Method for safely transferring data and applications onto a chipcard
First Claim
Patent Images
1. Method for the secure transfer of applications into a chipcard memory having a file structure comprising:
- receiving a command at the chipcard from a chipcard reading and writing device;
accessing an identifier;
comparing the identifier and the command to determine limitations on use of the command in the chipcard;
limiting use of the command in the chipcard to use in a subdomain of the chipcard memory file structure when the identifier indicates that the command is not to be used outside of the subdomain.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed in a number of embodiments, which use an identifier to control and limit the operation of a command and/or security code to one or more subdomains, such as directories, of a file structure. In one embodiment, the identifier is allocated to the command or to the security code. In another embodiment, the identifier is allocated to the subdomain. The security code includes a cryptographic key or a password.
-
Citations
14 Claims
-
1. Method for the secure transfer of applications into a chipcard memory having a file structure comprising:
-
receiving a command at the chipcard from a chipcard reading and writing device; accessing an identifier; comparing the identifier and the command to determine limitations on use of the command in the chipcard; limiting use of the command in the chipcard to use in a subdomain of the chipcard memory file structure when the identifier indicates that the command is not to be used outside of the subdomain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Method for the secure exchange of data with a chipcard memory having a file structure comprising:
-
receiving a security code at the chipcard from a chipcard reading and writing device; accessing an identifier; comparing the identifier and the security code to determine limitations on use of the security code in the chipcard; limiting use of the security code to use outside a subdomain of the chipcard memory file structure when the identifier indicates that the security code is not to be used inside of the subdomain. - View Dependent Claims (12, 13, 14)
-
Specification