Abstract:
A packet transmission method, in which first packets are sent by source stations (5, 6, 7) to target stations (8, 9), the source and target stations being connected via a packet mode data network (1), in which first packets (P1, P2, P3), chosen according to at least the size and the target station of each first packet from a set of first packets sent by source stations, are aggregated to form respective second packets (Pu) of the same protocol level as the first packets; when a second packet satisfies a determined transmission criterion, the second packet is sent to an address determined as a function of the target stations intended to receive first packets aggregated in the said second packet.
Abstract:
A method of securing requests for access to services from a terminal (1) able to communicate with a plurality of service operators (A; B) delivering respective services, comprising the following steps: furnishing the terminal with at least one software component (6; 7) provided by an operator delivering at least one service with a particular access condition, upon a request for access to the said service from the terminal by way of a communications network, executing the software component provided by the operator locally in the terminal, the execution of the software component comprising at least the presentation to a user of the terminal of an indication defined by the operator in the component in relation to the particular access condition of the service.
Abstract:
This invention relates to a system and to a method for submitting a message (MSG) to a telecommunications terminal (2) of an addressee, which message has been deposited by a caller in an inbox (12) of a messaging server (1) of the addressee. The method comprises the following successive steps: a step of sending a request to search for an illustration (8) from the voice messaging server (1) to a directory device (3), a step of sending said illustration (8) from the directory device (3) to the messaging server (1), a step of sending the deposited message (MSG) and said illustration (8) from the messaging server (1) to a multimedia messaging server centre (MMSC), and a step of sending a multimedia message (MMS) containing at least said deposited message (MSG) and said illustration (8) from the multimedia messaging server centre (MMSC) to the terminal (2).
Abstract:
A method of granting authorization to access a resource, comprising the following steps: connecting a user to an access management center to request that authorization to access a given resource be granted to a third party equipped with a mobile terminal, defining particular conditions governing the access authorization, the user sending coordinates of the third party's mobile terminal to the access management center, the access management center generating access data as a function of the resource and said particular conditions, and sending said access data to the third party's mobile terminal to enable the latter to be identified by an access control device associated with said resource in order to authorize the third party to access that resource.
Abstract:
A method for the watermarking of a sequence of video images implements a step for the insertion of at least one watermarking bit into at least one motion vector obtained by motion estimation between two images of said sequence, so as to obtain at least one watermarked motion vector. The motion vector is identified by its coordinates in a reference space, partitioned into two types of complementary zones, each having a distinct binary value associated with it. The insertion step implements, if necessary, a modification of the coordinates of said motion vector so that it is located in a binary value zone corresponding to said watermarking bit to be inserted. During said modification, at least two potential watermarked motion vectors are determined and, from among said potential watermarked motion vectors, an optimal watermarked motion vector is selected according to at least one predetermined criterion, so that the modified coordinates of said motion vector are those of said optimal watermarked motion vector.
Abstract:
Control device for a wireless communications network, comprising a calculator of quantities related to attenuations measured between mobiles and base stations, and/or to the signal to interference and noise ratio threshold, and a decision device with regard to the processing of new candidate mobiles, this device operating conjointly with the calculator according to a predefined mechanism. The said mechanism comprises: a load calculation function for each mobile, and an evaluation of a working condition, representing the feasibility of the servicing of mobiles by a station.
Abstract:
The present invention relates to a method of selecting transmission channels in a time data multiple access protocol and to a communication system using the method of the invention. Based on indications of transmission quality (Ci(tnullk)) of each channel, stored during a time window (T), the method consists in selecting (S6) one channel that has the best current transmission quality indication position (Pi) relative to those stored during the time window (T). This method can be used to take advantage of independent variations in the quality of transmission of each channel while providing equitable access to the transmission resource.
Abstract:
An asymmetrical cryptographic method of protecting an electronic chip against fraud in transactions between the electronic chip and an application, involving calculating an authentication value V from input parameters in the electronic chip. The chip produces a pseudo-random number r specific to the transaction by means of a serial pseudo-random generator included in the chip. The chip sends the application a parameter x calculated by the application prior to the transaction, linked to the random number r by a mathematical relationship, and stored in a data memory of the chip. The chip calculates a parameter y constituting the whole or a portion of the authentication value V by means of a serial function whose input parameters are at least the random number r specific to the transaction and a private key s belonging to an asymmetrical pair of keys. The chip sends the authentication value V to the application, and the application verifies the authentication value V by means of a verification function whose input parameters consist exclusively of public parameters including at least the public key p.
Abstract:
An optical fiber distribution frame including a first cross-connection panel (B1) and a second cross-connection panel (B2) facing each other, and a first support (7) in each panel for connection modules (12) thereof. Each module on the first panel is adapted to be connected to one end of an optical fiber (R) of a first group, each module on the second panel is adapted to be connected to one end of an optical fiber (E) of a second group, and an optical fiber of the first group is adapted to be connected to an optical fiber of the second group by a jumper fiber (FL) which has two ends (e1, 20; e2, 20) respectively received in a port of one of the modules on the first panel and in a port of one of the modules on the second panel. The first and second panels each include a second connection module support (7), with said second supports cooperating with each other to form a stowage area for jumper fibers (FL) that are not in use and awaiting connection. The jumper fibers are automatically connected or disconnected by a device (14).
Abstract:
In order to apply an electronic signature from a client station having authentication resources at a server, the following steps are carried out: the client station is authenticated at the server, thus establishing an authenticated communication channel; a private key/public key pair is generated at the client station; a signature certificate request generated by means of at least the public key is transmitted from the client station to the server via the authenticated channel; a signature certificate obtained in response to the request is returned via the authenticated channel; this certificate is verified at the client station; an electronic signature is calculated at the client station by means of the private key, after which this private key is destroyed; and the calculated signature is formatted with the aid of the signature certificate received via the authenticated channel.