Access control to data processing means
First Claim
1. A method for accessing a data processing means (CA) associated with a secret confidential code (CS) and accessible by applying thereto a confidential code presented (CP) by an accepting means (TE), characterised in that it comprises the following steps:
- first, implementation (E1) of a code transformation function (FT) in the processing means (CA), and then transformation (E2) of the secret code (CS) into a transformed secret code (CST) in the processing means according to the transformation function (FT) and storing (E3) of the transformed secret code (CST) in the processing means; and
at each use of the processing means (CA), transformation (E6) of the presented code (CP) into a transformed presented code (CPT) according to the transformation function implemented in the processing means, and comparison (E7) of the transformed secret code with the transformed presented code in the processing means.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention concerns a method aimed at preventing secret codes manipulations is a data processing means, such as a smart card (CA), by applying thereto a presented code. The method for accessing a functionality of the card comprises prior to implementation (E1) of a code transforming function (FT) in the processing means (CP), transformation (E2) of the secret code (CS) into a transformed secret code (CST) in the card. For each use of the card are provided transformation function, and a comparison (E7) of the transformed secret code with the transformed secret code in the card.
-
Citations
11 Claims
-
1. A method for accessing a data processing means (CA) associated with a secret confidential code (CS) and accessible by applying thereto a confidential code presented (CP) by an accepting means (TE), characterised in that it comprises the following steps:
-
first, implementation (E1) of a code transformation function (FT) in the processing means (CA), and then transformation (E2) of the secret code (CS) into a transformed secret code (CST) in the processing means according to the transformation function (FT) and storing (E3) of the transformed secret code (CST) in the processing means; and
at each use of the processing means (CA), transformation (E6) of the presented code (CP) into a transformed presented code (CPT) according to the transformation function implemented in the processing means, and comparison (E7) of the transformed secret code with the transformed presented code in the processing means. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification