Abstract:
The invention concerns a method for implementing in an electronic component a cryptographic algorithm using calculating means. The invention is characterized in that it consists in carrying out the following steps: a) selecting a value e among a specific number of values eI, ei being integers, b) checking if ei verifies a predetermined relationship: if so, then e=ei, and storing e for use in calculating said cryptographic algorithm.
Abstract translation:本发明涉及一种使用计算装置在电子部件中实现加密算法的方法。 本发明的特征在于,它包括执行以下步骤:a)选择特定数量的值e i i i i i i i i e i i i i i i i i i i i i i i i )检查是否验证预定的关系:如果是,则e = e i i i,并存储用于计算所述密码算法的e。
Abstract:
In a distributed computing system which employs smart cards to provide services, the need for a fixed mapping between methods that can be invoked from a card application and APDU messages is avoided. A card skeleton provides a decoding table to a client proxy when a connection is established between a card and a terminal. With the information provided from the skeleton, the proxy dynamically maps methods to APDU messages, for communication during a given session. As a result, if the on-card application is enhanced to provide new methods, its corresponding skeleton is upgraded to recognize those methods. When the card is connected to a terminal, the updated information is provided to the proxy at the terminal, to enable the user to access the enhanced features of the application.
Abstract:
To improve security of operations in a communication network such as Internet, a database containing a plurality of icons is stored in the installation program of a browser. When executing the installation program, an icon in the icon database is selected. The selected icon is stored in a storage unit which is inaccessible by any device other than the browser. The selected icon is displayed when executing the browser, and it is assigned a feature to indicate whether the current operation is secure.
Abstract:
The invention relates to a method of masking a plain datum b having n bits. The inventive method is characterised in that a masked datum m is produced using the following masking function: (I), wherein p is a prime number, bi is the bit at position i of plain datum b, and qi is the prime number at position i in a set of prime numbers (q1, . . . , qn) The invention also relates to a method of masking a biometric print, consisting in: determining a set of s real minutiae which are characteristic of the print; mixing and arranging the real minutiae with t false minutiae; and forming a mixed biometric datum b having n=s+1 bits, such that, for any i: bi=1 if position i corresponds to a real minutia, and bi=0 if position i corresponds to a false minutia. The invention can be used to secure a security document such as a bank cheque. m = ∏ i = 1 n q i b i mod p ( I )
Abstract:
The invention concerns a method solving security problems resulting from the addition of a security circuit to a smart card reading terminal by providing said security circuit with means for counting the number of times the security circuit is activated for certain sensitive operations. When the total of said operations reaches a fixed value, the security circuit is prevented from operating until it is re-initialized again. Optionally, the circuit may have to be replaced by another.
Abstract:
In a method for saving personal data for a subscriber to a wireless communications network, the data is being memorized in a mobile communication station and saved in a network server by means of a first communication channel and in a first saving mode. A determination is made whether the mobile device may establish a second communication channel and/or has an other mode of saving. If so, communication is opened on the second channel and/or according to the other mode, and the data is saved by means of the second communication channel and/or the other mode.
Abstract:
An adapter for a portable integrated circuit device of the chip card variety has a reduced format in comparison with the standard mini-card format. The device with a reduced format includes a body on which a microcircuit defining contact pads is disposed. A support which has a standard mini-card format is provided with a cavity having the dimensions of the device with a reduced format. The device is detachably fixed in the cavity. The cavity is located in the support in such a way that the location of the contact pads of the microcircuit of the device with a reduced format coincides with the standardization location of the contact pads of a microcircuit having a standard format mini-card.
Abstract:
The invention concerns a method for differentiating between data and instructions thereby providing against certain attacks in a data processing device such as a smart card, whereby a generator associates a random number with an applicative component of a downloaded application, and a transformer in a virtual machine applies each of the instruction words in the component and the associated random number to a transformation function so as to store the transformed instruction words when downloading the component. A second transformer applies each of the transformed words of part of the component and the associated random number to the reciprocal function of the transformation function so as to retrieve the instruction words constituting the component part, to execute the same.
Abstract:
In a method for monitoring the flow of execution of a series of instructions of a computer program, a sequence of instructions are transmitted to the processor to execute the monitored program. These instructions are analyzed, and the result of the analysis are verified by referring to reference data recorded with the program. The reference data can include a value predetermined in such a way as to correspond to the result of the analysis produced during the monitoring process only if all the instructions have been actually analyzed during the program flow. The invention also concerns a device for monitoring the program execution, a program device, and a programming device operating according to the monitoring principles.
Abstract:
Elliptical curve based cryptographic algorithms are public key algorithms offering a shorter calculation time and smaller key sizes in comparison with RSA. In a smart card type environment, these algorithms are vulnerable to differential power analysis (DPA) attacks. The disclosed invention provides a countermeasure procedure enabling positive action to be taken against DPA-type attacks. The countermeasure does not reduce performance and is easy to use in a smartcard type component.