Abstract:
An electronic appliance includes a first processor and a secure electronic entity equipped with a second processor, the electronic appliance being designed to operate by the execution by the first processor of a trusted operating system. An element situated outside the secure electronic entity and distinct from the trusted operating system is designed to trigger the execution of an application by the second processor; the application executed by the second processor is designed to request the implementation of a service of the trusted operating system. A method implemented in such an electronic appliance is also described.
Abstract:
An electronic entity includes contact communication elements (4) and remote communication elements (6). Members (2, K) are also provided to authorize an exchange of certain data at least via the remote communication elements based on the prior reception of an instruction via the contact communication elements. A terminal for communication with such an electronic entity as well as methods for controlling and for customizing the electronic entity are disclosed.
Abstract:
A device for providing protection against non-authorized use of an electronic system including an antenna, the device comprising a first switch suitable for inhibiting the operation of the electronic system, the first switch being arranged as a short-circuit between at least two turns of the antenna. Additional implementations include an electronic system including such a protection device.
Abstract:
Disclosed are systems and processing methods that may be performed by first, second, and third processor units to give access to an item of sensitive text data from a secure electronic document. In various implementations, the systems and methods may perform operations that include obtaining the secure electronic document; triggering the display of the secure document on a first terminal; selecting at least one marker contained in the secure document; determining secure data; and on the basis of said secure data, determining the item of sensitive text data. In various implementations, the third unit may trigger the display of the item of sensitive text data, and the second and third processor units may be distinct from the first unit and may execute an operating system that is independent of the operating system of the first processor unit.
Abstract:
An electronic device is proposed, which is configured to receive at least one cryptographic parameter and validate the at least one cryptographic parameter. The electronic device is is configured to validating the parameter by determining an imprint from a one-way function and from at least the cryptographic parameter; detecting at least one part of the imprint in a dedicated memory zone of the electronic device, and delivering a piece of information on validation should there be effective detection.
Abstract:
A method of manufacturing a card (3) of small format (8) and small thickness (5), detachable from a plate (1) of large thickness (6), includes the following steps: providing in the plate (1) of large thickness (6) at least one hole (4) opposite with a cumulative depth (7) equal to the difference between the large thickness (6) and the small thickness (5), pre-cutting of the card (3) of small format (8) in the at least one hole (4). The product obtained by such a method is also described.
Abstract:
Methods and systems of simulating the effects of an attack seeking fraudulently to modify target code that is interpretable by a processor are disclosed. Various implementations may include means and operations for searching for a set of sensitive instructions in the target code; generating an interpretable “simulation” code having instructions representing the result of said attack on the set of instructions; selecting memory registers that might be accessed during the interpretation of the simulation code; interpreting at least a portion of the simulation code; and storing at least one value of the registers during the interpretation in order to enable the effects of the attack to be analyzed.
Abstract:
A cryptographic processing method using a sensitive data item in a cryptographic processing system including in memory a test making it possible to tell a human and a computer apart and a reference value obtained by applying a cryptographic function to a pair of values P and R, where P is the sensitive data item and R is a solution to the memorized test, the method including the steps of: configuring the cryptographic processing system, including obtaining and memorizing the reference value in the cryptographic system; transmitting the memorized test to a user; obtaining the user's response to the transmitted test; a cryptographic processing step based on the sensitive data item, using the obtained response, the reference value and the cryptographic function. The reference value and memorized test are in the memory of the system and the solution is not in the memory of the system, during the transmission step.
Abstract:
A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of private and public cryptographic keys by the device from at least one random variable coming from a random-variable generator; transmitting at least one constituent element of a generated private or public key to at least one device for verifying; and determining a level of security of the device from the at least one transmitted element, as a function of pieces of information stored by the device for verifying.
Abstract:
The invention relates to a bank card (100) comprising a presentation surface of a pictogram (120) coding at least one item of information for executing a transaction.