Unlock instant, AI-driven research and patent intelligence for your innovation.

Smart-card chip arrangement

a chip arrangement and card chip technology, applied in the field of smart card chip arrangement, can solve the problems of chip refusing to continue operation, loss of encryption key, and depackaging procedure leaving the protection grid inta

Inactive Publication Date: 2009-03-12
SEIKO EPSON CORP +1
View PDF7 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0026]Either of these methods may include the further step of using said ta

Problems solved by technology

Damage to the protection grid is detected, which triggers an alarm and thus causes the chip to refuse further operation.
If the packaging is damaged or removed, the encryption key is lost.
A drawback with the use of metal protection grids is that the depackaging procedure leaves the protection grid intact.
However, since the feature size of the metal grid is much bigger than what the FIB can achieve, it is highly likely that the grid will be unable to provide sufficient protection (as demonstrated by Kommerling and Kuhn in the above-mentioned paper).
This is expected to consume significant area on the chip and complicate routing, not least because metal wires running above a sensor will shield it from the relevant property of the packaging, thereby defeating the purpose.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart-card chip arrangement
  • Smart-card chip arrangement
  • Smart-card chip arrangement

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0047]a smart-card chip arrangement in accordance with the invention is illustrated in FIGS. 1 and 2. In FIG. 1 a smart-card chip 10, which may be a standard chip supplied by a suitable supplier, has applied to its upper surface a single organic conductive layer 12. The organic conductive layer 12, which, as already stated, may have conducting or semiconducting properties, is applied as a strip of material in a grid configuration over the upper surface of the chip 10. This strip is connected at its two ends to respective bond pads 14, 16, which in turn are connected to suitable control circuitry located on the chip. The control circuitry provides operating signals for at least indirectly assessing the properties of the organic layer.

[0048]In this embodiment the layer is used as an RC (resistor-capacitor) delay line and the control circuitry feeds a pulse into one end of the delay line and measures the time it takes for the pulse to reach the other end. An alarm is triggered if the r...

third embodiment

[0056]FIG. 6 shows the corresponding sequence of events for the third embodiment shown in FIG. 4. Before a card containing the smartcard chip is issued, the protection layer is “read” by determining its response to an input pulse. This is the pre-characterizing phase. As already explained, this response is in the form of a delay time, which is used in conjunction with a set of pre-key bits in non-volatile memory 28 to derive the cryptographic key for the chip at the output of the transform logic circuit 40. Subsequently, when the smartcard is used, it is inserted into a card reader, which powers on the card (step S120). The protection layer is then re-read in a characterisation step (S122), which derives the key once again (step S124) based on the updated properties of the protection layer. If those properties remain the same, the key will remain the same, indicating that the layer has not been damaged and so tampering has not occurred. Consequently, the transaction (e.g. the withdr...

fourth embodiment

[0062]The use of at least two separate protection layers allows the use of the invention, which is illustrated in FIG. 10. In this embodiment a first organic protection layer, which is modelled as an RC network 70 in FIG. 10, is formed as a lower layer (e.g. the layer 62 in FIG. 9), while a second organic protection layer, which is modelled as an RC network 72 in FIG. 10, is formed as an upper layer (the layer 60 in FIG. 9). Both layers are tested for their time-delay in response to a pulse input from a generator 74, these time delays being detected by respective timers 76, 78, which receive input signals from respective signal detectors 80, 82. In addition a memory 84 has stored therein the value of a reference time delay. So far the testing circuit for each layer in FIG. 10 resembles that shown in FIG. 2 for testing the single layer shown in FIG. 1. An additional component in FIG. 10, however, is a processor circuit 86, which takes as its inputs the outputs of the timers 76 and 78...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A smart-card chip arrangement includes a smart-card chip, an organic conductive layer disposed on a surface of the chip, and signal-deriving means for deriving a signal dependent on one or more properties of the organic conductive layer. The organic conductive layer and the signal-deriving means are configured such as to detect an invasive attack on the chip. By this means the unauthorized detection of a cryptographic key, which is employed by the chip, can be prevented.

Description

BACKGROUND OF THE INVENTION[0001]An aspect of the present invention relates to a smart card chip arrangement and a method for protecting a smart-card chip arrangement from unauthorized tampering.[0002]Smart cards are used for a multitude of applications and, in order to protect the user or provide identification for the relevant application, they generally perform some form of encryption or decryption. To this end, a secret key is stored on the chip to render the cryptographic function unique. Attacks from unauthorised parties aim to retrieve this secret key and hence allow the attacker to duplicate or otherwise misuse the smart card. There are two classes of attack: non-invasive and invasive. The present invention is able to find a solution to the latter.[0003]Invasive attacks on smart cards are performed by partially or completely removing the packaging of the microchip of the smart card. The depackaging step may be achieved using acids, solvents, laser cutters, or chemical mechan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/073G06F21/77G06F21/87
CPCG06F21/77G06K19/07381G06F21/87G06K19/07372
Inventor PAUL, PHILIP C.TAM, SIMONMOORE, SIMON
Owner SEIKO EPSON CORP