Patent classifications
G06K19/07363
Chip card with on/off mechanisms
Chip cards that are protected from unauthorized access to information and instructions stored in the chip card's chip by unauthorized persons using illicit devices that emulate chip readers to interrogate the chips in chip cards and obtain or download confidential data stored in the chips. The chip cards are disabled when not ready to be used, such that the chips cannot be accessed by illicit devices, thus protecting the chip card owner and/or issuer from potential losses.
Compact supply voltage glitch sensor with adaptive amplitude sensitivity
A circuit includes a voltage comparator with an output, a first input and a second input, the first input being coupled to a first reference voltage terminal. An operational transconductance amplifier has an output coupled to the second input of the voltage comparator, an inverting input coupled to the output of the operational transconductance amplifier, and a non-inverting input coupled to a second reference voltage terminal. A filter capacitor is coupled in series between a power supply terminal and the second input of the voltage comparator.
COMPACT SUPPLY VOLTAGE GLITCH SENSOR WITH ADAPTIVE AMPLITUDE SENSITIVITY
A circuit includes a voltage comparator with an output, a first input and a second input, the first input being coupled to a first reference voltage terminal. An operational transconductance amplifier has an output coupled to the second input of the voltage comparator, an inverting input coupled to the output of the operational transconductance amplifier, and a non-inverting input coupled to a second reference voltage terminal. A filter capacitor is coupled in series between a power supply terminal and the second input of the voltage comparator.
Method for managing the value of the supply voltage for a module of an integrated circuit, and associated integrated circuit
The supply voltage for a module of an integrated circuit managed to support protection against side channel attacks. Upon startup of the integrated circuit, one action from the following actions is selected in response to a command: supplying the module with the supply voltage having a fixed value that is selected from a plurality of predetermined values, or varying the value of the supply voltage in time with a pulsed signal.
Device and method for managing the current consumption of an integrated module
An electronic device includes a logic circuit and an auxiliary circuit. The logic circuit includes a first terminal coupled to a supply voltage terminal, a second terminal intended coupled to a reference voltage terminal and an output terminal configured to deliver a signal in a high state or a low state. The auxiliary circuit is coupled between the first terminal and the second terminal and is configured to randomly generate or not generate an additional current between the first terminal and the second terminal on each change of state of the signal on the output terminal.
METHOD FOR MANAGING THE VALUE OF THE SUPPLY VOLTAGE FOR A MODULE OF AN INTEGRATED CIRCUIT, AND ASSOCIATED INTEGRATED CIRCUIT
The supply voltage for a module of an integrated circuit managed to support protection against side channel attacks. Upon startup of the integrated circuit, one action from the following actions is selected in response to a command: supplying the module with the supply voltage having a fixed value that is selected from a plurality of predetermined values, or varying the value of the supply voltage in time with a pulsed signal.
Processor power supply glitch detection
A transaction device includes circuitry that provides a power supply to a processor of the transaction device. Attackers may attempt to glitch the processor power supply in a manner that causes processor to operate incorrectly such as by skipping instructions. A monitoring circuit may be coupled to the processor power supply circuitry to identify conditions that are indicative of a glitch attempt. Glitch attempts may be stored in a memory and reported to the processor to induce the execution of counter-measures.
Secure data storage
The disclosure relates to secure data storage and retrieval, in particular to methods and circuits for securely storing data to reduce the possibility of leakage via side channel attacks. Embodiments disclosed include a method of storing a value comprising a series of words, the method comprising: i) combining in a series of XOR operations a word of a first portion of the value, a word of a second portion of the value and an output word of a first random number generator to provide a first combined word; ii) storing the first combined word in a shift register; and iii) repeating steps i) and ii) for each successive word of the first and second portions of the value.
Integrated circuit protection method, and corresponding integrated circuit
An integrated circuit includes a number of components disposed at a surface of a semiconductor body and an interconnect region connecting the components into a functional circuit. A metallic shield is also produced in the interconnect region. A configurable stage is configurable to operate in a receiving antenna configuration or in a detection configuration during which the integrated circuit is configured to detect a presence of an external electromagnetic radiation representative of an attack by injection of faults.
Device and Method for Managing the Current Consumption of an Integrated Module
An electronic device includes a logic circuit and an auxiliary circuit. The logic circuit includes a first terminal coupled to a supply voltage terminal, a second terminal intended coupled to a reference voltage terminal and an output terminal configured to deliver a signal in a high state or a low state. The auxiliary circuit is coupled between the first terminal and the second terminal and is configured to randomly generate or not generate an additional current between the first terminal and the second terminal on each change of state of the signal on the output terminal.