×

Method of operating a security token, computer program product and security token

  • US 10,609,012 B2
  • Filed: 10/29/2014
  • Issued: 03/31/2020
  • Est. Priority Date: 10/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit coupled to said secure element, wherein:

  • the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state and the secure element is in a third sleep state prior to receiving the authentication command;

    the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit, and subsequently enters into a second sleep state, wherein power is restricted, but not completely switched off, to the microcontroller unit in the first sleep state and the secure element in both the second sleep state and the third sleep state;

    the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power from an antenna of the security token; and

    the microcontroller unit processes the authentication request only after the amount of available power exceeds a threshold.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×