Abstract:
The process involves facilitating a computer system to store a set of references to a program, obtained by a licit unit. The system is allowed to verify whether reference values in the program are the stored valid references, before performing any reading or writing operation related to the values. The operation is prevented from execution when the values are not the valid references, else the operation is executed.
Abstract:
Le procédé de partage de temps d'exécution d'un processeur (1) physique entre au moins deux logiciels, ledit processeur comportant un mode d'exécution particulier, dit mode sécurisé, ayant un accès exclusif sur certaines ressources (3, 8, 9), etun premier logiciel, dit de sécurité, étant exécuté exclusivement dans le mode d'exécution sécurisé, etun second logiciel, dit non sûr, étant exécuté dans un mode d'exécution autre que le mode d'exécution sécurisé,est caractérisé en ce qu'il comprend les étapes suivantes :a) on définit un cycle périodique et régulier d'exécution des logiciels par le processeur,b) on découpe ce cycle en deux parties, l'une pour l'exécution du logiciel de sécurité, et l'autre pour l'exécution du logiciel non sûr.
Abstract:
The process involves automatically modifying programs by inserting additional actions intended to simulate a Java card environment. Services i.e. functional libraries, proposed by the Java card environment and necessary for the execution of the programs are added to a Java environment. The modification allows change of the format of the programs to render compatible with the format of execution of the Java environment.
Abstract:
Dynamic code suppression method has the following steps: determination of fragments of a program that could be suppressed under certain conditions without modifying the semantics; instrumentation of the program to mark program segments and the conditions under which they could be suppressed; possible conversion of a program to increase the available memory by suppressing the suppressible fragments; structuring of memory to enable reuse of the corresponding liberated memory.
Abstract:
A method and system for transforming and verifying downloaded programs fragments with data type restriction in an embedded system in which a program fragment being temporarily stored a verification process of the stored program fragment object code is executed instruction by instruction so as to discriminate for each instruction the existence of a target, a branching instruction target, a target of an exception handler call or a target of a subroutine call. On the occurrence of a target of a branching instruction as the current instruction, the empty status of the stack is verified and the program fragment is rejected otherwise. A verification process and updating of the effect of the current instruction on the data types of the type stack and the table of register types is performed. The verification process is successfully executed instruction by instruction until the table of register types is stable, with no modification being present, and interrupted with the program fragment being rejected otherwise.
Abstract:
In order to secure messages that are exchanged in a data transmission network between a server (1) and a client (2), a control device that is decentralized or represents the authority (3) is permanently inserted into the network between the server (1) and the user (2) during the secured exchange of messages. Said representative of the authority (3) translates the transmitted messages and carries out the message verifications that have been decided by the authority. Said representative of the authority (3) can be a specific microprocessor card, for example, which is permanently inserted between the server (1) and the client (2), whereby the authority does not need to be directly involved in the transactions and no permanent connection with the authority is required.
Abstract:
L'invention concerne un protocole de gestion et un procédé de vérification d'un fragment de programme, ou appliquette, téléchargé sur un système embarqué. Une commande de téléchargement (100a, 100b) de l'appliquette est effectuée. Sur réponse positive, le code objet de l'appliquette est lu (101) et soumis (102) à une vérification instruction par instruction. La vérification consiste en une étape d'initialisation de la pile des types et du tableau des types de registres représentant l'état de la machine virtuelle d u système embarqué au début de l'exécution du code de l'appliquette et en une vérification, instruction par instruction pour chaque instruction courante cible, de l'existence d'une cible d'instruction de branchement, d'appel d'un gestionnaire d'exceptions ou d'un appel de sous-routine, et par une vérification et une actualisation de l'effet de cette instruction sur la pil e des types et le tableau des types de registres. Sur vérification réussie (103a), l'appliquette est enregistrée (104) et un accusé de réception est envoyé (105) au lecteur de téléchargement. L'appliquette est détruite (106) sinon. Application aux systèmes embarqués en environnement Java.
Abstract:
The invention relates to a method for processing application data. A first device stores data relating to at least one application. According to the invention,the method comprises the following step. The first device deletes at least stored executable data relating to at least one application. The invention also relates to a corresponding first device.
Abstract:
A mobile station includes a radio section which communicates with a base station, and a short-range radio section for performing short range radio communication independently of the radio section. A backlight mounted on a display portion of the mobile station can be selectively turned on and off. The operation of the short-range radio section is disabled when the backlight is deactivated, and the operation of the short-range radio section is enabled when the backlight is activated.