Unlock instant, AI-driven research and patent intelligence for your innovation.

Device and method with reduced information leakage

a technology of information leakage and devices, applied in the direction of digital transmission, unauthorized memory use protection, instruments, etc., can solve the problems of perilous security of the whole electronic transaction system, and achieve the effect of less information leakage, less prone to information leakage, and less pron

Inactive Publication Date: 2008-09-11
BAENTSCH MICHAEL +5
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The invention proposes a data-processing system with a cryptographic key stored in a memory that is less prone to information leakage than other memories. This is achieved by using a two-stage encryption process with the cryptographic key, which is unique to the data-processing system and not known to external entities. The system also includes a personalization step that allows for the customization of the system by writing unencrypted information to its target memory location and executing the encryption on it. The invention addresses the vulnerability of data-processing systems to attacks through differential power analysis and provides a solution to protect sensitive information."

Problems solved by technology

If such EEPROM content is a secret key guarding an electronic transaction for example, the security of the whole electronic transaction system is in peril.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method with reduced information leakage
  • Device and method with reduced information leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]In the following, the various exemplary embodiments of the invention are described.

[0059]A smartcard typically embeds an electronic chip in a plastic card. The electronic chip may include, for example, a microprocessor or similar device, read-only memory (ROM), and / or read-write random access memory (RAM). The electronic-chip may also include other electronic components such as digital signal processors (DSPs), field-programmable gate arrays (FPGAs), electrically-erasable programmable read-only memory (EEPROM) and miscellaneous support logic. Generally, the electronic chip is glued into a recessed area of a plastic card and is covered by a printed circuit which provides the electrical interface to an external smartcard reader. The standard configuration of the input and output pads of the printed circuit generally includes power (VCC), ground (GND), a clock input (CLK) and a serial input / output pad (I / O). Several additional unconnected pads (N / C) are also included in the stand...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.

Description

[0001]The invention relates to a data-processing system, a method for processing the same, and a method for executing an operation on the same. More particularly the invention relates to a smartcard, a method of processing the smartcard under use of a cryptographic key, and a method for executing an operation on the smartcard under use of the cryptographic key.TECHNICAL FIELD AND BACKGROUND OF THE INVENTION[0002]Cryptographic operations are used for a variety of processes such as data encryption and authentication. In a typical symmetric cryptographic process, a secret key is known to two or more participants, who use it to secure their communications. In systems using asymmetric or public-key cryptography, one party typically performs operations using a secret key, e.g., the so-called private key, while the other performs complementary operations using only non-secret parameters, e.g., the so-called public key. In both, symmetric and asymmetric, cryptosystems, the secret parameters...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00G06F1/00G06F21/76G06K19/073H04L9/10H04L9/32H04L29/06
CPCG06F21/76H04L63/04H04L2209/12H04L9/0625H04L9/003G06F1/00
Inventor BAENTSCH, MICHAELBUHLER, PETEREIRICH, THOMASHOERING, FRANKOESTREICHER, MARCUSWEIGOLD, THOMAS D.
Owner BAENTSCH MICHAEL