会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Protection Against Attacks by Generation of Errors on Jump Instructions
    • 通过跳跃指令产生错误来防范攻击
    • US20070250703A1
    • 2007-10-25
    • US11665991
    • 2005-10-18
    • Christophe GiraudHugues Thiebeauld De La Crouee
    • Christophe GiraudHugues Thiebeauld De La Crouee
    • H04L9/00
    • G06F21/52G06F21/55
    • A method for securing a program against attacks by error, i.e. in a chip card, wherein at least one jump instruction, including a relative address chosen from a plurality of possible relative addresses, is identified in the program, wherein the at least one jump instruction makes it possible to reach a targeted address inside the memory area extending before and after the jump instruction and regrouping the plurality of possible relative addresses, inside the memory area, wherein an instruction to be preserved is identified and, in order to secure at least the instruction, at least one first non-operative batch including at least one instruction is inserted, the insertion being carried out in such a way as to ensure that the insertion is compatible with maintenance of the address targeted by the jump instruction inside the memory area and that the insertion is compatible with the normal running of the program.
    • 一种用于保护程序免受错误攻击的方法,即在芯片卡中,其中在程序中识别包括从多个可能的相对地址中选择的相对地址的至少一个跳转指令,其中所述至少一个跳转指令 使得可以到达在跳转指令之前和之后延伸的存储区域内的目标地址,并将存储区域内的多个可能的相对地址重新分组,其中识别要保留的指令,并且为了至少保证 插入至少包括至少一个指令的至少一个第一非操作批次,插入以确保插入与维护存储区内的跳转指令所针对的地址相一致的方式执行,以及 该插入与程序的正常运行兼容。
    • 8. 发明授权
    • Method and device for protection of a microcircuit against attacks
    • 用于保护微电路免受攻击的方法和装置
    • US08555390B2
    • 2013-10-08
    • US12556897
    • 2009-09-10
    • Hugues Thiebeauld de la CroueeOliver Chamley
    • Hugues Thiebeauld de la CroueeOliver Chamley
    • G06F21/00
    • G06K19/07363G06F21/64G06F21/75G06F21/79
    • The method of protection of a microcircuit against an attack includes: a step (205) of determining if an attack has been detected, if an attack has been detected, a step (210, 510) of executing a protection function, and if no attack has been detected, a step (215, 515) of executing a decoy function simulating the protection function and perceptible from outside the microcircuit in a manner substantially identical to the protection function. In some embodiments the decoy function has a power consumption substantially identical to that of the protection function, the protection function effects a step of writing predetermined data at a first address of a non-volatile memory, and the decoy function effects a step of writing in non-volatile memory at a second address different from the first address.
    • 保护针对攻击的微电路​​的方法包括:确定是否检测到攻击的步骤(205),如果已经检测到攻击,执行保护功能的步骤(210,510),以及如果没有攻击 已经检测到步骤(215,515),以与保护功能基本相同的方式执行模拟保护功能并且从微电路外部可感知的诱饵功能。 在一些实施例中,诱饵功能具有与保护功能的功耗基本相同的功率消耗,保护功能实现在非易失性存储器的第一地址处写入预定数据的步骤,并且诱饵功能实现写入步骤 在与第一地址不同的第二地址处的非易失性存储器。
    • 9. 发明申请
    • METHOD AND DEVICE FOR PROTECTION OF A MICROCIRCUIT AGAINST ATTACKS
    • 用于保护针对攻击的微型计算机的方法和装置
    • US20100064370A1
    • 2010-03-11
    • US12556897
    • 2009-09-10
    • Hugues Thiebeauld de la CroueeOlivier Chamley
    • Hugues Thiebeauld de la CroueeOlivier Chamley
    • G06F21/00
    • G06K19/07363G06F21/64G06F21/75G06F21/79
    • The method of protection of a microcircuit against an attack includes: a step (205) of determining if an attack has been detected, if an attack has been detected, a step (210, 510) of executing a protection function, and if no attack has been detected, a step (215, 515) of executing a decoy function simulating the protection function and perceptible from outside the microcircuit in a manner substantially identical to the protection function. In some embodiments the decoy function has a power consumption substantially identical to that of the protection function, the protection function effects a step of writing predetermined data at a first address of a non-volatile memory, and the decoy function effects a step of writing in non-volatile memory at a second address different from the first address.
    • 保护针对攻击的微电路​​的方法包括:确定是否检测到攻击的步骤(205),如果已经检测到攻击,执行保护功能的步骤(210,510),以及如果没有攻击 已经检测到步骤(215,515),以与保护功能基本相同的方式执行模拟保护功能并且从微电路外部可感知的诱饵功能。 在一些实施例中,诱饵功能具有与保护功能的功耗基本相同的功率消耗,保护功能实现在非易失性存储器的第一地址处写入预定数据的步骤,并且诱饵功能实现写入步骤 在与第一地址不同的第二地址处的非易失性存储器。