SG10201401035UA - Method for the execution of a secure software application and a non-secure software application, which are interlaced one with the other - Google Patents

Method for the execution of a secure software application and a non-secure software application, which are interlaced one with the other

Info

Publication number
SG10201401035UA
SG10201401035UA SG10201401035UA SG10201401035UA SG10201401035UA SG 10201401035U A SG10201401035U A SG 10201401035UA SG 10201401035U A SG10201401035U A SG 10201401035UA SG 10201401035U A SG10201401035U A SG 10201401035UA SG 10201401035U A SG10201401035U A SG 10201401035UA
Authority
SG
Singapore
Prior art keywords
software application
secure software
interlaced
execution
secure
Prior art date
Application number
SG10201401035UA
Inventor
Michel Linares
Den Hende Jean-Christophe Van
Original Assignee
Alstom Transp Tech
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alstom Transp Tech filed Critical Alstom Transp Tech
Publication of SG10201401035UA publication Critical patent/SG10201401035UA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/28Error detection; Error correction; Monitoring by checking the correct order of processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Stored Programmes (AREA)
SG10201401035UA 2013-03-29 2014-03-27 Method for the execution of a secure software application and a non-secure software application, which are interlaced one with the other SG10201401035UA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1352910A FR3003967B1 (en) 2013-03-29 2013-03-29 METHOD FOR EXECUTING SECURITY SOFTWARE AND NON-SECURITY INTERLACED SOFTWARE

Publications (1)

Publication Number Publication Date
SG10201401035UA true SG10201401035UA (en) 2014-10-30

Family

ID=49054659

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201401035UA SG10201401035UA (en) 2013-03-29 2014-03-27 Method for the execution of a secure software application and a non-secure software application, which are interlaced one with the other

Country Status (4)

Country Link
EP (1) EP2784680B1 (en)
CN (1) CN104077127B (en)
FR (1) FR3003967B1 (en)
SG (1) SG10201401035UA (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3330859A1 (en) * 2016-12-05 2018-06-06 Universiteit Gent Self-debugging

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1584034B1 (en) * 2002-12-12 2017-05-17 Intellectual Ventures Fund 73 LLC Systems and methods for detecting a security breach in a computer system
US8332660B2 (en) * 2008-01-02 2012-12-11 Arm Limited Providing secure services to a non-secure application
DE102011012227A1 (en) * 2011-02-24 2012-08-30 Giesecke & Devrient Gmbh Method for exchanging data in a secure runtime environment
JP5928741B2 (en) * 2011-03-16 2016-06-01 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation System for enabling digital signature auditing

Also Published As

Publication number Publication date
FR3003967B1 (en) 2015-05-01
EP2784680B1 (en) 2020-06-03
CN104077127A (en) 2014-10-01
CN104077127B (en) 2018-11-06
EP2784680A3 (en) 2015-09-30
EP2784680A2 (en) 2014-10-01
FR3003967A1 (en) 2014-10-03

Similar Documents

Publication Publication Date Title
HRP20171168T1 (en) P2x7 modulators
HK1254111A1 (en) P2x7 modulators
EP2951530A4 (en) Inertial device, method, and program
EP2863300A4 (en) Function execution instruction system, function execution instruction method, and function execution instruction program
EP3039608A4 (en) Hardware and software execution profiling
SG11201505651WA (en) Secure interface for invoking privileged operations
EP2951529A4 (en) Inertial device, method, and program
SG10201407868TA (en) Systems and methods for software based encryption
HK1232216A1 (en) P2x7 modulators p2x7
EP2889791A4 (en) Compound design device, compound design method, and computer program
HK1218651A1 (en) P2x7 modulators p2x7
EP2979211A4 (en) Protecting software application
EP2973172A4 (en) Preventing malicious instruction execution
EP2998948A4 (en) Encryption system, encryption method, and encryption program
HK1223878A1 (en) Computer control method, control program and computer
GB201316948D0 (en) Methods and software for creating workflows
EP2863385A4 (en) Function execution instruction system, function execution instruction method, and function execution instruction program
EP2961900A4 (en) Frangible fastener
EP3011469A4 (en) Task oriented passwords
IL253968A0 (en) Identifying software application events
HK1209686A1 (en) Fixed component disassembly system, fixed component disassembly method and program
EP2967765A4 (en) Twist lock interface for abutment and implant assembly
SG10201401035UA (en) Method for the execution of a secure software application and a non-secure software application, which are interlaced one with the other
EP3007141A4 (en) Authentication system and program
GB201320359D0 (en) Assembly and method