Abstract:
Devices and methods for managing a mobile communications profile stored in a nonvolatile memory of a secure element and performed by the secure element are disclosed. The devices and methods may include operations such as reading the state of a flag stored in the nonvolatile memory of the secure element and indicating whether the profile may be deleted; determining the active or inactive state of the profile; and if the flag indicates that the profile may be deleted and if it is determined that the profile is inactive, then deleting the profile.
Abstract:
Intrusion detection systems dedicated to an operating system, and an intrusion detection system in a device implementing at least a first operating system and a second operating system. The intrusion detection systems includes: a listening module (1110) configured to be executed in the first operating system in order to listen to the activity of this first operating system; a collecting module (1120) configured to be executed in the first operating system in order to collect data characterizing the activity of the first operating system; and an analysis and detection module (1150) configured to be executed in the second operating system in order to analyze the data collected in the first operating system and detect a suspicious activity in the first operating system depending on the analysis.
Abstract:
A method for the performance of a function by a microcircuit, includes:at least one step of determining (205) whether an anomaly is detected or whether the operation of the microcircuit is normal;when it is determined that an anomaly is detected, a step of performing (210) a protection function;when it is determined that the operation of the microcircuit is normal, a step of performing (215) a decoy function simulating the protection function by being perceptible, from the outside of the microcircuit, in a manner more or less identical to the protection function;the method being characterized in that it includes an interruption (250) of the performance of the decoy function by a timer.
Abstract:
A device for providing protection against non-authorized use of an electronic system including an antenna, the device comprising a first switch suitable for inhibiting the operation of the electronic system, the first switch being arranged as a short-circuit between at least two turns of the antenna. Additional implementations include an electronic system including such a protection device.
Abstract:
A data processing method pertains to a step (E308) including in verifying a criterion indicative of the normal running of the method and a step (E320) including in processing performed in case of negative verification. The processing step (E230) is separated from the verifying step (E308) by an intermediate step (E312, E314) of non-null duration. The intermediate step (E312, E314) and/or the processing step (E320) includes at least one action (E314) performed in case of positive verification. The invention also concerns a corresponding device.
Abstract:
Disclosed are methods performed by, and devices including, a microcircuit card that makes it possible to set up a communication session between the microcircuit card and a contactless communication module via an SWP interface. An implementation of the method comprises: an initialization phase for the SWP interface; and a negotiation phase between the microcircuit card and the contactless communication module, the contactless communication module being suitable for maintaining the power supply of said microcircuit card during these phases. Among other reasons, the method is remarkable in that the microcircuit card prolongs said negotiation phase until the end of a procedure internal to the microcircuit card.
Abstract:
An electronic entity includes a module formed of a support film carrying, on an internal face, a microcircuit and a first coupling coil, and a body including a cavity in which this module is fixed, the support film having an external surface running at least approximately alongside an upper surface of this body, and containing an antenna and a second coupling coil connected to this antenna and intended for the coupling of the antenna with the microcircuit by electromagnetic coupling with the first coupling coil; this second coupling coil (likewise may be the case for the antenna and the first coupling coil) is formed on a thickness of at most a few microns in a plane situated, with respect to the upper surface of the body, at a distance of less than half the distance with respect to the surface opposite from this upper surface of this body.
Abstract:
In an electronic device designed to function in a trusted execution environment (TEE), because of the execution of a trusted operating system by a processor of the electronic device, or in a rich execution environment (REE), a method of loading files into random access memory includes the following steps: reception (E10) by the trusted operating system of information (L1) identifying at least one file; verification (E11) by the trusted operating system of the conformance of the identified file to at least one given criterion; in the event of conformance, loading (E13) the identified file into an area (Z2) of random access memory accessible in read only mode when functioning in the rich execution environment (REE). An associated electronic device is also proposed.
Abstract:
Disclosed are methods performed by, and devices including, a microcircuit card that makes it possible to set up a communication session between the microcircuit card and a contactless communication module via an SWP interface. An implementation of the method comprises: an initialization phase for the SWP interface; and a negotiation phase between the microcircuit card and the contactless communication module, the contactless communication module being suitable for maintaining the power supply of said microcircuit card during these phases. Among other reasons, the method is remarkable in that the microcircuit card prolongs said negotiation phase until the end of a procedure internal to the microcircuit card.
Abstract:
A system for biometrically authenticating a user includes: elements for obtaining image data that are representative of at least one user-associated biometric feature and at least one user-associated identifier, elements for extracting the at least one biometric feature in the image data, elements for extracting the at least one identifier in the image data, elements for performing a search for a reference biometric feature associated with the at least one identifier, elements for comparing the extracted biometric feature with the reference biometric feature, and elements for authenticating the user in accordance with a result of the comparison.