WO2001022223A1 - Verfahren zur sicherung eines programmablaufs - Google Patents

Verfahren zur sicherung eines programmablaufs Download PDF

Info

Publication number
WO2001022223A1
WO2001022223A1 PCT/EP2000/009131 EP0009131W WO0122223A1 WO 2001022223 A1 WO2001022223 A1 WO 2001022223A1 EP 0009131 W EP0009131 W EP 0009131W WO 0122223 A1 WO0122223 A1 WO 0122223A1
Authority
WO
WIPO (PCT)
Prior art keywords
program
calling
checksum
called
execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2000/009131
Other languages
German (de)
English (en)
French (fr)
Inventor
Michael Baldischweiler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Priority to JP2001525524A priority Critical patent/JP4732651B2/ja
Priority to US10/070,444 priority patent/US6934887B1/en
Priority to EP00960677.3A priority patent/EP1224546B1/de
Priority to AU72884/00A priority patent/AU7288400A/en
Publication of WO2001022223A1 publication Critical patent/WO2001022223A1/de
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/28Error detection; Error correction; Monitoring by checking the correct order of processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural
    • G06F9/4484Executing subprograms

Definitions

  • the present invention relates to a method for securing the program flow according to claim 1.
  • secret data can also be accessed by deliberately interrupting the program sequence, so that errors occur in the encryption routines, from which the secret data can be deduced after repeated deliberate interruptions.
  • a method for checking the memory cell contents of a program memory in a computer is known from German Patent DE 3709524 C2.
  • Several checksums are stored there, which are formed from memory cell contents from different address and data storage areas. The checksums are determined at the beginning and / or during computer operation and compared with the stored checksum. If a deviation is found, an error signal is issued.
  • the method known from DE 3709524 C2 is mainly suitable for checking the correctness of data used in a program. It is ignored that also or in particular manipulation of the program sequence can occur especially when program calls are made, ie when executing sub or function programs.
  • this object is achieved in that the called program carries out a data check which determines the safe transition of the data to be handed over by the calling program.
  • the invention provides additional security, which not only ensures that individual program parts are executed safely and completely, but that the entire program flow can run undisturbed and free of manipulation.
  • a check sum is first formed by the calling program, which is stored in a memory area provided for this purpose. After the parameters have been transferred, a check sum is also generated by the program called for the parameters received. In the event that the checksums formed by the calling and called program are different, the program is terminated.
  • the memory area which is provided for storing the checksum is preferably created in a RAM or register area.
  • a further or alternative embodiment for the formation of the checksum via the parameters to be transferred results from the check of the return addresses.
  • the return addresses of the calling functions are entered in a table and the called program can use this table to check whether the return address transmitted by the calling program is present in the table.
  • the program can be interrupted if the return address is incorrectly communicated.
  • a further alternative or additional security check can be carried out by starting a timer when a subroutine or a function program is called. This timer counts the clock cycles which are necessary for the execution of the program. First, the number of clock cycles required for the regular subroutine sequence is specified as the limit value for the timer. The program is terminated if the number of specified clock cycles has been exceeded before the subroutine has ended.
  • the timer value is also read out at certain, predetermined locations in the subroutine and is likewise predetermined Intermediate values compared. In this case too, the program is terminated if the specified intermediate value has been exceeded.
  • Figure 1 Sequence diagram for the check by means of a checksum
  • Figure 2 Sequence for checking using the return address table
  • Figure 3 Sequence for checking using the timer.
  • FIG. 1 The sequence of a subroutine call, in particular a function call, is described in FIG. 1, the functional steps 1 to 3 relating to the program to be called and the functional steps 4 to 8 relating to the evaluation of the subroutine.
  • step 2 the parameters necessary for the execution of the subroutine are first provided in step 1.
  • step 2 a checksum is formed for these parameters, which in the simple case can consist of a parity check.
  • CRC Cyclical Redundancy Check
  • EDC Electronic Datagram Protocol
  • the checksum (checksum) determined in this way is written into a memory area provided for this purpose.
  • This memory area can be volatile memory (RAM) or non-volatile, rewritable memory (e.g. EEPROM).
  • Step 4 represents the start of the execution. of the subroutine.
  • checksum 2 is first formed using the parameters passed. This checksum is formed using the same method with which checksum 1 was determined in the calling program.
  • step 6 the checksums PS1 and PS2 are checked for equality. If it is determined in step 6 that the two checksums are not the same, it can be assumed that an error has occurred during the transfer of the program parameters, which can be an indication of an intended fault with the aim of determining secret data. As a measure, the program can be ended in step 7 or corresponding alternative measures are taken, for example an error message to the main program.
  • step 6 If it is determined in step 6 that the checksums PS1 and PS2 are the same, the actual function execution is started.
  • FIG. 2 shows a possibility of saving the program by checking the return addresses.
  • Return addresses are placed on the stack by hardware when the function is called.
  • the information from the calling program eg return addresses
  • the return addresses are managed in a table 17 and when the subroutine is executed, the return addresses - insofar as they are stored in the RAM - are first checked for consistency in step 12, in order to check them in step 13 using table 17. If it was determined in step 14 that the returned return address is not present in the table, then step 15 the program ends, otherwise the function program is started in step 16.
  • FIG. 3 shows an embodiment in which the correct program sequence or the undisturbed program sequence is checked using a timer.
  • a timer is started in step 22. This timer is designed to measure the time or to count the act cycles that are required for the execution of the subroutine.
  • the function of the subroutine is carried out with step 23 and after the function has ended, the timer is stopped in step 24.
  • step 25 it is checked whether the number of clock cycles that were required for the execution of the function program corresponds to the predetermined number of clock cycles. In the event that there is no match, the program is ended with step 26. In the other case, the program execution is continued in step 27, for example by jumping back to the main program.
  • FIG. 3 shows that the timer is stopped and checked after the function or the function program has ended.
  • safety can be increased by providing certain points in the function program where the timer is also checked. This can be used to prevent the function program from being largely executed despite an error or attack.
  • the timer value is continuously compared with a limit value after the start and the program is terminated if this limit value has been reached or exceeded.
  • the individual exemplary embodiments according to FIGS. 1 to 3 were shown as independent, alternative measures. Security can be increased by combining the exemplary embodiments. The greatest security is provided by the parallel check using a checksum, return address check and timer check.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Detection And Correction Of Errors (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)
PCT/EP2000/009131 1999-09-20 2000-09-18 Verfahren zur sicherung eines programmablaufs Ceased WO2001022223A1 (de)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2001525524A JP4732651B2 (ja) 1999-09-20 2000-09-18 プログラム実行を保護するための方法
US10/070,444 US6934887B1 (en) 1999-09-20 2000-09-18 Method for protecting a program flow
EP00960677.3A EP1224546B1 (de) 1999-09-20 2000-09-18 Verfahren zur sicherung eines programmablaufs
AU72884/00A AU7288400A (en) 1999-09-20 2000-09-18 Method for protecting a program flow

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19944991.0 1999-09-20
DE19944991A DE19944991B4 (de) 1999-09-20 1999-09-20 Verfahren zur Sicherung eines Programmablaufs

Publications (1)

Publication Number Publication Date
WO2001022223A1 true WO2001022223A1 (de) 2001-03-29

Family

ID=7922630

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2000/009131 Ceased WO2001022223A1 (de) 1999-09-20 2000-09-18 Verfahren zur sicherung eines programmablaufs

Country Status (8)

Country Link
US (1) US6934887B1 (enExample)
EP (1) EP1224546B1 (enExample)
JP (1) JP4732651B2 (enExample)
CN (1) CN1144126C (enExample)
AU (1) AU7288400A (enExample)
DE (1) DE19944991B4 (enExample)
RU (1) RU2254608C2 (enExample)
WO (1) WO2001022223A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1739519A1 (en) * 2005-06-30 2007-01-03 Axalto SA Method to secure the execution of a program against attacks by radiation or other
FR2910144A1 (fr) * 2006-12-18 2008-06-20 St Microelectronics Sa Procede et dispositif de detection errones au cours de l'execution d'un programme.

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002340566A1 (en) 2001-10-17 2003-04-28 Infineon Technologies Ag Method and device for guaranteeing a calculation in a cryptographic algorithm
EP1454260B1 (de) 2001-10-17 2005-06-01 Infineon Technologies AG Verfahren und vorrichtung zum absichern einer exponentiations-berechnung mittels dem chinesischen restsatz (crt)
AU2003271594A1 (en) * 2002-09-11 2004-04-23 Giesecke And Devrient Gmbh Protected cryptographic calculation
FR2857473B1 (fr) * 2003-07-11 2005-09-16 Oberthur Card Syst Sa Procede de securisation de l'execution d'un programme informatique, notamment dans une carte a microcircuit
DE102004021088A1 (de) * 2004-04-29 2005-11-17 Giesecke & Devrient Gmbh Verfahren zum Schützen von Daten eines Datenträgers gegen DFA-Angriffe
JP2006018765A (ja) * 2004-07-05 2006-01-19 Infocom Corp ソフトウエアの一時的な修正方法およびプログラム
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8887287B2 (en) * 2004-10-27 2014-11-11 Alcatel Lucent Method and apparatus for software integrity protection using timed executable agents
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
US8464348B2 (en) 2004-11-15 2013-06-11 Microsoft Corporation Isolated computing environment anchored into CPU and motherboard
US8176564B2 (en) 2004-11-15 2012-05-08 Microsoft Corporation Special PC mode entered upon detection of undesired state
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
US8353046B2 (en) 2005-06-08 2013-01-08 Microsoft Corporation System and method for delivery of a modular operating system
JP4844102B2 (ja) * 2005-11-30 2011-12-28 富士ゼロックス株式会社 サブプログラム及びそのサブプログラムを実行する情報処理装置
JP4783163B2 (ja) * 2006-01-19 2011-09-28 Okiセミコンダクタ株式会社 マイクロコントローラ
US8528108B2 (en) * 2006-10-06 2013-09-03 Agere Systems Llc Protecting secret information in a programmed electronic device
CN102183896B (zh) * 2010-12-07 2015-11-25 北京广利核系统工程有限公司 一种利用Matlab测试核电站保护逻辑的系统
FR2990533B1 (fr) * 2012-05-09 2015-02-13 Morpho Procede de suivi d'execution d'un logiciel et logiciel pour la mise en oeuvre du procede
DE102014018208A1 (de) * 2014-12-08 2016-06-09 Giesecke & Devrient Gmbh Verfahren zum Betreiben eines Sicherheitsmoduls
FR3030084B1 (fr) 2014-12-12 2018-02-09 Oberthur Technologies Procede d’execution d’un programme par un processeur et entite electronique comportant un tel processeur
RU2591020C1 (ru) * 2015-06-01 2016-07-10 Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" (Госкорпорация "Росатом") Способ контроля хода выполнения программы пользователя, исполняющейся на вычислительных узлах вычислительной системы
CN108351938B (zh) * 2015-10-29 2022-02-08 惠普发展公司,有限责任合伙企业 校验针对程序代码的一部分所计算的安全值的装置、系统和方法
FR3134907A1 (fr) 2022-04-26 2023-10-27 STMicroelectronics (Grand Ouest) SAS Procédé de surveillance d’une exécution d’une portion de code programme et système sur puce correspondant

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5651111A (en) * 1994-06-07 1997-07-22 Digital Equipment Corporation Method and apparatus for producing a software test system using complementary code to resolve external dependencies
US5715389A (en) * 1993-01-29 1998-02-03 Honda Giken Kogyo Kabushikikaisha On-line monitoring system for computer system
US5761414A (en) * 1995-12-06 1998-06-02 Mitsuba Corporation Method for detecting execution errors of a microprocessor
US5768591A (en) * 1995-09-08 1998-06-16 Iq Systems Method of de-bugging host-processor software in a distributed processing system having a host processor and at least one object oriented processor
US5909580A (en) * 1996-02-08 1999-06-01 Inprise Corporation Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtime

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SU1191912A1 (ru) * 1984-05-16 1985-11-15 Рыбинский Авиационный Технологический Институт Устройство дл контрол хода программ
DE3502387A1 (de) * 1985-01-25 1986-07-31 Klöckner-Moeller Elektrizitäts GmbH, 5300 Bonn Verfahren zur ueberwachung von mikroprozessorsystemen und speicherprogrammierbaren steuerungen
JPH04127340A (ja) * 1990-09-19 1992-04-28 Canon Inc 電子機器
JPH0784786A (ja) * 1993-09-09 1995-03-31 Casio Comput Co Ltd プログラム実行制御方法
US5757914A (en) * 1995-10-26 1998-05-26 Sun Microsystems, Inc. System and method for protecting use of dynamically linked executable modules
JP3683031B2 (ja) * 1996-04-17 2005-08-17 株式会社リコー プログラム保護装置
DE19701166A1 (de) * 1997-01-15 1998-07-23 Siemens Ag Verfahren zur Überwachung der bestimmungsgemäßen Ausführung von Softwareprogrammen
JPH11215120A (ja) * 1998-01-27 1999-08-06 Fujitsu Ltd 通信装置
US6654954B1 (en) * 1998-02-17 2003-11-25 International Business Machines Corporation Computer system, program product and method utilizing executable file with alternate program code attached as a file attribute
US6314532B1 (en) * 1998-12-04 2001-11-06 Lucent Technologies Inc. Method and system for recovering from a software failure
US6766458B1 (en) * 2000-10-03 2004-07-20 Networks Associates Technology, Inc. Testing a computer system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5715389A (en) * 1993-01-29 1998-02-03 Honda Giken Kogyo Kabushikikaisha On-line monitoring system for computer system
US5651111A (en) * 1994-06-07 1997-07-22 Digital Equipment Corporation Method and apparatus for producing a software test system using complementary code to resolve external dependencies
US5768591A (en) * 1995-09-08 1998-06-16 Iq Systems Method of de-bugging host-processor software in a distributed processing system having a host processor and at least one object oriented processor
US5761414A (en) * 1995-12-06 1998-06-02 Mitsuba Corporation Method for detecting execution errors of a microprocessor
US5909580A (en) * 1996-02-08 1999-06-01 Inprise Corporation Development system and methods with direct compiler support for detecting invalid use and management of resources and memory at runtime

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1739519A1 (en) * 2005-06-30 2007-01-03 Axalto SA Method to secure the execution of a program against attacks by radiation or other
FR2910144A1 (fr) * 2006-12-18 2008-06-20 St Microelectronics Sa Procede et dispositif de detection errones au cours de l'execution d'un programme.
WO2008075166A1 (fr) * 2006-12-18 2008-06-26 Stmicroelectronics Sa Procede et dispositif de detection de sauts errones au cours de l'execution d'un programme
US8495734B2 (en) 2006-12-18 2013-07-23 Stmicroelectronics Sa Method and device for detecting an erroneous jump during program execution

Also Published As

Publication number Publication date
RU2254608C2 (ru) 2005-06-20
DE19944991B4 (de) 2004-04-29
DE19944991A1 (de) 2001-04-12
CN1144126C (zh) 2004-03-31
AU7288400A (en) 2001-04-24
JP4732651B2 (ja) 2011-07-27
EP1224546A1 (de) 2002-07-24
US6934887B1 (en) 2005-08-23
EP1224546B1 (de) 2015-09-02
JP2003510684A (ja) 2003-03-18
CN1375084A (zh) 2002-10-16

Similar Documents

Publication Publication Date Title
EP1224546A1 (de) Verfahren zur sicherung eines programmablaufs
EP0951673B1 (de) Verfahren zur überwachung der vorgeschriebenen ausführung von softwareprogrammen
DE60001393T2 (de) Verfahren zur überwachung des programmablaufs
EP2188755B1 (de) Verfahren und vorrichtung zur sicherung eines programms gegen eine kontrollflussmanipulation und gegen einen fehlerhaften programmablauf
EP0011685B1 (de) Programmierbare Speicherschutzeinrichtung für Mikroprozessorsysteme und Schaltungsanordnung mit einer derartigen Einrichtung
EP0915435B1 (de) Verfahren zum gesicherten Speichern von veränderlichen Daten
EP2447843B1 (de) Verfahren zur Verifizierung eines Anwendungsprogramms einer fehlersicheren Speicherprogrammierbaren Steuerung, und Speicherprogrammierbare Steuerung zur Ausführung des Verfahrens
EP1449084B1 (de) Kontrollierte programmausführung durch einen tragbaren datenträger
EP1190319B1 (de) Sicherung eines rechnerkerns gegen äussere manipulationen
EP2085883A1 (de) Verfahren zur Behandlung von transienten Fehlern in Echtzeitsystemen, insbesondere in Steuergeräten von Kraftfahrzeugen
WO2021233696A1 (de) Verfahren zur sicheren nutzung von kryptografischem material
EP1664978B1 (de) Vorrichtung und verfahren zur sicheren ausführung eines programmes
EP4181000A1 (de) Verfahren und rechenumgebung zum erstellen und anwenden eines prüfalgorithmus für rechenvorgänge
EP0834175B1 (de) Verfahren zum betreiben eines steuergerätes mit einer programmierbaren speichereinrichtung
EP1293858B1 (de) Verfahren zum Schutz eines Mikrorechner-Systems gegen Manipulation seines Programms
DE102015005071A1 (de) System und Verfahren zur Überwachung der Integrität einer von einem Serversystem an ein Clientsystem ausgelieferten Komponente
DE602004001293T2 (de) Programmintegritätsprüfung mittels Statistiken
EP1804144A1 (de) Überprüfung des Steuerprogramms eines Steuergerätes für eine Maschine
DE10148157B4 (de) Programmgesteuerte Einheit
DE10215626B4 (de) Verfahren zur Änderung von Verschlüsselungsalgorithmen bei geschützter Software oder geschützten Daten
EP1283467A2 (de) Überprüfung von Daten eines Systems mit einer programmgesteuerten Einheit
DE10110050A1 (de) Verfahren zur Absicherung sicherheitskritischer Programmteile vor versehentlicher Ausführung und eine Speichereinrichtung zur Durchführung dieses Verfahrens
DE102005008716A1 (de) Verfahren zur Datensicherung und Gerät zu dessen Ausführung
DE102004047191A1 (de) Manipulationsgeschütztes Mikroprozessorsystem und Betriebsverfahren dafür
EP0977160A1 (de) Verfahren und Datenverarbeitungsanordnung zum gesicherten Ausführen von Befehlen

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2001 525524

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 008131139

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2000960677

Country of ref document: EP

ENP Entry into the national phase

Ref country code: RU

Ref document number: 2002 2002109465

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 10070444

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 2000960677

Country of ref document: EP