Abstract:
The invention is directed to products embodying a PUF. A method for manufacturing such a product is disclosed which relies on a material having one surface with "deterministic" asperities. The method further uses particles dimensioned such as to be able to be trapped by the asperities of the surface. Generally, the method enables particles (20) to randomly deposit on and get trapped by asperities (14) of the material surface (12), such as to obtain a pattern that forms the PUF. The resulting PUF is made easier to read out since the general pattern and the location of the particles are known. Only the filling level (of a given type) of the particles is random.
Abstract:
Methods and apparatus are provided for authenticating communications between a user computer (2) and a server (3) via a data communications network (4). A security device (6) of the apparatus has memory (10) containing security data, and security logic (12) adapted to use the security data to generate an authentication response to an authentication message received from the server (3) in use. An interface device (7) of the apparatus is adapted for data communications with the security device (6). The interface device (7) has a receiver (17) for receiving from the user computer (2) an authentication output containing the authentication message sent by the server (3) to the user computer in use, and interface logic (19) adapted to extract the authentication message from the authentication output and to send the authentication message to the security device (6). The apparatus includes a communications interface (16) for connecting to the server (3) via a communications channel bypassing the user computer (2). One of the security device (6) and interface device (7) is adapted for sending the authentication response to the server (3) via the communications channel bypassing the user computer.
Abstract:
Performing secure electronic transactions The invention relates to a method for performing electronic transactions between a server computer (110) and a client computer (120), the method comprising the steps of: - running a first communication protocol with encrypted data transmission and mutual authentication between the server computer (110) and a hardware device (130) via a communication network (160), - performing a decryption of encrypted server responses received from the server computer (110) in the hardware device (130), - forwarding the decrypted server responses from the hardware device (130) to the client computer (120), - displaying the decrypted server responses on a client computer display (121) of the client computer (120), - receiving client requests to be send from the client computer (120) to the server computer (110) by the hardware device (130), - parsing the client requests for predefined transaction information by the hardware device (130), - encrypting and forwarding client requests that do not contain any predefined transaction information to the server computer (110) by the hardware device (130), - displaying the predefined transaction information upon detection in a client request on a hardware device display (210) of the hardware device (130), - forwarding and encrypting the client request containing the predefined transaction information to the server computer (110) if a user confirmation is received, - canceling the electronic transaction if no user confirmation is received.
Abstract:
In a communications channel coupled to multiple duplicated subsystems, a method, interposer and program product are provided for verifying integrity of subsystem responses. Within the communications channel, a first checksum is calculated with receipt of a first response from a first subsystem responsive to a common request, and a second checksum is calculated for a second response of a second subsystem received responsive to the common request. The first checksum and the second checksum are compared, and if matching, only one of the first response and the second response is forwarded from the communications channel as the response to the common request, with the other of the first response and the second response being discarded by the communications channel.
Abstract:
A method for creating entropy in a virtualized computing environment includes waking one or more samplers, each sampler having a sampling frequency; sampling a sample source with each of the one or more samplers; placing each of the samplers in an inactive state when not sampling; determining a difference between an expected value and a sampled value at each sampler; and providing a function of the difference from each of the one or more samplers to an aggregator.
Abstract:
Performing secure electronic transactions The invention relates to a method for performing electronic transactions between a server computer (110) and a client computer (120), the method comprising the steps of: - running a first communication protocol with encrypted data transmission and mutual authentication between the server computer (110) and a hardware device (130) via a communication network (160), - performing a decryption of encrypted server responses received from the server computer (110) in the hardware device (130), - forwarding the decrypted server responses from the hardware device (130) to the client computer (120), - displaying the decrypted server responses on a client computer display (121) of the client computer (120), - receiving client requests to be send from the client computer (120) to the server computer (110) by the hardware device (130), - parsing the client requests for predefined transaction information by the hardware device (130), - encrypting and forwarding client requests that do not contain any predefined transaction information to the server computer (110) by the hardware device (130), - displaying the predefined transaction information upon detection in a client request on a hardware device display (210) of the hardware device (130), - forwarding and encrypting the client request containing the predefined transaction information to the server computer (110) if a user confirmation is received, - canceling the electronic transaction if no user confirmation is received.