Abstract:
An electronic entity includes contact communication elements (4) and remote communication elements (6). Members (2, K) are also provided to authorize an exchange of certain data at least via the remote communication elements based on the prior reception of an instruction via the contact communication elements. A terminal for communication with such an electronic entity as well as methods for controlling and for customizing the electronic entity are disclosed.
Abstract:
Generation of a message m of order λ(n) for a test of the integrity of the generation of a pair of cryptographic keys within the multiplicative group of integers modulo n=p·q, including: —key pair generation including, to generate p and q: a random selection of candidate integers; and a primality test; —a first search of the multiplicative group of integers modulo p for a generator a; —a second search of the multiplicative group of integers modulo q for a generator b; —a third search for a number y, as message m, verifying: 1≦γ≦n−1, where γ=a mod p and γ=b mod q, the first or second search being performed during the primality test.
Abstract translation:生成订单λ(n)的消息m,用于测试在模n = p·q的乘法乘法组中产生一对加密密钥的完整性,包括: - 密钥对生成包括生成p 和q:候选整数的随机选择; 和原始测试; - 对于生成器a首先搜索模p的乘法乘法组; - 对发生器b进行模q的乘法乘积组的第二次搜索; - 第三次搜索数字y作为消息m,验证:1≤γ≤n-1,其中γ= a mod p和γ= b mod q,在原语测试期间执行第一或第二搜索。
Abstract:
Disclosed are a method of weakening an outline in a thin plastic card and tooling for performing the method. The method may include several operations, including a go punching step by means of a go punch presenting a solid shape substantially identical to the outline and suitable for punching the thin plastic card along a go direction against a die presenting a hollow shape substantially identical to the outline and in alignment with the go punch in order to be able to receive material pushed by the go punch, and a return punching step by means of a return punch presenting a solid shape substantially identical to the outline in alignment with the go punch and suitable for punching the thin plastic card along a return direction opposite to the go direction. Also disclosed is a thin plastic card including at least one outline weakened by such a method.
Abstract:
Techniques for providing cost effective and tamper evident prepaid card packaging are described. By containing a relatively wide glued area by gluing two relatively tin side panels together, the resulting package is highly resistant to being slit open on an edge without the effort to open the package being highly evident. A foldover magnetic stripe panel provides additional thickness to a portion of the package typically read by a magnetic strip reader while allowing very thin side panels.
Abstract:
Devices for providing protection against intrusion in order to protect at least one electronic component. One example of the device includes an enclosure, surrounding the electronic component, which is proof against a specific type of radiation, and at least one piece of equipment selected from a receiver and a transmitter of radiation of that specific type, which is arranged inside the enclosure and substantially tuned to another piece of equipment that is complementary and disposed outside the enclosure. The device also includes a detection module suitable for detecting an intrusion if at least one receiver receives radiation of that specific type.
Abstract:
The process according to various aspects can be executed by a terminal for selecting an application executable at least in part by a secure module incorporated into the terminal, and may include a step for obtaining location information of the terminal, from a memory of the secure module, and a selection step of an application from the obtained location information.
Abstract:
Described are methods and systems for provisioning a subscriber profile in a secure module, such as a SIM card. The methods and systems may perform operations that may include receiving a request for provisioning a subscriber profile accompanied by parameters of a mobile terminal associated with the subscriber profile, and configuring the terminal when notification is received of the profile being activated, the notification coming from the secure module. Variations of the systems and methods are applicable to terminals including a secure module for hosting a subscriber profile to a mobile communications network.
Abstract:
A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of private and public cryptographic keys by the device from at least one random variable coming from a random-variable generator; transmitting at least one constituent element of a generated private or public key to at least one device for verifying; and determining a level of security of the device from the at least one transmitted element, as a function of pieces of information stored by the device for verifying.
Abstract:
Method for generating a pair of public and private cryptographic keys in the additive group of integers modulo n, where n is the product of two prime numbers p and q, the method including the following steps: calculating a public exponent e for the public key, and calculating a private exponent d for the private key from the public exponent and the public modulus, where d·e=1 mod λ(n), λ(n) being the least common multiple between p-1 and q-1, characterized in that the method furthermore includes a step: of checking to check that λ(n)=0 mod (p-1) and λ(n)=0 mod (q-1).
Abstract:
Techniques for providing cost effective and tamper evident prepaid card packaging are described. By containing a relatively wide glued area by gluing two relatively tin side panels together, the resulting package is highly resistant to being slit open on an edge without the effort to open the package being highly evident. A foldover magnetic stripe panel provides additional thickness to a portion of the package typically read by a magnetic strip reader while allowing very thin side panels.