Circuit à fusible, pour circuit intégré
    61.
    发明授权
    Circuit à fusible, pour circuit intégré 失效
    集成电路电路保险丝

    公开(公告)号:EP0597745B1

    公开(公告)日:1999-04-07

    申请号:EP93402582.6

    申请日:1993-10-20

    发明人: Kowalski, Jacek

    IPC分类号: G11C17/16 H01L23/525

    摘要: The invention relates to integrated circuits, and more precisely fusible circuits. In order to improve the reliability of integrated circuits having a physical fuse, the invention proposes to associate, with the fuse (F), an electrically programmable non-volatile memory cell (TGF), the cell being programmed at the same time as the fuse is blown. The state of the fuse is confirmed by the state of the memory. In particular, the blown state of the fuse can be confirmed by the programmed state of the memory, in applications in which the important thing is to ensure that the circuit can continue to retain the functionalities defined by the blown state of the fuse. If the blown structure subsequently reassumes more or less the characteristics of the intact structure, the memory cell will deputise for the defective fuse.

    CARTE A MEMOIRE ET PROCEDE DE FONCTIONNEMENT
    66.
    发明授权
    CARTE A MEMOIRE ET PROCEDE DE FONCTIONNEMENT 无效
    存储卡及其操作方法

    公开(公告)号:EP0733245B1

    公开(公告)日:1997-07-30

    申请号:EP95903372.1

    申请日:1994-12-06

    IPC分类号: G06K19/073

    摘要: This invention relates to memory cards. Microprocessor cards generally use application programmes contained in a non-volatile user memory (MU) controlled by an operating system in the read-only memory (MSYS). In order to provide flexibility and to ensure protected access to the different storage areas, without using any specific set circuitry, it is proposed that the storage access instructions of the application programmes (PG1, PG2, PG3) should be interpreted but not directly executed; the interpreter is contained in the read-only memory (MSYS) or in the user memory, and executes an access instruction in the following way: an allocated area (ZR) of the user memory is explored to determine if the requested access (read, write, execution) is authorized for the requested address; the instruction is only executed if such an access authorization is present. The allocated area (ZR), which contains such access authorizations is updated when a new application programme is written into the user memory. Updating can only be implemented by the operating system.

    PROCEDE D'ECRITURE D'INFORMATIONS DANS UNE MEMOIRE NON-VOLATILE
    69.
    发明公开
    PROCEDE D'ECRITURE D'INFORMATIONS DANS UNE MEMOIRE NON-VOLATILE 失效
    方法数据写入被非易失性存储器

    公开(公告)号:EP0700554A1

    公开(公告)日:1996-03-13

    申请号:EP94917057.0

    申请日:1994-05-25

    发明人: GORDONS, Edouard

    IPC分类号: G07F7

    CPC分类号: G07F7/1008

    摘要: Non-volatile memory cards in which the writing processes are controlled by a microprocessor. In order to improve the coherence of data recorded in non-volatile files, the invention provides a method of jointly controlling several writing process (addition, updating or eliminating of records). The successive operations are performed by recording in a non-volatile transaction space (TS) the data corresponding to the state of the memory before each operation (in particular old chainings (A7/16) of chained recordings). Then, a global validation command of N operations is performed or, on the contrary, a global invalidation command is performed, validating or invalidating of individual operations not being allowed.

    PROCEDE SECURISE DE CHARGEMENT DE PLUSIEURS APPLICATIONS DANS UNE CARTE A MEMOIRE A MICROPROCESSEUR
    70.
    发明授权
    PROCEDE SECURISE DE CHARGEMENT DE PLUSIEURS APPLICATIONS DANS UNE CARTE A MEMOIRE A MICROPROCESSEUR 失效
    SECURED方法在微处理器存储卡装载多个应用程序。

    公开(公告)号:EP0589884B1

    公开(公告)日:1995-10-11

    申请号:EP92903974.1

    申请日:1992-01-16

    摘要: The loading of a plurality of applications into a chip card is organized in a different way by creating a set of tables, essentially four tables. A first table called the application table allows to create fundamental couples between names of applications and secrete codes, such table being in principle recorded once for all, already at the chip card manufacturer. A second table modifiable as desired, called data table, allows for each application to create as many data tables as desired. A third table called the table of rights allows to grant, by an application, and on data tables created by said application, specific rights associated to utilizations. A fourth table containing keys attached to an application allows to implement the ciphering fonction. In this way, a utilization is prevented from modifying or reading information recorded in the chip card, as for another application. The invention has the advantage with respect to the prior art to be more flexible and to introduce a subsequent modification.