FR3113963B1 - Chaine de confiance avancee en aeronautique domaine de l'invention - Google Patents

Chaine de confiance avancee en aeronautique domaine de l'invention Download PDF

Info

Publication number
FR3113963B1
FR3113963B1 FR2009145A FR2009145A FR3113963B1 FR 3113963 B1 FR3113963 B1 FR 3113963B1 FR 2009145 A FR2009145 A FR 2009145A FR 2009145 A FR2009145 A FR 2009145A FR 3113963 B1 FR3113963 B1 FR 3113963B1
Authority
FR
France
Prior art keywords
metadata
binary code
digest
trust
binary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR2009145A
Other languages
English (en)
Other versions
FR3113963A1 (fr
Inventor
Stéphane Monnier
Alexandre Fine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales SA
Original Assignee
Thales SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thales SA filed Critical Thales SA
Priority to FR2009145A priority Critical patent/FR3113963B1/fr
Priority to US17/463,144 priority patent/US11876912B2/en
Publication of FR3113963A1 publication Critical patent/FR3113963A1/fr
Application granted granted Critical
Publication of FR3113963B1 publication Critical patent/FR3113963B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/68Special signature format, e.g. XML format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

Procédé mis en œuvre par un calculateur avionique embarqué pour exécuter une pluralité de codes binaires associés à une pluralité d’ensembles de métadonnées, dans lequel: la pluralité de codes binaires et la pluralité de métadonnées sont hiérarchisés en un nombre de niveaux au moins égal à deux ; un premier code binaire, d’un niveau, est associé à un premier ensemble de métadonnées dudit niveau, et un deuxième code binaire d’un niveau inférieur, lui-même associé à un deuxième ensemble de métadonnées dudit niveau inférieur; le premier ensemble de métadonnées comprend une signature de données, lesdites données comprenant moins un premier condensat associé au premier code binaire, et le deuxième ensemble de métadonnées comprend une clé publique ; ledit procédé comprenant l’exécution, par le deuxième code binaire, des étapes suivantes: application d’une fonction de hachage pour obtenir un deuxième condensat du premier code binaire ; décryptage de la signature avec ladite clé publique pour obtenir ledit premier condensat ; autorisation de l’exécution du code binaire, si et seulement si et seulement si le premier condensat est identique au deuxième. Figure 3
FR2009145A 2020-09-10 2020-09-10 Chaine de confiance avancee en aeronautique domaine de l'invention Active FR3113963B1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
FR2009145A FR3113963B1 (fr) 2020-09-10 2020-09-10 Chaine de confiance avancee en aeronautique domaine de l'invention
US17/463,144 US11876912B2 (en) 2020-09-10 2021-08-31 Aerospace advanced chain of trust

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR2009145 2020-09-10
FR2009145A FR3113963B1 (fr) 2020-09-10 2020-09-10 Chaine de confiance avancee en aeronautique domaine de l'invention

Publications (2)

Publication Number Publication Date
FR3113963A1 FR3113963A1 (fr) 2022-03-11
FR3113963B1 true FR3113963B1 (fr) 2023-06-30

Family

ID=74045617

Family Applications (1)

Application Number Title Priority Date Filing Date
FR2009145A Active FR3113963B1 (fr) 2020-09-10 2020-09-10 Chaine de confiance avancee en aeronautique domaine de l'invention

Country Status (2)

Country Link
US (1) US11876912B2 (fr)
FR (1) FR3113963B1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3113963B1 (fr) * 2020-09-10 2023-06-30 Thales Sa Chaine de confiance avancee en aeronautique domaine de l'invention

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
AU2002232464A1 (en) * 2001-02-09 2002-08-28 Microsoft Corporation Distribution of binary executables and content from peer locations/machines
US20070157146A1 (en) * 2006-01-03 2007-07-05 Mediatek Inc. Method of packing-based macro placement and semiconductor chip using the same
WO2008009112A1 (fr) * 2006-07-18 2008-01-24 Certicom Corp. système et procédé pour authentifier un dispositif de jeu
JP4359622B2 (ja) * 2007-01-22 2009-11-04 富士通株式会社 電子署名プログラム、および電子署名装置
US9721101B2 (en) * 2013-06-24 2017-08-01 Red Hat, Inc. System wide root of trust chaining via signed applications
US8484474B2 (en) 2010-07-01 2013-07-09 Rockwell Automation Technologies, Inc. Methods for firmware signature
FR2979442B1 (fr) * 2011-08-29 2013-08-16 Inside Secure Microprocesseur protege contre le vidage de memoire
US9223982B2 (en) 2013-03-01 2015-12-29 Intel Corporation Continuation of trust for platform boot firmware
EP2860904A1 (fr) * 2013-10-08 2015-04-15 Thomson Licensing Procédé de signature d'un ensemble d'éléments binaires et mise à jour de signature, dispositif électronique correspondant et produit de programme informatique
WO2016065014A1 (fr) * 2014-10-21 2016-04-28 Princeton University Architecture de confiance et procédés associés
US9536080B2 (en) * 2015-05-29 2017-01-03 Apple Inc. Method for validating dynamically loaded libraries using team identifiers
US20170255775A1 (en) * 2016-03-02 2017-09-07 Apple Inc Software verification systems with multiple verification paths
US11314865B2 (en) * 2017-08-01 2022-04-26 The Trustees Of Princeton University Pluggable trust architecture
US10754952B2 (en) * 2018-07-23 2020-08-25 Vmware, Inc. Host software metadata verification during remote attestation
US11398896B2 (en) * 2019-01-11 2022-07-26 Johnson Controls Tyco IP Holdings LLP Building device with blockchain based verification of building device files
US11574060B2 (en) * 2019-04-24 2023-02-07 International Business Machines Corporation Secure initial program load
US11513701B2 (en) * 2019-05-03 2022-11-29 EMC IP Holding Company LLC Storage management system and method
US20200409723A1 (en) * 2019-06-28 2020-12-31 Microsoft Technology Licensing, Llc Container management system with a layout manager system
US11093169B1 (en) * 2020-04-29 2021-08-17 EMC IP Holding Company LLC Lockless metadata binary tree access
US11356275B2 (en) * 2020-05-27 2022-06-07 International Business Machines Corporation Electronically verifying a process flow
FR3113963B1 (fr) * 2020-09-10 2023-06-30 Thales Sa Chaine de confiance avancee en aeronautique domaine de l'invention

Also Published As

Publication number Publication date
US11876912B2 (en) 2024-01-16
FR3113963A1 (fr) 2022-03-11
US20220078021A1 (en) 2022-03-10

Similar Documents

Publication Publication Date Title
EP3304800B1 (fr) Procédé de fourniture d'un puzzle spatial
Georganas et al. HipMer: an extreme-scale de novo genome assembler
Kim et al. HLA haplotyping from RNA-seq data using hierarchical read weighting
CN100342713C (zh) 用于保证软件更新的方法
CN103902910B (zh) 检测智能终端中恶意代码的方法及装置
US20170242475A1 (en) Method and system for reducing power consumption in bitcoin mining via waterfall structure
FR3113963B1 (fr) Chaine de confiance avancee en aeronautique domaine de l'invention
Schneider et al. EPISODE: Efficient privacy-preserving similar sequence queries on outsourced genomic databases
CN111639368A (zh) 一种基于区块链的增量学习分布式计算方法、***和节点
CN1574727A (zh) 防止程序篡改的方法、升级混淆程序的方法及装置
KR20080018182A (ko) 보안 해시 함수의 강화
Farrer et al. Using false discovery rates to benchmark SNP-callers in next-generation sequencing projects
CN1929381A (zh) 一种基于网络的软件保护方法
Mahadik et al. Scalable genomic assembly through parallel de bruijn graph construction for multiple k-mers
Karvelas et al. Privacy-preserving whole genome sequence processing through proxy-aided ORAM
CN1545242A (zh) 一种基于辫群共轭问题的数字签名方法
Zhang et al. A DNA‐Based Encryption Method Based on Two Biological Axioms of DNA Chip and Polymerase Chain Reaction (PCR) Amplification Techniques
CN109088850B (zh) 基于卢卡斯序列定位错误文件的批量云审计方法
Reichenwallner et al. Efficient deobfuscation of linear mixed boolean-arithmetic expressions
Kim Distributed password cracking on GPU nodes
Marmesat et al. PCR strategies for complete allele calling in multigene families using high-throughput sequencing approaches
Hu et al. NextPolish2: a repeat-aware polishing tool for genomes assembled using HiFi long reads
LU100142B1 (en) Electronic communication and access-control method
JP2008541272A5 (fr)
JP7197942B2 (ja) ビッグデータモバイルソフトウェアの類似性についての記述エントロピーに基づくインテリジェントな決定方法

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20220311

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4