×

Method of secure management of a memory space for microcontroller

  • US 9,703,727 B2
  • Filed: 04/04/2013
  • Issued: 07/11/2017
  • Est. Priority Date: 04/18/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of management of an electronic microcontroller system for ensuring a check of write-access rendered non-modifiable, the microcontroller system including:

  • a first processor configured to execute a non-secure application, anda second processor configured to execute a secure application that implements a security function,the first and second processors configured to access to a shared memory space, andthe first processor configured to implement the check of write-access, and to manage write-access to the shared memory space that is non-modifiable when the secure application implements the security function,the method, comprising;

    apportioning the shared memory space between a memory area allocated to the secure application and a memory area allocated to the non-secure application, the memory area allocated to the secure application including a reserved area for the secure application;

    allocating a buffer in the memory space allocated to the non-secure application;

    loading a set of rules of access to the shared memory space into the buffer, the set of rules including a rule prohibiting writing by the non-secure application in the reserved area of the memory area allocated to the secure application;

    checking, by the secure application, whether the non-secure application writes in the reserved area of the memory area allocated to the secure application according to the set of rules of access to the shared memory space;

    controlling, by the first processor, access of the non-secure application to the reserved area of the memory area allocated to the secure application according to the set of rules of access to the shared memory space, whereinthe secure application implements the security function to verify integrity of the reserved area of the memory area allocated to the secure application and integrity of code and data corresponding to the secure application, andthe non-secure application involves a non-guaranteed level of functional security and integrity without the security function implemented in the secure application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×