EP1192548A1 - Method for accessing a memory and memory device therefor - Google Patents
Method for accessing a memory and memory device thereforInfo
- Publication number
- EP1192548A1 EP1192548A1 EP00935149A EP00935149A EP1192548A1 EP 1192548 A1 EP1192548 A1 EP 1192548A1 EP 00935149 A EP00935149 A EP 00935149A EP 00935149 A EP00935149 A EP 00935149A EP 1192548 A1 EP1192548 A1 EP 1192548A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- sector
- access
- assigned
- keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims description 35
- 230000001105 regulatory effect Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 abstract description 8
- 230000008520 organization Effects 0.000 description 6
- 101100064676 Mus musculus Edem1 gene Proteins 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
- G06Q20/35765—Access rights to memory zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1466—Key-lock mechanism
Definitions
- the invention relates to a method for accessing a S PEICHER with sectors, wherein a plurality of rows form one sector and a plurality of keys are provided.
- the invention further relates to a memory device having a memory which has a plurality of sectors and a plurality of keys.
- Cards Credit, telephone, insurance or ID cards, to name just a few examples of a large number of so-called machine-readable chip cards, are equipped with a data memory, in some of which highly sensitive data are stored, which are to be protected against unauthorized access.
- a data memory in some of which highly sensitive data are stored, which are to be protected against unauthorized access.
- several keys are usually stored on the chip card.
- a calculation operation is carried out on the chip card and in the read / write device to determine whether the read / write device is authorized to do so.
- keys are provided that only authorize reading, reading and writing of data, or debiting, debiting and debiting of values.
- the memory of a chip card according to the prior art is divided into sectors of the same size, with two keys being allocated to the sector.
- applications often need more than one sector, so that at least one key must be assigned to each sector belonging to an application. Because in such cases the access right is checked again for each sector when processing the data which are within an application, the data processing time is disadvantageously increased.
- each of the sectors Sl to ⁇ n consists of three lines ZI to Z3.
- One or more keys AI, Bl to An, Bn are assigned to each sector; every key entitles to an access right.
- the sectors S1 and S2 contain an application, for example debits from an account
- the same keys are assigned to the sector S2 as the sector S1. Every time access is made from one sector to the other, that is to say from sector S1 to sector S2 or vice versa, the access right is checked again, which increases the access time and thus the total data processing time. Because the sectors are not always fully utilized in smaller applications, existing storage spaces are not used, which is therefore actually superfluous.
- the invention achieves this object in that an application, or possibly also several sectors with variable sector size, is or are provided.
- each of the sectors has an application-specific size, that each sector is provided with an application-specific code and that each key also has a code Code is provided, the NEN the key to access only ei ⁇ by the corresponding application-specific code be voted ⁇ sector justified.
- a second solution to this task provides that one or more access rights and one or more links are assigned to a line, via which one or more keys can be assigned to the line, lines with and without keys are provided and that all lines with the same - The link form a virtual sector.
- the size of the sectors is not the same, but can be adapted to the respective application.
- a memory is divided into several sectors, which are made up of individual lines.
- the number of lines in a sector is chosen depending on the application. At least one line number is assigned to each line. Lines belonging to the same application have the same line number.
- Several keys are provided to organize access according to access rights. Similar to how each line is assigned a line number, each key is assigned a key number. The key number of one
- the measure of adapting the sector size to the respective application means that only one key is required for each application and thus for each sector, whereas in the prior art a key is assigned to each sector of the same application.
- the access right is therefore only checked once during the execution of each application, while it is re-examined in the state of the art for each sector. Therefore, the process achieves a erfmdungsge responsiblye acceleration of data processing and uses the memory op timal ⁇ from.
- a third exemplary embodiment of the invention provides that a signature is provided for each unit, which consists of the key, key number and associated access right. These signatures are stored in the memory SP and checked during authentication.
- lines of the same line number are assigned a signature which is also stored in the memory SP and is checked each time it is accessed.
- the signatures can contain, for example, the chip's serial number in addition to other data.
- the application-specific code of a sector corresponds to the link no. of the sector or its rows.
- the key code corresponds to the key link number. A key therefore only allows access to a sector whose application-specific code is assigned to the code of the key.
- a signature is provided for each unit, which consists of the key, the code of the key and the associated access right. These signatures are stored in the memory and checked during authentication. According to a further exemplary embodiment of the invention j edem sector is assigned a signature that is also stored in the SpeI ⁇ cher and is checked at each access.
- a signature is stored in the memory, which is checked with every data access.
- the signatures can contain, for example, the chip's serial number in addition to other data.
- a key number or a line number can be assigned one or more access rights.
- one or more access rights can be assigned to a key code or a sector code.
- the key code of a key only allows access to sectors with a corresponding sector code.
- Access rights assigned to key codes An access according to the right of access to a sector or a line is only possible if one of the sector codes or one of the line numbers corresponds to one of the key number or key codes of the keys which have been successfully authenticated. Similarly, access is only according to the right to access a sector or a row have been m ö possible if all keys whose bandellmkENn orbondelcodes with the corresponding to the respective access rights delivered ⁇ arranged Zeilenlmkdidn or sector codes successfully authenticated.
- a special access right can be provided for free access.
- Free access can be regulated by a special line number or a special sector code.
- a special key can also be provided in order to regulate free access.
- FIG. 3 shows an exemplary memory organization according to
- Claim 2. 1 shows an example of a memory organization according to the invention, in which two applications, an application AI, which relates, for example, to the debiting of values, and an application A2, which relates, for example, to the opening of values, are integrated on the chip card ,
- the application AI requires six lines ZI to Z6, which are combined to form a sector S1, while the application A2 requires 15 lines Z7 to Z21, which are combined to form a sector S2.
- Three keys A, B, C are provided. Key A only allows reading; keys B and C authorize reading and writing.
- the key A and the key B belong to the application AI; they both have the key number 1.
- the lines of the sector S1 all have the same number, namely 1, which corresponds to the key number of the key A and the key B.
- All lines of the sector S2 have the number 2, which is assigned to the key C.
- Key A can therefore be used to read all lines with line number 1.
- key B all lines with the number 1 can be read and also written.
- key C all lines with line number 2 can be read and written.
- keys A and B cannot be used to access lines with line number 2.
- lines with line number 1 cannot be accessed with key C.
- the memory configuration shown in FIG. 3 is largely flexible.
- the memory is divided into lines of, for example, e eight bytes, which are initially not assigned to any segment. However, each of these lines has an additional sector index register S1 and a configuration register AC, for which only two bytes are additionally required.
- the keys K1 to Kk required for authentication are assigned to a line via the sector index S1.
- a key can be assigned to a line or several keys can be assigned.
- a preferred embodiment of the invention provides for a key pair for each line.
- the two keys of the key pair can have the same rights or be arranged hierarchically. With a hierarchical key concept, the access rights of an individual key can be set individually in the configuration register AC of the line.
- the keys themselves can also be authenticated via other keys or with themselves and read or written according to the access rights in the configuration register. All lines with the same sector index belong to the same application and form a virtual sector.
- the invention is particularly suitable for use on a chip card; However, it is not limited to this one application, because it can be used advantageously wherever access to storage spaces is regulated by access rights.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
Description
Beschreibungdescription
Verfahren zum Zugriff auf einen Speicher und Speichereinrich- tung hierfür V out to access a memory and processing this Speichereinrich-
Die Erfindung betrifft ein Verfahren zum Zugriff auf einen Speicher mit Sektoren, wobei mehrere Zeilen einen Sektor bilden und wobei mehrere Schlüssel vorgesehen sind.The invention relates to a method for accessing a S PEICHER with sectors, wherein a plurality of rows form one sector and a plurality of keys are provided.
Die Erfindung betrifft weiter eine Speichereinrichtung mit einem Speicher, der mehrere Sektoren und mehrere Schlüssel aufweist .The invention further relates to a memory device having a memory which has a plurality of sectors and a plurality of keys.
Kredit-, Telefon-, Versicherungs- oder Ausweiskarten, um nur einige Beispiele einer Vielzahl sogenannter maschinenlesbarer Chipkarten zu nennen, sind mit einem Datenspeicher ausgerüstet, m dem teilweise hochsensible Daten gespeichert sind, die vor unberechtigtem Zugriff zu schützen sind. Zum Schutz hochsensibler Daten sind auf der Chipkarte meist mehrere Schlüssel abgelegt. Vor einer Bearbeitung der im Speicher der Chipkarte gespeicherten Daten, zum Beispiel Lesen, Schreiben, Loschen, Andern, wird sowohl auf der Chipkarte als auch im Schreib/Lesegerat durch eine Rechenoperation festgestellt, ob das Schreib/Lesegerat hierzu berechtigt ist. So sind zum Bei- spiel Schlüssel vorgesehen, die nur zum Lesen, zum Lesen und Schreiben von Daten oder zum Abbuchen, Auf- und Abbuchen von Werten berechtigen.Credit, telephone, insurance or ID cards, to name just a few examples of a large number of so-called machine-readable chip cards, are equipped with a data memory, in some of which highly sensitive data are stored, which are to be protected against unauthorized access. To protect highly sensitive data, several keys are usually stored on the chip card. Before processing the data stored in the memory of the chip card, for example reading, writing, erasing, changing, a calculation operation is carried out on the chip card and in the read / write device to determine whether the read / write device is authorized to do so. For example, keys are provided that only authorize reading, reading and writing of data, or debiting, debiting and debiting of values.
Der Speicher einer Chipkarte gemäß dem Stand der Technik ist m Sektoren gleicher Große aufgeteilt, wobei federn Sektor zwei Schlüssel zugeteilt sind. Häufig benotigen Anwendungen aber mehr als einen Sektor, so dass jedem Sektor, der zu einer Anwendung gehört, auch mindestens ein Schlüssel zugeordnet sein muss. Weil m solchen Fallen deshalb bei der Bearbeitung der Daten, die innerhalb einer Anwendung stehen, für jeden Sektor das Zugriffsrecht erneut geprüft wird, wird die Datenverarbeitungszeit nachteiligerweise erhöht.The memory of a chip card according to the prior art is divided into sectors of the same size, with two keys being allocated to the sector. However, applications often need more than one sector, so that at least one key must be assigned to each sector belonging to an application. Because in such cases the access right is checked again for each sector when processing the data which are within an application, the data processing time is disadvantageously increased.
In der Fig. 2 ist e n bekannter Speicher SP nach dem Stand der Technik mit n Sektoren Sl bis Sn gezeigt; jeder der Sektoren Sl bis Ξn besteht aus drei Zeilen ZI bis Z3. Jedem Sektor sind ein oder mehrere Schlüssel AI, Bl bis An, Bn zuge- ordnet; jeder Schlüssel berechtigt zu einem Zugriffsrecht.2 shows a known memory SP according to the prior art with n sectors S1 to Sn; each of the sectors Sl to Ξn consists of three lines ZI to Z3. One or more keys AI, Bl to An, Bn are assigned to each sector; every key entitles to an access right.
Wenn zum Beispiel die Sektoren Sl und S2 eine Anwendung beinhalten, beispielsweise Abbuchungen von einem Konto, so sind dem Sektor S2 die gleichen Schlüssel zugeordnet wie dem Sek- tor Sl. Jedesmal wenn von einem Sektor auf den anderen, also vom Sektor Sl auf den Sektor S2 oder umgekehrt, zugegriffen wird, erfolgt erneut eine Prüfung des Zugriffsrechts, wodurch die Zugriffszeit und somit die gesamte Datenverarbeitungszeit vergrößert wird. Weil bei kleineren Anwendungen die Sektoren nicht immer voll ausgenutzt werden, werden vorhandene Speicherplätze nicht genutzt, die daher eigentlich überflüssig sind.If, for example, the sectors S1 and S2 contain an application, for example debits from an account, the same keys are assigned to the sector S2 as the sector S1. Every time access is made from one sector to the other, that is to say from sector S1 to sector S2 or vice versa, the access right is checked again, which increases the access time and thus the total data processing time. Because the sectors are not always fully utilized in smaller applications, existing storage spaces are not used, which is therefore actually superfluous.
Es ist daher Aufgabe der Erfindung, ein Verfahren zum Zugriff auf einen Speicher so zu gestalten, dass die Datenverarbeitungszeit wesentlich verkürzt und die Ausnutzung des Speichers optimal wird. Eine weitere Aufgabe ist, eine Speicher- emrichtung hierfür anzugeben.It is therefore an object of the invention to design a method for accessing a memory in such a way that the data processing time is shortened considerably and the utilization of the memory becomes optimal. Another task is to specify a storage device for this.
Die Erfindung lost diese Aufgabe verfahrensgemaß dadurch, dass e Anwendung ein, gegebenenfalls auch mehrere Sektoren mit variabler Sektorgroße vorgesehen ist bzw. sind.According to the method, the invention achieves this object in that an application, or possibly also several sectors with variable sector size, is or are provided.
Die Erfindung lost diese Aufgabe vorπchtungsmaßig dadurch, dass jeder der Sektoren eine anwendungsspezifische Große aufweist, dass jeder Sektor mit einem anwendungsspezifischen Code vesehen ist und dass jeder Schl ssel ebenfalls mit einem Code versehen ist, der den Schlüssel nur zum Zugriff auf ei¬ nen durch den entsprechenden anwendungsspezifischen Code be¬ stimmten Sektor berechtigt.The invention achieves this object in a way that each of the sectors has an application-specific size, that each sector is provided with an application-specific code and that each key also has a code Code is provided, the NEN the key to access only ei ¬ by the corresponding application-specific code be voted ¬ sector justified.
Eine zweite Losung dieser Aufgabe sieht vor, dass einer Zeile e n oder mehrere Zugriffsrechte und ein oder mehrere Verknüpfungen zugeordnet sind, über die der Zeile ein oder mehrere Schlüssel zugeordnet sein können, dass Zeilen mit und ohne Schlüssel vorgesehen sind und dass alle Zeilen mit der glei- chen Verknüpfung einen virtuellen Sektor bilden.A second solution to this task provides that one or more access rights and one or more links are assigned to a line, via which one or more keys can be assigned to the line, lines with and without keys are provided and that all lines with the same - The link form a virtual sector.
Im Gegensatz zu der bekannten Speicherorganisation auf einer Chipkarte ist gemäß der Erfindung die Große der Sektoren nicht gleich, sondern an die jeweilige Anwendung anpassbar.In contrast to the known memory organization on a chip card, according to the invention the size of the sectors is not the same, but can be adapted to the respective application.
In einer Ausfuhrungsform der Erfindung ist ein Speicher m mehrere Sektoren aufgeteilt, die aus einzelnen Zeilen aufgebaut sind. Die Anzahl der Zeilen eines Sektors ist m Abhängigkeit von der Anwendung gewählt. Jeder Zeile ist mindestens eine Zeilenlmknummer zugeordnet. Zeilen, welche zu derselben Anwendung gehören, haben dieselbe Zeilenlmknummer. Um den Zugriff nach Zugriffsrechten zu organisieren, sind mehrere Schlüssel vorgesehen. Ahnlich wie jeder Zeile eine Zeilenlmknummer zugeordnet ist, ist jedem Schlüssel eine Schlus- sellmknummer zugeordnet. Die Schlussellmknummer einesIn one embodiment of the invention, a memory is divided into several sectors, which are made up of individual lines. The number of lines in a sector is chosen depending on the application. At least one line number is assigned to each line. Lines belonging to the same application have the same line number. Several keys are provided to organize access according to access rights. Similar to how each line is assigned a line number, each key is assigned a key number. The key number of one
Schlusseis stimmt mit der Zeilenlmknummer derjenigen Zeile bzw. Zeilen uberem, die dem Schlüssel zugeordnet ist bzw. sind. Ein Schlüssel hat nur Zugriff auf diejenigen Zeilen, deren Zeilenlmknummer mit seiner Schlussellmknummer uber- einstimmt.Final ice agrees with the line number of the line or lines assigned to the key. A key only has access to those lines whose line number corresponds to its key number.
Durch die Maßnahme, die Sektorengroße an die jeweilige Anwendung anzupassen, ist für jede Anwendung und somit für jeden Sektor nur ein Schlüssel erforderlich, wahrend beim Stand der Technik jedem Sektor derselben Anwendung ein Schlüssel zugeordnet ist. Bei der Erfindung wird daher bei der Ausfuhrung jeder Anwendung nur einmal das Zugriffsrecht geprüft, wahrend es beim Stand der Technik bei jedem Sektor erneut geprüft wird. Das erfmdungsgemaße Verfahren erzielt deshalb eine Beschleunigung der Datenverarbeitung und nutzt den Speicher op¬ timal aus.The measure of adapting the sector size to the respective application means that only one key is required for each application and thus for each sector, whereas in the prior art a key is assigned to each sector of the same application. In the invention, the access right is therefore only checked once during the execution of each application, while it is re-examined in the state of the art for each sector. Therefore, the process achieves a erfmdungsgemaße acceleration of data processing and uses the memory op timal ¬ from.
Em drittes Ausfuhrungsbeispiel der Erfindung sieht vor, dass eine Signatur für jede Einheit vorgesehen ist, die aus Schlüssel, Schlussellmknummer und zugehorendem Zugriffsrecht besteht. Diese Signaturen werden im Speicher SP abgelegt und beim Authentisieren geprüft.A third exemplary embodiment of the invention provides that a signature is provided for each unit, which consists of the key, key number and associated access right. These signatures are stored in the memory SP and checked during authentication.
Em weiteres Ausfuhrungsbeispiel sieht vor, Zeilen gleicher Zeilenlmknummern eine Signatur zuzuordnen, die ebenfalls im Speicher SP abgelegt ist und bei jedem Zugriff geprüft wird.In another exemplary embodiment, lines of the same line number are assigned a signature which is also stored in the memory SP and is checked each time it is accessed.
Die Signaturen können zum Beispiel neben weiteren Daten die Seriennummer des Chips enthalten.The signatures can contain, for example, the chip's serial number in addition to other data.
Um einzelnen Zeilen eines Sektors unterschiedliche Zugπffs- berechtigungen zu geben, ist vorgesehen, einer Zeile mehrere Zeilenlmknummern zuzuorden. Jeder Schlüssel, dessen Schlussellmknummer mit einer der Nummern einer Zeile übereinstimmt, hat daher Zugriff auf diese Zeile.In order to give individual lines of a sector different access authorizations, it is provided to assign several line number numbers to one line. Every key whose key number matches one of the numbers on a line therefore has access to this line.
Der anwendungsspezifische Code eines Sektors entspricht der Link-No. des Sektors bzw. dessen Zeilen. Ahnlich entspricht der Schlusselcode der Schlussellinknummer . Em Schlüssel erlaubt daher nur Zugriff auf einen Sektor, dessen anwendungsspezifischer Code dem Code des Schlusseis zugeordnet ist.The application-specific code of a sector corresponds to the link no. of the sector or its rows. Similarly, the key code corresponds to the key link number. A key therefore only allows access to a sector whose application-specific code is assigned to the code of the key.
Bei einem weiteren Ausfuhrungsbeispiel ist eine Signatur für jede Einheit vorgesehen, die aus Schlüssel, Code des Schlusseis und zugehorendem Zugriffsrecht besteht. Diese Signaturen werden im Speicher abgelegt und beim Authentisieren geprüft. Gemäß einem weiteren Ausfuhrungsbeispiel der Erfindung ist jedem Sektor eine Signatur zugeordnet, die ebenfalls im Spei¬ cher abgelegt ist und bei jedem Zugriff geprüft wird.In a further exemplary embodiment, a signature is provided for each unit, which consists of the key, the code of the key and the associated access right. These signatures are stored in the memory and checked during authentication. According to a further exemplary embodiment of the invention j edem sector is assigned a signature that is also stored in the SpeI ¬ cher and is checked at each access.
Weitere Ausfuhrungsbeispiele der Erfindung beinhalten die im Folgenden angeführten Maßnahmen.Further exemplary embodiments of the invention include the measures listed below.
Für Zeilen gleicher Zeilenlmknummern oder für Sektoren ist eine Signatur im Speicher abgelegt, die bei jedem Datenzu- griff geprüft wird.For lines with the same line number or for sectors, a signature is stored in the memory, which is checked with every data access.
Wie bereits an früherer Stelle erwähnt wurde, können die Signaturen zum Beispiel neben weiteren Daten die Seriennummer des Chips enthalten.As already mentioned earlier, the signatures can contain, for example, the chip's serial number in addition to other data.
Einer Schlussellmknummer oder einer Zeilenlmknummer können em oder mehrere Zugriffsrechte zugeordnet sein. Auf ahnliche Weise können einem Schlusselcode oder einem Sektorcode em oder mehrere Zugriffsrechte zugeordnet sein. Der Schlussel- code eines Schlüssels erlaubt nur Zugriff auf Sektoren mit einem korrespondierenden Sektorcode.A key number or a line number can be assigned one or more access rights. Similarly, one or more access rights can be assigned to a key code or a sector code. The key code of a key only allows access to sectors with a corresponding sector code.
Einer Zeile können auch mehrere Zeilenlmknummern zugeordnet sein.Several line numbers can also be assigned to a line.
Weitere Ausfuhrungsbeispiele bzw. Ausgestaltungen der Erfindung sehen die folgenden Maßnahmen vor.The following measures provide further exemplary embodiments or refinements of the invention.
Eine erfolgreiche Aut entisierung mit einem Schlüssel erlaubt alle Zugriffe gemäß der den Schlussellmknummern bzw. denSuccessful authentication with a key allows all accesses according to the key number or the
Schlusselcodes zugeordneten Zugriffsrechten. Em Zugriff gemäß Zugriffsrecht auf einen Sektor oder eine Zeile ist nur dann möglich, wenn einer der Sektorcodes oder eine der Zeilenl knummern mit einer der Schlussellmknummern oder Schlusselcodes der Schlüssel korrespondiert, die erfolgreich authentisiert worden sind. Auf ähnliche Weise ist e Zugriff gemäß Zugriffsrecht auf einen Sektor bzw. eine Zeile nur dann möglich, wenn alle Schlüssel, deren Schlussellmknummern oder Schlusselcodes mit der den jeweiligen Zugriffsrechten zuge¬ ordneten Zeilenlmknummern oder Sektorcodes korrespondieren, erfolgreich authentisiert worden sind.Access rights assigned to key codes. An access according to the right of access to a sector or a line is only possible if one of the sector codes or one of the line numbers corresponds to one of the key number or key codes of the keys which have been successfully authenticated. Similarly, access is only according to the right to access a sector or a row have been m ö possible if all keys whose Schlussellmknummern or Schlusselcodes with the corresponding to the respective access rights delivered ¬ arranged Zeilenlmknummern or sector codes successfully authenticated.
Weiter kann vorgesehen sein, die Schlüssel m Zeilen oder Sektoren anzuordnen, welche durch Zugriffsrechte verwaltet werden. Beispielsweise kann em Leserecht erforderlich sein, um eine Authentisierung mit einem Schlüssel zu erlauben. Es ist auch möglich, ein besonderes Recht für Authentisierung vorzusehen, um eine Authentisierung mit einem Schlüssel zu erlauben. Dies schließt jedoch nicht aus, dass auch Zeilen oder Sektoren vorgesehen sein können, die für bestimmte Zu- griffsarten keine Authentisierung benotigen.Provision can further be made to arrange the keys in m rows or sectors, which are managed by access rights. For example, read permission may be required to allow authentication with a key. It is also possible to provide a special right for authentication in order to allow authentication with a key. However, this does not exclude that lines or sectors can also be provided that do not require authentication for certain types of access.
Analog zur Authentisierung kann zum freien Zugriff ein besonderes Zugriffsrecht vorgesehen sein. Em freier Zugriff kann über eine besondere Zeilenlmknummer oder einen besonderen Sektorcode geregelt sein. Schließlich kann auch e besonde- rer Schlüssel vorgesehen sein, um einen freien Zugriff zu regeln.Analogous to authentication, a special access right can be provided for free access. Free access can be regulated by a special line number or a special sector code. Finally, a special key can also be provided in order to regulate free access.
Anhand der Zeichnungen werden nun Ausfuhrungsbeispiele einer erfmdungsgemaßen Speicherorgamsation beschrieben und erlau- tert.Exemplary embodiments of a storage organization according to the invention are now described and explained with the aid of the drawings.
Es zeigen:Show it:
Fig. 1 eine beispielhafte Speicherorganisation gemäß der Erfindung,1 shows an exemplary memory organization according to the invention,
Fig. 2 die Speicherorganisation gemäß dem Stand der Technik,2 shows the memory organization according to the prior art,
Fig. 3 eine beispielhafte Speicherorganisation gemäß3 shows an exemplary memory organization according to
Anspruch 2. In der Fig. 1 ist beispielhaft eine erfmdungsgemaße Speicherorganisation dargestellt, bei der zwei Anwendungen, eine Anwendung AI, die zum Beispiel das Abbuchen von Werten be- trifft, und eine Anwendung A2 , die zum Beispiel das Aufbucnen von Werten betrifft auf der Chipkarte integriert sind. Die Anwendung AI benotigt sechs Zeilen ZI bis Z6, die zu einem Sektor Sl zusammengefasst sind, wahrend die Anwendung A2 15 Zeilen Z7 bis Z21 benotigt, die zu einem Sektor S2 zusammen- gefasst sind. Es sind drei Schlüssel A, B, C vorgesehen. Der Schlüssel A berechtigt nur zum Lesen; die Schlüssel B und C berechtigen zum Lesen und Schreiben. Der Schlüssel A und der Schlüssel B gehören zur Anwendung AI; sie naben beide die Schlussellmknummer 1. Die Zeilen des Sektors Sl haben alle die gleiche Nummer namlich 1, die mit der Schlussellmknummer des Schlusseis A und des Schlüssels B übereinstimmt. Alle Zeilen des Sektors S2 haben die Nummer 2, die dem Schlüssel C zugeordnet ist. Mit dem Schlüssel A können daher alle Zeilen mit der Zeilenlmknummer 1 gelesen werden. Mit dem Schlüssel B können alle Zeilen mit der Nummer 1 gelesen und auch beschrieben werden. Mit dem Schlüssel C können alle Zeilen mit der Zeilenlmknummer 2 gelesen und beschrieben werden. Dagegen kann mit den Schlüsseln A und B nicht auf die Zeilen mit der Zeilenlmknummer 2 zugegriffen werden. Ebenso kann mit dem Schlüssel C nicht auf die Zeilen mit der Zeilenlmknummer 1 zugegriffen werden.Claim 2. 1 shows an example of a memory organization according to the invention, in which two applications, an application AI, which relates, for example, to the debiting of values, and an application A2, which relates, for example, to the opening of values, are integrated on the chip card , The application AI requires six lines ZI to Z6, which are combined to form a sector S1, while the application A2 requires 15 lines Z7 to Z21, which are combined to form a sector S2. Three keys A, B, C are provided. Key A only allows reading; keys B and C authorize reading and writing. The key A and the key B belong to the application AI; they both have the key number 1. The lines of the sector S1 all have the same number, namely 1, which corresponds to the key number of the key A and the key B. All lines of the sector S2 have the number 2, which is assigned to the key C. Key A can therefore be used to read all lines with line number 1. With key B, all lines with the number 1 can be read and also written. With the key C, all lines with line number 2 can be read and written. On the other hand, keys A and B cannot be used to access lines with line number 2. Likewise, lines with line number 1 cannot be accessed with key C.
Durch die erf dungsgemaße Maßnahme, die Sektorengroße an die einzelnen Anwendungen anzupassen, ist nur eine Prüfung des Zugπffsrechts je Anwendung erforderlich, wahrend, wie bereits erwähnt, beim Stand der Technik soviele Prüfungen erforderlich sind, wie eine Anwendung Sektoren belegt.As a result of the measure according to the invention of adapting the sector size to the individual applications, only one check of the right of access per application is required, while, as already mentioned, as many tests are required in the prior art as one application proves sectors.
Es wird nun em Ausfuhrungsbeispiel des Verfahrens, das der Fig. 3 gezeigt ist, beschrieben und erläutert. Die m der Fig. 3 abgebildete Speicherkonfiguration ist weitgehend flexibel gestaltet. Der Speicher ist m n Zeilen zu beispielsweise e acht Byte unterteilt, die zunächst keinem Segment zugeordnet sind. Jede dieser Zeilen besitzt jedoch em zusätzliches Sektorindexregister Sl sowie ein Konfigurationsregister AC, wofür nur zwei Byte zusatzlich benotigt werden. Über den Sektorindex Sl werden einer Zeile die zur Authentifizierung notigen Schlüssel Kl bis Kk zugeordnet. Einer Zeile kann em Schlüssel oder können auch mehrere Schlus- sei zugeordnet sein. Eine bevorzugte Ausgestaltung der Erfindung sieht vor, em Schlusselpaar für jede Zeile vorzusehen. Die beiden Schlüssel des Schlusselpaares können gleichberechtigt oder hierarchisch geordnet sein. Bei hierarischem Schlusselkonzept können die Zugriffsrechte eines einzelnen Schlüssels im Konfigurationsregister AC der Zeile individuell eingestellt werden. Auch die Schlüssel selbst können wieder über andere Schlüssel oder mit sich selbst authentifiziert und entsprechend den im Konflgurationsregister stehenden Zugriffsrechten gelesen oder geschrieben werden. Alle Zeilen mit gleichem Sektorindex gehören der gleichen Applikation an und bilden einen virtuellen Sektor.Em exemplary embodiment of the method shown in FIG. 3 will now be described and explained. The memory configuration shown in FIG. 3 is largely flexible. The memory is divided into lines of, for example, e eight bytes, which are initially not assigned to any segment. However, each of these lines has an additional sector index register S1 and a configuration register AC, for which only two bytes are additionally required. The keys K1 to Kk required for authentication are assigned to a line via the sector index S1. A key can be assigned to a line or several keys can be assigned. A preferred embodiment of the invention provides for a key pair for each line. The two keys of the key pair can have the same rights or be arranged hierarchically. With a hierarchical key concept, the access rights of an individual key can be set individually in the configuration register AC of the line. The keys themselves can also be authenticated via other keys or with themselves and read or written according to the access rights in the configuration register. All lines with the same sector index belong to the same application and form a virtual sector.
Em Vorteil dieses Konzeptes liegt darin, dass jeder Applika- tionsschlussel unabhängig von der Große der Applikation nur einmal gespeichert werden muss. Die Große und Anzahl der Segmente ist frei wahlbar. Die Anzahl der definierten Segmente bestimmt die Anzahl der benotigten Schlusselpaare, so dass der verbleibende Speicherplatz für Applikationsdaten voll zur Verfugung steht.The advantage of this concept is that each application key, regardless of the size of the application, only has to be saved once. The size and number of segments is freely selectable. The number of defined segments determines the number of key pairs required, so that the remaining storage space for application data is fully available.
Die Erfindung ist besonders für den Einsatz auf einer Chipkarte geeignet; sie ist jedch nicht auf diesen einen Anwendungsfall beschrankt, denn sie lasst sich überall dort vorteilhaft einsetzen, wo der Zugriff auf Speicherplatze durch Zugriffsrechte geregelt ist. The invention is particularly suitable for use on a chip card; However, it is not limited to this one application, because it can be used advantageously wherever access to storage spaces is regulated by access rights.
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00935149A EP1192548A1 (en) | 1999-06-24 | 2000-05-30 | Method for accessing a memory and memory device therefor |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99112171 | 1999-06-24 | ||
EP99112171A EP1065598A1 (en) | 1999-06-24 | 1999-06-24 | Method of protected access to a memory and corresponding memory device |
EP00935149A EP1192548A1 (en) | 1999-06-24 | 2000-05-30 | Method for accessing a memory and memory device therefor |
PCT/EP2000/004940 WO2001001258A1 (en) | 1999-06-24 | 2000-05-30 | Method for accessing a memory and memory device therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1192548A1 true EP1192548A1 (en) | 2002-04-03 |
Family
ID=8238414
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99112171A Withdrawn EP1065598A1 (en) | 1999-06-24 | 1999-06-24 | Method of protected access to a memory and corresponding memory device |
EP00935149A Withdrawn EP1192548A1 (en) | 1999-06-24 | 2000-05-30 | Method for accessing a memory and memory device therefor |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99112171A Withdrawn EP1065598A1 (en) | 1999-06-24 | 1999-06-24 | Method of protected access to a memory and corresponding memory device |
Country Status (10)
Country | Link |
---|---|
US (1) | US20020089890A1 (en) |
EP (2) | EP1065598A1 (en) |
JP (1) | JP2003522351A (en) |
KR (1) | KR20020013590A (en) |
CN (1) | CN1357125A (en) |
BR (1) | BR0011915A (en) |
MX (1) | MXPA01013169A (en) |
RU (1) | RU2002101623A (en) |
UA (1) | UA66929C2 (en) |
WO (1) | WO2001001258A1 (en) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4393733B2 (en) * | 2001-11-27 | 2010-01-06 | 大日本印刷株式会社 | Portable information recording medium |
JP4557969B2 (en) * | 2003-03-31 | 2010-10-06 | エヌエックスピー ビー ヴィ | How to grant smart card change rights |
TW595195B (en) * | 2003-04-04 | 2004-06-21 | Benq Corp | Network lock method and related apparatus by ciphered network lock and inerasable deciphering key |
DE10339212A1 (en) * | 2003-08-26 | 2005-03-31 | Infineon Technologies Ag | Data transmission system and method for operating a data transmission system |
CH716409B1 (en) | 2003-11-12 | 2021-01-29 | Legic Identsystems Ag | Method for writing a data organization in identification media and for writing and executing applications in the data organization. |
FR2864859A1 (en) * | 2004-01-05 | 2005-07-08 | Pestel Laurent Michel Christop | Chip card for allowing provision of e.g. mobile telephone service, has application software scanning general data of client stored in memory zone, and distinct memory zones, for services, collecting parameters that are specific to them |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
RU2007127725A (en) | 2004-12-20 | 2009-01-27 | ПРОКСЕНС, ЭлЭлСи (US) | PERSONAL DATA (PDK) AUTHENTICATION BY BIOMETRIC KEY |
US20060248267A1 (en) * | 2005-04-29 | 2006-11-02 | Programmable Microelectronics Corporation | Flash memory having configurable sector size and flexible protection scheme |
US9113464B2 (en) | 2006-01-06 | 2015-08-18 | Proxense, Llc | Dynamic cell size variation via wireless link parameter adjustment |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US8412949B2 (en) | 2006-05-05 | 2013-04-02 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
WO2009016541A1 (en) * | 2007-08-01 | 2009-02-05 | Nxp B.V. | Mobile communication device and method for recovering mifare memory |
WO2009062194A1 (en) | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
WO2009079666A1 (en) | 2007-12-19 | 2009-06-25 | Proxense, Llc | Security system and method for controlling access to computing resources |
WO2009102979A2 (en) | 2008-02-14 | 2009-08-20 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US20110016275A1 (en) * | 2008-03-04 | 2011-01-20 | Nxp B.V. | Mobile communication device and method for implementing mifare memory multiple sectors mechanisms |
CN101965597B (en) * | 2008-03-10 | 2014-08-06 | Nxp股份有限公司 | Method and devices for installing and retrieving linked MIFARE applications |
WO2009126732A2 (en) | 2008-04-08 | 2009-10-15 | Proxense, Llc | Automated service-based order processing |
EP2286365B1 (en) * | 2008-05-29 | 2017-03-01 | Nxp B.V. | Method and trusted service manager for providing fast and secure access to applications on an ic card |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US9322974B1 (en) | 2010-07-15 | 2016-04-26 | Proxense, Llc. | Proximity-based system for object tracking |
US9265450B1 (en) | 2011-02-21 | 2016-02-23 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
CN102855517A (en) * | 2012-08-22 | 2013-01-02 | 中国银行股份有限公司 | Intelligent bank card with hospital general treatment function |
WO2014183106A2 (en) | 2013-05-10 | 2014-11-13 | Proxense, Llc | Secure element as a digital pocket |
DE102014222622A1 (en) * | 2014-11-05 | 2016-05-12 | Bundesdruckerei Gmbh | Method for changing a data structure stored in a chip card, signature device and electronic system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2473755B1 (en) * | 1980-01-11 | 1986-05-30 | Titn | METHOD AND ELECTRONIC DEVICE FOR STORING AND CONFIDENTIAL DATA PROCESSING |
FR2661532A1 (en) * | 1990-04-26 | 1991-10-31 | Sgs Thomson Microelectronics | Memory with wordwise protected access |
DE69500346T2 (en) * | 1995-01-23 | 1997-12-11 | Ibm | Improved memory self-check |
WO1997022092A2 (en) * | 1995-12-14 | 1997-06-19 | Venda Security Corporation | Secure personal information card and method of using the same |
JP4071285B2 (en) * | 1996-03-11 | 2008-04-02 | カバ シュリースシステーメ アーゲー | Identification medium with passive electronic data carrier |
-
1999
- 1999-06-24 EP EP99112171A patent/EP1065598A1/en not_active Withdrawn
-
2000
- 2000-05-30 RU RU2002101623/09A patent/RU2002101623A/en not_active Application Discontinuation
- 2000-05-30 WO PCT/EP2000/004940 patent/WO2001001258A1/en not_active Application Discontinuation
- 2000-05-30 BR BR0011915-6A patent/BR0011915A/en not_active IP Right Cessation
- 2000-05-30 JP JP2001507202A patent/JP2003522351A/en not_active Withdrawn
- 2000-05-30 MX MXPA01013169A patent/MXPA01013169A/en unknown
- 2000-05-30 CN CN00809359A patent/CN1357125A/en active Pending
- 2000-05-30 KR KR1020017016414A patent/KR20020013590A/en active IP Right Grant
- 2000-05-30 EP EP00935149A patent/EP1192548A1/en not_active Withdrawn
- 2000-05-30 UA UA2001128923A patent/UA66929C2/en unknown
-
2001
- 2001-12-24 US US10/026,111 patent/US20020089890A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO0101258A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2001001258A1 (en) | 2001-01-04 |
CN1357125A (en) | 2002-07-03 |
BR0011915A (en) | 2002-03-19 |
MXPA01013169A (en) | 2002-09-02 |
UA66929C2 (en) | 2004-06-15 |
KR20020013590A (en) | 2002-02-20 |
US20020089890A1 (en) | 2002-07-11 |
RU2002101623A (en) | 2003-07-27 |
EP1065598A1 (en) | 2001-01-03 |
JP2003522351A (en) | 2003-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001001258A1 (en) | Method for accessing a memory and memory device therefor | |
DE3811378C3 (en) | Information recording system | |
EP0512542B1 (en) | Data-protecting microprocessor circuit for portable record carriers, for example credit cards | |
DE69815258T2 (en) | Electrically programmable and erasable non-volatile memory with a read and / or write protected area including associated electronic circuitry | |
DE69230773T2 (en) | Data processing device with progressively programmable non-volatile memory and method therefor | |
EP0766211A2 (en) | Multifunctional IC-card | |
EP1326256A2 (en) | Device and method for programming and verification of EEPROM pages, corresponding computer program and computer-readable memory medium | |
EP0805607B1 (en) | Method for accessing at least a part of the data of a microprocessor card | |
EP1358558B1 (en) | Microprocessor circuit for data carriers and a method for organising access to data stored in a memory | |
EP0128362A1 (en) | Circuit arrangement comprising a memory and an access control unit | |
DE69316516T2 (en) | Secured chip card system with reusable prototype card | |
DE4404841C2 (en) | Storage and selective information transfer system for personal data | |
DE10164422A1 (en) | Method for writing to NV memories in computer architecture, requires data values or data words to be written to specified position of cache-page register of NV memory | |
EP0127809B1 (en) | Circuit arrangement comprising a memory and an access control unit | |
WO1996028795A1 (en) | Chip card with protected operating system | |
EP1658575B1 (en) | Data transmission system and method for operating a data transmission system | |
EP1352318B1 (en) | Microprocessor circuit for portable data carriers | |
DE4107558C2 (en) | ||
EP1338970B1 (en) | Method and system to control access to EEPROMs as well as corresponding computer program product and computer readable storage medium | |
WO1991003028A1 (en) | Process for coding and availability of a chip card | |
EP1208544B1 (en) | Portable data carrier and method for using the same in a plurality of applications | |
DE3025044A1 (en) | DEVICE FOR PROTECTING ACCESS TO PERMANENT STORAGE IN A DATA PROCESSING SYSTEM | |
DE10127194B4 (en) | Method and device for hiding non-functional memory cells | |
DE19709975C2 (en) | Microcomputer | |
EP0890172B1 (en) | Solid-state memory device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20011204 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: AL;LT;LV;MK;RO;SI |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20040817 |