摘要:
A protection device is provided, which includes a detection circuit for detecting a short-circuit between at least two output branches of a magnetic reading head. Each of the output branches is able to convey a signal read by the reading head on a track of a magnetic card and the detection circuit is able to detect a short-circuit during the reading of at least one track of a magnetic card.
摘要:
This application relates to devices, methods and computer readable media that allow users using a first device to be easily authenticated. For example, while the first device is proximate to a second device, the first device requests user authentication using the one or more biometric sensors. After requesting the user authentication, the first device detects biometric information associated with the user with the one or more biometric sensors. In response to detecting the biometric information associated with the user, in accordance with a determination that the detected biometric information associated with the user meets authentication criteria, the first device provides credentials associated with the user to the second device. In accordance with a determination that the detected biometric information associated with the user does not meet the authentication criteria, the first device forgoes providing the credentials associated with the user to the second device.
摘要:
A method and a circuit for protecting at least one piece of information contained in an electronic circuit by disabling at least one function of the circuit in case of detection of a number of abnormal operations greater than a threshold, in which the disabling of the function is temporary, of a duration independent from whether the circuit is powered or not.
摘要:
Disclosed are an IC chip for preventing identification key leak and an authorization method thereof. An IC chip capable of performing a financial function includes: a PIN supply unit for supplying a PIN used for authorization when performing a financial function using the IC chip; and a blocking unit for physically blocking the gap between the PIN supply unit and an input-output interface when the PIN is supplied to the outside through the input-output interface at an initial access of the IC chip.
摘要:
A method for protecting a key intended to be used by an electronic circuit in an encryption or decryption algorithm, including the steps of: submitting the key to a first function taking a selection value into account; storing all or part of the result of this function in at least two registers; when the key is called by the algorithm, reading the contents of said registers and submitting them to a second function taking into account all or part of the bits of the registers; and providing the result of the combination as an input for the algorithm, the second function being such that the provided result corresponds to the key.
摘要:
A method is intended for transforming a secure electronic device, associated to a first identifier and having a sensitive mode disabled after production, for a new sensitive use. This method comprises the steps of: (i) externally computing a cipher of the first identifier with a predetermined function fed with this first identifier and a predetermined secret key; (ii) transforming an accessible metal layer of the electronic device to form an activation pattern representing this externally computed cipher of the first identifier; (iii) getting a value representative of this activation pattern into the electronic device; and (iv) computing a second identifier with this transformed electronic device by feeding a reverse function of the predetermined function with this value and this secret key, to trigger a comeback to the sensitive mode if this second identifier is equal to the first identifier.
摘要:
A device including a processor to perform an operation yielding a result, the processor including a register including bit storage elements and including a first and second section, each element being operative to store a bit value, and a power consumption mask module to determine whether the whole result can be completely written in half or less than half of the register, determine a balancing entry if the result can be completely written in half or less than half of the register, a write module to perform a single write operation to the register including writing the result and the balancing entry to the first and second section, respectively, if the result can be completely written in half or less than half of the register else writing the result of the operation across at least part of the first and second section. Related apparatus and methods are also described.
摘要:
An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises IBG circuitry. A decryption circuit for receiving an input of a second digital key and the encrypted data, the decryption circuit for mathematically manipulating the digital key and the encrypted data to decrypt the encrypted data into the plaintext data, wherein at least a portion of the decryption circuit comprises IBG circuitry
摘要:
A device for detecting a fault attack, including: a circuit for detecting an interruption of a power supply; a circuit for comparing the duration of said interruption with a first threshold; and a counter of the number of successive interruptions of the power supply having a duration which does not exceed the first threshold.
摘要:
In a method for detecting anomalies in a circuit protected by differential logic and which processes logic variables represented by a pair of components, a first network of cells carrying out logic functions on the first component of said pairs, a second network of dual cells operating in complementary logic on the second component, the logic functions being carried out by each pair of cells in a pre-charge phase placing the variables in a known state on input to the cells and followed by an evaluation phase where a calculation is performed by the cells, the method includes detecting an anomaly by at least one non-consistent state.