Method for protecting a microcomputer system against manipulation of data stored in a storage arrangement of the microcomputer system
First Claim
1. A method for protecting a microcomputer system from manipulation of data stored in a storage arrangement of the microcomputer system, the microcomputer system including a microcomputer allocated to the storage arrangement, comprising the steps of:
- causing the microcomputer to access the storage arrangement for processing the data; and
before the storage arrangement is accessed, performing the steps of;
assigning an individual identifier to one of the allocated microcomputer and the storage arrangement,generating a comparison code and storing the comparison code in the storage arrangement as a function of the individual identifier, andat a time that is one of before and during an operation of the microcomputer system, generating a security code as a function of the individual identifier and comparing the security code with the comparison code, wherein the allocated microcomputer accesses the storage arrangement only if the security code agrees with the comparison code, and wherein the allocated microcomputer is assigned only to the storage arrangement and the storage arrangement is assigned only to the allocated microcomputer so that the assigned, allocated microcomputer and the assigned storage arrangement can operate only with each other.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for protecting a microcomputer system against manipulation of data stored in a storage arrangement of the microcomputer system, in particular for protecting a program stored in the storage arrangement. The microcomputer system includes a microcomputer assigned to the storage arrangement, the microcomputer accessing the storage arrangement for the purpose of processing the data, i.e., the program. In order to prevent the manipulation of data in a microcomputer that does not have an internal memory but rather accesses an external storage arrangement and processes the stored data, it is proposed that before the storage arrangement is accessed, an individual identifier be assigned to the or to each allocated microcomputer or to the storage arrangement that a comparison code be generated as a function of the individual identifier and be stored in the storage arrangement, and that, before or during the operation of the microcomputer system, a security code be generated as a function of the individual identifier and be compared with the comparison code.
-
Citations
16 Claims
-
1. A method for protecting a microcomputer system from manipulation of data stored in a storage arrangement of the microcomputer system, the microcomputer system including a microcomputer allocated to the storage arrangement, comprising the steps of:
-
causing the microcomputer to access the storage arrangement for processing the data; and before the storage arrangement is accessed, performing the steps of; assigning an individual identifier to one of the allocated microcomputer and the storage arrangement, generating a comparison code and storing the comparison code in the storage arrangement as a function of the individual identifier, and at a time that is one of before and during an operation of the microcomputer system, generating a security code as a function of the individual identifier and comparing the security code with the comparison code, wherein the allocated microcomputer accesses the storage arrangement only if the security code agrees with the comparison code, and wherein the allocated microcomputer is assigned only to the storage arrangement and the storage arrangement is assigned only to the allocated microcomputer so that the assigned, allocated microcomputer and the assigned storage arrangement can operate only with each other. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A storage arrangement in which data are stored and to which is allocated at least one microcomputer that accesses the storage arrangement for processing the data, comprising:
-
an arrangement for storing a comparison code that is generated as a function of an individual identifier assigned to one of the at least one microcomputer and the storage arrangement; and an arrangement for, at a time that is one of before and during an operation of the storage arrangement, generating a security code as a function of the individual identifier and for comparing the security code with the comparison code, wherein the microcomputer accesses the storage arrangement only if the security code agrees with the comparison code, and wherein the microcomputer is assigned only to the storage arrangement and the storage arrangement is assigned only to the microcomputer so that the assigned microcomputer and the assigned storage arrangement can operate only with each other. - View Dependent Claims (11, 12, 13)
-
-
14. A microcomputer system, comprising:
-
a microcomputer; and a storage arrangement assigned to the microcomputer, wherein; data are stored in the storage arrangement, the microcomputer accesses the storage arrangement in order to process the data, in the storage arrangement, a comparison code that is generated as a function of an individual identifier assigned to one of the microcomputer and to the storage arrangement is stored, and the microcomputer includes an arrangement for, at a time that is one of before and during an operation of the microcomputer system, for generating a security code as a function of the individual identifier and to compare the security code with the comparison code, wherein the microcomputer accesses the storage arrangement only if the security code agrees with the comparison code, and wherein the microcomputer is assigned only to the storage arrangement and the storage arrangement is assigned only to the microcomputer so that the assigned microcomputer and the assigned storage arrangement can operate only with each other. - View Dependent Claims (15, 16)
-
Specification