Movatterモバイル変換


[0]ホーム

URL:


HK1007818B - Data-protecting microprocessor circuit for portable record carriers, for example credit cards - Google Patents

Data-protecting microprocessor circuit for portable record carriers, for example credit cards
Download PDF

Info

Publication number
HK1007818B
HK1007818BHK98106925.0AHK98106925AHK1007818BHK 1007818 BHK1007818 BHK 1007818BHK 98106925 AHK98106925 AHK 98106925AHK 1007818 BHK1007818 BHK 1007818B
Authority
HK
Hong Kong
Prior art keywords
microprocessor
circuit
memory
address
microprocessor circuit
Prior art date
Application number
HK98106925.0A
Other languages
German (de)
French (fr)
Chinese (zh)
Other versions
HK1007818A1 (en
Inventor
Dr. Weikmann Franz
Original Assignee
Gao Gesellschaft Fur Automation Und Organisation Mbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE4115152Aexternal-prioritypatent/DE4115152C2/en
Application filed by Gao Gesellschaft Fur Automation Und Organisation MbhfiledCriticalGao Gesellschaft Fur Automation Und Organisation Mbh
Publication of HK1007818BpublicationCriticalpatent/HK1007818B/en
Publication of HK1007818A1publicationCriticalpatent/HK1007818A1/en

Links

Description

The invention relates to a data protection microprocessor circuit as defined in claim 1.
The use of such micro-processor circuits is preferred in so-called chip cards, i.e. identity cards, credit cards, booking cards and the like, which are equipped with an integrated circuit.
In order to facilitate the understanding of the invention, the following description is intended to refer to the application of the microprocessor circuit to cards.
A card with a microprocessor was first described in DE-OS 27 38 113. One of the main advantages of such a card is its versatility for the cardholder. The microprocessor and associated storage devices contained in the card's integrated circuit allow extensive data processing in the card itself, whereas cards such as those equipped with magnetic strips require all data processing operations to be performed externally.
The card manufacturer may equip the microprocessor with a fixed-memory operating system that performs basic functions, such as procedures for comparing an externally entered code with a stored code, etc. The memory of the microprocessor is used not only to store the operating system but also to store certain applications and parameters, e.g. those necessary for security verification and which must in any case be kept secret.
The multi-faceted application of cards is achieved by starting from an operating system with associated programs, defining certain interfaces and reserving a memory or storage area for a so-called third-party program. The card manufacturer then provides the users, i.e. the card issuing organizations, with a memory or storage area for the programming of their third-party program. In this third-party program, the organization can then specify specific operations that are independent of the operating system and that only concern the specific organization.
Another possible variant is that not only one organization would program its foreign program into the prefabricated chip card, but several different organizations would store their corresponding programs.
In any case, it must be ensured that security-related data which are part of the operating system or even of individual third party programmes are protected from unauthorised access.
The purpose of the invention is to specify a circuit which, by means of simple measures, ensures that access by a third party program can be obtained only to those areas of memory which are expressly authorized for access.
The problem is solved according to the invention by the features given in claims 1 and 12.
According to a first embodiment of the invention, the data protection circuit consists of a first device to monitor the address being accessed, a second device to monitor the microprocessor program counter and another device that combines the signals of the monitoring devices to generate a blocking signal.
The control of the program counter status enables the protection circuit to determine at any time which of the loaded programs is currently running, and at the same time to monitor the address called by the respective active program, the linking circuit can easily respond to unauthorized memory access, for example by sending a reset signal to the microprocessor.
The protection circuit is decoupled from the actual microprocessor, but preferably provided on the integrated circuit containing the microprocessor. By specifying appropriate settings for the respective program counter level and addresses, any storage areas that are allowed or not allowed for a particular user can be defined. If certain storage areas are selectively blocked from reading or writing, the write/read signal of the microprocessor in the protection circuit must be processed accordingly.
Another embodiment of the invention provides that the protective circuit is formed by a microprocessor called a backup processor which monitors the microprocessor called a work processor running the third party programs. This means that the work processor is under constant control of the backup processor, which releases the work processor after each reset and subsequent initialization phase. If the backup processor detects that the work processor running a particular third party program is accessing an unauthorized memory area, the backup processor gives a blocking signal to an unmasked interrupt or reset input of the work processor.
Since the backup processor is intended to monitor all individual steps of the work processor, it will conveniently operate at a higher clock rate than the work processor.
If several foreign programs are stored in the memory allocated to the work processor, access to the operating system and other foreign programs must be prevented. The necessary settings are conveniently stored as limit values in a memory allocated to the backup processor. To this end, a limit value memory is allocated to the backup processor in which the limits for the monitored addresses and for the possible contents of the program counter of the memory are stored. These areas are not accessible to the work processor.
The blockage of the execution of a third-party program in case of unauthorized memory access can also be achieved by allowing only a certain set of interpretable commands. The commands of the third-party program are then executed under the control of the operating system, ensuring that access is only to those areas to which access is expressly permitted. The microprocessor's program counter never comes under the control of the third-party program.
In addition to the above mentioned possibilities, the invention provides in a further variant that several freely programmable memory areas are provided with address spaces which are equal to at least one maximum value. The highest value of each area assigned to a memory area is loaded into an auxiliary register before the address of the storage area. A locking signal is generated at each change in the data content of the auxiliary register. A specific user is defined by the microprocessor with each loading of the auxiliary register. If this user accesses an unauthorized storage area, this results in a corresponding change in the auxiliary register, which generates a protective circuit that locks the contents of the auxiliary register.
Further advantages and developments of the invention are shown by the subclaims and the examples of implementation described below, illustrated by the following figures:Figure 1a data carrier with integrated circuit,Figure 2a block diagram of a data carrier integrated circuit with microprocessor, memory and locking circuit,Figure 3a block diagram of a data carrier integrated circuit with a working processor and a backup processor and associated storage andFigure 4a block diagram of a data carrier integrated circuit with microprocessor, memory and locking circuit.
Fig. 1 shows the structure of a data carrier, e.g. a credit card 1 with a clear data field 2, a signature strip 3, and an integrated circuit 5 with connectors embedded in the card body 6. The connectors are here formed as connectors 6 in the form of two rows. The structure of such cards is basically known and is not to be explained here. The manner of use and data processing in connection with such credit cards is also known. The connecting contacts 6 are exchanged with, for example, a terminal, an ATM or the like. In the estimates of the credit cards, for example, security screens are integrated, which are necessary to allow the card to be used.
Fig. 2 shows an initial embodiment of an integrated circuit as built into the credit card. A microprocessor 10 contains a control unit 11 connected to a memory order 30 via a control line 18, an arithmetic logic unit (ALU) 12, a register 13, an address register 14 and a data register 15. A register of the register 13 serves as a program counter, the contents of which determine which address of a memory order 30 is accessed to retrieve a command from the foreign program stored there.
The address is entered into the register 30 via an address bus 17 and the data entered into or read from register 30 is entered into the register 15 via a data bus 16 and from there into a register of register 13.
The storage arrangement 30 in the example illustrated includes a read/write memory (RAM) 31, a hard disk drive (ROM) 32 and E2PROM 33. These storage areas 31, 32 and 33 belong to the operating system (OS), which contains some security-relevant data which must in any case be kept secret.
If the manufacturer wishes to make available to the user an area of the operating system which must not contain any safety-related data, the protection circuit 20 described below should be adapted accordingly in relation to the remaining addresses of the operating system to be protected.
The memory area 34 is designed as an E2PROM. The external program, which is loaded by the user, takes up the memory spaces w to x, while the operating system takes up the memory spaces 0 to w-1.
The third party program contains special routines and data to determine, for example, whether the service requested by the cardholder, e.g. a cash out, is accepted, depending, for example, on the cardholder's current account balance. After the cardholder has inserted the card into an ATM, a data exchange takes place between the ATM and the microprocessor.
To prevent the access of the third party program to addresses in memory ranges 31, 32 and 33, a protective circuit 20 is provided in accordance with the invention, which is available in addition to the microprocessor 10 and the memory arrangement 30.
The protective circuit 20 contains a first comparator 21, a first auxiliary register (HRI) 22, a second comparator 23, a second auxiliary register (HRII) 24, a D&D gate 25 and an output line 26 leading from D&D gate 25 to control circuit 11 of the microprocessor 10.
Comparator 21 compares the contents of the address register 14 and the auxiliary register 22, while Comparator 23 compares the contents of the programme counter with the contents of the auxiliary register 24.
Err1:Expecting ',' delimiter: line 1 column 141 (char 140)
While the comparator 21 gives a signal if the address in the address register 14 is smaller than the address w stored in the address register 22 (this means that the foreign program is accessing an unauthorized storage space between 0 and w - 1), the comparator 23 gives a signal if the contents of the PC program counter of register 13 are greater than or equal to the value w stored in the address register 24, the latter meaning that the foreign program is currently being executed.
If both comparators 21 and 23 give a signal, this means that the foreign program is running and that an unauthorized address outside the foreign program's address space is being accessed.
To selectively block read or write, the microprocessor read/write signal is processed in the protective circuit 20 (see line 27).
In a variation of the embodiment shown in Figure 2, additional comparators with associated auxiliary registers may be provided if additional storage areas are available for additional third-party programs to be loaded by different users.
Figure 3 shows a second embodiment of the invention: a working processor 110 with its associated memory arrangement (PROM) 130 performs essentially the same function as the microprocessor 10 with its associated memory arrangement 30 in Figure 2.
The protective circuit is a second processor, namely a backup processor 120 with its own storage arrangement 150.
A C1 operating clock signal determines the working speed of the fuse processor 120; a sub-circuit 140 divides the clock signal frequency by n, so that the working processor 110 which receives the output signal of the sub-circuit 140 operates only at 1/nth the speed of the fuse processor 120.
The backup processor 120 contains a controller 121 that sends a reset signal to the working processor 110 when an unauthorized access to memory is detected by a third party program. To this end, the address bus 117 and the control line 118 between the working processor 110 and the storage device 130 are monitored. In addition, the working processor's program counter (PC) is monitored. Both the data on the address bus 117 and the contents of the PC program counter are compared for each third party program with certain thresholds.
The memory band 130 for the work processor 110 contains several memory bands for different users, here referred to as user I, user II... As mentioned above, these third party programs are loaded separately by one of the different organizations from the card manufacturer.
When a particular foreign program, e.g. the program stored in memory compartment 134 of user I, is executed by the working processor 110 after initialization, the backup processor 120 compares the respective address signals and program counter contents with the corresponding limits for that user. These limits are stored in memory arrangement 150 as part of the operating system of the backup processor 120. For example, when the foreign program of user I is executed, the contents of the PC counter must cover only a certain range of values. Furthermore, the addresses on the address bus 117 must only correspond to this range of values.
Figure 4 shows a third embodiment of the invention, whereby the operating system memory 231 associated with the microprocessor 210 is arranged separately from the memory areas 234, 235 and 236.The latter are used to host third party programs for three different users.
For example, the address space for accessing the three (PROM) ranges 234, 235, 236 contains 16 bits, with the two highest value bits determining which memory or memory range is intended for the current access.
Err1:Expecting ',' delimiter: line 1 column 414 (char 413)
At the beginning of the execution of the subprogram, i.e. the first address, the two highest values of the address register are loaded from the address bus into a second auxiliary register (HRII) 223 and a comparator 221 activates the contents of the two auxiliary registers 222 and 223 by means of a corresponding control signal 228 from the microprocessor. As long as the content of the auxiliary program 222 is in agreement with the auxiliary register 223, this means that the subprogram moves only in the address space (storage area 234) assigned to it. If another address space is accessed, the two highest values of the address register and thus the contents of the auxiliary register 223 are changed. This is determined by the comparator 221 through the microprocessor 226 and gives a reference to the microprocessor 226.

Claims (14)

  1. A data protective microprocessor circuit for preventing access to data or programs stored in memories, having at least one microprocessor, a memory for an operating system and at least one memory to be freely programmed with an individual secondary program, characterized by
    first means for monitoring the particular valid address by presetting corresponding setpoints for the particular address,
    second means for monitoring the particular content of the microprocessor program counter for detecting which of the programs is being executed at any time, and
    third means for linking the signals from the monitoring means to generate a blocking signal when a secondary program is executed which accesses an illegal address.
  2. The microprocessor circuit of claim 1, characterized in that the protective circuit comprising the first, second and third means is provided in hard-wired logic on the circuit containing the microprocessor.
  3. The microprocessor circuit of claim 1 or 2, characterized in that each monitoring means comprises an auxiliary register and a comparator, the auxiliary registers containing predetermined setpoints for address and program counter readings, and the comparators being each connected with an auxiliary register and with the program counter or address register of the microprocessor.
  4. The microprocessor circuit of claim 1 or 2, characterized in that the linking means are an AND gate which is connected with the outputs of the comparators.
  5. The microprocessor circuit of one or more of the preceding claims, characterized in that the setpoints are contained in an area of the operating system protected from access and are loaded into the auxiliary register in the course of the initialization of the microprocessor.
  6. The microprocessor circuit of one or more of the preceding claims, characterized in that the blocking signal from the linking means is conducted to the interrupt input of the microprocessor.
  7. The microprocessor circuit of one or more of the preceding claims, characterized in that the blocking signal from the linking means is conducted to the reset input of the microprocessor.
  8. The microprocessor circuit of claim 1 or 2, characterized in that the protective circuit is a second microprocessor referred to as a security processor.
  9. The microprocessor circuit of one or more of the preceding claims, characterized in that the security processor and the microprocessor controlling the secondary programs and referred to as the working processor are disposed on the same integrated circuit.
  10. The microprocessor circuit of one or more of the preceding claims, characterized in that the security processor is operated at a higher clock frequency than the working processor.
  11. The microprocessor circuit of one or more of the preceding claims, characterized in that the security processor has associated therewith a limit memory for storing limiting values for the monitored addresses and for possible contents of the program counter of the working processor which cannot be accessed by the working processor.
  12. A data protective microprocessor circuit for preventing access to data or programs stored in memories, having at least one microprocessor, a memory for an operating system and at least one memory to be freely programmed with individual secondary programs, characterized in that a plurality of freely programmable memory areas are provided whose address spaces are identical except for at least one highest-order position, means are provided for loading the particular highest-order position associated with a memory area into an auxiliary register before the addressing of a memory area, and for generating a blocking signal upon a change in the auxiliary register content in order to detect whether a secondary program is being executed which accesses an illegal address.
  13. The microprocessor circuit of claim 13, characterized in that the highest-order position or positions of the address bus are loaded into two auxiliary registers which are connected with a comparator.
  14. The microprocessor circuit of one or more of the preceding claims, characterized in that the write/read signal from the microprocessor is processed in the protective circuit to block writing or reading selectively.
HK98106925A1991-05-081998-06-26Data-protecting microprocessor circuit for portable record carriers, for example credit cardsHK1007818A1 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
DE4115152ADE4115152C2 (en)1991-05-081991-05-08 Card-shaped data carrier with a data-protecting microprocessor circuit
DE41151521991-05-08

Publications (2)

Publication NumberPublication Date
HK1007818Btrue HK1007818B (en)1999-04-23
HK1007818A1 HK1007818A1 (en)1999-04-23

Family

ID=6431312

Family Applications (1)

Application NumberTitlePriority DateFiling Date
HK98106925AHK1007818A1 (en)1991-05-081998-06-26Data-protecting microprocessor circuit for portable record carriers, for example credit cards

Country Status (8)

CountryLink
US (1)US5600818A (en)
EP (1)EP0512542B1 (en)
JP (1)JP3529800B2 (en)
AT (1)ATE148953T1 (en)
DE (2)DE4115152C2 (en)
DK (1)DK0512542T3 (en)
ES (1)ES2100249T3 (en)
HK (1)HK1007818A1 (en)

Families Citing this family (50)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5559992A (en)*1993-01-111996-09-24Ascom Autelca AgApparatus and method for protecting data in a memory address range
FR2704704B1 (en)*1993-04-281995-09-01Gemplus Card Int COMMUNICATION SYSTEM.
FR2704956B1 (en)*1993-05-061995-06-09Schlumberger Ind Sa Microprocessor with secure memory.
DE4316091A1 (en)*1993-05-131994-11-17Sel Alcatel AgMethod and system components to determine the location of a subscriber in a communication system
JPH0744672A (en)*1993-07-281995-02-14Oki Electric Ind Co LtdIc card and ic card system
FR2713803B1 (en)*1993-12-071996-01-12Gemplus Card Int Memory card and operating method.
DE69529257T2 (en)*1994-04-182003-11-13Matsushita Electric Ind Co Ltd METHOD AND DEVICE FOR AVOIDING ILLEGAL COPYING AND ILLEGAL INSTALLATION OF INFORMATION ON AN OPTICAL RECORDING MEDIUM
DE19508722A1 (en)*1995-03-101996-09-12Siemens Ag License card controlled chip card system
DE19508723A1 (en)*1995-03-101996-09-12Siemens Ag Multi-user data processing system with memory protection
US5668973A (en)*1995-04-141997-09-16Ascom Hasler Mailing Systems AgProtection system for critical memory information
JPH08305635A (en)*1995-05-011996-11-22Nec CorpOne-chip cpu
JP3590131B2 (en)*1995-05-172004-11-17株式会社東芝 Portable storage medium and portable storage medium issuing device
JPH0991396A (en)*1995-09-251997-04-04Mitsubishi Electric Corp Data storage
US5774652A (en)*1995-09-291998-06-30Smith; PerryRestricted access computer system
JP4312272B2 (en)*1995-10-062009-08-12モトローラ・インコーポレイテッド Microcontroller that restricts access to internal memory
DE19612439C2 (en)*1996-03-282001-02-01Siemens Ag Semiconductor memory device
JPH1079000A (en)*1996-09-031998-03-24Hitachi Ltd Program-writable IC card
DE19718115A1 (en)*1996-12-231998-06-25Ccs Chipcard & Comm Syst Gmbh Smart card and method of using the smart card
US5754762A (en)*1997-01-131998-05-19Kuo; Chih-ChengSecure multiple application IC card using interrupt instruction issued by operating system or application program to control operation flag that determines the operational mode of bi-modal CPU
JPH10228421A (en)*1997-02-141998-08-25Nec Ic Microcomput Syst LtdMemory access control circuit
US6272637B1 (en)*1997-04-142001-08-07Dallas Semiconductor CorporationSystems and methods for protecting access to encrypted information
US6220510B1 (en)*1997-05-152001-04-24Mondex International LimitedMulti-application IC card with delegation feature
US5920690A (en)*1997-08-111999-07-06Motorola, Inc.Method and apparatus for providing access protection in an integrated circuit
JPH11120300A (en)*1997-10-091999-04-30Fujitsu Ltd Portable card medium, method for managing memory space in portable card medium, method for issuing portable card medium, method for writing program data in portable card medium, and computer-readable recording medium on which memory space management program is recorded
DE19804784A1 (en)*1998-02-061999-08-12Philips Patentverwaltung Chip card with integrated circuit
JPH11238016A (en)*1998-02-231999-08-31Nec CorpMethod and device for memory protection
DE19834670C2 (en)*1998-07-312001-12-13Siemens Ag Method and arrangement for recognizing unauthorized write or read access to a memory area of at least one memory arranged in a microprocessor system and arrangement for carrying out the method
FR2793048A1 (en)1999-04-292000-11-03Schlumberger Systems & Service METHOD OF MANAGING CONTROLS IN SEVERAL APPLICATION FILES AND CHIP CARD FOR IMPLEMENTING THE METHOD
US6510501B1 (en)*1999-05-112003-01-21National Semiconductor CorporationNon-volatile memory read/write security protection feature selection through non-volatile memory bits
DE19923232C2 (en)*1999-05-202001-04-19Beta Res Gmbh Device and method for securing data on a chip card
EP1113387A3 (en)*1999-12-312001-11-21SCHLUMBERGER SystèmesSmart card having a non-volatile memory with a novel mapping
US6615324B1 (en)*2000-01-072003-09-02Cygnal Integrated Products, Inc.Embedded microprocessor multi-level security system in flash memory
JP4522548B2 (en)*2000-03-102010-08-11富士通フロンテック株式会社 Access monitoring device and access monitoring method
FR2808359B1 (en)*2000-04-282002-06-28Gemplus Card Int MULTI-APPLICATION CHIP CARD
DE10036278A1 (en)*2000-07-262002-02-07Bosch Gmbh RobertMonitoring the routine of an executed program, involves configuring debug logic to run exceptional condition routine if a program sequence is interrupted during the actual program run time
JP2002215460A (en)*2001-01-152002-08-02Hitachi Kokusai Electric Inc Information terminal
DE10105284A1 (en)2001-02-062002-08-29Infineon Technologies Ag Microprocessor circuit for data carriers and method for organizing access to data stored in a memory
DE10105987A1 (en)*2001-02-092002-08-29Infineon Technologies Ag Data processing device
GB2390443B (en)*2002-04-152005-03-16Alphamosaic LtdApplication registers
JP2003316649A (en)*2002-04-262003-11-07Mitsubishi Electric Corp Microprocessor
US6766425B2 (en)*2002-05-162004-07-20Delphi Technologies, Inc.Calibration method implementing segmented flash memory and RAM overlay
DE602004009039T3 (en)2003-01-312011-02-03Panasonic Corp., Kadoma SEMICONDUCTOR MEMORY CARD AND PROGRAM FOR YOUR CONTROL
JP4242682B2 (en)2003-03-262009-03-25パナソニック株式会社 Memory device
JP4713878B2 (en)*2004-12-142011-06-29株式会社東芝 Portable electronic device
JP4818793B2 (en)*2006-04-202011-11-16ルネサスエレクトロニクス株式会社 Microcomputer and memory access control method
EP1862952A1 (en)*2006-05-302007-12-05Axalto SASecure electronic device
EP1978447B1 (en)2007-04-052011-02-16STMicroelectronics (Research & Development) LimitedIntegrated circuit with restricted data access
GB2455567B (en)*2007-12-142012-12-26Icera IncSecurity circuit for power up
US20160048353A1 (en)*2014-08-132016-02-18Kabushiki Kaisha ToshibaMemory system and method of controlling memory system
JP6493672B2 (en)*2015-04-162019-04-03大日本印刷株式会社 Electronic information storage medium, abnormality detection method, abnormality detection program, and IC card

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
DE2738113C2 (en)*1976-09-061998-07-16Gao Ges Automation Org Device for performing machining operations with an identifier
US4328542A (en)*1979-11-071982-05-04The Boeing CompanySecure implementation of transition machine computer
US4488256A (en)*1981-11-231984-12-11Motorola, Inc.Memory management unit having means for detecting and preventing mapping conflicts
NL8201847A (en)*1982-05-061983-12-01Philips Nv DEVICE FOR PROTECTION AGAINST UNAUTHORIZED READING OF PROGRAM WORDS TO BE MEMORIZED IN A MEMORY.
US4525599A (en)*1982-05-211985-06-25General Computer CorporationSoftware protection methods and apparatus
US4521853A (en)*1982-06-301985-06-04Texas Instruments IncorporatedSecure microprocessor/microcomputer with secured memory
US4558176A (en)*1982-09-201985-12-10Arnold Mark GComputer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
US4519036A (en)*1983-01-051985-05-21Emi LimitedProgram storage hardware with security scheme
JPS6068441A (en)*1983-09-221985-04-19Fujitsu Ltd One chip micro computer
US4689766A (en)*1984-11-161987-08-25Zenith Electronics CorporationSystem for resetting the operation of a signal processing device upon the failure of accessng a predetermined memory location within a predetermined time interval
JPH0818473B2 (en)*1985-07-311996-02-28トッパン・ムーア株式会社 IC card that can set confidentiality level
JP2537199B2 (en)*1986-06-201996-09-25株式会社東芝 IC card
US4975878A (en)*1988-01-281990-12-04National SemiconductorProgrammable memory data protection scheme
US5023776A (en)*1988-02-221991-06-11International Business Machines Corp.Store queue for a tightly coupled multiple processor configuration with two-level cache buffer storage
DE3901457A1 (en)*1989-01-191990-08-02Strahlen Umweltforsch Gmbh METHOD FOR ADDRESS AREA MONITORING IN REAL-TIME DATA PROCESSING DEVICES
US5099516A (en)*1989-06-121992-03-24Dell Corporate Services CorporationDigital computer code word identification system
US5263158A (en)*1990-02-151993-11-16International Business Machines CorporationMethod and system for variable authority level user access control in a distributed data processing system having multiple resource manager
US5341497A (en)*1991-10-161994-08-23Ohmeda Inc.Method and apparatus for a computer system to detect program faults and permit recovery from such faults

Similar Documents

PublicationPublication DateTitle
HK1007818B (en)Data-protecting microprocessor circuit for portable record carriers, for example credit cards
HK1007818A1 (en)Data-protecting microprocessor circuit for portable record carriers, for example credit cards
US5912453A (en)Multiple application chip card with decoupled programs
US5452431A (en)Microcircuit for a chip card comprising a protected programmable memory
KR100205740B1 (en)A secure application card for sharing application data and procedures among a plurality of microprocessors
JP3517680B2 (en) Secure memory card with program-controlled security access control
US5237616A (en)Secure computer system having privileged and unprivileged memories
EP0596276A2 (en)Secure memory card
US6202176B1 (en)Method of monitoring the correct execution of software programs
US5991858A (en)Multi-user data processing system with storage protection
EP1242891B1 (en)Partitioned memory device having characteristics of different memory technologies
US7260690B2 (en)Microprocessor circuit for data carriers and method for organizing access to data stored in a memory
JPH087780B2 (en) Data carrier for storing and processing data
EP0735488A1 (en)Multi-program execution controlling apparatus and method
US4819204A (en)Method for controlling memory access on a chip card and apparatus for carrying out the method
US6499092B1 (en)Method and apparatus for performing access censorship in a data processing system
US4580039A (en)Circuit arrangement for the protection of data in volatile write-read memories (RAM)
JPH01219982A (en) IC card
CA2489737C (en)Electronic data processing device with secured memory access
US6814297B2 (en)Method and arrangement for controlling access to EEPROMs and a corresponding computer software product and a corresponding computer-readable storage medium
RU2198424C2 (en)Microcomputer
RU2169951C2 (en)Semiconductor memory device
WO1995024698A1 (en)A secure memory card
US7806319B2 (en)System and method for protection of data contained in an integrated circuit
EP1544820A1 (en)Electronic data processing device

[8]ページ先頭

©2009-2025 Movatter.jp