Abstract:
A hardware secure module (HSMa) is described. The hardware secure module (HSMa) comprises a processing unit (106b) and a cryptographic coprocessor (106c). The cryptographic coprocessor (106c) comprises a key storage memory (1064) for storing at least one cryptographic key (MK, CK), a first interface (1068) configured to receive source data (SD) to be processed, a hardware crypto engine (1066) configured to process the source data (SD) as a function of at least one cryptographic key (MK, CK) stored in the key storage memory (1064), a second interface (1060) configured to receive a first cryptographic key (CK) from the processing unit (106b), and a hardware key management circuit (1074) configured to store the first cryptographic key (CK) in the key storage memory (1064). In particular, the cryptographic coprocessor (106c) comprises a third interface (1070) configured to receive a second cryptographic key (MK), wherein the hardware key management circuit (1074) is configured to store the second cryptographic key (MK) in the key storage memory (1064). The hardware secure element (HSMa) comprises a non-volatile memory (110) adapted to store the second cryptographic key (MK), and a hardware configuration module (106d) configured to read the second cryptographic key (MK) from the non-volatile memory (110) and send the second cryptographic key (MK) to the second interface (1060).
Abstract:
A processing system (10a) is described. The processing system (10a) comprises a first processing unit (102a), a second processing unit (106b) and cryptographic coprocessor (106c). Specifically, the cryptographic coprocessor (106c) comprises: - a key storage memory (1064) for storing at least one cryptographic key, - a first interface (1068) configured to receive source data to be processed directly from the first processing unit (102a), - a hardware crypto engine (1066) configured to process the source data as a function of at least one cryptographic key stored in the key storage memory (1064), - a second interface (1060) configured to receive a first cryptographic key (CK) directly from the second processing unit (106b), and - a hardware key management circuit (1074) configured to store the first cryptographic key (CK) in the key storage memory (1064).
Abstract:
A processing system is described. The processing system comprises a processing unit (102) and at least one configuration data client (112), each configuration data client (112) comprising a register, wherein each configuration data client (112) is configured to receive configuration data (CD) and store the configuration data (CD) received in the respective register. At least one hardware block is configured to change operation as a function of the configuration data (CD) stored in the registers of the at least one configuration data client (112). Specifically, a non-volatile memory (104) comprises the configuration data (CD), and a hardware configuration module (108) is configured to read the configuration data (CD) from the non-volatile memory (104) and transmit the configuration data (CD) to the at least one configuration data client (112). Specifically, the hardware configuration module (108) is configured to: - receive a command (CMD) from the processing unit (102), wherein the command (CMD) comprises an access request to the configuration data stored in the register of one of the at least one configuration data client (112); and - selectively execute the access request.
Abstract:
A device, including a main element (ME) and a set of at least two auxiliary elements (SEi), said main element including a master SWP interface (MINT), each auxiliary element including a slave SWP interface (SLINTi) connected to said master SWP interface of said NFC element through a controllably switchable SWP link (LK) and management means (PRM, CTLM, AMGi) configured to control said SWP link switching for selectively activating at once only one slave SWP interface on said SWP link.
Abstract:
The NFC controller analyzes (51) incoming SELECT by DF name commands, and decides according a predefined DF name table to which secure element the actual SELECT command and all following commands shall be sent for processing.