摘要:
The present invention relates to a method of privacy-preserving during an access to a restricted e-service requiring user private data from a smart card. The invention relates more particularly to the field of methods implemented so that the user has the guarantee that only the private data needed to access to the e-service are extracted from the smart card. It is to guarantee that the user has a perfect knowledge of his private data provided by his smart card to a requester. With the invention a message notifying to the user the very nature of the identity assertion is displayed on the screen of the smart card. By doing so, the card ensure 100% security with regard to user consent: the data read out of his card cannot differ comparing to the data requested by the service provider through the terminal.
摘要:
La présente invention se rapporte à un procédé de vérification, par un utilisateur autorisé (201), d'un document (205) présentant des moyens de contrôle électronique (206). Le procédé comporte les différentes étapes consistant à : - lire (105), au moyen d'un équipement électronique de lecture (202) équipant l'utilisateur autorisé (201), des informations mémorisées dans les moyens de contrôle électronique (206) du document vérifié (205) ; - transférer (109) une information de vérification, établie à partir des informations mémorisées dans les moyens de contrôle électronique (206), depuis l'équipement électronique de lecture (202), vers un dispositif de visualisation (203) de l'utilisateur autorisé (201), le dispositif de visualisation (203) étant positionné, dans des conditions normales d'utilisation, face aux yeux de l'utilisateur autorisé (201), ledit dispositif de visualisation (203) étant transparent pour permettre audit utilisateur autorisé de regarder au travers.
摘要:
The present invention concerns a secure method for a card to verify the validity of a second party certificate through a third party whereas the certificate's owner remains unknown to the third party. For that, the invention proposes a method wherein the card transmits to the third party two elements: - the identifier of the Certification Authority, denoted by CAref, - an encrypted message ENC(SN)[PKEnC CA] , where PKEnc CA is a public encryption key of the certification authority CA and SN is an anonymous identifier of the second party. Next, the third party transmits a request status revocation of the certificate including the data (CAref, ENC(SN)[PKEnc CA ]) to the certification authority corresponding to CAref. Next, the corresponding certification authority decrypts the value ENC(SN)[PKEnc CA ] and next retrieves the anonymous identifier. Based on the anonymous identifier, the certification authority can check the status revocation of the certificate. The certification authority answers the request to the identity provider which can then transmit it to the card.
摘要:
La présente invention décrit un procédé d'échange de messages sécurisé dans un système distribué. L'invention appuie sa sécurité sur l'échange de signatures des messages à interpréter, en lieu et place des messages eux-mêmes, ce qui permet de protéger le système vis-à-vis des attaques en confidentialité et en intégrité, sans alourdir le système en imposant une architecture lourde de PKI systématique.
摘要:
The present invention relates to a digital signature (S) calculation method comprising a step (S1) of verification of a specific action (SA) from the signer (U), said specific action (SA) triggering the digital signature (S) calculation, said method being such that, the step (S1) of verification is able to verify at least two specific actions (SA1,SA2), one specific action (SA1) leading to a genuine straight signature ((DAT)Ks) calculation (S2), the other specific action (SA2) leading to a genuine differentiated signature ((DAT)Kds, (DAT+DV)Ks)) calculation (S3).
摘要:
The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (sk c ,pk c ), said remote server generating an ephemeral key (sk s ,pk s ), the method comprising a mutual authentication step wherein the client (C) sends a public key (pk c ) of said long-term key pair (sk c ,pk c ) and the proof that said public key (pk c ) is valid to the server (S), and wherein the remote server (S) sends the public key (pk s ) of said ephemeral key pair (sk s ,pk s ) to the client (C). The client (C) generates an ephemeral key pair (sk cc ,pk cc ) and sends the public key (pk cc ) of said ephemeral key pair (sk cc ,pk cc ) to the server (S) so as to generate a secret common to the client (C) and to the remote server (S) for opening the secure communication channel.
摘要:
The invention relates to a method for accessing a service. According to the invention, a first communicating device (12) storing at least one form to be completed, the method comprises the following steps. The first communicating device sends, via a short-range radio-frequency link (15), the form to be completed to a terminal (16). The terminal completes at least in part the form to be completed. The terminal sends the completed form to a second communicating device (110). The second communicating device or another communicating device (120) connected to the second communicating device analyses whether the completed form does or does not allow accessing a service. The invention also relates to a corresponding system (10).
摘要:
A method for connecting to a remote server from a browser enabled with a browser's extension on a host device, wherein upon connection of a data processing device with a data processing device reader linked to the host device, the browser's extension receives data contained in a targeted file stored in said data processing device, said data being able to be interpreted by the browser so as to trigger a connection to the remote server and to display a subscribed service portal, said data being sent by the data processing device upon execution of a command transmitted by the browser's extension.
摘要:
The invention relates to a system comprising two portable tokens (ICC1, ICC2), the first portable token (ICC1) being set to enforce an access condition (AC), wherein the access condition (AC) is stored in the first portable token (ICC1) and comprises an identifier of an authentication method. The access condition (AC) contains a reference to the second portable token (ICC2). For the access condition (AC) to be met, the first portable token (ICC1) must be notified of the success of the authentication method by the second portable token (ICC2). The invention also relate to a portable token set to delegate access conditions to another portable token, and to a method for delegating access conditions between portable tokens.
摘要:
The present invention relates to a control method (MTH) for controlling an integrated circuit card (ICC) by means of a control terminal (CO_T), wherein said integrated circuit card (ICC) comprising: - a reference cryptographic object (Cco); - security attributes (SECa) associated to said reference cryptographic object (Cco) comprising a reference validity period (Tr); - data (D);
said control method (MTH) comprising: - the checking by the integrated circuit card (ICC) of said reference validity period (Tr) against a reference timestamp (Dr) ; - if said reference timestamp (Dr) is within said reference validity period (Tr), the checking of a terminal's cryptographic object (Cto) against said reference cryptographic object (Cco) ; - if said terminal's cryptographic object (Cto) is valid with respect to said reference cryptographic object (Cco), the grant access by the integrated circuit card (ICC) to said data (D) for the control terminal (CO_T) and the control of said data (D) by said control terminal (CO_T) via a secured communication link established with said integrated circuit card (ICC).