首页>
外国专利>
Tamper proof electronic circuitry for deploying a device, device implemented with a tamperproof electronic circuit, and security data management methods for a device to maintain data security against network communication between a device network and an external communication partner, and to tag digital content produced by a content production device.
Tamper proof electronic circuitry for deploying a device, device implemented with a tamperproof electronic circuit, and security data management methods for a device to maintain data security against network communication between a device network and an external communication partner, and to tag digital content produced by a content production device.
"ELECTRONIC INFRINGEMENT PROCEDURE FOR IMPLEMENTATION ON A DEVICE, DEVICE IMPLEMENTED WITH AN ELECTRONIC INFRINGEMENT CIRCUIT, AND SECURITY DATA MANAGEMENT METHODS FOR SECURITY DETERMINATION AND COMMUNICATION DETERMINATION NETWORK DEVICE AND EXTERNAL COMMUNICATION PARTNER, AND TO MARK DIGITAL CONTENT PRODUCED BY A CONTENT PRODUCTION DEVICE ". The invention relates to a tamper-proof electronic circuit (10) configured for implementation on a device (100). Electronic circuit 10 safely implements and utilizes device-specific security data during operation on device 100, and is basically provided with a tamper resistant stored secret (C) not accessible via an external circuit interface. The electronic circuitry (10) is also provided with functionality (13) to perform cryptographic processing at least partially in response to the stored secret, to generate an instance of device-specific security data that is internally confined within said electronic circuitry (10). ) while using the device (100). The electronic circuit (10) is additionally configured to perform one or more security-related operations or algorithms (14) in response to internally confined device-specific safety data. In this way, the secure implementation and use of device-specific safety data for security purposes can be effectively achieved. Security is uncompromised since the stored secret (C) is never available outside the electronic circuit, and device-specific security data is internally confined within the circuit during use or operation of the device.
展开▼