摘要 |
<p>By authentication of a card (1) for electronic payment transactions before subjecting a cryptographic module (4) to data to be enciphered within said module by a secret key (k), the manner in which the cryptographic module can be used and the character of the supplied data stream can be restricted to that which is normal for this kind of payment transaction, whereby experimenting with abnormal data to the end of hacking the key is excluded.</p> |