Abstract:
A boot sequence method comprises a determination step 110 and 200, a first starting step 120, 210 or 240 for starting a first interface, a first negotiation step 140 or 220 wherein a power negotiation is performed, a second negotiation step 140 or 230 for determining the interfaces to activate simultaneously, and a second starting step 150 or 230 wherein the interfaces that can be activated simultaneously are started one after each other.
Abstract:
The invention is a method for allowing a host machine to access a service embedded in a physical secure element which is connected to a portable device. The method comprises the steps of: establishing a HTTP session between the host machine and the portable device by using a profile data stored into the portable device, - providing the host machine with an access to the service via a web server embedded in the portable device.
Abstract:
The invention is a method of managing flash memory- allocation in an electronic token. Said token has a memory comprising a list area and a managed area. Said managed area comprises allocated spaces and at least one free memory chunk. Said list area comprises at least one valid entry referencing a free memory chunk. Said valid entry comprises a state field. Said method comprises the step of selecting a free memory chunk further to an allocation request where said free memory chunk is referenced by an old entry, and the step of identifying a new allocated space in the selected free memory chunk. The state field of said valid entry is preset with a virgin state. Said method comprises the step of invalidating the old entry referencing the selected free memory chunk.
Abstract:
A system, method, portable security device, and associated computer programs for secure key exchange, key storage, and key usage to secure a cloud computing system having a cloud computing service hosting computing resources and providing means for accessing the resources through a network, a host computer and a portable security device connected to the host computer. The method includes associating a first key with a first computing resource hosted on the cloud computing service and storing the first key on the portable security device. A host computer is operated to request the portable security device to sign a request to access the first computing resource using the first key. The signed request to access the first computing resource is transmitted from the host computer to the cloud computing service. The cloud computing service is operated to verify the signature on the request as corresponding to the first key.
Abstract:
A method of operating a secure token in conjunction with a host computer to ensure that the host computer is not infected with malware introduced from the secure token by "tearing" the secure token prior to completion of a malware scan. The method includes introducing a file-scan queue identifying files needed to be scanned for malware, with that file-scan queue persistently stored on the token. If the file-scan queue is not empty upon power-up of the secure token, that condition is taken to indicate incomplete scanning of the token and that the identified files may potentially include malware. Corrective action may then be taken.
Abstract:
The invention relates to a personal token (10) for being associated with a mobile telecommunication device (20) and for storing credentials for access to an operator's network, characterized that the personal token (10) is arranged for loading the credentials into a memory (23) of the mobile telecommunication device (20), so that the mobile telecommunication device (20) is taken away from the personal token (10) and operative for connecting to the operator's network with the credentials in its memory (23).
Abstract:
This invention concerns a method to control the access to a sector of a Flash type memory of an electronic module which consists in checking that the owner of the data to be written has write access to a partition of said sector. The method consists in checking at least one additional rule on the sector concerned in order to allow possible erasure of the entire said sector before writing in it.The rule(s) are used to check that erasure of the sector concerned does not delete data which must be kept. This invention also concerns the electronic module in which the method is implemented
Abstract:
A secure portable electronic device for providing secure services when used in conjunction with a host computer having a central processing unit use two hardware device protocols readily supported by computer operating systems. Other systems and methods are disclosed.
Abstract:
The invention relates to a memory index management system. The said system comprises an indexed storage memory, a memory zone containing the index and a microprocessor. The index is built in the form of a hierarchical tree structure and comprises at least two nodes. A node contains an identifier associated with a pointer that references either a node of the index or a memory zone in the storage memory. The content of a node is distributed over a first and a second memory zone that are separate in the memory zone. The first space has a first specific pointer that points to the second space and the second space has a second specific pointer whose value has a blank state.
Abstract:
This invention concerns a method to write in a Flash type memory of an electronic module. The method consists in: associating at least two physical areas of said memory, called mirror areas, with the same logical area and during a write in said logical area, in programming the content of said logical area in one of said blank mirror areas; erasing the content of all mirror areas used in a single operation at a convenient time. This invention also concerns the smart card in which the method is implemented.