摘要:
The invention relates to a method for authenticating a security element by superimposing N shared colour images in order to obtain at least one target colour, said method comprising a phase of constructing an authenticating system comprising at least: a step of selecting a target colour; a step of selecting a series of N decomposition colours which, by means of superimposition, together enable the target colour to be obtained; and a step of recording the N shared images each with a decomposition colour from the series. The invention also relates to a security element comprising at least one shared image obtained according to said method.
摘要:
L'invention concerne un procédé de traitement mis en oeuvre par des première, deuxième et troisième unités de traitement (20, 60, 40) pour permettre l'accès à une donnée de texte sécurisée (DTS) à partir d'un document électronique sécurisé (200), comprenant : - l'obtention du document électronique sécurisé (200) ; - le déclenchement de l'affichage du document sécurisé (200) au niveau du premier terminal (T1) ; - la sélection d'au moins un marqueur (MQ) contenu dans le document sécurisé (200) ; - la détermination d'une donnée sécurisée (DS) ; - la détermination, à partir de ladite donnée sécurisée, de la donnée de texte sensible (DTS) ; et - le déclenchement par ladite troisième unité (40 ; 81) de l'affichage de la donnée de texte sensible (DTS),
les deuxième et troisième unités de traitement (60 ; 40) étant distinctes de la première unité (20) et exécutant un système d'exploitation autonome du système d'exploitation de la première unité de traitement (20).
摘要:
The present invention refers to a method for scrambling an original digital image (10) into a scrambled image (20) and for descrambling the scrambled image (20) into a reconstructed image (30). In accordance with a certain coding format, the original image (10) is defined by a set of orderly original coefficients (12, 13). These coefficients refer to coding elements arranged in blocks (11) within this image, and/or to parameters of said coding format within a conversion table. The method comprising: a scrambling operation comprising the steps of: - substituting a plurality of the original coefficients (12, 13) by dummy coefficients (12', 13') of the same nature so as to safeguard said coding format, - storing the substituted original coefficients (12, 13) with their respective position, as original data (15) into at least two control objects (CO1, CO2), each control object corresponding to a specific degradation level of the original image (10); and a descrambling operation comprising the steps of: - receiving the scrambled image (20) and at least a part of said control objects (CO1, CO2), - using original data (15) derived from a selection of at least one of said control objects (CO1, CO2), performed on the basis of a user access condition (25), for obtaining the reconstructed image (30) by putting back the original coefficients (12, 13) instead of said dummy coefficients, thanks to their respective position.
摘要:
The present invention relates to a method of privacy-preserving during an access to a restricted e-service requiring user private data from a smart card. The invention relates more particularly to the field of methods implemented so that the user has the guarantee that only the private data needed to access to the e-service are extracted from the smart card. It is to guarantee that the user has a perfect knowledge of his private data provided by his smart card to a requester. With the invention a message notifying to the user the very nature of the identity assertion is displayed on the screen of the smart card. By doing so, the card ensure 100% security with regard to user consent: the data read out of his card cannot differ comparing to the data requested by the service provider through the terminal.
摘要:
A communication module 6 of a communication terminal 2 is configured not to output to a control module 5, service information provided from a second server 4 whose server ID is not registered in a first server 3. The communication module 6 is configured to receive an authentication code from the first server 3, and to transmit ID information and terminal identification information to the second server 4. When the terminal identification information received from the communication module 6 matches the terminal identification information received from the first server 3, the second server 4 is configured to reply the authentication code and the service information to the communication module 6. When the authentication code received from the first server 3 matches the authentication code received from the second server 4, the communication module 6 is configured to output the service information to the control module 5.
摘要:
1. Method for granting a plurality of communication devices (30) access to a local area network LAN (40) via an access point (50) using a single cryptographic key (20) to secure communications exchanged through the LAN. This method comprises an activation phase performed once at initialization of the LAN and an operating phase wherein the devices (30) access to the LAN. The activation phase comprising: - providing the key (20) in a digital clear form by the access point, - transferring this key to a master device (10), - switching the access point into a secure mode wherein any further communication is secured with this key. The operating phase comprising: - transferring the key from the master device to any of the devices. The cryptographic key is converted from its digital form into a graphic form (20') and transferred in this graphic form to the devices during the operating phase.
摘要:
A method for encrypting a 3D object. In a preferred embodiment, the encryption shapes the 3D object by generating (S21) a set of secret functions using a secret K, applying (S22) the generated functions to the 3D object, determining (S23) the function that gives an output that is closest to predetermined characteristics, encrypting (S24) the 3D object using the determined function, and outputting (S25) the encrypted 3D object and an indication of the determined function. Also provided is a corresponding decryption method, an encryption device (910) and a decryption device (940).
摘要:
The graphical characteristics of 3D graphical objects encrypted using format-preserving encryption makes rendering of such objects quite inefficient by non-authorized devices. To optimise the rendering of a three-dimensional graphical object (120) represented by a list of points and a list of surfaces defined by points in the list of points, a device (110) receives (210) the graphical object (120); encrypts (220) the graphical object (120) using a format-preserving encryption method to obtain an encrypted graphical object; encapsulates the encrypted graphical object to obtain an encapsulated graphical object by adding at least one encapsulation by adding for each encapsulation, to the list of surfaces, a plurality of surfaces that together enclose the encrypted graphical object and, in an embodiment, at least one point to the list of points; and outputs (230) the encapsulated graphical object (130). Decryption is performed by essentially reversing the encryption.
摘要:
A method is provided for encoding a latent image having at least two color components into a visible image. A first and second image associated with first and second color components, respectively, are generated. The first image has a first pattern of elements and the second image has a second pattern of elements that are manipulated based on a corresponding color component provided in the latent image. A first and a second angle are assigned to the first image and the second image, respectively. The first image and second image are aligned by orienting the first pattern of elements according to the first angle and second angle, respectively. The aligned first image and second image are superimposed to render an encoded image that is decoded using a decoder that simultaneously display the first color component and the second color component of the latent image to present a color composite image.
摘要:
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. Real-time access to a content can also be facilitated by utilizing existing watermark extraction records. To facilitate real-time access to the content, the extraction records may contain segmented authentication information that correspond to particular segments of the content that is being accessed. Additionally, or alternatively, new watermark extraction operations can be conducted in real-time to produce new watermark extraction records.