[go: up one dir, main page]

AU6840998A - Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same - Google Patents

Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same

Info

Publication number
AU6840998A
AU6840998A AU68409/98A AU6840998A AU6840998A AU 6840998 A AU6840998 A AU 6840998A AU 68409/98 A AU68409/98 A AU 68409/98A AU 6840998 A AU6840998 A AU 6840998A AU 6840998 A AU6840998 A AU 6840998A
Authority
AU
Australia
Prior art keywords
terminal
monitoring
application
applications
applications loaded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU68409/98A
Inventor
Pierre Boces
Eric Laffont
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gemplus SA
Original Assignee
Gemplus SCA
Gemplus Card International SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus SCA, Gemplus Card International SA filed Critical Gemplus SCA
Publication of AU6840998A publication Critical patent/AU6840998A/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • G06F12/1425Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
    • G06F12/1441Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Communication Control (AREA)
  • Exchange Systems With Centralized Control (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Heterocyclic Carbon Compounds Containing A Hetero Ring Having Oxygen Or Sulfur (AREA)
  • Telephone Function (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)
  • Connector Housings Or Holding Contact Members (AREA)

Abstract

The invention concerns a method for monitoring the secure segmentation of applications loaded in a multi-application terminal, said applications having a predetermined structure. The method consists in the following steps: providing the terminal with a security module comprising a non-volatile storage; loading said security module storage unit with an image of the structure of each application in terms of programme or data; previous to the execution of at least one of said applications, comparing its structure with its image contained in the security module; validating the start of the execution of the application in case of adequacy and launching it. The terminal comprises a programme implementing this method.
AU68409/98A 1997-03-13 1998-03-10 Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same Abandoned AU6840998A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR9703584A FR2760865B1 (en) 1997-03-13 1997-03-13 METHOD FOR CONTROLLING THE SEALING OF APPLICATIONS LOADED IN A MULTI-APPLICATION TERMINAL AND TERMINAL FOR IMPLEMENTATION
FR9703584 1997-03-13
PCT/FR1998/000472 WO1998040812A1 (en) 1997-03-13 1998-03-10 Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same

Publications (1)

Publication Number Publication Date
AU6840998A true AU6840998A (en) 1998-09-29

Family

ID=9505133

Family Applications (1)

Application Number Title Priority Date Filing Date
AU68409/98A Abandoned AU6840998A (en) 1997-03-13 1998-03-10 Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same

Country Status (9)

Country Link
EP (1) EP0968462B1 (en)
JP (1) JP2001516476A (en)
AT (1) ATE227444T1 (en)
AU (1) AU6840998A (en)
CA (1) CA2283158A1 (en)
DE (1) DE69809198T2 (en)
ES (1) ES2187015T3 (en)
FR (1) FR2760865B1 (en)
WO (1) WO1998040812A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002005511A1 (en) * 2000-07-07 2002-01-17 Alcatel Security module

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5224160A (en) * 1987-02-23 1993-06-29 Siemens Nixdorf Informationssysteme Ag Process for securing and for checking the integrity of the secured programs
FR2638868B1 (en) * 1988-11-09 1990-12-21 Bull Cp8 SECURE DOWNLOAD SYSTEM FOR A TERMINAL AND METHOD IMPLEMENTED
EP0457940B1 (en) * 1990-05-21 1996-01-03 Hewlett-Packard GmbH Activating circuit
DE69521977T2 (en) * 1994-12-13 2002-04-04 International Business Machines Corp., Armonk Process and system for secure program distribution
PT870222E (en) * 1995-08-21 2002-10-31 Cornel Sirbu DEVICE AND CONDITIONAL ACCESS PROCESS

Also Published As

Publication number Publication date
EP0968462A1 (en) 2000-01-05
CA2283158A1 (en) 1998-09-17
ATE227444T1 (en) 2002-11-15
DE69809198T2 (en) 2003-07-24
DE69809198D1 (en) 2002-12-12
EP0968462B1 (en) 2002-11-06
WO1998040812A1 (en) 1998-09-17
FR2760865A1 (en) 1998-09-18
JP2001516476A (en) 2001-09-25
ES2187015T3 (en) 2003-05-16
FR2760865B1 (en) 1999-04-23

Similar Documents

Publication Publication Date Title
AU4842897A (en) A system and method for loading applications onto a smart card
CA2281576A1 (en) Multi-application ic card system
DE69833022D1 (en) LOADING APPLICATIONS INTO A DIGITAL DECODER
HK1042151A1 (en) Method for loading applications in a multiapplication onplatform system equipped with data processing resources, corresponding executing system and method.
MY121756A (en) External storage apparatus and data processing method
CA2074027A1 (en) Method of setting up system configuration in data processing system, data processing system, and expansion unit for data processing system
WO2004010300A3 (en) Method to secure the execution of a program against attacks
CA2450844A1 (en) A method for securing an electronic device, a security system and an electronic device
WO1998052158A3 (en) Integrated circuit card with application history list
EP1150300A3 (en) Semiconductor storage device, control device, and electronic apparatus
CA2458765A1 (en) Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes
NO984535D0 (en) Secure data loading in a smart card
GB2256345A (en) Programming of installation data in a cellular radio telephone
IL132641A0 (en) Dual smart card access control electronic data storage and retrieval system and methods
FR2809200A1 (en) Method for making secure a 'smart card' instruction sequence for a data application system presented in the form of typed data recorded in a memory, the data application system uses a 'JAVA Language' virtual machine
WO1998000769A3 (en) A method and apparatus for implementing check instructions that allow for the reuse of memory conflict information if no memory conflict occurs
EP0924553A3 (en) Memory alternation system for camera and its control method
EP0814478A3 (en) Multibank-multiport memories and systems and methods using the same
EP0657851A3 (en) File management system for memory card.
WO2002027444A3 (en) System and method for verifying the integrity of stored information within an electronic device
ES2113754T3 (en) DATA TRANSMISSION SYSTEM WITH A TERMINAL AND A PORTABLE DATA SUPPORT PROVISION AND PROCEDURE FOR RECHARGING THE PORTABLE DATA SUPPORT PROVISION THROUGH THE TERMINAL.
CA2309778A1 (en) Fully lazy linking
AU6840998A (en) Method for monitoring the secure segmentation of applications loaded in a multi-application terminal and terminal implementing same
TW345639B (en) Matrix interpolation
WO2000072112A3 (en) Obfuscation of executable code