20110231709 | Method for checking data consistency in a system on chip - The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving cryptographic keys, inserting or suppressing instructions to bypass security processes, modifying programs or memory content etc. The system on chip comprises a core including at least two processors, registers, and a data consistency check module. The core is connected to at least one set of memories containing zones for instructions of a first program and of a second program, said instructions being to be executed respectively by the first and second processor, which respectively produce and store result data into the registers and the memories. The data consistency check module is configured to verify conformity of the produced result data by comparing a test result obtained by carrying out a predetermined function F over one of the first or second result data with the corresponding second or first result data and to continue execution of instructions of each program when the comparison is successful, or stop execution when the comparison shows an error. | 09-22-2011 |
20130276149 | SECURE MEMORY MANAGEMENT SYSTEM AND METHOD - The present invention describes a system and a method for securely loading digital information from an external storage device in a non-trusted environment into a memory module in a trusted environment within a data processing system. A master mode and a service mode are described, the master mode being when the secure loading is requested by a secure processor residing within the trusted environment and the service mode being when the loading is requested by an element which is external to the trusted environment i.e. in the non-trusted environment. The system comprises at least one storage device, one memory module and at least one first processor, and further comprises a memory access controller module connected between the processor and the memory module, and a secure memory management module connected to the processor, the memory module, the storage device and the memory access controller. Requests for data made by either the first processor or the external element are passed to the secure memory management module, which loads the data from the storage device to the memory module and configures the memory access controller such that the processor will have access to the data. | 10-17-2013 |