Abstract: The invention relates to a method for loading, installing and running software, called loading units, having different levels of confidence by a data processing unit (1). The invention consists of at least associating at least one structure of information data concerning security requirements and characteristics of this loading unit with each loading unit (2, 3, 7); associating a dynamic data structure (10) representative of the state of security in the data processing unit (1) to the data processing unit (1); validate the security requirements and characteristics of each loading unit (2, 3, 7) with regard to the state in the data processing unit (1) contained in said dynamic data structure (10) via an autonomous security module (9), and; if the validation is positive, authorize, via the security module (9), the loading, installation or running of the loading unit (2, 3, 7).
Type:
Application
Filed:
December 27, 2005
Publication date:
November 12, 2009
Applicant:
Trusted Logic
Inventors:
David Leporini, Vincent Prunet, Daniel Le Metayer
Abstract: A method for compressing an interpreted object code in a system using an interpreter, by identifying, in the interpreted object-coded program, similar non-contiguous groups of instructions, of arbitrarily complex structure, by replacing all or part of said groups in the interpreted object code of the program with newly-created specialized instructions and by instrumenting the interpreter and/or the interpreted object code of the program so as to render it capable of implementing the newly-created instructions.
Type:
Grant
Filed:
July 23, 2002
Date of Patent:
July 21, 2009
Assignee:
Trusted Logic
Inventors:
Daniel Le Metayer, Renaud Marlet, Arnaud Venet, Alexandre Frey
Abstract: According to the inventive method, the chip card, a counting function (FC), a counter (Cpt) and a private key (Cf) stored in the write-only part of the memory region are stored in a persistent memory, the counter and the private key (Cf) being accessible only by the counting function (FC). When the chip card receives a counter request emitted by an requesting entity (ER), the counting function (FC) performs a modification of the counter (Cpt) and a calculation of a signature, and sends a response to the applicant entity (ER). When the on-board system receives the response to the counter request, the signature contained in the response is checked.
Abstract: The invention concerns a method for compressing program code for execution in a system with few physical resources. This method comprises a semantic analysis of the code as to identify the objects accessed at each program point and to replace in this program groups of instructions used to access the objects by more compact specialised instructions.
Type:
Grant
Filed:
July 22, 2002
Date of Patent:
December 16, 2008
Assignee:
Trusted Logic
Inventors:
Daniel Le Metayer, Renaud Marlet, Arnaud Venet, Alexandre Frey
Abstract: The invention relates to a method for enabling a new version of an application to be loaded onto a computer processing device. According to said method, information on the correspondence (I1, I3, I4, I6) between the classes (A to D) of the old version of the application and the classes (A to F) of the new version of the application, and information about correspondence between the static fields of the old version of the application and static fields of the new version of the application, is calculated prior to the loading. Said correspondence information is then associated in order to modify the objects in such a way that they point towards classes of the new version and use the new identifiers of the static fields of the new version of the application.
Abstract: The invention relates to a method of securing computer systems involving the logical containment of data. More specifically, the invention relates to a method of securing computer systems, which offers the possibility of executing codes that manipulate data which must be processed separately. The inventive method essentially involves the use of the following: (i) a memory manager for managing memory allocation units which can be typically a fixed-size page or a variable-size block, and (ii) memory allocation owners and requesters which can be typically user applications of the operating system of the computer system or the actual operating system. The system involves the separation of the aforementioned data by the owner and the encryption of same with a dedicated key.
Type:
Application
Filed:
December 23, 2003
Publication date:
March 16, 2006
Applicant:
Trusted Logic
Inventors:
Patrice Hameau, Daniel Le Metayer, Cedric Mesnil
Abstract: The invention relates to a method of securing computer systems comprising at least one code interpretation module and memory capacity for storing the code to be interpreted. For said purpose, the invention consists in making more difficult attacks involving physical measures and/or requiring a synchronisation with the interpreted code, by introducing variants into the interpreted code runtimes and the measurable physical prints.
Abstract: An existing active base logic flow between a master transceiver and a slave transceiver, is selected as reference logic flow wherein is generated a set of concurrent logic flows. The concurrent logic flows are built with successive elementary packets segmenting pairs of command/response. An exchange of pairs of command/response is initialised and continued by the master transceiver on the basis of specific commands. The slave transceiver triggers a segmentation by transmitting specific responses on the reference logic flow.