Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant
Reexamination Certificate
2003-10-27
2010-12-28
Pyzocha, Michael (Department: 2437)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Tamper resistant
C726S033000, C726S034000
Reexamination Certificate
active
07861097
ABSTRACT:
A tamper-resistant electronic circuit is configured for implementation in a device. The electronic circuit securely implements and utilizes device-specific security data during operation in the device, and is basically provided with a tamper-resistantly stored secret not accessible over an external circuit interface. The electronic circuit is also provided with functionality for performing cryptographic processing at least partly in response to the stored secret to generate an instance of device-specific security data that is internally confined within said electronic circuit during usage of the device. The electronic circuit is further configured for performing one or more security-related operations or algorithms in response to the internally confined device-specific security data. In this way, secure implementation and utilization device-specific security data for security purposes can be effectively accomplished. The security is uncompromised since the stored secret is never available outside the electronic circuit, and the device-specific security data is internally confined within the circuit during usage or operation of the device.
REFERENCES:
patent: 4748668 (1988-05-01), Shamir et al.
patent: 5386468 (1995-01-01), Akiyama et al.
patent: 5422953 (1995-06-01), Fischer
patent: 5537474 (1996-07-01), Brown et al.
patent: 5623637 (1997-04-01), Jones et al.
patent: 5668878 (1997-09-01), Brands
patent: 5740403 (1998-04-01), Kowalski
patent: 5757918 (1998-05-01), Hopkins
patent: 6141756 (2000-10-01), Bright et al.
patent: 6470454 (2002-10-01), Challener et al.
patent: 6687375 (2004-02-01), Matyas et al.
patent: 6711400 (2004-03-01), Aura
patent: 7039191 (2006-05-01), Shinohara
patent: 7047416 (2006-05-01), Wheeler et al.
patent: 7149308 (2006-12-01), Fruehauf et al.
patent: 2001/0054147 (2001-12-01), Richards
patent: 2002/0044648 (2002-04-01), Arazi
patent: 2002/0099948 (2002-07-01), Kocher et al.
patent: 2003/0023871 (2003-01-01), Gnanasabapathy et al.
patent: 2003/0028771 (2003-02-01), Kocher et al.
patent: 2003/0033537 (2003-02-01), Fujimoto et al.
patent: 2003/0053629 (2003-03-01), Knapen
patent: 2003/0056100 (2003-03-01), Beatson
patent: 2003/0159067 (2003-08-01), Stirbu
patent: 2007/0189534 (2007-08-01), Wood et al.
patent: 0750410 (1996-12-01), None
patent: 0753816 (1997-01-01), None
patent: 1081891 (2001-03-01), None
patent: 1 168 870 (2002-01-01), None
patent: 0129339-8 (2002-12-01), None
patent: 2 376 392 (2003-05-01), None
patent: WO 9516238 (1995-06-01), None
patent: WO 00/48416 (2000-08-01), None
patent: WO 0077974 (2000-12-01), None
patent: WO 02/084980 (2002-10-01), None
patent: WO 03/056863 (2003-07-01), None
“Digital Signature Cards Range”—Secure smart cards for doing electronic business; GEMPLUS; Oct. 27, 2003; http://www.gemplus.com/products/dig—sign—cards—range.
Stacy Cannady and Thomas H. Stockton; “Easing the Pain” —How PKI can reduce the risks associated with e-business transactions; IBM; Feb. 1, 2001; http://www-106.ibm.com/developerworks/library/s-pain.html.
“The Mechanisms of Data Security;” Sep. 2, 2003; http://www.cardsnowindia.com
ews/security1.htm.
“Security in an open world;” SkillTeam; Sep. 2, 2003; http://www.common.lu.
Krawczyk et al.; “HMAC: Keyed-Hashing for Message Authentication;” IETF; RFC 2104; Feb. 1997.
Menezes, van Oorschot, and Vanstone; “Handbook of Applied Cryptography;” Chapter 1 Overview of Cryptography; Chapter 9 Hash Functions and Data Integrity; Chapter 12 Key Establishment Protocols; CRC Press, 1997.
Wireless Identify Module, Part: Security. Jul. 12, 2001, WAP-260-WIM-20010712-A, Wireless Application Protocol Forum.
Digital Cellular Telecommunications System (Phase 2+); Subscriber Identify Modules (SIM); Functional Characteristics (GSM 02.17 version 6.0.0 Release 1997), ETSI TS 100 922 V6.0.0 (Nov. 1998), p. 1-13.
H. Haverinen et al., Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identify Modules (EAP-SIM), Network Working Group, Jan. 2006, Section 3, p. 8-10 and Section 12, p. 66-74.
Secure Hash Standard, FIPS Pub 180-1, May 11, 1993, pp. 1-17.
J. Arkko et al., Extensible Authentication Protocol Method for 3rdGeneration Authentication and Key Agreement (EAP-AKA), Network Working Group, Jan. 2006, Section 3, pp. 9-15 and Section 7, pp. 43-45.
3GPP TS 11.11 V8.14.0 (Jun. 2007); Clause 7, p. 28-29, Clause 8.16 and 8.19, p. 36, Clause 9.2.16 and 9.2.20, p. 46-47, Clause 11.4, p. 120-1222, Claus 11.6, p. 128-131.
3GPP TS 11.14 V8.18.0 (Jun. 2007), p. 1-57.
3GPP TS 31.111 V8.4.0 (Jan. 2009), p. 1-96.
3 GPP TS 03.19 V8.5.0 (Sep. 2002), p. 1-34.
3GPP TS 03.48 V8.9.0 (Jun. 2005), p. 1-34.
J. Arkko et al., Mikey: Multimeda Internet KEYing, Network Working Group, Aug. 2004, Section 2-4, p. 7-26.
Sarvar Patel, Analysis of EAP-SIM Session Key Agreement, May 29, 2003, p. 1-4.
A. Niemi et al., IETF RFC 3310, Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and key Agreement (AKA); Network Working Group, Sep. 2002., p. Section 2-3, p. 4-8.
3GPP TSG SA WG3 Security, Enhanced Security for A/Gb, Jul. 15-18, 2003, p. 1-5.
A. Menezes et al., Handbook of Applied Cryptography, CRC Press, Aug. 2001, p. 515-520.
Summary of Japanese Official Action, Feb. 19, 2010, in corresponding Japanese patent application No. 2004-548211.
Aoki et al., “Cryptography Authentication Hardware Accelerator”, NTT Technical Journal, The Telecommunication Association (TTA) vol. 11, No. 3, pp. 17-22, Mar. 5, 1999.
Office Action mailed May 11, 2010 in co-pending U.S. Appl. No. 10/530,293.
Nerbrant Per-Olof
Selander Goran
Smeets Bernard
Nixon & Vanderhye P.C.
Pyzocha Michael
Telefonaktiebolaget LM Ericsson (publ)
LandOfFree
Secure implementation and utilization of device-specific... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure implementation and utilization of device-specific..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure implementation and utilization of device-specific... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4193665