Method for protecting a security module and arrangement for the implementation of the method
First Claim
Patent Images
1. A method for protecting a security module comprising the steps of:
- storing security relevant data in a non-volatile memory of a security module and inserting said security module in a device motherboard;
monitoring proper insertion of said security module on said device motherboard with a first function unit and a second function unit in said security module;
signaling at least one security-related status of said security module with said first function unit;
in said monitoring of proper insertion, detecting a status indicating at least one of improper use and improper replacement of said security module with said second function unit and, upon a detection of said status indicating at least one of said improper use and said improper replacement, said second function unit causing said security-relevant data to be erased;
in said monitoring of proper insertion, monitoring a continued existence of said status with said second function unit and detecting, with said second function unit, when said status no longer exists;
when said second function unit detects that said status no longer exists, initiating re-initializing, with said first function unit, any erased, security-relevant data; and
after said re-initializing, enabling each of said first function unit and said second function unit to re-commission said security module.
1 Assignment
0 Petitions
Accused Products
Abstract
In a security module and a method for protecting a security module, wherein security-relevant data are stored in a memory in the module, proper insertion of the security module on a device motherboard is monitored with a first function unit and a second function in the security module. The first function unit signals the status of the security module. The second function unit detects improper use or improper replacement of the security module, and upon detection of improper use or improper replacement, the second function unit causes the security-relevant data to be erased.
-
Citations
8 Claims
-
1. A method for protecting a security module comprising the steps of:
-
storing security relevant data in a non-volatile memory of a security module and inserting said security module in a device motherboard; monitoring proper insertion of said security module on said device motherboard with a first function unit and a second function unit in said security module; signaling at least one security-related status of said security module with said first function unit; in said monitoring of proper insertion, detecting a status indicating at least one of improper use and improper replacement of said security module with said second function unit and, upon a detection of said status indicating at least one of said improper use and said improper replacement, said second function unit causing said security-relevant data to be erased; in said monitoring of proper insertion, monitoring a continued existence of said status with said second function unit and detecting, with said second function unit, when said status no longer exists; when said second function unit detects that said status no longer exists, initiating re-initializing, with said first function unit, any erased, security-relevant data; and after said re-initializing, enabling each of said first function unit and said second function unit to re-commission said security module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification