摘要:
Die Erfindung betrifft ein Verfahren zum Laden von ausführbaren Programminstruktionen (150) in eine im Wirkbetrieb befindliche Chipkarte (100), wobei die Chipkarte zumindest ein ROM (102) und ein NVM (104) aufweist, wobei in dem ROM ein Bootloader (106) zum Laden eines Chipkartenbetriebssystems (128) von einer Personalisierungsanlage (110) in das NVM vor Aufnahme des Wirkbetriebs der Chipkarte gespeichert ist und in dem NVM das Chipkartenbetriebssystem (128) gespeichert ist, und wobei sich der Bootloader in dem Wirkbetrieb der Chipkarte in einem deaktivierten Zustand befindet, wobei der Bootloader in seinem deaktivierten Zustand ausschließlich durch das Chipkartenbetriebssystem (128, 128') startbar ist, wobei das Verfahren die folgenden Schritte aufweist: - Einkopplung von Energie in die Chipkarte (100) von einem Chipkartenterminal (144), -Start der Ausführung des in dem NVM gespeicherten Chipkartenbetriebssystems durch die Chipkarte, - Empfang eines Kommandos (156) von dem Chipkartenterminal zum Laden der ausführbaren Programminstruktionen durch das Chipkartenbetriebssystem, - Authentisierung des Chipkartenterminals gegenüber der Chipkarte durch das Chipkartenbetriebssystem, -Prüfung der Berechtigung des Chipkartenterminals zum Laden der ausführbaren Programminstruktionen durch das Chipkartenbetriebssystem, - Speicherung von Daten in einem vordefinierten Speicherbereich (122) des NVM, die eine erfolgreiche Durchführung der Authentisierung und der Prüfung anzeigen, durch das Chipkartenbetriebssystem, - Starten der Ausführung des Bootloaders durch das Chipkartenbetriebssystem und Abbruch der Ausführung des Chipkartenbetriebssystems nach dem Start des Bootloaders, - Lesen der Daten aus dem vordefinierten Speicherbereich durch den Bootloader, - Laden der Programminstruktionen von dem Chipkartenterminal in den NVM durch den Bootloader unter der Voraussetzung, dass die Daten in dem vordefinierten Speicherbereich die erfolgreiche Authentisierung und Prüfung anzeigen.
摘要:
Data protection is weak with the methods currently available and there are risks of corrupting important data, including system data accidentally by users or by malicious programs. He are proposing a method for improving access protection, more particularly, protection for data on mass memories by adding a hardware that will enable or disable read or write protection to portions of mass memories for each user. The hardware supports one or more users and two or more states for each supported user. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to a user corresponds to disabling or enabling read or write protection to some portions of a mass memory or mass memories for that user.
摘要:
A processor includes a cache hierarchy including a level- 1 cache and a higher-level cache. The processor maps a portion of physical memory space to a portion of the higher-level cache, executes instructions, at least some of which comprise microcode, allows microcode to access the portion of the higher-level cache, and prevents instructions that do not comprise microcode from accessing the portion of the higher-level cache. The first portion of the physical memory space can be permanently allocated for use by microcode. The processor can move one or more cache lines of the first portion of the higher-level cache from the higher-level cache to a first portion of the level- 1 cache, allow microcode to access the first portion of the first level- 1 cache, and prevent instructions that do not comprise microcode from accessing the first portion of the first level- 1 cache.
摘要:
An architecture is presented that facilitates integrated security capabilities. A memory module (100, 200, 400) is provided that comprises non-volatile memory (102, 202, 402) that stores security software and a security processor (104, 204, 300, 404) that accesses the security software from the nonvolatile memory (102, 202, 402) and performs security functions based on the security software stored. Further, a host processor (206, 406) located outside of the memory module (100, 200, 400) arbitrates with the security processor (104, 204, 300, 404) for access to the non-volatile memory (102, 202, 402). The memory module (100, 200, 400) in communication with the host processor (206, 406) establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
摘要:
An architecture is presented that facilitates integrated security capabilities. A memory module (100, 200, 400) is provided that comprises non-volatile memory (102, 202, 402) that stores security software and a security processor (104, 204, 300, 404) that accesses the security software from the nonvolatile memory (102, 202, 402) and performs security functions based on the security software stored. Further, a host processor (206, 406) located outside of the memory module (100, 200, 400) arbitrates with the security processor (104, 204, 300, 404) for access to the non-volatile memory (102, 202, 402). The memory module (100, 200, 400) in communication with the host processor (206, 406) establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
摘要:
A security system for an external data storage apparatus and a control method thereof, in which a data storage is driven by reading an identification (ID), which is input through a key input unit for the purpose of security of the external data storage apparatus, and then checking whether or not the read ID is equal to a previously registered ID, thereby preventing data from leaking out and being damaged in advance by another person, and safely protecting the data of a user. The security system comprises a data storage in which data is stored; a high-speed serial bus, which connects the data storage with a data terminal, which read and write the data stored in the data storage; a key input unit, which converts an ID, which is input by operation of a user, to an electrical signal and outputs the converted signal; a memory, which stores and sets the ID input by the key input unit: and a control circuit, which, when the ID input by the key input υnit is applied, compares the input ID with the preset ID stored in the memory, drives the data storage based on the compared result, and re-arranges storage sectors of the data storage to prevent the data from leaking out of the data storage when an unauthorized data terminal provides access.
摘要:
A portable terminal and a method of controlling a shared memory, the portable terminal are disclosed. The portable terminal includes a memory unit, being equipped with at least 2 ports and having a storage block partitioned into partitioned blocks in a quantity of n, and a plurality of processors, reading or writing data by accessing a particular partitioned block through each dedicated port. At least one of the partitioned blocks is assigned to a common storage block, accessible by a processor having an access privilege, and the access privilege is transferred between the plurality of processors. The common storage block can be partitioned into k sub partitioned blocks, which the data type and process to be stored are predetermined. With the present invention, in the case of the common storage block for the plurality of processors, by allowing the partitioned storage blocks to be partitioned again into sub partitioned blocks depending on a type of data to be stored, the data processing / transmission speed and efficiency can be optimized.