PERFORMING SECURE ELECTRONIC TRANSACTIONS
    1.
    发明申请
    PERFORMING SECURE ELECTRONIC TRANSACTIONS 审中-公开
    执行安全电子交易

    公开(公告)号:WO2009066217A2

    公开(公告)日:2009-05-28

    申请号:PCT/IB2008054782

    申请日:2008-11-14

    Abstract: Performing secure electronic transactions The invention relates to a method for performing electronic transactions between a server computer (110) and a client computer (120), the method comprising the steps of: - running a first communication protocol with encrypted data transmission and mutual authentication between the server computer (110) and a hardware device (130) via a communication network (160), - performing a decryption of encrypted server responses received from the server computer (110) in the hardware device (130), - forwarding the decrypted server responses from the hardware device (130) to the client computer (120), - displaying the decrypted server responses on a client computer display (121) of the client computer (120), - receiving client requests to be send from the client computer (120) to the server computer (110) by the hardware device (130), - parsing the client requests for predefined transaction information by the hardware device (130), - encrypting and forwarding client requests that do not contain any predefined transaction information to the server computer (110) by the hardware device (130), - displaying the predefined transaction information upon detection in a client request on a hardware device display (210) of the hardware device (130), - forwarding and encrypting the client request containing the predefined transaction information to the server computer (110) if a user confirmation is received, - canceling the electronic transaction if no user confirmation is received.

    Abstract translation: 执行安全的电子交易技术领域本发明涉及一种用于在服务器计算机(110)和客户端计算机(120)之间执行电子交易的方法,所述方法包括以下步骤: - 运行带有加密数据传输的第一通信协议和 服务器计算机(110)和经由通信网络(160)的硬件设备(130), - 执行从所述硬件设备(130)中从所述服务器计算机(110)接收的加密的服务器响应的解密, - 转发所述解密的服务器 从硬件设备(130)到客户端计算机(120)的响应, - 在客户端计算机(120)的客户端计算机显示器(121)上显示解密的服务器响应, - 接收客户端计算机发送的客户端请求 120)由所述硬件设备(130)发送到所述服务器计算机(110), - 通过所述硬件设备(130)解析所述客户端对于预定义事务信息的请求, - 加密和加密 通过硬件设备(130)向服务器计算机(110)不包含任何预定义的交易信息的订单客户端请求, - 在硬件设备的硬件设备显示器(210)上的客户机请求中检测到显示预定交易信息 (130),如果接收到用户确认,则将包含所述预定交易信息的所述客户端请求转发和加密到所述服务器计算机(110); - 如果没有接收到用户确认,则取消所述电子交易。

    BINDING SECURE KEYS OF SECURE GUESTS TO A HARDWARE SECURITY MODULE

    公开(公告)号:ZA202106316B

    公开(公告)日:2023-03-29

    申请号:ZA202106316

    申请日:2021-08-30

    Applicant: IBM

    Abstract: A method, computer program product, and a system where a secure interface control configures a hardware security module for exclusive use by a secure guest. The secure interface control (“SC”) obtains a configuration request (via a hypervisor) to configure the hardware security module (HSM), from a given guest of guests managed by the hypervisor. The SC determines if the HSM is already configured to a specific guest of the one or more guests, but based on determining that the HSM is not configured to the and is a secure guest the SC forecloses establishing a configuration of the HSM by limiting accesses by guests to the HSM exclusively to the given guest. The SC logs the given guest into the HSM by utilizing a secret of the given guest. The SC obtains, from the HSM, a session code and retains the session code.

    Instruction for performing a pseudorandom number generate operation

    公开(公告)号:GB2526040A

    公开(公告)日:2015-11-11

    申请号:GB201516536

    申请日:2014-02-11

    Applicant: IBM

    Abstract: A machine instruction is provided that includes an opcode field to provide an opcode, the opcode to identify a perform pseudorandom number operation, and a register field to be used to identify a register, the register to specify a location in memory of a first operand to be used. The machine instruction is executed, and execution includes for each block of memory of one or more blocks of memory of the first operand, generating a hash value using a 512 bit secure hash technique and at least one seed value of a parameter block of the machine instruction; and storing at least a portion of the generated hash value in a corresponding block of memory of the first operand, the generated hash value being at least a portion of a pseudorandom number.

    Produkt, das eine physische, nicht klonbare Funktion verkörpert

    公开(公告)号:DE112011103162T5

    公开(公告)日:2013-12-05

    申请号:DE112011103162

    申请日:2011-08-03

    Applicant: IBM

    Abstract: Der Erfindung bezieht sich auf Produkte, die eine PUF verkörpern. Ein Verfahren zum Fertigen eines solchen Produkts wird offenbart, das sich auf ein Material stützt, das eine Oberfläche mit „deterministischen” Unebenheiten aufweist. Das Verfahren verwendet des Weiteren Teilchen, die so dimensioniert sind, dass sie durch die Unebenheiten der Oberfläche gefangen werden können. Im Allgemeinen ermöglicht das Verfahren Teilchen (20), sich zufällig auf Unebenheiten (14) der Materialoberfläche (12) abzuscheiden und daran gefangen zu werden, um eine Struktur zu erzielen, die die PUF ausbildet. Die resultierende PUF ist leichter auslesbar gestaltet, da die allgemeine Struktur und die Position der Teilchen bekannt sind. Lediglich die Füllhöhe (einer bestimmten Art) der Teilchen ist zufällig.

    System zum Ermöglichen des Überprüfens von digitalen Signaturen

    公开(公告)号:DE112012000770T5

    公开(公告)日:2013-11-07

    申请号:DE112012000770

    申请日:2012-02-22

    Applicant: IBM

    Abstract: Die Erfindung gilt hauptsächlich Verfahren und Systemen zum Ermöglichen des Überprüfens von digitalen Signaturen (S41). Die Verfahren sind in einem computergestützten System (1) umgesetzt, das einen Server (10) aufweist, der mit Anwendungen (A, B, C) Daten austauscht, und weisen die folgenden Schritte an dem Server auf: – Empfangen (S13) einer oder mehrerer von einer oder mehreren der Anwendungen ausgegebenen Signaturanforderungen (ai, bi, ci); – Weiterleiten (S14) von ersten Daten, die den empfangenen Signaturanforderungen entsprechen, an eine oder mehrere Signiereinheiten (Sig1-4) zum anschließenden Signieren der ersten Daten; – Speichern (S16) eines aktualisierten Systemzustands (sn+1), der unter Verwendung einer Funktion aus Folgendem berechnet (S15) wurde: – einem Bezugssystemzustand (sn); und – zweiten Daten (ai, bi, ci, Ai, Bi, Ci), die den empfangenen Signaturanforderungen entsprechen, wobei der Bezugssystemzustand und der aktualisierte Systemzustand die Signaturanforderungen bestätigen; und – Wiederholen der obigen Schritte (S12 bis S16) unter Verwendung des aktualisierten Systemzustands (sn+1) als neuen Bezugssystemzustand.

    Product embodying a physical unclonable function

    公开(公告)号:GB2497032A

    公开(公告)日:2013-05-29

    申请号:GB201303961

    申请日:2011-08-03

    Applicant: IBM

    Abstract: The invention is directed to products embodying a PUF. A method for manufacturing such a product is disclosed which relies on a material having one surface with "deterministic" asperities. The method further uses particles dimensioned such as to be able to be trapped by the asperities of the surface. Generally, the method enables particles (20) to randomly deposit on and get trapped by asperities (14) of the material surface (12), such as to obtain a pattern that forms the PUF. The resulting PUF is made easier to read out since the general pattern and the location of the particles are known. Only the filling level (of a given type) of the particles is random.

    9.
    发明专利
    未知

    公开(公告)号:DE602006008029D1

    公开(公告)日:2009-09-03

    申请号:DE602006008029

    申请日:2006-10-16

    Applicant: IBM

    Abstract: In a communications channel coupled to multiple duplicated subsystems, a method, interposer and program product are provided for verifying integrity of subsystem responses. Within the communications channel, a first checksum is calculated with receipt of a first response from a first subsystem responsive to a common request, and a second checksum is calculated for a second response of a second subsystem received responsive to the common request. The first checksum and the second checksum are compared, and if matching, only one of the first response and the second response is forwarded from the communications channel as the response to the common request, with the other of the first response and the second response being discarded by the communications channel.

    Binding secure keys of secure guests to a hardware security module

    公开(公告)号:AU2020234675B2

    公开(公告)日:2022-11-24

    申请号:AU2020234675

    申请日:2020-02-27

    Applicant: IBM

    Abstract: A method, computer program product, and a system where a secure interface control configures a hardware security module for exclusive use by a secure guest. The secure interface control ("SC") obtains a configuration request (via a hypervisor) to configure the hardware security module (HSM), from a given guest of guests managed by the hypervisor. The SC determines if the HSM is already configured to a specific guest of the one or more guests, but based on determining that the HSM is not configured to the and is a secure guest the SC forecloses establishing a configuration of the HSM by limiting accesses by guests to the HSM exclusively to the given guest. The SC logs the given guest into the HSM by utilizing a secret of the given guest. The SC obtains, from the HSM, a session code and retains the session code.

Patent Agency Ranking