Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for cryptographic authentication

A technology of cryptographic authentication and cryptographic algorithm, applied in the fields of digital data authentication, instruments, electrical digital data processing, etc., can solve problems such as inability to obtain solutions

Inactive Publication Date: 2009-06-10
NXP BV
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the solutions known from the prior art cannot be obtained only by using software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for cryptographic authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] figure 1 shows a method 100 according to the present invention, wherein three EEPROM segments Z 1 ,Z 2 and Z 3 Used for safe storage of consecutive counts. The method 100 according to the invention represents the sequence of operations for securely counting and storing in the EEPROM 10 in the increment process 11 in which the increment process 11 is to be successfully implemented in the application, thereby subsequently entering the allowed access (Read, Write) Status of the EEPROM 10, ie access (ie read and write) is granted only if the INCREMENT command is executed successfully. In the first step a), one of the three EEPROM segments is searched for an invalid count Z valid , that is, make a query to determine if counting Z 1 ,Z 2 and Z 3 There is an invalid count Z in invalid . If such an invalid count Z does exist invalid , then in the next step b), if there are indeed invalid counts, then from the remaining valid counts Z i and Z j (i, j = 1, 2, 3) form ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for cryptographic authentication in access security systems. The aim of the invention is to provide a software solution. To this end, the method for secured storage of counter states in a non-volatile memory (EEPROM) (10) involves an incrementing (11) process, and the current counter state is updated in only one EEPROM segment following each incrementing process (11), a subsequent access to the EEPROM (10) only being enabled in the event of a successful incrementing (11) of an EEPROM-based counter.

Description

technical field [0001] The invention relates to a password authentication method in an access security system. Background technique [0002] In access security systems for automotive technology in the state of the art, so-called mutual authentication protocols are implemented, in which the calculation of the cryptographic signature is based not only on keys but also on random numbers, the calculation of the cryptographic signature is entirely performed by the The base station provides. In transponders for automotive applications, only the vehicle base station provides a single changeable component for the calculation of the cryptographic signature. [0003] Today, in the field of chip cards, a random number generator is supported on the chip card (the random number generator is usually based on a specific RC oscillator). Such an implementation in an access security system for automotive applications is almost unthinkable for reasons such as cost control. [0004] The adva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/20G06F21/34
CPCG06F21/34G06F2221/2103G06F9/06G06F12/00
Inventor 伊尔根·诺沃特尼克弗兰克·波尔
Owner NXP BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products