Abstract:
The present invention relates to a method for establishing secure history and audit of an integrated circuit card (10) comprising an audit register (20), for property hand-over, characterized in that it comprises the following steps: • storing in the audit register (20) of said integrated circuit card (10) remote actions performed on said integrated circuit card (10); • computing a hash function of the content of said audit register (20) of said integrated circuit card (10) and remote actions content, and storing the result of said hash function in said audit register (20) of said integrated circuit card (10); • storing on a remote server (30) an audit log (41) of remote actions performed on said integrated circuit card (10); and • verifying the integrity of said audit log (41) stored on said remote server (30) by comparing the content of said audit register (20) of said integrated circuit card (10) and the result of a computed hash function of said audit log (41).
Abstract:
The invention relates to a method (20) for authenticating to a mobile network. According to the invention, the method comprises the following steps. A device activates (22) only a first temporary subscription identifier. The device sends to a first server the first temporary subscription identifier (24) and first data (212). The first server sends to the device a first result message (216) including an authentication failure based upon the first data. The device activates (220) only a second temporary subscription identifier. The device sends to the first server the second temporary subscription identifier (222) and second data (232). And the first server sends to the device a second result message (236) including an authentication success based upon the associated first and second temporary subscription identifiers and the second data. The invention also relates to corresponding device and system and a server for authenticating devices to a mobile network.
Abstract:
La présente invention propose un procédé de vérification de l'intégrité d'une application informatique stockée sur un dispositif intelligent, et destiné à être exécutée sur un second dispositif. L' invention consiste en l' envoi d'un programme de contrôle dont l'intégrité est garantie, au second dispositif, et ce programme de contrôle va vérifier l'intégrité de l'application avec les ressources électroniques du second dispositif.
Abstract:
The present invention relates to a method to self-personalize a machine-to-machine connected device (Di), comprising the steps of, during manufacturing process, flashing the device (Di) with a same embedded information including a secret as for a batch of other devices using a same flash image, and then, at testing phase, use said secret to generate an authentication material to be used in authentication with a dedicated server (SV) and delete said secret.
Abstract:
The present invention relates to a method for downloading a subscription from an operator to a UlCC (91) embedded in a terminal (92). According to the invention, the method consists in: - transmitting from the terminal (92) to a platform (90) an identifier and a request for downloading the subscription; - verifying in the platform (90) that this terminal (92) is authorized to download the subscription by verifying the rights (R) of the terminal (92) thanks to its identifier; - downloading the subscription to the UlCC (91) if the rights (R) are confirmed and, otherwise, refusing to download the subscription.
Abstract:
The invention concerns a method for managing content on a secure element (20) connected to an equipment (21), this content being managed on the secure element from a distant administrative platform (22). According to the invention, the method consists in: Establishing, at the level of the administrative platform a secure channel between the equipment (21) and the administrative platform (22), thanks to session keys generated by the secure element (20) and transmitted to the equipment (21); - Transmitting to the administrative platform (22) a request to manage content of the secure element (20); - Verifying at the level of the administrative platform (22) that this request originates from the same secure element (20) that has generated the session keys and, if positive, authorizing the management and, if negative, forbid this management.
Abstract:
The invention proposes several methods related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. The methods relate for example to downloading subscriptions or to transfer subscriptions between UICCs.
Abstract:
The invention relates to a security token (ST) comprising: -a communication interface (USB-C, USB-DC) adapted to communicate with a host computer (HC); -a security module (SM), comprising encryption based security features (CR); -a non volatile memory (RO) storing at least an application (OA) to be uploaded and executed in a host computer, said application making use of said security features when executed in a host computer in communication with the communication interface. The security token is adapted (AMM) to modify the content of the application as uploaded or its execution parameters at successive connexions of the security token (ST) to a host computer (HC).
Abstract:
A method for managing credentials of a user and a password manager for credentials of services in the virtual world (over the internet) and in the physical world. The password manager is configured for easy and ergonomic use. The method is defined, in its broadest sense, as a method of managing credential into a mobile terminal wherein said credential comprising a secret data associated through an allocated resources to a picture of an object during an enrollment step, and wherein during a retrieval step when a selected picture matches with the picture of an object previously stored then the secret data associated to said selected picture from the corresponding credential is extracted and communicated to the user by for example displayed it on the terminal. The purpose is to allow the user not to need to remember those entire passwords and code and may thus increase the complexity of those passwords and code.
Abstract:
Procédé de sécurisation d'un dispositif électronique, par réallocation de tout ou partie des informations contenues dans la mémoire de ce dispositif, selon une méthode déterministe. Cette réallocation se faisant sur commande depuis un second dispositif. L'invention décrit également un programme informatique permettant de réaliser cette réallocation.