Process for storage and use of sensitive information in a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S193000, C705S066000, C705S071000, C380S028000, C380S046000, C380S282000

Reexamination Certificate

active

06658566

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention relates to a process for the storage and use of sensitive information in a security module, and the associated security module.
Firstly, the term “sensitive information” is defined as any information the knowledge of which has significant repercussions on the security of the operations implemented in the security module, for example:
cryptographic keys used in association with algorithms in operations for the encryption or decryption of a message, the authentication of a data item or a person, or the signature of a message;
an authentication code entered by a user at a terminal cooperating with the security module (for example, the PIN or personal identification number of the terminal user).
By extension, the term “sensitive information” also designates any information deemed confidential by the person holding it, for example a bank account number, a message, or even an entire document.
The term “security module” is to be considered either in its conventional sense, in which it designates a device whose purpose, in a communication or information network, is to be held by an organization supervising the network, and to store in a protected way secret and fundamental parameters of the network such as cryptographic keys, or more simply, as designating a device allocated to various users of the network enabling each of them to have access to it, which device can also hold secret parameters. The security module can take the form of a portable device comprising a chip card, such as a bank card.
2. Description of Related Art
The invention is based on the observation that using hardware means accessible to anyone, a defrauder can observe the current consumption of the security module during the execution of a program or of instructions defined by a micro-wired logic in the security module, especially when it is based on CMOS technology. In particular, it is possible to identify the specific portions of the program that allow the reading of the information in EEPROM, particularly the sensitive information defined above.
SUMMARY OF THE INVENTION
Therefore, the object of the invention is to reinforce the security of the security modules as defined above, by ensuring the protection of the sensitive information, particularly during its transfer from an EEPROM to a RAM or vice versa, by encrypting it using a temporary protection key whose content varies at a given frequency, specifically a frequency that is a function of the degree of confidentiality of the sensitive information.
To this end, it relates to a process for storing sensitive information ISj in a security module comprising data processing means and data storage means, characterized in that it includes the steps comprised of:
having the sensitive information ISj encrypted by the security module using a temporary encrypting protection key CPi in a current version CPi
(ai+1)
supplied by the security module and an encryption algorithm stored with an associated decryption algorithm in said storage means;
having the security module store, in a nonvolatile memory of the latter, the sensitive information in encrypted form {overscore (ISj)}
(ai+1)
associated with identifying data defining a temporary decrypting protection key CPid in a current version CPid
(ai+1)
associated with said current version CPi
(ai+1)
of the temporary encrypting protection key CPi, said identifying data comprising a key identifier CPid and an update subscript (ai+1) which defines said current version CPid
(ai+1)
of the decrypting key from among several versions; and
if the temporary decrypting protection key CPid in its current version CPid
(ai+1)
is not already stored in said nonvolatile memory, having this version stored by the security module.
The invention also relates to a process for using sensitive information ISj in a security module comprising data processing means and data storage means, which sensitive information ISj is put into an encrypted form by the security module using a temporary encrypting protection key CPi in a current version CPi
(ai+1)
supplied by the security module and an encryption algorithm stored with an associated decryption algorithm in said storage means, the sensitive information in encrypted form {overscore (ISj)}
(ai+1)
being stored in a nonvolatile memory of the security module in association with identifying data defining a temporary decrypting protection key CPid in a current version CPid
(ai+1)
associated with said current version CPi
(ai+1)
of the temporary encrypting protection key CPi, said identifying data comprising a key identifier CPid and an update subscript (ai+1) which defines said current version CPid
(ai+1)
of the decrypting key from among several versions, characterized in that it includes the steps comprised of:
having the security module, at each request to use the sensitive information ISj issuing from inside or outside this module, select said current version CPid
(ai+1)
of the temporary decrypting protection key CPid associated with this sensitive information, using said identifying data;
having the security module decrypt the encrypted sensitive information {overscore (ISj)}
(ai+1)
, using the current version CPid
(ai+1)
of the temporary decrypting protection key CPid and the decryption algorithm, and temporarily storing the sensitive information ISj in a decrypted form thus obtained, so that it disappears from the security module after a utilization of this sensitive information; and
having the security module use the sensitive information ISj in its decrypted form.
Lastly, the invention relates to a security module disposed to implement the above processes.


REFERENCES:
patent: 5081677 (1992-01-01), Green et al.
patent: 5694472 (1997-12-01), Johnson et al.
patent: 6160890 (2000-12-01), Tatebayashi et al.
patent: 6266416 (2001-07-01), Sigbjornsen et al.
patent: 0002390 (1979-06-01), None
patent: 0186981 (1986-07-01), None
patent: 0440800 (1991-08-01), None
patent: 0621569 (1994-10-01), None
patent: 2681165 (1993-03-01), None

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Process for storage and use of sensitive information in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Process for storage and use of sensitive information in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Process for storage and use of sensitive information in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3142490

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.