摘要:
Method of public key cryptography based on the discrete logarithm that makes use of the computation of the variable r=g.sup.k modp where p is a prime number called a modulus, the exponent k is a random number usually with a length of N bits and g is an integer called a base, wherein an entity E carries out operations of authentication and/or of signature, including exchanges of signals with another entity in which this variable comes into play.
摘要:
The invention relates to a process for generating digital signatures from portable apparatuses (A1, A2, . . . Ai . . . An) of the microprocessor-based card type, including means for computation, communication and retention of data, which means comprise at least one electrically programmable non-volatile memory, consisting in preparing enciphered data constituting coupons and loading these coupons into the non-volatile memories so as later to use these coupons in order to sign a message sent by a verifier device. According to the process, the preparation of the coupons is carried out by a certified central authority B or by the card itself.
摘要:
The process concerns a system, comprising communication devices A1, A2, . . . A.alpha. connected to a central verification device B by the means of communication interfaces wherein each device Ai, having data processing means, communication means, memory means and random or pseudo-random generation means, transmits to the device B, having data processing means, communication means and memory means, a set of DSS digital signatures. Once all the signatures has been received by device B, device B verifies them simultaneously by performing few calculations for verifying a great same number of signatures sequentially.
摘要:
The invention features a public key cryptography method based on the discrete logarithm which computes a value Gkmod p. Two solutions are proposed to reduce the number of multiplications, one consisting in generating “hollow” k exponents with a few bits of value 1, but of sufficient length to maintain the total security of the system, and the other consisting of performing calculations of the powers of g in parallel while combining the exponents with each other in order to prevent repeating the same power computations twice for a given exponent. The invention is useful for generating digital signatures, authentication and encryption.
摘要:
A system comprises at least, two parts, connected to each other by the means of a common communication interface wherein a first communicating apparatus A, having data processing means, communication means, memory means and random or pseudo-random generation means relies of the computational power of a second communicating apparatus B having data processing means, communication means and memory means in order to compute the inverse of a first number x modulo a second number n and use the resulting modular inverse in an encryption, decryption, key exchange, identification or digital signature cryptographic protocol.
摘要:
A method for implementing private key protocols between two processing devices of which at least one is a portable storage medium. The devices are fitted with a digital processing circuit for performing modular calculation operations with a view to executing operations such as modular multiplication, the processing circuit is used to implement a private key encryption function consisting of a series of reversible operations comprising at least a combination of two operations, i.e. a modular calculation operation and a binary logic operation, and said function is applied either for encrypting or signing messages to be transmitted, or for decrypting received messages.
摘要:
A method for preventing secret code manipulation in a data processing device, such as a smart card, to which a presented code is applied. Prior to implementation of a code transforming function in the processing device, the secret code is transformed into a transformed secret code in the card. For each use of the card, the presented code is transformed into a transformed presented code in accordance with the implemented transformation function. A comparison of the transformed secret code with the transformed secret code in the card is then performed.
摘要:
A method and apparatus are provided for biometric authentication of a user to be authenticated, from among a plurality of users, with an authentication system storing a set of pieces of reference biometric data, each associated with one of the users. The method includes providing, by the user to be authenticated, a piece of biometric authentication data by a device for obtaining biometric data from a transactional terminal. A subset of the set of pieces of reference biometric data stored by the authentication system is searched for a piece of reference biometric data corresponding to the user to be authenticated as a function of the piece of biometric authentication data. The step of searching includes filtering the pieces of reference biometric data as a function of: a base station of a mobile communications network; and a set of mobile devices for which a connection indicator is activated for the base station. The transactional terminal is substantially near a zone of coverage of the base station.
摘要:
A method and apparatus are provided for assisting in checking accuracy of bank transaction records edited in a bank statement and performed by at least one transaction device. The method includes, for at least one of the transactions: emission, by the transaction device, of at least one first signal including a message relating to the transaction; receipt, by at least one mobile terminal, of the at least one first signal; transmission, by the mobile terminal, of a second signal including at least the message, to at least one banking organization; association, by a server of the banking organization in charge of the transaction, of the message with at least one datum relating to the transaction, and marking of the transaction as a pre-checked transaction.
摘要:
An electronic payment terminal and method are provided for printing tickets. The method includes: carrying out payment transactions with the terminal; after each transaction, simultaneously printing several tickets concerning the transaction made. Accordingly, when several transactions are carried out successively, the time required for printing the tickets is shortened since the tickets are printed at the same time.