-
公开(公告)号:US06220510B1
公开(公告)日:2001-04-24
申请号:US09064915
申请日:1998-04-23
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K500
CPC分类号: G07F7/1016 , G06K19/0719 , G06K2017/0041 , G06Q20/105 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008
摘要: A multi-application IC card which processes two or more applications using an Application Abstract Machine architecture. The AAM architecture only allows one application to be executed at a time and allows for shared processing by performing a delegation function to a second application. A data space for each application is allocated when the application is selected to be executed. The data space includes a volatile and non-volatile region. The delegation function temporarily interrupts the execution of the first application, saves the temporary data of the first application, shares any data needed with the second application and the second application is executed until the delegated task is competed. The first application then retrieves the saved data and completes its execution. A delegator stack is used to keep track of the delegator's identity when multiple delegations occur. The AAM model allows for a high level of security while transferring data between applications.
摘要翻译: 一种使用Application Abstract Machine架构处理两个或多个应用程序的多应用IC卡。 AAM架构仅允许一次执行一个应用,并且通过对第二应用执行委托功能来允许共享处理。 当应用被选择执行时,分配每个应用的数据空间。 数据空间包括易失性和非易失性区域。 授权功能暂时中断第一个应用程序的执行,保存第一个应用程序的临时数据,共享第二个应用程序所需的任何数据,并执行第二个应用程序,直到委派的任务被竞争。 然后,第一个应用程序检索保存的数据并完成其执行。 当多个代理发生时,委托器堆栈用于跟踪委托者的身份。 AAM模型允许在应用程序之间传输数据时具有高水平的安全性。
-
公开(公告)号:US07730310B2
公开(公告)日:2010-06-01
申请号:US11977920
申请日:2007-10-25
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US20050036387A1
公开(公告)日:2005-02-17
申请号:US10949603
申请日:2004-09-24
申请人: Brian Seal , Eric Norrod , Stephen Simmons
发明人: Brian Seal , Eric Norrod , Stephen Simmons
CPC分类号: G11C16/102 , G01D9/005 , G11C5/143 , G11C14/00 , G11C16/105
摘要: A multi-segmented non-volatile flash memory structure is employed in combination with at least one associated memory structure for storing, updating, and preserving meter data. By initially storing meter data in the associated memory, meter data is buffered until either a predetermined amount of data is obtained or until power to the meter is disabled, at which point the stored meter data is copied into selected blocks of flash memory. The various locations for transferring data are respectively determined by flash pointers indicating which segments or blocks of flash memory to utilize. In some embodiments, the size of the associated memory structure corresponds to the size of each segment of flash memory to maximize data transfer when the associated memory structure is full and also to reduce the number of times the flash memory is written to, thus increasing the potential active lifespan of the flash memory.
摘要翻译: 多分段非易失性闪速存储器结构与至少一个相关联的存储器结构组合使用,用于存储,更新和保存仪表数据。 通过初始地将仪表数据存储在相关联的存储器中,仪表数据被缓冲,直到获得预定量的数据或者直到电表的功率被禁用为止,此时存储的仪表数据被复制到所选择的闪存块中。 用于传送数据的各个位置分别由指示要使用的闪存的哪些片段或块的闪存指针确定。 在一些实施例中,相关联的存储器结构的大小对应于快闪存储器的每个段的大小,以在关联的存储器结构已满时最大化数据传输,并且还减少闪存写入的次数,从而增加 闪存的潜在有效寿命。
-
公开(公告)号:US06659354B2
公开(公告)日:2003-12-09
申请号:US10033281
申请日:2001-12-21
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K1500
CPC分类号: G07F7/1016 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008
摘要: A multi-application IC card system is disclosed having selective application loading and deleting capability. Prior to loading an application onto an IC card a test is conducted to determine if the card is qualified to receive the application using personalization data stored on the card and comparing it with permissions data associated with the application indicating one or more sets of cards upon which the application may be loaded. If the personalization data of the card falls within the allowable set of permissions for that application then the card may be loaded with the application. Preferably, the personalization data includes data representative of the card number, issuer, a product class and the date on which the card is personalized.
-
公开(公告)号:US06488211B1
公开(公告)日:2002-12-03
申请号:US09076550
申请日:1998-05-12
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: G06K1906
CPC分类号: G07F7/1016 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/084 , G07F7/1008
摘要: A system and method of flexibly loading an application and its associated data from an application provider onto an IC card. The application and its associated data is divided into segments which can each fit into the input buffer of an Integrated circuit card. Each segment is transmitted separately and the Integrated circuit card then stores the segment in an available space in the IC card's memory. The segments can be placed in non-contiguous memory in order to reduce memory fragmentation.
摘要翻译: 将应用程序及其相关数据从应用程序提供程序灵活加载到IC卡的系统和方法。 应用程序及其相关数据被分成可以分别插入到集成电路卡的输入缓冲器中的段。 每个段被单独传输,然后集成电路卡将该段存储在IC卡的存储器中的可用空间中。 可以将片段放置在非连续的存储器中,以减少内存碎片。
-
公开(公告)号:US07734923B2
公开(公告)日:2010-06-08
申请号:US11729509
申请日:2007-03-29
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US07707408B2
公开(公告)日:2010-04-27
申请号:US11977919
申请日:2007-10-25
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
公开(公告)号:US07702908B2
公开(公告)日:2010-04-20
申请号:US11978034
申请日:2007-10-26
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/00
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
-
公开(公告)号:US07584358B2
公开(公告)日:2009-09-01
申请号:US11707824
申请日:2007-02-16
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
摘要翻译: 方法和设备将一个或多个计算机软件应用程序安全地加载到防篡改模块(TRM)(107)上,并从TRM安全地删除一个或多个应用程序。 本发明的实施例包括一种用于至少基于加密的个性化数据块来确定TRM(107)是否是合格的TRM集合的一部分以接受应用加载的方法。 此后,该方法仅在第一步骤确定TRM(107)有资格接受应用程序的加载之后,才将该应用程序加载到TRM(107)上。 另一个实施例包括一种用于至少基于加密的个性化数据块来确定TRM(107)是否是合格的TRM集合的一部分以接受删除应用的方法。 此后,该方法仅在第一步骤确定TRM(107)有资格接受应用的删除时才提供从TRM(107)中删除应用程序。
-
公开(公告)号:US20080137842A1
公开(公告)日:2008-06-12
申请号:US11977914
申请日:2007-10-25
申请人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
发明人: David Barrington Everett , Stuart James Miller , Anthony David Peacham , Ian Stephen Simmons , Timothy Philip Richards , John Charles Viner
IPC分类号: H04L9/28
CPC分类号: G07F7/1016 , G06F21/51 , G06F21/57 , G06F21/77 , G06F2221/2115 , G06K19/0719 , G06K2017/0041 , G06Q20/341 , G06Q20/355 , G06Q20/3552 , G06Q20/3574 , G06Q20/35765 , G06Q20/4097 , G06Q20/40975 , G07F7/1008 , H04L9/3263 , H04L2209/56
摘要: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
-
-
-
-
-
-
-
-
-