Method for dynamically authenticating programmes with an electronic portable object

作者: Benoit Chevallier-Mames , Pascal Paillier , David Naccache

DOI:

关键词: Computer scienceObject (computer science)Protocol (object-oriented programming)Computer networkPortable objectKey (cryptography)Operating systemAuthenticationExecutable

摘要: The invention concerns a method for dynamically authenticating an executable programme, that is the continuation of instructions defined thereby. More specifically, authentication programme performed repeatedly during very execution said programme. making secure electronic portable object through P supplied by another insecure uses, inter alia, secret key protocol.

参考文章(10)
Aidan T. Hughes, Raymond Fowkes, Joel Downer, Runtime digital signatures ,(2003)
Norman Apperson, Brian C. Beckman, System and method for safety distributing executable objects ,(1996)
Russell Norman Mirov, Gregory Charles Onufer, Method and apparatus for firmware authentication ,(1997)
John J. Lambert, Trevor W. Freeman, Credentials and digitally signed objects ,(2003)
Eric Balard, Jerome Azema, Alain Chateau, Run-time firmware authentication ,(2003)
J.-P. Tual, MASSC: a generic architecture for multiapplication smart cards IEEE Micro. ,vol. 19, pp. 52- 61 ,(1999) , 10.1109/40.798109
George C. Necula, Peter Lee, Safe to execute verification of software ,(1997)
Josh D. Benaloh, Ling Tony Chen, Jon Lange, Daniel R. Simon, Dinarte Morais, Use of hashing in a secure boot loader ,(2003)