WO2006090231A3 - Method to secure writing in memory against attacks by radiation or other - Google Patents
Method to secure writing in memory against attacks by radiation or other Download PDFInfo
- Publication number
- WO2006090231A3 WO2006090231A3 PCT/IB2006/000344 IB2006000344W WO2006090231A3 WO 2006090231 A3 WO2006090231 A3 WO 2006090231A3 IB 2006000344 W IB2006000344 W IB 2006000344W WO 2006090231 A3 WO2006090231 A3 WO 2006090231A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- radiation
- against attacks
- memory against
- secure writing
- secure
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The method according to this invention concerns a method to secure an electronic assembly including processing means and storage means (7, 11) containing a program to be executed. The method consists in associating with at least one data item stored in said means (7,11) at least one identification attribute used to classify said data item into a data family. This invention also concerns the electronic module in which said method is implemented and the card comprising said module.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05290446.3 | 2005-02-25 | ||
EP05290446A EP1698958A1 (en) | 2005-02-25 | 2005-02-25 | Method for securing the writing in memory against radiation attacks or other attacks |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006090231A2 WO2006090231A2 (en) | 2006-08-31 |
WO2006090231A3 true WO2006090231A3 (en) | 2007-04-12 |
Family
ID=34941969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2006/000344 WO2006090231A2 (en) | 2005-02-25 | 2006-02-21 | Method to secure writing in memory against attacks by radiation or other |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1698958A1 (en) |
WO (1) | WO2006090231A2 (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4184201A (en) * | 1978-04-26 | 1980-01-15 | Sperry Rand Corporation | Integrating processor element |
US4879645A (en) * | 1984-03-31 | 1989-11-07 | Kabushiki Kaisha Toshiba | Data processing device with high security of stored programs |
US4962533A (en) * | 1989-02-17 | 1990-10-09 | Texas Instrument Incorporated | Data protection for computer systems |
EP0407060A2 (en) * | 1989-06-30 | 1991-01-09 | Novell, Inc. | Method of providing mandatory secrecy and integrity file security in a computer system |
DE10113828A1 (en) * | 2001-03-21 | 2002-09-26 | Infineon Technologies Ag | Processor for secure data and command processing investigates called up command security marker and carries out called up command on called up data if marker has defined value |
US6490720B1 (en) * | 2001-05-11 | 2002-12-03 | Sospita As | Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications |
EP1262857A2 (en) * | 2001-05-15 | 2002-12-04 | Fujitsu Limited | Information processing apparatus and method of controlling an access level |
WO2003048908A2 (en) * | 2001-12-03 | 2003-06-12 | Advanced Micro Devices, Inc. | Method and apparatus for restricted execution of security sensitive instructions |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2757972B1 (en) * | 1996-12-31 | 1999-02-19 | Bull Cp8 | METHOD FOR SECURING A SECURITY MODULE, AND RELATED SECURITY MODULE |
FR2849230B1 (en) * | 2002-12-24 | 2005-04-22 | Francois Bangui | METHOD AND APPARATUS FOR VERIFYING THE INTEGRITY OF A SOFTWARE APPLICATION WITHOUT AN ENCRYPTION / DECRYMENT KEY |
-
2005
- 2005-02-25 EP EP05290446A patent/EP1698958A1/en not_active Withdrawn
-
2006
- 2006-02-21 WO PCT/IB2006/000344 patent/WO2006090231A2/en not_active Application Discontinuation
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4184201A (en) * | 1978-04-26 | 1980-01-15 | Sperry Rand Corporation | Integrating processor element |
US4879645A (en) * | 1984-03-31 | 1989-11-07 | Kabushiki Kaisha Toshiba | Data processing device with high security of stored programs |
US4962533A (en) * | 1989-02-17 | 1990-10-09 | Texas Instrument Incorporated | Data protection for computer systems |
EP0407060A2 (en) * | 1989-06-30 | 1991-01-09 | Novell, Inc. | Method of providing mandatory secrecy and integrity file security in a computer system |
DE10113828A1 (en) * | 2001-03-21 | 2002-09-26 | Infineon Technologies Ag | Processor for secure data and command processing investigates called up command security marker and carries out called up command on called up data if marker has defined value |
US6490720B1 (en) * | 2001-05-11 | 2002-12-03 | Sospita As | Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications |
EP1262857A2 (en) * | 2001-05-15 | 2002-12-04 | Fujitsu Limited | Information processing apparatus and method of controlling an access level |
WO2003048908A2 (en) * | 2001-12-03 | 2003-06-12 | Advanced Micro Devices, Inc. | Method and apparatus for restricted execution of security sensitive instructions |
Also Published As
Publication number | Publication date |
---|---|
WO2006090231A2 (en) | 2006-08-31 |
EP1698958A1 (en) | 2006-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006104587A3 (en) | Interfering smart shelf | |
US9342774B1 (en) | Smart card with a fingerprint identifying module | |
WO2007062254A3 (en) | Systems and methods for data management | |
WO2006077443A3 (en) | Computer protection against malware affection | |
WO2006130208A3 (en) | Translation information retrieval | |
WO2006090172A3 (en) | Identification systems | |
TWI266223B (en) | Interfacing with ink | |
JP2005293589A5 (en) | ||
WO2005029369A3 (en) | Data profiling | |
WO2004010300A3 (en) | Method to secure the execution of a program against attacks | |
WO2009028018A1 (en) | Authentication information managing unit, authentication information managing program and method thereof, authentication unit, and authentication program and method thereof | |
GB2437588A (en) | Devices and methods for tracking,locating and providing protection to individuals | |
WO2008009018A3 (en) | Spreadsheet-based relational database interface | |
EP1363232A3 (en) | Entry and editing of electronic ink | |
WO2007035424A3 (en) | Bio-conversion system for banking and merchant markets | |
MY170629A (en) | Improvements in resisting the spread of unwanted code and data | |
WO2006020713A3 (en) | Automated derivative view rendering system | |
TW200712891A (en) | Hardware oriented host-side native command queuing tag management | |
WO2010024991A3 (en) | Tagging images with labels | |
EP2386427A3 (en) | An authentication document, a method of manufacturing and a method of using same | |
WO2006110653A3 (en) | Authentication of merchandise units | |
WO2008055267A3 (en) | Antenna using optical recording media | |
EP1859390A4 (en) | Tag anti-collision rfid system and method for tag identification | |
SG160268A1 (en) | Portable electronic device and data processing method in portable electronic device | |
WO2003084326A3 (en) | Data medium having biocidal properties and method for making same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06710417 Country of ref document: EP Kind code of ref document: A2 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 6710417 Country of ref document: EP |