Secure method to update software in a security module
First Claim
1. A secure method to update software embedded in a security module, this method comprising the following steps:
- formation of a first updating program block,determination of a target memory zone of said security module,determination of a pre-registered content in said target memory zone of said security module,formation of a second program block by mixing all or a part of the pre-registered content with the first updating program block,transmission of the second program block to the security module,reception of the second program block by the security module,reading of the content of the target memory zone,obtaining the first updating program block from the second program block by using the target memory zone content as a key and by inverse mixing the target memory zone content and all or part of the second program block; and
overwriting the target memory zone content with the obtained first updating program block,wherein the pre-registered content in said target memory zone of said security module is made up of a program code executable by the security module.
3 Assignments
0 Petitions
Accused Products
Abstract
Transmission method of a message containing a program block that avoids the consequences of a possible malicious decryption of this message is proposed. This is achieved through a secure method to update software embedded in a security module, comprising formation of a first updating program block, determination of a target memory zone of said security module, determination, through said security module, of a pre-registered content in said target memory zone, formation of a second program block obtained by the mixing of all or a part of the pre-registered content with the first program block, transmission of the second program block to the security module, reception of the second block by the security module, reading of the target memory zone, obtaining and writing in the target memory zone of the first block by the inverse mixing of all or part of the second block and of the target memory zone content.
22 Citations
3 Claims
-
1. A secure method to update software embedded in a security module, this method comprising the following steps:
-
formation of a first updating program block, determination of a target memory zone of said security module, determination of a pre-registered content in said target memory zone of said security module, formation of a second program block by mixing all or a part of the pre-registered content with the first updating program block, transmission of the second program block to the security module, reception of the second program block by the security module, reading of the content of the target memory zone, obtaining the first updating program block from the second program block by using the target memory zone content as a key and by inverse mixing the target memory zone content and all or part of the second program block; and overwriting the target memory zone content with the obtained first updating program block, wherein the pre-registered content in said target memory zone of said security module is made up of a program code executable by the security module. - View Dependent Claims (2, 3)
-
Specification