Method of generating electronic keys for a public-key cryptography method and a secure portable object using said method
    3.
    发明申请
    Method of generating electronic keys for a public-key cryptography method and a secure portable object using said method 审中-公开
    使用所述方法生成用于公开密钥加密方法的电子密钥和安全便携式对象的方法

    公开(公告)号:US20050226411A1

    公开(公告)日:2005-10-13

    申请号:US10518639

    申请日:2003-06-18

    IPC分类号: G09C1/00 H04L9/30 H04L9/00

    摘要: A method of generating electronic keys for a public-key cryptography method using an electronic device. In a first of two separate calculating steps, pairs of prime numbers (p, q) are calculated and stored independent of knowledge of the pair of values (e,l), in which e is the public exponent and l is the length of the key of the cryptography method. The second step is very quick and can be executed in real time by the device, in which a key d is calculated from the results of the first step and knowledge of the pair (e,l).

    摘要翻译: 一种使用电子设备生成用于公开密钥密码法的电子密钥的方法。 在两个独立的计算步骤中的第一个中,独立于一对值(e,l)的知识来计算和存储素数对(p,q),其中e是公共指数,l是长度 密码法的关键。 第二步非常快,可以由设备实时执行,其中根据第一步的结果和对(e,l)的知识计算密钥d。

    Detector of abnormal destruction of memory sectors
    4.
    发明授权
    Detector of abnormal destruction of memory sectors 有权
    内存部门异常破坏的检测器

    公开(公告)号:US07934133B2

    公开(公告)日:2011-04-26

    申请号:US12086252

    申请日:2006-12-12

    IPC分类号: G11C29/00 G06F11/00

    CPC分类号: G11C16/22 G11C16/349

    摘要: The invention relates to an integrated circuit comprising at least one microprocessor [12] linked to at least one non-volatile memory [14] that can be accessed by sectors. The integrated circuit comprises a detector [20] for discovering when a threshold number of bad sectors has been exceeded in said non-volatile memory [14].

    摘要翻译: 本发明涉及一种集成电路,其包括至少一个与扇区可访问的至少一个非易失性存储器[14]连接的微处理器[12]。 集成电路包括用于发现在所述非易失性存储器[14]中何时超过阈值数量的坏扇区的检测器[20]。

    Detector of Abnormal Destruction of Memory Sectors
    5.
    发明申请
    Detector of Abnormal Destruction of Memory Sectors 有权
    记忆体异常破坏检测器

    公开(公告)号:US20090254777A1

    公开(公告)日:2009-10-08

    申请号:US12086252

    申请日:2006-12-12

    IPC分类号: G06F11/28

    CPC分类号: G11C16/22 G11C16/349

    摘要: The invention relates to an integrated circuit comprising at least one microprocessor [12] linked to at least one non-volatile memory [14] that can be accessed by sectors. The integrated circuit comprises a detector [20] for discovering when a threshold number of bad sectors has been exceeded in said non-volatile memory [14].

    摘要翻译: 本发明涉及一种集成电路,其包括至少一个与扇区可访问的至少一个非易失性存储器[14]连接的微处理器[12]。 集成电路包括用于发现在所述非易失性存储器[14]中何时超过阈值数量的坏扇区的检测器[20]。

    Method for countermeasure in an electronic component using a secret key algorithm
    6.
    发明授权
    Method for countermeasure in an electronic component using a secret key algorithm 有权
    使用秘密密钥算法的电子部件中的对策方法

    公开(公告)号:US07471791B1

    公开(公告)日:2008-12-30

    申请号:US09913884

    申请日:2000-01-20

    IPC分类号: H04L9/06 H04K1/02 H04L9/28

    摘要: A countermeasure method in an electronic component using a secret key algorithm K on an input message M executes an operation OPN(D) on input data D. A random value, of one first random information U, is generated that is of identical size as the input information D. A second random information V, is calculated by performing an exclusive OR operation between the input information and the first random information U. The operation OPN or the sequence of operations are successively executed on the first input information U and to the second random information V, supplying respectively a first random result OPN(U) and a second random result OPN(V).

    摘要翻译: 在输入消息M中使用秘密密钥算法K的电子部件中的对策方法对输入数据D执行操作OPN(D)。生成与第一随机信息U相同大小的随机值 输入信息D.通过执行输入信息和第一随机信息U之间的异或运算来计算第二随机信息V.操作OPN或操作序列依次对第一输入信息U和第二输入信息 随机信息V分别提供第一随机结果OPN(U)和第二随机结果OPN(V)。

    Countermeasure method for a microcontroller based on a pipeline architecture
    7.
    发明授权
    Countermeasure method for a microcontroller based on a pipeline architecture 有权
    基于流水线架构的微控制器的对策方法

    公开(公告)号:US07376844B2

    公开(公告)日:2008-05-20

    申请号:US10240542

    申请日:2001-03-16

    申请人: Nathalie Feyt

    发明人: Nathalie Feyt

    摘要: A countermeasure method for a microcontroller that executes sequences of instructions. The instructions are executed according to a pipeline method. At least one waiting time is randomly introduced between two consecutive instructions and/or within at least one instruction. The method is implemented by the electronics of the microcontroller rather than by software addition.

    摘要翻译: 一种用于执行指令序列的微控制器的对策方法。 指令根据流水线方式执行。 在两个连续指令之间和/或至少一个指令内随机引入至少一个等待时间。 该方法由微控制器的电子器件实现,而不是通过软件添加。

    Devices for hiding operations performed in a microprocesser card
    8.
    发明授权
    Devices for hiding operations performed in a microprocesser card 有权
    用于在微处理器卡中执行隐藏操作的设备

    公开(公告)号:US06698662B1

    公开(公告)日:2004-03-02

    申请号:US09646564

    申请日:2000-12-18

    IPC分类号: G06K1906

    摘要: The invention concerns microprocessor cards and, in such cards, various devices for hiding operations performed in the card against fraudulent breaches by analysing the current consumed. The invention is characterised in that it consists in adding in the card a device (20) modifying the consumed current, either by averaging it by integration, or by adding thereto random values by a random signal generator (28) so as to hide the operations performed. In another embodiment, it consists in carrying out simultaneously an operation for making secure and writing in an EEPROM memory, the latter generating chaotic current variations which hide the operation to be made secure.

    摘要翻译: 本发明涉及微处理器卡,并且在这种卡中,用于通过分析消耗的电流来隐藏在卡中执行的操作以防止欺诈性违规的各种设备。 本发明的特征在于,其中包括在卡中添加修改消耗电流的装置(20),或者通过积分对其进行平均,或者通过随机信号发生器(28)向其添加随机值,以隐藏操作 执行。 在另一个实施例中,它包括同时执行用于在EEPROM存储器中进行安全和写入的操作,后者产生隐藏操作以使其变得安全的混沌电流变化。