Patent application number | Description | Published |
20100005256 | METHOD OF MANAGING A MEMORY INCLUDING ELEMENTS PROVIDED WITH IDENTITY INFORMATION INDICATIVE OF THE ANCESTRY OF SAID ELEMENTS - A method of managing a memory having stored elements that are organized in a hierarchy, each having a header containing individual identity information and a body containing data, the identity information of each element being encoded on a plurality of bits each of which can take a first value or a second value. The identity information of each element is obtained by repeating the identity information of an element constituting a direct antecedent of the element in question in the hierarchy, and in said identity information of the antecedent, by changing the value of a first value bit that follows the last second value bit in a direction for reading the identity information. | 01-07-2010 |
20100211727 | INTEGRATED CIRCUIT BOARD WITH SECURED INPUT/OUTPUT BUFFER - An integrated circuit card including a processor unit associated with RAM and with data exchange means for exchanging data with an external device, the RAM including a memory zone dedicated to exchanged data, and the processor unit being arranged to secure the dedicated memory zone and to store the exchanged data in said zone, and a method of managing the RAM of such a card. | 08-19-2010 |
20100287442 | Method for secure data transfer - A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has been copied from the source memory (NV_MEM) into a “destination” memory (V_MEM). The method consists in reading from the source memory (NV_MEM) an integrity value (PI_ELT_X) associated with an element (ELEMENT_X_NV_MEM) such as file containing the source data, in calculating the integrity of a reconstituted element made up of the transferred data (COPY_ELT_X_V_MEM) associated, where appropriate, with the data of the source element (ELEMENT_X_NV_MEM) other than the data that was transferred, and in deciding that the transferred data (COPY_ELT_X_V_MEM) is identical to the source data when the integrity calculation gives a value identical to the integrity value of the source element (PI_ELT_X). The method applies to transferring data between components of a smart card. | 11-11-2010 |
20110067104 | METHOD OF SECURING EXECUTION OF A PROGRAM - A method of securing execution of a main program that implements nested functions, the method comprising the steps of executing a security management program arranged to update a list of current functions, informing the security management program of the beginning of execution of each function of the main program and updating the list of current functions, informing the security management program of the end of execution of each function, and, after being informed of each end of execution of a function, verifying that the function is indeed the function that was begun the most recently. | 03-17-2011 |