METHOD FOR SECURING A PROGRAM
    4.
    发明公开
    METHOD FOR SECURING A PROGRAM 有权
    法程序的安全

    公开(公告)号:EP2979179A1

    公开(公告)日:2016-02-03

    申请号:EP14731381.1

    申请日:2014-05-27

    IPC分类号: G06F9/45 G06F11/36 G06F9/445

    摘要: A method for securing a first program with a second program, a third program and a fourth program, each program comprising constitutive elements having a finite number of program points and evolution rules associated with the program points and defining the passage from one program point to another program point, and each program comprising a definition of a set of properties each property being associated with one or more of the constitutive elements of the program. The fourth program constructed by defining at least one relation between at least one constitutive element of the second program and at least one constitutive element of the third program, said relation being named a correspondence relation, and at least one property of the third program being proven, propagate the proof of said property to at least one property of the first program by exploitation of the correspondence relation.

    Method of communicating between a server and a secure element
    6.
    发明公开
    Method of communicating between a server and a secure element 审中-公开
    Verfahren zur Kommunikation zwischen einem服务器和einem sicheren元素

    公开(公告)号:EP2849464A1

    公开(公告)日:2015-03-18

    申请号:EP13306272.9

    申请日:2013-09-17

    申请人: Gemalto SA

    IPC分类号: H04W4/00 H04W12/02

    摘要: The invention is a method of communicating between a server and a distant secure element through a point-to-point link. The server is provided with a set comprising a plurality of data and a plurality of identifiers, each of the data is associated with one of the identifiers. The plurality of data comprises a first data compatible with the distant secure element and a second data incompatible with the distant secure element. The whole set is sent from the server to the distant secure element through the point-to-point link. A control operation is run with respect to a reference value stored in the distant secure element for each identifier. The data associated with the identifiers for which the control operation failed is discarded.

    摘要翻译: 本发明是一种通过点对点链路在服务器和远程安全元件之间进行通信的方法。 服务器设置有包括多个数据和多个标识符的集合,每个数据与标识符之一相关联。 多个数据包括与远程安全元件兼容的第一数据和与远程安全元件不兼容的第二数据。 整个集合通过点对点链接从服务器发送到远程安全元素。 对于每个标识符,相对于存储在远程安全元件中的参考值运行控制操作。 与控制操作失败的标识符相关联的数据被丢弃。

    PREDICTING TRUSTWORTHINESS FOR COMPONENT SOFTWARE
    8.
    发明公开
    PREDICTING TRUSTWORTHINESS FOR COMPONENT SOFTWARE 审中-公开
    预报中的FOR组件软件可靠性

    公开(公告)号:EP2069921A2

    公开(公告)日:2009-06-17

    申请号:EP07826183.1

    申请日:2007-08-29

    申请人: Nokia Corporation

    发明人: YAN, Zheng

    IPC分类号: G06F9/44

    CPC分类号: G06F21/577 G06F9/44589

    摘要: This invention relates to a method, an apparatus and a computer program product for determining whether a set of specifications related to a software component can be satisfied by a system, wherein said set of specifications comprises at least one specification, and wherein at least one specification of said at least one specification is one out of a resource requirement and a performance specification; and for initiating a function provided by the system if said set of specifications can be satisfied, wherein said function is related to said software component.

    SYSTEM AND METHOD FOR LOW OVERHEAD BOUNDARY CHECKING OF JAVA ARRAYS
    9.
    发明授权
    SYSTEM AND METHOD FOR LOW OVERHEAD BOUNDARY CHECKING OF JAVA ARRAYS 有权
    系统和方法减少对环境影响系统TO TEST上限超出Java数组

    公开(公告)号:EP1451681B1

    公开(公告)日:2007-10-10

    申请号:EP01969757.2

    申请日:2001-09-21

    申请人: NXP B.V.

    IPC分类号: G06F9/45

    CPC分类号: G06F9/44589

    摘要: An array boundary checking method is disclosed for providing hardware based array boundary checking in a Java environment. During the first machine cycle of a current array access command, an array reference value is loaded into a system-data address controller and an array boundary checker. Next, during the second machine cycle of the current array access command, an array index value is written to the system-data address controller and the array boundary checker. Also during the second machine cycle of the current array access command, a maximum array index value is read from the Java array and written to the array boundary checker. The array boundary checker utilizes these values to determine the validity of the current array access command. Finally, during the third machine cycle an array value is accessed in memory. In the present invention the array value is only accessed when the current array access command is valid.