Data carrier having a chip including means for the controllable voltage supply to a further component of the data carrier
First Claim
1. A data carrier (1) including a chip (10) having a supply voltage generating means (5) for energizing the chip (10) through circuit point (12), from which a supply voltage (V) can be taken, and including at least one integral circuit component (24, 29) which is designed for communicating with a component communication means (17) which is spatially separated from the chip (10) and which has a supply voltage input (25, 30), to which a supply voltage (V1, V2) can be applied, characterized in that the chip (10) has a supply voltage output (21, 22), and the supply voltage input (25, 30) of the component (24, 29) is connected to the supply voltage output (21, 22) of the chip (10) via a connection lead (27, 32), and the chip (10) includes controllable potential control means (35, 49) to which a control signal (S) can be applied and with the aid of which the supply voltage output (21, 22) can be set to different potential values in accordance with the control signal (S) and in response to attempted data access by an unauthentic user such that said user cannot access data.
4 Assignments
0 Petitions
Accused Products
Abstract
A data carrier (1) includes a chip (10) having a supply voltage circuit point (12), from which a supply voltage (V) can be taken, and having at least one supply voltage output (21, 22) for supplying a supply voltage (V1, V2), and having potential control means (35, 49) to which a control signal (S) can be applied and with the aid of which the supply voltage output (21, 22) can be set to different potential values in accordance with the control signal (S), and also includes at least one component (24, 29) which is spatially separated from the chip (10), which component (24, 29) has a supply voltage input (25, 30) is connected to the supply voltage output (21, 22) of the chip (10) via a connection lead (27, 32).
-
Citations
17 Claims
- 1. A data carrier (1) including a chip (10) having a supply voltage generating means (5) for energizing the chip (10) through circuit point (12), from which a supply voltage (V) can be taken, and including at least one integral circuit component (24, 29) which is designed for communicating with a component communication means (17) which is spatially separated from the chip (10) and which has a supply voltage input (25, 30), to which a supply voltage (V1, V2) can be applied, characterized in that the chip (10) has a supply voltage output (21, 22), and the supply voltage input (25, 30) of the component (24, 29) is connected to the supply voltage output (21, 22) of the chip (10) via a connection lead (27, 32), and the chip (10) includes controllable potential control means (35, 49) to which a control signal (S) can be applied and with the aid of which the supply voltage output (21, 22) can be set to different potential values in accordance with the control signal (S) and in response to attempted data access by an unauthentic user such that said user cannot access data.
- 8. A chip for a data carrier (1) including at least one integral circuit component (24, 29) which is designed for communicating with a component communications means (17) and which is spatially separated from the chip (10) and which has a supply voltage input (25, 30), to which a supply voltage (V1, V2) can be applied, which chip (10) has a supply voltage circuit point (12) from which a supply voltage (V) can be taken, characterized in that the chip (10) has a supply voltage output (21, 22), end the supply voltage output (21, 22) is to be connected to the supply voltage input (25, 30) of the component (24, 29) via a connection lead (27, 32), and the chip (10) includes controllable potential control means (35, 49) to which a control signal (S) can be applied and with the aid of which the supply voltage output (21, 22) can be set to different potential values in accordance with the control signal (S) and in response to attempted data access by an unauthentic user such that said user cannot access data.
-
15. A method for preventing data access by an unauthentic user during the interaction between data carrier (1) and a component communication means (17), wherein:
-
(a) access detection means (20) detects access to security-related memory data (SD) from said communication device;
(b) upon detection, access detection means (20) generates an isolation signal (T) and supplies it to a first isolation means (36) and a second isolation means (50);
(c) a first supply voltage output (21) and a second supply voltage output (22) are isolated from supply voltage circuit point (12) by first isolation means (36) and second isolation means (50), such that no interceptable supply voltage appears on two connection leads (27, 32);
(d) upon termination of access to security-related memory data (SD) from said communication device, access detection means (20) detects said termination; and
(e) upon detection, access detection means (20) terminates generating isolation signal (T) and supplying it to first isolation means (36) and second isolation means (50), such that first supply voltage output (21) and second supply voltage output (22) are no longer isolated from, supply voltage circuit point (12). - View Dependent Claims (16, 17)
(a) processing detection means (19) detects processing of security-related processing data (VD) generates an isolation signal (T) and supplies it to first isolation means (36) and second isolation means (50);
(b) first supply voltage output (21) and second supply voltage output (22) are isolated from supply voltage circuit point (12) by first isolation means (36) and second isolation means (50), such that no interceptable supply voltage appears on two connection leads (27, 32);
(c) upon termination of access to security-related processing data (VD) from said communication device, processing detection means (19) detects said termination; and
(d) upon detection, processing detection means (19) terminates generating isolation signal (T) and supplying it to first isolation means (36) and second isolation means (50), such that first supply voltage output (21) and second supply voltage output (22) are no longer isolated from supply voltage circuit point (12).
-
-
17. The method of claim 15, wherein:
-
(a) access detection means (20) detects access to personal user data from said communication device;
(b) upon detection, a command isolation means (18) generates an isolation signal (T) and supplies it to a first isolation means (36) and a second isolation means (50);
(c) a first supply voltage output (21) and a second supply voltage output (22) are isolated from supply voltage circuit point (12) by first isolation means (36) and second isolation means (50), such that no interceptable supply voltage appears on two connection leads (27, 32);
(d) upon termination of access to personal user data from said communication device, access detection means (20) detects said termination; and
(e) upon detection, command execution means (18) terminates generating isolation signal (T) and supplying it to first isolation means (36) and second isolation means (50), such that first supply voltage output (21) and second supply voltage output (22) are no longer isolated from supply voltage circuit point (12).
-
Specification