AGING OF ELECTRONIC PAYMENT UNITS
    2.
    发明申请
    AGING OF ELECTRONIC PAYMENT UNITS 审中-公开
    电子支付单位的变动

    公开(公告)号:WO0247040A3

    公开(公告)日:2003-08-28

    申请号:PCT/EP0112471

    申请日:2001-10-27

    Inventor: SCHERZER HELMUT

    Abstract: The present invention relates to an electronic purse data carrier for performing monetary transactions and a method for managing electronic payments with such a carrier. The purse stores one or more payment units each having a respective monetary value (12), whereby each of said payment units has a respective unique payment unit-ID (10) and comprises an age information (14,16) evaluable for delimiting the use of it. In particular said inforamtion defines a dynamically changing age level. This can be used to force purse owners to return each electronic monetary unit back to the issuing party after a specified cycle measured in time or transactions has passed in order to validate the authenticy, and in particular in order to testing for possibly duplicated monetary units.

    Abstract translation: 本发明涉及一种用于执行货币交易的电子钱包数据载体和一种用这种载体管理电子支付的方法。 钱包存储一个或多个各自具有相应货币值(12)的支付单元,由此每个所述支付单元具有相应的唯一支付单元ID(10),并且包括可评估用于限定使用的年龄信息(14,16) 的。 特别地,所述信息定义了动态变化的年龄层级。 这可以用于强制货币所有者在经过指定的周期测量时间或交易已经通过以确认验证码之后,特别是为了测试可能重复的货币单位而将每个电子货币单位退还给发行方。

    MEMORY FRAGMENT ELIMINATION (DEFRAGMENTATION) OF CHIP CARD

    公开(公告)号:JP2000305818A

    公开(公告)日:2000-11-02

    申请号:JP2000071935

    申请日:2000-03-15

    Applicant: IBM

    Inventor: SCHERZER HELMUT

    Abstract: PROBLEM TO BE SOLVED: To enable defragmentation while keeping the rules of power failure resistance by a 100 percent by alternately using two sets of descriptors so as to define the positions of a source and a target of copying operation. SOLUTION: A pointer controller 32 carries out a defragmentating process for a memory device 34 consisting of pages 35 by using the back-trace buffer function of an intermediate buffer 36. At this time, effective data blocks are copied as a series of chunks in the memory device 34 sequentially in steps. Then two sets including three descriptors are used alternately to define the copy destination positions of the source and target of 1st copying operation for copy chunks and the copy destination position of 2nd copying operation and the descriptors of at least one set are used to hold information for restoring the copy chunk contents if a power disconnection is made in the copying operation for the copy chunks.

    GUARDING METHOD AGAINST ANALYTIC INTELLIGENCE REPORT OF SECRET INFORMATION

    公开(公告)号:JP2000047945A

    公开(公告)日:2000-02-18

    申请号:JP16036099

    申请日:1999-06-08

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To guard against the intelligence report of secret information by resetting a counter value to a start value when a prescribed event occurs and preventing the usage of secret information when the value reaches the max. value. SOLUTION: The starting position A of a counter is provided with a prescribed starting value A. The value is increased by a specified value (the state B of the counter) at the time of the respective occurrences of code usage. When the counter value exceeds a specified and prescribed max. value (the final state C of the counter) by the input of the specified event (b), access to the code is prevented. A function protected by the code cannot be executed. A prescribed event (c) for resetting the counter to be the start state A in a prescribed starting value exists concerning the respective codes. When the event (c) occurs, the counter is automatically reset to be in the starting state unless the state reaches the ending state (c).

    METHOD AND ARRANGEMENT FOR DECODING F2F SIGNALS READ FROM A MAGNETIC DATA CARRIER

    公开(公告)号:CA2087769A1

    公开(公告)日:1993-10-16

    申请号:CA2087769

    申请日:1993-01-21

    Applicant: IBM

    Inventor: SCHERZER HELMUT

    Abstract: A method for decoding F2F signals as well as a device for decoding F2F signals read from a magnetic data carrier is provided. The signal read from the card by a magnetic reading head 91 is amplified by an amplifier 912 with a very high gain, discriminated in a discrimination and integration station 913 to receive a binary locking signal. Out of this digitized signal in a reference time acquisition station 917 a start-up time value is set and a phase is estimated to determine the correct end of a bit cell in a phase estimating station 918. In a symbol correlation station 920 the received binary signal is correlated with all possible symbol combinations based on the estimated phase to create a correct bit stream. This bit stream might be processed further by a bit recovery station 922 providing a corrected bit stream ready for interpretation.

    6.
    发明专利
    未知

    公开(公告)号:DE60019364T2

    公开(公告)日:2006-03-09

    申请号:DE60019364

    申请日:2000-02-29

    Applicant: IBM

    Inventor: SCHERZER HELMUT

    Abstract: The basic idea comprised of the present invention is to provide two sets of descriptors having each at least three descriptors and each set is used in an alternating manner for defining the location of source and target of the copy operations which are to be performed during the defragmentation procedure. The defragmentation procedure is performed as a sequence of copy operations on copy chunks, i.e., a certain number of sequentially arranged bytes to be copied being part of a valid data block to be copied. In each of said copy operations in said sequence the values which are assigned to said descriptors Change. According to a characterizing feature of the present invention during the whole sequence of copy operations comprised of the defragmentation process one of the two sets of descriptors holds information which is usable for restoring the contents of a copy chunk in case of a power break during a copy operation on said copy chunk. Thus, defragmenting is a safe procedure, and data integrity is assured.

    7.
    发明专利
    未知

    公开(公告)号:DE19831884C2

    公开(公告)日:2001-09-20

    申请号:DE19831884

    申请日:1998-07-17

    Applicant: IBM

    Abstract: The invention presented describes a system and procedure for protecting against the espionage of secret information. A counter is allocated to each secret piece of information, in particular codes. The counter counts the number of uses of the secret information. In this, the counter is set to a starting value. Each use of the secret data element increases the counter state by a defined value. If the counter state reaches a maximum value, the use of the secret data element will be blocked. The blocking of the secret information can, however, be avoided if a defined event occurs before the maximum value of the counter is reached which automatically resets the counter state to its starting value. Any technical, economic or organisational condition can be defined as an event. Particular advantages of the invention presented are that each code can have its own counter allocated to it. In this way, different numbers of uses can be established for each code with regard to its function. As a chip card can contain any number of codes for the most widely differing applications, the block is limited solely to the application affected. The use of the chip card is not therefore blocked as a whole. The events can be easily adapted to the widest range of security and user requirements of the respective application area.

    8.
    发明专利
    未知

    公开(公告)号:BR9301339A

    公开(公告)日:1993-10-19

    申请号:BR9301339

    申请日:1993-03-29

    Applicant: IBM

    Inventor: SCHERZER HELMUT

    Abstract: A method for decoding F2F signals as well as a device for decoding F2F signals read from a magnetic data carrier is provided. The signal read from the card by a magnetic reading head 91 is amplified by an amplifier 912 with a very high gain, discriminated in a discrimination and integration station 913 to receive a binary locking signal. Out of this digitized signal in a reference time acquisition station 917 a start-up time value is set and a phase is estimated to determine the correct end of a bit cell in a phase estimating station 918. In a symbol correlation station 920 the received binary signal is correlated with all possible symbol combinations based on the estimated phase to create a correct bit stream. This bit stream might be processed further by a bit recovery station 922 providing a corrected bit stream ready for interpretation.

    9.
    发明专利
    未知

    公开(公告)号:DE69909379T2

    公开(公告)日:2004-04-15

    申请号:DE69909379

    申请日:1999-05-05

    Applicant: IBM

    Abstract: The invention presented describes a system and procedure for protecting against the espionage of secret information. A counter is allocated to each secret piece of information, in particular codes. The counter counts the number of uses of the secret information. In this, the counter is set to a starting value. Each use of the secret data element increases the counter state by a defined value. If the counter state reaches a maximum value, the use of the secret data element will be blocked. The blocking of the secret information can, however, be avoided if a defined event occurs before the maximum value of the counter is reached which automatically resets the counter state to its starting value. Any technical, economic or organisational condition can be defined as an event. Particular advantages of the invention presented are that each code can have its own counter allocated to it. In this way, different numbers of uses can be established for each code with regard to its function. As a chip card can contain any number of codes for the most widely differing applications, the block is limited solely to the application affected. The use of the chip card is not therefore blocked as a whole. The events can be easily adapted to the widest range of security and user requirements of the respective application area.

Patent Agency Ranking