摘要:
The invention relates to a method for executing a command using a secured element (SE) from an unsecured device (MPU); the method includes the following steps: installing, in the unsecured device, a personalized module (APP, SLLD) for managing communications using the secured element; transmitting first authentication data (APPK, APC, IIC) from the personalized module to the secured element, generating and transmitting, by means of the personalized module, second authentication data (APS, APR, ICKS) from the personalized module to the secured element; if the secured element determines that the first and second authentication data are consistent with one another, establishing a secured communication link (LSL) between the personalized module and the secured element; using the first or second authentication data, transmitting a command (CMD), by means of the unsecured device, to the secured element, for an application (SEAP) installed in the secured element, and executing the command by means of the secured element only if the command is transmitted by the secured communication link.
摘要:
The present invention relates to a method for programming or erasing memory cells of a nonvolatile memory, including a first erasing or programming cycle including the steps involving i) applying (S11) at least one erasing or programming pulse (Np) to the first memory cells, ii) determining (S14) the state, erased or programmed, of the memory cells, and repeating the steps i) and ii) if the memory cells are not in the desired state, and a second erasing or programming cycle including the application of a predetermined number of erasing or programming pulses to the second memory cells.
摘要:
The invention relates to a method for processing a binary data item (D), comprising a step of calculating cyclic redundancy check code for the data item by means of a generator polynomial (PC), in which the step of calculating the cyclic redundancy check code comprises steps consisting in: masking the data item with a random binary mask (R2) that is a multiple of the generator polynomial, and generating the cyclic redundancy check code for the data item from the masked data item (D2), the masking process consisting in adding the random binary mask (R2) to the binary data item.
摘要:
The invention relates to a method for generating prime numbers, which is implemented in an electronic device (DV), wherein the method includes steps of: calculating a candidate prime number (Pr), having a number of bits (L), using the formula Pr = 2P × R + 1, wherein P is a prime number, and R is an integer; using the Pocklington primality test on the candidate prime number; rejecting the candidate prime number if it fails the Pocklington test; and generating the integer (R) from a multiplicative inverse (X), belonging to a set of multiplicative inverse elements modulo, the product (Pv) of numbers (Qj) belonging to a group of small prime numbers greater than 2, so that the candidate prime number (Pr) is not divisible by any of the numbers from the group. The prime number P has a number of bits equal to a bit near one-half or one-third the number of bits of the candidate prime number.
摘要:
The method and system are for playing digital contents protected by a DRM scheme, wherein the digital contents are stored in a server and downloaded or streamed to a user device. The approach includes executing a DRM application inside the user device implementing a proxy between the server and a native player of the user device, and connecting the DRM proxy application to the server, selecting a digital content to be downloaded and retrieving a corresponding remote playlist. Also, the approach includes transforming the remote playlist into a local playlist having a format readable from the native player and executing a plurality of local packets of the local playlist inside the native player.