摘要:
L'invention est relative à un procédé et à un système pour vérifier l'intégrité d'un message, tel qu'un logiciel et/ou des données, par rapport à un message d'origine sensé correspondre. Par application d'un algorithme (A) sur au moins une partie du message d'origine, au moins une signature (S1, S2 ... Sm) de cette partie est calculée et est mémorisée dans une zone de mémoire (10) d'un objet portatif (1), possédant par ailleurs des circuits de traitement (11) susceptibles d'implémenter l'algorithme (A). Afin de vérifier l'intégrité d'un message, au moins une signature d'une partie de message est calculée par les circuits de traitement (11) de l'objet portatif, par mise en oeuvre de l'algorithme (A), et est comparée avec une signature du message d'origine sensée correspondre et mémorisée dans la zone (10) de mémore.
摘要:
La présente invention concerne un procédé pour acheminer au moins une clé secrète prédéterminée dans le but de sécuriser l'exploitation d'une prestation de service, caractérisé en ce qu'il consiste à transmettre une clé d'exploitation prédéterminée sous forme chiffrée, d'un module de sécurité (MSC1) présentant un niveau hiérarchique prédéterminé vers un module de sécurité (MST1 ou carte U) de niveau hiérarchique inférieur au niveau prédéterminé, ce chiffrement consistant à utiliser un algorithme de chiffrement et faisant intervenir la clé d'exploitation prédéterminée ainsi qu'au moins une clé diversifiée, cette clé diversifiée nécessaire au chiffrement est obtenue par un algorithme de diversification et faisant intervenir une clé de base de cette clé diversifiée, ainsi que des informations de diversification provenant du module de niveau hiérarchique inférieur, la clé prédéterminée chiffrée d'exploitation étant déchiffrée en mettant en oeuvre, dans le module de niveau hiérarchique inférieur au niveau prédéterminé, un algorithme de déchiffrement, inverse de l'algorithme de chiffrement.
摘要:
he invention concerns a method for making secure the pre-initialising phase of a smart card (CP) with mutual authentication of said card (CP), recording a symmetric secret key (KM) and an asymmetric public key (n), and a security device (3) storing the same secret key (KM) and the asymmetric public key (Kpq) corresponding to the public key (n). The card (CP) and the device (3) supply random numbers (NaC). The device (3) authenticates itself by transmitting to the card (CP) a cryptogram (SR) derived from two random numbers, using an asymmetric algorithm. The card (CP) authenticates itself by calculating a session secret key derived from the random number (NaC), using a symmetric algorithm and the secret key (KM), and in transmitting to the device (3) a cryptogram (CC) derived from the second random number, using the symmetric algorithm and the session key. The dedicated key (KF) is transmitted to the card, encrypted by the session key (Ks).
摘要:
The invention relates to a system for transmitting messages, comprising a telecommunications network (2) comprising a communications server (4) and at least one radiotelephone (1), said server comprising means for transmitting messages to one or more radiotelephones, the radiotelephone(s) (1) being provided with means for saving and processing messages (Mess-Serv). The invention is characterised in that the messages (Mess-Serv) comprise a first field (V-TYP) containing information relating to the standard profile of the recipient of the message and in that the processing means compare the profile saved in each radiotelephone relative to the subscriber using the radiotelephone with the profile contained in the message and authorise the messages to be saved in the saving means if the profile of the subscriber using the radiotelephone is compatible with the standard profile contained in the message field.
摘要:
The invention concerns a method for verifying a transformer of source code into a transformed code designed for an incorporated system (7). The method comprises at least steps which consist in: determining a single virtual machine factoring the behaviour of said two codes (1, 3); determining for each of said source (1) and transformed (3) codes a plurality of functions called auxiliary functions representing residual differences between said source (1) and transformed (3) codes; and a step which consists in verifying a property of correspondence between the auxiliary functions, the code transformer (2) verification resulting from the latter step. The invention is particularly applicable to chip cards (7).
摘要:
The invention concerns a smart integrated circuit characterised in that it has a main processor (1) and an operating system executing a main programme (P1) to set up a main process performing tasks, at least a secondary processor (2) capable of executing simultaneously at least a secondary programme (P2) to constitute a task-performing process, power circuits (6) common to the processors and means ensuring that the secondary process(es) with similar energy and different operating signature, are carried out simultaneously with the main process by inducing in the power circuits, continuously or intermittently, energy disturbances which are superposed on those of the main process to produce continuous or intermittent data encryption.
摘要:
The invention concerns a data exchange protocol between a multi-application portable object, such as a microprocessor card. An internal communication interface is implanted in the non-volatile memory. From a command for sending a message and receiving a message, a transmission application attribute (E-ID) is allocated a) to an application and a reception application attribute (R-ID) is allocated b) to at least another application. The data exchanging message (MSG) c) is carried out between transmitting and receiving applications using the communication interface as intermediate. The invention is applicable to the management of portable multi-application objects such as microprocessor cards, PCMCIA cards or the like.
摘要:
The invention concerns a chip card (21) comprising data processing means and main data storage means, wherein the processing means include: means for detecting, while the chip card is operating, that the main storage means contain an amount of data such that an operation cannot be executed; means for selecting, in the main storage means, a set of data to be unloaded (K), whereof the unloading can release in the main storage means a space sufficient for executing said operation; means for unloading the set of data to be unloaded (K) into secondary storage means (23 to 25), in the event said secondary storage means do not contain said data set to be unloaded. The invention also concerns the associated communication method and protocol.
摘要:
The invention concerns a card (7) reading device (1) comprising a housing (10) equipped with a keyboard (5), a display unit (4), a slot for inserting (8) the card (7) inside the housing (10) and a cover (2) protecting the keyboard and the display unit (4), when it is closed. A flap (6) is provided, integral with the cover (2) and fixed to the housing (10) by an element (3) enabling it to pivot and be brought underneath said housing (10). The flap (6) covers the insertion slot (8) when the cover (2) is closed, and serves as support base to incline the housing (10) when the cover (2) is open.