Access control to data processing means
First Claim
1. A method for accessing a data processing means associated with a secret confidential code and accessible by applying thereto a confidential code presented by an accepting means, comprising the following steps:
- implementing a code transformation function in the processing means of a smart device,transforming the secret code into a transformed secret code in the processing means of the smart device according to the transformation function,storing the transformed secret code in the processing means of the smart device; and
at each use of the processing means of the smart device, transforming the presented code, in the processing means of the smart device, into a transformed presented code according to the transformation function implemented in the processing means, comparing the transformed secret code with the transformed presented code in the processing means of the smart device, and selectively providing access to the data processing means based on said comparison, without accessing the secret code,wherein each transformed secret code or transformed presented code results from application of the respective secret code or presented code and a random number to the transformation function, wherein the random number is pre-stored with the transformed secret code in the processing means of the smart device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for preventing secret code manipulation in a data processing device, such as a smart card, to which a presented code is applied. Prior to implementation of a code transforming function in the processing device, the secret code is transformed into a transformed secret code in the card. For each use of the card, the presented code is transformed into a transformed presented code in accordance with the implemented transformation function. A comparison of the transformed secret code with the transformed secret code in the card is then performed.
-
Citations
11 Claims
-
1. A method for accessing a data processing means associated with a secret confidential code and accessible by applying thereto a confidential code presented by an accepting means, comprising the following steps:
-
implementing a code transformation function in the processing means of a smart device, transforming the secret code into a transformed secret code in the processing means of the smart device according to the transformation function, storing the transformed secret code in the processing means of the smart device; and at each use of the processing means of the smart device, transforming the presented code, in the processing means of the smart device, into a transformed presented code according to the transformation function implemented in the processing means, comparing the transformed secret code with the transformed presented code in the processing means of the smart device, and selectively providing access to the data processing means based on said comparison, without accessing the secret code, wherein each transformed secret code or transformed presented code results from application of the respective secret code or presented code and a random number to the transformation function, wherein the random number is pre-stored with the transformed secret code in the processing means of the smart device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for accessing a data processing means associated with a secret confidential code and accessible by applying thereto a confidential code presented by an accepting means, comprising the following steps:
-
implementing a code transformation function in the processing means, transforming the secret code into a transformed secret code in the processing means according to the transformation function, storing the transformed secret code in the processing means; at each use of the processing means, transforming the presented code into a transformed presented code according to the transformation function implemented in the processing means, comparing the transformed secret code with the transformed presented code in the processing means, and selectively providing access to the data processing means based on said comparison, without accessing the secret code; and applying the secret code and a first random number to the transformation function, producing a second random number in the processing means before each transformation of the presented code, determining a second transformed secret code by applying the stored transformed secret code and the second random number to the transformation function, determining the transformed presented code by applying the presented code and the first random number to the transformation function to produce an intermediate transformed presented code, applying the intermediate transformed presented code and the second random number to the transformation function, and comparing the second transformed secret code with the transformed presented code.
-
-
8. A method for accessing a data processing means associated with a secret confidential code and accessible by applying thereto a confidential code presented by an accepting means, comprising the following steps:
-
implementing a code transformation function in the processing means, transforming the secret code into a transformed secret code in the processing means according to the transformation function, storing the transformed secret code in the processing means; and at each use of the processing means, transforming the presented code into a transformed presented code according to the transformation function implemented in the processing means, comparing the transformed secret code with the transformed presented code in the processing means, and selectively providing access to the data processing means based on said comparison, without accessing the secret code; wherein, for each presentation of the presented code, an iteration comprising the following steps is carried out; applying the transformation function to a transformed secret code stored during a previous iteration; applying the transformation function to the presented code as many times as the number of iterations respectively corresponding to previous presentations of the presented code; comparing the transformed secret code and the transformed presented code; and storing the transformed secret code in the processing means. - View Dependent Claims (9)
-
-
10. A method for accessing a data processing means associated with a secret confidential code and accessible by applying thereto a confidential code presented by an accepting means, comprising the following steps:
-
implementing a code transformation function in the processing means, transforming the secret code into a transformed secret code in the processing means according to the transformation function; storing the transformed secret code in the processing means; and at each use of the processing means, transforming the presented code into a transformed presented code according to the transformation function implemented in the processing means, comparing the transformed secret code with the transformed presented code in the processing means, and selectively providing access to the data processing means based on said comparison, without accessing the secret code; wherein the transformation function consists of dividing each code into a number of parts and applying a predetermined permutation to the parts of the code, and wherein, at each presentation of the presented code, the permutation is applied to the transformed secret code resulting from the last presentation, the permutation is applied to the presented code a number of times equal to the number of previous permutations of the presented code, the corresponding parts of the permuted secret and presented codes are compared in pairs, and the permuted secret code is stored in the processing means.
-
-
11. A method for accessing a data processing means associated with a secret confidential code and accessible by applying thereto a confidential code presented by an accepting means, comprising the following steps:
-
implementing a code transformation function in the processing means, transforming the secret code into a transformed secret code in the processing means according to the transformation function; storing the transformed secret code in the processing means; and at each use of the processing means, transforming the presented code into a transformed presented code according to the transformation function implemented in the processing means, comparing the transformed secret code with the transformed presented code in the processing means, and selectively providing access to the data processing means based on said comparison, without accessing the secret code; wherein the transformation function to which the secret code is applied is homomorphic of the transformation function to which the presented code is applied.
-
Specification