Claims
- 1. A method for accessing a memory, the method which comprises:
providing a memory including a plurality of rows, a respective number of the rows forming a respective sector; providing, for each application, at least one sector having a variable sector size; assigning an application-specific sector code to a sector; providing a plurality of keys; assigning at least one access right and a key link number to a key; and assigning at least one key link number to an application-specific sector code such that rights are assigned to a corresponding sector.
- 2. The method according to claim 1, which comprises:
assigning at least one row link number to a row such that rows which are assigned to a same sector bear a same row link number; assigning a respective key link number to each key such that a key link number of a key corresponds to a row link number of at least one row whose sector is assigned to the key; and ensuring that a key allows access only to rows whose row link number corresponds to the key link number.
- 3. The method according to claim 2, which comprises assigning at least one access right to a key link number.
- 4. The method according to claim 2, which comprises assigning at least one access right to a row link number.
- 5. The method according to claim 17 which comprises assigning at least one application-specific sector code to a sector.
- 6. The method according to claim 5, which comprises assigning at least one key code to a key allowing access only to sectors with a corresponding sector code.
- 7. The method according to claim 6, which comprises assigning at least one access right to a key code.
- 8. The method according to claim 6, which comprises assigning at least one access right to a sector code.
- 9. The method according to claim 2, which comprises:
storing, in the memory, a signature for each unit formed of a key, a key link number and an associated access right; and checking the signature stored in the memory during authentication for protection against manipulations.
- 10. The method according to claim 6, which comprises:
storing, in the memory, a signature for each unit formed of a key, a key code and an associated access right; and checking the signature stored in the memory during authentication for protection against manipulations.
- 11. The method according to claim 2, which comprises:
storing, in the memory, a signature for rows having a same row link number; and checking the signature during each data access.
- 12. The method according to claim 1, which comprises:
storing, in the memory, a signature for each sector; and checking the signature during each data access.
- 13. The method according to claim 2, which comprises:
storing, in the memory, a signature containing a chip serial number; and checking the signature during each data access.
- 14. The method according to claim 2, which comprises assigning a plurality of row link numbers to a row.
- 15. The method according to claim 2, which comprises:
storing, in the memory, a signature for each unit formed of a key, an access right and one of a key link number and a key code; checking the signature stored in the memory during authentication for protection against manipulations; and allowing all accesses in accordance with the access right assigned to the one of the key link number and the key code upon a successful authentication with the key.
- 16. The method according to claim 2, which comprises:
storing, in the memory, a signature for each unit formed of a key, an access right and one of a key link number and a key code; checking the signature stored in the memory during authentication for protection against manipulations; and allowing an access in accordance with an access right to one of a sector and a row only if one of a sector code and a row link number corresponds to one of a key link number and a key code of a successfully authenticated key.
- 17. The method according to claim 2, which comprises:
storing, in the memory, a signature for each unit formed of a key, an access right and one of a key link number and a key code; checking the signature stored in the memory during authentication for protection against manipulations; and allowing an access in accordance with an access right to one of a sector and a row only when all keys that have one of key link numbers and key codes corresponding to one of row link numbers and sector codes assigned to respective access rights have been successfully authenticated.
- 18. The method according to claim 1, which comprises providing the keys in one of rows and sectors managed by access rights.
- 19. The method according to claim 18, which comprises requiring a read right in order to allow an authentication with a key.
- 20. The method according to claim 18, which comprises requiring a particular right for authentication in order to allow an authentication with a key.
- 21. The method according to claim 1, which comprises providing one of given rows and given sectors requiring no authentication for specific types of access.
- 22. The method according to claim 21, which comprises requiring a particular access right for a free access.
- 23. The method according to claim 21, which comprises allowing a free access via one of a particular row link number and a particular sector code.
- 24. The method according to claim 21, which comprises regulating a free access by using a particular key.
- 25. A method for accessing a memory, the method which comprises:
providing a memory including a plurality of rows, a respective number of the rows forming a respective sector; providing a plurality of keys; assigning at least one access right and at least one linkage to a row, the at least one linkage being usable for assigning at least one key to a row; providing some of the rows with keys and providing some of the rows without keys; and forming a virtual sector with rows having a same linkage.
- 26. The method according to claim 25, which comprises assigning at least one key code to a key allowing access only to sectors with a corresponding sector code.
- 27. The method according to claim 26, which comprises assigning at least one access right to a key code.
- 28. The method according to claim 26, which comprises assigning at least one access right to a sector code.
- 29. The method according to claim 26, which comprises:
storing, in the memory, a signature for each unit formed of a key, a key code and an associated access right; and checking the signature stored in the memory during authentication for protection against manipulations.
- 30. The method according to claim 25, which comprises:
storing, in the memory, a signature for each sector; and checking the signature during each data access.
- 31. The method according to claim 26, which comprises:
storing, in the memory, a signature containing a chip serial number; and checking the signature during each data access.
- 32. The method according to claim 26, which comprises assigning a plurality of row link numbers to a row.
- 33. The method according to claim 26, which comprises:
storing, in the memory, a signature for each unit formed of a key, an access right and one of a key link number and a key code; checking the signature stored in the memory during authentication for protection against manipulations; and allowing all accesses in accordance with the access right assigned to the one of the key link number and the key code upon a successful authentication with the key.
- 34. The method according to claim 26, which comprises:
storing, in the memory, a signature for each unit formed of a key, an access right and one of a key link number and a key code; checking the signature stored in the memory during authentication for protection against manipulations; and allowing an access in accordance with an access right to one of a sector and a row only if one of a sector code and a row link number corresponds to one of a key link number and a key code of a successfully authenticated key.
- 35. The method according to claim 26, which comprises:
storing, in the memory, a signature for each unit formed of a key, an access right and one of a key link number and a key code; checking the signature stored in the memory during authentication for protection against manipulations; and allowing an access in accordance with an access right to one of a sector and a row only when all keys that have one of key link numbers and key codes corresponding to one of row link numbers and sector codes assigned to respective access rights have been successfully authenticated.
- 36. The method according to claim 25, which comprises providing the keys in one of rows and sectors managed by access rights.
- 37. The method according to claim 36, which comprises requiring a read right in order to allow an authentication with a key.
- 38. The method according to claim 36, which comprises requiring a particular right for authentication in order to allow an authentication with a key.
- 39. The method according to claim 25, which comprises providing one of given rows and given sectors requiring no authentication for specific types of access.
- 40. The method according to claim 39, which comprises requiring a particular access right for a free access.
- 41. The method according to claim 39, which comprises allowing a free access via one of a particular row link number and a particular sector code.
- 42. The method according to claim 39, which comprises regulating a free access by using a particular key.
- 43. The method according to claim 26, which comprises assigning a key pair to rows having keys.
- 44. The method according to claim 43, which comprises providing the key pair as a pair of keys of equal authorization.
- 45. The method according to claim 43, which comprises providing the key pair as a pair of hierarchically ordered keys.
- 46. The method according to claim 25, which comprises providing the keys as keys that are authenticated by themselves.
- 47. The method according to claim 25, which comprises providing the keys as keys that are authenticated with other keys.
- 48. A memory device, comprising:
a memory including a plurality of rows and a plurality of sectors, a respective number of said rows forming a respective one of said sectors; each of said sectors having an application-specific size; each of said sectors being provided with a respective application-specific sector code, at least one key link number being assigned to the respective application-specific sector code such that rights are assigned to a corresponding segment of said memory; and a plurality of keys, each of said keys being assigned at least one access right and a key link number, each of said keys being provided with at least one code, the at least one code authorizing a respective one of said keys only for access to a given one of said sectors determined by a corresponding application-specific code.
- 49. The memory device according to claim 48, wherein said memory is configured to store a signature for each unit formed from a key, a code for said key and an associated access right, and said memory is configured such that said signature is checked during authentication for protection against manipulations.
- 50. The memory device according to claim 48, wherein said memory is configured to store, for each of said sectors, a respective signature to be checked during each data access.
- 51. The memory device according to claim 48, wherein said memory is configured to store a signature containing a chip serial number.
- 52. The memory device according to claim 48, wherein said keys are provided in respective ones of said rows and said sectors.
Priority Claims (1)
Number |
Date |
Country |
Kind |
99 112 171.6 |
Jun 1999 |
DE |
|
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is a continuation of copending International Application PCT/EP00/04940, filed May 30, 2000, which designated the United States.
Continuations (1)
|
Number |
Date |
Country |
Parent |
PCT/EP00/04940 |
May 2000 |
US |
Child |
10026111 |
Dec 2001 |
US |