摘要:
An access violation of the program is monitored by the access monitor which is a hardware. The access monitor acquires a signal input from the CPU to a memory. The access monitor includes an access permission table as information of the memory region to be permitted to each program, and detects the access violation of the signal from the CPU by referring thereto. In this manner, the unjust access is monitored by the hardware, thereby preventing the unjust access by rewriting in software.
摘要:
A protocol control integrated circuit configured by integrating, on one chip, hardware and control programs necessary for conducting data interchange through communications with portable type mediums, and used in common among various types of apparatus. Thus, the integrated circuit is constructed by integrating, on one chip, a storage section for storing a control program prepared for protocols for a plurality of digital money different in mode from each other, a processing section for controlling the handling of the plurality of digital money, different in mode, by running the control program stored in the storage section, and an interface circuit connected to an external circuit including at least one of an external processing section and an external storage section for fulfilling an interface function between the external circuit and the processing section. Further this invention is applicable to various types of transaction apparatus capable of handling, for example, digital money and credit transactions.
摘要:
An encryption processor for encrypting and decrypting data that ensures data security by preventing illegal deciphering or leakage of the data. The encryption processor includes a CPU for running a program, a ROM for storing the program run by the CPU, a RAM used as a work area while the CPU is running the program, an I/O section for sending/receiving data to/from an external device, and an encryption section for decrypting encrypted data and encrypting plain text data.