Abstract:
A process is designed to configure a smart card (CP) comprising a microchip (PE) capable of participating in at least two applications, a magnetic stripe (PM) capable of storing information, action means (MA) capable of acting on the magnetic stripe (PM) to modify certain stored information, a control circuit (MC) capable of controlling the microchip (PE) and the action means (MA), and selection means (MS) capable of allowing the selection of an application. This process comprises a step wherein, if one of the applications is selected, a dedicated piece of information that is representative of that selected application is stored in a location accessible to the control circuit (MC), so that if the microchip (PE) is woken up, the microchip (PE) automatically retrieves the dedicated information in order to activate the selected application represented by it.
Abstract:
The present invention relates to a method to access a data store previously locked using a passphrase from a device. The method includes the following steps, when the user requests access to the data store: requesting the user to enter the personal code; generating an access code by applying a first function to at least the entered personal code; sending out, to the server, at least an identifier of the device and the access code; for the server, comparing the access code with the preliminary received first function; for the server, if the access code is correct, returning the passphrase to the device; and for the device, unlocking the data store using the received passphrase in combination with the entered personal code.
Abstract:
A protection device equips an electronic device comprising hardware and software capable of executing a sensitive process. This protection device comprises i) a detection means arranged for detecting a fault effect into the electronic device, resulting from at least one fault attack of an attacker during execution of the sensitive process, and ii) a correction means arranged for correcting this detected fault effect before it may be detected by the attacker, so that set up of the fault be considered as missed by this attacker.
Abstract:
A method to securely and asynchronously provisioning keys from one source secure device to a target secure device through a key provisioning server, in which the keys to be provisioned via the method remain unknown. The method includes the steps of, for the source secure device, encrypting a key to be transferred using a transport key so that only the target secure device can decrypt, and sending the encrypted key to the provisioning server and, for the target secure device, when available, getting the encrypted transferred key, and decrypting the transferred key using the transport key.
Abstract:
The invention relates to a method for entering data, data to be entered comprising at least one digit. A first device comprises at least one touch sensitive interface. The touch sensitive interface is sensitive to at least one touch. According to the invention, at least one digit being associated with no touch or a count of at least one touch, the method comprises the following steps. The first device detects, in a predetermined time period, a count of at least one touch that is or is not present at once or several times. The first or a second device determines the digit associated with no detected touch or a detected count of at least one touch, the second device being connected to the first device. The invention also relates to corresponding device and system.
Abstract:
A wireless device presents a predetermined identifier and at least one code comprising connection data. A terminal communicates over a short range radio-frequency link, with a wireless device. The terminal has a camera and a display screen. The terminal detects, through the camera, an identifier relating to a wireless device in a vicinity of the terminal. The terminal presents, through the display screen, at least one object for each detected identifier, the object being associated with a wireless device. A terminal user selects, through the display screen, one object amongst the presented objects. The terminal reads or extracts the connection data comprised within the selected code associated with the corresponding selected wireless device. And the terminal establishes, a connection, over the short range radio-frequency link, to the corresponding selected wireless device.
Abstract:
A device having a card (40) and a support (PC). The card has (a) no internal battery, (b) a single antenna (10) that receives electromagnetically data and power, (c) a data processor, (d) rectifying and filtering circuitry receiving the electromagnetic input and supplying at output terminals (A, B) a voltage to the processor. and (e) two terminals (36, 38) on an external surface of the card which are connected to the output terminals (A, B). The support is mechanically and electrically connectable to the card. It has (a) a power source that may be a battery, (b) surface terminals that mate with the card's external terminals, (c) a switch for connecting the power source to the surface terminals, and (d) a mechanism for holding together the card and support with the card's and the support terminal's electrically engaged to one another.
Abstract:
The present invention relates to a method for establishing secure history and audit of an integrated circuit card comprising an audit register, for property hand-over, which includes the following steps: storing in the audit register of said integrated circuit card remote actions performed on said integrated circuit card; computing a hash function of the content of said audit register of said integrated circuit card and remote actions content, and storing the result of said hash function in said audit register of said integrated circuit card; storing on a remote server an audit log of remote actions performed on said integrated circuit card; and verifying the integrity of said audit log stored on said remote server by comparing the content of said audit register of said integrated circuit card and the result of a computed hash function of said audit log.
Abstract:
The object of this invention is a method for securing an electronic document. In particular, this invention relates to a method that prevents the forging of documents in which an electronic chip is incorporated. To that end, the invention proposes a method in which the data on the document medium are associated with a fingerprint of the document, so as to make them inseparable. That fingerprint is determined on the basis of measurable physical units of the electronic chip or the medium. Thus, the invention allows the combination of the physical protection of the document and the protection of the chip so as to reinforce the security of said documents.
Abstract:
The invention relates to a system for pairing a terminal with an element worn on the wrist or hand of a user, the element comprising a secure element for communicating with the terminal. According to the invention: the element contains an accelerometer; the terminal includes a means for recording the movements of the element; the system comprises a means for comparing the signature of the accelerometer with that of the recording means of the terminal in order to authorize, if the signatures are similar, the pairing of the terminal with the secure element.