Abstract:
A fiscal data recorder for storing transaction related data in a point of sale system is provided with a processing unit receiving the transaction related data. Memory in communication with the processing unit is operable to store the transaction related data. A protection circuit acting between the processing unit and the memory inhibits the electronic tampering with the transaction data stored in the memory.
Abstract:
The invention relates to a method of supplying a private quantity (s) in an integrated circuit involved in an authentication procedure by means of an external device that takes said private quantity into account. In order to verify the integrity of said memory element, the private quantity is a function of a signature (SIGN) of at least one memory element (4, 10, 11, 12) associated with the integrated circuit.
Abstract:
The invention relates to a method and an arrangement for controlling access to EEPROMs' and to a corresponding computer software product and a corresponding computer-readable storage medium, which can in particular be used to prevent the unauthorized manipulation of EEPROMs. Specifically, it is possible by using the invention to stop the unauthorized use of totally erased EEPROMs on smart-card controllers. EEPROM fuses that, depending on the application, comprise one or more bits, are used in the continuing course of operation of a controller, to permit or forbid security-related functions. Provision is made as part of the invention for EEPROM fuses to be used to permit writing to the EEPROM only if said fuse comprises a given combination of bits. Any manipulation of this fuse, such as by erasing the entire matrix for example or else by manipulating the booting process, then bars all further write accesses to the EEPROM. Similarly, a chip card where the user erases the entire EEPROM in the event of an attack being detected is automatically barred in this way against any further writing operations.
Abstract:
In an IC card 30 is sealed an IC chip 70 provided with an exposure sensor 84. When exposure sensor 84 detects that IC card 30 has been opened, exposure sensor 84 outputs an exposure detection signal to a CPU 76. In response to the exposure detection signal, CPU 76 provides a predetermined operation, such as erasure of data in a non-volatile memory 78. As such, the data in non-volatile memory 78 cannot be obtained if IC card 30 is improperly opened to check the data in non-volatile memory 78. Thus the IC card can obtain an enhanced data security.
Abstract translation:在IC卡30中密封设置有曝光传感器84的IC芯片70.当曝光传感器84检测到IC卡30已被打开时,曝光传感器84将曝光检测信号输出到CPU 76.响应于曝光检测 CPU 76提供诸如擦除非易失性存储器78中的数据的预定操作。因此,如果IC卡30被不正确地打开以检查非易失性存储器78中的数据,则不能获得非易失性存储器78中的数据。 因此,IC卡可以获得增强的数据安全性。
Abstract:
A smart card system and methods for proving dates of digital data files includes a trusted time source, a first subsystem for saving the file at a moment in time, a second subsystem for retrieving from the trusted time source a date and a time corresponding to the moment in time, a third subsystem for appending the date and the time retrieved from the trusted time source to the saved file, a fourth subsystem for signing the saved file with the date and the time retrieved from the trusted time source appended thereto, a fifth subsystem for hashing the signed file to produce a digest, a sixth subsystem for signing the digest with a key to produce a certificate, a seventh subsystem for appending the certificate to the saved file, and an eighth subsystem for saving the file with the certificate appended thereto. All of the subsystems are preferably sealed together within a smart card.
Abstract:
The invention concerns a method to authenticate the result of executing a command in a token connected to a terminal, the terminal including a communication device to send information to a user of the token, the token transmitting a result to the terminal following the execution. The invention is characterized in that the method includes the steps according to which: a check is carried out to find out whether the command has a sensitive nature, if the command has a sensitive nature, the following steps are carried out, according to which: for any sensitive potential results of the command, at least one item of digitizable information is input via an interface including an input device connected to the token, and the item of digitizable information is transmitted to the token.
Abstract:
A system for managing token image replacement is provided. The system includes a remote server, a personal computer (PC) connected to the remote server, a smartcard that can be read by the PC, and a card image server. Using application logic and rules, the remote server is able to read the card image on the smartcard and determine if the card image on the smartcard needs to be updated. If an indicator on the smartcard is set to nullupdatenull, the remote server then retrieves a backup card image that corresponds to the card from the card image server. The remote server forwards the backup card image to the PC which, in turn, writes the backup card image including transaction information to the smartcard. Once the backup card image is written onto the smartcard, the indicator in the smartcard is then reset to ensure that subsequent interactions with the system would not initiate an update.
Abstract:
A method of setting validity period of IC card, comprises preparing IC card including change unit whose state changes with lapse of time starting from initial state without external power, measuring unit configured to measure state of change unit so as to generate information indicating whether or not validity period has elapsed, and operation unit configured to be operable if information indicates that validity period fails to have yet elapsed, and to be inoperable if information indicates that validity period has elapsed, preparing IC card case capable to house IC card by user, IC card case including identification unit configured to determine whether or not user is legitimate, performing user identification utilizing identification unit, when IC card is housed in IC card case, and transmitting signal to change unit in IC card depending on result of user identification, signal initializing change unit to initial state.
Abstract:
The card contains value information suitable for being debited by the machine in consideration for delivering goods or service. The machine causes a ratification flag stored in the non-volatile memory of the card to be modified between two states, namely: a ratified state corresponding to the case where the preceding transaction performed with the card, whether with the same machine or with another machine, took place correctly, and a non-ratified state for the case when said preceding transaction was interrupted in the course of being executed. The machine successively: conditionally debits the card if the flag is in the ratified state; causes the card to put the flag in the non-ratified state if a debit took place in the preceding step; then causes the goods or service to be delivered; and if delivery takes place effectively in the preceding step, causes the flag to be put by the card into the ratified state.
Abstract:
An integrated circuit device has a memory area that includes a data memory. The data memory has a counter element and an indicator element. The counter element counts at least one number of occurrences of events within the device. When the counter element reaches a threshold value, which is indicative of a large maximum number of occurrences of the events, the indicator element goes from a first state to a second state.