DK2282280T3 - Fremgangsmåde og system til beskyttelse af indhold i et programmerbart system - Google Patents
Fremgangsmåde og system til beskyttelse af indhold i et programmerbart system Download PDFInfo
- Publication number
- DK2282280T3 DK2282280T3 DK10011274.7T DK10011274T DK2282280T3 DK 2282280 T3 DK2282280 T3 DK 2282280T3 DK 10011274 T DK10011274 T DK 10011274T DK 2282280 T3 DK2282280 T3 DK 2282280T3
- Authority
- DK
- Denmark
- Prior art keywords
- access port
- access
- mode
- asic
- access mode
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/31719—Security aspects, e.g. preventing unauthorised access during test
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1433—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a module or a part of a module
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R25/00—Deaf-aid sets, i.e. electro-acoustic or electro-mechanical hearing aids; Electric tinnitus maskers providing an auditory perception
- H04R25/70—Adaptation of deaf aid to hearing loss, e.g. initial electronic fitting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R2225/00—Details of deaf aids covered by H04R25/00, not provided for in any of its subgroups
- H04R2225/61—Aspects relating to mechanical or electronic switches or control elements, e.g. functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R25/00—Deaf-aid sets, i.e. electro-acoustic or electro-mechanical hearing aids; Electric tinnitus maskers providing an auditory perception
- H04R25/55—Deaf-aid sets, i.e. electro-acoustic or electro-mechanical hearing aids; Electric tinnitus maskers providing an auditory perception using an external connection, either wireless or wired
- H04R25/556—External connectors, e.g. plugs or modules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Neurosurgery (AREA)
- Otolaryngology (AREA)
- Acoustics & Sound (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Claims (10)
1. Fremgangsmåde til beskyttelse af indhold indlejret i et programmerbart system, hvilket system har mindst ét applikationsspecifikt integreret kredsløb (ASIC), der udfører en applikation, og et ikke-flygtigt (NV) lagerelement, der tilgås via ASIC, og som indbefatter et beskyttet område og et ubeskyttet område til lagring af indhold, hvor ASIC og NV-lagerelementet er indkapslet indvendigt i systemet, hvilken fremgangsmåde omfatter følgende trin: tildeling af mindst én af en flerhed af adgangsmodi til mindst én adgangsport til det programmerbare system til modtagelse af adgangsportkommandoer fra en ekstern enhed, hvilke adgangsmodi mindst indbefatter: en ubegrænset adgangsmodus, hvori: modtagne adgangsportkommandoer udføres; og en begrænset adgangsmodus, hvori: modtagne adgangsportkommandoer udføres, hvis de modtagne adgangsportkommandoer ikke er forbundet med læsning fra eller skrivning til det beskyttede område; og modtagne adgangsportkommandoer ikke udføres og et dummy-svar tilvejebringes, når de modtagne adgangsportkommandoer er forbundet med læsning fra eller skrivning til det beskyttede område; modtagelse af én eller flere adgangsportkommandoer tilvejebragt af den eksterne enhed ved adgangsporten og udførelse eller ikke-udførelse af hver af den ene eller flere adgangsportkommandoer i overensstemmelse med den adgangsmodus, der er tildelt adgangsporten; og omkobling af den begrænsede adgangsmodus til den ubegrænsede adgangsmodus uden eksponering af indholdet af det beskyttede område for den eksterne enhed via adgangsporten ved sletning eller tilsløring af indholdet af det beskyttede område.
2. Fremgangsmåde ifølge krav 1, hvor omkoblingstrinnnet omfatter sletning af indholdet af det beskyttede område før omkobling af den begrænsede adgangsmodus til den ubegrænsede adgangsmodus.
3. Fremgangsmåde ifølge krav 1 eller 2, hvor de adgangsportkommandoer, der udføres i den begrænsede modus, omfatter: en adgangsportkommando til læsning af indhold fra det ubeskyttede område; eller en adgangsportkommando til skrivning af indhold til det ubeskyttede område.
4. Fremgangsmåde ifølge et hvilket som helst af kravene 1 til 3, hvor de adgangsportkommandoer, der udføres i den ubegrænsede adgangsmodus, udføres via én eller flere af adgangsportens indbyggede funktioner, og hvor den ene eller flere af adgangsportens indbyggede funktioner er deaktiverede i den begrænsede adgangsmodus.
5. Fremgangsmåde ifølge et hvilket som helst af kravene 1 til 4, hvor det programmerbare system er en hybrid til udførelse afen hørehjælpsapplikation.
6. Fremgangsmåde ifølge krav 5, hvor indholdet af det ubeskyttede område omfatter tilpasningsinformationer til konfiguration af behandling afhørehjælpen, og hvor indholdet af det beskyttede område omfatter applikationskode til udførelse af behandling afhørehjælpen.
7. Programmerbart system til implementering afen applikation og som kan indgås fra en ekstern enhed via mindst én adgangsport, der omfatter: mindst et applikationsspecifikt integreret kredsløb (ASIC), der udfører en applikation; et ikke-flygtigt (NV) lagerelement, der omfatter et beskyttet område og et ubeskyttet område til lagring af informationer på applikationen; og et hus til indkapsling af ASIC og NV-lagerelementet indvendigt i systemet, hvor ASIC er konfigureret til at tilvejebringe en fremgangsmåde til indholdsbeskyttelse ifølge et hvilket som helst af kravene 1 til 6.
8. System ifølge krav 7, hvor ASIC indbefatter et register til lagring af en aktuel adgangsmodus og som opdateres som reaktion på en adgangsportkommando.
9. System ifølge krav 7 eller 8, hvor NV-lagerelementet er indlejret i ASIC, og/eller hvor systemet indbefatter mindst to ASIC, der indbefatter et første ASIC med en analog signalbehandling og et andet ASIC med en digital signalprocessor.
10. System ifølge et hvilket som helst af kravene 7 til 9, hvor systemet er en hybrid til udførelse afen hørehjælpsapplikation.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002462495A CA2462495A1 (en) | 2004-03-30 | 2004-03-30 | Method and system for protecting content in a programmable system |
EP05006951.7A EP1582958B1 (en) | 2004-03-30 | 2005-03-30 | Method and system for protecting content in a programmable system |
Publications (1)
Publication Number | Publication Date |
---|---|
DK2282280T3 true DK2282280T3 (da) | 2018-09-10 |
Family
ID=34865998
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK10011274.7T DK2282280T3 (da) | 2004-03-30 | 2005-03-30 | Fremgangsmåde og system til beskyttelse af indhold i et programmerbart system |
DK05006951.7T DK1582958T3 (da) | 2004-03-30 | 2005-03-30 | Fremgangsmåde og system til beskyttelse af indhold i et programmerbart system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK05006951.7T DK1582958T3 (da) | 2004-03-30 | 2005-03-30 | Fremgangsmåde og system til beskyttelse af indhold i et programmerbart system |
Country Status (5)
Country | Link |
---|---|
US (1) | US8302159B2 (da) |
EP (2) | EP2282280B1 (da) |
CA (2) | CA2462495A1 (da) |
DK (2) | DK2282280T3 (da) |
WO (1) | WO2005096156A1 (da) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5224546B2 (ja) * | 2007-02-14 | 2013-07-03 | カバ・アクチェンゲゼルシャフト | 識別信号の送信のためのシステムおよび持ち運び可能な装置 |
WO2015104726A1 (en) * | 2014-01-10 | 2015-07-16 | Telsy Elettronica E Telecomunicazioni Spa | Secure voice and data method and system |
US12028705B2 (en) | 2014-11-20 | 2024-07-02 | Widex A/S | Secure connection between internet server and hearing aid |
EP3032857B1 (en) * | 2014-12-12 | 2019-09-18 | GN Hearing A/S | Hearing device with communication protection and related method |
DK3032845T3 (da) | 2014-12-12 | 2020-05-04 | Gn Hearing As | Hearing device with service mode and related method |
US9608807B2 (en) * | 2014-12-12 | 2017-03-28 | Gn Hearing A/S | Hearing device with communication protection and related method |
US10785578B2 (en) | 2014-12-12 | 2020-09-22 | Gn Hearing A/S | Hearing device with service mode and related method |
DK201470778A1 (en) * | 2014-12-12 | 2016-06-27 | Gn Resound As | Hearing device with service mode and related method |
DK201570433A1 (en) | 2015-07-02 | 2017-01-30 | Gn Hearing As | Hearing device with model control and associated methods |
US9877123B2 (en) | 2015-07-02 | 2018-01-23 | Gn Hearing A/S | Method of manufacturing a hearing device and hearing device with certificate |
US10104522B2 (en) | 2015-07-02 | 2018-10-16 | Gn Hearing A/S | Hearing device and method of hearing device communication |
US10158955B2 (en) | 2015-07-02 | 2018-12-18 | Gn Hearing A/S | Rights management in a hearing device |
US10318720B2 (en) | 2015-07-02 | 2019-06-11 | Gn Hearing A/S | Hearing device with communication logging and related method |
US9887848B2 (en) | 2015-07-02 | 2018-02-06 | Gn Hearing A/S | Client device with certificate and related method |
US10158953B2 (en) | 2015-07-02 | 2018-12-18 | Gn Hearing A/S | Hearing device and method of updating a hearing device |
WO2017005326A1 (en) | 2015-07-09 | 2017-01-12 | Widex A/S | System and method for feature management in a hearing aid |
WO2017028876A1 (en) | 2015-08-14 | 2017-02-23 | Widex A/S | System and method for personalizing a hearing aid |
DE102020214914A1 (de) | 2020-11-27 | 2022-06-02 | Sivantos Pte. Ltd. | Verfahren zur Unterstützung eines Nutzers eines Hörgerätes, Hörgerät und Computerprogrammprodukt |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4698750A (en) * | 1984-12-27 | 1987-10-06 | Motorola, Inc. | Security for integrated circuit microcomputer with EEPROM |
US5251304A (en) * | 1990-09-28 | 1993-10-05 | Motorola, Inc. | Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securing the contents of on-chip memory |
US5737760A (en) * | 1995-10-06 | 1998-04-07 | Motorola Inc. | Microcontroller with security logic circuit which prevents reading of internal memory by external program |
US6523119B2 (en) * | 1996-12-04 | 2003-02-18 | Rainbow Technologies, Inc. | Software protection device and method |
US5754762A (en) | 1997-01-13 | 1998-05-19 | Kuo; Chih-Cheng | Secure multiple application IC card using interrupt instruction issued by operating system or application program to control operation flag that determines the operational mode of bi-modal CPU |
US6236731B1 (en) * | 1997-04-16 | 2001-05-22 | Dspfactory Ltd. | Filterbank structure and method for filtering and separating an information signal into different bands, particularly for audio signal in hearing aids |
WO1998047314A2 (en) | 1997-04-16 | 1998-10-22 | Dspfactory Ltd. | Apparatus for and method of programming a digital hearing aid |
US6240493B1 (en) * | 1998-04-17 | 2001-05-29 | Motorola, Inc. | Method and apparatus for performing access censorship in a data processing system |
DE19835609C2 (de) * | 1998-08-06 | 2000-06-08 | Siemens Ag | Programmgesteuerte Einheit |
DK199900017A (da) * | 1999-01-08 | 2000-07-09 | Gn Resound As | Tidsstyret høreapparat |
US6615324B1 (en) * | 2000-01-07 | 2003-09-02 | Cygnal Integrated Products, Inc. | Embedded microprocessor multi-level security system in flash memory |
US6331784B1 (en) * | 2000-07-28 | 2001-12-18 | Atmel Corporation | Secure programmable logic device |
US7031481B2 (en) * | 2000-08-10 | 2006-04-18 | Gn Resound A/S | Hearing aid with delayed activation |
DE10126281A1 (de) * | 2001-05-29 | 2002-12-12 | Infineon Technologies Ag | Programmgesteuerte Einheit |
EP1276033B1 (de) * | 2001-07-10 | 2012-03-14 | Trident Microsystems (Far East) Ltd. | Speichereinrichtung mit Datenschutz in einem Prozessor |
US20030212897A1 (en) * | 2001-08-18 | 2003-11-13 | Russell Dickerson | Method and system for maintaining secure semiconductor device areas |
DE10146516A1 (de) * | 2001-09-21 | 2003-04-24 | Infineon Technologies Ag | Programmgesteuerte Einheit |
US6883075B2 (en) * | 2002-01-17 | 2005-04-19 | Silicon Storage Technology, Inc. | Microcontroller having embedded non-volatile memory with read protection |
US7266848B2 (en) * | 2002-03-18 | 2007-09-04 | Freescale Semiconductor, Inc. | Integrated circuit security and method therefor |
DK1367857T3 (da) * | 2002-05-30 | 2012-06-04 | Gn Resound As | Fremgangsmåde til dataregistrering i en høreprotese |
DE10228826A1 (de) * | 2002-06-27 | 2004-01-29 | Siemens Audiologische Technik Gmbh | Akustikmodul für ein Hörhilfsgerät |
US7284016B2 (en) * | 2002-12-03 | 2007-10-16 | Emc Corporation | Client-server protocol for directory access of snapshot file systems in a storage system |
-
2004
- 2004-03-30 CA CA002462495A patent/CA2462495A1/en not_active Abandoned
-
2005
- 2005-03-28 US US11/091,746 patent/US8302159B2/en active Active
- 2005-03-29 WO PCT/CA2005/000457 patent/WO2005096156A1/en active Application Filing
- 2005-03-29 CA CA2561880A patent/CA2561880C/en active Active
- 2005-03-30 EP EP10011274.7A patent/EP2282280B1/en active Active
- 2005-03-30 DK DK10011274.7T patent/DK2282280T3/da active
- 2005-03-30 DK DK05006951.7T patent/DK1582958T3/da active
- 2005-03-30 EP EP05006951.7A patent/EP1582958B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP1582958B1 (en) | 2013-12-18 |
EP1582958A2 (en) | 2005-10-05 |
EP2282280A1 (en) | 2011-02-09 |
EP2282280B1 (en) | 2018-08-15 |
US8302159B2 (en) | 2012-10-30 |
CA2561880A1 (en) | 2005-10-13 |
EP1582958A3 (en) | 2006-05-31 |
US20050235354A1 (en) | 2005-10-20 |
CA2462495A1 (en) | 2005-09-30 |
CA2561880C (en) | 2014-07-15 |
DK1582958T3 (da) | 2014-02-24 |
WO2005096156A1 (en) | 2005-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK2282280T3 (da) | Fremgangsmåde og system til beskyttelse af indhold i et programmerbart system | |
US8843769B2 (en) | Microcontroller with embedded secure feature | |
KR101010801B1 (ko) | 액세스 허용을 결정하는 방법 및 장치 | |
US8867746B2 (en) | Method for protecting a control device against manipulation | |
US20030200453A1 (en) | Control function with multiple security states for facilitating secure operation of an integrated system | |
EP1934708A2 (en) | Method and system for preventing unsecure memory accesses | |
TW200424864A (en) | A computer system including a bus bridge for connection to a security services processor | |
WO2005116842A1 (en) | Digital signal controller secure memory partitioning | |
EP1502466A2 (en) | Method and apparatus for use in securing an electronic device such as a cell phone | |
JP2007526573A (ja) | リトリーブ可能なトークン(例えば、スマートカード)内の独立した実行環境におけるアプリケーション間のセキュリティで保護されたリソース共有 | |
CN110334512A (zh) | 基于双体系架构的可信计算平台的静态度量方法和装置 | |
JP2009505304A (ja) | 埋設式メモリのアクセス制御 | |
KR20190085387A (ko) | 반도체 장치 및 반도체 장치의 동작 방법 | |
US11853428B2 (en) | Firmware policy enforcement via a security processor | |
CN112702327B (zh) | 一种主控芯片的安全服务设计方法 | |
JP2003186693A (ja) | エミュレート機能を有するマイクロコントローラ | |
CN107077352A (zh) | 用于机器状态的安全存储和检索的方法和系统 | |
US20240187231A1 (en) | Forensics Module and Integrated System | |
US20210056220A1 (en) | Method for improving confidentiality protection of neural network model | |
US20240193564A1 (en) | Forensics Module and Embedded System | |
JP2005535953A (ja) | セキュアモードまたは非セキュアモードでプログラムを実行するコンピュータアーキテクチャ | |
JP2011150457A (ja) | 情報処理装置およびメモリアクセス制御方法 | |
JP2004272832A (ja) | プログラマブル論理回路及び該プログラマブル論理回路を備えるコンピュータシステム並びに論理回路情報の書き込み方法 | |
JP3931001B2 (ja) | プログラム書き込み可能なicカードの処理方法 | |
Alendal | Digital Forensic Acquisition of mobile phones in the Era of Mandatory Security: Offensive Techniques, Security Vulnerabilities and Exploitation |