摘要:
When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
摘要:
When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
摘要:
A smart card is initially connected to a first mobile terminal and includes a first directory file adapted to store first contact cards. To access the first contact cards, initially stored in a directory of the first terminal, from a second mobile terminal an application in the first terminal copies each of the first cards of the directory in the first directory file, if the latter does not include the first card. In the second terminal connected to the card withdrawn from the first terminal, the application copies each of the first cards of the first directory file in the file of the second terminal, if the latter does not include the first card and if the first directory file is inaccessible by the second terminal.
摘要:
The invention concerns a terminal (T) comprising an agent (AS) for processing a secure content encrypted with a key (KCN) and transmitted by a first server (SCN). In order to manage a secure access to the secure content, an application (AG) of a portable communicating object, such as a chip card, associated with a terminal stores one type of related digital right (TDN) and a certificate and transmitted by the agent and stores an access right (DA) and the key (KCN) related to the secure content transmitted from a second server (SAD). The application adapts the access right and the key and modifies the secure content, based on the type of right, and produces a secure access file based on the adapted access right and the key and on the certificate, the produced file being accessible by the terminal so that the agent may process the modified content.
摘要:
The invention concerns a terminal (T) comprising an agent (AS) for processing a secure content encrypted with a key (KCN) and transmitted by a first server (SCN). In order to manage a secure access to the secure content, an application (AG) of a portable communicating object, such as a chip card, associated with a terminal stores one type of related digital right (TDN) and a certificate and transmitted by the agent and stores an access right (DA) and the key (KCN) related to the secure content transmitted from a second server (SAD). The application adapts the access right and the key and modifies the secure content, based on the type of right, and produces a secure access file based on the adapted access right and the key and on the certificate, the produced file being accessible by the terminal so that the agent may process the modified content.
摘要:
In order to request the presentation of an operator indicator in a user's terminal having a first mobile terminal connected to a first cellular radiocommunications network, the operator is related to a second mobile terminal whose call number is stored in the user's terminal and is transmitted therefrom to a server of the first network. The server compares the transmitted call number with call numbers of the first network mobile terminal contained in a first list, in such a way that it is enabled to read the operator indicator corresponding to the transmitted call number. A module in the form of a UICC card stores the indicator and submits it to the user for informing the user whether the call number belongs to the first network or belongs to another network.