User defined function facility
First Claim
1. A cryptographic module for storing and operating on user defined cryptographic functions, said cryptographic module providing a physically and electrically secure environment, said user defined cryptographic functions including instructions arranged in a particular sequence to implement a desired cryptographic function, said cryptographic module comprising:
- memory for storing said user defined cryptographic functions, said memory including;
code for translating said user defined cryptographic functions into a machine-executable form, andcode implementing at least one command for operating on said machine-executable form of said user defined cryptographic functions;
a processing unit connected to said memory for executing said code for translating said user defined cryptographic functions into a machine-executable form and for executing said code implementing at least one command for operating on said machine-executable form of said user defined cryptographic functions;
a physical protection device for protecting said cryptographic module from physical attack; and
an electrical protection device for protecting said cryptographic module from electrical attack.
1 Assignment
0 Petitions
Accused Products
Abstract
In a cryptographic module, a User Defined Function (UDF) facility is provided which provides users with the capability of defining and creating custom functions to meet their cryptographic processing needs. The cryptographic module is contained within a physically and logically secure environment and comprises a processing unit and memory connected to the processing unit. The memory includes code for translating User Defined Functions (UDFs) into a machine-readable form and at least one command for operating on the UDFs. The UDFs are loaded into and executed in the secure area of the cryptographic module without compromising the total security of the transaction security system.
-
Citations
43 Claims
-
1. A cryptographic module for storing and operating on user defined cryptographic functions, said cryptographic module providing a physically and electrically secure environment, said user defined cryptographic functions including instructions arranged in a particular sequence to implement a desired cryptographic function, said cryptographic module comprising:
-
memory for storing said user defined cryptographic functions, said memory including; code for translating said user defined cryptographic functions into a machine-executable form, and code implementing at least one command for operating on said machine-executable form of said user defined cryptographic functions; a processing unit connected to said memory for executing said code for translating said user defined cryptographic functions into a machine-executable form and for executing said code implementing at least one command for operating on said machine-executable form of said user defined cryptographic functions; a physical protection device for protecting said cryptographic module from physical attack; and an electrical protection device for protecting said cryptographic module from electrical attack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of storing and operating on user defined cryptographic functions in a cryptographic module, the cryptographic module providing a physically and electrically secure environment, the user defined cryptographic functions including instructions arranged in a particular sequence to implement a desired cryptographic function, said method comprising the steps of:
-
storing the user defined cryptographic functions in memory in the cryptographic module; translating the user defined cryptographic functions into a machine-executable form; operating on the machine-executable form of the user defined cryptographic functions in the cryptographic module; protecting the cryptographic module from physical attack; and protecting the cryptographic module from electrical attack. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A cryptographic unit having electrical circuitry for storing and operating on user defined cryptographic functions, said cryptographic unit providing a physically and electrically secure environment, said user defined cryptographic functions including instructions arranged in a particular sequence to implement a desired cryptographic function, said cryptographic unit comprising:
-
memory for storing said user defined cryptographic functions, said memory including; code for translating said user defined cryptographic functions into a machine-executable form, and code implementing at least one command for operating on said machine-executable form of said user defined cryptographic functions; a processing unit connected to said memory for executing said code for translating said user defined cryptographic functions into a machine-executable form and for executing said code implementing at least one command for operating on said machine-executable form of said user defined cryptographic functions; a physical protection device for protecting said cryptographic module form physical attack; and an electrical protection device for protecting said cryptographic module from electrical attack. - View Dependent Claims (42, 43)
-
Specification