CN1288548A - 用于将微处理器卡中执行的操作隐藏的装置 - Google Patents

用于将微处理器卡中执行的操作隐藏的装置 Download PDF

Info

Publication number
CN1288548A
CN1288548A CN99802033A CN99802033A CN1288548A CN 1288548 A CN1288548 A CN 1288548A CN 99802033 A CN99802033 A CN 99802033A CN 99802033 A CN99802033 A CN 99802033A CN 1288548 A CN1288548 A CN 1288548A
Authority
CN
China
Prior art keywords
current drain
random
storer
computations
charge pump
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN99802033A
Other languages
English (en)
Other versions
CN1179298C (zh
Inventor
N·费伊特
O·贝诺伊特
D·纳卡彻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jin Yatuo
Gemalto Oy
Original Assignee
Gemplus SCA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus SCA filed Critical Gemplus SCA
Publication of CN1288548A publication Critical patent/CN1288548A/zh
Application granted granted Critical
Publication of CN1179298C publication Critical patent/CN1179298C/zh
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2123Dummy operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及微处理机卡,并涉及这种卡中的用于通过分析电流消耗将卡中执行的操作隐藏的各种装置,以防范欺诈性破坏。本发明的特征在于,它在卡中加入一个通过对电流进行积分以取得平均的装置(20)或者在卡中加入由一个随机信号发生器(28)产生的随机值,从而改变电流消耗以隐藏所执行的操作。在另一个实施例中,它包括在EEPROM存储器中同时执行加密操作和写操作,后者产生无序的电流变化,它将要保护的加密操作隐藏。

Description

用于将微处理器卡中执行的操作隐藏的装置
本发明涉及一种微处理机卡,并涉及这种卡中的用于将卡中执行的操作隐藏的装置,以达到提高防范欺诈性入侵的安全性的目的。
芯片卡可以分为几类,即:
-单存储器卡,
-如公知的智能卡的存储器卡,以及
-微处理器卡。
单存储器卡可在电可擦只读存储器区域中自由地进行读写操作。这种卡价格便宜但安全性能不足够,因此它的应用越来越少。
通过使智能存储卡只有当在硬布线形式中所实施的一定的条件得到满足时才能对其进行读写操作,这显著地提高了其读写操作的安全性。
第三类卡中包括一个微处理器,它能够执行记录在存储器中的程序,由此使得对保密数据的运算无法由卡外获得。因此,记录在存储器中的密钥具有确认例如购买的电子交易或者不是必须由卡的外部控制以开启通道的功能。
令人不满意的是,一些微处理器的电流消耗取决于在卡内所进行的计算。因此,包括有由所采用的密钥数字决定的计算树的加密计算会依所采用的密钥的值而具有不同的电流消耗踪迹(footprint)。结果,欺诈者能够对所采用的密钥的电流消耗踪迹进行相关处理并由此得出密钥的值。
为防止这种相关性,常规的对策包括对加密的算法进行编程,使得无论是任何密钥值的算法都总是通过相同的计算步骤。
许多所谓的“面向字节”的算法能够很好地适用这种程序模式,但其它的算法则存在一些技术问题,克服这些技术问题只能以牺牲最佳的计算性能为代价。
因此,本发明的目的是在微处理器卡中采用用于将执行的操作隐藏的装置,同时允许程序员自由地选择编程规则,而无论它们是否是“面向字节”型的。
通过修改卡的电流消耗或将卡的电流消耗打乱以便使其踪迹独立于所进行的计算,可以达到上述目的。
通过在卡中加入一种可修改电流消耗的装置能够实现这种踪迹的修改或打乱。
在一个示例的第一实施例中,这种装置以不规则或随机的方式消耗电功率,并将这种电功率加入到常规的消耗中。
在一个示例的第二实施例中,这种装置通过例如对电流消耗进行积分而实现平均消耗的效果。
在一个示例的第三实施例中,这种装置启动以一种无序的方式消耗功率的微处理器存储器擦除或编程电路,其功率掩盖了在存储器的擦除或编程的过程中微处理器所执行的操作引起的功率消耗。
通过阅读对于下述具体的实施例的描述,本发明的其它特征和优点将会清楚,所述的描述与相关的附图一起给出,附图中:
图1是本发明的示例的第一实施例的功能示意图;
图2是本发明的示例的第二实施例的功能示意图;及
图3是本发明的示例的第三实施例的功能示意图。
在示意性地示出用于实施本发明的不同的装置的附图中,包含有卡的微处理器的电子芯片10包括一个中央单元12和至少一个存储器14,例如公知的英文缩写EEPROM,表示电可擦可编程只读存储器。这种电子芯片有几个输入和/或输出端子161至168,其中标号为161的端子连接至一个提供电压VCC的电路18,而标号为165的端子接地。
电源电路18给具有电流Iout的电子芯片10的不同元件以及尤其是存储器14和中央单元12供电。此电流Iout依中央单元和存储器所执行的操作而变化,由此体现出加密计算,通过这种表现就可测定出密钥。
为了使这种电流Iout不再表现出所执行的操作,本发明通过设置在芯片10中的装置20或30并例如连接至输入端子161来改变这种电流Iout
本发明以两种不同的方法改变电流。第一种方法是,为确保装置20(附图1)以随机方式或具有很小的规则性的方式消耗电流,将随机的附加电流消耗加入到正常的电流消耗Iin中,使Iout值变得随机。
第二种方法包括对Iin的值进行平均,这使得不可能检测由所执行的操作引起的Iin的变化。
在第一种情况下,通过电阻器30(实际上是晶体管)可以制造装置20,根据由发生器28所提供的随机信号使此电阻器通电或不通电。由于在通电的电阻器中流动的电流增加,改变了总的电流值并由此隐藏了由加密运算引起的电流。
在第二种情况下,通过积分器实现对电流Iin的平均,此积分器使电流Iin的变化“平滑”,以此消除变化。
根据本发明,将几种装置20或30(标号为201和301)连接至电子芯片的不同点上,例如连接至中央单元(标号22)的电源导体。此外,这些装置20、201、30和301可以被连接或不连接,这取决于是否要保护这些操作,并且在中央单元12(虚线)所输送的信号的控制下进行连接。
本发明提出在程序执行或在擦除存储器14的过程中的某些阶段在执行要保护的操作(例如加密计算)的同时打乱Iout的值的第三种方法,这些操作是在中央单元12的控制之下的。
第三种方法基于采用具有自动写功能的一个EEPROM型存储器14。
在通常的操作模式中,微处理器根据如下步骤启动存储器14的编程电路24:
1-启动电荷泵;
2-在数据总线上给出要写的数据项;
3-在地址总线上给出写地址;
4-编程初始化;
5-在编程时间中等待;
6-停止编程;
7-停止电荷泵。
由于一个EEPROM单元的编程需要给被编程的单元注入电荷,在步骤4、5和6中伴随有无序的总的电流消耗出现,此电流消耗基本上取决于VCC的值、地址、被编程的值以及部件的温度。
例如,为掩盖加密计算的电流消耗的踪迹,本发明提出在步骤5的几微秒的周期过程中通过执行加密计算来采用步骤4、5和6的无序消耗。
为此,根据如下步骤执行加密计算:
1-启动电荷泵;
2-在数据总线上给出随机的数据项;
3-在地址总线上给出写地址;
4-编程初始化;
5-进行加密计算;
6-停止编程;
7-停止电荷泵。
通过这些步骤,由于步骤5的加密计算引起的电路消耗踪迹就被在EEPROM存储器的给定部件26中的随机数据项的写操作所隐藏,EEPROM存储器是用于此功能的。
不采用加密计算,步骤5也可以是由任何对于外部来说是要求保护的操作组成。
此外,不在存储器14的写过程中执行这些要保护的操作的话,也可在存储器14的擦除过程中执行这些操作。

Claims (9)

1.一种通过将一个部件集成到一个智能卡中而用于将所执行操作隐藏的装置,其特征在于,它包括至少一种装置(20、30、28、26),用于在执行所述操作的过程中修改所述部件的电流消耗。
2.根据权利要求1所述的装置,其特征在于,所述用于修改电流消耗的装置包括至少一种电路(30),用于对所述部件的电流进行积分,以便在时间上对此电流的变化进行平均。
3.根据权利要求1所述的装置,其特征在于,所述用于修改电流消耗的装置包括至少一个随机信号发生器(28)和一个电阻阵列(20),输送到每一个电阻的电源由随机信号控制。
4.根据权利要求1所述的装置,其特征在于,它包括多个用于修改电流消耗的装置(20、201、30、301)。
5.根据权利要求1所述的装置,其特征在于,在一个存储器(14)为EEPROM类型的情况下,所述用于修改所述部件的电流消耗的装置同时执行:
-一个对存储器(14)进行写或擦除的操作,称为隐藏操作;及
-一个微处理器的操作。
6.根据权利要求5所述的装置,其特征在于,为了实现一个隐藏写操作,所述存储器(14)包括一个专用于记录一个随机数据项的部分(26)。
7.根据权利要求1至5的其中之一所述的装置,其特征在于,所述用于修改电流消耗的装置的启动由所述微处理器(12)控制,以便被独立地启动来用于要保护的操作。
8.根据权利要求5所述的装置,其特征在于,所述微处理器(12)根据如下步骤至少执行加密计算:
-启动电荷泵;
-在数据总线上给出一个随机的数据项;
-在地址总线上给出一个写地址;
-编程初始化;
-进行加密计算;
-停止编程;
-停止电荷泵,以便掩盖由所述加密计算引起的电流消耗的踪迹。
9.一种通过一个部件而用于将所执行操作隐藏的方法,其特征在于,它包括如下步骤:
-启动电荷泵;
-在数据总线上给出一个随机的数据项;
-在地址总线上给出一个写地址;
-编程初始化;
-进行加密计算;
-停止编程;
-停止电荷泵。
CNB998020338A 1998-03-20 1999-03-16 用于将微处理器卡中执行的操作隐藏的装置 Expired - Lifetime CN1179298C (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR98/03471 1998-03-20
FR9803471A FR2776410B1 (fr) 1998-03-20 1998-03-20 Dispositifs pour masquer les operations effectuees dans une carte a microprocesseur

Publications (2)

Publication Number Publication Date
CN1288548A true CN1288548A (zh) 2001-03-21
CN1179298C CN1179298C (zh) 2004-12-08

Family

ID=9524307

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB998020338A Expired - Lifetime CN1179298C (zh) 1998-03-20 1999-03-16 用于将微处理器卡中执行的操作隐藏的装置

Country Status (9)

Country Link
US (1) US6698662B1 (zh)
EP (1) EP1062633B1 (zh)
JP (1) JP2002508549A (zh)
CN (1) CN1179298C (zh)
CA (1) CA2323006A1 (zh)
DE (1) DE69913667T2 (zh)
ES (1) ES2214012T3 (zh)
FR (1) FR2776410B1 (zh)
WO (1) WO1999049416A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1682175B (zh) * 2002-09-13 2010-12-08 Nxp股份有限公司 用于密码处理器的电流源
CN102110206A (zh) * 2010-12-27 2011-06-29 北京握奇数据系统有限公司 防御攻击的方法和具有攻击防御功能的装置
CN103608822A (zh) * 2011-03-21 2014-02-26 茂福公司 掩饰电子装置寿命终期转换的方法及包含相应控制模块的装置
CN109656305A (zh) * 2015-10-01 2019-04-19 意法半导体(鲁塞)公司 用于平滑由集成电路和对应的设备消耗的电流的方法

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999035782A1 (en) 1998-01-02 1999-07-15 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US7587044B2 (en) * 1998-01-02 2009-09-08 Cryptography Research, Inc. Differential power analysis method and apparatus
WO1999067919A2 (en) * 1998-06-03 1999-12-29 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
AU5458199A (en) 1998-07-02 2000-01-24 Cryptography Research, Inc. Leak-resistant cryptographic indexed key update
DE19850721A1 (de) * 1998-11-03 2000-05-18 Koninkl Philips Electronics Nv Datenträger mit Verschleierung des Stromverbrauchs
FR2790844B1 (fr) * 1999-03-09 2001-05-25 Gemplus Card Int Procede et dispositif de surveillance du deroulement d'un programme, dispositif programme permettant la surveillance de son programme
FR2793904B1 (fr) * 1999-05-21 2001-07-27 St Microelectronics Sa Procede et dispositif de gestion d'un circuit electronique
JP4083925B2 (ja) 1999-06-24 2008-04-30 株式会社日立製作所 情報処理装置、カード部材および情報処理システム
JP2001118042A (ja) * 1999-10-19 2001-04-27 Hitachi Ltd カード監視方法
FR2800490B1 (fr) * 1999-11-02 2002-01-04 Sagem Procede pour assurer l'inviolabilite d'un micromodule de carte a puce contre une analyse de sa consommation de courant et micromodule agence pour sa mise en oeuvre
DE59914370D1 (de) * 1999-11-03 2007-07-19 Infineon Technologies Ag Kodiervorrichtung
FR2801746B1 (fr) 1999-11-26 2003-08-22 France Telecom Dispositif d'alimentation stabilisee de composants electroniques tele-alimentes
US6507913B1 (en) * 1999-12-30 2003-01-14 Yeda Research And Development Co. Ltd. Protecting smart cards from power analysis with detachable power supplies
DE10000503A1 (de) * 2000-01-08 2001-07-12 Philips Corp Intellectual Pty Datenverarbeitungseinrichtung und Verfahren zu dessen Betrieb
EP1272973B1 (en) * 2000-04-04 2012-05-09 Nxp B.V. Output stage for a communication contact for a data carrier
FR2811790A1 (fr) * 2000-07-11 2002-01-18 Schlumberger Systems & Service Microcontroleur securise contre des attaques dites en courant
PT102512A (pt) * 2000-08-31 2002-02-28 Tech4Cable Inc "dispositivo de acesso a sinais de televisao de distribuicao por cabo"
FR2813972B1 (fr) 2000-09-14 2003-12-12 St Microelectronics Sa Procede de brouillage de la consommation electrique d'un circuit integre
DE10054970A1 (de) 2000-11-06 2002-05-23 Infineon Technologies Ag Verfahren zur Steuerung der Lade- und Entladephasen eines Stützkondensators
JP3977592B2 (ja) * 2000-12-28 2007-09-19 株式会社東芝 データ処理装置
DE10101956A1 (de) * 2001-01-17 2002-07-25 Infineon Technologies Ag Verfahren zur Erhöhung der Sicherheit einer CPU
FR2824648B1 (fr) * 2001-05-14 2003-08-08 Gemplus Card Int Procede de protection d'un circuit logique contre des attaques exterieures, et unite logique contenant un circuit logique a proteger contre des attaques exterieures
DE10128573A1 (de) * 2001-06-13 2003-01-02 Infineon Technologies Ag Verhindern der unerwünschten externen Erfassung von Operationen in integrierten Digitalschaltungen
US20030004934A1 (en) * 2001-06-29 2003-01-02 Richard Qian Creating and managing portable user preferences for personalizion of media consumption from device to device
JP3539940B2 (ja) * 2001-07-30 2004-07-07 沖電気工業株式会社 電圧レギュレータ
FR2830146B1 (fr) * 2001-09-24 2003-10-31 Gemplus Card Int Procede de mise en oeuvre, dans un composant electronique, d'un algorithme de cryptographie et composant correspondant
FR2831739B1 (fr) * 2001-10-31 2005-07-22 Gemplus Card Int Procede de mise en oeuvre securisee d'un module fonctionnel, dans un composant electronique et composant correspondant
DE10162309A1 (de) * 2001-12-19 2003-07-03 Philips Intellectual Property Verfahren und Anordnung zur Erhöhung der Sicherheit von Schaltkreisen gegen unbefugten Zugriff
FR2837960B1 (fr) * 2002-03-28 2004-07-09 Oberthur Card Syst Sa Entite electronique transactionnelle securisee par mesure du temps
FR2837959A1 (fr) * 2002-03-28 2003-10-03 Oberthur Card Syst Sa Entite electronique transactionnelle autonome securisee par mesure du temps s'ecoulant entre deux transactions successives
FR2844896A1 (fr) * 2002-09-19 2004-03-26 St Microelectronics Sa Alimentation d'un circuit de traitement asynchrone de donnees
US8209765B2 (en) * 2003-04-22 2012-06-26 Nxp B.V. Electronic circuit device for cryptographic applications
FR2858496B1 (fr) * 2003-07-31 2005-09-30 Gemplus Card Int Procede pour la mise en oeuvre securisee d'un algorithme de cryptographie de type rsa et composant correspondant
JP4674440B2 (ja) * 2004-03-04 2011-04-20 ソニー株式会社 データ処理回路
JP2008542894A (ja) * 2005-05-31 2008-11-27 エヌエックスピー ビー ヴィ 電気回路装置及びその動作方法
KR100830584B1 (ko) 2006-11-21 2008-05-21 삼성전자주식회사 플래시 메모리 장치 및 그것을 포함한 스마트 카드
FR2924262B1 (fr) * 2007-11-26 2009-12-11 Sagem Securite Procede de masquage de passage en fin de vie d'un dispositif electronique et dispositif comportant un module de controle correspondant
EP2235874A1 (en) 2007-12-13 2010-10-06 Nxp B.V. Electronic circuit and method of masking current requirements of an electronic circuit
FR2925968B1 (fr) * 2007-12-26 2011-06-03 Ingenico Sa Procede de securisation d'un microprocesseur, programme d'ordinateur et dispositif correspondants
US8635467B2 (en) 2011-10-27 2014-01-21 Certicom Corp. Integrated circuit with logic circuitry and multiple concealing circuits
US8334705B1 (en) 2011-10-27 2012-12-18 Certicom Corp. Analog circuitry to conceal activity of logic circuitry
FR3012234B1 (fr) * 2013-10-23 2017-02-24 Proton World Int Nv Protection de l'execution d'un algorithme contre des attaques par canaux caches
FR3065556B1 (fr) 2017-04-19 2020-11-06 Tiempo Circuit electronique securise par perturbation de son alimentation.
FR3117232B1 (fr) * 2020-12-08 2024-02-23 St Microelectronics Sa Brouillage de la signature en courant d'un circuit intégré

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2401459A1 (fr) * 1977-08-26 1979-03-23 Cii Honeywell Bull Support d'information portatif muni d'un microprocesseur et d'une memoire morte programmable
US4295041A (en) * 1977-08-26 1981-10-13 Compagnie Internationale Pour L'informatique Cii-Honeywell Bull (Societe Anonyme) Device for the protection of access to a permanent memory of a portable data carrier
FR2600183B1 (fr) * 1986-06-13 1990-10-12 Eurotechnique Sa Circuit integre pour la memorisation et le traitement d'informations de maniere confidentielle comportant un dispositif anti-fraude
FR2604554B1 (fr) * 1986-09-30 1988-11-10 Eurotechnique Sa Dispositif de securite pourla programmation d'une memoire non volatile programmable electriquement
FR2617976B1 (fr) * 1987-07-10 1989-11-10 Thomson Semiconducteurs Detecteur electrique de niveau logique binaire
FR2638869B1 (fr) * 1988-11-10 1990-12-21 Sgs Thomson Microelectronics Dispositif de securite contre la detection non autorisee de donnees protegees
US5404402A (en) * 1993-12-21 1995-04-04 Gi Corporation Clock frequency modulation for secure microprocessors
MY125706A (en) * 1994-08-19 2006-08-30 Thomson Consumer Electronics High speed signal processing smart card
FR2724032B1 (fr) 1994-08-23 1997-01-03 Advanced Communication Technol Terminal portable de communication interactive, centrale apte a communiquer avec ce terminal et systeme interactif d'echange d'informations
DE19505097C1 (de) * 1995-02-15 1996-06-05 Siemens Ag Verschlüsselungsvorrichtung
US6064740A (en) * 1997-11-12 2000-05-16 Curiger; Andreas Method and apparatus for masking modulo exponentiation calculations in an integrated circuit

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1682175B (zh) * 2002-09-13 2010-12-08 Nxp股份有限公司 用于密码处理器的电流源
CN102110206A (zh) * 2010-12-27 2011-06-29 北京握奇数据系统有限公司 防御攻击的方法和具有攻击防御功能的装置
CN103608822A (zh) * 2011-03-21 2014-02-26 茂福公司 掩饰电子装置寿命终期转换的方法及包含相应控制模块的装置
CN103608822B (zh) * 2011-03-21 2016-11-09 茂福公司 掩饰电子装置寿命终期转换的方法及包含相应控制模块的装置
CN109656305A (zh) * 2015-10-01 2019-04-19 意法半导体(鲁塞)公司 用于平滑由集成电路和对应的设备消耗的电流的方法
CN109656305B (zh) * 2015-10-01 2020-11-24 意法半导体(鲁塞)公司 用于平滑由集成电路和对应的设备消耗的电流的方法

Also Published As

Publication number Publication date
US6698662B1 (en) 2004-03-02
CN1179298C (zh) 2004-12-08
FR2776410B1 (fr) 2002-11-15
ES2214012T3 (es) 2004-09-01
DE69913667D1 (de) 2004-01-29
FR2776410A1 (fr) 1999-09-24
EP1062633B1 (fr) 2003-12-17
CA2323006A1 (fr) 1999-09-30
JP2002508549A (ja) 2002-03-19
WO1999049416A1 (fr) 1999-09-30
EP1062633A1 (fr) 2000-12-27
DE69913667T2 (de) 2004-10-07

Similar Documents

Publication Publication Date Title
CN1179298C (zh) 用于将微处理器卡中执行的操作隐藏的装置
CN1826659B (zh) 存储器系统、读取存储在该存储器系统中数据的方法及为存储器系统所执行的方法
US5644636A (en) Method and apparatus for securing data stored in semiconductor memory cells
EP0707270B1 (en) Method and apparatus for validating system operation
KR100634333B1 (ko) 멀티레벨 메모리를 제공하는 방법, 이 방법을 프로세서기반 시스템으로 하여금 수행하도록 하는 인스트럭션을저장하는 매체를 포함하는 제품 및 멀티레벨 메모리
US6034889A (en) Electrically erasable and programmable non-volatile memory having a protectable zone and an electronic system including the memory
EP0623959A2 (en) EEPROM cell
CN1993770A (zh) 基于减小的面积、减小的编程电压的互补金属氧化物半导体电子熔丝的可扫描式非易失性存储器位单元
US20090113166A1 (en) Hashing method for nand flash memory
CN1697084A (zh) 闪存装置及其驱动方法
CN1892907A (zh) 用于非易失性半导体存储器件的基准方案
CN108766495A (zh) 数据写入方法、存储器控制器与存储器存储装置
US20040205314A1 (en) Semiconductor memory with access protection scheme
JPH1050078A (ja) 電気的に消去およびプログラムが可能なリード・オンリ・メモリの消去およびプログラミング保護方法および装置
CN1716221A (zh) 对存储器逻辑分区访问权限进行控制的方法和ic卡
US8069196B2 (en) Method and device for creating a starting value for a pseudorandom number generator
EP0881645B1 (en) Non-volatile semiconductor storage device
CN1937229A (zh) Eeprom及其驱动方法
CN1720507A (zh) 用于闪存的地址加密方法
US7818491B2 (en) Nonvolatile memory and electronic device for use therewith
CN1432154A (zh) 具有密码核对功能的便携式信息处理装置
CN1253893C (zh) 一种引导用只读存储器的写保护实现方法
US20070101047A1 (en) Memory apparatus and controller
JP4433792B2 (ja) メモリコントローラ及びメモリコントローラを備えるフラッシュメモリシステム、並びに、フラッシュメモリの制御方法
US9025355B2 (en) Non-volatile memory device with clustered memory cells

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: JIN YATUO

Free format text: FORMER OWNER: GEMPLUS CO.

Effective date: 20120903

C41 Transfer of patent application or patent right or utility model
C56 Change in the name or address of the patentee

Owner name: SETEC OY

Free format text: FORMER NAME: JIN YATUO

CP01 Change in the name or title of a patent holder

Address after: East France

Patentee after: GEMALTO OY

Address before: East France

Patentee before: Jin Yatuo

TR01 Transfer of patent right

Effective date of registration: 20120903

Address after: East France

Patentee after: Jin Yatuo

Address before: French based Minos

Patentee before: GEMPLUS

CX01 Expiry of patent term

Granted publication date: 20041208

CX01 Expiry of patent term