Abstract:
The invention is an applicative virtual machine that comprises a unique interface and is configured to fully delegate, through the unique interface, the structured storage of data to several autonomous entities which are separate from the virtual machine and which are configured to identify the physical memory location of said data.
Abstract:
The present invention relates to a method to provide user identification in privacy mode for using a user device (UE) with a Mobile Network Operator subscription to an on-line service offered by a service provider (SP) thanks to a GBA infrastructure comprising at least a Network Application Function (NAF) server suitable to retrieve at least a GBA secret key (KNAF) shared with the user device (UE). According to the invention the NAF server is used as identity provider and verifier.
Abstract:
The invention relates to a method (30) for authorizing data transaction. According to the invention, the method comprises the following steps. A device (12) generates a transaction cryptogram by using a first predetermined algorithm,at least one payment transaction key and at least one predetermined data item. A value of at least one of the at least one predetermined data item changes from a first to a second transaction. The device extracts, from the transaction cryptogram, by using a predetermined reduction scheme, a predetermined number of at least one unit of information, the at least one extracted information unit forming a reduced cryptogram. The device generates (38) a first restricted use account number based upon at least the reduced cryptogram and a bank issuer identifier. The device or another device sends to a first server (18) a first message (39) including at least one piece of user account information accompanied with the first restricted use account number. The first server sends to a back-end system a second message (310) including a request for authorizing a transaction accompanied with the at least one piece of user account information and the first restricted use account number. The back-end system retrieves, based upon at least part of the at least one piece of user account information, at least one piece of user account information. The back-end system generates (312) a second restricted use account number by using the first predetermined algorithm and the predetermined reduction scheme, the bank issuer identifier and at least part of the at least one retrieved piece of user account information. The back-end system compares (314) the second restricted use account number to the first restricted use account number. Only if the second restricted use account number matches the first restricted use account number, the back-end system retrieves, based upon at least part of the at least one retrieved piece of user account information, at least one piece of user account information. And the back-end system or another entity sends to the first server a third message including, as request response, a transaction authorization. The invention also relates to corresponding device (12) and back-end system.
Abstract:
The invention is a method for managing a secure channel between a server and a secure element embedded in a first device, wherein a user agent embedded in a second device establishes a HTTPS session with the serverand retrievesa web application from theserver, themethod comprising the steps: -the server sends to the web applicationan application certificate which is linked to a specific data reflecting the identity of the server, -the secure element gets the application certificate and the specific data, -the secure element checks the validity of the application certificate and that the application certificate is consistently linked to the specific data, -in case of successful checks, the secure element and the server generate an ephemeral session key and use it for opening a secure channel.
Abstract:
The invention relates to a method 20 for proving at least one piece of user information. According to the invention, the method comprises the following steps. A requester device 12 sends to a server 18 a first message 22 including a request for proving at least one piece of user 11 information and data identifying a requester. The server generates 24 requester authentication data and associated data identifying a transaction. The server generates 26 a proof of user information using the at least one piece of user information and the requester authentication data. The server sends to the requester device a second message 28 including, as a request response, the proof of user information and the associated data identifying the transaction. A verifier device 12 sends to the server a third message 214 including a request for getting authentication data associated with data identifying a transaction and the associated data identifying the transaction. The server sends to the verifier device a fourth message 218 including, as a request response, authentication data associated with the data identifying the transaction. The verifier device or a verifier 19 authenticates the at least one piece of user information only if the received authentication data matches the requester authentication data. The invention also relates to corresponding requester device, verifier device and server.
Abstract:
A device (1) is intended for managing multiple accesses to a secure module (5) of a system on chip (2) of an apparatus (3), and comprises a stream ciphering means (13, 132) arranged for computing on the fly and in a single pass an integrity check for data to be transferred between secure (5) and non secure (4) modules of the system on chip (2) with a seed and an encryption key, and for encrypting/decrypting on the fly and in this single pass these data with the encryption key, and a control means (1, 12) for providing the encryption key and seed to the stream ciphering means (13,132) and for requesting data transfer and retrieving status to the secure (5) and non secure (4) modules for allowing the transfer of encrypted/decrypted data between the secure (5) and non secure (4) modules.
Abstract:
The invention relates to a method (20) for detecting a corruption of at least one configuration parameter. A chip (12) is coupled to a device (14). The device stores at least one configuration parameter for configuring an access to an Internet (120) type network. According to the invention, the chip stores data relating to at least two subscriptions. The method comprises the following steps. The chip de-activates a first subscription. The chip activates a second subscription. The second subscription is distinct from the first subscription, as a previously active subscription. The second subscription is a currently active subscription. The chip detects whether the device does or does not read a currently active subscription. Only if the device reads a currently active subscription (22), then the chip detects whether at least one configuration parameter does or does not allow accessing an Internet type network. Only if at least one configuration parameter does not allow accessing an Internet type network, then the chip ascertains (215) that at least one configuration parameter is corrupted. The invention also relates to a corresponding device (12).
Abstract:
The present invention relates to a method to generate a mask (M) of a predefined size of b*m bits, said method comprising the following steps: generating a random number of a limited number p of bits, providing the p bits random number as the input of a deterministic random number generator (RNG) that outputs a random number of length m, applying to the output random number of length m an expansion function (EFM) using an error correcting code function to multiply the length by b and obtain a mask (M) of a size of b*m bits, a reseeding function (RFM) being regularly applied to the random number generator (RNG).
Abstract:
A system, method and computer-readable storage medium with instructions for operating an electronic device to protect against attacks that are constructed by chaining programming gadgets from executable code. The technique includes associating a value with functions and pushing and popping the function association value from a special stack. Further, on function returns, top of special stack is compared to the function association value. Other systems and methods are disclosed.
Abstract:
The smart card according to the invention comprises a card body (3) in a first format enclosing a card body (4) in a smaller and thinner format than the first format card body. To manufacture this smart card, on a front face of a larger format card body, machining is used to reduce the thickness of an area (102) corresponding to the smaller format card body, then cutting out by stamping the smaller format and hence also thinner card body (4), and then immediately reinserting the aforesaid cut card body into the slot made by cutting out, far enough to make the machined surface (103) of the smaller format card body flush with the front surface (101) of the larger format card body. Application particularly to manufacturing multi-format smart cards, comprising a 4FF format card.