Abstract:
PROBLEM TO BE SOLVED: To improve the freedom degree of cipher key authentication against a chip card by transferring an authentication key to the chip card and checking an electronic signature based on the authentication key of the chip card. SOLUTION: An authentication key is transferred to a chip card. The certificate which is used on the chip card based on the authentication of the cipher key has a 1st part that includes the actual data containing the cipher key and a 2nd part including an electronic signature of data received from the 1st part. The electronic signature of the 1st part that is included in the 2nd part of the certificate is checked based on the authentication key of the chip card, and the cipher key of the chip card is authenticated. When the electronic signature is checked, the signature is converted by the authentication key and the electronic fingerprint of the 1st part of the certificate is generated. Then the fingerprint is compared with a converted electronic signature.
Abstract:
In order to provide protection for an application against attacks, a method is provided which defends a computer program independently of the complexity of the program. A request to invoke the application is received (1110). A process execution state is set (405) to indicate a first execution. The application is executed (420; 520; 1120) in response to the request, and application data and control information calculated by the application is stored (420, 520) while the application is executed. The process execution state is set (405, 1130) to indicate a subsequent execution. At least part of the application is executed (1140) for at least one subsequent time. Application data and control information calculated by the application during subsequent executions is compared (430; 530; 1210; 1310) with the data/information stored during first execution. The comparison is done by operation system services which are responsive to the process execution state. When the comparison shows a discrepancy in the compared application data and control information, appropriate error handling takes place.
Abstract:
The invention presented describes a system and procedure for protecting against the espionage of secret information. A counter is allocated to each secret piece of information, in particular codes. The counter counts the number of uses of the secret information. In this, the counter is set to a starting value. Each use of the secret data element increases the counter state by a defined value. If the counter state reaches a maximum value, the use of the secret data element will be blocked. The blocking of the secret information can, however, be avoided if a defined event occurs before the maximum value of the counter is reached which automatically resets the counter state to its starting value. Any technical, economic or organisational condition can be defined as an event. Particular advantages of the invention presented are that each code can have its own counter allocated to it. In this way, different numbers of uses can be established for each code with regard to its function. As a chip card can contain any number of codes for the most widely differing applications, the block is limited solely to the application affected. The use of the chip card is not therefore blocked as a whole. The events can be easily adapted to the widest range of security and user requirements of the respective application area.
Abstract:
The invention relates to a procedure for the certification of cryptographic keys for chipcards. In this procedure, a certification-key and a certificate are transferred to the chipcard. The first part of the certificate includes the cryptographic key and the second part of the certificate includes a digital signature of the first part of the certificate. The digital certificate is subsequently checked by means of the certification-key on the chipcard.
Abstract:
The invention relates to a method of importing information, in particular application information, onto a chip card which has a memory with a directory. The information being transferred onto the chip card comprises data and code, and it is often necessary to distribute these data and the code to different files in the directory. The method of the invention establishes whether the data and the code have been placed properly in the various files. The invention makes it possible to verify whether the information has been placed in the proper location allocated to it in the memory of the chip card. When an application is to be placed onto a chip card, the information is loaded into the chip card memory but is no allowed to be used until its location on the card is verified. Verification is accomplished by calculating an electronic fingerprint of the information and it's location. The fingerprint is compared with at least one other electronic fingerprint, and the stored information is activated only if on comparison a match is established between the electronic fingerprint and at least one other electronic fingerprint.
Abstract:
The invention presented describes a system and procedure for protecting against the espionage of secret information. A counter is allocated to each secret piece of information, in particular codes. The counter counts the number of uses of the secret information. In this, the counter is set to a starting value. Each use of the secret data element increases the counter state by a defined value. If the counter state reaches a maximum value, the use of the secret data element will be blocked. The blocking of the secret information can, however, be avoided if a defined event occurs before the maximum value of the counter is reached which automatically resets the counter state to its starting value. Any technical, economic or organisational condition can be defined as an event. Particular advantages of the invention presented are that each code can have its own counter allocated to it. In this way, different numbers of uses can be established for each code with regard to its function. As a chip card can contain any number of codes for the most widely differing applications, the block is limited solely to the application affected. The use of the chip card is not therefore blocked as a whole. The events can be easily adapted to the widest range of security and user requirements of the respective application area.
Abstract:
The invention relates to a procedure for the certification of cryptographic keys for chipcards. In this procedure, a certification-key and a certificate are transferred to the chipcard. The first part of the certificate includes the cryptographic key and the second part of the certificate includes a digital signature of the first part of the certificate. The digital certificate is subsequently checked by means of the certification-key on the chipcard.