Secure method to update software in a security module
First Claim
1. Secure method to update software embedded in a security module, this method comprising the following steps:
- formation of a first updating program block, determination of a target memory zone of said security module, determination through said security module, of a pre-registered content in said target memory zone, formation of a second program block obtained by the mixing of all or a part of the pre-registered content with the first program block, transmission of the second program block to the security module, reception of the second block by the security module, reading of the target memory zone, obtaining and writing in the target memory zone of the first block by the inverse mixing of all or part of the second block and of the target memory zone content.
3 Assignments
0 Petitions
Accused Products
Abstract
The aim of this invention is to propose a transmission method of a message containing a program block that allows to avoid the consequences of a possible malicious decryption of this message. This aim is achieved through a secure method to update software embedded in a security module, this method comprising the following steps: formation of a first updating program block (PBI), determination of a target memory zone of said security module, determination through said security module, of a pre-registered content (MM Ref) in said target memory zone, formation of a second program block (SBI) obtained by the mixing of all or a part of the pre-registered content with the first program block (PBI), transmission of the second program block (SBI) to the security module, reception of the second block by the security module, reading of the target memory zone (MEM), obtaining and writing in the target memory zone of the first block by the inverse mixing of all or part of the second block and of the target memory zone content.
-
Citations
9 Claims
-
1. Secure method to update software embedded in a security module, this method comprising the following steps:
-
formation of a first updating program block, determination of a target memory zone of said security module, determination through said security module, of a pre-registered content in said target memory zone, formation of a second program block obtained by the mixing of all or a part of the pre-registered content with the first program block, transmission of the second program block to the security module, reception of the second block by the security module, reading of the target memory zone, obtaining and writing in the target memory zone of the first block by the inverse mixing of all or part of the second block and of the target memory zone content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification