple track digital data |
US8472792B2 (en) | 2003-12-08 | 2013-06-25 | Divx, Llc | Multimedia distribution system |
US9331990B2 (en) * | 2003-12-22 | 2016-05-03 | Assa Abloy Ab | Trusted and unsupervised digital certificate generation using a security token |
US8037314B2 (en) | 2003-12-22 | 2011-10-11 | Intel Corporation | Replacing blinded authentication authority |
EP1564908A1 (en) * | 2003-12-23 | 2005-08-17 | Telefonaktiebolaget LM Ericsson (publ) | Advanced multi-sensor processing |
US20050166051A1 (en) * | 2004-01-26 | 2005-07-28 | Mark Buer | System and method for certification of a secure platform |
US7802085B2 (en) | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
US7620949B2 (en) | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
JP4434886B2 (ja) * | 2004-08-31 | 2010-03-17 | キヤノン株式会社 | 印刷処理を管理するサーバ及びその制御方法並びにコンピュータプログラム |
US7818574B2 (en) * | 2004-09-10 | 2010-10-19 | International Business Machines Corporation | System and method for providing dynamically authorized access to functionality present on an integrated circuit chip |
US7840962B2 (en) | 2004-09-30 | 2010-11-23 | Intel Corporation | System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time |
US8146078B2 (en) | 2004-10-29 | 2012-03-27 | Intel Corporation | Timer offsetting mechanism in a virtual machine environment |
US8924728B2 (en) | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
US20060156013A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Digital signature software using ephemeral private key and system |
US7593527B2 (en) * | 2005-01-07 | 2009-09-22 | First Data Corporation | Providing digital signature and public key based on shared knowledge |
US7490239B2 (en) * | 2005-01-07 | 2009-02-10 | First Data Corporation | Facilitating digital signature based on ephemeral private key |
US7693277B2 (en) * | 2005-01-07 | 2010-04-06 | First Data Corporation | Generating digital signatures using ephemeral cryptographic key |
US20060153369A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Providing cryptographic key based on user input data |
US20060153367A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Digital signature system based on shared knowledge |
US20060153370A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Generating public-private key pair based on user input data |
US7869593B2 (en) * | 2005-01-07 | 2011-01-11 | First Data Corporation | Software for providing based on shared knowledge public keys having same private key |
US7936869B2 (en) * | 2005-01-07 | 2011-05-03 | First Data Corporation | Verifying digital signature based on shared knowledge |
US20060153364A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Asymmetric key cryptosystem based on shared knowledge |
US7395405B2 (en) | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
US8316416B2 (en) | 2005-04-04 | 2012-11-20 | Research In Motion Limited | Securely using a display to exchange information |
DE102005018676B4 (de) * | 2005-04-21 | 2008-09-25 | Wincor Nixdorf International Gmbh | Verfahren zur Schlüsselverwaltung für Kryptographiemodule |
US7809957B2 (en) | 2005-09-29 | 2010-10-05 | Intel Corporation | Trusted platform module for generating sealed data |
US7450946B2 (en) | 2005-10-03 | 2008-11-11 | Kabushiki Kaisha Toshiba | System and method for automatic wireless detection and identification of document processing service location |
GB2431252B (en) | 2005-10-11 | 2010-06-09 | Hewlett Packard Development Co | Data transfer device |
GB2431254A (en) | 2005-10-11 | 2007-04-18 | Hewlett Packard Development Co | Data transfer system |
GB2431249A (en) | 2005-10-11 | 2007-04-18 | Hewlett Packard Development Co | Removable data storage item and key distribution |
GB2431251A (en) * | 2005-10-11 | 2007-04-18 | Hewlett Packard Development Co | Data transfer device |
GB2431250A (en) | 2005-10-11 | 2007-04-18 | Hewlett Packard Development Co | Data transfer system |
US7606769B2 (en) | 2005-10-12 | 2009-10-20 | Kabushiki Kaisha Toshiba | System and method for embedding user authentication information in encrypted data |
US8701091B1 (en) | 2005-12-15 | 2014-04-15 | Nvidia Corporation | Method and system for providing a generic console interface for a graphics application |
GB2435333B (en) | 2006-02-01 | 2010-07-14 | Hewlett Packard Development Co | Data transfer device |
DE102006006489A1 (de) * | 2006-02-10 | 2007-08-16 | Bundesdruckerei Gmbh | Verfahren zur Durchführung eines Schreibzugriffs, Computerprogrammprodukt, Computersystem und Chipkarte |
US8452981B1 (en) * | 2006-03-01 | 2013-05-28 | Nvidia Corporation | Method for author verification and software authorization |
JP5200204B2 (ja) | 2006-03-14 | 2013-06-05 | ディブエックス リミテッド ライアビリティー カンパニー | 高信頼性システムを含む連合型デジタル権限管理機構 |
US8014530B2 (en) | 2006-03-22 | 2011-09-06 | Intel Corporation | Method and apparatus for authenticated, recoverable key distribution with no database secrets |
US8615663B2 (en) | 2006-04-17 | 2013-12-24 | Broadcom Corporation | System and method for secure remote biometric authentication |
US8670566B2 (en) * | 2006-05-12 | 2014-03-11 | Blackberry Limited | System and method for exchanging encryption keys between a mobile device and a peripheral output device |
US10073743B2 (en) | 2006-07-26 | 2018-09-11 | Hewlett Packard Enterprise Development Lp | Data storage arrangement and key distribution |
US8607151B2 (en) * | 2006-08-01 | 2013-12-10 | Nvidia Corporation | Method and system for debugging a graphics pipeline subunit |
US8963932B1 (en) | 2006-08-01 | 2015-02-24 | Nvidia Corporation | Method and apparatus for visualizing component workloads in a unified shader GPU architecture |
US8436870B1 (en) | 2006-08-01 | 2013-05-07 | Nvidia Corporation | User interface and method for graphical processing analysis |
US8436864B2 (en) * | 2006-08-01 | 2013-05-07 | Nvidia Corporation | Method and user interface for enhanced graphical operation organization |
GB0625052D0 (en) * | 2006-12-15 | 2007-01-24 | Hewlett Packard Development Co | Evidence of manufacturing processes |
US8625793B2 (en) | 2007-06-11 | 2014-01-07 | Qualcomm Incorporated | Resynchronization for push message security using secret keys |
WO2009065137A1 (en) | 2007-11-16 | 2009-05-22 | Divx, Inc. | Hierarchical and reduced index structures for multimedia files |
US8448002B2 (en) * | 2008-04-10 | 2013-05-21 | Nvidia Corporation | Clock-gated series-coupled data processing modules |
US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
US8447977B2 (en) * | 2008-12-09 | 2013-05-21 | Canon Kabushiki Kaisha | Authenticating a device with a server over a network |
WO2010080911A1 (en) | 2009-01-07 | 2010-07-15 | Divx, Inc. | Singular, collective and automated creation of a media guide for online content |
JP5723888B2 (ja) | 2009-12-04 | 2015-05-27 | ソニック アイピー, インコーポレイテッド | 基本ビットストリーム暗号材料伝送システムおよび方法 |
US9247312B2 (en) | 2011-01-05 | 2016-01-26 | Sonic Ip, Inc. | Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol |
JP5839659B2 (ja) * | 2011-06-20 | 2016-01-06 | ルネサスエレクトロニクス株式会社 | 半導体装置 |
US9467708B2 (en) | 2011-08-30 | 2016-10-11 | Sonic Ip, Inc. | Selection of resolutions for seamless resolution switching of multimedia content |
US8799647B2 (en) | 2011-08-31 | 2014-08-05 | Sonic Ip, Inc. | Systems and methods for application identification |
US8964977B2 (en) | 2011-09-01 | 2015-02-24 | Sonic Ip, Inc. | Systems and methods for saving encoded media streamed using adaptive bitrate streaming |
US8909922B2 (en) | 2011-09-01 | 2014-12-09 | Sonic Ip, Inc. | Systems and methods for playing back alternative streams of protected content protected using common cryptographic information |
US8868913B1 (en) | 2011-09-29 | 2014-10-21 | Juniper Networks, Inc. | Automatically authenticating a host key via a dynamically generated certificate using an embedded cryptographic processor |
US9323315B2 (en) | 2012-08-15 | 2016-04-26 | Nvidia Corporation | Method and system for automatic clock-gating of a clock grid at a clock source |
US8850371B2 (en) | 2012-09-14 | 2014-09-30 | Nvidia Corporation | Enhanced clock gating in retimed modules |
US9313510B2 (en) | 2012-12-31 | 2016-04-12 | Sonic Ip, Inc. | Use of objective quality measures of streamed content to reduce streaming bandwidth |
US9191457B2 (en) | 2012-12-31 | 2015-11-17 | Sonic Ip, Inc. | Systems, methods, and media for controlling delivery of content |
US9906785B2 (en) | 2013-03-15 | 2018-02-27 | Sonic Ip, Inc. | Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata |
US9471456B2 (en) | 2013-05-15 | 2016-10-18 | Nvidia Corporation | Interleaved instruction debugger |
US10181124B2 (en) * | 2013-05-30 | 2019-01-15 | Dell Products, L.P. | Verifying OEM components within an information handling system using original equipment manufacturer (OEM) identifier |
US9094737B2 (en) | 2013-05-30 | 2015-07-28 | Sonic Ip, Inc. | Network video streaming with trick play based on separate trick play files |
US9866878B2 (en) | 2014-04-05 | 2018-01-09 | Sonic Ip, Inc. | Systems and methods for encoding and playing back video at different frame rates using enhancement layers |
US9489508B2 (en) | 2014-11-13 | 2016-11-08 | Seagate Technology Llc | Device functionality access control using unique device credentials |
KR102328450B1 (ko) | 2015-09-30 | 2021-11-19 | 삼성디스플레이 주식회사 | 표시 장치 |
DE102019007447A1 (de) * | 2019-10-25 | 2021-04-29 | Diehl Metering Systems Gmbh | Verfahren und System zur Lizenzierung und Schlüsselübergabe für Sensoren und Empfänger |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NZ329891A (en) * | 1994-01-13 | 2000-01-28 | Certco Llc | Method of upgrading firmware of trusted device using embedded key |
US5805706A (en) * | 1996-04-17 | 1998-09-08 | Intel Corporation | Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format |
US5539828A (en) * | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
IL113375A (en) * | 1995-04-13 | 1997-09-30 | Fortress U & T Ltd | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow |
US5852665A (en) * | 1995-04-13 | 1998-12-22 | Fortress U & T Ltd. | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow |
US5633932A (en) * | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
-
1997
- 1997-09-30 US US08/938,491 patent/US5970147A/en not_active Expired - Lifetime
-
1998
- 1998-06-24 AU AU85675/98A patent/AU8567598A/en not_active Abandoned
- 1998-06-24 KR KR1020007003358A patent/KR100358596B1/ko not_active IP Right Cessation
- 1998-06-24 EP EP98936809A patent/EP1021886B1/en not_active Expired - Lifetime
- 1998-06-24 DE DE69831586T patent/DE69831586T2/de not_active Expired - Fee Related
- 1998-06-24 BR BR9814793-5A patent/BR9814793A/pt not_active IP Right Cessation
- 1998-06-24 WO PCT/US1998/013096 patent/WO1999017495A1/en active IP Right Grant
- 1998-06-24 CN CNB988114119A patent/CN1254040C/zh not_active Expired - Fee Related
- 1998-07-20 TW TW087111787A patent/TW436747B/zh active
- 1998-09-19 MY MYPI98004311A patent/MY133547A/en unknown
-
2000
- 2000-11-27 HK HK00107598A patent/HK1028505A1/xx not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101496337B (zh) * | 2005-04-13 | 2013-03-13 | 微软公司 | 硬盘驱动器认证 |
Also Published As
Publication number | Publication date |
---|---|
EP1021886A1 (en) | 2000-07-26 |
KR100358596B1 (ko) | 2002-10-25 |
CN1254040C (zh) | 2006-04-26 |
DE69831586T2 (de) | 2006-06-22 |
AU8567598A (en) | 1999-04-23 |
WO1999017495A1 (en) | 1999-04-08 |
DE69831586D1 (de) | 2005-10-20 |
BR9814793A (pt) | 2000-10-10 |
KR20010030781A (ko) | 2001-04-16 |
TW436747B (en) | 2001-05-28 |
EP1021886A4 (en) | 2002-03-20 |
US5970147A (en) | 1999-10-19 |
EP1021886B1 (en) | 2005-09-14 |
MY133547A (en) | 2007-11-30 |
HK1028505A1 (en) | 2001-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1254040C (zh) | 配置与登记密码设备的电路和方法 | |
US5828753A (en) | Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package | |
US6357004B1 (en) | System and method for ensuring integrity throughout post-processing | |
US5796840A (en) | Apparatus and method for providing secured communications | |
US6292892B1 (en) | Apparatus and method for providing secured communications | |
CA2374968C (en) | Technique for split knowledge backup and recovery of a cryptographic key | |
EP0725512B1 (en) | Data communication system using public keys | |
EP1198922B1 (en) | Secure distribution and protection of encryption key information | |
US6266416B1 (en) | Protection of software against use without permit | |
USRE40694E1 (en) | Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format | |
US5651068A (en) | International cryptography framework | |
US6748084B1 (en) | Data access control system and method thereof | |
EP0723251A2 (en) | Method and apparatus for user and security device authentication | |
EP0706275A2 (en) | System and method for secure storage and distribution of data using digital signatures | |
US7571329B2 (en) | Method of storing unique constant values | |
CN1495666A (zh) | 存储卡 | |
CN1496073B (zh) | 消息检查设备 | |
US20100063932A1 (en) | Forming Credentials | |
CN1294457A (zh) | 用不可访问的唯一密钥对储存的数据进行加密/解密 | |
Vaughan-Nichols | How trustworthy is trusted computing? | |
KR20010024912A (ko) | 컴퓨터용 타원 곡선 암호화 방법 및 장치 | |
CN109583237A (zh) | 用户数据保护方法、服务器及存储介质 | |
KR100239865B1 (ko) | 통신보안 제공방법 및 장치(apparatus and method for providing secured communications) | |
JP2009525556A (ja) | 外部のコード・イメージをチップ上のプライベート・キーに一致させるための方法および装置 | |
EP0784256A1 (en) | Method and apparatus for public-key cryptography using a secure semiconductor device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20060426 Termination date: 20100624 |