摘要:
The invention relates to a smart card (100) with a storage medium. The smart card is configured such that applications (132) which are installed on the storage medium and which do not belong to the same security domain (SD1-SD5, SD8) are isolated from one another. At least one persistence application (202) and a main application (204) are installed on the storage medium. The persistence application (202) is assigned to a first security domain (SD8) and is protected from being accessed by means of any application (134) external to the smart card. The persistence application includes a program logic (210) for storing data (D8) on the storage medium (108) and for reading the stored data. The main application (204) is likewise assigned to the first security domain (SD8) and includes an interface (AI) for an application (134) external to the smart card and an additional interface (208) for exchanging the data (D8) with the persistence application. The main application includes a program logic (206) for processing the data (D8), said program logic being configured such that already processed data (D8) is transmitted to the persistence application via the additional interface (208) in order to be stored on the storage medium (108), and data to be processed is received by the persistence application via the additional interface (208).
摘要:
What is proposed is a method for extending attributes in the memory of an ID token within a hierarchy of digitally coded trust settings by providing the ID token, wherein the ID token is equipped with a memory, an external interface, devices for authentication via the external interface and devices for read- and write-protected access to the memory via the external interface, by steps for the communication of a digitally coded trust setting for writing a foreign attribute to the memory of the ID token by means of an ID provider computer to a foreign attribute provider computer, for carrying out a cryptographic protocol for authenticating the ID token in relation to the foreign attribute provider computer and for verifying the digitally coded trust setting for writing access to the memory of the ID token and for writing a foreign attribute to the memory of the ID token via the external interface thereof by means of the foreign attribute provider computer.
摘要:
The invention relates to a method for changing the control data of a chip card (110). The chip card has a chip card operating system (100) with a hierarchical chip card file system, a protected non-volatile electronic storage unit (124) to which external access is only possible via a processor (114) of the chip card, and a volatile working storage unit (120). The chip card file system contains index files (DFs) and data files (EFs), and a file tree consisting of at least one index file (126) and multiple data files (132, 140,...) is stored in the protected electronic storage unit. Control data (144) for useful data (150) is stored in at least one of the files, the useful data is stored in a storage area of the protected electronic storage unit, and a pointer (146) is stored in said storage area in the at least one data file (140). The chip card is activated for an active operation, and a copy (156) of at least one sub-tree, which contains the file (140), of the data tree in the chip card is temporarily stored in the working storage unit (120); changed control data (144') is stored in the at least one file of the copied sub-tree; the changed copy of the sub-tree is permanently stored in the protected electronic storage unit and activated; and the original sub-tree is deleted or deactivated.
摘要:
The invention relates to a method for access protection for external data in the non-volatile memory of a token in relation to an external interface of the token, comprising: carrying out a protocol between the token and an external data host computer for mutual authentication via the external interface; transmitting a cryptographic sector identifier from the one external data host computer to the token via the external interface; generating a temporary key from the transmitted cryptographic sector identifier via the token; transmitting external data from the one external data host computer via the external interface for storage in the non-volatile memory; and encrypting the external data using the temporary key via the token, and storing the encrypted external data in the non-volatile memory.
摘要:
A method is proposed for installing an additional application in a non-volatile memory of a chip card by executing a data protocol is proposed, comprising steps for making available the additional application for transmission to the chip card on a provider's computer, for assigning an authorisation certificate to the additional application, wherein the authorisation certificate contains limiting values for the use of the non-volatile memory in terms of time and data volume which are defined for the additional application, in particular by the provider's computer (130), for checking the validity of the authorisation certificate, transmitted to the chip card, by means of the chip card as a precondition for continuation of the data protocol, for searching the non-volatile memory of the chip card for applications which have already been stored and whose time limit for use for storage has been exceeded, and releasing the storage locations which are occupied by the applications (116, 117) whose time limit (116.1, 117.1) has been exceeded, and for storing the additional application transmitted to the chip card in the non-volatile memory thereof, with the limiting values of the use for storage which are specified in the authorisation certificate.
摘要:
The invention relates to a chip card comprising a chip card operating system (118), a hierarchical chip card file system, a protected non-volatile electronic storage unit (124) which can only be externally accessed via a processor (114) of the chip card, and a volatile working storage unit (120). Files (126, 132, 140, … ) of the chip card file system are stored in the non-volatile electronic storage unit, each of said files containing a file identifier (FID) which is required for external access, and a file tree for the chip card file system is formed in that each of the files has a pointer (130, 138, 148, … ) to one of the other files. The chip card operating system is designed to traverse the file tree on the basis of a request received via an external interface of the chip card in order to read the file identifiers of the files and generate a list (164) of the file identifiers. The chip card operating system is designed to output the list in response to the request via the external interface.
摘要:
The invention relates to an ID token (106) having a memory (118), wherein attribute values of a user (102) are stored in a first memory area (124), and hash values of the attribute values, which have been determined using a first hash algorithm, are stored in a second memory area (126), wherein means are provided in order to assign the hash values to the respective attribute values, having an interface (112) for receiving an attribute requirement (152) having an attribute specification, which specifies a plurality of attributes, and a signature request which contains the attribute specification, and for transmitting the attribute values corresponding to the attributes and an electronic signature for the attribute values, and having a processor (130), wherein the processor (130) is configured for generating a combination of the hash values of the attribute values corresponding to the attribute specification, wherein the processor is configured for generating a total hash value from the combination of the hash values by execution of a second hash algorithm after reception of the signature request, and wherein the processor is configured for generating the electronic signature from the total hash value. A system (100) for generating a signature has such an ID token (106) and a terminal computer system (104) which has an interface (110) to form a connection to the ID token (106). The invention further relates to a method for generating an electronic signature of a user (102) for an electronic document, with such an ID token (106).
摘要:
The invention relates to a method for generating a certificate (167) for a security token (156) of a user (102) by means of an ID token (106) of the same user. A certificate (103) of a document PKI (300) is stored in the ID token, and the ID token has a protected storage region in which a private key (105; 187) of the certificate of the document PKI, one or more attributes (124, 198), and time information (107, TA') received via a communication interface (108) of the ID token are stored. A certificate (160) of an authorization PKI (302) is stored in the security token, and a write authorization for write-accessing the protected storage region of the ID token by means of the security token is specified in the certificate of the authorization PKI. The method has the following steps: - authenticating the user with respect to the ID token and with respect to the security token, - mutually authenticating the ID token and the security token using the certificate (103) of the document PKI and of the certificate (160) of the authorization PKI, - generating a cryptographic key pair (166) consisting of a private key (189) and a public key (173) using the security token, - write-accessing the protected storage region of the ID token by means of the security token in order to store the public key of the generated key pair in the ID token, - read-accessing the protected storage region by means of the ID token in order to read the public key, the time information, and the at least one attribute, - generating a data set (192) which contains the public key, the time information, and the at least one attribute by means of the ID token, - signing the data set with the private key (105, 187) stored in the protected storage region by means of the ID token in order to generate the certificate, and - outputting the certificate by means of the ID token.