Secure implementation and utilization of device-specific...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S033000, C726S034000

Reexamination Certificate

active

07861097

ABSTRACT:
A tamper-resistant electronic circuit is configured for implementation in a device. The electronic circuit securely implements and utilizes device-specific security data during operation in the device, and is basically provided with a tamper-resistantly stored secret not accessible over an external circuit interface. The electronic circuit is also provided with functionality for performing cryptographic processing at least partly in response to the stored secret to generate an instance of device-specific security data that is internally confined within said electronic circuit during usage of the device. The electronic circuit is further configured for performing one or more security-related operations or algorithms in response to the internally confined device-specific security data. In this way, secure implementation and utilization device-specific security data for security purposes can be effectively accomplished. The security is uncompromised since the stored secret is never available outside the electronic circuit, and the device-specific security data is internally confined within the circuit during usage or operation of the device.

REFERENCES:
patent: 4748668 (1988-05-01), Shamir et al.
patent: 5386468 (1995-01-01), Akiyama et al.
patent: 5422953 (1995-06-01), Fischer
patent: 5537474 (1996-07-01), Brown et al.
patent: 5623637 (1997-04-01), Jones et al.
patent: 5668878 (1997-09-01), Brands
patent: 5740403 (1998-04-01), Kowalski
patent: 5757918 (1998-05-01), Hopkins
patent: 6141756 (2000-10-01), Bright et al.
patent: 6470454 (2002-10-01), Challener et al.
patent: 6687375 (2004-02-01), Matyas et al.
patent: 6711400 (2004-03-01), Aura
patent: 7039191 (2006-05-01), Shinohara
patent: 7047416 (2006-05-01), Wheeler et al.
patent: 7149308 (2006-12-01), Fruehauf et al.
patent: 2001/0054147 (2001-12-01), Richards
patent: 2002/0044648 (2002-04-01), Arazi
patent: 2002/0099948 (2002-07-01), Kocher et al.
patent: 2003/0023871 (2003-01-01), Gnanasabapathy et al.
patent: 2003/0028771 (2003-02-01), Kocher et al.
patent: 2003/0033537 (2003-02-01), Fujimoto et al.
patent: 2003/0053629 (2003-03-01), Knapen
patent: 2003/0056100 (2003-03-01), Beatson
patent: 2003/0159067 (2003-08-01), Stirbu
patent: 2007/0189534 (2007-08-01), Wood et al.
patent: 0750410 (1996-12-01), None
patent: 0753816 (1997-01-01), None
patent: 1081891 (2001-03-01), None
patent: 1 168 870 (2002-01-01), None
patent: 0129339-8 (2002-12-01), None
patent: 2 376 392 (2003-05-01), None
patent: WO 9516238 (1995-06-01), None
patent: WO 00/48416 (2000-08-01), None
patent: WO 0077974 (2000-12-01), None
patent: WO 02/084980 (2002-10-01), None
patent: WO 03/056863 (2003-07-01), None
“Digital Signature Cards Range”—Secure smart cards for doing electronic business; GEMPLUS; Oct. 27, 2003; http://www.gemplus.com/products/dig—sign—cards—range.
Stacy Cannady and Thomas H. Stockton; “Easing the Pain” —How PKI can reduce the risks associated with e-business transactions; IBM; Feb. 1, 2001; http://www-106.ibm.com/developerworks/library/s-pain.html.
“The Mechanisms of Data Security;” Sep. 2, 2003; http://www.cardsnowindia.com
ews/security1.htm.
“Security in an open world;” SkillTeam; Sep. 2, 2003; http://www.common.lu.
Krawczyk et al.; “HMAC: Keyed-Hashing for Message Authentication;” IETF; RFC 2104; Feb. 1997.
Menezes, van Oorschot, and Vanstone; “Handbook of Applied Cryptography;” Chapter 1 Overview of Cryptography; Chapter 9 Hash Functions and Data Integrity; Chapter 12 Key Establishment Protocols; CRC Press, 1997.
Wireless Identify Module, Part: Security. Jul. 12, 2001, WAP-260-WIM-20010712-A, Wireless Application Protocol Forum.
Digital Cellular Telecommunications System (Phase 2+); Subscriber Identify Modules (SIM); Functional Characteristics (GSM 02.17 version 6.0.0 Release 1997), ETSI TS 100 922 V6.0.0 (Nov. 1998), p. 1-13.
H. Haverinen et al., Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identify Modules (EAP-SIM), Network Working Group, Jan. 2006, Section 3, p. 8-10 and Section 12, p. 66-74.
Secure Hash Standard, FIPS Pub 180-1, May 11, 1993, pp. 1-17.
J. Arkko et al., Extensible Authentication Protocol Method for 3rdGeneration Authentication and Key Agreement (EAP-AKA), Network Working Group, Jan. 2006, Section 3, pp. 9-15 and Section 7, pp. 43-45.
3GPP TS 11.11 V8.14.0 (Jun. 2007); Clause 7, p. 28-29, Clause 8.16 and 8.19, p. 36, Clause 9.2.16 and 9.2.20, p. 46-47, Clause 11.4, p. 120-1222, Claus 11.6, p. 128-131.
3GPP TS 11.14 V8.18.0 (Jun. 2007), p. 1-57.
3GPP TS 31.111 V8.4.0 (Jan. 2009), p. 1-96.
3 GPP TS 03.19 V8.5.0 (Sep. 2002), p. 1-34.
3GPP TS 03.48 V8.9.0 (Jun. 2005), p. 1-34.
J. Arkko et al., Mikey: Multimeda Internet KEYing, Network Working Group, Aug. 2004, Section 2-4, p. 7-26.
Sarvar Patel, Analysis of EAP-SIM Session Key Agreement, May 29, 2003, p. 1-4.
A. Niemi et al., IETF RFC 3310, Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and key Agreement (AKA); Network Working Group, Sep. 2002., p. Section 2-3, p. 4-8.
3GPP TSG SA WG3 Security, Enhanced Security for A/Gb, Jul. 15-18, 2003, p. 1-5.
A. Menezes et al., Handbook of Applied Cryptography, CRC Press, Aug. 2001, p. 515-520.
Summary of Japanese Official Action, Feb. 19, 2010, in corresponding Japanese patent application No. 2004-548211.
Aoki et al., “Cryptography Authentication Hardware Accelerator”, NTT Technical Journal, The Telecommunication Association (TTA) vol. 11, No. 3, pp. 17-22, Mar. 5, 1999.
Office Action mailed May 11, 2010 in co-pending U.S. Appl. No. 10/530,293.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure implementation and utilization of device-specific... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure implementation and utilization of device-specific..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure implementation and utilization of device-specific... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4193665

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.