Security device for a transponder
First Claim
1. A security device for a transponder, the security device comprising:
- a security function for a kill and/or cloak function;
a memory device, in which a first password is stored;
an input, into which a second password can be coupled;
a cryptologic device, which is connected to the input and generates a checksum from the second password; and
a comparison device, which compares the checksum and the first password and which, upon their agreement, generates a security control instruction to activate and/or deactivate a security mechanism, which can be tapped at an output.
17 Assignments
0 Petitions
Accused Products
Abstract
A security device for a transponder with a kill and/or cloak function is provided. The security device includes a memory device, in which a first, open password is stored, an input, into which a second, secret password is coupled, a cryptologic device, which is connected to the input and generates a checksum from the second password, and a comparison unit, which compares the checksum and the first password and which upon an agreement generates a kill and/or cloak control instruction to activate and/or deactivate a kill and/or cloak mechanism, which can be tapped at an output. A method for configuring a security device and a method for operating a transponder, and a transponder having the security device are also provided.
-
Citations
24 Claims
-
1. A security device for a transponder, the security device comprising:
-
a security function for a kill and/or cloak function;
a memory device, in which a first password is stored;
an input, into which a second password can be coupled;
a cryptologic device, which is connected to the input and generates a checksum from the second password; and
a comparison device, which compares the checksum and the first password and which, upon their agreement, generates a security control instruction to activate and/or deactivate a security mechanism, which can be tapped at an output. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 24)
-
-
9. A method for configuring a security device of a transponder, the method comprising the steps of:
-
storing a first password in a memory device;
inputting a second password into an input;
generating a checksum from the second password by a cryptologic device;
comparing the checksum and the first password; and
generating a security control instruction, on the basis of the comparison of the checksum and the first password, to activate and/or deactivate a security mechanism. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for operating a transponder having a security device, the transponder having a first password stored therein, the method comprising the steps of:
-
transmitting from a base station to the transponder a high-frequency electromagnetic carrier signal;
modulating an information packet onto the high-frequency electromagnetic carrier signal, the information packet having a header section, a middle section, and a terminating end section;
providing a second password at a predetermined position within the information packet; and
operating the security device of the transponder on the basis of a comparison of the first password with a checksum, which is derived from the second password. - View Dependent Claims (20, 21)
-
-
22. A transponder for data communication with at least one base station, the transponder comprising:
-
a transmitting/receiving device for receiving high-frequency carrier signals from a base station;
a control device, which controls the data communication with the base station; and
a security device, the security device comprising;
a memory device, in which a first password is stored;
an input, into which a second password can be coupled;
a cryptologic device, which is connected to the input and generates a checksum from the second password; and
a comparison device, which compares the checksum and the first password and which, upon their agreement, generates a security control instruction to activate and/or deactivate a security mechanism, which can be tapped at an output of the security device. - View Dependent Claims (23)
-
Specification