Processing

Please wait...

Settings

Settings

Goto Application

1. WO2014102017 - METHOD FOR MANAGING DATA

Publication Number WO/2014/102017
Publication Date 03.07.2014
International Application No. PCT/EP2013/003951
International Filing Date 27.12.2013
IPC
H04W 12/08 2009.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
08Access security
G06F 21/62 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
G06F 17/30 2006.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
17Digital computing or data processing equipment or methods, specially adapted for specific functions
30Information retrieval; Database structures therefor
CPC
G06F 16/1847
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
16Information retrieval; Database structures therefor; File system structures therefor
10File systems; File servers
18File system types
1847specifically adapted to static storage, e.g. adapted to flash memory or SSD
G06F 21/6218
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
G06F 21/77
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
71to assure secure computing or processing of information
77in smart cards
H04W 12/0806
H04W 88/02
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
88Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
02Terminal devices
Applicants
  • GIESECKE & DEVRIENT GMBH [DE]/[DE]
Inventors
  • VUPPU, Vidyaranya
Priority Data
3739/MUM/201231.12.2012IN
Publication Language German (de)
Filing Language German (DE)
Designated States
Title
(DE) VERFAHREN ZUR VERWALTUNG VON DATEN
(EN) METHOD FOR MANAGING DATA
(FR) PROCÉDÉ DE GESTION DE DONNÉES
Abstract
(DE) Die Erfindung betrifft ein Verfahren, sowie ein Sicherheitsmodul als auch ein System zum Bereitstellen von Daten. Gemäss dem erfindungsgemässen Verfahrens empfängt (S1) das Sicherheitsmodul (20) eine Anfrage eines lesenden Zugriffs auf ein in einem Speicher des Sicherheitsmoduls (20) gespeicherten internen Datums (25). Das Sicherheitsmodul (20) öffnet (S2) eine Zugriffsinformation (22) zum internen Datum (25) und prüft (S3) darin einen Eintrag zum internen Datum (25). Anschließend wird der Speicherort (222) des internen Datums ermittelt (S4). Der Eintrag der Zugriffsinformation (22) verweist auf einen Speicherort (222) ausserhalb des Sicherheitsmoduls (20). Weiterhin veranlasst (S5) das Sicherheitsmodul (20) das Endgerät (10), ein externes Datum (35) von dem ermittelten Speicherort (222) zu laden (S6). Das Sicherheitsmodul (20) sendet (S8) dem Endgerät (10) das externe Datum (35) als internes Datum (25).
(EN) The invention relates to a method, a security module and a system for providing data. According to the method according to the invention, the security module (20) receives (S1) a request of a read access to an internal piece of information (25) which is stored in a memory of the security module (20). The security module (20) opens (S2) an access information (22) regarding the internal piece of information (25) and checks (S3) an entry regarding the internal piece of information (25). The storage location (222) of the internal piece of information is then determined (S4). The entry of the access information (22) refers to a storage location (222) outside of the security module (20). Furthermore, the security module (20) causes (S5) the terminal (10) to load (S6) an external piece of information (35) from the determined storage location (222). The security module (20) sends (S8) the external piece of information (35) as an internal piece of information (25) to the terminal (10).
(FR) L'invention concerne un procédé, ainsi qu'un module de sécurité et un système pour mettre à disposition des données. Selon ce procédé, le module de sécurité (20) reçoit (S1) une demande d'accès en lecture concernant une donnée interne (25) stockée dans une mémoire du module de sécurité (20). Le module de sécurité (20) ouvre (S2) une information d'accès (22) relative à la donnée interne (25) et contrôle (S3) dans cette information une entrée relative à la donnée interne (25). L'emplacement de stockage (222) de la donnée interne est ensuite déterminé (S4). L'entrée de l'information d'accès (22) renvoie à un emplacement de stockage (222) à l'extérieur du module de sécurité (20). Le module de sécurité (20) autorise (S5) ensuite le terminal (10) à charger (S6) une donnée externe (35) de l'emplacement de stockage (222) déterminé. Le module de sécurité (20) envoie (S8) au terminal (10) la donnée externe (35) comme donnée interne (25).
Related patent documents
Latest bibliographic data on file with the International Bureau