WO2009074686A2 - Copy-protected software cartridge - Google Patents

Copy-protected software cartridge Download PDF

Info

Publication number
WO2009074686A2
WO2009074686A2 PCT/EP2008/067467 EP2008067467W WO2009074686A2 WO 2009074686 A2 WO2009074686 A2 WO 2009074686A2 EP 2008067467 W EP2008067467 W EP 2008067467W WO 2009074686 A2 WO2009074686 A2 WO 2009074686A2
Authority
WO
WIPO (PCT)
Prior art keywords
memory
processor
address
cartridge
dispatcher
Prior art date
Application number
PCT/EP2008/067467
Other languages
French (fr)
Other versions
WO2009074686A3 (en
Inventor
Eric Diehl
Marc Eluard
Nicolas Prigent
Original Assignee
Thomson Licensing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP08300050A external-priority patent/EP2083355A1/en
Application filed by Thomson Licensing filed Critical Thomson Licensing
Priority to US12/735,005 priority Critical patent/US20100274948A1/en
Priority to CN2008801199195A priority patent/CN101896885B/en
Priority to JP2010537468A priority patent/JP5324599B2/en
Priority to EP08859306A priority patent/EP2243079A2/en
Publication of WO2009074686A2 publication Critical patent/WO2009074686A2/en
Publication of WO2009074686A3 publication Critical patent/WO2009074686A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • European patent application EP 07300965 teaches a system for protection of pre-recorded media.
  • the media is associated with a secure processor that stores information and software that a player needs in order to fully access the content. Whenever the player needs this information or the result of the software, it contacts the secure processor and waits for the response.
  • a disadvantage with this solution is that players that are not adapted to interact with the secure processor are unable to use the content.
  • the first memory is a Read-Only Memory.
  • the dispatcher further comprises a buffer adapted for use in communication with the processor.
  • the console further comprises read-only memory (ROM) 1 1 storing at least one application, firmware, and middleware; random access memory (RAM) 12 storing temporary data and a game application 3 loaded from the cartridge 2; a user interface 13 for interaction with one or more users through e.g. screen and loudspeakers, and key, buttons, and touch screens.
  • the processor 10 is adapted to execute the at least one application in the ROM and the game application 3 stored in the RAM 12.
  • the console 1 When the cartridge 2 is inserted (or otherwise put in contact with) the console 1 that is switched on, the console 1 initiates the game application 3 by loading a predetermined section (at address 0x00000) of the application stored in the ROM 21.
  • the game application 3 executes on the processor 10, it may interact with the dispatcher 23 to read/write information from/to the non-volatile memory 22; request the protection processor 20 to execute functions and, if applicable, to return the result of the executed function; and read further sections of the application from the ROM 21.
  • “virtual" NVM_ADDRESS_START may correspond to physical address 0x000000 of the non-volatile memory. However, it will be understood that it may also be converted into a logical memory address. Furthermore, it is possible to have addresses that are not used. If the dispatcher 23 receives such an address, it is preferred to have a predefined behaviour, such as returning random or garbage data, or to request the protection processor 20 to lock.

Abstract

A cartridge (2) preferably for use with a game console (1). The cartridge (2) comprises a ROM (21), a non-volatile memory (22), a processor (20) and a dispatcher (23). An application (3) running on the console (1 ) may communicate with the dispatcher (23) using predefined addresses, which enables the dispatcher (23) to access the ROM (21), the non-volatile memory (22), or the processor (20), as the case may be. The invention improves on the prior art copy protection as no generic copy method may be found if the addresses are changed from one cartridge to another. In addition, to copy the software, the processor (20) must be emulated.

Description

COPY-PROTECTED SOFTWARE CARTRIDGE
FIELD OF THE INVENTION
The present invention relates generally to computer software, and in particular to copy protection for software on cartridges.
BACKGROUND OF THE INVENTION
This section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present invention that are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present invention. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
Computer programs, and in particular computer games (which will hereinafter be used as a non-limitative example), have long been stored on so called cartridges for ease of use, other advantages being instant access to the software and the robustness of the package. Such cartridges typically comprise an interface for interaction with a console, a ROM that stores the software application, and a further memory, preferably non-volatile, for storing game parameters.
However, software on these cartridges is almost as vulnerable to copying as 'normal' software. Naturally, software providers have come up with defences against copying, such as the use of dedicated interfaces and chipsets, and encryption of the software application. Unfortunately, hackers have been able to crack the prior art defences and practically all current programs may be found on the Internet, e.g. on sites dedicated to hacking.
European patent application EP 07300965 teaches a system for protection of pre-recorded media. The media is associated with a secure processor that stores information and software that a player needs in order to fully access the content. Whenever the player needs this information or the result of the software, it contacts the secure processor and waits for the response. A disadvantage with this solution is that players that are not adapted to interact with the secure processor are unable to use the content.
It can therefore be appreciated that there is a need for a solution that improves copy protection of software on cartridges, preferably enabling the continued use of existing consoles. This invention provides such a solution.
SUMMARY OF THE INVENTION
In a first aspect, the invention is directed to a cartridge adapted for use with a console. The cartridge comprises an interface unit for communication with the console, a first memory adapted to store at least parts of an application, and a processor adapted to execute at least one function. The cartridge further comprises a dispatcher adapted to receive, from the interface unit, data originating from the console executing the application. The data comprises an address in a memory space comprising at least two blocks of addresses, each block being uniquely associated with one of the first memory and the processor. When the received address is in a block associated with the first memory, the dispatcher converts the received address to a physical address of the first memory and communicates with the physical address of the first memory. When the received address is in a block associated with the processor, the dispatcher converts the received address and sends the converted address to the processor.
In a first preferred embodiment, the first memory is a Read-Only Memory.
In a second preferred embodiment, the cartridge further comprises a second memory adapted to store application parameters and the memory space comprises at least one further distinct block uniquely associated with the second memory. The dispatcher is further adapted to, when the address is in a block associated with the second memory, convert the address to a physical address of the second memory and communicate with the physical address of the second memory. It is advantageous that the second memory is a non-volatile memory.
In a third preferred embodiment, the processor is further adapted to return a value to the dispatcher and the dispatcher is adapted to return the value to the application.
In a fourth preferred embodiment, the processor is a secure processor.
In a fifth preferred embodiment, the dispatcher further comprises a buffer adapted for use in communication with the processor.
In a sixth preferred embodiment, the dispatcher is adapted to return random data if the received address does not correspond to a valid address of the first memory or of the processor.
In a seventh preferred embodiment, the dispatcher is adapted to request the processor to lock if the received address does not correspond to the first memory or the processor.
In a second aspect, the invention is directed to a method for executing an application on a console that interacts with a cartridge. The application being executed by a processor of the console sends data comprising at least an address to the cartridge, the address being in a memory space comprising at least two blocks of addresses, each block being uniquely associated with one of a first memory and a processor of the cartridge. A dispatcher in the cartridge receives the data and, when the received address is in a block associated with the first memory converts the received address to a physical address of the first memory and communicates with the physical address of the first memory. When the received address is in a block associated with the processor, the dispatcher converts the received address and sends the converted address to the processor. BRIEF DESCRIPTION OF THE DRAWINGS
Preferred features of the present invention will now be described, by way of non-limiting example, with reference to the accompanying drawings, in which: Figure 1 illustrates a console with a cartridge according to a preferred embodiment of the invention; and
Figure 2 illustrates a virtual memory space according to a preferred embodiment of the invention.
PREFERRED EMBODIMENT OF THE INVENTION
Figure 1 illustrates a console 1 with a cartridge 2 according to a preferred embodiment of the invention. In the description, the term "console" is used to denote a device that is able to interact with a cartridge so as to execute an application stored on it, and the term "cartridge" is used to denote a physical object using solid state memory or other persistent memory to store the application.
The console comprises one or more processors (hereinafter "processor") 10 for execution of software applications and an interface unit 14, that implements a physical and logical interface, for interaction with the cartridge 2. The interface unit 14 may communicate through a typical address/data bidirectional bus or through calls to one or more functions.
The console further comprises read-only memory (ROM) 1 1 storing at least one application, firmware, and middleware; random access memory (RAM) 12 storing temporary data and a game application 3 loaded from the cartridge 2; a user interface 13 for interaction with one or more users through e.g. screen and loudspeakers, and key, buttons, and touch screens. The processor 10 is adapted to execute the at least one application in the ROM and the game application 3 stored in the RAM 12.
The interface unit 14 preferably detects the presence of the cartridge 2 automatically. Typically, when the cartridge 2 is not present, the bus is not powered, and no power is supplied. When the cartridge 2 is present in a powered on console, power is supplied to the cartridge 2, and the data bus is also powered.
The cartridge 2 comprises an interface unit 24 adapted to communicate with the interface unit 14 of the console 1. The cartridge further comprises a ROM 21 that stores the game application at a fixed address (such as OxOOOOO) and at least one non-volatile memory (hereinafter "non-volatile memory") 22 adapted to store e.g. game parameters such as the players current position in the game. The non-volatile memory 22 may for example be an Electrical Erasable PROgrammable Memory (EEPROM) or a Flash memory. The non- volatile memory 22 preferably starts at NVM ADDRESS START and ends at NVM ADDRESS END. The cartridge 2 also comprises a protection processor 20 (that preferably, but not necessarily, is a secure processor, and that may be implemented in more than one hardware component) adapted to execute one or more functions, and a dispatcher 23. The dispatcher 23 is preferably a dedicated chip with a communication link 25 with the protection processor 20.
The dispatcher 23 preferably functions as follows. If the address on the data bus of the interface unit 24 is in the range: NVM ADDRESS START to NVM ADDRESS END, then it correspondingly addresses the non-volatile memory 22; PROCESSOR_START to PROCESSOR_END, then it reads from or writes to an internal buffer 230, preferably by converting the received address and send this to the processor (note that the conversion function may be identity); PROCESSOR_WRITE, then it sends the content of its internal buffer 230 to the protection processor 20 through the communication link 25. When receiving data from the protection processor 20 through the communication link 25, it stores the data in the internal buffer 230 and sets an internal flag DATA_READY to 1. Furthermore, when the address on the data bus of the interface unit 24 is PROCESSOR_READ_FLAG, it returns DATA_READY to the console 1 and sets the flag DATA_READY to 0. In all other cases, the dispatcher 23 addresses the ROM 21. It will be appreciated that the address received by the dispatcher 23 also may be a parameter of a function or command, a further parameter identifying the destination device; the important thing is that the dispatcher receives address information that enables it to route the request correctly.
The protection processor 20, the ROM 21 , the non-volatile memory 22, the dispatcher 23, and the interface unit 24 may be implemented in a single chip, such as a system on chip (SOC) or as two or more separate circuits.
The game application 3 is a virtual entity used to clarify the invention. The game application may be said to be the software program from at least the ROM 21 (parts of the game application 3 may be received from other sources, such as e.g. over the Internet) as executed by the processor 10 and, when appropriate, software stored and executed by the protection processor 20, as will be further described hereinafter. The game application 3 may further be said to be aware of the internal organization of the cartridge 2. When it is executed by the processor 10, it may communicate, via the interface units 14 and 24, with the dispatcher 23 in order to perform at least one action, such as: read data from the ROM 21 ; read data from or write data in the non-volatile memory 22; and request that the protection processor 20 execute a function and return the result.
A simplified description of the behaviour of the system will now be used in order to further describe the invention. When the cartridge 2 is inserted (or otherwise put in contact with) the console 1 that is switched on, the console 1 initiates the game application 3 by loading a predetermined section (at address 0x00000) of the application stored in the ROM 21. Once the game application 3 executes on the processor 10, it may interact with the dispatcher 23 to read/write information from/to the non-volatile memory 22; request the protection processor 20 to execute functions and, if applicable, to return the result of the executed function; and read further sections of the application from the ROM 21. The functions executed by the secure processor 20 may use one or more parameters provided in the request, but it is also possible that the function uses one or more parameters read from a memory 21 , 22 of the cartridge. It is furthermore possible that the secure processor 20 outputs a result to the non-volatile memory 22. The game application 3 is preferably designed so that it cannot operate without the presence of the protection processor 20, but it is also possible for the application to operate in an inferior mode.
During initiation, the game application 3 may thus retrieve the data stored in the non-volatile memory 22 by reading the data stored from NVM ADDRESS START and NVM ADDRESS END. During the execution and/or at the end, the game application 3 may update this data by storing it in the non-volatile memory 22, if necessary modifying NVM ADDRESS START and/or NVM ADDRESS END.
The game application 3 may also instruct the protection processor 20 to execute a function. This is done by first sending a command and control data to address space PROCESSOR_START to PROCESSOR_END. The game application 3 then writes to address PROCESSOR_WRITE, regularly polls the address PROCESSOR_READ_FLAG and, when the returned value is 1 , reads the data in the address space PROCESSOR_START to PROCESSOR_END.
It may thus be said that the game application 3 "sees" a virtual, flat memory space, for example as illustrated in Figure 2. In the memory space, the first part (from the bottom) is for addressing the ROM 20, the next part is for addressing the protection processor 20 in different ways, the third part is also for addressing the ROM 21 , the fourth part for interacting with the non-volatile memory 22, and the fifth part also for addressing the ROM 21. It will be appreciated that Figure 2 illustrates one possibility of many, and that other uses of the address space is possible; indeed, it is encouraged to have different uses of the address space for different games. In the memory space, addresses for the memories are preferably converted to physical addresses of the same memories. For example, "virtual" NVM_ADDRESS_START may correspond to physical address 0x000000 of the non-volatile memory. However, it will be understood that it may also be converted into a logical memory address. Furthermore, it is possible to have addresses that are not used. If the dispatcher 23 receives such an address, it is preferred to have a predefined behaviour, such as returning random or garbage data, or to request the protection processor 20 to lock.
As already mentioned, it is preferred that the values of at least some of PROCESSOR_WRITE, PROCESSOR_READ_FLAG, PROCESSOR_START, PROCESSOR_END, NVM_ADDRESS_START, and NVM_ADDRESS_END are changed for each new game. This makes it impossible for hackers to build a simple generic backup system, as this will change between applications. In addition, hackers will have to emulate the behaviour of the protection processor 20 for each new cartridge.
An advantage of the invention is that it can enable old consoles to use new, protected cartridges without modification to the former, as the consoles need no knowledge of the architecture of a cartridge.
It will thus be appreciated that the present invention provides an improved software copy protection system. The skilled person will appreciate that while the description has used the non-limitative example of a game application, the invention may also be applied to any suitable kind of application, such as for example training applications or utility applications.
Each feature disclosed in the description and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination. Features described as being implemented in hardware may also be implemented in software, and vice versa. Connections may, where applicable, be implemented as wireless connections or wired, not necessarily direct or dedicated, connections. Only feature relevant to the invention have been described; features not necessary for the description of the invention have been left out intentionally to facilitate understanding.
Reference numerals appearing in the claims are by way of illustration only and shall have no limiting effect on the scope of the claims.

Claims

1. A cartridge (2) adapted for use with a console (1 ), the cartridge (2) comprising: an interface unit (24) for communication with the console (1 ); a first memory (21 ) adapted to store at least parts of an application (3); and a processor (20) adapted to execute at least one function; characterized in that the cartridge (2) further comprises: a dispatcher (23) adapted to: receive, from the interface unit (24), data originating from the console (1 ) executing the application (3), the data comprising an address in a memory space comprising at least two blocks of addresses, each block being uniquely associated with one of the first memory (21 ) and the processor (20); and when the received address is in a block associated with the first memory (21 ): convert the received address to a physical address of the first memory (21 ); and communicate with the physical address of the first memory (21 ); and when the received address is in a block associated with the processor (20): convert the received address; and send the converted address to the processor (20).
2. The cartridge as claimed in claim 1 , wherein the first memory (21 ) is a Read-Only Memory.
3. The cartridge as claimed in claim 1 , further comprising a second memory (22) adapted to store application parameters, wherein the memory space comprises at least one further distinct block uniquely associated with the second memory (22), and wherein the dispatcher (23) is further adapted to, when the address is in a block associated with the second memory (22), convert the address to a physical address of the second memory (22) and communicate with the physical address of the second memory (22).
4. The cartridge as claimed in claim 3, wherein the second memory (22) is a non-volatile memory.
5. The cartridge as claimed in claim 1 , wherein the processor (20) is further adapted to return a value to the dispatcher (23) and the dispatcher (23) is adapted to return the value to the application (3).
6. The cartridge as claimed in claim 1 , wherein the processor (20) is a secure processor.
7. The cartridge as claimed in claim 1 , wherein the dispatcher (23) further comprises a buffer (230) adapted for use in communication with the processor (21 ).
8. The cartridge as claimed in claim 1 , wherein the dispatcher (23) is adapted to return random data if the received address does not correspond to the first memory (21 ) or the processor (20).
9. The cartridge as claimed in claim 1 , wherein the dispatcher (23) is adapted to request the processor (20) to lock if the received address does not correspond to a valid address of the first memory (21 ) or of the processor (20).
10. A method for executing an application (3) on a console (1 ) that interacts with a cartridge (2) comprising the steps of: by the application (3) being executed by a processor (10) of the console (1 ), sending data comprising at least an address to the cartridge (2), the address being in a memory space comprising at least two blocks of addresses, each block being uniquely associated with one of a first memory (21 ) and a processor (20) of the cartridge (2); and by a dispatcher (23) in the cartridge (2): receiving the data; and when the received address is in a block associated with the first memory (21 ): converting the received address to a physical address of the first memory (21 ); and communicating with the physical address of the first memory (21 ); and when the received address is in a block associated with the processor (20): converting the received address; and sending the converted address to the processor (20).
PCT/EP2008/067467 2007-12-13 2008-12-12 Copy-protected software cartridge WO2009074686A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US12/735,005 US20100274948A1 (en) 2007-12-13 2008-12-12 Copy-protected software cartridge
CN2008801199195A CN101896885B (en) 2007-12-13 2008-12-12 Copy-protected software cartridge
JP2010537468A JP5324599B2 (en) 2007-12-13 2008-12-12 Copy-protected software cartridge
EP08859306A EP2243079A2 (en) 2007-12-13 2008-12-12 Copy-protected software cartridge

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP07301666.9 2007-12-13
EP07301666 2007-12-13
EP08300050.5 2008-01-25
EP08300050A EP2083355A1 (en) 2008-01-25 2008-01-25 Copy-protected software cartridge

Publications (2)

Publication Number Publication Date
WO2009074686A2 true WO2009074686A2 (en) 2009-06-18
WO2009074686A3 WO2009074686A3 (en) 2009-12-10

Family

ID=40755933

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2008/067467 WO2009074686A2 (en) 2007-12-13 2008-12-12 Copy-protected software cartridge

Country Status (5)

Country Link
US (1) US20100274948A1 (en)
EP (1) EP2243079A2 (en)
JP (1) JP5324599B2 (en)
CN (1) CN101896885B (en)
WO (1) WO2009074686A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2348454A1 (en) 2010-01-20 2011-07-27 Thomson Licensing A method of and a system for execution of a software application
EP2400420A1 (en) 2010-06-28 2011-12-28 Thomson Licensing Method, system and secure processor for executing a software application

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8599424B2 (en) * 2008-09-04 2013-12-03 Fb Sistemas S.A. Printer cartridge microchip

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995019608A1 (en) * 1994-01-14 1995-07-20 Cp8 Transac A secure application card for sharing application data and procedures among a plurality of microprocessors
DE19811646A1 (en) * 1998-03-18 1999-09-23 Kathrin Schier Multifunction chip card with control unit fitted with memory element and interface for data exchange
WO2001029791A1 (en) * 1999-10-21 2001-04-26 Tresor Tv Produktions Gmbh Improved chip card and method for interacting with same

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
FR2621409A1 (en) * 1987-10-02 1989-04-07 Thomson Semiconducteurs DEVICE FOR PROTECTING THE MEMORY ZONES OF AN ELECTRONIC MICROPROCESSOR SYSTEM
US5361341A (en) * 1987-10-02 1994-11-01 Sgs-Thomson Microelectronics, S.A. Device for enabling the use of the contents of memory areas of an electronic microprocessor system
US5666516A (en) * 1993-12-16 1997-09-09 International Business Machines Corporation Protected programmable memory cartridge having selective access circuitry
JPH07262000A (en) * 1994-03-18 1995-10-13 Nintendo Co Ltd Memory device and cartridge for game machine
JPH07325714A (en) * 1994-06-01 1995-12-12 Sega Enterp Ltd Data security system
JP4053245B2 (en) * 2001-02-05 2008-02-27 シャープ株式会社 Semiconductor memory device that can prevent unauthorized use
US7958374B2 (en) * 2002-03-19 2011-06-07 Shansun Technology Company Digital information protecting method and apparatus, and computer accessible recording medium
US20040015709A1 (en) * 2002-07-18 2004-01-22 Bei-Chuan Chen Software delivery device and method for providing software copy protection
SG130988A1 (en) * 2005-09-29 2007-04-26 Trek 2000 Int Ltd Portable data storage device incorporating multiple flash memory units

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995019608A1 (en) * 1994-01-14 1995-07-20 Cp8 Transac A secure application card for sharing application data and procedures among a plurality of microprocessors
DE19811646A1 (en) * 1998-03-18 1999-09-23 Kathrin Schier Multifunction chip card with control unit fitted with memory element and interface for data exchange
WO2001029791A1 (en) * 1999-10-21 2001-04-26 Tresor Tv Produktions Gmbh Improved chip card and method for interacting with same

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2348454A1 (en) 2010-01-20 2011-07-27 Thomson Licensing A method of and a system for execution of a software application
EP2357588A1 (en) 2010-01-20 2011-08-17 Thomson Licensing A method of execution of a software application and a storage device for storing the software application
EP2400420A1 (en) 2010-06-28 2011-12-28 Thomson Licensing Method, system and secure processor for executing a software application
EP2400422A1 (en) 2010-06-28 2011-12-28 Thomson Licensing Method, system and secure processor for executing a software application

Also Published As

Publication number Publication date
WO2009074686A3 (en) 2009-12-10
CN101896885A (en) 2010-11-24
EP2243079A2 (en) 2010-10-27
JP5324599B2 (en) 2013-10-23
CN101896885B (en) 2013-05-29
JP2011507086A (en) 2011-03-03
US20100274948A1 (en) 2010-10-28

Similar Documents

Publication Publication Date Title
JP3710671B2 (en) One-chip microcomputer, IC card using the same, and access control method for one-chip microcomputer
US8245000B2 (en) System and method for managing security of a memory device
EP1764721B1 (en) Apparatus and method for controlling access to an external memory
US7870378B2 (en) Electronic system with NAND flash memory storing boot code and highly reliable boot up method
EP2557498B1 (en) Updating method and computer system for hypervisor components
WO2012071852A1 (en) Method and apparatus for upgrading bootstrap program
US20100274948A1 (en) Copy-protected software cartridge
WO2016000166A1 (en) Data processing method and intelligent terminal
JP2017010347A (en) Information processing device
CA2702373C (en) Method of passing instructions between a host station and a portable electronic device, and device for implementation
JP4661574B2 (en) Embedded device, electronic device, embedded device control method, control program, and recording medium
US20070022222A1 (en) Memory device and associated method
EP2083355A1 (en) Copy-protected software cartridge
JP4840553B2 (en) Wireless communication apparatus, boot program rewriting method and program
CN101799858A (en) FLASH data protection method and device
AU2009209554B2 (en) Copy-protected software cartridge
US10877743B2 (en) Control apparatus for updating stored program and method for updating program stored in control apparatus
JP2010218103A (en) Electronic apparatus
KR19980087183A (en) Microcomputer
JP2008027331A (en) Firmware rewriting method
US20020157085A1 (en) Information processing apparatus
JP2015099517A (en) Vehicle control device
EP2098975A1 (en) Copy-protected software cartridge
TWI406175B (en) Memory card and method for memory card
JP4028679B2 (en) Volatile external storage device

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200880119919.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08859306

Country of ref document: EP

Kind code of ref document: A2

REEP Request for entry into the european phase

Ref document number: 2008859306

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2008859306

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2010537468

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 12735005

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE