WO2000072117A1 - Procede et dispositif de gestion d'un circuit electronique - Google Patents
Procede et dispositif de gestion d'un circuit electronique Download PDFInfo
- Publication number
- WO2000072117A1 WO2000072117A1 PCT/FR2000/001347 FR0001347W WO0072117A1 WO 2000072117 A1 WO2000072117 A1 WO 2000072117A1 FR 0001347 W FR0001347 W FR 0001347W WO 0072117 A1 WO0072117 A1 WO 0072117A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic circuit
- masking
- instruction
- memory
- variations
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C7/00—Arrangements for writing information into, or reading information out from, a digital store
- G11C7/24—Memory cell safety or protection circuits, e.g. arrangements for preventing inadvertent reading or writing; Status cells; Test cells
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Definitions
- the present invention relates to a method and a device for managing an electronic circuit, in particular a microcontroller, of the type comprising a memory for the permanent storage of confidential information.
- Figure 1 there is shown the diagram of the internal architecture of such an electronic circuit.
- a central processing unit CPU Central Processing Unit
- These peripheral organs include a first non-volatile memory ROM for the permanent storage of a management program, which is a read-only memory ("Read-Only-Memory").
- Non-volatile EEPROM memory for permanent storage of confidential information, which is an electrically programmable and erasable read-only memory ("Electricaly Erasable and Programmable Read-Only-Memory"). They also include a volatile memory RAM for the temporary storage of information related to the operation of the circuit, which is a random access memory ("Random Access Memory", in English). In general, they still include at least one Reg register for storing binary information.
- the invention applies in particular to a chip card microcontroller.
- the confidential information stored in the EEPROM memory is for example a personal code known only to the user. This personal code must be supplied by the user in order to use a device such as an ATM, a decoder for pay-TV, a portable telephone of the GSM type, etc., in combination with the smart card.
- the smart card is conventionally inserted into a smart card reader of the device.
- the smart card comprises contact pads cooperating with corresponding terminals of the reader for the exchange of information between the card and the reader, and for the electrical supply of the smart card using a source d power supply to the reader.
- the device includes a keyboard or similar device on which the user enters his personal code.
- the personal code entered by the user is transmitted to the microcontroller of the smart card which includes means for comparing it to the personal code stored in the EEPROM memory. In the event of a tie, access to the service delivered by the device is allowed to the user.
- a conventional fraud attempt consists in using a smart card stolen from a pirate smart card reader, comprising means for observing the data placed on the data bus DB. It is then theoretically possible to read confidential data corresponding to the personal code of the user on the data bus DB when these data are read from the EEPROM memory and are placed on the data bus DB. The only difficulty is for the fraudster to know at what precise moment these data are present on the data bus DB, in order to identify them in the stream of data which pass on this bus during the operation of the electronic circuit.
- the electric current consumed by the electronic circuit during operation is not constant but presents variations as a function, in particular, of the read operations carried out in the various memories of the electronic circuit. Indeed, the memory cells of the different memories have an impedance which, to a certain extent, depends on the programmed or erased state of the cell, but which, to a greater extent, is different from a type of memory to the 'other.
- a curve 21 thus represents the variations as a function of time of the electric current I consumed by the microcontroller in operation.
- This current can take different increasing values I (Reg), I (ROM), I (RAM), I (EEPROM) for read operations, respectively in the Reg register, the ROM memory, the RAM memory or the EEPROM memory.
- the fraudster to observe the instantaneous value of the electric current consumed by the microcontroller (by disposing of a suitable means, such as an ammeter in series between a terminal power supply of the reader provided for the power supply of the smart card and the corresponding contact pad of the latter) and to read the data present on the data bus DB at the moment when this current presents the value I (EEPROM ), to find out the confidential data read from the EEPROM memory.
- a suitable means such as an ammeter in series between a terminal power supply of the reader provided for the power supply of the smart card and the corresponding contact pad of the latter
- the curve of the current (constant, of Iconst value) consumed by the electronic circuit according to this prior art is represented by a curve 22, which corresponds substantially to a horizontal line.
- the weak undulations of curves 21 and 22 correspond to parasitic impedances in the electronic circuit.
- This known solution nevertheless has the drawback of increasing the consumption of the electronic circuit significantly. Indeed, the current consumed by the electronic circuit in operation is permanently equal to the Iconst value which is greater than the maximum value of the current consumed per se by the electronic circuit in operation. This high consumption gives rise to problems linked in particular to the rise in temperature by the Joule effect in the electronic circuit.
- the invention aims to overcome the aforementioned drawbacks of the electronic circuits of the prior art.
- the invention proposes a method for managing an electronic circuit, for example of the type comprising a memory for storing confidential information, characterized in that it comprises masking variations in the electric current consumed by the electronic circuit, for only a fraction of the time, and in any event during the portion or portions of the time during which an instruction relating to confidential data is executed.
- the method includes masking the variations of the current consumed by the electronic circuit during a portion of the time during which, among other things, a read instruction in memory is executed.
- the invention also provides an electronic circuit, in particular a microcontroller, for example of the type comprising a memory for storing confidential information, which comprises means for masking variations in the electric current consumed by the electric circuit in operation as well as means selective activation and deactivation of the masking means.
- a microcontroller for example of the type comprising a memory for storing confidential information, which comprises means for masking variations in the electric current consumed by the electric circuit in operation as well as means selective activation and deactivation of the masking means.
- selective is meant a deliberate activation and deactivation, that is to say provoked deliberately when they are necessary to obtain the desired technical effect, namely to mask the variations in the current consumed by the electronic circuit when an operation relating to confidential data is executed but do not permanently mask it so as not to excessively increase the average electrical consumption of the electronic circuit.
- the current consumed by the electronic circuit is only equal to a maximum constant value for a fraction of the time only, so that the overall consumption of the electronic circuit is reduced.
- an electronic circuit comprises a central processing unit CPU, a first non-volatile memory ROM (which is a read-only memory) for the permanent storage of a management program executable by the central processing unit CPU and a second non-volatile memory EEPROM (which is an electrically programmable and erasable read-only memory) for the permanent storage of confidential information. It also includes a volatile memory RAM (which is a random access memory) for the temporary storage of information related to the operation of the circuit. In addition, they still understand at minus a Reg register for storing binary information.
- the electronic circuit further comprises such a register, bearing the reference 10, which has a particular function according to the invention.
- the means for masking variations in the current consumed by the ROM, RAM and / or EEPROM memories are activated or deactivated.
- there is stored in the register 10 a determined logic value or the complementary logic value, to respectively activate or deactivate the means for masking the current consumed by the electronic circuit.
- Masking means are shown in Figure 4, with regard to the EEPROM memory. These masking means schematically comprise a current source ICI connected in series with the EEPROM memory by means of a switch SW, between a positive supply node receiving a positive supply potential Vcc on the one hand and the ground on the other hand.
- A the node between the switch SW and the EEPROM memory.
- a resistor RI is connected in parallel on the terminals of the EEPROM memory (between node A and ground).
- the node A In a first state of the switch SW, corresponding to the activation of the masking means, the node A is connected to the negative terminal of the current source ICI, so that the current Jl delivered by the source ICI flows through the EEPROM memory in the form of a current 13 on the one hand, and / or through the resistor RI in the form of a current II on the other hand.
- the sum 11 + 13 of the currents II and 13 is constant and is equal to the current J1, even when a read operation in the EEPROM memory is performed.
- the value of Ri must be between the minimum value and the maximum value of the impedance of the EEPROM memory, in order to play a role of compensating for variations in current 13 during the operation of the microcontroller.
- the value of Jl must be greater than the maximum value of the current 13 during the operation of the microcontroller (this maximum value is reached during an operation carried out in the EEPROM memory). In a borderline case, the current II may possibly be zero.
- the node A In a second state of the switch SW, corresponding to the deactivation of the masking means, the node A is connected directly to the pin receiving the supply potential Vcc, so that the source ICI does not debit any current in the EEPROM memory nor in the resistance RI (this source is switched off).
- a current 13 and / or a current II flow respectively through the EEPROM memory and / or the resistor RI directly from the supply terminal delivering the potential Vcc.
- Their values possibly very low, are a function of the impedance of the EEPROM memory with respect to RI.
- the sum 11 + 13 of currents II and 13 is not constant. In particular, it varies when a read operation in the EEPROM memory is performed. It can be very low, especially when no operation is carried out in the EEPROM memory. In any event, it is less than the value of the current J1 of the first case above, so that an economy is obtained of the current consumed by the microcontroller.
- the structure of the masking means shown in Figure 3 is purely schematic. Such means can be implemented concretely in any appropriate manner, in particular using circuitry based on transistors, for example MOS transistors.
- each memory of the microcontroller in this case the memories RAM, ROM and EEPROM, are provided with masking means as presented in FIG. 4.
- the state of the switch SW of these marking means is controlled by the logic value memorized by the register 10.
- the activation or deactivation of the means for masking the memories of the microcontroller is a function of the state of the register 10. We will now describe how this state is modified in order to activate or deactivate the masking means.
- FIG. 5 shows a sequence of instructions for a program for managing the microcontroller, which is stored in ROM memory. This program is written according to the application of the microcontroller and is stored in the ROM memory. In a manner known per se, the instructions contained in this program are executed sequentially during the operation of the microcontroller.
- the program comprises a sequence of instructions Inst lf ..., Inst n .
- a particular instruction, Inst ⁇ has the effect of writing a particular logic value into the register 10, for example the logic value 1, so that the switch SW is set to the first aforementioned state.
- Another instruction Instj subsequent to the instruction Inst- in the sequence has the function of writing the complementary logic value in the register 10, namely for example the logic value 0, so that the switch SW is set in the second aforementioned state.
- the Instj are inserted into the sequence of instructions of the management program so as to frame, among other things, a read instruction in the EEPROM memory.
- the confidential data read from the EEPROM memory pass over the data bus DB while the masking means J1, SW, R1 of the memories are activated.
- the masking means are activated by the instruction Inst- sufficiently early before the reading instruction, and are deactivated by the instruction Instj long enough after said reading instruction, so that the masking of the variations in the current consumed by the electronic circuit is efficient.
- the method according to the invention comprises masking the variations of the current consumed by the electronic circuit during a portion of the time during which, inter alia, a read instruction in the EEPROM memory is executed.
- the masking must be long enough so that the reading operation in the EEPROM memory is not easily detectable. It is obvious that if the means of masking were only activated during the read operation, the masking effect sought would not be obtained.
- the portion of the time during which the masking means are activated ie, the portion of the time between the instructions Inst ⁇ and Instj, is short enough for the saving of current consumed by the electronic circuit to be substantial. compared to the use of permanent masking means according to the prior art.
- a curve 61 represents, as a function of time, the electric current I consumed by the electronic circuit in operation according to the principle of the invention.
- the means for masking the memories of the microcontroller are activated at an instant t ⁇ and are deactivated at a later instant tj respectively by the execution of the instruction Inst ⁇ and by the execution of
- the value Iconst corresponds substantially to the sum of the currents Jl of the means for masking the memories ROM, RAM and EEPROM activated simultaneously between the instants t ⁇ and tj.
- the currents J1 do not necessarily have the same value for each of the ROM, RAM and EEPROM memories.
- masking means are provided for each of the memories of the microcontroller.
- masking means can be arranged elsewhere than in the memories.
- unique masking means arranged in this way are easier to thwart by a fraudster.
- the invention has been described above with regard to the masking of variations in the current consumed by the electronic circuit during the execution, inter alia, of a read instruction in a memory for storing confidential information. But, of course, it is not limited to this case. On the contrary, it applies to the masking of variations in the current consumed by the electronic circuit during the execution, inter alia, of any instruction relating to confidential data.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Power Sources (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00929632A EP1181631A1 (fr) | 1999-05-21 | 2000-05-18 | Procede et dispositif de gestion d'un circuit electronique |
JP2000620444A JP2003500721A (ja) | 1999-05-21 | 2000-05-18 | 電子回路の管理の方法と装置 |
US09/979,408 US7372965B1 (en) | 1999-05-21 | 2000-05-18 | Electric circuit management method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9906499A FR2793904B1 (fr) | 1999-05-21 | 1999-05-21 | Procede et dispositif de gestion d'un circuit electronique |
FR99/06499 | 1999-05-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000072117A1 true WO2000072117A1 (fr) | 2000-11-30 |
Family
ID=9545886
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2000/001347 WO2000072117A1 (fr) | 1999-05-21 | 2000-05-18 | Procede et dispositif de gestion d'un circuit electronique |
Country Status (5)
Country | Link |
---|---|
US (1) | US7372965B1 (fr) |
EP (1) | EP1181631A1 (fr) |
JP (1) | JP2003500721A (fr) |
FR (1) | FR2793904B1 (fr) |
WO (1) | WO2000072117A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1571529A3 (fr) * | 2004-03-04 | 2006-09-06 | Sony Corporation | Protection d'un circuit de traitement de données |
WO2006120310A1 (fr) * | 2005-05-09 | 2006-11-16 | Stmicroelectronics Sa | Dispositif de protection d'une memoire contre les attaques par injection d'erreur |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6594760B1 (en) | 1998-12-21 | 2003-07-15 | Pitney Bowes Inc. | System and method for suppressing conducted emissions by a cryptographic device |
US6766455B1 (en) | 1999-12-09 | 2004-07-20 | Pitney Bowes Inc. | System and method for preventing differential power analysis attacks (DPA) on a cryptographic device |
CA2327943C (fr) * | 1999-12-09 | 2005-09-20 | Pitney Bowes Inc. | Systeme et methode de suppression d'emissions par conduction produites par un dispositif de cryptographie comprenant un circuit integre |
JP3977592B2 (ja) | 2000-12-28 | 2007-09-19 | 株式会社東芝 | データ処理装置 |
FR2822988B1 (fr) * | 2001-04-02 | 2003-08-15 | Oberthur Card Syst Sa | Procede de protection d'une entite electronique a microcircuit et entite electronique dotee d'une telle protection |
EP1620829B1 (fr) * | 2003-04-22 | 2009-08-26 | Nxp B.V. | Dispositif de circuit electronique pour des applications cryptographiques |
WO2009074927A1 (fr) | 2007-12-13 | 2009-06-18 | Nxp B.V. | Circuit électronique et procédé de masquage d'exigences de courant d'un circuit électronique |
US20120124669A1 (en) * | 2010-11-12 | 2012-05-17 | International Business Machines Corporation | Hindering Side-Channel Attacks in Integrated Circuits |
FR3007857B1 (fr) * | 2013-06-26 | 2018-11-16 | Stmicroelectronics (Rousset) Sas | Regulateur pour circuit integre |
FR3042066B1 (fr) * | 2015-10-01 | 2017-10-27 | Stmicroelectronics Rousset | Procede de lissage d'un courant consomme par un circuit integre et dispositif correspondant |
FR3104751B1 (fr) | 2019-12-12 | 2021-11-26 | St Microelectronics Rousset | Procédé de lissage d’un courant consommé par un circuit intégré et dispositif correspondant |
FR3113777B1 (fr) | 2020-08-25 | 2024-12-13 | St Microelectronics Rousset | Alimentation de circuit électronique |
FR3113776A1 (fr) | 2020-08-25 | 2022-03-04 | Stmicroelectronics (Rousset) Sas | Alimentation de circuit électronique |
FR3132964B1 (fr) | 2022-02-23 | 2024-11-08 | St Microelectronics Rousset | Dispositif électronique comportant un module électronique et un circuit de compensation |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0368727A1 (fr) * | 1988-11-10 | 1990-05-16 | Sgs Thomson Microelectronics Sa | Dispositif de sécurité contre la détection non-autorisée de données protégées |
WO1997033217A1 (fr) * | 1996-03-07 | 1997-09-12 | Bull Cp8 | Circuit integre perfectionne et procede d'utilisation d'un tel circuit integre |
FR2757972A1 (fr) * | 1996-12-31 | 1998-07-03 | Bull Cp8 | Procede de securisation d'un module de securite, et module de securite associe |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2617976B1 (fr) * | 1987-07-10 | 1989-11-10 | Thomson Semiconducteurs | Detecteur electrique de niveau logique binaire |
FR2673295B1 (fr) * | 1991-02-21 | 1994-10-28 | Sgs Thomson Microelectronics Sa | Dispositif de detection de l'etat logique d'un composant dont l'impedance varie suivant cet etat. |
US5345112A (en) * | 1992-09-14 | 1994-09-06 | Cypress Semiconductor Corporation | Integrated circuit with programmable speed/power adjustment |
DE19505097C1 (de) * | 1995-02-15 | 1996-06-05 | Siemens Ag | Verschlüsselungsvorrichtung |
JP3294489B2 (ja) * | 1995-11-28 | 2002-06-24 | 沖電気工業株式会社 | 乱数発生回路 |
US6064740A (en) * | 1997-11-12 | 2000-05-16 | Curiger; Andreas | Method and apparatus for masking modulo exponentiation calculations in an integrated circuit |
DE69840782D1 (de) * | 1998-01-02 | 2009-06-04 | Cryptography Res Inc | Leckresistentes kryptographisches Verfahren und Vorrichtung |
FR2776410B1 (fr) * | 1998-03-20 | 2002-11-15 | Gemplus Card Int | Dispositifs pour masquer les operations effectuees dans une carte a microprocesseur |
EP2280502B1 (fr) * | 1998-06-03 | 2018-05-02 | Cryptography Research, Inc. | Utilisation d'informations imprévisibles pour résister à la découverte de secrets par surveillance externe |
DE19850721A1 (de) * | 1998-11-03 | 2000-05-18 | Koninkl Philips Electronics Nv | Datenträger mit Verschleierung des Stromverbrauchs |
US6594760B1 (en) * | 1998-12-21 | 2003-07-15 | Pitney Bowes Inc. | System and method for suppressing conducted emissions by a cryptographic device |
-
1999
- 1999-05-21 FR FR9906499A patent/FR2793904B1/fr not_active Expired - Fee Related
-
2000
- 2000-05-18 US US09/979,408 patent/US7372965B1/en not_active Expired - Fee Related
- 2000-05-18 EP EP00929632A patent/EP1181631A1/fr not_active Withdrawn
- 2000-05-18 WO PCT/FR2000/001347 patent/WO2000072117A1/fr not_active Application Discontinuation
- 2000-05-18 JP JP2000620444A patent/JP2003500721A/ja not_active Ceased
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0368727A1 (fr) * | 1988-11-10 | 1990-05-16 | Sgs Thomson Microelectronics Sa | Dispositif de sécurité contre la détection non-autorisée de données protégées |
WO1997033217A1 (fr) * | 1996-03-07 | 1997-09-12 | Bull Cp8 | Circuit integre perfectionne et procede d'utilisation d'un tel circuit integre |
FR2757972A1 (fr) * | 1996-12-31 | 1998-07-03 | Bull Cp8 | Procede de securisation d'un module de securite, et module de securite associe |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1571529A3 (fr) * | 2004-03-04 | 2006-09-06 | Sony Corporation | Protection d'un circuit de traitement de données |
US8687799B2 (en) | 2004-03-04 | 2014-04-01 | Sony Corporation | Data processing circuit and control method therefor |
WO2006120310A1 (fr) * | 2005-05-09 | 2006-11-16 | Stmicroelectronics Sa | Dispositif de protection d'une memoire contre les attaques par injection d'erreur |
US8045381B2 (en) | 2005-05-09 | 2011-10-25 | Stmicroelectronics Sa | Device for protecting a memory against attacks by error injection |
Also Published As
Publication number | Publication date |
---|---|
FR2793904A1 (fr) | 2000-11-24 |
EP1181631A1 (fr) | 2002-02-27 |
US7372965B1 (en) | 2008-05-13 |
JP2003500721A (ja) | 2003-01-07 |
FR2793904B1 (fr) | 2001-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2000072117A1 (fr) | Procede et dispositif de gestion d'un circuit electronique | |
EP0298848B1 (fr) | Détecteur électrique de niveau logique binaire | |
CA1060583A (fr) | Systeme pour memoriser des donnees dans un objet protatif independant | |
CA2212963C (fr) | Cadre de lecture pour appareil lecteur de carte a microcircuit | |
EP1293856A1 (fr) | Circuit Intégré sécurisé comprenant des parties à caractère confidentiel, et procédé pour sa mise en action | |
FR2697673A1 (fr) | Circuit à fusible, pour circuit intégré. | |
CA2257339C (fr) | Memoire remanente effacable et programmable electriquement, protegee contre les coupures d'alimentation | |
EP2285038B1 (fr) | Surveillance de l'activité d'un circuit électronique | |
WO2007009847A1 (fr) | Detection d'une faute par perturbation longue | |
EP1220101B1 (fr) | Procédé et dispositif de protection contre le piratage de circuits intégrés | |
FR2543726A1 (fr) | Cellule de memoire ram non volatile a transistors cmos a grille flottante commune | |
FR2670595A1 (fr) | Carte a circuit integre. | |
EP2333703B1 (fr) | Composant électronique apte à détecter des attaques actives | |
EP0965994A1 (fr) | Dispositif à circuit intégré sécurisé au moyen de lignes complémentaires de bus | |
EP0660331A1 (fr) | Circuit décodeur de ligne pour mémoire fonctionnant sous de faibles tensions d'alimentation | |
EP0703584B1 (fr) | Procédé de décodage d'addresse dans une mémoire en circuit intégré et circuit mémoire mettant en oeuvre le procédé | |
FR2471004A1 (fr) | Installation et dispositif de controle de l'acces a une memoire electronique | |
WO2006120310A1 (fr) | Dispositif de protection d'une memoire contre les attaques par injection d'erreur | |
EP0932112A1 (fr) | Lecteur de carte à puce muni d'un commutateur d'horloge | |
EP0851359B1 (fr) | Procédé et dispositif de lecture de mémoire ayant des zones protégées en lecture | |
EP1764804B1 (fr) | Circuit integré ayant une mémoire de données protegée contre l'effacement UV | |
EP0862182B1 (fr) | Procédé d'effacement d'une mémoire RAM statique et mémoire en circuit intégré associé | |
EP1862952A1 (fr) | Dispositif électronique sécurisé | |
FR2880217A1 (fr) | Montage a mode de securite et a mode d'economie d'energie. | |
CA2323712A1 (fr) | Procede de gestion securisee d'un compteur d'unites et module de securite mettant en oeuvre le procede |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2000929632 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2000 620444 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 2000929632 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09979408 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000929632 Country of ref document: EP |