A method of protecting an electronic device from unauthorized reprogramming, the electronic device comprising a data memory and a key memory, the method comprising loading into the key memory a predetermined public key of a cryptographic public key mechanism for verifying subsequent data items to be loaded into the data memory, the subsequent data items being signed with a corresponding private key; characterized in that the method further comprises setting a permanent identifier in the electronic device, the permanent identifier including an identifier identifying an entity authorized to reprogram the electronic device and an indicator identifying a selected one of a number of categories of public keys
DE 10204685 A UPAB: 20031117 NOVELTY - Device for destroying data stored electronically on a storage...
Programmable data protection device, secure programming manager system and process for controlling a...
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant d...
A tamper-resistant electronic circuit is configured for implementation in a device. The electronic c...
An electronic device requires valid control keys to change any usage restriction setting. The device...
Data storage devices which contain firmware typically implement security features such a digitally s...
A method of authorising the operation of an electronic device and particularly an electronic communi...
A portable battery-operated electronic device authenticates/identifies a charging unit in order to p...
DE 19843424 A UPAB: 20000524 NOVELTY - The device includes an electronic circuit (16) for producing ...
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
The invention relates to a method for handling data (A, B) between two memory areas (W, R1, R2) of a...
Abstract: Wireless devices like laptops are prone to theft and loss due to their small size and the ...
A method of controlling access to electronic information is provided. The method requires the use of...
This paper presents an overview of a mobile communications device that implements a key management p...
DE 10204685 A UPAB: 20031117 NOVELTY - Device for destroying data stored electronically on a storage...
Programmable data protection device, secure programming manager system and process for controlling a...
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant d...
A tamper-resistant electronic circuit is configured for implementation in a device. The electronic c...
An electronic device requires valid control keys to change any usage restriction setting. The device...
Data storage devices which contain firmware typically implement security features such a digitally s...
A method of authorising the operation of an electronic device and particularly an electronic communi...
A portable battery-operated electronic device authenticates/identifies a charging unit in order to p...
DE 19843424 A UPAB: 20000524 NOVELTY - The device includes an electronic circuit (16) for producing ...
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different l...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
The invention relates to a method for handling data (A, B) between two memory areas (W, R1, R2) of a...
Abstract: Wireless devices like laptops are prone to theft and loss due to their small size and the ...
A method of controlling access to electronic information is provided. The method requires the use of...
This paper presents an overview of a mobile communications device that implements a key management p...
DE 10204685 A UPAB: 20031117 NOVELTY - Device for destroying data stored electronically on a storage...
Programmable data protection device, secure programming manager system and process for controlling a...
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant d...