Abstract:
Various embodiments consistent with the invention relate to a secure electronic entity including a communications interface, the entity being characterized in that it includes means that act, when it is connected via said communications interface to a portable electronic device, including means for connection to a telecommunications network, to enable it: to authenticate a remote transaction verification server in the telecommunications network and to authenticate itself with said remote server; to establish a secure connection, via the telecommunications network, with said remote server; and to receive, via said communications interface, data relating to an intended transaction with a third party device, and to transmit that data, via the secure connection, to the remote server so that it can analyze the data in order to take a decision as to whether to authorize the transaction.
Abstract:
Described are examples of a device for providing protection against intrusion in order to protect at least one electronic component, the device comprising an enclosure surrounding the electronic component and proof against a type of radiation, at least one piece of equipment selected from a receiver and a transmitter of radiation of said type arranged inside the enclosure and substantially tuned to another piece of equipment that is complementary and disposed outside the enclosure, and a detection module suitable for detecting an intrusion if at least one receiver receives radiation of said type.
Abstract:
Method of integrity verification of public and private cryptographic key pairs in the additive group of integers modulo n, with n being the product of two prime numbers p and q, the method including the following steps: of computation (201), on the basis of the number n, of a public exponent e of the public key, and of a private exponent d of the private key, of two candidate factors p′ and q′ corresponding respectively to the numbers p and q, of verification (206) so as to verify the consistency of the private exponent with respect to the public exponent and to the number n, the verification step involving the candidate factors.
Abstract:
In an assembly including an adapter and a smart card, the outer dimensions of the adapter are compliant with the 3FF microcircuit card format, the format further defining the positioning and minimum dimensions of contact areas; the smart card includes a plurality of contact surfaces, the dimensions of which are greater than those defined by the 3FF format for the contact areas, the outer dimensions of the card being smaller than those of the 3FF format; and the adapter includes a recess, the outline of which is defined by a plurality of arms that surround the recess, the recess being shaped so as to receive the smart card so the contact areas of the adapter fit inside the contact surfaces of the smart card, each of the contact areas being off-center relative to each of the contact surfaces, so each arm has a width of 700 micrometers, ensuring mechanical stability.
Abstract:
A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active operating system, and, in the affirmative, to launch execution of the operating system, an authentication step of a updater device, as a function of first authentication data determined by a secure element and second authentication data received from the updater device, and, in response to the authentication step, a storage step of a new operating system received from the update, device in the non-volatile memory and an activation step of the new operating system, when said instructions are executed by a microprocessor.
Abstract:
A method for producing a security device (1) comprising a first colour pattern (A) visible along an associated viewing axis (Δα) and at least one second colour pattern (B) visible along an associated viewing axis (Δβ), comprising the following steps:—assembling an image layer (4) suitable for forming at least one colour pattern (A, B) by laser etching, on a support (3),—laser etching the first colour pattern (A) in the image layer (4), along the associated viewing axis (Δα) of same, in such a way that it can be seen through a lens array (7),—for each of said at least one second colour pattern (B), laser etching said at least one second colour pattern (A) in the image layer (4), along the associated viewing axis (Δβ) of same, in such a way that it can be seen through a lens array (7). A security device (1) obtained by said method.
Abstract:
The invention relates to a method of initiating a conversation, the method comprising the following steps: obtaining (3030) a presentation content; then, once said content has been obtained, sending (3040) said content to a telecommunications terminal that is to be called; and a calling telecommunications terminal calling (3060) said telecommunications terminal that is to be called, the call (3060) including the calling terminal sending an identifier of the terminal that is to be called to a telephone switch; the method being characterized in that the step of obtaining and then sending the content are also performed by said calling telecommunications terminal.
Abstract:
The fabrication of an electronic document includes the following steps: —obtaining of a flat body in which is made a cavity of globally rectangular shape including a deep portion surrounded by a countersink and which contains an electronic component having connection terminals situated on this countersink while having the shape of meanders 5A, 5B, —obtaining of a module including a support furnished on a so-called external face with a plurality of external contact zones and on a so-called internal face with a printed circuit including connection pads 4A, 4B of hefty form while being connected to certain at least of the external contact zones, the support being furthermore furnished, on this internal face, with a microcircuit connected to this printed circuit, this module being encased in the cavity by an anisotropic conducting adhesive whose overlap coefficient lies between 5 and 8%.
Abstract:
In a network including an application server, a network server, and a device having a memory storing an application cryptographic key, a method includes: testing the memory for the absence or presence of a cryptographic key associated with the network; if the key is absent, the device sending a request to join the network, the application server producing derivation data, the application server encrypting the derivation data by the application cryptographic key, and the device receiving the encrypted derivation data; and in the event of the key being present, the device sending a request to join the network, the network server producing derivation data, the network server encrypting the derivation data by a network cryptographic key equal to or derived from the cryptographic key associated with the network, and the device receiving the encrypted derivation data. A method performed in the device, and an associated electronic entity are also described.
Abstract:
An electronic device is proposed, which is configured to receive at least one cryptographic parameter and validate the at least one cryptographic parameter. The electronic device is is configured to validating the parameter by determining an imprint from a one-way function and from at least the cryptographic parameter; detecting at least one part of the imprint in a dedicated memory zone of the electronic device, and delivering a piece of information on validation should there be effective detection.