会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • METHOD FOR AUTHENTICATING ACCESS TO A SECURED CHIP BY TEST DEVICE
    • 用于通过测试设备认证访问安全芯片的方法
    • US20120069991A1
    • 2012-03-22
    • US13320161
    • 2010-05-11
    • Pascal Junod
    • Pascal Junod
    • H04L9/14
    • G06F21/445G06F2221/2103
    • A method for authenticating access to a secured chip SC by a test device TD, the test device storing at least one common key CK and one test key TK, the secured chip SC storing the same common key CK and a reference digest F(TK) resulting from a cryptographic function on the test key TK, the method comprising the steps of:—receiving, by the test device TD, a challenge R produced by the secured chip SC,—combining, by the test device TD, the received challenge R with the test key TK by applying a bidirectional mathematical operation (op), encrypting the result (TK op R) with the common key CK, obtaining a cryptogram CK(TK op R),—sending the cryptogram CK(TK op R) to the secured chip SC—decrypting, by the secured chip SC, the cryptogram CK(TK op R) with the common key CK, obtaining an image key TK′ representing the test key TK by applying, with the challenge R, the reverse operation (op-1) of the mathematical operation (op) previously used by the test device TD,—calculating an expected digest F(TK′) of the image key TK′ with a cryptographic one-way function,—verifying validity by comparing the expected digest F(TK′) with the reference digest F(TK),—if the result of the comparison between the digest F(TK′) of the image key TK′ and the reference digest F(TK) is positive, accessing, by the test device TD, the secure chip SC in a test mode.
    • 用于通过测试设备TD验证对安全芯片SC的访问的方法,测试设备存储至少一个公共密钥CK和一个测试密钥TK,存储相同公共密钥CK的安全芯片SC和参考摘要F(TK) 由测试密钥TK上的加密功能产生,该方法包括以下步骤: - 由测试设备TD接收由安全芯片SC产生的质询R,由测试设备TD组合接收的质询R 通过应用双向数学运算(op)与测试密钥TK,用公共密钥CK加密结果(TK操作R),获得密码CK(TK操作R), - 将密码CK(TK操作R)发送到 安全芯片SC利用公共密钥CK解密密码库CK(TK操作R),通过与质询R一起应用反向操作(获得表示测试密钥TK的图像密钥TK') op-1),测试装置TD以前使用的数学运算(op),计算a 使用加密单向函数的图像密钥TK'的预期摘要F(TK'),通过将预期摘要F(TK')与参考摘要F(TK)进行比较来验证有效性, - 如果比较结果 在图像密钥TK'的摘要F(TK')和参考摘要F(TK)之间是正的,由测试装置TD以测试模式访问安全芯片SC。
    • 3. 发明申请
    • DEVICE AND A METHOD FOR GENERATING SOFTWARE CODE
    • 装置和一种产生软件代码的方法
    • US20110283115A1
    • 2011-11-17
    • US13109502
    • 2011-05-17
    • Pascal JUNOD
    • Pascal JUNOD
    • G06F9/44H04L9/00
    • G06F21/14H04L9/0631H04L2209/16
    • A method to generate final software code resistant to reverse engineering analysis from an initial software code, said initial software code transforming an input data to an output data, said final software code being executed by a processor being able to directly handle data of a maximum bit length M, comprising the steps of: building a conversion table comprising in one side one instruction and in the other side a plurality of equivalent instructions or sets of instructions; splitting the input data into a plurality of segments of random length, said segments having a length equal or smaller than the maximum bit length M; for each instruction of a block of instructions, selecting pseudo-randomly an equivalent instruction or set of instructions from the conversion table so as to obtain an equivalent block of instructions; and appending the plurality of equivalent blocks of instructions to obtain the final software code.
    • 一种用于从初始软件代码产生抵抗逆向工程分析的最终软件代码的方法,所述初始软件代码将输入数据变换为输出数据,所述最终软件代码由处理器执行,能够直接处理最大位数据 长度M,包括以下步骤:构建转换表,该转换表在一侧包括一个指令,而另一侧包括多个等价的指令或指令集; 将输入数据分割成多个随机长度的段,所述段具有等于或小于最大位长度M的长度; 对于指令块的每个指令,从转换表中伪随机选择等效指令或指令集,以获得等效的指令块; 并附加多个等效的指令块以获得最终的软件代码。