WO2001097010A3 - Data processing method and device for protected execution of instructions - Google Patents

Data processing method and device for protected execution of instructions Download PDF

Info

Publication number
WO2001097010A3
WO2001097010A3 PCT/EP2001/005560 EP0105560W WO0197010A3 WO 2001097010 A3 WO2001097010 A3 WO 2001097010A3 EP 0105560 W EP0105560 W EP 0105560W WO 0197010 A3 WO0197010 A3 WO 0197010A3
Authority
WO
WIPO (PCT)
Prior art keywords
register
signature
value
mode
signature register
Prior art date
Application number
PCT/EP2001/005560
Other languages
French (fr)
Other versions
WO2001097010A2 (en
Inventor
Thorwald Rabeler
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Priority to EP01936364A priority Critical patent/EP1295200A2/en
Priority to JP2002511070A priority patent/JP2004503860A/en
Publication of WO2001097010A2 publication Critical patent/WO2001097010A2/en
Publication of WO2001097010A3 publication Critical patent/WO2001097010A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30098Register arrangements
    • G06F9/30101Special purpose registers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Abstract

A device to determine whether an application program has been unduly manipulated is provided with a signature register that is coupled to the output of the instruction register and/or to the addresses of the program memory. The signature register is also coupled to a mode bit of a processor having two operating modes. In a first mode, the signature register accumulates the output of the instruction register and/or the addresses of the program memory, yet the output of the signature register is not externally discernable. In a second mode, the signature register is set to no longer accumulate inputs. In the second mode, the signature register content is checked by a comparison with a specified value. This comparison value can be effectively contained in an instruction at relevant positions in the program. In one embodiment, the signature value is not compared directly but is only compared after the value is encrypted to ensure that in the case of unauthorized manipulation of the program, the comparison value cannot be readily modified.
PCT/EP2001/005560 2000-06-12 2001-05-14 Data processing method and device for protected execution of instructions WO2001097010A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP01936364A EP1295200A2 (en) 2000-06-12 2001-05-14 Data processing method and device for protected execution of instructions
JP2002511070A JP2004503860A (en) 2000-06-12 2001-05-14 Data processing method and apparatus for execution of protected instructions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US59206000A 2000-06-12 2000-06-12
US09/592,060 2000-06-12

Publications (2)

Publication Number Publication Date
WO2001097010A2 WO2001097010A2 (en) 2001-12-20
WO2001097010A3 true WO2001097010A3 (en) 2002-03-21

Family

ID=24369117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2001/005560 WO2001097010A2 (en) 2000-06-12 2001-05-14 Data processing method and device for protected execution of instructions

Country Status (3)

Country Link
EP (1) EP1295200A2 (en)
JP (1) JP2004503860A (en)
WO (1) WO2001097010A2 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7533412B2 (en) 2002-04-23 2009-05-12 Stmicroelectronics S.A. Processor secured against traps
FR2849226B1 (en) 2002-12-20 2005-12-02 Oberthur Card Syst Sa METHOD AND DEVICE FOR SECURING THE EXECUTION OF A COMPUTER PROGRAM
US7322042B2 (en) * 2003-02-07 2008-01-22 Broadon Communications Corp. Secure and backward-compatible processor and secure software execution thereon
US20100017627A1 (en) 2003-02-07 2010-01-21 Broadon Communications Corp. Ensuring authenticity in a closed content distribution system
EP3043232A1 (en) 2003-08-26 2016-07-13 Panasonic Intellectual Property Corporation of America Program execution device
EP1548537A1 (en) * 2003-12-23 2005-06-29 STMicroelectronics Limited Secure processor arrangement
DE102005050767A1 (en) * 2005-10-24 2007-04-26 Robert Bosch Gmbh Instruction Memory Backup by Control Flow Checking
DE102007038763A1 (en) 2007-08-16 2009-02-19 Siemens Ag Method and device for securing a program against a control flow manipulation and against a faulty program sequence
EP3301600B1 (en) * 2016-09-29 2021-03-31 Commsolid GmbH Method and apparatus for signature tracing
US11329663B2 (en) 2018-08-21 2022-05-10 Commsolid Gmbh Analog to digital converter
US11698969B1 (en) * 2021-06-25 2023-07-11 Amazon Technologies, Inc. Boot security of integrated circuit device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5671394A (en) * 1990-07-27 1997-09-23 Nec Corporation Microcomputer having ROM data protection function
EP0935214A2 (en) * 1998-02-06 1999-08-11 Philips Patentverwaltung GmbH Smart card with integrated circuit
US6003134A (en) * 1997-01-13 1999-12-14 Kuo; Chih-Cheng Secure open smart card architecture
EP0977160A1 (en) * 1998-07-31 2000-02-02 Philips Corporate Intellectual Property GmbH Method and data processing device for the reliable execution of instructions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5671394A (en) * 1990-07-27 1997-09-23 Nec Corporation Microcomputer having ROM data protection function
US6003134A (en) * 1997-01-13 1999-12-14 Kuo; Chih-Cheng Secure open smart card architecture
EP0935214A2 (en) * 1998-02-06 1999-08-11 Philips Patentverwaltung GmbH Smart card with integrated circuit
EP0977160A1 (en) * 1998-07-31 2000-02-02 Philips Corporate Intellectual Property GmbH Method and data processing device for the reliable execution of instructions

Also Published As

Publication number Publication date
WO2001097010A2 (en) 2001-12-20
EP1295200A2 (en) 2003-03-26
JP2004503860A (en) 2004-02-05

Similar Documents

Publication Publication Date Title
WO2002052386A3 (en) Method and system for software integrity control using secure hardware assisting device
WO2005109203A3 (en) Data processing system with trace co-processor
EE200400053A (en) Method and system for processing data in an electronic device, electronic device and processing unit
JP2005520247A5 (en)
WO2001097010A3 (en) Data processing method and device for protected execution of instructions
DE60327968D1 (en) Protection of Software through Digital Rights Management (DRM)
Das et al. Detecting/preventing information leakage on the memory bus due to malicious hardware
NO20023964L (en) Controlling a computer program's access to a resource using a digital signature
JP2007304954A (en) Computer system having memory protecting function
WO2007118154A3 (en) System and method for checking the integrity of computer program code
WO2004046916A3 (en) Exception types within a secure processing system
WO2001016717A8 (en) Control unit and recorded medium
WO2009051471A3 (en) Trusted computer platform method and system without trust credential
WO2006093618A3 (en) Integrated microcontroller and memory with secure interface between system program and user operating system and application
EP1378809A3 (en) Systems and methods for securing video card output
JP2006227777A (en) Data processor
WO2004111838A3 (en) Method and data processor for reduced pipeline stalling
JP2007310601A (en) Microcomputer and method for protecting its software
JPH03123919A (en) Computer system
US10037287B2 (en) Method for protecting memory against unauthorized access
WO2005045557A3 (en) The secure attention instruction central processing unit and system architecture
US7774758B2 (en) Systems and methods for secure debugging and profiling of a computer system
JPH0475137A (en) Data processor
WO2006036654A3 (en) Method and system for providing secure codecs
ATE371213T1 (en) PROCESSOR WITH INTERNAL MEMORY CONFIGURATION AND ARRANGEMENT WITH THIS PROCESSOR

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

WWE Wipo information: entry into national phase

Ref document number: 2001936364

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

WWP Wipo information: published in national office

Ref document number: 2001936364

Country of ref document: EP