Method for the management of an application program loaded in a microcircuit medium
First Claim
Patent Images
1. A method for the management of an application program in a microcircuit-based medium, comprising the following steps:
- preparing a first encrypted signature as a function of a secret code of the microcircuit and predetermined instructions of the program;
loading said signature into a programmable memory of the microcircuit;
loading said program into a program memory of the microcircuit;
preparing a second encrypted signature in the microprocessor of the microcircuit during the execution of said application program;
comparing the first signature to the second signature; and
allowing said program to run if the first signature equals the second signature.
1 Assignment
0 Petitions
Accused Products
Abstract
To provide protection for the use of chip cards, the microprocessor of such a card is made, during the use of the card, to compute a signature according to complex encrypting algorithm taking account, firstly, of a secret code proper to the card and, secondly, of the instructions proper to the program. The signature thus computed is compared with a signature that has been pre-recorded in the card under the same conditions at the time of its delivery by the card-issuing party. It is shown that several uses can be authorized without jeopardizing their security.
-
Citations
7 Claims
-
1. A method for the management of an application program in a microcircuit-based medium, comprising the following steps:
-
preparing a first encrypted signature as a function of a secret code of the microcircuit and predetermined instructions of the program; loading said signature into a programmable memory of the microcircuit; loading said program into a program memory of the microcircuit; preparing a second encrypted signature in the microprocessor of the microcircuit during the execution of said application program; comparing the first signature to the second signature; and allowing said program to run if the first signature equals the second signature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification