Method for protecting a data memory
First Claim
Patent Images
1. A method for protecting a secured data storage (1), by using sensors (2) to detect an external action on a component, said method comprising the steps of:
- determining that an attack has occurred based on undershooting or overshooting of a threshold on one of the sensors (2);
at least partially erasing a content of the secured data storage (1) upon determining that an attack has occurred;
permanently monitoring a status of the sensors (2), said component contains the secured data storage(1) and an overwritable memory; and
recording status data of the sensors (2) by storing the status data cyclically in said overwritable memory (3).
2 Assignments
0 Petitions
Accused Products
Abstract
A method for protecting a security data memory is described wherein external action on a component containing the security data memory is detected by sensors. Overshooting of a threshold on one of the sensors causes an attack to be signaled by reason of which the content of the security data memory is at least partly erased. The status of the sensors is permanently monitored and the status data of the sensors recorded.
34 Citations
14 Claims
-
1. A method for protecting a secured data storage (1), by using sensors (2) to detect an external action on a component, said method comprising the steps of:
-
determining that an attack has occurred based on undershooting or overshooting of a threshold on one of the sensors (2); at least partially erasing a content of the secured data storage (1) upon determining that an attack has occurred; permanently monitoring a status of the sensors (2), said component contains the secured data storage(1) and an overwritable memory; and recording status data of the sensors (2) by storing the status data cyclically in said overwritable memory (3). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 14)
-
-
9. A security processor, comprising:
-
a secured data storage (1); an overwritable memory; sensors (2) for detecting external action on the security processor and/or the secured data storage (1); a sensor evaluation device (5) which at least partly erases a content of the secured data storage (1) when a threshold is overshot on one of the sensors (2); and a data recording device (6) which permanently records the status data of the sensors (2) in said overwritable memory (3) in which the status data of the sensors (2) is cyclically stored by the data recording device (6). - View Dependent Claims (10, 11, 12, 13)
-
Specification