Processing

Please wait...

Settings

Settings

Goto Application

1. WO2011000632 - METHOD OF AUDITING THE WEAR OF A MEMORY EMBEDDED IN A SECURE ELECTRONIC TOKEN

Publication Number WO/2011/000632
Publication Date 06.01.2011
International Application No. PCT/EP2010/057011
International Filing Date 20.05.2010
IPC
G01R 31/317 2006.01
GPHYSICS
01MEASURING; TESTING
RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
31Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
28Testing of electronic circuits, e.g. by signal tracer
317Testing of digital circuits
G11C 16/34 2006.01
GPHYSICS
11INFORMATION STORAGE
CSTATIC STORES
16Erasable programmable read-only memories
02electrically programmable
06Auxiliary circuits, e.g. for writing into memory
34Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
CPC
G01R 31/31719
GPHYSICS
01MEASURING; TESTING
RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
31Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
28Testing of electronic circuits, e.g. by signal tracer
317Testing of digital circuits
31719Security aspects, e.g. preventing unauthorised access during test
G11C 16/3495
GPHYSICS
11INFORMATION STORAGE
CSTATIC STORES
16Erasable programmable read-only memories
02electrically programmable
06Auxiliary circuits, e.g. for writing into memory
34Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
349Arrangements for evaluating degradation, retention or wearout, e.g. by counting erase cycles
3495Circuits or methods to detect or delay wearout of nonvolatile EPROM or EEPROM memory devices, e.g. by counting numbers of erase or reprogram cycles, by using multiple memory areas serially or cyclically
H04W 4/70
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Applicants
  • GEMALTO SA [FR]/[FR] (AllExceptUS)
  • FAURE, Frédéric [FR]/[FR] (UsOnly)
  • CHARLES, Yan [FR]/[FR] (UsOnly)
Inventors
  • FAURE, Frédéric
  • CHARLES, Yan
Priority Data
09305642.202.07.2009EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) METHOD OF AUDITING THE WEAR OF A MEMORY EMBEDDED IN A SECURE ELECTRONIC TOKEN
(FR) PROCÉDÉ DE VÉRIFICATION DE L'USURE D'UNE MÉMOIRE INCORPORÉE DANS UN JETON ÉLECTRONIQUE SÉCURISÉ
Abstract
(EN)
The invention is a method of auditing the wear of a non volatile memory embedded in a secure electronic token. The non volatile memory comprises a basic unit. The token is associated with a mission profile which is intended to reflect the use of the non volatile memory for a preset duration. The token comprises a first counter which is updated each time a data is written or erased in the basic unit. The token is intended to execute applicative commands. The token comprises a second counter. The method comprises the step of a) updating the second counter each time an applicative command belonging to a preset set is executed, b) sending the two counters to a distant machine, c) comparing the two counters to the mission profile.
(FR)
L'invention porte sur un procédé de vérification de l'usure d'une mémoire rémanente incorporée dans un jeton électronique sécurisé. La mémoire rémanente comporte une unité de base. Le jeton est associé à un profil de mission qui est destiné à refléter l'utilisation de la mémoire rémanente pendant une durée prédéterminée. Le jeton comporte un premier compteur qui est mis à jour à chaque fois qu'une donnée est écrite ou effacée dans l'unité de base. Le jeton est destiné à exécuter des ordres d'application. Le jeton comporte un second compteur. Le procédé comporte les étapes suivantes : a) la mise à jour du second compteur à chaque fois qu'un ordre d'application appartenant à un ensemble prédéterminé est exécuté, b) l'envoi des deux compteurs à une machine distante, c) la comparaison des deux compteurs avec le profil de mission.
Latest bibliographic data on file with the International Bureau