Method of operating a security token, computer program product and security token
First Claim
1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit coupled to said secure element, wherein:
- the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state and the secure element is in a third sleep state prior to receiving the authentication command;
the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit, and subsequently enters into a second sleep state, wherein power is restricted, but not completely switched off, to the microcontroller unit in the first sleep state and the secure element in both the second sleep state and the third sleep state;
the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power from an antenna of the security token; and
the microcontroller unit processes the authentication request only after the amount of available power exceeds a threshold.
10 Assignments
0 Petitions
Accused Products
Abstract
There is provided a method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. Furthermore, a corresponding computer program product and a corresponding security token are provided.
9 Citations
16 Claims
-
1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit coupled to said secure element, wherein:
-
the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state and the secure element is in a third sleep state prior to receiving the authentication command; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit, and subsequently enters into a second sleep state, wherein power is restricted, but not completely switched off, to the microcontroller unit in the first sleep state and the secure element in both the second sleep state and the third sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power from an antenna of the security token; and the microcontroller unit processes the authentication request only after the amount of available power exceeds a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium comprising instructions which, when being executed by a secure element and a microcontroller unit, operate a security token, comprising:
-
instructions for receiving, in the secure element, an authentication command from a host device while the microcontroller unit is in a first sleep state and the secure element is in a third sleep state prior to receiving the authentication command; instructions for decoding, in the secure element, the authentication command; instructions for sending a corresponding authentication request from the secure element to the microcontroller unit and subsequently entering the secure element into a second sleep state, wherein power is restricted, but not completely switched off, to the microcontroller unit in the first sleep state and the secure element in both the second sleep state and the third sleep state; instructions for waking up the microcontroller unit upon receiving the authentication request; instructions for, in the microcontroller unit, subsequently determining an amount of available power from an antenna of the security token; and instructions for, in the microcontroller unit, processing the authentication request only after the amount of available power exceeds a threshold. - View Dependent Claims (13)
-
-
14. A security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein:
-
the secure element is configured to receive an authentication command from a host device while the microcontroller unit is in a first sleep state and the secure element is in a third sleep state prior to receiving the authentication command; the secure element is configured to decode the authentication command, to send a corresponding authentication request to the microcontroller unit and to subsequently enter into a second sleep state, wherein power is restricted, but not completely switched off, to the microcontroller unit in the first sleep state and the secure element in both the second sleep state and the third sleep state; the microcontroller unit is configured to wake up upon receiving the authentication request and to subsequently determine an amount of available power from an antenna of the security token; and the microcontroller unit is configured to process the authentication request only after the amount of available power exceeds a threshold. - View Dependent Claims (15, 16)
-
Specification