Method of implementing a secure program in a microprocessor card, and a microprocessor card including a secure program
First Claim
Patent Images
1. A method of implementing in a microprocessor card an operator'"'"'s program that is secure with respect to a CPU connected to a memory including memory zones, the method comprising the following steps:
- storing in a first memory zone a series of functions that are directly executable by a CPU as predetermined-address functions;
write-protecting said first memory zone; and
storing the operator'"'"'s program in a second memory zone, said operator'"'"'s program consisting of a series of instructions that are either directly executable by the CPU at the predetermined address solely within the second memory zone or that activate functions executable by the CPU at the predetermined address contained in the first memory zone.
3 Assignments
0 Petitions
Accused Products
Abstract
A program is made secure relative to a CPU by storing in a first memory zone a series of predetermined-address functions that are directly executable by the CPU, by write protecting said first memory zone, and by storing the program in a second memory zone in the form of a series of instructions that are executable within the second memory zone or that activate functions contained in the first memory zone.
55 Citations
4 Claims
-
1. A method of implementing in a microprocessor card an operator'"'"'s program that is secure with respect to a CPU connected to a memory including memory zones, the method comprising the following steps:
-
storing in a first memory zone a series of functions that are directly executable by a CPU as predetermined-address functions; write-protecting said first memory zone; and storing the operator'"'"'s program in a second memory zone, said operator'"'"'s program consisting of a series of instructions that are either directly executable by the CPU at the predetermined address solely within the second memory zone or that activate functions executable by the CPU at the predetermined address contained in the first memory zone. - View Dependent Claims (2, 3, 4)
-
Specification