×

Method for checking the integrity of a program or data, and apparatus for implementing this method

  • US 5,442,645 A
  • Filed: 10/24/1994
  • Issued: 08/15/1995
  • Est. Priority Date: 06/06/1989
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for verifying integrity, against an original message (M), of a subsequent message containing information, the method including the steps of:

  • storing the original message in an electronic portable object (1) having a processing circuit (11) and at least one non-volatile memory area (10) accessible only by said processing circuit (11);

    storing a secret key (K) in the at least one non-volatile memory area (10) of the electronic portable object;

    using the processing circuit (11) and the secret key (K) to apply an algorithm (A) to at least a part of the original message to calculate at least one original signature (S1, S2, . . . Sm) of the original message within the electronic portable object;

    storing each original signature (S, S1, S2, . . . Sm) of the original message in said at least one non-volatile memory area (10) of the electronic portable object under control of the processing circuit (11);

    verifying the integrity of the subsequent message against the original message by executing the algorithm (A) within the processing circuit (11) of the electronic portable object, the processing circuits (11) having inputs of the subsequent message and the secret key (K), to calculate at least one subsequent signature of at least one part of the subsequent message to be verified;

    using the processing circuit (11) of the portable object to compare, within the electronic portable object, each subsequent signature calculated from the subsequent message with each original signature from the memory area (10) of the portable object; and

    displaying to a user using a computer system external to the portable object, whether or not each subsequent signature calculated from the subsequent message is in matching relationship with a respective original signature calculated from a respective original message,wherein algorithm (A) is a calculation algorithm which takes into account, for calculation of each original and subsequent signature, at least one secret key (K) stored in the memory area (10) of the portable object, accessible only within the electronic portable object and under control of said processing circuits (11).

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×