Abstract:
The present invention relates to an electronic purse data carrier for performing monetary transactions and a method for managing electronic payments with such a carrier. The purse stores one or more payment units each having a respective monetary value (12), whereby each of said payment units has a respective unique payment unit-ID (10) and comprises an age information (14,16) evaluable for delimiting the use of it. In particular said inforamtion defines a dynamically changing age level. This can be used to force purse owners to return each electronic monetary unit back to the issuing party after a specified cycle measured in time or transactions has passed in order to validate the authenticy, and in particular in order to testing for possibly duplicated monetary units.
Abstract:
PROBLEM TO BE SOLVED: To enable defragmentation while keeping the rules of power failure resistance by a 100 percent by alternately using two sets of descriptors so as to define the positions of a source and a target of copying operation. SOLUTION: A pointer controller 32 carries out a defragmentating process for a memory device 34 consisting of pages 35 by using the back-trace buffer function of an intermediate buffer 36. At this time, effective data blocks are copied as a series of chunks in the memory device 34 sequentially in steps. Then two sets including three descriptors are used alternately to define the copy destination positions of the source and target of 1st copying operation for copy chunks and the copy destination position of 2nd copying operation and the descriptors of at least one set are used to hold information for restoring the copy chunk contents if a power disconnection is made in the copying operation for the copy chunks.
Abstract:
PROBLEM TO BE SOLVED: To guard against the intelligence report of secret information by resetting a counter value to a start value when a prescribed event occurs and preventing the usage of secret information when the value reaches the max. value. SOLUTION: The starting position A of a counter is provided with a prescribed starting value A. The value is increased by a specified value (the state B of the counter) at the time of the respective occurrences of code usage. When the counter value exceeds a specified and prescribed max. value (the final state C of the counter) by the input of the specified event (b), access to the code is prevented. A function protected by the code cannot be executed. A prescribed event (c) for resetting the counter to be the start state A in a prescribed starting value exists concerning the respective codes. When the event (c) occurs, the counter is automatically reset to be in the starting state unless the state reaches the ending state (c).
Abstract:
A method for decoding F2F signals as well as a device for decoding F2F signals read from a magnetic data carrier is provided. The signal read from the card by a magnetic reading head 91 is amplified by an amplifier 912 with a very high gain, discriminated in a discrimination and integration station 913 to receive a binary locking signal. Out of this digitized signal in a reference time acquisition station 917 a start-up time value is set and a phase is estimated to determine the correct end of a bit cell in a phase estimating station 918. In a symbol correlation station 920 the received binary signal is correlated with all possible symbol combinations based on the estimated phase to create a correct bit stream. This bit stream might be processed further by a bit recovery station 922 providing a corrected bit stream ready for interpretation.
Abstract:
The basic idea comprised of the present invention is to provide two sets of descriptors having each at least three descriptors and each set is used in an alternating manner for defining the location of source and target of the copy operations which are to be performed during the defragmentation procedure. The defragmentation procedure is performed as a sequence of copy operations on copy chunks, i.e., a certain number of sequentially arranged bytes to be copied being part of a valid data block to be copied. In each of said copy operations in said sequence the values which are assigned to said descriptors Change. According to a characterizing feature of the present invention during the whole sequence of copy operations comprised of the defragmentation process one of the two sets of descriptors holds information which is usable for restoring the contents of a copy chunk in case of a power break during a copy operation on said copy chunk. Thus, defragmenting is a safe procedure, and data integrity is assured.
Abstract:
The invention presented describes a system and procedure for protecting against the espionage of secret information. A counter is allocated to each secret piece of information, in particular codes. The counter counts the number of uses of the secret information. In this, the counter is set to a starting value. Each use of the secret data element increases the counter state by a defined value. If the counter state reaches a maximum value, the use of the secret data element will be blocked. The blocking of the secret information can, however, be avoided if a defined event occurs before the maximum value of the counter is reached which automatically resets the counter state to its starting value. Any technical, economic or organisational condition can be defined as an event. Particular advantages of the invention presented are that each code can have its own counter allocated to it. In this way, different numbers of uses can be established for each code with regard to its function. As a chip card can contain any number of codes for the most widely differing applications, the block is limited solely to the application affected. The use of the chip card is not therefore blocked as a whole. The events can be easily adapted to the widest range of security and user requirements of the respective application area.
Abstract:
A method for decoding F2F signals as well as a device for decoding F2F signals read from a magnetic data carrier is provided. The signal read from the card by a magnetic reading head 91 is amplified by an amplifier 912 with a very high gain, discriminated in a discrimination and integration station 913 to receive a binary locking signal. Out of this digitized signal in a reference time acquisition station 917 a start-up time value is set and a phase is estimated to determine the correct end of a bit cell in a phase estimating station 918. In a symbol correlation station 920 the received binary signal is correlated with all possible symbol combinations based on the estimated phase to create a correct bit stream. This bit stream might be processed further by a bit recovery station 922 providing a corrected bit stream ready for interpretation.
Abstract:
The invention presented describes a system and procedure for protecting against the espionage of secret information. A counter is allocated to each secret piece of information, in particular codes. The counter counts the number of uses of the secret information. In this, the counter is set to a starting value. Each use of the secret data element increases the counter state by a defined value. If the counter state reaches a maximum value, the use of the secret data element will be blocked. The blocking of the secret information can, however, be avoided if a defined event occurs before the maximum value of the counter is reached which automatically resets the counter state to its starting value. Any technical, economic or organisational condition can be defined as an event. Particular advantages of the invention presented are that each code can have its own counter allocated to it. In this way, different numbers of uses can be established for each code with regard to its function. As a chip card can contain any number of codes for the most widely differing applications, the block is limited solely to the application affected. The use of the chip card is not therefore blocked as a whole. The events can be easily adapted to the widest range of security and user requirements of the respective application area.
Abstract:
Information is transformed before completing cryptographic process by applying N:N operation on elements of information in which case every element of information is combined with exactly corresponding element of transformed information. Cryptographic process is combined with transformed information. Inverse process is performed by applying inverse N:N operation on transformation and cryptographic processed information. Independent claims are included for: (a) a data media that can be used by an cryptographic information processing system (b) an information processing system (c) a chip card