Abstract:
Method of managing profiles in a secure element, the secure element including a first profile associated with a first communication network and a second profile associated with a second communication network, the first profile being active. The method includes steps of deactivation of the first profile and activation of the second profile. The steps of deactivation and of activation are implemented following the detection of a failure during a local verification pertaining to the first profile for the use of this the first profile. A local verification may be a verification in the secure element of the authorization of access of a user to the first profile, for example three failures of PIN or PUK code or of biometric authentication data.
Abstract:
An example of an emergency call system includes a device for triggering an emergency call and a communications device having a secure element. In various implementations, the secure element includes at least two profiles, one of which is an emergency profile; and a receiver that receives, over a local communications channel, an event issued by the device for triggering an emergency call. The communications device may also include means for activating the emergency profile, which enables emergency calls to be made in a communications network if the emergency profile is not already active. The communications device may also include means for calling an emergency number in the communications network in order to make the emergency call.
Abstract:
A method that may be performed by a profile management server for managing the profiles of a secure entity, such as an embedded universal integrated circuit card. The method may include sending a message to the secure entity in order to modify the active profile of the entity; initializing and starting a timer; and in the event that the server does not receive a message indicating which profile is active in the secure entity before the expiry of a predetermined duration after the starting of the timer, then starting an audit procedure for determining which profile is actually active in the secure entity.
Abstract:
A method and apparatus for sending security information are disclosed. The method is performed by a terminal that performs operations, which may include: during a current transaction, receiving first transaction data coming from an electronic device with which the terminal is co-operating; detecting an event encountered by the terminal during the current transaction; generating a transaction message including an indicator indicating that the first data is included in a field of the message; inserting security information in the field of the transaction message as a replacement for the first transaction data, the security information being representative of the event; and sending the transaction message including the security information to a remote server.
Abstract:
Disclosed is a method for consulting, by an electronic entity (EE), the status of a resource (S, K) of an electronic device provided with a contactless module (CLF) and the electronic entity (EE), including the following steps: transmission, by the electronic entity (EE), of a resource (S, K) status request;—reception of a piece of resource (S, K) status information in response to the request;—storing of the resource (S; K) status information (INF);—execution of at least a part of an application (APPL) by a processor of the electronic entity (EE);—calling, as a result of the execution of the application (APPL), of a programming interface (API), resulting in the reading of the piece of stored resource (S, K) status information. An associated electronic entity and electronic device provided with such an electronic entity are also proposed.
Abstract:
Devices, systems, and methods related to an embedded subscriber identity module (eUICC) suitable for co-operating with a communication device (T) are described. The module may include a communication profile (P1) configured to enable the embedded subscriber identity module to communicate with a telecommunications network (R) when the profile (P1) is active; a reception module (PSM) for receiving, from a remote server (SM-SR) of the mobile telephone network (R), a communication profile management request; and a profile manager module (MGP). The profile manager module may be configured such as, on receiving the management request, to determine whether a rule from a predefined set of at least one rule (RL) is applicable; and if so, to execute an action specified by the applicable rule in association with a communication profile of the embedded subscriber identity module.
Abstract:
Devices and methods for masking and unmasking sensitive data, based on a standard cryptographic algorithm defining a ciphering algorithm, and a deciphering algorithm using more resources than the ciphering algorithm are described. The masking of sensitive data is done by applying the deciphering algorithm to the sensitive data to obtain masked sensitive data. The unmasking of the masked sensitive data is done by applying the ciphering algorithm to the masked sensitive data to obtain sensitive data in plain form.
Abstract:
A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user.
Abstract:
Notification devices and methods for configuring a secure element incorporated into a terminal connected to a network are disclosed. The devices and methods may perform steps implemented by an application of the secure element, such as obtaining at least one item of information that can be used to configure the secure element stored in a memory of the terminal outside the secure element, sending the item of information and an identifier of the secure element to a configuration system, and obtaining configuration data originating from the configuration system, the configuration data being supplied to the secure element depending on the item of information.
Abstract:
An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly.