EP1035518A3 - Method for the protection of a security module and arrangement for implementing said method - Google Patents

Method for the protection of a security module and arrangement for implementing said method Download PDF

Info

Publication number
EP1035518A3
EP1035518A3 EP00250065A EP00250065A EP1035518A3 EP 1035518 A3 EP1035518 A3 EP 1035518A3 EP 00250065 A EP00250065 A EP 00250065A EP 00250065 A EP00250065 A EP 00250065A EP 1035518 A3 EP1035518 A3 EP 1035518A3
Authority
EP
European Patent Office
Prior art keywords
functional unit
security module
exchange
time
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP00250065A
Other languages
German (de)
French (fr)
Other versions
EP1035518B1 (en
EP1035518A2 (en
Inventor
Peter Post
Dirk Roseneau
Torsten Schlaaff
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Francotyp Postalia GmbH
Original Assignee
Francotyp Postalia GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE19912781A external-priority patent/DE19912781A1/en
Priority claimed from DE19928057A external-priority patent/DE19928057B4/en
Application filed by Francotyp Postalia GmbH filed Critical Francotyp Postalia GmbH
Publication of EP1035518A2 publication Critical patent/EP1035518A2/en
Publication of EP1035518A3 publication Critical patent/EP1035518A3/en
Application granted granted Critical
Publication of EP1035518B1 publication Critical patent/EP1035518B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00233Housing, e.g. lock or hardened casing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00266Man-machine interface on the apparatus
    • G07B2017/00298Visual, e.g. screens and their layouts
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00266Man-machine interface on the apparatus
    • G07B2017/00306Acoustic, e.g. voice control or speech prompting
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00314Communication within apparatus, personal computer [PC] system, or server, e.g. between printhead and central unit in a franking machine
    • G07B2017/00346Power handling, e.g. power-down routine
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00362Calculation or computing within apparatus, e.g. calculation of postage value
    • G07B2017/00395Memory organization
    • G07B2017/00403Memory zones protected from unauthorized reading or writing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00733Cryptography or similar special procedures in a franking system
    • G07B2017/00959Cryptographic modules, e.g. a PC encryption board
    • G07B2017/00967PSD [Postal Security Device] as defined by the USPS [US Postal Service]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Die Erfindung betrifft ein Verfahren zum Schutz eines Sicherheitsmoduls mit Zustandüberwachung, Überwachung des sachgemäßen Gebrauchs oder Austausches des Sicherheitsmoduls mittels einer ersten (120), zweiten (12) und dritten Funktionseinheit (13), Signalisieren mindestens eines Zustandes (220, 230, 240, 250, 260, 270, 280, 290) gesteuert mittels der ersten Funktionseinheit (120) und Löschen von sensitiven Daten aufgrund eines unsachgemäßen Gebrauchs oder Austausches mindestens mittels der zweiten Funktionseinheit (12). Weiterhin ist ein Sperren der Funktionalität mittels der dritten Funktionseinheit (13) aufgrund eines Austausches des Sicherheitsmoduls, Reinitialisieren der zuvor gelöschten sensitiven Daten nach sachgemäßem Gebrauch oder Austausch des Sicherheitsmoduls (100) und Wiederinbetriebnahme durch Freischalten der Funktionseinheiten des Sicherheitsmodules.
Die Anordnung zur Durchführung des Verfahrens, weist Mittel zum Laden mindestens eines von der Datenzentrale vorgegebenen Zeitkredits und eine mit einem Signalmittel (107, 108) verbundene erste Funktionseinheit (120) auf, wobei das Laden bei der Installation und beim Nachladen in einen Speicher (124) des Sicherheitsgerätes vorgenommen wird, und wobei die erste Funktionseinheit (120) einen Tageskredit auf Zeitablauf auswertet und das Signalmittel (107, 108) ansteuert, mindestens um den Zeitablauf zusignalisieren. Der Sicherheitsmodul kann verschiedene Zustände signalisieren. So kann beispielsweise unterschieden werden, ob der letzte Kontakt zur Datenzentrale sehr lange zurückliegt.

Figure 00000001
The invention relates to a method for protecting a security module with status monitoring, monitoring the proper use or replacement of the security module by means of a first (120), second (12) and third functional unit (13), signaling at least one status (220, 230, 240, 250 , 260, 270, 280, 290) controlled by means of the first functional unit (120) and deletion of sensitive data due to improper use or exchange at least by means of the second functional unit (12). Furthermore, the functionality is blocked by means of the third functional unit (13) due to an exchange of the security module, reinitialization of the previously deleted sensitive data after proper use or exchange of the security module (100) and restarting by unlocking the functional units of the security module.
The arrangement for carrying out the method has means for loading at least one time credit specified by the data center and a first functional unit (120) connected to a signal means (107, 108), the loading during installation and during reloading into a memory (124 ) of the security device, and wherein the first functional unit (120) evaluates a daily credit for the passage of time and controls the signaling means (107, 108), at least to signal the passage of time. The safety module can signal different states. For example, a distinction can be made as to whether the last contact with the data center was a long time ago.
Figure 00000001

EP00250065A 1999-03-12 2000-02-25 Arrangement for the protection of a security module Expired - Lifetime EP1035518B1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE19912781A DE19912781A1 (en) 1999-03-12 1999-03-12 Method for protecting a security module and arrangement for carrying out the method
DE19912781 1999-03-12
DE19928057 1999-06-15
DE19928057A DE19928057B4 (en) 1999-06-15 1999-06-15 Security module and method for securing the postal registers from manipulation

Publications (3)

Publication Number Publication Date
EP1035518A2 EP1035518A2 (en) 2000-09-13
EP1035518A3 true EP1035518A3 (en) 2000-12-20
EP1035518B1 EP1035518B1 (en) 2008-06-25

Family

ID=26052507

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00250065A Expired - Lifetime EP1035518B1 (en) 1999-03-12 2000-02-25 Arrangement for the protection of a security module

Country Status (5)

Country Link
US (2) US7194443B1 (en)
EP (1) EP1035518B1 (en)
CN (1) CN1156800C (en)
AU (1) AU2080500A (en)
DE (1) DE50015220D1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20020635U1 (en) * 2000-11-28 2001-03-15 Francotyp-Postalia AG & Co., 16547 Birkenwerder Arrangement for power supply for a security area of a device
DE10061665A1 (en) 2000-12-11 2002-06-20 Francotyp Postalia Gmbh Method for determining a need to replace a component and arrangement for carrying out the method
DE10116703A1 (en) * 2001-03-29 2002-10-10 Francotyp Postalia Ag Method for recording a consumption value and consumption counter with a sensor
DE10136608B4 (en) 2001-07-16 2005-12-08 Francotyp-Postalia Ag & Co. Kg Method and system for real-time recording with security module
US7440914B2 (en) * 2001-07-27 2008-10-21 Promontory Interfinancial Networks, Llc Method and apparatus for fully insuring large bank deposits
US20040257102A1 (en) * 2003-06-20 2004-12-23 Wong Hong W. Secure content protection for board connections
DE202006008952U1 (en) * 2006-05-31 2006-08-03 Francotyp-Postalia Gmbh Arrangement for changing the customer data of a franking machine for tranmsitting data serially to a customer card
US8308819B2 (en) * 2006-12-19 2012-11-13 Pitney Bowes Inc. Method for detecting the removal of a processing unit from a printed circuit board
DE102007011309B4 (en) * 2007-03-06 2008-11-20 Francotyp-Postalia Gmbh Method for authenticated transmission of a personalized data record or program to a hardware security module, in particular a franking machine
US8522043B2 (en) * 2007-06-21 2013-08-27 Microsoft Corporation Hardware-based computer theft deterrence
EP2257906B1 (en) * 2008-03-19 2013-02-27 Freescale Semiconductor, Inc. A method for protecting a cryptographic module and a device having cryptographic module protection capabilities
US8055936B2 (en) * 2008-12-31 2011-11-08 Pitney Bowes Inc. System and method for data recovery in a disabled integrated circuit
US8060453B2 (en) 2008-12-31 2011-11-15 Pitney Bowes Inc. System and method for funds recovery from an integrated postal security device
US9046570B2 (en) 2012-08-03 2015-06-02 Freescale Semiconductor, Inc. Method and apparatus for limiting access to an integrated circuit (IC)
CN107533433A (en) * 2015-04-16 2018-01-02 时间防御系统有限责任公司 System and method for the Autonomous test of rear making external hardware annex

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4575621A (en) * 1984-03-07 1986-03-11 Corpra Research, Inc. Portable electronic transaction device and system therefor
US5097253A (en) * 1989-01-06 1992-03-17 Battelle Memorial Institute Electronic security device
US5353350A (en) * 1989-10-03 1994-10-04 University Of Technology Electro-active cradle circuits for the detection of access or penetration
US5515540A (en) * 1990-08-27 1996-05-07 Dallas Semiconducter Corp. Microprocessor with single pin for memory wipe
GB2303173A (en) * 1995-07-11 1997-02-12 Clive Robert Homewood Computer Security Module
WO1998020461A2 (en) * 1996-11-07 1998-05-14 Ascom Hasler Mailing Systems, Inc. System for protecting cryptographic processing and memory resources for postal franking machines

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4217484A (en) * 1977-02-07 1980-08-12 Gerst William J Taximeter
CA1160744A (en) * 1979-05-09 1984-01-17 Jesse T. Quatse Electronic postage meter having improved security and fault tolerance features
GB2144081B (en) 1983-07-23 1987-10-28 Pa Consulting Services Postal franking machines
JPS6227843A (en) 1985-07-29 1987-02-05 Sharp Corp Electronic equipment
US4804957A (en) 1985-11-27 1989-02-14 Triad Communications, Inc. Utility meter and submetering system
US5027397A (en) 1989-09-12 1991-06-25 International Business Machines Corporation Data protection by detection of intrusion into electronic assemblies
US5091938B1 (en) * 1990-08-06 1997-02-04 Nippon Denki Home Electronics Digital data cryptographic system
DE4213278C2 (en) 1992-04-16 1998-02-19 Francotyp Postalia Gmbh Arrangement for franking mail
DE4217830C2 (en) 1992-05-29 1996-01-18 Francotyp Postalia Gmbh Method for operating a data processing system
US5490077A (en) 1993-01-20 1996-02-06 Francotyp-Postalia Gmbh Method for data input into a postage meter machine, arrangement for franking postal matter and for producing an advert mark respectively allocated to a cost allocation account
DE4333156C2 (en) 1993-09-29 1995-08-31 Siemens Ag Circuit arrangement for connecting an electronic assembly to an operating voltage
US5548163A (en) * 1993-12-13 1996-08-20 Blade Technologies Inc. Device for securing car audio equipment
US5805711A (en) * 1993-12-21 1998-09-08 Francotyp-Postalia Ag & Co. Method of improving the security of postage meter machines
DE4344471A1 (en) 1993-12-21 1995-08-17 Francotyp Postalia Gmbh Method and device for generating and checking a security impression
DE4344476A1 (en) 1993-12-21 1995-06-22 Francotyp Postalia Gmbh Process for improving the security of franking machines
DE19605015C1 (en) 1996-01-31 1997-03-06 Francotyp Postalia Gmbh Device for printing on print carrier standing on edge e.g. letter in franking or addressing machine
EP0789333B1 (en) 1996-01-31 2003-08-13 Francotyp-Postalia AG & Co. KG Franking machine
DE19610070A1 (en) 1996-03-14 1997-09-18 Siemens Ag Smart card
US6065679A (en) * 1996-09-06 2000-05-23 Ivi Checkmate Inc. Modular transaction terminal
US5960084A (en) * 1996-12-13 1999-09-28 Compaq Computer Corporation Secure method for enabling/disabling power to a computer system following two-piece user verification
DE19711998A1 (en) * 1997-03-13 1998-09-17 Francotyp Postalia Gmbh Mail processing system with a printing machine base station controlled by a personal computer
US6019281A (en) * 1997-12-22 2000-02-01 Micro General Corp. Postal security device with display
US6097606A (en) * 1998-05-28 2000-08-01 International Verifact Inc. Financial transaction terminal with limited access

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4575621A (en) * 1984-03-07 1986-03-11 Corpra Research, Inc. Portable electronic transaction device and system therefor
US5097253A (en) * 1989-01-06 1992-03-17 Battelle Memorial Institute Electronic security device
US5353350A (en) * 1989-10-03 1994-10-04 University Of Technology Electro-active cradle circuits for the detection of access or penetration
US5515540A (en) * 1990-08-27 1996-05-07 Dallas Semiconducter Corp. Microprocessor with single pin for memory wipe
GB2303173A (en) * 1995-07-11 1997-02-12 Clive Robert Homewood Computer Security Module
WO1998020461A2 (en) * 1996-11-07 1998-05-14 Ascom Hasler Mailing Systems, Inc. System for protecting cryptographic processing and memory resources for postal franking machines

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
USPS, UNITED STATES POSTAL SERVICE, INFORMATION BASED INDICIA PROGRAM, POSTAL SECURITY DEVICE SPECIFICATION, 13 June 1996 (1996-06-13), XP002137734 *

Also Published As

Publication number Publication date
US20020194017A1 (en) 2002-12-19
CN1156800C (en) 2004-07-07
DE50015220D1 (en) 2008-08-07
AU2080500A (en) 2000-09-14
EP1035518B1 (en) 2008-06-25
US6954149B2 (en) 2005-10-11
US7194443B1 (en) 2007-03-20
EP1035518A2 (en) 2000-09-13
CN1271145A (en) 2000-10-25

Similar Documents

Publication Publication Date Title
EP1035518A3 (en) Method for the protection of a security module and arrangement for implementing said method
EP1035517A3 (en) Method for the protection of a security module and arrangement for implementing said method
DE69707498T2 (en) METHOD FOR PROCESSING DATA INTEGRITY ERRORS FOR REWRITABLE STORAGE
EP1226355A1 (en) Method and device for the diagnosis of a fuel supply system
EP0969421A3 (en) Method for improving the security of franking machines
DE10157798B4 (en) Method for carrying out a filtration process of fluids
DE102018130700A1 (en) Method for establishing a hydraulic readiness of a hydraulic system and hydraulic system
DE102015223686A1 (en) Method for calculating and using a monitoring criterion
DE10319585A1 (en) Tamper-proof data processing system and associated method for preventing tampering
DE69501035T2 (en) Process for increasing the security of an integrated circuit
EP0836739B1 (en) Method of up-dating the contents of the electronic memory of an electronic appliance
DE242808T1 (en) METHOD AND SYSTEM FOR CONFIRMING A USER IN MODEM COMMUNICATION.
EP0789336A2 (en) Method for checking transactions with electronic wallet systems
DE102006035610A1 (en) Memory access control and memory access control method
EP1338970A2 (en) Method and system to control access to EEPROMs as well as corresponding computer program product and computer readable storage medium
EP0789335A3 (en) Method for accounting electronic wallet-systems with IC-cards
EP3566398A1 (en) Method and semiconductor circuit for protecting an operating system of a security system of a vehicle
DE1521664A1 (en) Process for the protective treatment of objects made of aluminum or aluminum alloys
DE10311250B4 (en) Microprocessor system and method for protecting the system from the replacement of components
WO2009000589A1 (en) Method and data storage medium for storing and reading a data code
DE102006047245A1 (en) Tachograph assembly and method for introducing an identifier into an adapter for the tachograph assembly
DE69122944T2 (en) Portable electronic device and data processing method therefor
EP0824105A3 (en) Cellulose particles
EP1455310B1 (en) Method for exchanging data between data processing devices
EP0710931A3 (en) Method and vehicle data logger for checking a vehicle data logger registering and vehicle aggregate actuation, indicating message

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): CH DE FR GB IT LI

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RIC1 Information provided on ipc code assigned before grant

Free format text: 7G 07B 17/00 A, 7G 07B 17/04 B

17P Request for examination filed

Effective date: 20010417

AKX Designation fees paid

Free format text: CH DE FR GB IT LI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: FRANCOTYP-POSTALIA AG & CO. KG

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: FRANCOTYP-POSTALIA GMBH

17Q First examination report despatched

Effective date: 20060926

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RTI1 Title (correction)

Free format text: ARRANGEMENT FOR THE PROTECTION OF A SECURITY MODULE

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): CH DE FR GB IT LI

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REF Corresponds to:

Ref document number: 50015220

Country of ref document: DE

Date of ref document: 20080807

Kind code of ref document: P

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20090326

REG Reference to a national code

Ref country code: DE

Ref legal event code: R081

Ref document number: 50015220

Country of ref document: DE

Owner name: FRANCOTYP-POSTALIA GMBH, DE

Free format text: FORMER OWNER: FRANCOTYP-POSTALIA GMBH, 16547 BIRKENWERDER, DE

Effective date: 20150330

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 18

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 19

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20190218

Year of fee payment: 20

Ref country code: GB

Payment date: 20190218

Year of fee payment: 20

Ref country code: IT

Payment date: 20190225

Year of fee payment: 20

Ref country code: DE

Payment date: 20190110

Year of fee payment: 20

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20190219

Year of fee payment: 20

REG Reference to a national code

Ref country code: DE

Ref legal event code: R071

Ref document number: 50015220

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: GB

Ref legal event code: PE20

Expiry date: 20200224

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF EXPIRATION OF PROTECTION

Effective date: 20200224