摘要:
L'invention concerne notamment un procédé d'authentification d'un utilisateur (30) auprès d'un premier terminal (32) ou d'un serveur distant (50) connecté au premier terminal (32), l'authentification consistant à entrer un code dans le premier terminal (32) par l'utilisateur (30) et à comparer ce code à un code personnel confidentiel de l'utilisateur (30), le code personnel confidentiel comprenant des symboles à entrer successivement par l'utilisateur (30) dans le premier terminal (32). Selon l'invention, le procédé consiste à : a. Transmettre du premier terminal (32) à un second terminal (33) appartenant à l'utilisateur une série désordonnée de symboles dont un sous-ensemble constitue le code personnel confidentiel ; b. Afficher sur un écran du second terminal (33) la série désordonnée de symboles dans une grille (37), appelée seconde grille (37), chaque symbole de la série étant contenu dans une case de la seconde grille (37) ; c. Entrer, par l'utilisateur (30) sur le premier terminal (32), le code personnel confidentiel dans une grille (39), appelée première grille (39), aux emplacements correspondants des symboles du code personnel confidentiel dans la seconde grille (37) ; d. Vérifier, au niveau du premier terminal (32) ou du serveur distant (50), que la série de symboles entrés par l'utilisateur (30) est identique au code personnel confidentiel, afin d'authentifier l'utilisateur (30).
摘要:
The invention relates to a method for loading at leat a native code on at least a secure element (1, 2 3, 4), said at least secure element(1, 2 3, 4) comprising an Operating System (OS), a Central Processing Unit (CPU) , a memory storage, a platform signature (13), said native code (2) also comprising a platform's signature (102), According to the invention, it comprises generating at least a CAP file (10, 23) comprising a set of components (100), generating a binary code (20) from said native code (2), and embedding at least a custom component (101) comprising said binary code (20) into said at least CAP file (10,23) so that sait at least native code (2) is available for use through a Java Card application on said at least secure element (1, 2 3, 4).
摘要:
The invention relates to a method for determining the trust level of a uer device. According to the invention, the method comprises the following steps. At least one first user device executes a first application that communicates with a second user device application. The first user device sends to a remote server data relating to the first application execution, as a first user device report. The remote server determines, based upon at least the first user device report, a trust level relating to the first user device. A third user device sends to the remote server a request for getting a trust level relating to the first user device. The remote server sends to the third user device, as a request response, the trust level relating to the first user device. The invention also relates to a corresponding server.
摘要:
The invention is a method of communicating between a server and a distant secure element through a point-to-point link. The server is provided with a set comprising a plurality of data and a plurality of identifiers, each of the data is associated with one of the identifiers. The plurality of data comprises a first data compatible with the distant secure element and a second data incompatible with the distant secure element. The whole set is sent from the server to the distant secure element through the point-to-point link. A control operation is run with respect to a reference value stored in the distant secure element for each identifier. The data associated with the identifiers for which the control operation failed is discarded.
摘要:
The invention is a method for using an optical communication protocol between first and second devices. The method comprises the following steps: - said first device generates and displays a command image comprising a command, - said second device takes a command picture of the command image, interprets the command picture, retrieves the command and generates a result by executing the command, - said second device generates and displays a response image comprising the result, - said first device takes a response picture of the response image, interprets the response picture, gets the result and associates the result with the command.