METHOD OF OPERATING A SECURITY TOKEN, COMPUTER PROGRAM PRODUCT AND SECURITY TOKEN
First Claim
1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein:
- the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state;
the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state;
the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; and
the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold.
10 Assignments
0 Petitions
Accused Products
Abstract
There is provided a method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. Furthermore, a corresponding computer program product and a corresponding security token are provided.
-
Citations
13 Claims
-
1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein:
-
the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; and the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein:
-
the secure element is arranged to receive an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element is arranged to decode the authentication command, to send a corresponding authentication request to the microcontroller unit and to subsequently enter into a second sleep state; the microcontroller unit is arranged to wake up upon receiving the authentication request and to subsequently determine an amount of available power; and the microcontroller unit is arranged to process the authentication request only if the amount of available power exceeds a threshold. - View Dependent Claims (13)
-
Specification