Abstract:
The present invention relates to a method and a secure device having limited resources to handle sensitive resources inside the secure device (HSM), said method comprising the preliminary steps of implementing a predetermined number of generic functions (GenF) in the secure device (HSM) and of loading a realm configuration (RC), said realm configuration (RC) being intended to be used by said generic functions (GenF), said realm configuration (RC) describing: - subjects ( , M, US), - sensitive resources ( , CC_nb, PIN) associated to said subjects ( ), - actions ( ) intended to be applied by subjects ( , M) on sensitive resources ( , CC_nb) and defined from said generic functions (GenF), - authentication conditions ( ) associated to said actions ( ) and to be validated using a secure device's algorithm (algorithm) dealing with at least one sensitive resource ( , PIN).
Abstract:
The present invention relates to a method for securing a system being configured to perform decision tasks carried out by a machine learning engine, equipped for operating with at least one machine learning model, the system comprising at least one training component for improving the at least one machine learning model, a device for carrying out decisions based on said machine learning model and a set of input data, and an interaction interface for exchanging said at least one machine learning model between training component and device, wherein the device comprises a model attestation checker, the method comprising the steps of: for the device: -acquiring input data, -ascertaining at least one machine learning model over the interaction interface, for the model attestation checker: -checking if said at least one machine learning model is trusted by a model attestation, -considering by the machine learning engine for said decision making only those machine learning models that are trusted, for the machine learning engine: -carrying out the decision task for acquired input data by using said at least one trusted machine learning model, -providing a result attestation for the decision output.
Abstract:
The invention concerns a method for downloading subscriptions in secure elements (10), each secure element (10) cooperating with a telecommunication terminal, the method consisting in: - Preparing, at the level of a Subscriber Manager Data Preparation unit (12) a plurality of subscriptions ready to be loaded on the secure elements (10) on demand, these subscriptions not being linked to any particular secure element (10) a that time; - Securing the subscriptions within a SCP03 script : - linked to a first unique AID as being the identifier of the Security Domain containing data of all subscriptions he would like to manage; - with a first SCP03 keyset as defined in GlobalPlatform SCP03 amendment D; - At the occurrence of a request for downloading one of these subscriptions in one of the secure elements (10), requesting a Subscriber Manager Secure Routing unit (SM-SR) to create a ISD-P in this secure element (10) by using a second AID different from the first unique AID; - Transmitting the second AID from the Subscriber Manager Secure Routing unit (SM-SR) to the Subscriber Manager Data Preparation unit (12); - Executing a key establishment procedure between the Subscriber Manager Data Preparation unit (12) and the ISD-P, identified by the second AID, and set a first private SCP03 keyset with the ISD-P; - Opening a new SCP03 channel between the Subscriber Manager Data Preparation unit (12) and the ISD-P by using the shared private SP03 keyset and a pseudo-random based on the second AID; - Setting the first unique AID on the ISD-P as an additional AID; - Opening a new SCP03 channel between the Subscriber Manager Data Preparation unit (12) and the ISD-P by using the shared private SCP03 keyset and a pseudo-random based on the first unique AID; - Sending from the Subscriber Manager Data Preparation unit (12) the subscription to the secure element (10), including the setting of the first SCP03 keyset; - Executing the subscription in the secure element (10) in order to install it by deciphering the subscription thanks to the first SCP03 keyset and the first unique AID.
Abstract:
L'invention propose un procédé de sauvegarde, par un premier dispositif, de l'activité d'un programme cible héberge sur un second. Un programme hébergé dans ce premier dispositif est en charge de recevoir et d' enregistrer tout ou partie de 1 activité du programme cible. Afin de restaurer le programme cible suite à, par exemple une interruption, ou bien afin de relouer son activité passée, l'invention propose également un procédé de restauration de cette sauvegarde.
Abstract:
The invention relates to an authentication method. The method comprises: - collecting (24), based on a predetermined authentication policy, at least one context data element; - constituting (28), based on the at least one collected context data element, a data packet; - generating (216), by using a predetermined hash type algorithm and the data packet, as input to the predetermined hash type algorithm, a hash; - sending the generated hash; - generating (220), as a hash distance generation step, a hash distance between the generated hash and a predetermined reference hash; and - authenticating (224) successfully or not (223) based on the generated hash distance, as an authentication step. The invention also relates to corresponding device and system.
Abstract:
The invention concerns a method for downloading subscriptions in secure elements (10), each secure element (10) cooperating with a telecommunication terminal. According to the invention, the method consists in: a) Ciphering at the level of a manufacturer unit of the secure element, the subscriptions with a manufacturer key and a unique first AID; b) Transferring the ciphered subscriptions to a Subscription Manager Data Preparation unit (SM-DP) along with the manufacturer key and the unique first AID; c) At the occurrence of a request for downloading one of these subscriptions in one secure element, generating a second AID by a Subscription Manager Secure Routing unit (SM-SR) in order to be able to address the content of the subscription later on through the second AID. d) Transmitting one ciphered subscription to this secure element (10), along with the manufacturer key and the unique first AID; e) Deciphering in the secure element (10) the subscription with the manufacturer key and the first unique AID and installing the subscription in the secure element (10).
Abstract:
The invention relates to a method 20 for accessing media data. - According to the invention, the method comprises the following steps. A first device 12 plays 22 media data content. The first device or a second device 14 detects 26, through at least one sensor, during the media data content play, at least one emotion presented 24 by at least one individual 11, the at least one individual listening and/or viewing the played media data content. The first device, the second device or a third device cooperating with the second device compares 28 the at least one detected emotion to at least one predetermined reference emotion for each concerned individual. The first, second or third device records, based upon the at least one emotion comparison result, an audience score relating to the at least one individual. The first, second or third device sends to a server the audience score. And the server decides, based upon the received audience score, to carry out at least one action. The invention also relates to corresponding device and system.
Abstract:
The invention relates to a method (20) for accessing a service. According to the invention, a device (12) and a server (16) access at least one transaction application key. The method comprises the following steps. A terminal (14) gets an identifier (22) relating to the device. The terminal sends to the server the device identifier (24). The server verifies (25) whether the device identifier is or is not authorized to access the service. Only if the device identifier is authorized to access the service, then the server sends to the device a transaction identifier and at least one transaction parameter (26). The device requests a device user to enter data (28). The device user enters data (210). The device generates (212) a response by using a predetermined transaction algorithm, the entered data, the at least one transaction application key and the at least one transaction parameter. The device sends to the server a transaction request accompanied with the transaction identifier and the response (214). The server verifies (215) whether the response does or does not match an expected result relating to the transaction. Only if the response does match the expected result, then the server authenticates the device user and the device and the server authorizes (216, 218) the transaction. The invention also relates to corresponding server, device and system.
Abstract:
The invention concerns in particular a method for establishing a first secured communication channel (14) between an administrative agent (12) comprised in a device (10) and a distant server (13), the device (10) comprising a secure element (11) communicating with the administrative agent (12), the secure element (11) being administrated through the administrative agent (12) by the distant server (13), the administrative agent (12) being administrated by a third party server (15) through a second secured communication channel (16), the distant server (13) and the third party server (15) being connected through a third secured channel (17), the method consisting in: a- Requesting, from the third party server (15) to the distant server (13), an operation on the secure element (11) and a one-time PSK; b- Sending from the distant server (13) to the third party server (15) the one-time PSK; c- Sending from the third party server (15) to the administrative agent (12) a triggering message including the one-time PSK; d- Performing a TLS-PSK handshake between the administrative agent (12) and the distant server (13) with the one-time PSK in order to establish the first secured communication channel (14).
Abstract translation:本发明特别涉及用于在包括在设备(10)和远程服务器(13)中的管理代理(12)之间建立第一安全通信信道(14)的方法,所述设备(10)包括安全元件(11) )与所述管理代理(12)通信,所述安全元件(11)由所述远程服务器(13)通过所述管理代理(12)管理,所述管理代理(12)由第三方服务器(15)通过 第二安全通信信道(16),远程服务器(13)和第三方服务器(15)通过第三安全信道(17)连接,所述方法包括:a-请求从第三方服务器(15) )到远程服务器(13),对安全元件(11)的操作和一次性PSK; b - 从远程服务器(13)发送到第三方服务器(15)一次性PSK; c - 从第三方服务器(15)向管理代理(12)发送包括一次性PSK的触发消息; d。通过一次性PSK在管理代理(12)和远程服务器(13)之间执行TLS-PSK握手,以便建立第一安全通信信道(14)。
Abstract:
L'invention concerne notamment un procédé de personnalisation d'un élément de sécurité (ESi) coopérant avec un terminal de télécommunications, cette personnalisation consistant à télécharger des données confidentielles (DC) dans l'élément de sécurité. Selon l'invention, le procédé consiste à : - provisionner, au niveau d'un fournisseur de données (10), les données confidentielles (DC); - transmettre les données confidentielles (DC) chiffrées par une clé de session (K) à un gestionnaire (11) de l'élément de sécurité (ESi), la clé de session (K) étant chiffrée par une clé de transport (K_DP), le gestionnaire étant connecté à un système de gestion de clés (KMS) comprenant des moyens pour réaliser pour chaque clé de transport (K_DP) une opération de déchiffrement et de rechiffrement atomique par une clé de chiffrement associée à une clé (K_SDi) comprise dans l'élément de sécurité (ESi); - transmettre depuis le gestionnaire (11) de l'élément de sécurité (ESi) à cet élément de sécurité (ESi) les données confidentielles (DC) chiffrées par la clé de session (K) ainsi que cette clé de session (K) chiffrée par la clé associée à la clé (K_SDi) comprise dans l'élément de sécurité (ESi); - déchiffrer, au niveau de l'élément de sécurité (ESi), la clé K de session (K) à l'aide de la clé (K_SDi) stockée dans l'élément de sécurité (ESi); - déchiffrer les données confidentielles dans l'élément de sécurité à l'aide de la clé de session (K) et installer les données confidentielles dans l'élément de sécurité (ESi).