首页> 外国专利> Control of access to data processing installation, uses transformation of entered code and stored access code so comparison is carried out on transformed rather than actual codes

Control of access to data processing installation, uses transformation of entered code and stored access code so comparison is carried out on transformed rather than actual codes

机译:控制对数据处理设备的访问,使用输入代码和存储的访问代码的转换,因此对转换后的代码而不是实际代码进行比较

摘要

Access to a functionality of a smart card is through entry of a secret access code (CS), which is preprocessed (E2) to generate a transformed secret code (CST). The internally stored version of the access code is also transformed (E6), and the comparison process that may be observed by energy consumption attack is performed on the transformed codes, so only the transformed code can be detected.
机译:通过输入秘密访问代码(CS)对智能卡的功能进行访问,对它进行预处理(E2)以生成转换后的秘密代码(CST)。访问代码的内部存储版本也将进行转换(E6),并且对转换后的代码执行可能会因能耗攻击而观察到的比较过程,因此只能检测到转换后的代码。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号