Automatic client proxy configuration for portable services
    72.
    发明授权
    Automatic client proxy configuration for portable services 有权
    自动客户端代理配置便携式服务

    公开(公告)号:US07340748B2

    公开(公告)日:2008-03-04

    申请号:US09740986

    申请日:2000-12-21

    Abstract: In a distributed computing system which employs smart cards to provide services, the need for a fixed mapping between methods that can be invoked from a card application and APDU messages is avoided. A card skeleton provides a decoding table to a client proxy when a connection is established between a card and a terminal. With the information provided from the skeleton, the proxy dynamically maps methods to APDU messages, for communication during a given session. As a result, if the on-card application is enhanced to provide new methods, its corresponding skeleton is upgraded to recognize those methods. When the card is connected to a terminal, the updated information is provided to the proxy at the terminal, to enable the user to access the enhanced features of the application.

    Abstract translation: 在采用智能卡提供服务的分布式计算系统中,避免了可以从卡应用程序和APDU消息中调用的方法之间的固定映射的需求。 当在卡和终端之间建立连接时,卡骨架向客户端代理提供解码表。 通过从骨架提供的信息,代理将方法动态地映射到APDU消息,以便在给定会话期间进行通信。 因此,如果增强了在线应用程序来提供新的方法,则其对应的骨架将被升级以识别这些方法。 当卡连接到终端时,将更新的信息提供给终端处的代理,以使得用户能够访问应用的增强特征。

    Method for protection against fraud in a network by icon selection
    73.
    发明授权
    Method for protection against fraud in a network by icon selection 失效
    通过图标选择防止网络中的欺诈的方法

    公开(公告)号:US07340599B2

    公开(公告)日:2008-03-04

    申请号:US10398732

    申请日:2001-09-11

    Applicant: David Naccache

    Inventor: David Naccache

    CPC classification number: G06F21/36

    Abstract: To improve security of operations in a communication network such as Internet, a database containing a plurality of icons is stored in the installation program of a browser. When executing the installation program, an icon in the icon database is selected. The selected icon is stored in a storage unit which is inaccessible by any device other than the browser. The selected icon is displayed when executing the browser, and it is assigned a feature to indicate whether the current operation is secure.

    Abstract translation: 为了提高诸如因特网的通信网络中的操作的安全性,包含多个图标的数据库被存储在浏览器的安装程序中。 执行安装程序时,图标数据库中的图标被选中。 所选图标存储在除浏览器之外的任何设备无法访问的存储单元中。 执行浏览器时会显示所选图标,并为其分配了一个功能来指示当前操作是否安全。

    Method for managing a secure terminal
    75.
    发明授权
    Method for managing a secure terminal 失效
    用于管理安全终端的方法

    公开(公告)号:US07246375B1

    公开(公告)日:2007-07-17

    申请号:US09462925

    申请日:1998-07-08

    Abstract: The invention concerns a method solving security problems resulting from the addition of a security circuit to a smart card reading terminal by providing said security circuit with means for counting the number of times the security circuit is activated for certain sensitive operations. When the total of said operations reaches a fixed value, the security circuit is prevented from operating until it is re-initialized again. Optionally, the circuit may have to be replaced by another.

    Abstract translation: 本发明涉及一种解决由安全电路添加到智能卡读取终端而导致的安全问题的方法,该安全电路为所述安全电路提供了用于计数安全电路对特定敏感操作激活的次数的装置。 当所述操作的总数达到固定值时,防止安全电路运行,直到再次重新初始化为止。 可选地,电路可能必须被另一个替代。

    Method and device for pre-saving personal data for a subscriber to a telecommunications network
    76.
    发明申请
    Method and device for pre-saving personal data for a subscriber to a telecommunications network 审中-公开
    用于预先保存用于电信网络的用户的个人数据的方法和设备

    公开(公告)号:US20070105532A1

    公开(公告)日:2007-05-10

    申请号:US10583373

    申请日:2004-12-15

    Abstract: In a method for saving personal data for a subscriber to a wireless communications network, the data is being memorized in a mobile communication station and saved in a network server by means of a first communication channel and in a first saving mode. A determination is made whether the mobile device may establish a second communication channel and/or has an other mode of saving. If so, communication is opened on the second channel and/or according to the other mode, and the data is saved by means of the second communication channel and/or the other mode.

    Abstract translation: 在将用户的个人数据保存到无线通信网络的方法中,数据被存储在移动通信站中,并通过第一通信信道和第一保存模式存储在网络服务器中。 确定移动设备是否可以建立第二通信信道和/或具有其他保存模式。 如果是,则在第二信道上和/或根据其他模式打开通信,并且通过第二通信信道和/或其他模式来保存数据。

    Adapter for a chip card having a reduced format in comparison with the standard SIM mini-card format
    77.
    发明授权
    Adapter for a chip card having a reduced format in comparison with the standard SIM mini-card format 失效
    与标准SIM卡小型卡相比,具有缩小格式的芯片卡适配器

    公开(公告)号:US07183636B1

    公开(公告)日:2007-02-27

    申请号:US09979891

    申请日:2000-05-11

    Abstract: An adapter for a portable integrated circuit device of the chip card variety has a reduced format in comparison with the standard mini-card format. The device with a reduced format includes a body on which a microcircuit defining contact pads is disposed. A support which has a standard mini-card format is provided with a cavity having the dimensions of the device with a reduced format. The device is detachably fixed in the cavity. The cavity is located in the support in such a way that the location of the contact pads of the microcircuit of the device with a reduced format coincides with the standardization location of the contact pads of a microcircuit having a standard format mini-card.

    Abstract translation: 用于芯片卡种类的便携式集成电路装置的适配器与标准迷你卡格式相比具有缩小的格式。 具有缩小格式的装置包括其上布置有限定接触垫的微电路的主体。 具有标准迷你卡格式的支架设置有具有缩小格式的装置尺寸的空腔。 该装置可拆卸地固定在空腔中。 腔体以这样的方式位于支撑件中,使得具有缩小格式的装置的微电路的接触焊盘的位置与具有标准格式微型卡的微电路的接触焊盘的标准化位置一致。

    Making secure downloaded application in particular in a smart card
    78.
    发明授权
    Making secure downloaded application in particular in a smart card 失效
    使安全下载的应用程序特别在智能卡中

    公开(公告)号:US07168625B2

    公开(公告)日:2007-01-30

    申请号:US10520434

    申请日:2003-07-07

    CPC classification number: G07F7/1008 G06F9/30178 G06F9/3802 G06Q20/3552

    Abstract: The invention concerns a method for differentiating between data and instructions thereby providing against certain attacks in a data processing device such as a smart card, whereby a generator associates a random number with an applicative component of a downloaded application, and a transformer in a virtual machine applies each of the instruction words in the component and the associated random number to a transformation function so as to store the transformed instruction words when downloading the component. A second transformer applies each of the transformed words of part of the component and the associated random number to the reciprocal function of the transformation function so as to retrieve the instruction words constituting the component part, to execute the same.

    Abstract translation: 本发明涉及一种用于区分数据和指令的方法,从而防止在诸如智能卡之类的数据处理设备中的某些攻击,由此生成器将随机数与下载的应用的应用组件相关联,以及虚拟机中的变换器 将组件中的每个指令字和相关联的随机数应用到变换函数,以便在下载组件时存储变换的指令字。 第二变压器将分量的一部分的变换词和关联的随机数应用于变换函数的倒数函数,以便检索组成部分的指令字,以执行相同的操作。

    Method for monitoring program flow to verify execution of proper instructions by a processor
    79.
    发明授权
    Method for monitoring program flow to verify execution of proper instructions by a processor 有权
    用于监视程序流程以验证处理器执行正确指令的方法

    公开(公告)号:US07168065B1

    公开(公告)日:2007-01-23

    申请号:US09936174

    申请日:2000-01-24

    Abstract: In a method for monitoring the flow of execution of a series of instructions of a computer program, a sequence of instructions are transmitted to the processor to execute the monitored program. These instructions are analyzed, and the result of the analysis are verified by referring to reference data recorded with the program. The reference data can include a value predetermined in such a way as to correspond to the result of the analysis produced during the monitoring process only if all the instructions have been actually analyzed during the program flow. The invention also concerns a device for monitoring the program execution, a program device, and a programming device operating according to the monitoring principles.

    Abstract translation: 在用于监视计算机程序的一系列指令的执行流程的方法中,将一系列指令发送到处理器以执行所监视的程序。 分析这些指令,并通过参考程序记录的参考数据来验证分析结果。 参考数据可以包括预定的值,以使得仅在程序流程中已经实际分析了所有指令时,才能对应于监视过程中产生的分析结果。 本发明还涉及用于监视程序执行的装置,程序装置和根据监视原理操作的编程装置。

    Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm
    80.
    发明授权
    Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm 失效
    实现椭圆曲线型公钥加密算法的电子元件中的对策程序

    公开(公告)号:US07162033B1

    公开(公告)日:2007-01-09

    申请号:US09937396

    申请日:2000-03-13

    Abstract: Elliptical curve based cryptographic algorithms are public key algorithms offering a shorter calculation time and smaller key sizes in comparison with RSA. In a smart card type environment, these algorithms are vulnerable to differential power analysis (DPA) attacks. The disclosed invention provides a countermeasure procedure enabling positive action to be taken against DPA-type attacks. The countermeasure does not reduce performance and is easy to use in a smartcard type component.

    Abstract translation: 基于椭圆曲线的加密算法是公钥算法,与RSA相比,提供较短的计算时间和较小的密钥大小。 在智能卡类型环境中,这些算法易受差分功率分析(DPA)攻击的影响。 所公开的发明提供了一种对抗DPA类型攻击的对策程序,其能够采取积极行动。 对策不会降低性能,并且易于在智能卡类型组件中使用。

Patent Agency Ranking