Unlock instant, AI-driven research and patent intelligence for your innovation.

Portable data carrier with operating error counter

A data carrier and counter technology, which is applied to record carriers used by machines, electrical digital data processing, instruments, etc., can solve problems such as accidental operation errors, disablement, and reduction of data carrier security by authorized users.

Active Publication Date: 2013-05-08
GIESECKE & DEVRIENT MOBILE SECURITY GMBH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This reduces the security of the data carrier
On the other hand, if the initial value is set too low, there is a danger that in the absence of an attack, due to an accidental operational error by an authorized user, or due to technical interrupt and the data carrier is disabled), the counter falls below the minimum permissible value during the operating time of the data carrier
Impaired reliability and permanent operability of the data carrier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable data carrier with operating error counter
  • Portable data carrier with operating error counter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The portable data carrier 10 represented here as a chip card comprises two different data communication interfaces 20 , 22 . The first data communication interface 20 is configured as a contact pad. With this contact pad, the data carrier 10 can be contacted via a contact reading device, for example a common chip card terminal. The second data communication interface 22 is used for contactless data communication and is configured as an antenna coil. In the respective mode of operation, contact or contactless, the power supply to the data carrier 10 takes place in a known manner via the respective data communication interface 20 , 22 , respectively. The data carrier 10 may additionally comprise its own power source, eg in the form of a battery (not shown). Alternatively, the data carrier 10 may also be adapted for only one mode of operation, contact or contactless.

[0033] Furthermore, the data carrier 10 comprises a processor (CPU 30 ), a bank of memories 50 , 60 , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method in a portable data carrier (10) for securing the data carrier (10) against external attacks on the data carrier (10). This is achieved in that at least one counter (62; 64) is used in the data carrier (10). A specified command (54; 56) is secured such that said command can be carried out by the data carrier (10) only when the at least one counter (62; 64) lies in a specified value range. The at least one counter (62; 64) is decremented before an execution of the command (54; 56) and only then incremented when the command (54; 56) is carried out without interruption. The at least one counter (62; 64) can be set multiple times, in particular even after the data carrier (10) outputs to a user.

Description

technical field [0001] The invention relates to a portable data carrier with an operation error counter and a method for protecting commands in the data carrier with the operation error counter. Background technique [0002] An operation error counter is used in conjunction with a portable data carrier, eg a chip card, for limiting unauthorized execution of security-related commands with the purpose of obtaining security-related data of the data carrier. For example, it is known here to limit the number of consecutive spurious inputs. If this number is too high, the data carrier is blocked. Using the operation error counter, other kinds of attacks on arbitrary commands executed on the data carrier can also be identified. For example, if a calculation performed by a command is disturbed by an external action on the data carrier, this can be recognized inside the data carrier by repeated calculations before the result is output, wherein the external action has the effect of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/71G06K19/073G06F21/86
CPCG06F21/78G06F21/86G06F21/558G06F21/71G06K19/07309H04L9/002G06F21/755
Inventor O.吉比斯
Owner GIESECKE & DEVRIENT MOBILE SECURITY GMBH