摘要:
A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has been copied from the source memory (NV_MEM) into a “destination” memory (V_MEM). The method consists in reading from the source memory (NV_MEM) an integrity value (PI_ELT_X) associated with an element (ELEMENT_X_NV_MEM) such as file containing the source data, in calculating the integrity of a reconstituted element made up of the transferred data (COPY_ELT_X_V_MEM) associated, where appropriate, with the data of the source element (ELEMENT_X_NV_MEM) other than the data that was transferred, and in deciding that the transferred data (COPY_ELT_X_V_MEM) is identical to the source data when the integrity calculation gives a value identical to the integrity value of the source element (PI_ELT_X). The method applies to transferring data between components of a smart card.
摘要:
A method of securely transferring data. The source data stored in a source memory (NV_MEM) is compared with the transferred data (COPY_ELT_X_V_MEM) that has been copied from the source memory (NV_MEM) into a “destination” memory (V_MEM). The method consists in reading from the source memory (NV_MEM) an integrity value (PI_ELT_X) associated with an element (ELEMENT_X_NV_MEM) such as file containing the source data, in calculating the integrity of a reconstituted element made up of the transferred data (COPY_ELT_X_V_MEM) associated, where appropriate, with the data of the source element (ELEMENT_X_NV_MEM) other than the data that was transferred, and in deciding that the transferred data (COPY_ELT_X_V_MEM) is identical to the source data when the integrity calculation gives a value identical to the integrity value of the source element (PI_ELT_X). The method applies to transferring data between components of a smart card.
摘要:
A method of managing access rights in a smart card, to subordinating execution of a command (Cmd1, Cmdk) such as reading or writing to an event (Evt1′, Evtk′) being valid, such as authentication by verifying a code. The state of validation events is stored in a register, and the access rights are stored in a command list (List_Cmd) made up of couples (Cpl1, Cplk), each associating a command with an event. On receiving a request to execute a command, a search is made in the command list (List_Cmd) for the couple (Cpl1, Cplk) that includes the requested command, and execution is refused if the search is unsuccessful. If the search is successful, then it is determined from the register (referred to as the card security state register) whether the event associated with the command is or is not valid, in order to authorize or refuse execution thereof. The invention is for use in any smart card application that involves access rights.
摘要:
A smart card including a processor unit associated with a ROM and with a programmable ROM. The ROM contains an operating program that can be executed by the processor unit and that includes functional portions, each defining a function of the processor unit. The program includes an entry/exit point for each functional portion and an identifier is associated with each functional portion. The programmable ROM contains at least one substitutable functional portion suitable for substituting one of the functional portions of the ROM and associated with an identifier corresponding to the identifier of the corresponding functional portion of the ROM, and the processor unit is arranged to execute the substitutable functional portion instead of the corresponding substitutable functional portion of the ROM.
摘要:
An integrated circuit card including a processor unit associated with RAM and with data exchange means for exchanging data with an external device, the RAM including a memory zone dedicated to exchanged data, and the processor unit being arranged to secure the dedicated memory zone and to store the exchanged data in said zone, and a method of managing the RAM of such a card.
摘要:
A method of managing access rights in a smart card, to subordinating execution of a command (Cmd1, Cmdk) such as reading or writing to an event (Evt1′, Evtk′) being valid, such as authentication by verifying a code. The state of validation events is stored in a register, and the access rights are stored in a command list (List_Cmd) made up of couples (Cpl1, Cplk), each associating a command with an event. On receiving a request to execute a command, a search is made in the command list (List_Cmd) for the couple (Cpl1, Cplk) that includes the requested command, and execution is refused if the search is unsuccessful. If the search is successful, then it is determined from the register (referred to as the card security state register) whether the event associated with the command is or is not valid, in order to authorize or refuse execution thereof. The invention is for use in any smart card application that involves access rights.
摘要:
An integrated circuit card including a processor unit associated with RAM and with data exchange means for exchanging data with an external device, the RAM including a memory zone dedicated to exchanged data, and the processor unit being arranged to secure the dedicated memory zone and to store the exchanged data in said zone, and a method of managing the RAM of such a card.
摘要:
A method of managing a memory having stored elements that are organized in a hierarchy, each having a header containing individual identity information and a body containing data, the identity information of each element being encoded on a plurality of bits each of which can take a first value or a second value. The identity information of each element is obtained by repeating the identity information of an element constituting a direct antecedent of the element in question in the hierarchy, and in said identity information of the antecedent, by changing the value of a first value bit that follows the last second value bit in a direction for reading the identity information.
摘要:
A device and a method for managing access rights to a wireless network uses wireless connection devices advantageously based on a smart card, which enable the wireless connection to the network once connected to a terminal. These devices include devices for time and/or geographical management of access to the network and authentication device. These devices can be easily preprogrammed by the entity managing the service and then distributed to the users.
摘要:
A smart card has an electronic module and a card body carrying the module. The smart card includes a card body provided with a cavity and an electronic module having at least one portion presenting thickness that is less than the thickness of the card body. The electronic module is housed in the cavity and is secured to the card body. At least one through hole passes in succession through the portion of the module that presents a thickness that is less than the thickness of the card body, and through the card body.