Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Electronic assembly comprising a disabling module

a technology of electronic assembly and disabling module, which is applied in the direction of unauthorized memory use protection, multi-programming arrangement, instruments, etc., can solve the problems of inability to secure the terminal, not being convenient for human users, and no longer guaranteeing the security of terminal data

Inactive Publication Date: 2014-05-29
OBERTHUR TECH SA
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention is a way to secure an electronic device and reduce harmful software corruption. It allows for remote activation and automated security measures, as well as user verification and the addition of extra functionalities through a patch on the operating system. The technical effects of this invention include improved security and protection against corruption for electronic devices.

Problems solved by technology

If the Rich-OS operating system is corrupt the security of terminal data is no longer guaranteed.
However this is not a convenient solution for human users since they can no longer use their terminal which is evidently not desirable especially in the event of an emergency (call to an emergency number impossible).
Therefore in the case in which the user uses the terminal with insufficient network connection (e.g. network hole or faulty network) or no network connection (e.g. in aircraft mode) securing of the terminal cannot be made.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic assembly comprising a disabling module
  • Electronic assembly comprising a disabling module
  • Electronic assembly comprising a disabling module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]FIG. 1 illustrates an electronic device 1 according to one embodiment of the invention. In this example, the electronic device is a terminal e.g. a touchpad, laptop computer or a mobile telephone.

[0045]As a variant, it could have been a device of machine-to-machine type, such as a computer on-board a vehicle, or a smartcard such as a bank card or an electronic identity document.

[0046]In the example in FIG. 1, the terminal comprises an electronic assembly 10 conforming to the invention and a secure element 20.

[0047]In this example, the electronic assembly itself 10 comprises a processor 300 and a memory 500 in which in particular the code of two operating systems is stored, namely that of a Rich-OS operating system referenced 100 and that of a trusted operating system referenced 200.

[0048]These two operating systems are jointly started up, on start-up of the terminal 1. As is known to persons skilled in the art, the secure execution environment of the trusted operating system 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly.

Description

BACKGROUND OF THE INVENTION[0001]The present invention lies within the field of securing electronic devices e.g. terminals or smartcards, comprising several execution environments of which at least one is a trusted execution environment and another is a Rich-OS execution environment.[0002]A trusted execution environment is implemented by means of a secure processor, possibly being a processor dedicated to this task or possibly having other functions, and a secure rewrite non-volatile memory; it is based on a trusted operating system. Therefore applications depending on the trusted operating system originate from trusted or certified sources over which the user of the terminal has no control.[0003]Similarly, a Rich-OS execution environment is based on a rich operating system allowing the execution of applications of various origins such as the Internet.[0004]These two operating systems may be executed for example on one same chipset of the terminal.[0005]In addition, the trusted oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/57G06F21/55
CPCG06F21/55G06F21/57G06F11/28H04W12/12G06F21/629H04W12/082G06F21/74G06F11/30G06F9/48G06F21/56
Inventor BOUSQUET, NICOLASSIERRA, YANNICK
Owner OBERTHUR TECH SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products