Patent application number | Description | Published |
20090165149 | Method for Making Secure the Execution of an Intermediate Language Software Code in a Portable Device - A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data. | 06-25-2009 |
20100207730 | BEHAVIOURAL METHOD AND DEVICE FOR PREVENTING THE USE OF A CONTACTLESS PORTABLE DEVICE WITHOUT THE BEARER'S AUTHORIZATION - The invention relates to a method and a device for preventing the establishment of a radiofrequency communication between a contactless portable object and another contactless object. If the bearer of the contactless portable object does not modify the state of at least one on-board sensor of the contactless portable object in a specified manner and in specified proportions, the communication is prevented. One purpose of the invention is to prevent the use of the contactless portable object without the bearer's authorization. | 08-19-2010 |
20120190354 | UICCs EMBEDDED IN TERMINALS OR REMOVABLE THERE FROM - The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. | 07-26-2012 |
20130061312 | SECURITY TOKEN FOR SECURELY EXECUTING AN APPLICATION ON A HOST COMPUTER - The invention relates to a security token comprising a communication interface adapted to communicate with a host computer; a security module, comprising encryption based security features; a non volatile memory storing at least an application to be uploaded and executed in a host computer. The application makes use of the security features when executed in a host computer in communication with the communication interface. The security token is adapted to modify the content of the application as uploaded or its execution parameters at successive connexions of the security token to a host computer. | 03-07-2013 |
20130166902 | SIMPLIFIED SMARTCARD PERSONALIZATION METHOD, AND CORRESPONDING DEVICE - The invention relates to a method for personalizing an electronic device using an encryption device adaptable to standard certified apparatuses. The encryption device makes it possible to ensure the confidentiality of the transfer of a secret code from the user to a possible personalization server. | 06-27-2013 |
20130318355 | METHOD FOR MANAGING CONTENT ON A SECURE ELEMENT CONNECTED TO AN EQUIPMENT - The invention concerns a method for managing content on a secure element connected to an equipment, this content being managed on the secure element from a distant administrative platform. According to the invention, the method consists in: establishing, at the level of the administrative platform a secure channel between the equipment and the administrative platform, thanks to session keys generated by the secure element and transmitted to the equipment; transmitting to the administrative platform a request to manage content of the secure element; and verifying at the level of the administrative platform that this request originates from the same secure element that has generated the session keys and, if positive, authorizing the management and, if negative, forbid this management. | 11-28-2013 |
20130324091 | METHOD FOR DOWNLOADING A SUBSCRIPTION FROM AN OPERATOR TO A UICC EMBEDDED IN A TERMINAL - The present invention relates to a method for downloading a subscription from an operator to a UICC embedded in a terminal. The method includes transmitting from the terminal, to a platform, an identifier and a request for downloading the subscription; verifying in the platform that the terminal is authorized to download the subscription by verifying the rights of the terminal in accordance with its identifier; and downloading the subscription to the UICC if the rights are confirmed and, otherwise, refusing to download the subscription. | 12-05-2013 |
20140057680 | SYSTEM FOR MANAGING MULTIPLE SUBSCRIPTIONS IN A UICC - The invention relates to a system for managing multiple subscriptions in a UICC, this system comprising a central server able to manage subscriptions stored on a UICC comprised in a mobile terminal in the field, at the request of a subscriber of one of these subscriptions. | 02-27-2014 |
20140335847 | METHOD FOR ESTABLISHING SECURE CARD HISTORY AND AUDIT FOR PROPERTY HAND-OVER - The present invention relates to a method for establishing secure history and audit of an integrated circuit card comprising an audit register, for property hand-over, which includes the following steps: storing in the audit register of said integrated circuit card remote actions performed on said integrated circuit card; computing a hash function of the content of said audit register of said integrated circuit card and remote actions content, and storing the result of said hash function in said audit register of said integrated circuit card; storing on a remote server an audit log of remote actions performed on said integrated circuit card; and verifying the integrity of said audit log stored on said remote server by comparing the content of said audit register of said integrated circuit card and the result of a computed hash function of said audit log. | 11-13-2014 |