Abstract:
In order further to develop a circuit arrangement (100) for electronic data processing - having at least one non-volatile memory module (10) for storing data to be protected against unauthorized access by means of encryption or decryption; - having at least one memory module interface logic circuit (12) assigned to the memory module (10) -- for addressing the memory module (10) and -- for writing the data to the memory module (10) or -- for reading out the data from the memory module (10);- having at least one code R[ead]O[nly]M[emory] module (20) for storing and/or supplying at least one R[ead]O[nly]M[emory] code; and- having at least one code ROM module interface logic circuit (22) assigned to the code ROM module (20) -- for addressing the code ROM module (20) and -- for reading out the ROM code from the code ROM module (20) and an en-/decryption method based thereon in such a way that on the one hand the key code may be changed for different controller versions with different ROM codes and on the other hand the length of the key code is not limited, it is proposed that the data assigned to the memory module (10) be encrypted or decrypted by means of the ROM code supplied by the code ROM module (20).
Abstract:
In order to develop an electronic memory component or memory module (100), having at least one memory cell area (10) in which physical states (P) representing regular data are mapped by means of at least one mapping function (A) that describes at least one error correction code, for example at least one Hamming code, and also a method of operating at least one electronic memory component or memory module (100) of the abovementioned type, such that on the one hand the error detection probability is considerably increased and on the other hand unwritten memory blocks can be reliably distinguished from memory blocks that have already been written to once before, it is proposed that at least one further physical state in the form of at least one exceptional or special state (L, S) in the error correction code can be detected, encoded and/or indicated by means of the mapping function (A).
Abstract:
In order to further develop a circuit arrangement (100) as well as a method of processing data to be protected against unauthorized access by means of encryption or decryption, by means of which method the data are stored in at least two memory modules (10, 12) in such way that a flexible configuration of any memory parts as main memory or redundancy memory is enabled, it is proposed to provide at least one real-time configurable redundancy concept for the memory modules (10, 12), by which the data can be stored redundantly in physically separate memory modules (10, 12).
Abstract:
In order to further develop a circuit arrangement (100) as well as a method of processing data to be protected against unauthorized access by means of encryption or decryption, by means of which method the data are stored in at least two memory modules (10, 12) in such way that a flexible configuration of any memory parts as main memory or redundancy memory is enabled, it is proposed to provide at least one real-time configurable redundancy concept for the memory modules (10, 12), by which the data can be stored redundantly in physically separate memory modules (10, 12).
Abstract:
The invention relates to a method and a system for writing NV memories in a controller architecture, in addition to a corresponding computer program product and a corresponding computer-readable storage medium, which can be used in particular to accelerate writing or programming operations in NV code memories of microcontrollers, such as e.g. smartcard controllers. The method consists of extending the instruction set of the controller by MOVCWR (move code write) instructions, which allow a defined data item (byte) to be written to a defined target address in an NV code memory. The data item (byte) is written to the correct position of the cache page register of the relevant NV memory and the page-address pointer register of the memory is updated with the corresponding page address. If an MMU (Memory Management Unit) is present, the MOVCWR write operation to the cache page register, in addition to the MOVC read or code fetch operation are controlled by said MMU.
Abstract:
The invention relates to a method of dual-stage scrambling of addresses (LogAdr) with which a central processor (10) accesses a memory (13). A first encryption logic (11) applies a fixed, unchangeable key (KEY1), whereas a second encryption logic (12) applies a changeable second key (KEY2) stored in the memory (13). The configuration data written during the initialization phase of the central processor (10) are preferably stored in a special configuration range which is accessed via a bypass (15) while bypassing the second encryption logic (12). The bypass is activated by a bypass logic (14) which compares the addresses (Cipher1) encrypted in the first stage with values (SecRowCipher1, SecRowCipher2) stored during the initialization phase.
Abstract:
It is known to display a cursor field of variable magnitude notably for accentuating text segments on a display screen. No separate symbol is reproduced in this cursor field. On the other hand, it is also known to display a cursor symbol in a cursor field, where the areas of the cursor field outside the symbol are generally suppressed. The position of this field can be controlled, but the magnitude is always fixed. The shape of the cursor symbol is often stored in a random access memory so that it can be readily modified. For the display of also a cursor symbol of variable magnitude, the invention proposes to address the cursor memory by means of a separate addressing device which operates only during display of the cursor field. The organization of the memory for the cursor symbol, customarily constructed as a matrix memory, then becomes fully independent of the rows and columns of the cursor field, i.e. to the cursor symbol the memory appears as a pure linear memory. As a result, this memory can be utilized in a substantially improved manner and the display of even large cursor symbols requires only a limited storage capacity.
Abstract:
The invention relates to an integrated circuit card (1) comprising: an input/output block (4) for receiving external command data from an interface device (2); a central processing unit (CPU) (3) in signal communication with the input/output block (4) for performing a task corresponding to the received command data; a judgement block (5) in signal communication with the central processing unit (3) for judging whether a working time of the central processing unit (3) reaches a reference time, after an input of the external command data is completed; and a control block (6) in signal communication with the judgement block (5) for operating responsive to an output of the judgement block, wherein the control block controls such that a S(WTX request) is output via the input/output block (4) without intervention by the central processing unit whenever the interface device (2) connected to the integrated circuit card (1) transmits a command to the integrated circuit card and the integrated circuit card is not able to respond to this command within the defined maximum waiting time.
Abstract:
In order further to develop a circuit arrangement (100) for electronic data processing - having at least one non-volatile memory module (10) for storing data to be protected against unauthorized access by means of encryption or decryption -having at least one code R`ead! O`nly!M`emory! module (20) for storing and/or supplying at least one R`ead!O`nly!M`emory! code; and -having at least one code ROM module interface logic circuit (22) assigned to the code ROM module (20) and an en-/decryption method based thereon in such a way that on the one hand the key code may be changed for different controller versions with different ROM codes and on the other hand the length of the key code is not limited, it is proposed that the data assigned to the memory module (10) be encrypted or decrypted by means of the ROM code supplied by the code ROM module (20).
Abstract:
The invention relates to a method of dual-stage scrambling of addresses (LogAdr) with which a central processor (10) accesses a memory (13). A first encryption logic (11) applies a fixed, unchangeable key (KEY1), whereas a second encryption logic (12) applies a changeable second key (KEY2) stored in the memory (13). The configuration data written during the initialization phase of the central processor (10) are preferably stored in a special configuration range which is accessed via a bypass (15) while bypassing the second encryption logic (12). The bypass is activated by a bypass logic (14) which compares the addresses (Cipher1) encrypted in the first stage with values (SecRowCipher1, SecRowCipher2) stored during the initialization phase.