摘要 |
The protection process include detection of the status of a timer (5); controlling the triggering of the timer if the timer is not active; and blocking the device if the timer is active. The timer is de-activated if a predetermined sequence of processes has been executed normally. If this is not the case, a counter is incremented and when this reaches a threshold the data may be protected or erased. <??>The process for protection of an integrated circuit against pirate copying comprises a series of stages executed by the circuit, before a predetermined sequence of processes. The stages include detection of the status of at least one timer (5); controlling the triggering of the timer if the timer is not active; and blocking the device if the timer is active. The integrated circuit executes the process of de-activating the timer, if a predetermined sequence of processes has been executed normally. A further process is activated by the integrated circuit, if the timer is detected to be active; this consists of modifying the value of a counter in a protected non-volatile region of the memory (EEPROM), comparing the value of this counter with a predetermined threshold, and effecting a process of protection of stored confidential data if the counter has attained the threshold value. The protection may be achieved by erasing the confidential data. |