Abstract:
The invention relates to a method for entering data, said data to be entered comprising at least one digit. A first device comprises at least one touch sensitive interface. The touch sensitive interface is sensitive to at least one touch. According to the invention, at least one digit is associated with no touch or a count of at least one touch, and the method comprises the following steps. The first device detects, in a predetermined time period, a count of at least one touch that is or is not present at once or several times. The first device or a second device determines the digit associated with no detected touch or the detected count of at least one touch, the second device being connected to the first device. The invention also relates to corresponding device and system.
Abstract:
The invention is a method of protecting a data intended to be accessed by an operating system embedded in an electronic device. The operating system is intended to manage an object comprising a header and a body. The data is stored in the body. The object is recorded in a memory of the electronic device. The electronic device comprises a memory manager able to provide access to the memory. The memory manager forbids the operating system to access the body as long as a preset action has not been successfully performed.
Abstract:
A protection device (PD) equips an electronic device (ED) comprising hardware and software capable of executing a sensitive process (SP). This protection device (PD) comprises i) a detection means (DM) arranged for detecting a fault effect into the electronic device (ED), resulting from at least one fault attack of an attacker during execution of the sensitive process (SP), and ii) a correction means (CM) arranged for correcting this detected fault effect before it may be detected by the attacker, so that set up of the fault be considered as missed by this attacker.
Abstract:
Procédé de sécurisation des échanges entre deux dispositifs électroniques, en utilisant une empreinte d'au moins un des deux dispositifs. Cette empreinte est obtenue à partir de tout ou partie des composants électroniques qui composent ce dispositif. Cette empreinte va servir, soit à protéger la confidentialité de la donnée échangée, soit à attester de l'identité du dispositif émetteur de la donnée.
Abstract:
L'invention propose un procédé de sécurisation de l'exécution d'un code informatique par redondance de tout ou partie des fonctions exécutées. Le point de départ de la redondance ainsi que le sens de la redondance étant définis de manière dynamique.
Abstract:
A method is intended for protecting against fault attack(s) an electronic device (ED) comprising hardware and software capable of executing a sensitive process (SP) using a cache memory (CM) and implementing redundancy checks, said method comprising at least a step (i) during which said cache memory (CM) is filled with a first value originating from an external memory (EM), a step (ii) during which said first value is read into said cache memory (CM) and a step (iii) implementing at least a redundancy check, characterized in that it further comprises a fundamental step to guarantee that any redundant reading inside the redundancy check will extract a value from cache memory (CM) which is numerically equal to the genuine value in the external memory (EM).
Abstract:
Procédé de sécurisation d'un dispositif électronique, par réallocation de tout ou partie des informations contenues dans la mémoire de ce dispositif, selon une méthode déterministe. Cette réallocation se faisant sur commande depuis un second dispositif. L'invention décrit également un programme informatique permettant de réaliser cette réallocation.