摘要:
The cryptographic resources are supplied by at least one cryptographic source having a specific access interface. The application is presented with a mutualized interface substantially independent of the cryptographic sources and of their respective access interfaces. A translation module is placed between the mutualized interface and each interface for accessing a cryptographic source to provide access to the cryptographic resources from the application via the mutualized interface.
摘要:
The cryptographic resources are supplied by at least one cryptographic source having a specific access interface. The application is presented with a mutualized interface substantially independent of the cryptographic sources and of their respective access interfaces. A translation module is placed between the mutualized interface and each interface for accessing a cryptographic source to provide access to the cryptographic resources from the application via the mutualized interface.
摘要:
A computer application is provided with a cryptographic toolbox with having a modular architecture. The toolbox has a module for manipulating data formats used in the performance of cryptographic functions, a module for executing algorithms involved in cryptographic operations, a module for accessing cryptographic resources, and a functional module supervising the data format manipulation, algorithm execution and cryptographic resource access modules. The functional module has a functional interface with the rest of the application.
摘要:
A ring-signature scheme is adapted so that at least one of the variability parameter values used is an identity trace of the anonymous signatory, determined as a function of anonymity withdrawal data stored and held secret by an anonymity withdrawal entity in connection with an identification of the anonymous signatory. This provides a subsequent controlled capacity of withdrawing the anonymity of the signatory, either by an authority, or by the signatory himself.
摘要:
For signing of data by a given one of M delegates mandated by N titleholders, where M≧2 and N=1 or M=1 and N≧2, the terminal of the given delegate reads in a delegation server information on the delegates and the titleholders of the group thus constituted. The data and the information read and a private key of the given delegate are applied to a cryptographic algorithm to produce a signature which therefore carries a cryptographic delegation mark. The data, information, and signature are transmitted to a user terminal that can trace the characteristics of the signature delegation.
摘要:
In order to apply an electronic signature from a client station having authentication resources at a server, the following steps are carried out: the client station is authenticated at the server, thus establishing an authenticated communication channel; a private key/public key pair is generated at the client station; a signature certificate request generated by means of at least the public key is transmitted from the client station to the server via the authenticated channel; a signature certificate obtained in response to the request is returned via the authenticated channel; this certificate is verified at the client station; an electronic signature is calculated at the client station by means of the private key, after which this private key is destroyed; and the calculated signature is formatted with the aid of the signature certificate received via the authenticated channel.
摘要:
In order to prevent the use of a virtual prepaid card illegitimately acquired and transmitting only one identification code, for example read after the card has been scratched, to a service provision server, a second code is delivered on paying for the card, and the two codes have to be authenticated so that the user-purchaser of the card can subsequently use the service concerned in the server still using only the first code.
摘要:
A method for communication between a first unit and a second unit via a telecommunications network, wherein the first unit comprises a first family of applications and a second family of applications having communication capacities on the network extending beyond communication capacities of the applications of the first family, the method including: obtaining, by a confidence component belonging to the second family of applications a statement of a question to be posed to a user of the first unit in the context of an execution of an application of the first family; presenting the question by the confidence component via a user interface and capturing a response from the user by the confidence component; and for at least one type of response from the user, transmitting from the confidence component to the second unit, via the network, at least one message identifying the question presented and indicating the response captured, said message being transmitted under conditions inaccessible to the applications of the first family.
摘要:
A method for communication between a first unit and a second unit via a telecommunications network, wherein the first unit comprises a first family of applications and a second family of applications having communication capacities on the network extending beyond communication capacities of the applications of the first family, the method including: obtaining, by a confidence component belonging to the second family of applications a statement of a question to be posed to a user of the first unit in the context of an execution of an application of the first family; presenting the question by the confidence component via a user interface and capturing a response from the user by the confidence component; and for at least one type of response from the user, transmitting from the confidence component to the second unit, via the network, at least one message identifying the question presented and indicating the response captured, said message being transmitted under conditions inaccessible to the applications of the first family.
摘要:
A method of enciphering information constituted by a finite sequence {S1,S2, . . . ,SN} of N symbols (S1,S2, . . . ,SN) selected from an alphabet A. There are defined both a secret convention of p key symbols K1, . . . ,Kp selected form a second alphabet B, and a multivariate function M having m+1 variables (m