Abstract:
Disclosed is a method implemented in an identity document including a microcircuit and a unit enabling the microcircuit to communicate with a terminal, the microcircuit being designed to permit the transmission of data obtained (directly or indirectly) from data memorized in a storage zone in response to a request received from the terminal, furthermore including the following steps: reception by the microcircuit of an identifier of the terminal; at least partial comparison of the identifier of the terminal and of at least one portion of an identifier stored in the microcircuit; and performance of a set action depending on the result of the comparison. An identity document in which such a method is implemented is also described.
Abstract:
The invention relates to systems and methods of securely transmitting an image stored in the memory of an identity document to a first terminal that is suitable for receiving the image. In various implementations, operations are performed by the identity document, including the identity document receiving an attribute transmitted by the first terminal; generating a marker from the attribute received from the terminal; including the marker in the image; and transmitting the image containing the marker, which may be referred to as the “modified” image, to the terminal.
Abstract:
Methods and devices for enabling authentication may include a first stage in which a first electronic device of the first entity communicates with a second electronic device of the second entity via a telecommunications network. During the first stage, the first electronic device generates a first token and transmits it from the first electronic device to the second electronic device via the network; and the second electronic device generates a third token and transmits the third token to the first electronic device via the network. During a second stage, authenticating a first non-authenticated entity as being the second entity as a function of a second token contained in a first portable electronic device of the first non-authenticated entity occurs; and authenticating a non-authenticated entity as being the first entity as a function of a fourth token contained in a second portable electronic device of the second non-authenticated entity also occurs.