Security module with volatile memory for storing an algorithm code
First Claim
1. A security module for use with a terminal, comprising a data interface adapted to be coupled to a terminal, for receiving at least part of an algorithm code or of the complete algorithm code from the terminal, with the algorithm code concerning a processing of secrets, an energy interface for receiving supply energy from the terminal;
- a volatile memory for storing the part of the algorithm code or the complete algorithm code received via the data interface, said volatile memory being coupled to the energy interface in order to have energy supplied thereto such that the same will be cleared upon an interruption of the receipt of the supply energy from the terminal; and
a processor for performing the algorithm code in order to obtain an algorithm code result that can be delivered to the terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
A security module for use with a terminal comprises a data interface adapted to be coupled to a terminal, for receiving at least part of an algorithm code or the complete algorithm code from the terminal, as well as an energy interface for receiving supply energy. A volatile memory coupled to the energy interface in order to have energy supplied thereto stores the part of the algorithm code or the complete algorithm code received via the data interface, with a processor performing the algorithm code in order to obtain an algorithm code result that can be delivered to the terminal. Due to the storing of at least part of an algorithm code in the volatile memory of the security module, according to the invention, the algorithm code of the security module is effectively protected against spying out by a potential attacker.
88 Citations
16 Claims
-
1. A security module for use with a terminal, comprising
a data interface adapted to be coupled to a terminal, for receiving at least part of an algorithm code or of the complete algorithm code from the terminal, with the algorithm code concerning a processing of secrets, an energy interface for receiving supply energy from the terminal; -
a volatile memory for storing the part of the algorithm code or the complete algorithm code received via the data interface, said volatile memory being coupled to the energy interface in order to have energy supplied thereto such that the same will be cleared upon an interruption of the receipt of the supply energy from the terminal; and
a processor for performing the algorithm code in order to obtain an algorithm code result that can be delivered to the terminal. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
-
-
2. A security module, further comprising:
a non-volatile memory in which the non-received remainder of the algorithm code is stored.
-
11. A process for computing an algorithm code result using a security module, comprising the steps of:
-
receiving at least part of an algorithm code or the complete algorithm code by means of an energy interface, with the algorithm code concerning a processing of secrets;
volatile-storing said part of the algorithm code or said complete algorithm code in a volatile memory of the security module, with the volatile memory being coupled to the energy interface, to be supplied with energy, such that the same will be cleared upon an interruption of the receipt of the supply energy from the terminal;
performing said algorithm code on the security module in order to obtain an algorithm code result;
delivering said algorithm code result to the terminal; and
clearing said volatile memory upon an interruption of the receipt of the supply energy from the terminal. - View Dependent Claims (12)
-
-
13. A terminal for use with a security module, comprising:
-
a data interface adapted to be coupled to the security module, for transmitting at least part of an algorithm code or the complete algorithm code from the terminal to a volatile memory of the security module and for receiving the algorithm code result from the security module, with the algorithm code concerning a processing of secrets; and
an energy interface for delivering supply energy to the security module, with the volatile memory being supplied by the supply energy, such that the same will be cleared upon an interruption of the receipt of the supply energy from the terminal, with the terminal, for each communication operation between terminal and security module during one and the same communication operation with the security module, being designated to send at least the part of the algorithm code or the complete algorithm code to the volatile memory of the security module; and
,subsequently, during the further communication process, receive the algorithm code result from the security module.
-
-
14. A process for controlling a security module using a terminal in order to obtain an algorithm code result from the security module, with the process comprising for each communication operation, performing the following steps during one and the same communication operation with the security module:
-
delivering supply energy from the terminal to the security module;
transmitting at least part of an algorithm code or the complete algorithm code from the terminal to a volatile memory of the security module, with the algorithm code concerning a processing of secrets, with the volatile memory being supplied by the supply energy, such that the same will be cleared upon an interruption of the receipt of the supply energy from the terminal; and
receiving the algorithm code result from the security module.
-
-
15. A process for communication between a security module and a terminal, comprising the steps of:
-
transferring at least part of an algorithm code or the complete algorithm code from the terminal to the security module, with the algorithm code concerning a processing of secrets;
volatile-storing said part of the algorithm code or said complete algorithm code in a volatile memory of the security module, with the volatile memory being supplied by the supply energy, such that the same will be cleared upon interruption of the receipt of the supply energy from the terminal;
performing said algorithm code on the security module in order to obtain an algorithm code result;
delivering said algorithm code result to the terminal; and
clearing said volatile memory upon an interruption of the receipt of the supply energy from the terminal. - View Dependent Claims (16)
-
Specification