This server (5000) for verifying security code comprises: - a communication module (5200) able to receive transaction data comprising an identifier and a security code associated with a device associated with this identifier so as to carry out a transaction; - a control module able to determine whether said security code should be verified by comparing it with a dynamic security code or with a static security code; - a module (5300) configured to generate, under the first hypothesis, a dynamic security code on the basis of the identifier and of a temporal datum or of a counter of the number of second dynamic security codes generated by this module for this identifier; - a comparison module (5400) configured to compare the security code either with the dynamic security code or with a static security code associated with this identifier and stored by the server; - said server being configured to allow or disallow directly or indirectly the carrying out of the transaction as a function of the result of this comparison.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
3.
MONITORING METHOD IMPLEMENTED BY AN ELECTRONIC DEVICE DURING A TRANSACTION, AND CORRESPONDING DEVICE
The invention relates to a monitoring method implemented by an electronic device, said method comprising the following steps, carried out in the course of a transaction performed by the device: - carrying out a first change of state (E01) of a component of an indicator comprising at least said component, the first state change being performed before a critical step of the transaction is implemented, and the indicator having a first state before said first state change, - carrying out a final, reverse change of state (E04) of said indicator, following the start of the critical transaction step (E03), such that the indicator returns to said first state. The invention also relates to a corresponding device.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
4.
ELECTRONIC DOCUMENT SUCH AS A CHIP CARD WITH REDUCED METALLIZATION
The fabrication of an electronic document comprises the following steps: - obtaining of a flat body in which is made a cavity of globally rectangular shape comprising a deep portion surrounded by a countersink and which contains an electronic component having connection terminals situated on this countersink while having the shape of meanders 5A, 5B, - obtaining of a module comprising a support furnished on a so-called external face with a plurality of external contact zones and on a so-called internal face with a printed circuit comprising connection pads 4A, 4B of hefty form while being connected to certain at least of the external contact zones, the support being furthermore furnished, on this internal face, with a microcircuit connected to this printed circuit, this module being encased in the cavity by means of an anisotropic conducting adhesive whose overlap coefficient lies between 5 and 8%.
An authentication method is performed between a first party (10) and a second party (20). The method comprises: i) determining a challenge (11); ii) sending the challenge to the second party (20); receiving a response from the second party (20) comprising a second cryptogram (C2; ARPC); computing (17) a first cryptogram (C1) using the challenge and the key of the first party; determining (18) if the first cryptogram (C1) matches the second cryptogram (C2; ARPC) received from the second party (20). If the first cryptogram (C1) does not match the second cryptogram (C2; ARPC), the method further comprises performing a computation (19) using the first cryptogram (C1; ARQC) and the second cryptogram (C2'; ARPC'); and comparing (19) a result of the computation with a stored set of results to recover a first data element (D1; OPn) carried by the second cryptogram (C2'; ARPC').
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
6.
ELECTRONIC UNIT AND METHOD CARRIED OUT IN SUCH AN ELECTRONIC UNIT
The invention relates to an electronic unit (2) comprising a communication interface (4), a processor (5), a secure element (6), and a sub-system (8). The processor (5) is connected to the communication interface (4) by means of a first bus (A), to the secure element (6) by means of a second bus (B) and to the sub-system (8). The processor (5) is designed to operate in a first mode, in which, at the second bus (B), it reproduces the signals received from the communication interface (4) at the first bus (A). The invention also relates to a method carried out in such an electronic unit.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
7.
MODULE EQUIPPED WITH A CAPACITOR AND AN ANTENNA, WITH IMPROVED CAPACITOR ELECTRODE ARRANGEMENT
Module comprising a base (20) supporting a planar capacitor, an antenna, and a microcircuit electrically connected therebetween to form a resonant electrical circuit, the capacitor including on a first side of the base a first electrode (30, 301, 302, 303), and a second electrode (300) that is placed on a second side opposite said first side and facing said first electrode, the second electrode and the first electrode having substantially the same shape. Each electrode has at least one first section and one second section that are placed on either side of the turns (40) of said antenna.
H01G 4/40 - Structural combinations of fixed capacitors with other electric elements not covered by this subclass, the structure mainly consisting of a capacitor, e.g. RC combinations
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H01G 2/06 - Mountings specially adapted for mounting on a printed-circuit support
H01L 27/13 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being other than a semiconductor body, e.g. an insulating body combined with thin-film or thick-film passive components
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
H05K 1/18 - Printed circuits structurally associated with non-printed electric components
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
8.
RECORDING METHOD IMPLEMENTED BY A MICROCIRCUIT, AND CORRESPONDING DEVICE
The invention relates to a recording method implemented by a microcircuit (1), which method comprises: - receiving (B6), by said microcircuit, at least one transaction information item, and recording said at least one information item in a first memory of the microcircuit, the reception and recording steps being implemented in the course of a transaction, - detecting (B8) a transaction error, and - if an error is detected, recording (B9), in a second nonvolatile memory of the microcircuit, transaction data including the at least one transaction information item.
The invention relates to an authentication method for a system including a subscriber device and a companion device. The authentication method includes the issuing (E21) by the subscriber device (10) to the companion device (20) of a temporary profile and of an authentication reply signed by the subscriber device and sent to the server (41), the installation (E31) of the temporary profile to configure a second wireless communication interface of the companion device (20), the request for a second authentication (E41) with the server (41) via the second interface using the authentication reply issued so as to authorize the second interface when the companion (20) and subscriber (10) devices are not communicating via the first communication interface. The invention applies to systems including subscriber and companion devices, such as watches and connected objects.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Method of managing profiles in a secure element (20), the secure element (20) comprising a first profile associated with a first communication network and a second profile associated with a second communication network, the first profile being active. The method comprises steps of deactivation (E20) of the first profile and activation (E21) of the second profile. The method is characterized in that the steps of deactivation (E20) and of activation (E21) are implemented following the detection of a failure during a local verification pertaining to said first profile for the use of this said first profile. A local verification may be a verification in the secure element (20) of the authorization of access of a user to the first profile, for example three failures of PIN or PUK code or of biometric authentication data.
A method of affiliation giving effect to a tutorship relationship between a tutor (10) and a tutee (20), comprises the steps of: generating an affiliation attestation (51) including a tutor authorisation (13) comprising the rights allocated to the tutor (10) over the tutee (20), and storing the affiliation attestation (51). The invention further relates to a method of emancipation. The invention also relates to the respective verification methods.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
12.
METHOD FOR DELEGATING AND VERIFYING RIGHTS OVER A TUTEE BETWEEN A TUTOR AND A THIRD PARTY
The invention relates to a delegation method allowing a tutor (10) to delegate rights over a tutee (20) to a third party (30), comprising the steps of: generating a delegation attestation (71) comprising: a third-party authorisation (33) including the rights over the tutee (21) delegated by the tutor (10) to a third party (31), storing the delegation attestation (71), and storing, if it is not already present, an affiliation attestation (51) giving effect to a tutorship relationship between a tutor (10) and a tutee (20) and including a tutor authorisation (13) comprising the rights allocated to the tutor (10) over the tutee (20). The invention further relates to the corresponding verification method.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
13.
MARKING BY WATERMARKING OF THE PHOTO OF AN ELECTRONIC IDENTITY DOCUMENT DURING THE READING THEREOF
The invention relates essentially to a method of creating an electronic identity document, said method comprising the following steps: - obtaining (S30) of the file of an original digital image, - obtaining (S32) of at least one block of data of said file, termed the original block, - for each original block: - creating (S34) of at least two modified blocks, - recording (S36) of each modified block in a data structure of said document, each modified block being indexed in said data structure by the location of said original block in the file of a digital image intended to be marked, and by a different input.
H04N 1/32 - Circuits or arrangements for control or supervision between transmitter and receiver
G07C 9/00 - Individual registration on entry or exit
G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/16 - Program or content traceability, e.g. by watermarking
A card (10) comprises a secure element (20) with at least one external interface (12, 14). The card (10) comprises a user interface (35), a user interface processor (31) and an internal interface (38) between the secure element (20) and the user interface processor (31). The secure element (20) hosts a plurality of applications (23) and the card is configured to allow a user to select one of the plurality of applications (23) for use when the card communicates with the external reader (50) by signalling, between the user interface processor (31) and the secure element (20) an indication (29) of a mode selected by the user at the user interface (32) and storing, at the secure element, the mode indication (29). The secure element (20) stores response data (26) for use when responding to interrogation by the external card reader (50) and correspondence data (28) which indicates, for each of the modes, a correspondence between the mode and the response data (26) to be sent for that mode.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
15.
METHOD FOR VERIFYING A SECURITY DEVICE COMPRISING A SIGNATURE
A method for verifying a security device (1) comprising an image (2) comprising a signature, having the following steps: acquiring the image (2) in order to obtain a first representation (3), - extracting the signature, - verifying the signature. A verification apparatus, computer program and computer data medium comprising such a computer program, suitable for implementing such a method.
The invention relates to a dual module for a dual chip card, which includes a supporting film 7 supporting on an outer surface a plurality of connecting pads (C1-C8) including two series of connecting pads extending in a given direction and, on an inner surface, two inner connection areas (9) intended for being connected to an antenna of said dual card and a chip 6, said chip including contact terminals connected by wires respectively to the inner connection areas or to certain electric connecting pads by means of holes (41-45) passing through said supporting film while being coated, together with said wires, by a mass of coating resin, characterised in that the series of electric connecting pads of the outer surface include only three pads (C1-C3, C5-C7) and in that each of the two inner connection areas forms a comb (20, 30) including a body extending under each of the pads of one of the two series of connecting pads separated from the coating mass, respectively, and blades, including two end blades starting at the ends of the body (20A-D, 30A-D), which extend separately from one another from said body until ends covered by the coating mass.
The invention relates to a payment request verification method (104), a method for producing said payment request, and a mobile payment terminal (12). The verification method includes a step for acquiring the location (108) of the mobile terminal (12) when the payment token was issued, then verifying conditions for using the payment request (104) produced from the issued payment token (103). The mobile terminal (12) is capable of determining the issuing location (108) and the payment location (109) for the purpose of verifying the payment request (104). The invention is of applicable to banking payment instruments (17) onboard a mobile terminal (12).
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
18.
METHOD FOR AUTHENTICATING AN APPLICATION, ASSOCIATED ELECTRONIC APPARATUS AND COMPUTER PROGRAM
The invention relates to a method for authenticating an application (App) executed by a processor (10) of an electronic apparatus, which comprises the following steps: deriving a cryptographic key (AEK) from a piece of data (OT_Apps) received from an external electronic entity (20); decrypting, by means of the derived cryptographic key (AEK), an encrypted stored secret key ([App_SK]AEK); transmitting authentication data prepared by means of the decrypted secret key (App_SK). The invention also proposes an associated electronic apparatus and computer program.
A server (20) comprises a first server (S0) configured to receive requests and a plurality of second servers (S1-SN) configured to service requests. A method of client- server communication comprises receiving, at the first server (S0), a request (31) from the client and allocating the request to one of the second servers (Sn). The server (20) determines (32, 32A) if the allocated second server (Sn) can provide a response to the request within a predetermined time period. If the allocated second server (Sn) cannot provide a response to the request within the predetermined time period it sends a reply (33) to the client indicating when the server system can provide a response to the request and comprising an identifier of the allocated second server (Sn). Server (Sn) generates (38) a response to the request. Server (Sn) receives a callback message (37) from the client. Server (Sn) sends the response (39) to the client.
The invention relates to a secure electronic entity (E) comprising a memory unit (NV) storing data in the form of multiplets and a processing module (M) designed to receive data from an electronic device (TP). The processing module (M) is designed to determine a proof-of-integrity element in accordance with the data received and at least one portion of the stored multiplets, and to transmit the proof-of-integrity element to the electronic device (TP). The invention also describes a method for verifying the integrity of data stored in such a secure electronic entity (E).
G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
21.
METHOD FOR AUTHENTICATING A USER AND A SECURE MODULE, ASSOCIATED ELECTRONIC APPARATUS AND SYSTEM
The invention relates to a method for authenticating a user by means of an electronic apparatus (10) comprising an authentication module (40) and a secure module (30), which comprises the following steps: the authentication module (40) transmits a recognition result to the secure module (30) according to a process that allows the authentication module (40) to be authenticated by the secure module (30); the secure module (30) generates an authentication token by signing, with a private key (SE_Auth_SK) stored in the secure module (30), data comprising data representing at least one feature of the authentication module (40); and transmitting the generated authentication token. The invention also describes an associated secure module, electronic apparatus and system. Figure
The invention relates to a method of dispatching an item of security information (IS) implemented by an electronic device (4), the method comprising the following steps: - detection of an event encountered by the electronic device (4); - recording, in a secure memory (10) of the device, of an item of security information (IS) representative of the event; - starting, following the recording, of a transaction with an external terminal; and - dispatching to the external terminal of the item of security information (IS) in a transaction message during said transaction. The invention furthermore relates to an electronic device able to implement such a method of dispatch.
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
23.
SECURITY DEVICE WITH A LENS ARRAY COMPRISING SEVERAL ETCHED COLOUR PATTERNS
A method for producing a security device (1) comprising a first colour pattern (A) visible along an associated viewing axis (Δα) and at least one second colour pattern (B) visible along an associated viewing axis (Δβ), comprising the following steps: - assembling an image layer (4) suitable for forming at least one colour pattern (A, B) by laser etching, on a support (3), - laser etching the first colour pattern (A) in the image layer (4), along the associated viewing axis (Δα) of same, in such a way that it can be seen through a lens array (7), - for each of said at least one second colour pattern (B), laser etching said at least one second colour pattern (A) in the image layer (4), along the associated viewing axis (Δβ) of same, in such a way that it can be seen through a lens array (7). A security device (1) obtained by said method.
The invention relates to a verification method implemented by an electronic device (2), said method comprising the following steps: - obtaining of a secret code input by a user; - processing of the secret code, the processing step comprising checking the secret code and managing a first counter (TOT_PTC); - storage of the value of the first counter (TOT_PTC) in a rewritable non-volatile memory (10); the electronic device being such that: - if the code input is detected as being false during said checking, the processing step has the effect of modifying the value of the first counter (TOT_PTC) so as to indicate that the secret code is false; and - if the code input is detected as being correct during said checking, the processing step has the effect of keeping unchanged the value of the first counter (TOT_PTC) regardless of the value of the first counter. The invention also relates to an electronic device able to implement such a verification method.
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
25.
METHOD IMPLEMENTED IN AN IDENTITY DOCUMENT AND ASSOCIATED IDENTITY DOCUMENT
The invention relates to a method implemented in an identity document (1) comprising a microcircuit (100) and means (200) enabling the microcircuit to communicate with a terminal, the microcircuit being designed to permit the transmission of data obtained (directly or indirectly) from data memorised in a storage zone (110;120;130) in response to a request received from said terminal, furthermore comprising the following steps: reception by the microcircuit (100) of an identifier of said terminal; at least partial comparison of said identifier of the terminal and of at least one portion of an identifier stored in the microcircuit (100); and performance of a set action depending on the result of said comparison. An identity document (1) in which such a method is implemented is also described.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method for personalising at least one microcircuit (2) from a plurality of microcircuits located in a silicon wafer (1) is proposed, each microcircuit including at least one nonvolatile memory (3). The method comprises a first phase (E03) of personalising said at least one microcircuit of the wafer, comprising writing first microcircuit-specific data to the memory of said at least one microcircuit. A method for personalising microcircuits including first data in a memory, and corresponding systems, are also proposed.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Integrated circuit cards; chip cards; integrated circuit
cards (smart cards); memory cards; programmable cards;
remote programmable cards; electronic cards and badges;
magnetic cards; transmitter-receiver cards and badges;
cards for access to telecommunications and/or computer
networks; encoded cards; pre-recorded data cards, computer
programs, and software; computer programs; software;
computer programs and software for use in connection with
cards; computer programs and software recorded on cards or
to be recorded on cards and/or telecommunications apparatus;
integrated circuits; electronic chips; magnetic and
electronic cards and badges, with or without contact,
intended for use as payment, remote payment, cash cards,
including those with dynamic codes for securing all online
transactions; electronic signature support software,
encryption software; encryption keys; electronic apparatus
for checking the authenticity of cards; computer programs
and software for storage, retrieval and secure transmission
of information or data; computer programs and software for
communication between chip-based cards and chip card readers
and/or computer terminals; computer programs and software
for transmitting, displaying and storing identification
and/or operations and transactions data or information,
particularly online; all the aforesaid goods not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever. Transmission of information, data or software via telephone
line, telecommunications and/or computer networks, cable,
satellite, radio relay; downloading of data or software on
cards and badges, including payment cards, remote payment,
electronic cash, intended for securing transactions by code,
particularly online; information concerning the aforesaid
services; all the aforesaid services not intended for the
field of motion simulators or the field of equipment used as
part of the projection or viewing of audiovisual works, in
any sector whatsoever. Computer engineering; technical consulting in the field of
computers and/or telecommunications, design, development,
maintenance and updating of software and databases; design,
development and updating of cards and badges, including
payment cards, remote payment, electronic cash, intended for
securing all transactions by code, particularly online;
information concerning the aforesaid services; design,
development and updating of cards and card readers; lending
and leasing of cards and badges, including payment cards,
remote payment, electronic cash intended for securing all
transactions by code, particularly online; the aforesaid
services available for consultation or made available by
means of data transmission or on telecommunication or
computer networks; all the aforesaid services not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever.
A secure element (30) has a local store of file property data (50). A method of preparing a script to send to the secure element (30) to remotely provision a profile (31) at the secure element comprising preparing the script such that the script lacks a command to create a file if the local store of file property data (50) at the secure element includes file property data which can be used to locally create that file. A script may include an entry of reduced length which refers to the file to be locally created, such as a SELECT FILE command and an identifier of the file.
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
The invention relates to a method for securing a payment token, a mobile terminal (12), and a server (11) for generating a payment token. The method comprises a first step of pairing a subscriber terminal identifier and a personal password to a payment instrument (17), followed by a step of generating a payment token (104) secured by the identifier and personal password. The pairing and generating of the secured payment token (104) allow verification that the token (103) is used by the subscriber and by the mobile terminal (12) of same. The invention is applicable to payment systems based on payment tokens with restrictions of use.
The invention relates to the notification of an SM-SR subscription management server by an eUICC card or an eSE element. The card comprises, in local memory, at least one short number (or "short code"), and more generally an address identifier, unique to a mobile-phone operator, wherein said number is associated with an operator subscriber profile within the secure card. The card is configured to retrieve, from the local memory, a short code associated with a subscriber profile in use to send, using said retrieved short code, a card status notification to the SM-SR server. In the absence of a short code, the card uses a unique international telephone number as the recipient of the notification.
The invention relates to an identification document (30) comprising a transparent layer, an arrangement of pixels (19) facing the transparent layer, the sub-pixels being arranged in such a way as to form lines (LN) of sub-pixels in the arrangement (19) of pixels, and a guilloche (GL) in an area (Z2) adjacent to the arrangement (19) of pixels, the guilloche comprising at least one guilloche line (GL1, GL2), wherein the transparent layer can be locally opacified in order to obstruct the passage of the light, and wherein at least one guilloche line (GL1, GL2), so-called first line, extends in the continuation of a line of sub-pixels (LN), so-called second line, pertaining to the arrangement (19) of pixels, in such a way as to collectively form a single line.
The invention relates to an electronic document comprising a body (12) including a cavity (24) open on one the surfaces of the body (12) and defined by walls, said body (12) further comprising an antenna (36) which comprises at least one turn (36c) extending between two ends (36a, 36b) that lead to a wall of the cavity (24), a module (14) comprising a microprocessor (16) and at least two connection terminals (20a, 20b) for the antenna (36) and connected electronically to the microprocessor (16) and to the ends (36a, 36b) of the antenna (36) via electrical connection means. The ends (36a, 36b) of the antenna are arranged in a zigzag pattern and are composed of at least two straight portions (42) connected to each other by a bend (44), the straight portion (42) which leads to the cavity being angled relative to the wall at which it terminates.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Integrated circuit cards; chip cards; integrated circuit
cards (smart cards); memory cards; programmable cards;
remote programmable cards; electronic cards and badges;
magnetic cards; transmitter-receiver cards and badges; cards
for access to telecommunications and/or computer networks;
encoded cards; pre-recorded data cards, computer programs,
and software; computer programs; software; computer programs
and software for use in connection with cards; computer
programs and software recorded on cards or to be recorded on
cards and/or telecommunications apparatus; integrated
circuits; electronic chips; magnetic and electronic cards
and badges, with or without contact, intended for use as
payment, remote payment, cash cards, including those with
dynamic codes for securing all online transactions;
electronic signature support software, encryption software;
encryption keys; electronic apparatus for checking the
authenticity of cards; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for communication
between chip-based cards and chip card readers and/or
computer terminals; computer programs and software for
transmitting, displaying and storing identification and/or
operations and transactions data or information,
particularly online; all the aforesaid goods not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever. Transmission of information, data or software via telephone
line, telecommunications and/or computer networks, cable,
satellite, radio relay; downloading of data or software on
cards and badges, including payment cards, remote payment,
electronic cash, intended for securing transactions by code,
particularly online; information concerning the aforesaid
services; all the aforesaid services not intended for the
field of motion simulators or the field of equipment used as
part of the projection or viewing of audiovisual works, in
any sector whatsoever. Computer engineering; technical consulting in the field of
computers and/or telecommunications, design, development,
maintenance and updating of software and databases; design,
development and updating of cards and badges, including
payment cards, remote payment, electronic cash, intended for
securing all transactions by code, particularly online;
information concerning the aforesaid services; design,
development and updating of cards and card readers; lending
and leasing of cards and badges, including payment cards,
remote payment, electronic cash intended for securing all
transactions by code, particularly online; the aforesaid
services available for consultation or made available by
means of data transmission or on telecommunication or
computer networks; all the aforesaid services not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever.
34.
METHOD FOR ADMINISTERING LIFE CYCLES OF COMMUNICATION PROFILES
The invention relates to a method for administering life cycles of communication profiles managed by a subscriber identity module (100) installed in a telecommunications terminal (110), the method being implemented by the module (100), the module (100) being capable of using at least one administration method, the method using a set of at least one command and/or at least one rule, the method comprising the steps of: - receiving (B610) a message (M610) transmitted by the terminal (110) and representative of the capacities of the terminal (110), - selecting or not selecting (B615) the set used by the method, depending on the capacities of the terminal (110), and - if the set is selected, administering at least one life cycle of at least one of the profiles by using the set of at least one command and/or at least one rule.
The invention relates to an electronic device comprising a microprocessor (16), a body (14) defined by at least first and second opposite surfaces, a battery (32) arranged inside the body (14), an electronic component electrically connected to the microprocessor (16) and to the battery (32). The electronic device has at least one cavity (38) comprising an opening leading to one of the surfaces of the body (14) and in which the electronic component is attached. The electronic component comprises an information display area positioned relative to the opening of the cavity (38). The device further comprises at least a first module (20) comprising a substrate (22) for covering the cavity (38) such as to be flush with the first surface of the body (14). The substrate (22) of the module (20) is made of a transparent material and covered with a printed pattern defining a visual-access window (26) opposite the display area of the electronic component.
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Integrated circuit cards; chip cards; integrated circuit
cards (smart cards); memory cards; programmable cards;
remote programmable cards; electronic cards and badges;
magnetic cards; transmitter-receiver cards and badges; cards
for access to telecommunications and/or computer networks;
encoded cards; pre-recorded data cards, computer programs,
and software; computer programs; software; computer programs
and software for use in connection with cards; computer
programs and software recorded on cards or to be recorded on
cards and/or telecommunications apparatus; integrated
circuits; electronic chips; magnetic and electronic cards
and badges, with or without contact, intended for use as
payment, remote payment, cash cards, including those with
dynamic codes for securing all online transactions;
electronic signature support software, encryption software;
encryption keys; electronic apparatus for checking the
authenticity of cards; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for communication
between chip-based cards and chip card readers and/or
computer terminals; computer programs and software for
transmitting, displaying and storing identification and/or
operations and transactions data or information,
particularly online; all the aforesaid goods not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever. Transmission of information, data or software via telephone
line, telecommunications and/or computer networks, cable,
satellite, radio relay; downloading of data or software on
cards and badges, including payment cards, remote payment,
electronic cash, intended for securing transactions by code,
particularly online; information concerning the aforesaid
services; all the aforesaid services not intended for the
field of motion simulators or the field of equipment used as
part of the projection or viewing of audiovisual works, in
any sector whatsoever. Computer engineering; technical consulting in the field of
computers and/or telecommunications, design, development,
maintenance and updating of software and databases; design,
development and updating of cards and badges, including
payment cards, remote payment, electronic cash, intended for
securing all transactions by code, particularly online;
information concerning the aforesaid services; design,
development and updating of cards and card readers; lending
and leasing of cards and badges, including payment cards,
remote payment, electronic cash intended for securing all
transactions by code, particularly online; the aforesaid
services available for consultation or made available by
means of data transmission or on telecommunication or
computer networks; all the aforesaid services not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Integrated circuit cards; chip cards; integrated circuit
cards (smart cards); memory cards; programmable cards;
remote programmable cards; electronic cards and badges;
magnetic cards; transmitter-receiver cards and badges; cards
for access to telecommunications and/or computer networks;
encoded cards; pre-recorded data cards, computer programs,
and software; computer programs; software; computer programs
and software for use in connection with cards; computer
programs and software recorded on cards or to be recorded on
cards and/or telecommunications apparatus; integrated
circuits; electronic chips; magnetic and electronic cards
and badges, with or without contact, intended for use as
payment, remote payment, cash cards, including those with
dynamic codes for securing all online transactions;
electronic signature support software, encryption software;
encryption keys; electronic apparatus for checking the
authenticity of cards; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for communication
between chip-based cards and chip card readers and/or
computer terminals; computer programs and software for
transmitting, displaying and storing identification and/or
operations and transactions data or information,
particularly online; all the aforesaid goods not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever. Transmission of information, data or software via telephone
line, telecommunications and/or computer networks, cable,
satellite, radio relay; downloading of data or software on
cards and badges, including payment cards, remote payment,
electronic cash, intended for securing transactions by code,
particularly online; information concerning the aforesaid
services; all the aforesaid services not intended for the
field of motion simulators or the field of equipment used as
part of the projection or viewing of audiovisual works, in
any sector whatsoever. Computer engineering; technical consulting in the field of
computers and/or telecommunications, design, development,
maintenance and updating of software and databases; design,
development and updating of cards and badges, including
payment cards, remote payment, electronic cash, intended for
securing all transactions by code, particularly online;
information concerning the aforesaid services; design,
development and updating of cards and card readers; lending
and leasing of cards and badges, including payment cards,
remote payment, electronic cash intended for securing all
transactions by code, particularly online; the aforesaid
services available for consultation or made available by
means of data transmission or on telecommunication or
computer networks; all the aforesaid services not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever.
38.
SECURING OF ENCRYPTION KEYS FOR TRANSACTIONS ON A DEVICE LACKING A SECURE MODULE
The invention concerns the securing of encryption keys used during transactions when the user device lacks a secure module. Steps are carried out on the device of encrypting a message with an encryption key and sending the obtained cryptogram to a remote transaction server. The encryption key has a limited lifetime. When the current encryption key is expired, the device receives, from a secure remote server provided with a secure module, a new encrypted encryption key (310); receives an item of personal data input by a user on an input interface (312); decrypts the new encryption key using the input item of personal data (314); and deletes the item of personal data from the memories (316) of same before using said new encryption key to obtain the cryptogram to be sent to the remote transaction server.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Integrated circuit cards; chip cards; integrated circuit
cards (smart cards); memory cards; programmable cards;
remote programmable cards; electronic cards and badges;
magnetic cards; transmitter-receiver cards and badges; cards
for access to telecommunications and/or computer networks;
encoded cards; pre-recorded data cards, computer programs,
and software; computer programs; software; computer programs
and software for use in connection with cards; computer
programs and software recorded on cards or to be recorded on
cards and/or telecommunications apparatus; integrated
circuits; electronic chips; magnetic and electronic cards
and badges, with or without contact, intended for use as
payment, remote payment, cash cards, including those with
dynamic codes for securing all online transactions;
electronic signature support software, encryption software;
encryption keys; electronic apparatus for checking the
authenticity of cards; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for communication
between chip-based cards and chip card readers and/or
computer terminals; computer programs and software for
transmitting, displaying and storing identification and/or
operations and transactions data or information,
particularly online; all the aforesaid goods not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever. Transmission of information, data or software via telephone
line, telecommunications and/or computer networks, cable,
satellite, radio relay; downloading of data or software on
cards and badges, including payment cards, remote payment,
electronic cash, intended for securing transactions by code,
particularly online; information concerning the aforesaid
services; all the aforesaid services not intended for the
field of motion simulators or the field of equipment used as
part of the projection or viewing of audiovisual works, in
any sector whatsoever. Computer engineering; technical consulting in the field of
computers and/or telecommunications, design, development,
maintenance and updating of software and databases; design,
development and updating of cards and badges, including
payment cards, remote payment, electronic cash, intended for
securing all transactions by code, particularly online;
information concerning the aforesaid services; design,
development and updating of cards and card readers; lending
and leasing of cards and badges, including payment cards,
remote payment, electronic cash intended for securing all
transactions by code, particularly online; the aforesaid
services available for consultation or made available by
means of data transmission or on telecommunication or
computer networks; all the aforesaid services not intended
for the field of motion simulators or the field of equipment
used as part of the projection or viewing of audiovisual
works, in any sector whatsoever.
40.
METHOD FOR CONSULTING THE STATUS OF A RESOURCE OF AN ELECTRONIC DEVICE, ASSOCIATED ELECTRONIC ENTITY AND ELECTRONIC DEVICE PROVIDED WITH SUCH AN ELECTRONIC ENTITY
The invention concerns a method for consulting, by an electronic entity (EE), the status of a resource (S, K) of an electronic device provided with a contactless module (CLF) and the electronic entity (EE), comprising the following steps: - transmission, by the electronic entity (EE), of a resource (S, K) status request; - reception of a piece of resource (S, K) status information in response to said request; - storing of the resource (S, K) status information (INF); - execution of at least a part of an application (APPL) by a processor of the electronic entity (EE); - calling, as a result of the execution of the application (APPL), of a programming interface (API), resulting in the reading of said piece of stored resource (S, K) status information. An associated electronic entity and electronic device provided with such an electronic entity are also proposed.
The invention relates to a method for treating a faulty connection to a telecommunications network (N), comprising the following steps: - establishing a secure link (SL) between a first terminal (B), storing a first access profile (PB) for access to the telecommunications network (N), and a second terminal (A), storing a second access profile (PA) for access to the communication network (N) associated with the faulty connection; - communicating, from the second terminal (A) to the first terminal (B), via the secure link (SL), data relating to the second profile (PA); - transmitting, by the first terminal (B), using the first profile (PB), data relating to the second profile (PA) to an infrastructure server (SMB) of the telecommunications network (N).
The invention relates to an electronic entity having a transponder which comprises a body 11 provided with a recess and, inside said recess, a transponder comprising a mounting 12A supporting an antenna 13 formed by at least one turn running along the contour of the module and a microcircuit, said antenna and microcircuit being connected to one another, plates of conductive material 15A, 15B being formed on each of the surfaces facing one another, covering 60% to 90% of the surface defined by the one or more turns of the antenna such as to form a capacitor connected in parallel on the antenna, and the body comprising, at least approximately at said recess, an annular metal area 16 in which the inner contour which projects into the plane of the mounting surrounds said mounting and is suitable for concentrating the field lines toward the inside of the turn, the capacitor defining, with the antenna and the microcircuit, a given resonance frequency substantially equal to the frequency of an external reader.
The invention relates to an antenna carrier intended for being built into an electronic document, the carrier comprising: a first plastic substrate (30), defined by first and second opposing surfaces (30a, 30b) defining therebetween a substrate body (30), an antenna comprising at least one turn (26a) which extends between two ends (26b, 26c), the antenna being made up of a wire embedded in the body of the first substrate (30) from the first surface (30a), the two ends (26b, 26c) each having a zigzag shape made up of at least two straight portions (32) and two bends (34). The bends (34) are embedded more deeply than the straight portions (32) in the body of the first substrate (30) with respect to the first surface (30a).
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
H01Q 7/00 - Loop antennas with a substantially uniform current distribution around the loop and having a directional radiation pattern in a plane perpendicular to the plane of the loop
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
44.
METHOD FOR THE AUTHENTICATION OF A FIRST ELECTRONIC ENTITY BY A SECOND ELECTRONIC ENTITY, AND ELECTRONIC ENTITY IMPLEMENTING SUCH A METHOD
The invention relates to a method for the authentication of a first electronic entity (C) by a second electronic entity (H). The first electronic entity (C) implements the following steps: reception of a challenge (HCH) from the second electronic entity (H); generation of a number (CCH) according to a current value of a counter (SQC) and a first secret key (K-ENC); generation of a cryptogram (CAC) according to the challenge (HCH) and a second secret key (S-MAC); and transmission of a response including the cryptogram (CAC) to the second electronic entity (H), without transmission of said number (CCH).
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The invention relates to a method implemented by a profile management server (500) for managing the profiles (P1, P2, PROV) of a secure entity. Said method comprises: a step (S25) of sending a message (302) to said secure entity in order to modify the active profile of said entity; a step (V50) of initialising and initiating a time-recording meter (TIM); and in the event that said server (500) does not receive a message indicating the active profile in said secure entity (100) before the expiry of a predetermined period starting from said initiation: a step of initiating an audit procedure (V100) in order to determine the effectively active profile in said secure entity (100).
The invention relates to a method for testing the quality of service of a connection established between an electronic device (12) including a chip card (14) and a device (16) of a data network. Information about the size of a buffer memory area allocated by the electronic device (12) for data transmission over the established connection is received (E60) by the chip card (14), which sends (E70) the electronic device an amount of test data which does not exceed the size of said memory area, for storage therein. After the test data have been completely stored in the memory area, the electronic device (12) transmits (E90) same to the network device (16) over the established connection. The network device determines information on the quality of service of the connection in accordance with the test data received.
The invention concerns a method for attaching a hinge (22) partially covering the page, defining an attachment area (24) extending laterally and longitudinally, the hinge (22) being attached to the page by ultrasonic welding, the welding being carried out by a set of elementary welding patterns (26) spaced apart from each other and arranged in the attachment area (24) such that the welding has a plurality of rows (28, 34) of elementary patterns (26), the rows (28) extending substantially in the lateral direction of the attachment area (24) and having at least a first row (28) according to a first sequence of elementary patterns (26) in which: the welding extends over 30% to 60% of the width of the attachment area (24), each of the lateral ends of the first row (28) comprises an elementary pattern (26) of which a first side (30) extends substantially parallel to the longitudinal direction (Y) and at least a second side (32) is inclined relative to the longitudinal direction (Y), the elementary patterns (26) disposed at the centre of the first row (28) are oriented such that the first side (30) is disposed substantially perpendicular to the longitudinal direction (Y).
The invention concerns a method for modifying the profile in a device (D) comprising a communication module for communicating on a communication network, the device (D) being provided with a microcircuit storing connection data used by the communication module and associated with a profile, characterised in that it comprises the following steps: reception, by the microcircuit and via the communication module, of a request to deactivate (E6) the profile; transmission, by the microcircuit, of a first message (E10) to the device (D); transmission, by the device (D) and to the microcircuit, of a response (E14) indicative of the existence of a critical situation; following the receipt of said response (E14) by the microcircuit, implementation of a time delay mechanism (E18); upon expiry of the time delay (E18), transmission, by the microcircuit and to the device (D), of a second message (E22) resulting in the deactivation of the profile. An associated device and microcircuit are also described.
The invention relates to a method for generating a session key (SK) for a secure data exchange between a first electronic entity (H) and a second electronic entity (C), characterised by the following steps: determining (E2), by means of the first electronic entity (H), a first verification word (PRM); transmitting (E4) the first verification word (PRM) from the first electronic entity (H) to the second electronic entity (C); incrementing (E14) a counter (SQC), by means of the second electronic entity (C), only when the first verification word (PRM) is identical to a second verification word (PRM*); generating (E18) a session key (SK), by means of the electronic entity (C), on the basis of the value of the counter (SQC). The invention also provides an electronic entity (C) designed such as to exchange data with another electronic entity (H).
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
50.
SECURING OF THE LOADING OF DATA INTO A NONVOLATILE MEMORY OF A SECURE ELEMENT
The invention relates to the securing of the loading of data originating from an external device into a code memory area defined by an initial program of the secure element and any modification of which is controlled solely by the latter. When the external device obtains data to be transmitted to the secure element, the latter simulates an image of the code memory area such as it would be modified by the loading of these data. A signature is calculated on the basis of the simulated image, then dispatched to the secure element with the data. The initial program of the secure element compares a signature that it has calculated over the whole of the code memory area after the actual loading of the data, with the signature received from the external device. The identity between these signatures makes it possible to ensure that the code memory area does indeed conform to the image simulated by the external device, and hence is indeed unimpaired.
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
51.
EMBEDDED SUBSCRIBER IDENTITY MODULE CAPABLE OF MANAGING COMMUNICATION PROFILES
The invention relates to an embedded subscriber identity module (eUICC) capable of cooperating with a communication device (T), said module comprising: a communication profile (PI) configured to allow the embedded subscriber identity module to communicate with a telecommunications network (R) when said profile (PI) is active; a reception module (PSM) for receiving, from a remote server (SM-SR) of the mobile phone network (R), a communication profile management request; and a profile management module (MGP) configured to: o determine, on receipt of said management request, if a rule from a predefined set of at least one rule (RL) is applicable; o and, if so, execute an action specified by the applicable rule in association with a communication profile of the embedded subscriber identity module.
Generation of a message m of order λ(n) for a test of the integrity of the generation of a pair of cryptographic keys within the multiplicative group of integers modulo n = p.q, comprising: - key pair generation including, to generate p and q: a random selection of candidate integers; and a primality test; - a first search of the multiplicative group of integers modulo p for a generator a; - a second search of the multiplicative group of integers modulo q for a generator b; - a third search for a number y, as message m, verifying: 1 ≤ γ ≤ n − 1, where γ=a mod p and γ=b mod q, the first or second search being performed during said primality test.
The invention relates to an electronic device designed to communicate by contact and at distance via the antenna (12) connected electrically to the microcircuit by way of a contact means, at each of its ends. At least one contact means (26a, 26b) consists of a wire arranged to form a hairpin defining consecutive lines (32) directed alternatively in opposite directions, the lines being connected to each other by a bend, the contact means (26) comprising a portion lying flush with the bottom of the cavity and an embedded portion comprising at least one first bend (34) arranged outside of the cavity, the module being fastened in the cavity by means of a conductive anisotropic adhesive designed to connect electrically the contact pads of the module to the contact means.
The present invention concerns a method for updating the functions of the operating system of a terminal required for the correct operation of applications installed on a subscriber identity module for identifying subscribers to a telecommunications network operator. The subscriber identity module tests the commands. If certain commands do not function, the subscriber identity module sends information on the software installed on the terminal and on the non-functioning commands to a remote server. The latter analyses this information and provides a unit for updating the software on the terminal as required. This updating unit is received by the subscriber identity module, which triggers the updating of the terminal. The applications requiring these commands are thus made operational.
The invention concerns a method for testing the quality of service of a communication channel between a mobile terminal comprising a subscriber identity module for identifying a subscriber with respect to a mobile phone network operator, and a remote device of a target network. A data packet exchange protocol (PDP) context is activated in said mobile phone network for communication between the mobile terminal and the remote device. The method comprises the following steps, implemented by the subscriber identity module: sending, (322) via the communication channel implementing the PDP context, test data to said remote device, receiving (324), via the communication channel, a response to the sending of the test data, and processing (326) said response, in order to assess the quality of service of said communication channel.
The invention concerns a method for updating a cache memory of a telecommunications terminal (T) capable of cooperating with a subscriber identity module (2), implemented by said module, comprising: - detecting (B2) a modification of an elementary file (FE2), and - generating (B4) a piece of update data (DMJ2) associated with the modified elementary file, and, during a startup phase: - receiving (B8) a startup message (ATR) from the terminal (T), - receiving (B12) a request (SELECT) making it possible to identify an elementary file (FE2) to be processed, - sending (B16) the piece of update data (DMJ2) associated with said elementary file (FE2) to be processed, and - reading (B20) said elementary file according to a read command (CMD) from the terminal (T). The invention further concerns a corresponding method implemented by the terminal, and the corresponding module and terminal.
A microcircuit card comprising an overall span of contacts 15 comprising at least individual contact surfaces C1 to C3, C5 to C7 connected to this microcircuit while defining two parallel columns situated in proximity to two edges of said overall span, in a card body 12 having a format at least equal to the 2FF format, in which there is made a pre-cutout 14 in the 4FF format surrounding the overall span of contacts and a pre-cutout 13 in the 3FF format surrounding the pre-cutout in the 4FF format, these pre-cutouts being such that the individual contact surfaces C1 to C3, C5 to C7 have, with respect to each of the pre-cutouts positions and dimensions such that they encompass the theoretical contact zones defined by the standards defining these 4FF, 3FF and 2FF formats, the upper edge of the pre-cutout in the 3FF format being situated at a distance at least equal to 400 micrometers from the upper edge of the pre-cutout in the 4FF format, the individual surfaces C1 and C5 being, within these columns, symmetric with the individual surfaces C3 and C7 with respect to a midline of the overall span of 3FF and 4FF contact.
The invention essentially concerns a notification method for configuring a secure element incorporated into a terminal connected to a network, said method comprising the following steps implemented by an application (108) of said secure element: - obtaining (A215) at least one item of information (128, 129) that can be used to configure the secure element stored in a memory of the terminal outside the secure element, - sending (A220) said item of information (128, 129) and an identifier (ID) of the secure element to a configuration system, and - obtaining (A275) configuration data (DC) originating from the configuration system, said configuration data (DC) being supplied to the secure element depending on the item of information (128, 129).
A method for visually customising an identity document comprising a latent image formed from an array of single-colour portions distributed into a series of groups of identical single-colour portions, comprises steps which involve, for each pixel of a customisation image to be formed on the latent image, defining a segment extending over one of said groups of single-colour portions, each segment being formed from elementary areas in which shading can be generated with a level chosen from a plurality of possible shading levels so as to locally alter the appearance of the array in such a way as to reproduce, in said segment, said colour of the pixel of the customisation image, characterised in that, the portions having a dimension representing, at most, a multiple of the average dimension of these elementary areas, it involves generating, in at least some of the segments, successive levels of shading that are respectively defined by a pixel of the image to be reproduced and by at least one adjacent pixel in this image to be reproduced in a given position.
A method for producing an identity document (DI1) comprising a three-dimensional security element (ES), the method comprising: acquiring spatial coordinates; determining a surface model, by calculating from the spatial coordinates; and forming a three-dimensional security element (ES) comprising a non-planar surface (12) matching said surface model, said surface (12) of the security element (ES) being configured to allow the authenticity of said document to be checked. During or after the formation of the security element, an image (17) can be produced (E8) by means of laser carbonization or printing. The formation step can comprise the removal or addition of matter from/to a portion of material (10; 32), such as to form the surface (12) of the security element (ES). The step of acquiring spatial coordinates (6) can comprise the digital capture of an object (2) from which the spatial coordinates are generated, for example: by acquisition of multiple photos of the object in different directions; by scanography of the object using a laser; and by transmission/reception of radio waves. A 3D printing device can be used.
The invention concerns the field of intrusion detection systems dedicated to an operating system, and more particular an intrusion detection system in a device implementing at least a first operating system and a second operating system. According to the invention, the intrusion detection systems comprises: a listening module (1110) configured to be executed in the first operating system in order to listen to the activity of this first operating system; a collecting module (1120) configured to be executed in the first operating system in order to collect data characterising the activity of the first operating system; and an analysis and detection module (1150) configured to be executed in the second operating system in order to analyse the data collected in the first operating system and detect a suspicious activity in the first operating system depending on said analysis.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
This method of personalizing a secure element (eUICC) comprises: - a step (E10) of receiving a personalization request (RQ1) emitted by an operator (MNO) so as to download a personalized profile in accordance with a model (Templ) into a secure element (eUICCl), said request comprising personalization data (DP), an identifier of the secure element (eUIDl) and the identifier (TemplRef) of said model; - a step (E20) of identifying, on the basis of the identifier of the secure element, a pre-personalization server (SMDP1) able to pre-personalize said secure element (eUICCl); - a step (E40) of obtaining from said pre-personalization server (SMDPl) a message comprising a script (ScrPPl) for pre-personalization of the secure element (eUICCl) based on the description of said model; - a step (E50) of generating a script (ScrPl) for personalization of said secure element (eUICCl) using said pre-personalization script (ScrPPl) and the personalization data (DP); - a step (E100) of dispatching the personalization script (ScrPl) to said secure element (eUICC), said secure element (eUICC) being able to execute said personalization script (ScrPl) so as to install said personalized profile in said secure element (eUICCl).
The invention relates to a microcircuit board (1) including: a plastic body (2); a module (3) including a microcircuit (4); and an antenna (6) embedded in the body (2) and connected to the microcircuit (4) by at least one contact means (7). Said at least one contact means (7) includes a conductive wire extending between a first end (8), secured to the antenna (6), and a free second end (9). At least part of the conductive wire is arranged in a centrifugal spiral (13) wound between a center (14), connected to the first end (8), and a point far from the center. The far point is connected to the free second end (9). The invention also relates to a method for manufacturing such a card.
The invention relates to a method of testing resistance of a chip card (2) comprising a card body (4) in which is disposed a microcircuit module (6), this module (6) comprising contact lands (8) accessible from outside the card body (4), the method comprising: • a) the positioning of the chip card (2) on a support (30) according to a plane determined in such a way that at least a part of the card body can deform freely in a direction (DR) perpendicular to the determined plane; • b) then the application (E4) for a determined duration of a pressure force (Fp) on the contact lands (8) of the module (6); • c) then the checking of structural specifications of the chip card (2).
An electronic entity comprises a module 30A formed of a support film carrying, on a face termed the internal face, a microcircuit 31 and a first coupling coil 32, and a body 30B comprising a cavity in which this module is fixed, the support film having a surface termed the external surface running at least approximately alongside a surface termed the upper surface of this body, and containing an antenna 33 and a second coupling coil 35 connected to this antenna and intended for the coupling of the antenna with the microcircuit by electromagnetic coupling with the first coupling coil; this second coupling coil (likewise may be the case for the antenna and the first coupling coil) is formed on a thickness of at most a few microns in a plane situated, with respect to the upper surface of the body, at a distance of less than half the distance with respect to the surface opposite from this upper surface of this body.
A printing system (102) for pre-personalizing a document is described. The printing system ( 102) comprises a printing device ( 104) to print a matrix comprising a plurality of categories of sub-pixels. The printing device (104) further prints a plurality of categories of positioning marks. Further, each category of positioning marks is associated with a respective category of sub-pixels.
A method and tool for producing a large format, high thickness (6) thin plastic plate (1) comprising a small format, low thickness (5) card (2) that can be detached from the plate (1), comprising: producing, in a first face (3) of the plate (1), a counterbore of which the thickness is equal to the difference between the high thickness (6) and the low thickness (5), - levelling punching, in the counterbored area, in a levelling direction facing a second face of the plate (1), opposite the first face, to a levelling depth (en) equal to the depth of the counterbore, in order to level the bottom of the counterbore with the first face of the plate (1), and - prescoring a contour of the card (2) located within the levelled area, in order to make the card (2) detachable.
A method for weakening a contour (32) in a thin plastic card (31), comprising the steps of forward punching by means of a forward punch (41) having a protruding shape that is substantially identical to the contour (32), capable of punching the thin plastic card (31) in a forward direction (Da) against a die (42) having a recessed shape that is substantially identical to the contour (32), aligned with the forward punch (41), in order to be able to receive the material (34) pushed by the forward punch (41), and return punching by means of a return punch (43) having a protruding shape that is substantially identical to the contour (32), aligned with the forward punch (41), capable of punching the thin plastic card (31) in a return direction (Dr) opposite to the forward direction (Da). A tool (40) capable of implementing such a method. A thin plastic card (31) comprising at least one contour (32) weakened by such a method.
B26D 3/08 - Making a superficial cut in the surface of the work without removal of material, e.g. scoring, incising
B26F 3/00 - Severing by means other than cuttingApparatus therefor
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
69.
ARRANGEMENT AND METHOD FOR PRODUCING A COLOUR IMAGE
The invention concerns an arrangement (2) of pixels (3), each pixel (3) comprising sub-pixels (4c, 4m, 4j, 4n, 4b) of elementary colours capable of being selectively perforated. The invention also concerns a method for producing a colour image in a support (1) having a substantially planar main direction comprising such an arrangement (2), said method comprising a step of perforation carrying out the partial or total selective destruction of said sub-pixels (4c, 4m, 4 j, 4n, 4b). The invention further concerns the application to the production of a security device.
The aim of the invention is to optimise the creation of a secure application domain between a computer system and an electronic entity. After having generated (305) and transmitted (310) a code to the computer system, said computer system calculates (320) a signature from the received code and transmits (325) same, along with a certificate, to the electronic entity, the certificate and the signature allowing the authentication of the computer system. The electronic entity then checks (330) the validity of the received certificate and signature, the signature being checked according to the generated code, in order to authenticate the computer system. In response to the authentication of the computer system, at least one cryptographic key allowing the creation of said secure application domain is generated (330).
An embedded smart card (102) implementing a notification mechanism for notifying a subscription manager (108) upon execution of a profile status change command is disclosed. The embedded smart card (102) receives the profile status change command from the subscription manager (108) and stores response parameters associated with the profile status change command. Thereafter, the embedded smart card (102) changes a status of a targeted profile in the embedded smart (102) card upon execution of the profile status change command. Once the profile status change command is executed, the embedded smart card (102) sends a notification to the subscription manager (108) using the response parameters.
The invention relates to a method for creating a profile (P) in a target security domain (ISD-P) of a secured element (10), which comprises: a step (E10) of receiving, by means of said target security domain (ISD-P) and according to a secured protocol that cannot be interpreted by said security domain, data (DSP) comprising a script for installing said profile (P), which is encrypted with a key (KMNO) of the target security domain (IDS-P); a step (E20) of transferring data to a privileged security domain (IDS-R) capable of interpreting the protocol; a step (E30) of decrypting said protocol by means of said privileged security domain in order to obtain said encrypted script; a step (E40) of sending the encrypted script to said target security domain; a step (E50) of decrypting said script encrypted with said key and of executing said script by means of the target security domain (IDS-P), in order to install said profile (P).
A method of personalization for at least two cards (10), each card including a first side, a second side, and a peripheral surface, includes the following steps: forming a pile (20) of at least two cards by stacking the first side or the second side of an article (n) such that the first surface or the second surface of the following card (n+1) is in contact with the first side or the second side of the card (n); aligning, via an alignment device (32, 34) at least one element of the peripheral surface of the card (n) with at least one element of the peripheral surface of the following card (n+1) such that at least one element of the set of peripheral surfaces of each card forms at least one uniform surface; applying, via an application device, at least one product on at least one element of the uniform surface.
B41F 17/24 - Printing apparatus or machines of special types or for particular purposes, not otherwise provided for for printing on flat surfaces of polyhedral articles
B41F 17/28 - Printing apparatus or machines of special types or for particular purposes, not otherwise provided for for printing on curved surfaces of conical or frusto-conical articles
B41F 17/30 - Printing apparatus or machines of special types or for particular purposes, not otherwise provided for for printing on curved surfaces of essentially spherical, or part-spherical, articles
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
A method for producing a pattern (6) in relief (10) in a thin plastic card (1), comprising the following steps: - producing a stack of layers comprising, in the following order: - a transparent layer (2), - a special layer (3), - a black surface (4), - a substrate layer (5), - drawing said pattern (6) by means of a laser (7) through the transparent layer (2).
A method for producing a smart card (1) comprising at least one chip (11) and at least one other electronic component (12) having a face (12A) that must be accessible from the outside, comprises steps which involve forming a card body (10) having two opposing faces (10A, 10B) and in which at least two recesses (13, 14) are formed, one of which (14) is a through-recess extending from one of the faces to the other, forming a first module (20) comprising the chip (11) and forming a second module (30) separate from the first module and comprising the other electronic component (12), said second module comprising a support (31) to which the component is secured opposite the face (12A) that must be accessible, securing the second module (30) in the through-recess (14) from the face of the body (10B) that is opposite the face (10A) through which the face of the component (12A) must be accessible from the outside, by means of a shoulder in the through-recess, and securing the first module (20) in the other recess (13).
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
76.
SECURE ELECTRONIC ENTITY FOR AUTHORIZING A TRANSACTION
The invention pertains to a secure electronic entity (100) comprising a communication interface (105), characterized in that it comprises means, for, when it is connected by said communication interface (105) to a portable electronic device (200) having means of connection to a telecommunications network (300), - authenticating a remote transaction verification server (310) in the telecommunications network (300) and authenticating itself with said remote server (310), - then establishing a secure connection (1000), via the telecommunications network, with said remote server (310), - and receiving, via said communication interface (105), data relating to a transaction envisaged (2000) with a third-party device (400) and transmitting said data, via the secure connection (1000), to the remote server (310) so that it analyses said data with a view to taking a decision as to a possible authorization of the transaction.
A security device (1) comprising at least one security element (2) and at least one data storage means (6) capable of storing at least one representation (5) of a characteristic (4) of said security element (2). An identity document (15) comprising such a security device (1). A method for producing and a method for checking such a security device (1).
G07D 7/00 - Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
G07D 7/12 - Visible light, infrared or ultraviolet radiation
Security device comprising at least one first pattern (A) which is visible through a lens array (2) along an associated first line of vision (Δα) and at least one second pattern (B) which is visible through said lens array (2) along an associated second line of vision (Δβ), each second line of vision (Δβ) being oriented relative to at least one first line of vision (Δα) along a characteristic "angular step" (γ) of the lens array (2), wherein said at least one second pattern (B) is derived from at least one angle (a) of a first line of vision (Δα) with respect to a normal (ΔΝ) to the device (l). Method of manufacturing such a security device. Applicability to an identity document.
A method of manufacturing a card (3) of small format (8) and small thickness (5), detachable from a plate (1) of large thickness (6), comprising the following steps: providing in the plate (1) of large thickness (6) at least one hole (4) opposite with a cumulative depth (7) equal to the difference between the large thickness (6) and the small thickness (5), pre-cutting of the card (3) of small format (8) in said at least one hole (4). Product obtained by such a method.
A format adapter for a card, such as a microcircuit card, cut from a plate, according to a substantially rectangular outer contour (2), wherein at least one side of said outer contour (2) comprises a convex cut (7-8). A punch to cut or precut at least one portion of such a convex cut (7-9).
Authentication method intended for use in authentication between a first entity (A) and a second entity (B), comprising: - a first phase wherein a first electronic device (100) of the first entity (A) communicates with a second electronic device (200) of the second entity (B) via a telecommunications network (2): - a step wherein the first electronic device (100) generates a first token, a step wherein the first token is transferred from the first electronic device (100) to the second electronic device (200) via the telecommunications network (2), - a step wherein the second electronic device (200) generates a third token,and - a step wherein the third token is transferred from the second electronic device (200) to the first electronic device (100) via the telecommunications network, and - a second phase comprising a step wherein a first unauthenticated entity, such as the second entity (B), is authenticated according to a second token (V) contained in a first mobile electronic device (201) of the first unauthenticated entity, and a step wherein a second unauthenticated entity, such as the first entity (A), is authenticated according to a fourth token contained in a second mobile electronic device (101) of the second unauthenticated entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
82.
ADAPTER FOR MICROCIRCUIT CARD BETWEEN A LARGE FORMAT AND A SMALL FORMAT OF LESSER THICKNESS
Format adapter making it possible for a microcircuit card of small format to conform to a large format, the large format exhibiting a substantially plane form, exhibiting a large thickness (GE), whose extension along said plane is limited by a large contour, the small format exhibiting a substantially plane form, exhibiting a small thickness (PE), less than the large thickness (GE), whose extension along said plane is limited by a small contour, inscribed within the large contour, said adapter (5) comprising a substantially plane plate (6) whose extension along said plane is limited by an external limit (7) substantially identical to the large contour and by an internal limit (8) substantially identical to the small contour, characterized in that said plate (6) exhibits a thickness substantially equal to the small thickness (PE), and in that the adapter (5) further comprises a substantially plane heightener (9) of thickness substantially equal to the difference between the large thickness (GE) and the small thickness (PE), disposed parallel to the plate (6).
The invention relates to an assembly including an adapter (20) and a smart card (10), wherein: the outer dimensions of the adapter (20) are compliant with the 3FF microcircuit card format, the format further defining the positioning and minimum dimensions of contact areas C1b, C2b, C3b, C5b, C6b and C7b; the smart card (10) includes a plurality of contact surfaces C1, C2, C3, C5, 05 and C7, the dimensions of which are greater than those defined by the 3FF format for the contact areas, the outer dimensions of said card being smaller than those of the 3FF format; and the adapter (20) includes a recess, the outline of which is defined by a plurality of arms that surround the recess, the recess being shaped so as to receive the smart card (10) such that the contact areas of the adapter fit inside the contact surfaces of the smart card (10), each of the contact areas being off-center relative to each of the contact surfaces, such that each arm has a width of 700 micrometers, which is sufficient for ensuring the mechanical stability of the adapter.
Antenna device for a smart card comprising a supporting card (3) and a chip (4) comprising two antenna prongs (a, b), said antenna device comprising an active coil (A) wherein each of the two ends (8, 9) is respectively connected to one of the two antenna prongs (a, b) of the chip (4), a first set of coils comprising at least one passive coil (Pla) wherein one end (10) is connected to one of the two antenna prongs (a) of the chip (4) and the other end (11) is left free, and a second set of coils comprising at least one passive coil (Plb) wherein one end is connected to the other of the two antenna coils (b) of the chip (4) and the other end is left free.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
85.
METHOD FOR MANUFACTURING A SUBSTRATE FOR RECEIVING AN ELECTRONIC DEVICE, AND CORRESPONDING SUBSTRATE
The invention relates to a method for forming a double recess (12, 14) in a fibrous substrate (10), the double recess (12, 14) including a first and second recess, the double recess being shaped so as to receive a module consisting of at least one antenna and one chip, the method including the following steps: forming a first recess (12) using a first device, the first recess (12), which is defined by given a outline and depth, being shaped so as to receive the antenna of the module, the first device being a compression device including a presser foot; and forming a second recess (14) using a second device (40), the second recess (14), defined by a given outline and depth (p2), being shaped so as to receive the chip (14) of the module (10), the second recess (14) being formed within the outline of the first recess (12).
The invention relates to a method of personalization for at least two cards (10), each card (10) comprising a first side, a second side, and a peripheral surface, characterized in that the method comprises the following steps: • Forming a pile (20) of at least two cards (10) by stacking the first side or the second side of an article (n) such that the first surface or the second surface of the following card (n+1) is in contact with the first side or the second side of the card (n); • Aligning, via an alignment device (32, 34) at least one element of the peripheral surface of the card (n) with at least one element of the peripheral surface of the following card (n+1) such that at least one element of the set of peripheral surfaces of each card forms at least one uniform surface; • Applying, via an application device (40), at least one product on at least one element of the uniform surface.
B41M 3/00 - Printing processes to produce particular kinds of printed work, e.g. patterns
B42D 15/10 - Identity, credit, cheque or like information-bearing cards (record carriers, e.g. credit or identity cards, for use with machines and with at least a part designed to carry digital markings G06K 19/00)
B41F 17/24 - Printing apparatus or machines of special types or for particular purposes, not otherwise provided for for printing on flat surfaces of polyhedral articles
B41F 17/28 - Printing apparatus or machines of special types or for particular purposes, not otherwise provided for for printing on curved surfaces of conical or frusto-conical articles
B41F 17/30 - Printing apparatus or machines of special types or for particular purposes, not otherwise provided for for printing on curved surfaces of essentially spherical, or part-spherical, articles
87.
MICROCIRCUIT MODULE AND SMART CARD COMPRISING SAME
The invention relates to a microcircuit module for a smart card. The module comprises a generally rectangular carrier film (101) provided with eight contact pads on a first face thereof and with an electronic component on a second face, said electronic component being equipped with connection terminals to which the contact pads are connected via the carrier film. The eight contact pads are disposed in two parallel series of three contact pads (C1, C2, C3, C5, C6, C7), with two other contact pads (C'4, C'8) being disposed therebetween and each being positioned close to the contact pads from the ends of each of the series. The contact pads each measure at least 1.7 mm x 2 mm. The contact pads of the two parallel series comply with ISO standard 7816 and said eight contact pads border each of the sides of the carrier film.
The present invention relates in particular to a security document (1), such as an identity card or passport, which comprises, on a substrate (10), at least one datum (2) that is visible to the naked eye, such as text or an image, said piece of data consisting of at least one first region (20) having a first colour (T1), and at least one second region (21) having a second colour (T2) that other than the first, said datum being covered with an impression of transparent or translucent material forming a raised tactile element. The invention is characterised in that said impression of transparent or translucent material placed over said first region (20) has a thickness and/or a covering percentage and/or a brightness and/or is made according to a different graphic design than that (or those) of the impression (31) of transparent or translucent material placed over said second region (21), said difference being visibly perceptible.
B42D 15/00 - Printed matter of special format or style not otherwise provided for
B42D 15/10 - Identity, credit, cheque or like information-bearing cards (record carriers, e.g. credit or identity cards, for use with machines and with at least a part designed to carry digital markings G06K 19/00)
89.
Electronic entity and microcircuit card for electronic entity
An electronic entity and a microcircuit card that obtains an orientation of the electronic entity, sends a request containing information on the orientation, receives information relating to a positional entity linked to both a geographical position of the electronic entity and the orientation, and provides a user with information relating to the positional entity.
A translucent area (Z2) is formed in the element (14) by applying a substance (24) that transparentizes its substrate (12). Thus, the method includes a step of applying a substance (20) that impermeabilizes the substrate (12) over a first area (Z1) on a first side (F1) of the substrate, surrounding a second area (Z2) devoid of the impermeabilizing substance (20). The impermeabilizing substance (20) prevents impregnation of the substrate (12) by the transparentizing substance (24) in the first area (Z1). The method then includes a step of applying the transparentizing substance (24) to at least the second area (Z2) so as to impregnate the substrate (12) in order to make it translucent in this area (Z2). The first (Z1) and second (Z2) areas form first (18) and second (22) patterns respectively, making up an image that can be observed from both sides (F1, F2) of the substrate (12).
The invention relates to an element (12) that includes an array (14) of raised lines (16), each line (16) including at least one flank (18A, 18B), each of which define an inclination angle (α1) relative to a direction normal (Z) to the array (14). More precisely, the inclination angle (α1) of the flank (18A, 18B) of at least one line (16) of the array (14) gradually changes along said line (16) so as to form, in terms of light reflection, a degraded optical effect that changes based on the observation angle of the security element.
The present invention particularly relates to a fiduciary or similar document (1), such as a banknote, passport, or identification card of the type including a substrate (3) whereon security imprints are provided. It is essentially characterized in that said security prints include: - a first design (5), consisting of a perforated or non-perforated first ink color block print (50), - at least one second design (6), not identical to the first and consisting of a second ink print in the form of a line block or at least one color block, one of the two designs partially covering the other, - a copperplate print (7), covering at least the common surface of said first and second designs (5,6), such that: - the design (5) having the largest surface is visible to the naked eye, and the other design (6) is invisible to the naked eye, under natural or artificial lighting with specular reflection; - while said other design (6) becomes gradually visible to the naked eye under natural or artificial lighting in the form of a diffused light source.
B42D 15/10 - Identity, credit, cheque or like information-bearing cards (record carriers, e.g. credit or identity cards, for use with machines and with at least a part designed to carry digital markings G06K 19/00)
93.
ANTI-COUNTERFEIT SYSTEM FOR DOCUMENTS PROVIDED WITH A RADIO-IDENTIFICATION DEVICE
The invention relates to an anti-counterfeit system for documents provided with a radio-identification device, said device comprising an antenna connected to an electronic chip containing information related to said document, for example biometric data of the holder of an identity document such as a passport, an identification card or a driver’s license, said chip being capable of being rendered inoperable, for fraudulent purposes, upon the exposure thereof to microwave radiation for a period of a few seconds; said system is characterized in that one or more units for revealing whether or not the document has been exposed to microwaves are provided on or in said document, each unit comprising: on the one hand, an active substance capable of passing, visibly and irreversibly, from a first stable state to a second stable state, by chemical reaction triggered by microwave radiation, said conversion causing a definitive physical alteration of the document and rendering an attempt to disable said electronic chip by exposing the same to microwave radiation identifiable, and; on the other hand, a catalyzing agent made of conductive materials, designed to render effective and total the conversion reaction of the active substance within the minimum duration of exposure to microwaves required for disabling said electronic chip. The invention applies more specifically to identity documents such as passports, identity cards or driver’s licenses.
The invention relates to a document, in particular a fiduciary document, which comprises at the surface thereof a safety mark that is variably visually perceptible, characterised in that said mark comprises a material including a portion having photochromic properties and another portion having photothermochromic properties.
B44F 1/12 - Securities or banknotes as far as the design or protection against forgery is of importance
B41M 5/28 - Thermography using thermo-chromic compounds or layers containing liquid crystals, microcapsules, bleachable dyes or heat decomposable compounds, e.g. gas liberating
95.
METHOD FOR CRYPTOGRAPHIC DATA PROCESSING, PARTICULARLY USING AN S BOX, AND RELATED DEVICE AND SOFTWARE
The invention relates to a method for data cryptographic processing, that is implemented by an electronic entity and comprises the conversion of input data (M'i-1), masked by an input mask (X), into output data, said conversion using a conversion table (S), and said method comprising the following steps: for at least one plurality of possible values (A) for the input mask (X), transferring the output value of the conversion table (S) corresponding to the masked input data (M'i-1) converted by the application of an unmasking operation using the possible value (A), into a table (T) at a position corresponding to a determined value (0) masked by the input mask (X) and converted by the application of an unmasking operation using the possible value (A); determining the output data using the value located in the table (T) at the position corresponding to the determined value (0).
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
96.
METHOD FOR ACCESSING A SUB-WORD IN A BINARY WORD, AND RELATED DEVICE AND SOFTWARE
The invention relates to a method and an associated system for accessing a sub-word having an index j in a binary word (U, U') including 2w sub-words (U(O),..., U(2w-1)), from a binary index (j') masked by a corresponding binary mask (rj), wherein the method comprises: i) the step of splitting said word (U, U') into two halves (Ho(U), H1(U), UH, UL), respectively, of the most significant bits and of the less significant bits; ii) the step of selecting one of said halves of said word (U, U') based on the values of bits having the same index in, respectively, the masked index (j') and the corresponding mask (rj, rj1, rj2).
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
97.
METHOD FOR CRYPTOGRAPHIC DATA PROCESSING, PARTICULARLY USING AN S BOX, AND RELATED DEVICE AND SOFTWARE
The invention relates to a method and an associated system for the cryptographic processing of data in a digital format, wherein the method is implemented by an electronic entity (10) and comprises the conversion (E110) of an input datum (M'i-1), masked by at least a first input mask (X, X1, X2), into an output datum (M'i), said conversion using a conversion table (S) representing a non-linear function (F), and said method being characterised by the following steps: a- comparison (E204, E304, E406) between a masking value (A) and said first input mask (X, X1, X2); b- determining (E206, E306, E408) using said conversion table an output datum corresponding to the masked input datum to which said masking value is applied; c- storing (E206, E306, E408) the determined output datum in a register (R0, R1) depending on the result of said comparison.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
98.
SECURITY DOCUMENT IN THE FORM OF A BOOKLET, WITH AN ADDITIONAL PAGE REVEALING HIDDEN INFORMATION
The present invention relates to a security document which has the form of a booklet (1), such as a passport, and which comprises at least one data page (3, 5) on which is presented so-called 'personal' data (30, 30'), that is, data specific to its bearer, and in which at least a part of this data incorporates at least one item of hidden information (I, I') that is not discernible to the naked eye, or 'hidden element', this booklet (1) comprising an additional page (6) which is as one with the latter and of which at least one area is translucent or transparent, in this area being incorporated at least one means (60, 60') of revealing said hidden information (I, I'), this additional page (6) making it possible, by pressing it against said data page (3, 5), to read through said zone, said hidden information (I, I'), with no external device and/or added energy. It is characterized in that said additional page (6) also comprises information (8) at least partially reproducing said personal data (30, 30'), on one of its faces (on the back or on the front) or both faces, covering or not all or part of said revelation means (60, 60').
B42D 15/10 - Identity, credit, cheque or like information-bearing cards (record carriers, e.g. credit or identity cards, for use with machines and with at least a part designed to carry digital markings G06K 19/00)
99.
Dual communication fob assembly comprising an insert within a base
A dual communication fob assembly provided with an attachment area for a ring or a chain and including in combination: an insert including a first contactless communication device; and a base with a pocket in the base for holding at least a part of the insert when inserted therein and being provided with a second contactless communication device which is electrically separate from the first contactless communication device.
The document includes a support (10) provided with at least one first (12) and second (14) parts that can move relative to one another, the support including an electronic microcircuit (3) and contactless coupling members (2) electrically connected to the electronic microcircuit (3), and capable of being coupled to an external reading station (5) for establishing a contactless communications with the latter (5). The support also includes detecting elements (20) capable of detecting the relative proximity of the first and second parts independent of the contactless coupling members (2), and securing elements (30) connected to the detecting elements (20) and capable of inhibiting and/or authorizing the activation of the contactless communication according to the relative proximity of the first and second parts thus detected.