Abstract:
A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user.
Abstract:
A system for biometrically authenticating a user includes: elements for obtaining image data that are representative of at least one user-associated biometric feature and at least one user-associated identifier, elements for extracting the at least one biometric feature in the image data, elements for extracting the at least one identifier in the image data, elements for performing a search for a reference biometric feature associated with the at least one identifier, elements for comparing the extracted biometric feature with the reference biometric feature, and elements for authenticating the user in accordance with a result of the comparison.
Abstract:
A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of private and public cryptographic keys by the device from at least one random variable coming from a random-variable generator; transmitting at least one constituent element of a generated private or public key to at least one device for verifying; and determining a level of security of the device from the at least one transmitted element, as a function of pieces of information stored by the device for verifying.
Abstract:
A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user.
Abstract:
A secure element for a telecommunications terminal, the secure element including means for performing a trusted services management application to manage at least one trusted application to he run by the telecommunications terminal.
Abstract:
A system for biometrically authenticating a user includes: elements for obtaining image data that are representative of at least one user-associated biometric feature and at least one user-associated identifier, elements for extracting the at least one biometric feature in the image data, elements for extracting the at least one identifier in the image data, elements for performing a search for a reference biometric feature associated with the at least one identifier, elements for comparing the extracted biometric feature with the reference biometric feature, and elements for authenticating the user in accordance with a result of the comparison.
Abstract:
A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of private and public cryptographic keys by the device from at least one random variable coming from a random-variable generator; transmitting at least one constituent element of a generated private or public key to at least one device for verifying; and determining a level of security of the device from the at least one transmitted element, as a function of pieces of information stored by the device for verifying.