摘要:
A method for dynamically authenticating an executable program, that is the continuation of the instructions defined thereby, is performed repeatedly during the very execution of the program. The method for making secure an electronic portable object through execution of a program supplied by another insecure electronic object uses, inter alia, a secret key protocol.
摘要:
A method is provided for auditing compliance of an electronic platform, referred to as the platform being tested, and/or a computer program being tested, which is present on the platform being tested. The method includes the following steps: transmitting the same data set, via an auditing device, to the platform being tested, on the one hand, and, on the other hand, to a compliant reference platform present in the auditing device; and deciding upon the compliance of the platform being tested and/or the computer program being tested, based on an analysis of the respective behaviors of the platform being tested and the reference platform. The auditing device then issues a compliance decision.
摘要:
A method is provided for supplying data representative of transactions between a client and at least one merchant, via a banking institution. The banking institution issues a statement to the client which, for each transaction, includes a statement line containing at least one reference for said transaction and/or the merchant, and an amount corresponding thereto. The method includes a transaction phase, including: storing data representative of said transaction, in a statement server; acquiring and storing, in an illustrative data server, at least one information representative of a photograph and/or illustration representative of said merchant, called illustrative information. A supplying phase includes: creating the statement, associating to at least one of the statement lines the data representative of the transaction and at least some of the illustrative information, and/or at least one information pointing via one hyperlink to at least some of said illustrative information, called access information.
摘要:
A process is provided for deterring the theft of notes equipped with a radio-tag type authenticity check element, capable of returning an item of authenticity information, in response to an authentication request emitted by a check device. Such a process includes the following steps: transmission to the check element of at least one inactivation code, rendering the note invalid; storage and/or transport of the invalid note; and reactivation of the check element, using at least one activation code, depending on the inactivation code, rendering the note valid.
摘要:
Two methods for random number generation are modified to make them more resistant to attacks by current measurements. The methods are particularly designed to be implemented in electronic devices such as smart cards, PCMCIA, badges, contactless cards or any other portable device. The DES algorithm is encrypted using a key K having a value D representing date information, to generate an integer variable I. For j ranging from 1 to m, the following steps are carried out: substituting s with s XOR I; introducing in the integer variable y the result of the encryption of s with the DES algorithm using the key K; introducing in xj the result of y or s; substituting s with y XOR I; and introducing in s the result of the encryption of s with the DES algorithm using the key K. The sequence (x1, x2, xm) is then restored in the output.
摘要:
In a system for controlling access to signals such as pay-TV signals, the signals include data packets that are received and by a decoder and forwarded to a smart card for access authorization processing. The data packets contain information that updates entitlement or access authorization data inside the smart card. Time-related data is added to the data packets. The smart card checks to determine if the time-related data evolves between two successive packets. If not, the smart card inhibits the delivering of descrambling parameters to the decoder.
摘要:
A system providing access control, including encryption and decryption capability, replaces a public key directory by a transmission between an authority, or a sender S, and a receiver R of a "seed" value. The seed is processed to provide both identity information for R and public keys, i.e. a "virtual public key directory", or VPKD. The VPKD is generated prior to execution of the algorithm requiring the public directory, i.e. the host algorithm.
摘要:
A method for securing a transaction by an electronic card paired with at least one mobile terminal, wherein a banking organization in charge of managing transactions involving the card has previously recorded an identifier of the mobile terminal among data relating to the owner of the card. The securing method includes: transmission, by the mobile terminal, of at least one first signal including a message containing the identifier; receipt, by at least one transaction device near the mobile terminal, of the first signal; transmission, by the transaction device, of a second signal including at least the message to at least one remote banking organization; assignment, by a control server of the banking organization, to a transaction involving the electronic card, by a control server of the banking organization, of information representing proximity between the electronic card and the mobile terminal, according to the second signal received by the banking organization.
摘要:
Patching a read-only memory, including a program executable by a processor is performed with a MRAM-based CAM device connected to the address bus and comparing in the background the addresses requested by the processor with the elements of a vector of addresses. The match-in-place operation is done in parallel on all the elements of the vector and typically is performed in less than a clock cycle. If a match is found, the CAM device outputs a diversion address that's used to retrieve a substitution machine code element from a flash memory that is presented to the processor in lieu of the one addressed in the ROM. This patching scheme is totally transparent, has little overhead, and extreme granularity.
摘要:
There is proposed a method of generating secret and public keys vDGHV with enhanced security, implemented in a device including at least one microprocessor and a memory. The method includes generating a secret key SK corresponding the generation of a prime random number p or product of prime numbers.