Abstract:
A method for verifying a security device including an image having a signature. The method may include operations for acquiring the image in order to obtain a first representation of the image, extracting the signature, and verifying the signature. Also included are implementations in the form of a verification apparatus, a computer program, and a computer data medium including such a computer program.
Abstract:
A dual module for a dual chip card includes a supporting film supporting on an outer surface, a plurality of connecting pads including two series of connecting pads extending in a given direction and, on an inner surface, two inner connection areas for connection to an antenna of the dual card and a chip, the chip including contact terminals connected by wires to the inner connection areas or electric connecting pads by holes passing through the supporting film while being coated, together with the wires, by coating resin. The electric connecting pads of the outer surface include only three pads. Each of the two inner connection areas forms a comb including a body extending under each of the pads of one of the two series of connecting pads separated from the coating mass, respectively. Blades extend separately from one another from the body until ends covered by the coating mass.
Abstract:
Disclosed is an electronic entity having a transponder which includes a body provided with a recess and, inside the recess, a transponder including a mounting supporting an antenna formed by at least one turn running along the contour of the module and a microcircuit, the antenna and microcircuit being connected to one another, plates of conductive material being formed on each of the surfaces facing one another, covering 60-90% of the surface defined by the one or more turns of the antenna, forming a capacitor connected in parallel on the antenna, and the body including an annular metal area, the inner contour of which projects into the plane of the mounting surrounds the mounting and is suitable for concentrating the field lines toward the inside of the turn, the capacitor defining, with the antenna and the microcircuit, a given resonance frequency substantially equal to the frequency of an external reader.
Abstract:
An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly.
Abstract:
An intermediary third-party receives, from a master device, a batch of pre-generated secure commands; plays it so as to send sequentially, to a slave device, the commands. The batch includes an initial command indicating the establishment of a channel secured with a session key dependent on a sequence counter, and second commands protected by a MAC code that is a function of the session key. An update of the sequence counter in non-volatile memory of the slave on each new establishment of a secure channel renders the pre-generated batch obsolete by virtue of a new session key. In order to allow the batch to be replayed, the invention provides for each update value of the counter to be temporarily stored in volatile memory, and for the current value to be overwritten in non-volatile memory on predefined events, including a test counter reaching a maximum number of replays.
Abstract:
Methods and systems of simulating the effects of an attack seeking fraudulently to modify target code that is interpretable by a processor are disclosed. Various implementations may include means and operations for searching for a set of sensitive instructions in the target code; generating an interpretable “simulation” code having instructions representing the result of said attack on the set of instructions; selecting memory registers that might be accessed during the interpretation of the simulation code; interpreting at least a portion of the simulation code; and storing at least one value of the registers during the interpretation in order to enable the effects of the attack to be analyzed.
Abstract:
Disclosed are methods and electronic devices that communicate with a reader. The methods and devices may receive a command emitted by the reader, and then select an application to be executed by the device based on the command that is received. The methods and devices may also determine whether to perform one or more self test according to which application was selected.
Abstract:
An electronic entity includes a module formed of a support film carrying, on an internal face, a microcircuit and a first coupling coil, and a body including a cavity in which this module is fixed, the support film having an external surface running at least approximately alongside an upper surface of this body, and containing an antenna and a second coupling coil connected to this antenna and intended for the coupling of the antenna with the microcircuit by electromagnetic coupling with the first coupling coil; this second coupling coil (likewise may be the case for the antenna and the first coupling coil) is formed on a thickness of at most a few microns in a plane situated, with respect to the upper surface of the body, at a distance of less than half the distance with respect to the surface opposite from this upper surface of this body.
Abstract:
A method for producing a pattern in relief in a thin plastic card, includes the following steps: producing a stack of layers including, in the following order: a transparent layer, a special layer, a black surface, and a substrate layer, and drawing the pattern by a laser through the transparent layer.
Abstract:
The disclosure relates to the field of wireless communications, and more particularly a method of establishing an IP connection through a 3GPP mobile network, at least partially of IP type, a network equipment item, MME or PDN-GW, of that mobile network, a mobile network infrastructure, a mobile terminal and a corresponding system. The method includes the following steps, on a first equipment item, MME or PDN-GW, of the mobile network other than a mobile equipment item UE of the mobile network: receiving a fully qualified domain name, FQDN, sent by a mobile equipment item, UE, of the mobile network, the FQDN identifying a target data server; and on reception of the FQDN, triggering the resolution of the FQDN into an IP address of the target data server. Thus, a mobile user equipment item provided with a UICC card may be produced at low cost without incorporating DNS resolution mechanisms.