Abstract:
Method for managing a package in a secure element The invention is a method of managing a package in a secure element comprising an initial operating system. The method comprises a step of updating the initial operating system to generate an updated operating system and a step of linking the package to the updated operating system. The linking step is automatically triggered by the step of updating the initial operating system.
Abstract:
Pour permettre l'affichage des dernières transactions, une carte à puce 100c pour transaction sécurisée comprend au moins une puce sécurisée 101c, par exemple de type EMV, munie d'au moins une interface de communication pour pouvoir communiquer avec un lecteur de carte afin d'effectuer une transaction, un afficheur électronique 103, une batterie autonome 104, un circuit lecteur de carte 150c relié à une interface de communication de la puce sécurisée pour pouvoir accéder à des informations contenues dans la puce sécurisée pour pouvoir les afficher sur l'afficheur.
Abstract:
The invention is a method of managing an object which is represented by a first instance of a class. The first instance is stored in a secure element comprising an initial operating system. The method comprises a step of updating the initial operating system to generate an updated operating system, a step of creating a metadata uniquely associated with the object, said metadata being permanently stored in the secure element and comprising a value of a parameter of said class which has been used to create said first instance. The method comprises a step of re-instantiating the object by generating an updated instance of the class in the updated operating system by using said value to set said parameter of the class, said updated instance representing the object. The re-instantiating step is automatically triggered by the step of updating the initial operating system.
Abstract:
Pour permettre l'affichage des dernières transactions effectues, une carte puce 100c comprend au moins une puce sécurisée 101c munie d'au moins une interface de communication pour pouvoir communiquer avec un lecteur de carte afin d'effectuer une transaction. La carte comporte en outre un afficheur électronique 103, une batterie autonome 104, et un circuit d'interception 150c relié à l'au moins une interface de communication de la puce sécurisée pour pouvoir intercepter au moins un type de commande et mémoriser au moins une information afin de pouvoir l'afficher sur l'afficheur.
Abstract:
An adapter allows to connect two electronic devices at the same port, at the same time. The device allows to actuate two devices at one single port which originally allows the connection of one single device. The adapter device includes a primary connector 2 to be connected to a host device taking up said adapter device, a secondary connector 4 to take up the memory card 3, an interrupter S1 connecting the primary connector and the secondary connector, and a device interface circuit 51 connected to the primary connector and controlling the opening and closing of the interrupter S1 depending on the commands arriving at the primary connector.
Abstract:
The invention relates to a method of securing a wireless communication between a first communication device (1) comprising a touch screen (2) and a second communication device (6) by using the communication through the touch screen to secure the wireless communication. To that purpose, the method comprises a a verification step (103) wherein at least one security data is exchanged between the first and the second communication devices (1, 7) through the touch screen (2) while the wireless communication channel is open.
Abstract:
La présente invention concerne un procédé de traitement de plusieurs flux de communication radiofréquence par une carte à circuits intégrés (2), lesdits flux provenant d'au moins deux terminaux (T1, T2), ladite carte étant connectée à un dispositif (PB1, PB2) doté de moyens de communication radiofréquence (BT1, BT2, BT3), aptes à connecter plusieurs terminaux hôtes (BT1, BT2). Le procédé se distingue en ce que ledit procédé comprend l'étape suivante de contrôle de la réception et/ou transmission (100, 200, 400) à la carte d'un premier et second flux de données provenant respectivement d'un premier (T1) et second (T2) terminal hôte, ladite étape de contrôle comprenant une étape de vérification de disponibilité (200) de la carte avant la transmission à la carte du second flux de données. L'invention concerne également le système et dispositif de contrôle correspondant.
Abstract:
The invention is a method of executing an application embedded in a portable electronic device. The application comprises one instruction handling an object. The electronic device comprises a firewall which is intended to check the compliance of the object with preset security rules. The portable electronic device comprises a volatile memory area intended to store a data set uniquely associated to the object. The data set comprises an indicator reflecting the result of the checking of the compliance of the object with the preset security rules. The method comprises the following steps before execution of the instruction : checking the presence in the volatile memory area of a data set associated to the object and comprising an indicator reflecting a successful checking of security rules, if successful in the checking of the data set, authorizing the execution of the instruction without further security rules checking done by the firewall.
Abstract:
The invention is a portable host machine comprising a smart card and a connector. The connector has a set of pads able to communicate through a first protocol. The smart card has at least a first pad able to communicate using a second protocol. The connector has at least an additional pad able to communicate using the second protocol. The first and additional pads are privately linked into said portable host machine. In one embodiment there is a wired direct link provided between the SIM card of a mobile phone and a connected external memory card in order to increase the available memory for the SIM card.
Abstract:
The invention is a method of managing flash memory- allocation in an electronic token. Said token has a memory comprising a list area and a managed area. Said managed area comprises allocated spaces and at least one free memory chunk. Said list area comprises at least one valid entry referencing a free memory chunk. Said valid entry comprises a state field. Said method comprises the step of selecting a free memory chunk further to an allocation request where said free memory chunk is referenced by an old entry, and the step of identifying a new allocated space in the selected free memory chunk. The state field of said valid entry is preset with a virgin state. Said method comprises the step of invalidating the old entry referencing the selected free memory chunk.