-
公开(公告)号:US07730310B2
公开(公告)日:2010-06-01
申请号:US11977920
申请日:2007-10-25
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US06659354B2
公开(公告)日:2003-12-09
申请号:US10033281
申请日:2001-12-21
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K1500
CPC分类号: G07F7/1016 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008
摘要: A multi-application IC card system is disclosed having selective application loading and deleting capability. Prior to loading an application onto an IC card a test is conducted to determine if the card is qualified to receive the application using personalization data stored on the card and comparing it with permissions data associated with the application indicating one or more sets of cards upon which the application may be loaded. If the personalization data of the card falls within the allowable set of permissions for that application then the card may be loaded with the application. Preferably, the personalization data includes data representative of the card number, issuer, a product class and the date on which the card is personalized.
-
公开(公告)号:US06488211B1
公开(公告)日:2002-12-03
申请号:US09076550
申请日:1998-05-12
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K1906
CPC分类号: G07F7/1016 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/084 , G07F7/1008
摘要: A system and method of flexibly loading an application and its associated data from an application provider onto an IC card. The application and its associated data is divided into segments which can each fit into the input buffer of an Integrated circuit card. Each segment is transmitted separately and the Integrated circuit card then stores the segment in an available space in the IC card's memory. The segments can be placed in non-contiguous memory in order to reduce memory fragmentation.
摘要翻译: 将应用程序及其相关数据从应用程序提供程序灵活加载到IC卡的系统和方法。 应用程序及其相关数据被分成可以分别插入到集成电路卡的输入缓冲器中的段。 每个段被单独传输,然后集成电路卡将该段存储在IC卡的存储器中的可用空间中。 可以将片段放置在非连续的存储器中,以减少内存碎片。
-
公开(公告)号:US07730311B2
公开(公告)日:2010-06-01
申请号:US11977945
申请日:2007-10-25
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US07689826B2
公开(公告)日:2010-03-30
申请号:US11655497
申请日:2007-01-19
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K19/06
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods and systems for flexibly loading an application, e.g., a software application, and associated data from an application provider (101) onto a tamper resistant module (TRM) (103) having an I/O buffer (115) and a memory (119). A method embodiment of the invention comprises determining (501) the size of the TRM's I/O buffer (115), segmenting (503) the application to be loaded and its associated data into a plurality of segments, with each segment adapted to be stored in the I/O buffer (115) and the size of each segment being a function of the determined size of the I/O buffer (115), separately transmitting (505) each segment to the tamper resistant module (103), and storing (603) each separately transmitted segment in a selected one of one or more available spaces of the TRM's memory (119), said spaces selected depending upon the size of each segment and upon which of said available spaces has the smallest available area in the TRM's memory (119) in which the segment can be stored.
摘要翻译: 用于将应用程序(例如,软件应用程序)和关联数据从应用程序提供程序(101)灵活加载到具有I / O缓冲器(115)和存储器(119)的防篡改模块(TRM)(103)上的方法和系统 )。 本发明的方法实施例包括确定(501)TRM的I / O缓冲器(115)的大小,将要加载的应用程序及其相关联的数据分段(503)到多个段中,每个段适于被存储 在所述I / O缓冲器(115)中,并且每个段的大小是所确定的所述I / O缓冲器(115)的大小的函数,分别将每个段发送(505)到所述防篡改模块(103) (603)在TRM存储器(119)的一个或多个可用空间中的所选择的一个中的每个单独发送的段,所述空间根据每个段的大小而选择,并且所述可用空间中的哪个可用空间在TRM的存储器 存储器(119),其中可以存储该段。
-
公开(公告)号:US06220510B1
公开(公告)日:2001-04-24
申请号:US09064915
申请日:1998-04-23
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K500
CPC分类号: G07F7/1016 , G06K19/0719 , G06K2017/0041 , G06Q20/105 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008
摘要: A multi-application IC card which processes two or more applications using an Application Abstract Machine architecture. The AAM architecture only allows one application to be executed at a time and allows for shared processing by performing a delegation function to a second application. A data space for each application is allocated when the application is selected to be executed. The data space includes a volatile and non-volatile region. The delegation function temporarily interrupts the execution of the first application, saves the temporary data of the first application, shares any data needed with the second application and the second application is executed until the delegated task is competed. The first application then retrieves the saved data and completes its execution. A delegator stack is used to keep track of the delegator's identity when multiple delegations occur. The AAM model allows for a high level of security while transferring data between applications.
摘要翻译: 一种使用Application Abstract Machine架构处理两个或多个应用程序的多应用IC卡。 AAM架构仅允许一次执行一个应用,并且通过对第二应用执行委托功能来允许共享处理。 当应用被选择执行时,分配每个应用的数据空间。 数据空间包括易失性和非易失性区域。 授权功能暂时中断第一个应用程序的执行,保存第一个应用程序的临时数据,共享第二个应用程序所需的任何数据,并执行第二个应用程序,直到委派的任务被竞争。 然后,第一个应用程序检索保存的数据并完成其执行。 当多个代理发生时,委托器堆栈用于跟踪委托者的身份。 AAM模型允许在应用程序之间传输数据时具有高水平的安全性。
-
公开(公告)号:US07734923B2
公开(公告)日:2010-06-08
申请号:US11729509
申请日:2007-03-29
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US07707408B2
公开(公告)日:2010-04-27
申请号:US11977919
申请日:2007-10-25
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US07702908B2
公开(公告)日:2010-04-20
申请号:US11978034
申请日:2007-10-26
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
-
公开(公告)号:US07584358B2
公开(公告)日:2009-09-01
申请号:US11707824
申请日:2007-02-16
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
摘要翻译: 方法和设备将一个或多个计算机软件应用程序安全地加载到防篡改模块(TRM)(107)上,并从TRM安全地删除一个或多个应用程序。 本发明的实施例包括一种用于至少基于加密的个性化数据块来确定TRM(107)是否是合格的TRM集合的一部分以接受应用加载的方法。 此后,该方法仅在第一步骤确定TRM(107)有资格接受应用程序的加载之后,才将该应用程序加载到TRM(107)上。 另一个实施例包括一种用于至少基于加密的个性化数据块来确定TRM(107)是否是合格的TRM集合的一部分以接受删除应用的方法。 此后,该方法仅在第一步骤确定TRM(107)有资格接受应用的删除时才提供从TRM(107)中删除应用程序。
-
-
-
-
-
-
-
-
-