|
2025
|
Invention
|
Backdoor detection using layer-wise distinguishability. The present invention relates to a method... |
|
|
Invention
|
An embedded universal integrated circuit card (euicc) installed in a telecommunication device, fo... |
|
|
Invention
|
Data carrier and method producing such a data carrier. A data carrier (1) comprises a metal layer... |
|
|
Invention
|
Data carrier and method producing such a data carrier. A method comprises two steps, first prepar... |
|
|
Invention
|
Remote provisioning of credentials required for remote sim provisioning. A method for obtaining c... |
|
|
Invention
|
Method for installing a profile of a mobile network operator (mno) in a secure element integrated... |
|
|
Invention
|
Issuance of a fungible token for a conditional access to a service. The invention provides a meth... |
|
|
Invention
|
Factory reset applet. Factory Reset Applet The present disclosure proposes a method 300 implement... |
|
|
Invention
|
In-the-field updating of an operating system using a digital certificate extension. Method for op... |
|
|
Invention
|
Verification of a device by a verifier entity based on a device attestation. A method of verifica... |
|
|
Invention
|
Method for verifying authenticity of a communication between a client sdk and a trusted element. ... |
|
|
Invention
|
Method to establish an inbound and outbound secure channel. Provided is a method (210, 220) and s... |
|
|
Invention
|
Biometric payment instrument and method for managing a biometric payment instrument. The inventio... |
|
|
Invention
|
Mounting assembly |
|
|
Invention
|
Payment system and method for managing a payment transaction. The invention is a method for manag... |
|
|
Invention
|
Method for performing a digital currency transaction. The invention is a method for performing a ... |
|
|
Invention
|
Method for protecting against fault attacks an execution of a generation of a crystals-dilithium ... |
|
|
Invention
|
Detection of a fault injection attack. The invention provides a method of detecting a fault injec... |
|
|
Invention
|
Data carrier with molded pillar connections. A semi-finished product (1) for a data carrier (2) c... |
|
|
Invention
|
Contactless smart card and method for managing multiple services in a contactless smart card. The... |
|
|
Invention
|
Backdoor detection in ai models. Determination in an artificial intelligence system using a neura... |
|
|
Invention
|
Charge pump, non-volatile memory and integrated circuit including said charge pump. The invention... |
|
|
Invention
|
Authentication of a shared library using an encryption function. The invention provides a method ... |
|
|
Invention
|
System and method to mitigate storage overload during web authentication. Provided is a system an... |
|
|
Invention
|
Telecommunication terminal, corresponding secure element and method for forbidding to connect to ... |
|
|
Invention
|
A method for installing a credential on an integrated sim. Aspects of the present disclosure are ... |
|
|
Invention
|
A method for switching a terminal supporting mep (multi-enabled profiles) between a public networ... |
|
|
Invention
|
Method for managing a voice command. The invention is a method for sending a voice command (42) t... |
|
|
Invention
|
Presentation attack detection based on a set of biometrics. The invention provides a presentation... |
|
|
Invention
|
Data carrier and method of producing it. A data carrier (1) for a secure article comprises a carr... |
|
|
Invention
|
Method for protecting against side-channel attacks lattice-based post quantum cryptographic schem... |
|
|
Invention
|
A method for network slice-specific authentication and authorization, corresponding user equipmen... |
|
|
Invention
|
In-the-field patching of a security protocol implementation. Deactivation of a first security pro... |
|
|
Invention
|
Method for securely processing a group of data. The present invention provides first method for s... |
|
2024
|
Invention
|
Facepod for intelligent access control device |
|
2023
|
Invention
|
Method to secure a java software code.
Method of securing a java software code to be run by a Ja... |
|
|
Invention
|
Hidden magnetic stripe cards and method therefor.
Provided is a hidden magnetic stripe card and ... |
|
|
Invention
|
Method for validating trained models.
A method for detecting a deviating model among a plurality... |
|
|
Invention
|
System and method for using a subscriber identity module as a pseudonym certificate.
A system or... |
|
|
Invention
|
Coverage availability via nas signaling.
The present invention relates to a method for transmitt... |
|
|
Invention
|
A method for sending data to a user equipment cooperating with a secure element and corresponding... |
|
|
Invention
|
A method for informing a mobile network operator server which profile of a profile-type should be... |
|
|
Invention
|
5g platform having satellite coverage.
Provided is a coverage management network function integr... |
|
|
Invention
|
Secured semiconductor device and method.
Provided is a secured semiconductor device and method f... |
|
|
Invention
|
Security element with colorshift.
Provided is a data carrier for a secure article such as a pass... |
|
|
Invention
|
Method for a secure execution of instructions.
Provided is a method for a secure execution of a ... |
|
2022
|
Invention
|
Intelligent access control device |