摘要:
The invention relates to a method for authenticating a user. A server accesses an identifier relating to the user associated with an identifier relating to a second user device. The server accesses, for the user, at least one predetermined reference location within a reference table. The method comprises the following steps. Sending from a first user device to the server, through a first communication channel, a first message including the identifier relating to the user and a request to get a challenge table, as challenge user authentication data. Generating, by the server, a first challenge table including a first set of characters, the first challenge table being valid. Sending, thanks to the second user device identifier, from the server to the second user device, through a second communication channel, a second message including the first challenge table and a first request to display the first challenge table. Displaying, by or through the second user device, the first challenge table. Selecting, by a user, through a man machine interface relating to the first user device, at least one corresponding displayed character, as at least one selected character. Sending, from the first user device to the server, through the first communication channel, a third message, as a challenge response message, including the at least one selected character, as submitted user authentication data. Determining, by the server, based upon the at least one predetermined reference location within the first challenge table, as the reference table, at least one corresponding reference character, as reference user authentication data. Verifying, by the server, for the user, whether the submitted user authentication data does or does not match the reference user authentication data. And succeeding, by the server, in authenticating the user only if the submitted user authentication data matches the reference user authentication data. Or failing, by the server, to authenticate the user only if the submitted user authentication data does not match the reference user authentication data.The invention also relates to corresponding user devices, server and system.
摘要:
The present invention relates to a method to authenticate a user using an authenticator at an access device using another registered device named personal device, said authenticator being stored by the access device after registration of the personal device comprising a double encryption using an access device's secret key and a personal device's public key to be retrieved at each request of authentication received from the personal device, encrypted using a session key and sent with the session key encrypted using the personal device's public key to the personal device for partial decryption using the decrypted session key and the personal device's private key, re-encryption using the session key and sending back to the access device for total decryption of the authenticator, using the session key and the access device's secret key, and use of the thus decrypted authenticator to authenticate at the access device.
摘要:
A method for managing access to a first server comprises intercepting a message including a connection request, for connecting to the first server. The message is sent at an initiative of a secure element, to the first server. A filtering rule, based upon a predetermined threshold relating to a rate or a number of connection requests, as a first filtering criterion, is accessed. The filtering rule comprises a second filtering criterion. A counter is modified for each intercepted message. The counter is compared to the predetermined threshold and, if the counter is equal to or greater than the predetermined threshold and the second filtering criterion is satisfied, a message including predefined output data is sent to the secure element. The output data controls or filters a session between the secure element and the first server.
摘要:
To authorize a data transaction, a terminal reads user account information from a device. The terminal sends, through a payment network, to a first server a request for authorizing a transaction accompanied with the account information. The first server sends to a device a request for a user approval relating to a transaction. The device requests whether the user approves a requested transaction authorization. Only if the user approves the requested transaction authorization, the device sends to the first server a request for authorizing a transaction and an identifier relating to the device. The first server retrieves, based upon the at identifier relating to the device, the account information. The first server sends to a second server a request for authorizing a transaction and the account information. The second server sends, through the first server and the payment network, to the terminal, either a transaction authorization or a transaction refusal.
摘要:
The invention is a system comprising a host device and a secure element including a plurality of virtual profiles and an execution component configured to run simultaneously several of said virtual profiles. The system comprises a discovery agent configured to provide a subset of the plurality of virtual profiles, configuration data for each virtual profile of said subset and capability data reflecting the maximum of logical channels handled by the host device. The system comprises an allocating agent configured to cooperate with the discovery agent to allocate a range of logical channels to each virtual profile of the subset based on the capability data and to determine in each of the ranges a main logical channel which remains permanently available when the virtual profile to which the range is allocated has been booted.
摘要:
A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device. Determining a firmware update portion and an encrypted hash portion of the firmware update package wherein the encrypted hash portion is cryptographically signed by a signatory. Confirm that the encrypted hash portion conforms to the firmware update by independently computing the hash of the encrypted firmware update portion on the first microcontroller and comparing that value to the signed hash. Other systems and methods are disclosed.
摘要:
A system and method of operating a device connected to a host computer in a manner to preserve knowledge of logon authentication status to the host computer. Upon initialization of the device perform a pattern matching operation of an instruction sequence received by the second microcontroller. When the instruction sequence matches a prestored sequence indicative of performance of a logon process on the host computer tracking a logon state by the second microcontroller. Exchanging the logon state between the second and first microcontrollers such that when the second microcontroller resets, the second microcontroller may recover the logon state from the first microcontroller. Other systems and methods are disclosed.
摘要:
A client-side application extension executable on a host computer from within a web-browser having the capability of executing at least one web-browser add-on to provide a user access to a smart card, connected to the host computer having a smart card resource manager, via the web-browser. The web-browser extension has instructions to direct the central processing unit to access data on the smart card via a web-browser and platform independent interface module and a web-browser and platform dependent wrapper module connected to the web-browser and platform independent interface module and to the smart card resource manager having a function processing module operable to receive a call to the at least one function for accessing data on the smart card and for transforming the function call into a corresponding call to the smart card resource manager.
摘要:
A server accesses a user identifier associated with a first user device and a reference image as a first image set, to be displayed. The server sends to a second user device an image, as a second image set, to be displayed, and a user request to select an image within the first image set. The second user device displays the second image set and the user request. The user of the first user device selects at least one displayed first image, the selected first image matching an image visually selected within the displayed second image set, according to a rule known to the user and the server. The first user device sends to the server the first user device identifier accompanied with data relating to the selected first image. If the data relating to the selected first image matches the data relating to the first reference image the server authenticates the user.
摘要:
A method for securing a system including a configuration subsystem and a production subsystem. The configuration subsystem is separate from the production subsystem that comprises a plurality of components, a gatekeeper and an entity secured with a first secret value. A generator hosted in the configuration subsystem selects a secret sharing scheme and generates, from an input parameter different from the first secret value, a set of secret shares using the secret sharing scheme. The generator uniquely assigns and securely sends a secret share extracted from the set to each of the components. The gatekeeper gets a subset of the secret shares from the components and constructs a second secret value from the subset using the secret sharing scheme. The gatekeeper computes the first secret value by applying a preset function to the second secret value, and then the gatekeeper unlocks access to the entity using the first secret value.