摘要 |
An authentication process within a development tool such as an emulator 30 or a simulator, enables the control of access to the cryptographic functions of the semiconductor target device, for example a smart card microcontroller (100, fig. 4). Emulator 30 includes a secure processor 46 and an unsecure processor 44 to emulate the target IC. The cryptographic functionality of the target device resides with the secure processor 44, whose memory configuration (fig. 5) is similar to that of the target device. The developer can only access the secure processor via the unsecure processor, and an authentication process (fig. 6) is used to establish communications between the two processors within the emulator whenever the user's application, executed within the unsecure processor 44, requires execution of a cryptography function. Whereas in a traditional "open" emulator environment, using a device in "expanded mode", the developer has access to explore and alter any cryptographic restrictions, here this access is restricted to comply with existing and possibly forthcoming government agency restrictions.
|