会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Access-protected data carrier
    • 访问保护的数据载体
    • US07602916B1
    • 2009-10-13
    • US09763621
    • 1999-09-07
    • Harald VaterHermann Drexler
    • Harald VaterHermann Drexler
    • H04L9/00
    • H04L9/002H04L2209/08
    • The invention relates to a data carrier having a semiconductor chip (5) with at least one memory. The memory contains an operating program that is able to perform at least one operation (h). In order to prevent unauthorized access to the data (x) processed with the operation (h), both said data and the operation (h) itself are disguised. The disguising of the data (x) and the operation (h) is coordinated such that the disguised operation (hR1R, hR1R2) generates either the output data (y) of the undisguised operation (h) or disguised output data (y{circle around (x)}R2) from which the output data (y) can be determined.
    • 本发明涉及具有至少一个存储器的半导体芯片(5)的数据载体。 存储器包含能够执行至少一个操作(h)的操作程序。 为了防止对操作(h)处理的数据(x)的未经授权的访问,所述数据和操作(h)本身都被伪装。 协调数据(x)和操作(h)的伪装,使得伪装的操作(hR1R,hR1R2)生成未经验证的操作(h)的输出数据(y)或伪装的输出数据(y { (x)} R2),可以确定输出数据(y)。
    • 3. 发明授权
    • Portable data carrier provided with access protection by dividing up codes
    • 通过分割代码提供访问保护的便携式数据载体
    • US07447913B2
    • 2008-11-04
    • US10168548
    • 2000-12-20
    • Hermann DrexlerHarald Vater
    • Hermann DrexlerHarald Vater
    • G06F12/14
    • H04L9/30G06F7/723G06F2207/7242H04L9/002
    • The invention relates to a data storage medium having a semiconductor chip which has at least one memory in which an operating program is stored which contains a number of commands, with each command producing signals which can be detected from outside the semiconductor chip.According to the invention the data storage medium is designed in order to split secret data, which is stored in the semiconductor chip in order to carry out security-relevant or safety-relevant operations or is generated by this semiconductor chip, into at least three data parts, with an arithmetic unit being included in order to calculate a random number and in order to divide the random number, with the first data part being the integer result of the division process, the second part being the remainder of the division process, and the third part being the random number itself.
    • 本发明涉及具有半导体芯片的数据存储介质,该半导体芯片具有至少一个存储器,其中存储有包含多个命令的操作程序,每个命令产生可以从半导体芯片的外部检测的信号。 根据本发明,数据存储介质被设计为将存储在半导体芯片中的秘密数据分解为执行安全相关或安全相关的操作或由该半导体芯片产生至少三个数据 部分,包括运算单元以便计算随机数,并且为了划分随机数,第一数据部分是除法处理的整数结果,第二部分是除法处理的剩余部分,以及 第三部分是随机数本身。
    • 5. 发明授权
    • Data medium authentication method
    • 数据媒体认证方式
    • US07636438B1
    • 2009-12-22
    • US09486723
    • 1998-09-07
    • Michael LamlaHermann DrexlerWolfgang RanklFranz WeikmannWolfgang Effing
    • Michael LamlaHermann DrexlerWolfgang RanklFranz WeikmannWolfgang Effing
    • H04L9/32G06F7/04
    • G07F7/1008G06Q20/341G06Q20/40975
    • The invention relates to a method for testing the authenticity of a data carrier (1) and/or an external device (2) which enters into data exchange with the data carrier (1). According to the invention, the data carrier (1) and the external device (2) are each equipped with a special additional apparatus (4, 6) for generating and/or testing authenticity data. Data transmission between the data carrier (1) and the external device (2) as required for authenticity testing is performed at least partly via a special transmission channel (B). The transmission channel (B) for transmitting authenticity data is separated physically or logically from a transmission channel (A) for transmitting standard data so that there is no mutual interference of data transmission via the two transmission channels (A, B). In authenticity testing, the additional apparatuses for generating and/or testing authenticity data (4, 6) of the data carrier (1) and external device (2) and optionally also the transmission channel (B) for authenticity data must meet special demands which cannot be met by conventional designs. The transmission channel (B) for transmitting authenticity data is activable during the total time period between activation and deactivation of the data carrier (1) so that authenticity testing can be performed anytime.
    • 本发明涉及一种用于测试与数据载体(1)进行数据交换的数据载体(1)和/或外部设备(2)的真实性的方法。 根据本发明,数据载体(1)和外部装置(2)各自配有用于产生和/或测试真实性数据的特殊附加装置(4,6)。 至少部分地通过专用传输通道(B)执行真实性测试所需的数据载体(1)和外部设备(2)之间的数据传输。 用于发送真实性数据的传输信道(B)从用于发送标准数据的传输信道(A)物理地或逻辑地分离,使得经由两个传输信道(A,B)不存在数据传输的相互干扰。 在真实性测试中,用于生成和/或测试数据载体(1)和外部设备(2)的可靠性数据(4,6)和可选地还包括用于真实性数据的传输信道(B)的附加设备必须满足特殊要求, 不能满足常规设计。 用于发送真实性数据的传输信道(B)可以在数据载体(1)的激活和停用之间的总时间段内被激活,从而可以随时执行真实性测试。
    • 7. 发明申请
    • Protected cryptographic calculation
    • 受保护的加密计算
    • US20060050868A1
    • 2006-03-09
    • US10527570
    • 2003-09-09
    • Markus BockesHermann DrexlerHelmut Kahl
    • Markus BockesHermann DrexlerHelmut Kahl
    • H04L9/28
    • G07F7/1008G06F7/723G06F2207/7271G06Q20/341G06Q20/40975G07F7/082H04L9/003H04L9/302H04L9/3236H04L9/3249H04L2209/04
    • In a method for protected execution of a cryptographic calculation in which a key (12) with at least two key parameters (p, q, pinv, sp, dp, sq, dq) is drawn on, an integrity check (30, 34, 40, 54) of the key (12) is performed, in order to prevent a cryptographic attack in which conclusions are drawn as to at least one second key parameter (p, q, pinv, sp, dp, sq, dq) by corrupting at least one first key parameter (p, q, pinv, sp, dp, sq, dq). A further method serves to determine a key for a cryptographic calculation with at least two key parameters (p, q, pinv, sp, dp, sq, dq), provided for use in the first mentioned method. A computer program product and a portable data carrier have corresponding features. The invention enables particularly good protection of cryptographic calculations against attacks.
    • 在用于保护执行加密计算的方法中,其中绘制具有至少两个关键参数(p,q,pinv,sp,dp,sq,dq)的密钥(12),完整性检查(30,34, 执行密钥(12)的40,45),以便防止通过破坏对至少一个第二密钥参数(p,q,pinv,sp,dp,sq,dq)作出结论的加密攻击 至少一个第一密钥参数(p,q,pinv,sp,dp,sq,dq)。 另一种方法用于确定用于在首先提及的方法中使用的至少两个关键参数(p,q,pinv,sp,dp,sq,dq)的密码计算的密钥。 计算机程序产品和便携式数据载体具有相应的特征。 本发明能够特别良好地保护加密计算免受攻击。