Abstract:
A method for producing a smart card including at least one chip and at least one other electronic component having a face that must be accessible from the outside, includes: forming a card body having two opposing faces and in which at least two recesses are formed, one of which is a through-recess extending from one of the faces to the other, forming a first module including the chip and forming a second module separate from the first module and including the other electronic component, the second module including a support to which the component is secured opposite the face that must be accessible, securing the second module in the through-recess from the face of the body that is opposite the face through which the face of the component must be accessible from the outside, via a shoulder in the through-recess, and securing the first module in the other recess.
Abstract:
A secure element for a telecommunications terminal, the secure element including means for performing a trusted services management application to manage at least one trusted application to he run by the telecommunications terminal.
Abstract:
An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device, from among at least a Rich-OS operating system and a trusted operating system executed on a chipset of the electronic device, so that the message becomes accessible to the targeted operating system. The determining means may be set in operation in response to receipt of the message by the transmitter-receiver.
Abstract:
The invention relates to a method of initiating a conversation, the method comprising the following steps: obtaining (3030) a presentation content; then, once said content has been obtained, sending (3040) said content to a telecommunications terminal that is to be called; and a calling telecommunications terminal calling (3060) said telecommunications terminal that is to be called, the call (3060) including the calling terminal sending an identifier of the terminal that is to be called to a telephone switch; the method being characterized in that the step of obtaining and then sending the content are also performed by said calling telecommunications terminal.
Abstract:
A method for determining the presence of a human being, comprising: measuring (S6) a movement (MOV) of a first device (4) by a sensor (44) of said first device (4), determining the presence of a human being on the basis of the measured movement (MOV).
Abstract:
Disclosed is a method for authenticating a user by using an electronic apparatus including an authentication module and a secure module, which includes the following steps: the authentication module transmits a recognition result to the secure module according to a process that allows the authentication module to be authenticated by the secure module; the secure module generates an authentication token by signing, with a private key stored in the secure module, data including data representing at least one feature of the authentication module; and transmitting the generated authentication token. Also disclosed is an associated secure module, electronic apparatus and system.
Abstract:
The securing of data loading originating from an external device into a code memory area defined by an initial program of the secure element and any modification of which is controlled solely by the latter. When the external device obtains data to be transmitted to the secure element, the latter simulates an image of the code memory area as it would be modified by the loading of these data. A signature is calculated on the basis of the simulated image, then dispatched to the secure element with the data. The initial program of the secure element compares a signature that it has calculated over the whole of the code memory area after the actual loading of the data, with the signature received from the external device. The identity between these signatures ensures that the code memory area conforms to the image simulated by the external device, and is unimpaired.
Abstract:
The invention provides a method of generating a bank transaction request and a mobile payment terminal hosting a payment application using a secure token for the transaction request and including a secure module. The method comprises the payment application executing a payment protocol with a trader application in order to generate the transaction request, and the payment application requesting an authorization cryptogram from an encryption application hosted in the secure module for verifying authorization of the transaction request in compliance with the payment protocol. The invention also provides the mobile terminal hosting the payment application and including a secure module hosting the encryption application.
Abstract:
This application describes systems and methods for securing a payment token, to a mobile terminal, and to a server for generating a payment token. The operations performed by the systems and methods include a prior step of pairing a payment instrument both to an identifier of a subscriber terminal and to a personal password, followed by a step of generating a payment token that is made secure by using the identifier and the personal password. The pairing and the generating of the secure payment token make it possible to verify that the token is used by that subscriber and by that subscriber's mobile terminal. The systems and methods may be used in payment systems based on payment tokens that have usage restrictions.
Abstract:
Disclosed is a method implemented in an identity document including a microcircuit and a unit enabling the microcircuit to communicate with a terminal, the microcircuit being designed to permit the transmission of data obtained (directly or indirectly) from data memorized in a storage zone in response to a request received from the terminal, furthermore including the following steps: reception by the microcircuit of an identifier of the terminal; at least partial comparison of the identifier of the terminal and of at least one portion of an identifier stored in the microcircuit; and performance of a set action depending on the result of the comparison. An identity document in which such a method is implemented is also described.