AU6840998A - Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same - Google Patents
Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing sameInfo
- Publication number
- AU6840998A AU6840998A AU68409/98A AU6840998A AU6840998A AU 6840998 A AU6840998 A AU 6840998A AU 68409/98 A AU68409/98 A AU 68409/98A AU 6840998 A AU6840998 A AU 6840998A AU 6840998 A AU6840998 A AU 6840998A
- Authority
- AU
- Australia
- Prior art keywords
- terminal
- monitoring
- application
- applications
- applications loaded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Communication Control (AREA)
- Exchange Systems With Centralized Control (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Heterocyclic Carbon Compounds Containing A Hetero Ring Having Oxygen Or Sulfur (AREA)
- Telephone Function (AREA)
- Maintenance And Management Of Digital Transmission (AREA)
- Connector Housings Or Holding Contact Members (AREA)
Abstract
The invention concerns a method for monitoring the secure segmentation of applications loaded in a multi-application terminal, said applications having a predetermined structure. The method consists in the following steps: providing the terminal with a security module comprising a non-volatile storage; loading said security module storage unit with an image of the structure of each application in terms of programme or data; previous to the execution of at least one of said applications, comparing its structure with its image contained in the security module; validating the start of the execution of the application in case of adequacy and launching it. The terminal comprises a programme implementing this method.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9703584A FR2760865B1 (en) | 1997-03-13 | 1997-03-13 | METHOD FOR CONTROLLING THE SEALING OF APPLICATIONS LOADED IN A MULTI-APPLICATION TERMINAL AND TERMINAL FOR IMPLEMENTATION |
FR9703584 | 1997-03-13 | ||
PCT/FR1998/000472 WO1998040812A1 (en) | 1997-03-13 | 1998-03-10 | Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same |
Publications (1)
Publication Number | Publication Date |
---|---|
AU6840998A true AU6840998A (en) | 1998-09-29 |
Family
ID=9505133
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU68409/98A Abandoned AU6840998A (en) | 1997-03-13 | 1998-03-10 | Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same |
Country Status (9)
Country | Link |
---|---|
EP (1) | EP0968462B1 (en) |
JP (1) | JP2001516476A (en) |
AT (1) | ATE227444T1 (en) |
AU (1) | AU6840998A (en) |
CA (1) | CA2283158A1 (en) |
DE (1) | DE69809198T2 (en) |
ES (1) | ES2187015T3 (en) |
FR (1) | FR2760865B1 (en) |
WO (1) | WO1998040812A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002005511A1 (en) * | 2000-07-07 | 2002-01-17 | Alcatel | Security module |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5224160A (en) * | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
FR2638868B1 (en) * | 1988-11-09 | 1990-12-21 | Bull Cp8 | SECURE DOWNLOAD SYSTEM FOR A TERMINAL AND METHOD IMPLEMENTED |
EP0457940B1 (en) * | 1990-05-21 | 1996-01-03 | Hewlett-Packard GmbH | Activating circuit |
DE69521977T2 (en) * | 1994-12-13 | 2002-04-04 | International Business Machines Corp., Armonk | Process and system for secure program distribution |
PT870222E (en) * | 1995-08-21 | 2002-10-31 | Cornel Sirbu | DEVICE AND CONDITIONAL ACCESS PROCESS |
-
1997
- 1997-03-13 FR FR9703584A patent/FR2760865B1/en not_active Expired - Fee Related
-
1998
- 1998-03-10 DE DE69809198T patent/DE69809198T2/en not_active Expired - Fee Related
- 1998-03-10 CA CA002283158A patent/CA2283158A1/en not_active Abandoned
- 1998-03-10 AT AT98913870T patent/ATE227444T1/en not_active IP Right Cessation
- 1998-03-10 EP EP98913870A patent/EP0968462B1/en not_active Expired - Lifetime
- 1998-03-10 ES ES98913870T patent/ES2187015T3/en not_active Expired - Lifetime
- 1998-03-10 AU AU68409/98A patent/AU6840998A/en not_active Abandoned
- 1998-03-10 JP JP53928898A patent/JP2001516476A/en active Pending
- 1998-03-10 WO PCT/FR1998/000472 patent/WO1998040812A1/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
EP0968462A1 (en) | 2000-01-05 |
CA2283158A1 (en) | 1998-09-17 |
ATE227444T1 (en) | 2002-11-15 |
DE69809198T2 (en) | 2003-07-24 |
DE69809198D1 (en) | 2002-12-12 |
EP0968462B1 (en) | 2002-11-06 |
WO1998040812A1 (en) | 1998-09-17 |
FR2760865A1 (en) | 1998-09-18 |
JP2001516476A (en) | 2001-09-25 |
ES2187015T3 (en) | 2003-05-16 |
FR2760865B1 (en) | 1999-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU4842897A (en) | A system and method for loading applications onto a smart card | |
CA2281576A1 (en) | Multi-application ic card system | |
DE69833022D1 (en) | LOADING APPLICATIONS INTO A DIGITAL DECODER | |
HK1042151A1 (en) | Method for loading applications in a multiapplication onplatform system equipped with data processing resources, corresponding executing system and method. | |
MY121756A (en) | External storage apparatus and data processing method | |
CA2074027A1 (en) | Method of setting up system configuration in data processing system, data processing system, and expansion unit for data processing system | |
WO2004010300A3 (en) | Method to secure the execution of a program against attacks | |
CA2450844A1 (en) | A method for securing an electronic device, a security system and an electronic device | |
WO1998052158A3 (en) | Integrated circuit card with application history list | |
EP1150300A3 (en) | Semiconductor storage device, control device, and electronic apparatus | |
CA2458765A1 (en) | Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes | |
NO984535D0 (en) | Secure data loading in a smart card | |
GB2256345A (en) | Programming of installation data in a cellular radio telephone | |
IL132641A0 (en) | Dual smart card access control electronic data storage and retrieval system and methods | |
FR2809200A1 (en) | Method for making secure a 'smart card' instruction sequence for a data application system presented in the form of typed data recorded in a memory, the data application system uses a 'JAVA Language' virtual machine | |
WO1998000769A3 (en) | A method and apparatus for implementing check instructions that allow for the reuse of memory conflict information if no memory conflict occurs | |
EP0924553A3 (en) | Memory alternation system for camera and its control method | |
EP0814478A3 (en) | Multibank-multiport memories and systems and methods using the same | |
EP0657851A3 (en) | File management system for memory card. | |
WO2002027444A3 (en) | System and method for verifying the integrity of stored information within an electronic device | |
ES2113754T3 (en) | DATA TRANSMISSION SYSTEM WITH A TERMINAL AND A PORTABLE DATA SUPPORT PROVISION AND PROCEDURE FOR RECHARGING THE PORTABLE DATA SUPPORT PROVISION THROUGH THE TERMINAL. | |
CA2309778A1 (en) | Fully lazy linking | |
AU6840998A (en) | Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same | |
TW345639B (en) | Matrix interpolation | |
WO2000072112A3 (en) | Obfuscation of executable code |