Abstract:
The invention relates to methods and devices for updating a cache memory in a telecommunications terminal suitable for co-operating with a subscriber identity module. Some implementations of the subscriber identity module may perform operations that include detecting a modification of an elementary file and generating update data associated with the modified elementary file. During a starting stage, the operations may further include receiving a start message from the terminal; receiving a request serving to identity an elementary file for processing; sending the update data associated with the elementary file for processing; and reading the elementary file in compliance with a read command from the terminal. The invention also provides corresponding methods and devices for the terminal, and the corresponding module and terminal.
Abstract:
A method and tooling for fabricating a thin plastic plate of large format and of large thickness and including a card of small format and of small thickness that is detachable from the plate. The method, which may be implemented using the tooling, includes operations for making a spotface in a face of the plate to a depth equal to the difference between the large thickness and the small thickness; punching in the spotface zone along a leveling direction facing another face of the plate opposite from the first face, to a leveling stroke (en) equal to the depth of the spotface, in order to bring the bottom of the spotface level with the first face of the plate; and pre-cutting an outline of the card within the leveled zone, in order to make the card detachable.
Abstract:
A method of personalization for at least two cards (10), each card including a first side, a second side, and a peripheral surface, includes the following steps: forming a pile (20) of at least two cards by stacking the first side or the second side of an article (n) such that the first surface or the second surface of the following card (n+1) is in contact with the first side or the second side of the card (n); aligning, via an alignment device (32, 34) at least one element of the peripheral surface of the card (n) with at least one element of the peripheral surface of the following card (n+1) such that at least one element of the set of peripheral surfaces of each card forms at least one uniform surface; applying, via an application device, at least one product on at least one element of the uniform surface.
Abstract:
A method for routing at least one message, this method being implementation-dependent on a trusted operating system of an electronic device comprising an electronic assembly on which the trusted operating system and a Rich-OS operating system are executed. The method may include operations for consulting a trusted memory of a terminal, which may be called a first memory, and when the first memory contains a message, determining the operating system targeted by the message from among at least the Rich-OS operating system and the trusted operating system. And when the message targets the Rich-OS system, transferring the message from the first memory to a memory accessible to the Rich-OS system, which may be called a second memory.
Abstract:
A microcircuit card including an overall span of contacts including at least individual contact surfaces connected to this microcircuit while defining two parallel columns situated in proximity to two edges of the overall span, in a card body having a format at least equal to the 2FF format, in which there is made a pre-cutout in the 4FF format surrounding the overall span of contacts and a pre-cutout in the 3FF format surrounding the pre-cutout in the 4FF format, these pre-cutouts being such that the individual contact surfaces have, with respect to each of the pre-cutouts, positions and dimensions such that they encompass the theoretical contact zones defined by the standards defining these 4FF, 3FF and 2FF formats, the upper edge of the pre-cutout in the 3FF format being situated at a distance at least equal to 400 micrometers from the upper edge of the pre-cutout in the 4FF format.
Abstract:
Methods and device for personalizing a secure element (e.g., a eUICC) may include or implement operations for receiving a personalization request issued by an operator to download a personalized profile in compliance with a model into the secure element, and the request may include personalization data, an identifier of the secure element and the identifier of the model. Other operations may include using the identifier of the secure element to identify a pre-personalization server suitable for pre-personalizing the secure element; obtaining a message from the pre-personalization server, the message including a pre-personalization script for the secure element based on the description of the model; generating a personalization script for the secure element by using the pre-personalization script and the personalization data; and sending the personalization script to the secure element, the secure element being suitable for executing the personalization script to install the personalized profile in the secure element.
Abstract:
Disclosed are methods, systems, and devices for secure communication between an operating system of a terminal and a device distinct from the terminal, the terminal further including a reliable execution environment. In various implementations, authentication of said device by said reliable execution environment initiated by said operating system may occur prior to the secure communication. Some embodiments include a terminal and a system comprising the terminal.
Abstract:
A method of executing a program by a processor, and an electronic entity including such a processor, the method includes the following steps: a calling program calling a subprogram and passing at least one parameter; the subprogram determining a return status indicator; the subprogram determining a return word by using a predetermined function to combine at least the return status indicator and the parameter; returning to the calling program with the determined return word as a result; and the calling program comparing the return word and a determined word determined by using the predetermined function to combine at least one possible value of the return status indicator and the parameter passed when calling the subprogram.
Abstract:
Disclosed is a method for creating a profile in a target security domain of a secure element. In various implementations, the method includes a reception operation by said target security domain, according to a secure protocol not interpretable by this security domain, of data comprising an installation script of said profile encrypted with a key of the target security domain; a transfer operation of data to a privileged security domain capable of interpreting the protocol; a decryption operation of said protocol by said privileged security domain to obtain said encrypted script; an operation for sending the encrypted script to said target security domain; and a decryption operation of said encrypted script with said key and execution of said script by the target security domain to install said profile. Other embodiments include systems and devices that implement similar functionality.
Abstract:
A method for producing a pattern (6) in relief (10) in a thin plastic card (1), includes the following steps: producing a stack of layers including, in the following order: a transparent layer (2), a special layer (3), a black surface (4), a substrate layer (5), drawing the pattern (6) by a laser (7) through the transparent layer (2).