摘要:
A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.
摘要:
A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.
摘要:
A smart card is disclosed which includes a mass storage memory for storing biometric information of a user and private data. A radio is used as an interface to the card. When the user of the card wishes to invoke an application for the private data, biometric information about the user is provided to a device in communication with the card, enabling the card to authenticate the user as an authorized user of the private data, and in response to that authentication provide the data to the application in a manner that maintains privacy and integrity of data.
摘要:
A card and reader system is provided enabling larger storage capacity and faster data transmission. The card is configured in a Smart Card or SIM card format and communicates with either standard Smart Card readers or specially configured readers capable of higher data transmission speeds. Eliminating the processor from the card and including it in the reader allows the cost of the card to be reduced. A software driver installed in existing Smart Card readers enables the additional storage capability of the card to be concealed from the reader, thereby eliminating a need to replace readers already deployed.
摘要:
A technique to dynamically configure a Secure Processing Unit (SPU) chip in a secure manner using a capability table, which defines the functions that an SPU can perform. The capability table employs a digital signature to ensure the authenticity of the source and contents of the table. It also contains information which identifies the SPU for which the table is intended and a time-stamp indicating the time by which the table must be loaded into an SPU.
摘要:
A card and reader system is provided enabling larger storage capacity and faster data transmission. The card is configured in a Smart Card or SIM card format and communicates with either standard Smart Card readers or specially configured readers capable of higher data transmission speeds. Eliminating the processor from the card and including it in the reader allows the cost of the card to be reduced. A software driver installed in existing Smart Card readers enables the additional storage capability of the card to be concealed from the reader, thereby eliminating a need to replace readers already deployed.
摘要:
A set of related routines allows an application to be securely installed on, or de-installed from a smart card or other portable token. The capabilities of a true operating system on the smart card are used to facilitate installation/de-installation.
摘要:
A first entity initiates a first connection to a second entity which then receives from the second entity initial information which the first entity uses to derive a key for the first entity (first entity key). The first entity key is then used to authenticate the second entity and if the second entity is authenticated then the first entity derives a second key which is used for communication between the first entity and the second entity.
摘要:
A cryptographic facility implements a multiple key part import procedure. The installation manager can verify that a key part has been correctly entered and has not been compromised. The security requirement for the procedure is that no single party can subvert the system security by misusing the procedure. This is accomplished by the use of a control-vector-dependent verification pattern to indicate that each key part has been accepted by using the proper control vector and the use of different key switch positions to specify whether the key part is a master key part or an operational key part and whether the key part is a first part or a subsequent key part. The apparatus provides an automatic reset of the key part register at the completion of each key-entry instruction so that each key part can be imported only once. This prevents the same key part from being imported twice as different key part types. The apparatus also prevents a key part from being combined with itself to create a known key. The procedure is fail-safe so that the program cannot steal a key part from a previously failed procedure.
摘要:
A working key of a certain key type is to be transmitted from a first system (having a first usage-control value associated with keys of the certain type) and a second system (having a second usage-control value associated with keys of the certain type). A translation control value, associated with the certain key type, is generated, functionally relating the first and second usage-control values. The translation control value is used in a cryptographic function to send or receive the working key between systems, the cryptographic function being designed to produce valid results when the correct translation control value, and usage-control values, are employed, and unpredictable results otherwise. Effectively, the first usage-control value is translated to the second usage-control value.