09 - Appareils et instruments scientifiques et électriques
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Electronic apparatus for checking the authenticity of cards,
badges, passports, visas, namely electronic systems
attesting to the authorization of entry into a territory and
secure documents bearing a seal which enable entry into a
territory, drivers' licenses, biometric identity cards or
identification documents, electronic detectors for banknotes
or access passes; apparatus and instruments for
authenticating banknotes, access passes and payment
documents; chips [integrated circuits]; computer chips;
computer chips; semiconductor chips; electronic chips for
manufacturing integrated circuits; semiconductors;
semiconductor wafers; electronic semiconductors; magnetic or
electronic cards and badges, contact or contactless,
intended for use as payment, credit, debit, remote payment,
loyalty or cash cards, including those with dynamic codes
for securing all transactions online; cards, badges,
passports, visas, namely electronic systems attesting to the
authorization of entry into a territory, drivers' licenses,
identity cards or electronic or biometric identification
documents, all fitted with optical-effect security to combat
unauthorized reproduction, forgery and counterfeiting;
magnetic or electronic cards and badges intended for use as
cards and badges for access, transport, single or multiple
access to services and/or transport networks, subscription
to transport services; electronic or magnetic cards for use
as health cards, cards for access to pay-television
channels, games, and/or multimedia services, or data banks
and databases; biometric apparatus, instruments, terminals,
readers and scanners for fingerprints, palm prints, features
of the iris, veins, voices, facial or bodily features or
other biometric features; integrated circuit cards; chip
cards; integrated circuit cards (smart cards); smart cards
[integrated circuit cards]; programmable cards; remote
programmable cards; transmitter-receiver cards and badges;
radio frequency cards and badges; infrared cards and badges;
cards for access to computer and/or telecommunications
networks; encoded cards; pre-recorded data cards, computer
programs, and software; telecommunication cards; cards for
the control of communication; magnetic or chip-based cards
with units of credit; mobile telephone cards; electronic
cards for secure access, to computer and/or
telecommunications networks; electronic cards used for
accessing services and/or performing operations and
transactions on computer and/or telecommunications networks;
computer programs; software; biometric identification and
control systems; computers and computer software for
biometric systems for the identification and authentication
of people; software for biometric systems for the
identification and authentication of persons; software for
detecting persons; software for interpreting finger or palm
prints, features of the iris, veins, voice, facial features
or other biometric features; computer programs and software
for use in connection with cards; computer programs and
software recorded on cards or intended for being recorded on
cards and/or telecommunications apparatus; software for
providing access to electronic mail services; messaging
software; software for providing access to electronic
communication networks; software for providing access to the
Internet and/or Internet sites; software for
telecommunications, software for navigation (browsing);
software for operations and transactions by card, namely,
chip-based cards; integrated circuits; electronic chips;
electronic signature support software, encryption software;
encryption keys; electronic apparatus for checking the
authenticity of cards; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for identifying and
authenticating persons and/or electronic signatures for
accessing networks, payment, operations and transactions,
including online e-commerce; traceability software for the
management and securing of documents and/or printed matter;
computer servers, in particular for the downloading,
distribution and management of applications on cards,
including chip cards; computer programs and software for
communication between chip-based cards and chip card readers
and/or computer terminals; computer programs and software
for transmitting, displaying and storing identification
and/or operations and transactions related information or
data, in particular online; computer software for processing
electronic payments and transferring funds to and from third
parties; authentication software for controlling access to
computers and computer networks and controlling
communication between computers and computer networks;
software and databases for the issue and/or management of
cards, in particular chip-based cards, and for the
monitoring of the management of such cards; apparatus for
the storage, conversion, processing and transmission of
data, information and signals; scientific, photographic,
cinematographic, optical, measuring, signaling and checking
apparatus and instruments; electronic and/or computer
apparatus, instruments and equipment for securing premises,
including anti-theft warning apparatus, alarms; apparatus
and instruments for the identification, access control using
biometric data; electric locks; traffic control apparatus;
apparatus for measuring speed; infrared cameras; apparatus
for playing films; radar apparatus; software for capturing
and processing data provided via the aforesaid apparatus and
instruments; magnetic card encoding readers; data encoders;
data decoders; computers and computer peripherals for use in
connection with cards and/or telecommunications apparatus;
microcomputers; laptop computers; hand-held computers;
apparatus for controlling secure access to computer and/or
telecommunications networks. Banking, financial and monetary affairs; insurance services;
consultancy and information with respect to financial, money
and banking; consultancy and information relating to
insurance underwriting; financial services, namely the
electronic transfer of funds; clearing and reconciling of
financial transactions; providing a wide range of payment
and financial services, namely credit card services,
issuance of credit cards, payment cards and credit lines,
processing and transmission of bills and payments thereof,
bill payment services with guaranteed provision of payment,
and brokerage of money market funds, all via global
communication networks; processing of transactions carried
out by credit card and immediate debit card; reimbursement
of funds for disputed items in the field of purchases via
electronic payment; provision of purchase protection for
goods and services purchased by others via global computer
and wireless networks; processing of credit card
transactions; credit services, namely, provision of
revolving credit account services; bill payment services;
provision of mobile electronic payment services for others;
credit card and payment processing services; processing of
payments through electronic foreign exchange operations;
payment processing services, namely provision of virtual
currency transaction processing services for third parties,
deposits of valuables, safe deposit services; issuing of
travelers' checks, vacation checks and payment orders in
general; financing of loans for security and surveillance
systems. Computer engineering; technical consultancy with respect to
computer security; design, development, maintenance and
updating of software and databases; design and development
of computers; development (design), installation,
maintenance, updating or rental of software; computer
programming; computer and software consultancy; programming
for microprocessor cards and badges; lending and rental of
computers, computer peripheral devices, computer programs
and software; design, development, maintenance and updating
of software for managing, securing and transferring cash;
design, development of systems for the identification,
authentication of the person; technical assistance,
technical advice for the implementation of systems of
identification and the authentication of people; design,
development and updating of programs and computer software
for interpreting fingerprints, palm prints, features of the
iris, veins, the voice, facial features or other biometric
features in the field of access control and the
authentication of persons; design, development and updating
of cards and badges, including payment cards, remote
payment, electronic cash, intended for securing all
transactions by code, particularly online; design and
development of currency, payment documents, access passes,
identification documents, cards, badges, banners and labels;
design, development and updating of cards and card readers;
information and advice relating to design and development of
currency, payment documents, access passes, identification
documents, cards, badges, banners and labels; lending and
leasing of cards and badges, including payment cards, remote
payment, electronic cash intended for securing all
transactions by code, particularly online; loan and rental
of cards and keys for access to telecommunication systems
and networks and computer systems and networks; the
aforesaid services available for consultation or made
available by means of data transmission or on
telecommunication or computer networks; Design and
development of data acquisition systems in connection with
documents or printed matter to combat unauthorized
reproduction, falsification and counterfeiting; design,
development of ink, watermarks, paper, and software
products, electronic chips for authentication,
customization, protection against unauthorized reproduction,
forgery, counterfeiting of documents, printed matter; design
and development of processes for protection against
unauthorized reproduction, falsification, counterfeiting,
processes for authentication, customization of documents by
inking, watermarking, guilloche ornamentation, marking;
hosting, development and design of networks and servers for
the processing and management of a customer's computer
system; provision of temporary use of non-downloadable
online software for processing electronic payments;
provision of temporary use of non-downloadable online
authentication software for controlling access to computers
and computer networks as well as for controlling
communication between computers and computer networks;
computer programming and development; development of
computer software, especially for processing data collected
using traffic control apparatus; checks and certification of
the quality of traffic control apparatus and computer
software relating to traffic control; theoretical research
and analysis of situations and information relating to
traffic; advice relating to innovative technology and the
improvement of traffic safety; reports, studies, analyses,
evaluations, estimates, diagnostics, recommendations,
consultancy and research in scientific and technological
fields provided by engineers; technical project studies;
research in the field of semi-conductor processing
technology; creation of databases; certification, testing,
analysis and evaluation of products and services of others
with the aim of issuing certification; research and
development of new products for third parties; services of a
graphics studio; expert reports and studies relating to
telecommunications; expert reports, studies, technical
consultations and advice with respect to computer security
and/or management and/or securing systems for fund
transfers; electronic security consultancy; expert reports,
studies, technical consulting and advice, in the field of
electronic card management systems.
2.
MANUFACTURING METHOD OF A METAL TRANSACTION CARD, AND METAL TRANSACTION CARD THUS OBTAINED
The present invention relates to a manufacturing method of a metal transaction card comprising at least one metal layer, said method comprising steps of:
providing the metal layer, the metal layer being made of a metal which has a melting temperature Tm, the metal layer having at least one surface which has a first color;
providing a controllable concentrated heat source; and
first heating the at least one surface of the metal layer with the controllable concentrated heat source, to a first heating temperature T1 which is comprised in a temperature range [Tmin; Tmax], Tmax being lower than the melting temperature Tm, the first heating step comprising a sub-step of changing the first color of the at least one surface into a second color, different from the first color.
The present invention relates to a manufacturing method of a metal transaction card comprising at least one metal layer, said method comprising steps of:
providing the metal layer, the metal layer being made of a metal which has a melting temperature Tm, the metal layer having at least one surface which has a first color;
providing a controllable concentrated heat source; and
first heating the at least one surface of the metal layer with the controllable concentrated heat source, to a first heating temperature T1 which is comprised in a temperature range [Tmin; Tmax], Tmax being lower than the melting temperature Tm, the first heating step comprising a sub-step of changing the first color of the at least one surface into a second color, different from the first color.
The present invention also relates to a metal transaction card obtained by said method.
B23K 26/0622 - Mise en forme du faisceau laser, p. ex. à l’aide de masques ou de foyers multiples par commande directe du faisceau laser par impulsions de mise en forme
The invention relates to a security document comprising a body made up of at least two transparent plastic substrates (12a, 12b) and bounded by edges (16) forming a substantially rectangular surface comprising four corners, wherein at least one of the substrates (12a, 12b) receives a printing layer (20) that is opaque in the visible spectrum and is applied up to the edges (16) of the document (10). The printing layer (20) defines a peripheral portion (24) that is at least partially free of printing and forms a set of lines bordering a secure zone (27) containing security information, wherein the peripheral portion (24) has a minimum dimension free of printing of between 100 µm and 500 µm, such that the plastic substrates (12) are in direct contact and bonded together in the peripheral portion (24).
B42D 25/351 - Pièces translucides ou en partie translucides, p. ex. fenêtres
B42D 25/45 - Fabrication associant plusieurs couches
B42D 25/455 - Fabrication associant plusieurs couches en utilisant la chaleur
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
4.
MICROCIRCUIT MODULE INTENDED TO BE MOUNTED IN A MICROCIRCUIT BOARD
The present invention relates to a microcircuit module (12) intended to be mounted in a microcircuit board, the module including a substrate (16); contact pads (14) supported by the outer face of the substrate, the contact pads being arranged in two series parallel to a first direction (18) of a plurality of contact pads, separated by a central region (20), the contact pads being separated by gaps (22); a microcircuit supported by the inner face of the substrate, and electrically connected to the contact pads via the substrate; and at least one light-emitting component (28) supported by the inner face of the substrate; characterised in that at least one gap portion (30) has a width L larger than the reference width I, this widened portion being positioned outside the theoretical bands (24), the light-emitting component being positioned in the vicinity of the image region of the gap portion, beyond the reference width applied to the gap portion.
A smart card that includes a metal layer including a cavity and a junction connecting the cavity to an edge of the card, an RF chip, an RF antenna electrically connected to the RF chip by a conductive physical connection, the antenna being disposed on a non-conductive layer deposited onto the metal layer, the RF chip being disposed in the vicinity of the metal layer and including a first set of turns routed along the perimeter of the card, including at least one turn extending towards the inside of the card, and electrically connected to a second set of turns routed outside the cavity, along the edges of the cavity, the turns of the two sets of turns being disposed so that the current flows in the same direction in the two sets of turns.
The present invention relates to a card equipped with a contactless interface. The card has an activation device, a microprocessor and an antenna. The activation device has a first and a second conductive component, and a spacer. The microprocessor and the antenna are each connected to the first conductive component or to the second conductive component. A cavity of the card has a normal state and a deformed state, and at least part of the cavity is configured to separate the first component from the second component in the normal state. When a force external to the activation device is applied to the activation device to move the first component towards the second component, the cavity transitions from the normal state to the deformed state, and a part of the first conductive component is configured to enter the cavity, thus forming an electrical contact with the second conductive component.
The invention concerns a manufacturing process for a secure document with a smooth mirror effect, in contrast to secure documents obtained using known manufacturing processes. The aim of such a manufacturing process is to improve the aesthetics and distinctive character of such a secure document.
B32B 37/06 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par le procédé de chauffage
B32B 27/08 - Produits stratifiés composés essentiellement de résine synthétique comme seul composant ou composant principal d'une couche adjacente à une autre couche d'une substance spécifique d'une résine synthétique d'une sorte différente
B32B 37/12 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par l'usage d'adhésifs
8.
METAL SMARTCARD, AND METHOD FOR MANUFACTURING A METAL SMARTCARD
The present invention relates to a smartcard comprising:
a metal layer comprising an RF antenna arranged in or opposite a recess region;
a module comprising an RF chip,
a conductive-material pattern that is arranged in or opposite the recess region and comprises
a central region
at least two conductive-material traces that are separated and remote from one another, in order to allow a magnetic field to pass through said antenna, and configured so as not to form a closed loop,
said conductive-material pattern being configured to form a capacitance that is electrically connected to the antenna, the value of which is determined so that the capacitance formed by said pattern, which is associated with the capacitance of said antenna, allows the resonant circuit formed by the antenna and said pattern to resonate at a determined communication frequency.
A method is provided for performing a secure function that maps an input message to an output message, the method being implemented by a system comprising a secure element and a white box implementation. The method includes:
the white box implementation computing a processing datum based on the input message,
the white box implementation encrypting the processing datum,
sending the encrypted processing datum to the secure element,
the secure element obtaining a result datum based on the encrypted processing datum, the result datum being the image of the processing datum by an intermediate function, and
computing the output message based on the result datum.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
The present invention concerns a method of updating a secure element operating system, OS, integrated in a device of an original equipment manufacturer, OEM, the secure element being manufactured by a secure element manufacturer, EUM, the method comprising: generating a secure element OS update; encapsulating the secure element OS update in a file; providing the file to the secure element; characterized in that: the file has the format of a Trusted Connectivity Alliance, TCA, package dedicated for mobile network operator, MNO, profile encapsulation; the file comprise indication indicating that it contains a secure element OS update; the file is provided to the secure element using mechanisms dedicated to MNO profile distribution; and that the method further comprises by the secure element: identifying the received file as a secure element OS update; and executing the secure element OS update.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
09 - Appareils et instruments scientifiques et électriques
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Appareils électroniques de vérification de l'authenticité de cartes, badges, passeports, visas à savoir de systèmes électroniques attestant de l'autorisation d'entrée sur un territoire et de papiers sécurisés apposés d'un sceau permettant d'entrer sur un territoire, permis de conduire, pièces d'identité ou d'identification biométriques, détecteurs électroniques de titres d'accès; appareils et instruments pour l'authentification de titres de paiement; puces [circuits intégrés]; puces informatiques; puces d'ordinateurs; puces à semi-conducteurs; puces électroniques pour la fabrication de circuits intégrés; semi-conducteurs; plaquettes de semi-conducteurs; semi-conducteurs électroniques; cartes et badges magnétiques ou électroniques, avec ou sans contact, destinés à servir de cartes de paiement, de crédit, de débit, de télépaiement, de fidélité, de porte-monnaie électroniques, y compris ceux munis de codes dynamiques permettant de sécuriser toutes transactions en ligne; cartes, badges, passeports, visas à savoir systèmes électroniques attestant de l'autorisation d'entrée sur un territoire, permis de conduire, pièces d'identité ou d'identification électroniques ou biométriques, tous munis d'une sécurité à effets optiques pour lutter contre la reproduction non autorisée, la falsification, la contrefaçon; cartes et badges magnétiques ou électroniques destinés à servir de cartes et de badges d'accès, de transport, d'accès unique ou multiple à des services et/ou à des réseaux de transport, d'abonnement à des services de transport; cartes magnétiques ou électroniques destinées à servir de cartes de santé, de cartes d'accès à des chaînes de télévision payantes, à des jeux et/ou services multimédia ou à des banques et bases de données; appareils, instruments, terminaux, lecteurs et scanneurs biométriques d'empreintes digitales, palmaires, des caractéristiques de l'iris, de la veine, de la voix, des caractéristiques du visage ou de la figure ou d'autres caractéristiques biométriques; cartes à circuits intégrés; cartes à puce; cartes à microprocesseur; cartes à mémoire; cartes programmables; cartes télé-programmables; cartes et badges émetteurs-récepteurs; cartes et badges à fréquence radio; cartes et badges à infrarouges; cartes d'accès à des réseaux informatiques et/ou de télécommunications; cartes encodées; cartes préenregistrées de données, de programmes d'ordinateurs, de logiciels; cartes de télécommunications; cartes pour le contrôle des communications; cartes magnétiques ou à puce comportant un crédit d'unités; cartes de téléphones portables; cartes électroniques d'accès sécurisé, à des réseaux informatiques et/ou de télécommunications; cartes électroniques utilisables pour l'accès à des services et/ou la réalisation d'opérations et de transactions sur des réseaux informatiques et/ou de télécommunications; programmes d'ordinateurs; logiciels; systèmes de contrôle et d'identification biométriques; ordinateurs et logiciels pour les systèmes biométriques pour l'identification et l'authentification des personnes; logiciels de systèmes biométriques d'identification et d'authentification de personnes; logiciels de détection de personnes; logiciels d'interprétation d'empreintes digitales, palmaires, des caractéristiques de l'iris, de la veine, de la voix, des caractéristiques du visage ou de la figure ou d'autres caractéristiques biométriques; programmes d'ordinateurs et logiciels utilisés en rapport avec des cartes; programmes d'ordinateurs et logiciels enregistrés sur des cartes ou destinés à être enregistrés sur des cartes et/ou des appareils de télécommunications; logiciels d'accès à des services de messagerie électronique; logiciels de messagerie; logiciels d'accès à des réseaux de communications électroniques; logiciels d'accès à Internet et/ou à des sites sur Internet; logiciels pour télécommunications, logiciels de navigation (d'exploration); logiciels d'exécution d'opérations et transactions réalisées au moyen d'une carte, notamment à puce; circuits intégrés; puces électroniques; logiciels supports de signatures électroniques, logiciels d'encryptage; clés d'encryptage; appareils électroniques de vérification de l'authenticité de cartes; programmes d'ordinateurs et logiciels pour la mémorisation, la récupération et la transmission sécurisée d'informations ou données; programmes d'ordinateurs et logiciels d'identification, d'authentification de la personne et/ou de signature électronique pour l'accès à des réseaux, le paiement, la réalisation d'opérations et transactions, y compris en ligne, le commerce électronique; logiciels de traçabilité pour la gestion et la sécurisation de documents et/ou imprimés; serveurs informatiques, notamment pour le téléchargement, la distribution et la gestion d'applications sur des cartes, y compris des cartes à puce; programmes d'ordinateurs et logiciels pour communication entre des cartes à puces et des lecteurs de cartes à puce et/ou des terminaux d'ordinateurs; programmes d'ordinateurs et logiciels pour émettre, afficher et mémoriser des informations ou données d'identification et/ou relatives aux opérations et transactions, notamment en ligne; logiciels informatiques pour le traitement de paiements électroniques et le transfert de fonds à destination ou en provenance de tiers; logiciels d'authentification permettant de contrôler l'accès à des ordinateurs et réseaux informatiques ainsi que de contrôler les communications entre ordinateurs et réseaux informatiques; logiciels et bases de données pour l'émission et/ou la gestion de cartes, notamment à puce et pour le contrôle de la gestion de telles cartes; appareils pour le stockage, la conversion, le traitement et la transmission de données, d'informations et de signaux; appareils et instruments scientifiques, photographiques, cinématographique, optiques, de mesure, de signalisation et de contrôle; appareils, instruments et équipements électroniques et/ou informatiques de sécurisation des locaux, y compris avertisseurs contre le vol, alarmes; appareils et instruments permettant l'identification, le contrôle d'accès grâce à des données biométriques; serrurerie électrique; logiciels pour la capture et le traitement des données fournies via les appareils et instruments précités; lecteurs encodeurs de cartes magnétiques; encodeurs de données; décodeurs de données; ordinateurs et périphériques d'ordinateurs utilisés en rapport avec des cartes et/ou des appareils de télécommunication; micro-ordinateurs; ordinateurs portables; ordinateurs de poche; appareils permettant le contrôle d'accès sécurisé à des réseaux informatiques et/ou de télécommunications. (1) Affaires financières, monétaires et bancaires; assurances; consultations et informations en matière financière, monétaire et bancaire; consultations et informations en matière d'assurance; services financiers, à savoir transfert électronique de fonds; compensation et rapprochement de transactions financières; mise à disposition d'une vaste gamme de services financiers et de paiement, à savoir services de cartes de crédit, émission de cartes de crédit, de cartes de paiement et lignes de crédit, traitement et transmission de factures et paiements correspondants, services de paiement de factures avec fourniture de paiement garanti, et courtage de fonds du marché monétaire, tous par le biais de réseaux de communication mondiaux; services de traitement de transactions effectuées par carte de crédit et carte à débit immédiat; remboursement de fonds pour éléments en contentieux dans le domaine des achats par paiement électronique; mise à disposition de services de protection des achats pour les produits et services achetés par des tiers par le biais de réseaux informatiques mondiaux et réseaux sans fil; services de traitement de transactions par carte de crédit; services de crédit, à savoir mise à disposition de services de comptes de crédit renouvelable; services de paiement de factures; mise à disposition de services de paiement mobile électronique pour des tiers; services de traitement de paiements et cartes de crédit; traitement de paiements par opérations de change électroniques; services de traitement de paiements, à savoir mise à disposition de services de traitement de transactions sur devises virtuelles pour des tiers, dépôt de valeurs, dépôt en coffres-forts; émission de chèques de voyage, de chèques vacances et de titres de paiement en général; financement de prêts pour des systèmes de sécurité et surveillance.
(2) Ingénierie informatique; consultation technique en matière de sécurité informatique; conception, mise au point, maintenance et mise à jour de logiciels et de bases de données; conception et développement d'ordinateurs; élaboration (conception), installation, maintenance, mise à jour ou location de logiciels; programmation pour ordinateur; consultation en matière d'ordinateurs et de logiciels; programmation pour cartes et badges à microprocesseurs; prêt et location d'ordinateurs, de périphériques d'ordinateurs, de programmes informatiques et de logiciels; conception, mise au point, maintenance et mise à jour de logiciels pour la gestion, la sécurisation de transferts de fonds; conception, développement de systèmes d'identification, d'authentification de la personne; services d'assistance technique, de conseils techniques pour la mise en oeuvre de systèmes d'identification, d'authentification de la personne; conception, mise au point et mise à jour de programmes et de logiciels d'interprétation d'empreintes digitales, palmaires, des caractéristiques de l'iris, de la veine, de la voix des caractéristiques du visage ou de la figure ou d'autres caractéristiques biométriques dans le domaine du contrôle d'accès ou d'authentification des personnes; conception, mise au point et mise à jour de cartes et badges, incluant les cartes de paiement, de télépaiement, de porte-monnaie électronique, destinées à sécuriser par code toutes transactions, notamment en ligne; services de conception et d'élaboration de monnaie, titres de paiement, documents d'accès, d'identification, cartes, badges, banderoles, étiquettes; conception, mise au point et mise à jour de lecteurs par cartes et badges; information et conseils en matière de conception et d'élaboration de monnaie, titres de paiement, documents d'accès, d'identification, cartes, badges, banderoles, étiquettes; prêt et location de cartes et badges, incluant les cartes de paiement, de télépaiement, de porte-monnaie électronique destinées à sécuriser par code toutes transactions, notamment en ligne; prêt et location de cartes et de clés d'accès à des systèmes et réseaux de télécommunications et à des systèmes et réseaux informatiques; les services précités étant consultables ou disponibles par voie télématique ou sur des réseaux de télécommunications ou informatiques; conception et élaboration de systèmes d'acquisition de données en liaison avec des documents ou imprimés conçus pour lutter contre la reproduction non autorisée, la falsification, la contrefaçon; conception, développement d'encres, de filigranes, de papiers, de logiciels, de puces électroniques destinés à l'authentification, la personnalisation, la protection contre la reproduction non autorisée, la falsification, la contrefaçon de documents, d'imprimés; conception, développement de procédés de protection contre la reproduction non autorisée, la falsification, la contrefaçon, de procédés d'authentification, de personnalisation de documents par encrage, filigranage, guillochage, marquage; services d'hébergement, d'élaboration, de conception de serveurs et de réseaux assurant le traitement et la prise en charge du système d'information d'un client; mise à disposition temporaire de logiciels en ligne non téléchargeables pour le traitement de paiements électroniques; mise à disposition temporaire de logiciels d'authentification en ligne non téléchargeables permettant de contrôler l'accès à des ordinateurs et réseaux informatiques ainsi que de contrôler les communications entre ordinateurs et réseaux informatiques; programmation informatique et développement; développement de logiciels, notamment pour le traitement de données étant collectées à l'aide d'un appareil de contrôle de la circulation; rapports, études, analyses, évaluations, recommandations, diagnostics, estimations, consultations et recherches dans les domaines scientifiques et technologiques rendus par des ingénieurs; études de projets techniques; recherche dans le domaine de la technologie du traitement de semi-conducteurs; création de bases de données; services de certification, test, analyse et évaluation de produits et de services de tiers dans le but de délivrer une certification; recherche et développement de nouveaux produits pour des tiers; services d'un studio de graphisme; expertises et études en matière de télécommunications; expertises, études, consultations et conseils techniques en matière de sécurité informatique et/ou de systèmes de gestion et/ou de sécurisation de transferts de fonds; consultation en matière de sécurité électronique; expertises, études, consultations et conseils techniques en matière de systèmes de gestion de cartes électroniques.
09 - Appareils et instruments scientifiques et électriques
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Electronic apparatus for checking the authenticity of cards, badges, passports, visas namely electronic systems certifying authorization of entry into a territory and secure papers affixed with a seal enabling entry into a territory, drivers' licenses, biometric identity or identification documents, electronic access document detectors; apparatus and instruments for authenticating payment orders; chips [integrated circuits]; computer chips; computer chips; semiconductor chips; electronic chips for manufacturing integrated circuits; semiconductors; semiconductor wafers; electronic semiconductors; magnetic or electronic cards and badges, contact or contactless, intended for use as payment, credit, debit, remote payment, loyalty or cash cards, including those with dynamic codes for securing all transactions online; cards, badges, passports, visas, namely electronic systems attesting to the authorization of entry into a territory, drivers' licenses, identity cards or electronic or biometric identification documents, all fitted with optical-effect security to combat unauthorized reproduction, forgery and counterfeiting; magnetic or electronic cards and badges intended for use as cards and badges for access, transport, single or multiple access to services and/or transport networks, subscription to transport services; electronic or magnetic cards for use as health cards, cards for access to pay-television channels, games, and/or multimedia services, or data banks and databases; biometric apparatus, instruments, terminals, readers and scanners for fingerprints, palm prints, features of the iris, veins, voices, facial or bodily features or other biometric features; integrated circuit cards; chip cards; integrated circuit cards (smart cards); smart cards [integrated circuit cards]; programmable cards; remote programmable cards; transmitter-receiver cards and badges; radio frequency cards and badges; infrared cards and badges; cards for access to computer and/or telecommunications networks; encoded cards; pre-recorded data cards, computer programs, and software; telecommunication cards; cards for the control of communication; magnetic or chip-based cards with units of credit; mobile telephone cards; electronic cards for secure access, to computer and/or telecommunications networks; electronic cards used for accessing services and/or performing operations and transactions on computer and/or telecommunications networks; computer programs; software; biometric identification and control systems; computers and computer software for biometric systems for the identification and authentication of people; software for biometric systems for the identification and authentication of persons; software for detecting persons; software for interpreting finger or palm prints, features of the iris, veins, voice, facial features or other biometric features; computer programs and software for use in connection with cards; computer programs and software recorded on cards or intended for being recorded on cards and/or telecommunications apparatus; software for providing access to electronic mail services; messaging software; software for providing access to electronic communication networks; software for providing access to the Internet and/or Internet sites; software for telecommunications, software for navigation (browsing); software for operations and transactions by card, namely, chip-based cards; integrated circuits; electronic chips; electronic signature support software, encryption software; encryption keys; electronic apparatus for checking the authenticity of cards; computer programs and software for storage, retrieval and secure transmission of information or data; computer programs and software for identifying and authenticating persons and/or electronic signatures for accessing networks, payment, operations and transactions, including online e-commerce; traceability software for the management and securing of documents and/or printed matter; computer servers, in particular for the downloading, distribution and management of applications on cards, including chip cards; computer programs and software for communication between chip-based cards and chip card readers and/or computer terminals; computer programs and software for transmitting, displaying and storing identification and/or operations and transactions related information or data, in particular online; computer software for processing electronic payments and transferring funds to and from third parties; authentication software for controlling access to computers and computer networks and controlling communication between computers and computer networks; software and databases for the issue and/or management of cards, in particular chip-based cards, and for the monitoring of the management of such cards; apparatus for the storage, conversion, processing and transmission of data, information and signals; scientific, photographic, cinematographic, optical, measuring, signaling and checking apparatus and instruments; electronic and/or computer apparatus, instruments and equipment for securing premises, including anti-theft warning apparatus, alarms; apparatus and instruments for the identification, access control using biometric data; electric locks; software for capturing and processing data provided via the aforesaid apparatus and instruments; magnetic card encoding readers; data encoders; data decoders; computers and computer peripherals for use in connection with cards and/or telecommunications apparatus; microcomputers; laptop computers; hand-held computers; apparatus for controlling secure access to computer and/or telecommunications networks Banking, financial and monetary affairs; insurance services; consultancy and information with respect to financial, money and banking; consultancy and information relating to insurance underwriting; financial services, namely the electronic transfer of funds; clearing and reconciling of financial transactions; providing a wide range of payment and financial services, namely credit card services, issuance of credit cards, payment cards and credit lines, processing and transmission of bills and payments thereof, bill payment services with guaranteed provision of payment, and brokerage of money market funds, all via global communication networks; processing of transactions carried out by credit card and immediate debit card; reimbursement of funds for disputed items in the field of purchases via electronic payment; provision of purchase protection for goods and services purchased by others via global computer and wireless networks; processing of credit card transactions; credit services, namely, provision of revolving credit account services; bill payment services; provision of mobile electronic payment services for others; credit card and payment processing services; processing of payments through electronic foreign exchange operations; payment processing services, namely provision of virtual currency transaction processing services for third parties, deposits of valuables, safe deposit services; issuing of travelers' checks, vacation checks and payment orders in general; financing of loans for security and surveillance systems Computer engineering; technical consultation with respect to computer security; design, development, maintenance and updating of software and databases; design and development of computers; development (design), installation, maintenance, updating or rental of software; computer programming; computer and software consultancy; programming for microprocessor cards and badges; lending and rental of computers, computer peripheral devices, computer programs and software; design, development, maintenance and updating of software for managing, securing and transferring cash; design, development of systems for the identification, authentication of the person; technical assistance, technical advice for the implementation of systems of identification and the authentication of people; design, development and updating of programs and computer software for interpreting fingerprints, palm prints, features of the iris, veins, the voice, facial features or other biometric features in the field of access control and the authentication of persons; design, development and updating of cards and badges, including payment cards, remote payment, electronic cash, intended for securing all transactions by code, particularly online; design and development of currency, payment documents, access passes, identification documents, cards, badges, banners and labels; design, development and updating of cards and card readers; information and advice relating to design and development of currency, payment documents, access passes, identification documents, cards, badges, banners and labels; lending and leasing of cards and badges, including payment cards, remote payment, electronic cash intended for securing all transactions by code, particularly online; loan and rental of cards and keys for access to telecommunication systems and networks and computer systems and networks; the aforesaid services available for consultation or made available by means of data transmission or on telecommunication or computer networks; Design and development of data acquisition systems in connection with documents or printed matter to combat unauthorized reproduction, falsification and counterfeiting; design, development of ink, watermarks, paper, and software products, electronic chips for authentication, customization, protection against unauthorized reproduction, forgery, counterfeiting of documents, printed matter; design and development of processes for protection against unauthorized reproduction, falsification, counterfeiting, processes for authentication, customization of documents by inking, watermarking, guilloche ornamentation, marking; hosting, development and design of networks and servers for the processing and management of a customer's computer system; provision of temporary use of non-downloadable online software for processing electronic payments; provision of temporary use of non-downloadable online authentication software for controlling access to computers and computer networks as well as for controlling communication between computers and computer networks; computer programming and development; development of computer software, especially for processing data collected using traffic control apparatus; reports, studies, analyses, evaluations, estimates, diagnostics, recommendations, consultancy and research in scientific and technological fields provided by engineers; technical project studies; research in the field of semi-conductor processing technology; creation of databases; certification, testing, analysis and evaluation of products and services of others with the aim of issuing certification; research and development of new products for third parties; services of a graphics studio; expert reports and studies relating to telecommunications; expert reports, studies, technical consultations and advice with respect to computer security and/or management and/or securing systems for fund transfers; electronic security consultancy; expert reports, studies, technical consulting and advice, in the field of electronic card management systems
The invention relates to a process for manufacturing a security device (1), comprising: - a step of providing a transparent window (2) comprising a front face and a rear face, and a microlens array formed on the front face; - a step of defining an overall image comprising at least two interleaved rasters, a first of the two rasters being configured to represent a first image visible to an observer at a first observation angle through the array, and a second of the two rasters being configured to represent a second image visible to the observer at a second observation angle through the array; - a step of arranging the overall image with respect to the array; and - a step of engraving the overall image in the window through the rear face. The invention also relates to a security device obtained by such a process and to an identity document comprising such a device.
The invention relates to a device for testing "high-power" integrated circuits (1001) on a semiconductor wafer (1000) during performance and failure testing, using testers (3004) that are not designed to perform the tests on this type of integrated circuit. It comprises probes (3002a) for establishing a temporary electrical connection with the connectors (2000) of the integrated circuits (1001) to be tested, a buffer circuit (4001a) for sharing a power supply resource (SC1) of a tester (3004) with the power supply inputs (VCC) of the integrated circuits (1001) to be tested, and a group (4002) of multiplexer circuits (4002a-d) each having, a first input connected to a shared high-voltage resource (HVC1) of the tester (3004), a second input connected to a distinct data input/output electronic resource (DC1-4) in communication with the tester (3004), and an output in communication with a test input/output (SPT) of an integrated circuit (1001a-d) to be tested.
The invention relates to a security document comprising at least a paper page (12) and a plastic data page (14), the paper page (12) comprising: a first raster (26) printed in a first colour space comprising a series of parallel strips (26a, 26b, 26c), and a second raster (30), interlaced with the first raster (26), comprising a series of strips (30a) printed in a second colour space distinct from the first colour space, the plastic data page (14) comprising a lenticular array (18). The invention is characterized in that the strips (26a, 26b, 26c, 30a) of the first raster and of the second raster are each observable through the lenticular array (18) to form a first image (23) and a second image (24), respectively, the series of strips (30a) of the second raster (30) being inserted between the series of strips (26a, 26b, 26c) of the first raster (26) so as to be indistinguishable to the naked eye, to form an overall image (22) visible to the naked eye in the first colour space.
The invention relates to a contactless chip card, comprising - a body (101), - a radio-frequency antenna (102) integrated into the body (101) and configured to generate an AC electrical signal, - at least one active device (106) integrated into the body (101) and configured to operate under DC. The chip card comprises a centre-tapped rectifier circuit comprising the radio-frequency antenna (102), the active device (106) and an electronic circuit (107) configured to convert the AC electrical signal generated by said radio-frequency antenna (102) into a DC electrical signal for powering the at least one active device (106).
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
The invention relates to a microcircuit board comprising a stack of layers in the following order: - a first protective layer; - a first core layer; - a support layer suitable for supporting a microcircuit and/or a microcircuit antenna; - a second core layer; - a second protective layer; wherein each of the first and second core layers and the inlay layer comprise: - between 40% and 60%, preferably between 40% and 55%, by weight of polylactic acid (PLA); - between 35% and 55%, preferably between 35% and 50%, by weight of poly(butyl succinate) (PBS); - between 2% and 10% of mineral fillers based on calcium carbonate, on hydrated alkali and/or alkaline earth silicates, and/or on hydrated alkali and/or alkaline earth aluminosilicates.
B42D 25/351 - Pièces translucides ou en partie translucides, p. ex. fenêtres
B42D 25/36 - Caractéristiques d’identification ou de sécurité, p. ex. pour empêcher la falsification comprenant des matériaux spéciaux
B42D 25/455 - Fabrication associant plusieurs couches en utilisant la chaleur
B42D 25/46 - Fabrication associant plusieurs couches en utilisant la pression
B42D 25/47 - Fabrication associant plusieurs couches en utilisant des substances chimiques ou adhésives en utilisant des substances adhésives
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
18.
METHOD OF MANUFACTURING A SMARTCARD INCLUDING A METAL LAYER HAVING A RECESSED PORTION
A method of manufacturing a smartcard comprising a metal layer, the method comprising providing a metal layer (100) having a surface including a recessed portion (101,101') and laminating the metal layer with an outer layer (120,120') arranged above the recessed portion and a resin layer (110,110') arranged between the outer layer and the metal layer and within the recessed portion.
The present invention relates to the management of the execution of resource-intensive operations within a secure element. The operation is formed of a plurality of elementary operations. In order to prevent the operation from monopolizing resources over a long period while high responsiveness of the secure element is sought, in particular in 5G-related technologies, provision is made, upon receipt of an APDU command from a host equipment, to trigger a time counter in order to determine an actual processing duration to process the APDU command. If this duration proves to be less than a predefined duration allocated to the APDU command, one or more of said elementary operations may be executed during the remaining time of said allocated duration. Upon expiry of this allocated duration, the secure element sends a response to the APDU command. The operation may thus be executed gradually without preventing the secure element from being highly responsive to received APDU commands.
A method of manufacturing a smartcard comprising a metal layer, the method comprising providing a metal layer having a surface including a recessed portion and laminating the metal layer with an outer layer arranged above the recessed portion and a resin layer arranged between the outer layer and the metal layer and within the recessed portion.
B32B 38/10 - Enlèvement de couches ou de parties de couches, mécaniquement ou chimiquement
B32B 3/30 - Produits stratifiés comprenant une couche ayant des discontinuités ou des rugosités externes ou internes, ou une couche de forme non planeProduits stratifiés comprenant une couche ayant des particularités au niveau de sa forme caractérisés par une couche continue dont le périmètre de la section droite a une allure particulièreProduits stratifiés comprenant une couche ayant des discontinuités ou des rugosités externes ou internes, ou une couche de forme non planeProduits stratifiés comprenant une couche ayant des particularités au niveau de sa forme caractérisés par une couche comportant des cavités ou des vides internes caractérisés par une couche comportant des retraits ou des saillies, p. ex. des gorges, des nervures
B32B 7/12 - Liaison entre couches utilisant des adhésifs interposés ou des matériaux interposés ayant des propriétés adhésives
B32B 15/04 - Produits stratifiés composés essentiellement de métal comprenant un métal comme seul composant ou comme composant principal d'une couche adjacente à une autre couche d'une substance spécifique
A chip card having a card body having a metal layer that is at least partially covered by a coating that is more conductive than the metal layer, an RF chip, and a first RF antenna that is placed in a cut-out zone and connected to the chip. The metal layer includes at least one RF antenna portion that is electrically insulated from the metal layer and from the first RF antenna and that is configured to collect an image current induced by first eddy currents flowing at least over the coating of the metal layer and to allow coupling to the first antenna.
A method for handling the execution of an applet function by an electronic device, including receiving a request to execute the function, checking a type associated with the function, if the type of the function is a given type, determining information relating to the arguments that are handled and/or to the data that are delivered by the function, observing the progress of the function and, if the function handles data inconsistently with the information relating to the arguments that are handled and/or to the data that are delivered by the function, performing security handling.
G06F 21/54 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
23.
METHODS FOR SETTING UP A SECURE CONNECTION BETWEEN A VEHICLE AND A USER TERMINAL AND ASSOCIATED DEVICES
The invention relates to a method for initializing a secure connection, comprising:
reception, by a control unit of a vehicle, of a first secret transmitted beforehand by a system to a device; and
set-up of a secure communication channel between the control unit of the vehicle and a user terminal, provided that the first secret and a second secret stored by the user terminal satisfy a predefined condition,
The invention relates to a method for initializing a secure connection, comprising:
reception, by a control unit of a vehicle, of a first secret transmitted beforehand by a system to a device; and
set-up of a secure communication channel between the control unit of the vehicle and a user terminal, provided that the first secret and a second secret stored by the user terminal satisfy a predefined condition,
wherein the control unit of the vehicle receives the first secret from a device via a wireless communication requiring proximity between the device and the control unit, after the device has received the first secret from the system.
H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons
H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
24.
METHOD FOR REGISTERING DIGITAL KEYS OF A VEHICLE IN A VIRTUAL WALLET, AND ASSOCIATED DEVICES
The present invention relates to a method comprising the following steps:
a system receives a first identifier and a second identifier transmitted by a user terminal, transmitted beforehand to the user terminal by the device via wireless communication requiring proximity between the user terminal and the device,
the system checks for the existence of a match between two stored reference identifiers corresponding respectively to the first identifier and to the second identifier,
provided that said match exists, the system transmits:
a pairing password to the user terminal,
a checker to a control unit of the vehicle, the checker being configured to authorize setup of a secure communication channel between the user terminal and the control unit of the vehicle.
A vehicular device includes, as an operation mode, an owner registration mode that accepts registration of owner information and an owner registration prohibition mode that does not accept registration of owner information. The vehicular device normally operates in the owner registration prohibition mode. The vehicle device switches to the owner registration mode only when a registration start signal indicating that the registrant is the owner is input from the server or the dedicated device.
A server issues a service key for using a designated vehicle and a plurality of one-time authentication keys based on a request from the mobile terminal, and distributes the one-time authentication key to the mobile terminal. The one-time authentication key is a disposable authentication key generated based on the service key, and has an expiration date. The one-time authentication key is consumed when the vehicular device authenticates the mobile terminal as a communication partner. The mobile terminal replaces the one-time authentication key stored in the mobile terminal at any time.
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
An owner terminal is configured so that a deletion target key, which is a guest key to be deleted, can be selected via a guest list screen. When the key to be deleted is selected, the owner terminal sends a signal requesting the deletion of the guest key to the server. The server deletes the key data from the corresponding terminal by transmitting a deletion instruction command to the mobile terminal corresponding to the key to be deleted. Further, the server transmits a data set for deleting the key to be deleted from an authentication ECU to each of the corresponding terminal and the owner terminal. When the data set is transferred from the corresponding terminal or the owner terminal to the authentication ECU by short-range communication, the key to be deleted is also deleted from the authentication ECU.
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
A chip card including a card body including a metal layer, an RF chip, and a first RF antenna placed in a cut-out zone and connected to the chip. The metal layer has two regions, the first region completely containing the cut-out zone. A first slit connects the cut-out zone to an edge of the first region, a second slit opens onto an edge of the layer or into the cut-out zone and ends in the second region. A second RF antenna allows coupling to the first antenna. The chip card includes at least one turn facing the first slit and at least one turn facing the second slit.
A metal smart card, having an inlay layer, the inlay layer including a metal card body, the metal card body defining at least one cavity in the metal card body, the at least one cavity having a continuous surface defined by an inner surface of the metal card body, a metal plug, the metal plug being housed inside the at least one cavity, an electronic component, the electronic component being housed inside the at least one cavity, and a polymer layer disposed on an outer surface of the inlay layer, the polymer layer being in contact with an outer surface of the metal plug.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
30.
Smart card with metal inlay encapsulating high-density metal plug
A metal smart card, having an inlay layer, the inlay layer including a metal card body, the metal card body defining at least one cavity in the metal card body, the at least one cavity having a continuous surface defined by an inner surface of the metal card body, a metal plug, the metal plug being housed inside the at least one cavity, an electronic component, the electronic component being housed inside the at least one cavity, and a polymer layer disposed on an outer surface of the inlay layer, the polymer layer being in contact with an outer surface of the metal plug.
The invention relates to a mutual authentication method implemented by an electronic device, the method comprising: i) an authentication phase (P1) for authenticating a system (20), comprising: - determining (E300) and sending (E310) an authentication challenge, - receiving (E350) a first authentication result, and - authenticating (E360) a system by applying a cryptographic signature verification function to the first authentication result; and ii) an authentication phase (P2) for authenticating the electronic device (10), comprising: - receiving (E520) an item of authentication data, and - calculating (E530) and sending (E540) a second authentication result, the calculation of the second authentication result using a shared secret obtained by applying a de-encapsulation function of a key encapsulation mechanism to a private key of the electronic device and to the item of authentication data. The invention also relates to an associated mutual authentication method, implemented by the system.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The invention relates to a security document comprising: a basic pattern (101) of a graphic code comprising graphic code elements (101A) that each comprise one or more subpixels (101AR, 101AV, 101AB), each subpixel being capable of producing a diffractive effect of a colour specific to the subpixel when the subpixel is observed from a given observation position (POS) and for a given illumination, a positioning mark (102) for positioning the graphic code comprising a region capable of producing a diffractive effect of a colour specific to the region when it is observed from the same given position (POS).
B42D 25/41 - Marquage par rayonnement électromagnétique
B42D 25/435 - Marquage par enlèvement de matière par rayonnement électromagnétique, p. ex. laser
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
A chipcard having a card body formed by at least one dielectric layer and one metal layer, the metal layer having a cavity and an outline, the metal layer further having a slit, the card further having an antenna extending in the cavity. The card further includes at least one metal label at least partially covering the cavity and the antenna, the label being fixed onto one of the faces of the card, the metal label having a metal layer comprising a pattern having a first part formed by first etched metal lines delimiting at least one zone that is at least partially of metal, and a second part made of second etched metal lines forming only open loops.
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
34.
LAMINATED CARD COMPRISING A THERMOCHROMIC PATTERN AND METHOD FOR MANUFACTURING SUCH A CARD
The invention relates to a laminated card and a method for manufacturing such a card. The card comprises, in order: a thermoplastics backing layer (100); an adhesive layer (101); a primer layer (102); a thermochromic pattern (103) which is printed using a thermochromic ink; and a plastics protective layer (104). The primer layer is suitable for the thermochromic ink, enabling good adhesion of the thermochromic pattern to the lower layers, i.e. to the backing layer via the adhesive layer. The adhesive layer (101) and the primer layer (102) are both water-based or both polymerised under UV radiation. The thermochromic ink comprises a liquid crystal compound.
A method for manufacturing a contactless chip card that makes provision to obtain a voltage-rectifying-circuit-forming printed-circuit module incorporating one or more SMDs forming a full-wave bridge rectifier, to place this module in a punch provided in a conventional chip-card substrate, then, to form an NFC wire radiofrequency antenna by embedding a conductive wire in the bulk of the substrate, the ends of which are soldered to input terminals of the module. Other electronic modules operating on DC currents are then easily integrated into the card, electrical links with the rectifier module also being produced by embedding an electrical wire in the bulk of the substrate. The disclosure advantageously allows the combination of low cost embedding of a conductive wire by ultrasound to form a radiofrequency antenna and the flexibility of use of SMDs.
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
H02M 7/06 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continu sans possibilité de réversibilité par convertisseurs statiques utilisant des tubes à décharge sans électrode de commande ou des dispositifs à semi-conducteurs sans éléctrode de commande
36.
Inlay for electronic document, method for producing an electronic document comprising such an inlay, and electronic document obtained
Inlay (40) comprising a substrate (41) and a first zigzag portion (42) formed of a metal wire (421) embedded in an upper face (43) of the substrate (41), the first zigzag portion (42) comprising, alternately, rectilinear segments (422) and bends (423), at least one of the rectilinear segments (422) of the first zigzag portion (42) being disposed, at least in part, in a zone (45) of the upper face (43) of the substrate (41) configured to form a spotface of a cavity of an electronic document, and the inlay (40) comprising a connection wire (47) configured to join together at least the rectilinear segments (422) of the first zigzag portion (42). Method for producing an electronic document (1) comprising such an inlay (40), and electronic document (1).
The invention proposes a novel method for managing service profiles of a secure element, the managing method being implemented by a centralized profile management device and comprising: receiving profile data corresponding to one and the same service from a plurality of processing devices; storing in memory profile data from among the received profile data, associated with said service; detecting an event triggering an update of a service profile of the secure element for said service; and, upon detection of said event, sending the most recent profile datum from among the stored profile data associated with said service to the host terminal.
H04L 67/51 - Découverte ou gestion de ceux-ci, p. ex. protocole de localisation de service [SLP] ou services du Web
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
38.
METHOD FOR FABRICATING AN ASSEMBLY FOR A CARD AND A CARD COMPRISING A METALLIZED FILM, A MICROCIRCUIT CARD AND AN ASSEMBLY FOR SAID CARD
The invention relates to a method for fabricating a metallized assembly for a microcircuit card (110) exhibiting a metallized effect, the assembly forming an internal layer of this card. The method is characterized in that it comprises the following steps: addition of a support layer (116a) formed by a plastic material sensitive to heat exhibiting a first shrinkage ratio, the support layer (116a) having, on the surface, at least the dimensions of a microcircuit card (110), addition of a metallized film (118) held on a first non-adhesive bearing liner (120a), the first bearing liner (120a) exhibiting a shrinkage ratio less than that of the support layer (116a), transfer of the metallized film (118) onto the support layer (116a) by the application of heat and pressure, removal of the first bearing liner (120a). The invention relates also to a method for fabricating a card, and a card obtained by this method.
B32B 37/00 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons
B32B 7/06 - Liaison entre couches permettant une séparation sans difficultés
B32B 15/08 - Produits stratifiés composés essentiellement de métal comprenant un métal comme seul composant ou comme composant principal d'une couche adjacente à une autre couche d'une substance spécifique de résine synthétique
B32B 37/06 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par le procédé de chauffage
39.
SECURITY DOCUMENT THAT CAN BE USED TO VIEW AN IMAGE COMPRISING A PLASMONIC FILM WITH PERFORATIONS
The invention relates to a security document that can be used to view an image comprising a plasmonic film (102) having a first face (FA) visible within the document, which first face has a plasmonic effect with a nanotextured surface (103), and a pattern comprising perforations (104) in the plasmonic film, the pattern defining the image that is seen when the security document is illuminated.
A method for cryptographic signature of a datum comprises determining: a signature point equal to the addition of elements equal to a derived first point and of number equal to a first scalar; a second scalar by subtracting, from the product of the first scalar and of a selected scalar, the product of a third and of a fourth scalar; another signature point equal to the addition of elements equal to a selected point and of number equal to the second scalar, and of elements equal to a derived second point and of number equal to the fourth scalar; and a signature portion based on a private key, on the first scalar, on a coordinate of the signature point and on the datum. The derived first and second point are respectively equal to the addition of elements equal to a generator point and of number equal to a fifth and to the third scalar.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
41.
Signature-free optimized post-quantum authentication scheme, methods and devices
A post-quantum strong authentication scheme uses a reference PIN code stored in the memory of a personal object 1. A server generates a secret ss and a corresponding cipher ct using a key encapsulation mechanism, KEM, and a public key pk of the user, and then generates a cryptographic key ss' with a one-way function, OWF, applied to the secret. An access terminal 2 receives ss' and ct, and then obtains a PIN entered by the user, encrypts the PIN with ss′, and finally transmits the encrypted PIN cPIN and ct to the personal object 1. The personal object obtains ss through KEM decapsulation of ct and, with its private key sk, generates ss' with OWF, and uses it to decrypt cPIN. Verification thereof validates a first authentication factor. The personal object generates and then sends a confirmation Know(ss) of the secret to the server, validating a second authentication factor.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
42.
SECURITY DEVICE WHICH CAN BE USED TO GENERATE AN ENLARGED PROJECTED IMAGE USING MICROLENSES AND A PERFORATED METAL LAYER
The invention relates to a security device which can be used to generate an enlarged projected image on a surface spaced apart from the device when the device has a first face placed in front of the spaced surface and when a second face of the document opposite the first face is illuminated, the document comprising: a first layer (101) comprising an array of microlenses (102), and a second metal layer (103) arranged at a distance from the first layer that is greater than the focal length of each microlens, wherein the second metal layer includes a plurality of patterns (104), formed by one or more perforations in the metal layer (103), each pattern of the plurality of patterns being associated with a microlens so that when the second face of the document is illuminated, the enlarged projected image is formed on the spaced surface by the combination of the projections of each pattern.
A smart card including a card body having a metal layer including a recess area which opens onto a peripheral edge of the metal layer, an RF chip, a first RF antenna connected to the RF chip and disposed in or facing the recess area, and a second RF antenna electrically insulated from the metal layer and from the first RF antenna. The second RF antenna includes a first antenna part extending facing the metal layer to collect an image current induced by first eddy currents flowing in the metal layer, and a second antenna part electrically connected to the first antenna part and extending facing the recess area to allow a magnetic coupling between the first RF antenna and the second RF antenna.
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
H01L 21/48 - Fabrication ou traitement de parties, p. ex. de conteneurs, avant l'assemblage des dispositifs, en utilisant des procédés non couverts par l'un uniquement des groupes ou
H01L 23/13 - Supports, p. ex. substrats isolants non amovibles caractérisés par leur forme
H01L 23/498 - Connexions électriques sur des substrats isolants
A card manufacturing system includes a locating device and a separation device. A laminate sheet comprising a plurality of cards is received by the locating device and is imaged using first and second imaging modalities. The first imaging modality identifies a location of each of the plurality of information carrying cards within the laminate sheet and the second imaging modality images at least one graphic formed on a surface of the laminate sheet. A position of the at least one graphic with respect to at least one information carrying card is determined and the plurality of cards are removed from the laminate sheet using information corresponding to the location of each of the plurality of information carrying cards when the position of the at least one graphic with respect to the information carrying cards is within a predetermined range.
B42D 25/455 - Fabrication associant plusieurs couches en utilisant la chaleur
B42D 25/46 - Fabrication associant plusieurs couches en utilisant la pression
B42D 25/485 - Commande du procédé de fabrication par des moyens de traitement électroniques
G05B 19/4155 - Commande numérique [CN], c.-à-d. machines fonctionnant automatiquement, en particulier machines-outils, p. ex. dans un milieu de fabrication industriel, afin d'effectuer un positionnement, un mouvement ou des actions coordonnées au moyen de données d'un programme sous forme numérique caractérisée par le déroulement du programme, c.-à-d. le déroulement d'un programme de pièce ou le déroulement d'une fonction machine, p. ex. choix d'un programme
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
45.
METHOD FOR MANUFACTURING A PRELAM FOR AN ELECTRONIC DOCUMENT, METHOD FOR MANUFACTURING THE ELECTRONIC DOCUMENT, PRELAM THUS OBTAINED, AND ELECTRONIC DOCUMENT COMPRISING SUCH PRELAM
The invention relates to a method for manufacturing a prelam for an electronic document, the prelam comprising a hidden magnetic strip. The method comprising a step of applying at least one concealing layer to hide the magnetic strip, thus forming the prelam comprising two areas on one face, a top area having the at least one concealing layer and the magnetic strip under the at least one concealing layer, and a bottom area without the at least one concealing layer The invention also relates to a method for manufacturing an electronic document, comprising such a prelam. The invention also relates to the prelam thus obtained and to the electronic document comprising such prelam.
The disclosure provides a cross-linkable polymer composition, a core layer for an information carrying card comprising such cross-linked composition, resulting information carrying card, and methods of making the same. An information carrying card includes a body defining a first cavity and a second cavity. The first cavity has a first area and the second cavity has a second area. The first cavity is continuous with the second cavity and the second area is less than the first area. A circuit element is disposed within the first cavity.
C08L 33/14 - Homopolymères ou copolymères des esters d'esters contenant des atomes d'halogène, d'azote, de soufre ou d'oxygène en plus de l'oxygène du radical carboxyle
H05K 1/03 - Emploi de matériaux pour réaliser le substrat
B32B 3/08 - Caractérisés par des caractéristiques de forme en des endroits déterminés, p. ex. au voisinage des bords caractérisés par des éléments ajoutés à des endroits déterminés
B32B 27/20 - Produits stratifiés composés essentiellement de résine synthétique caractérisée par l'emploi d'additifs particuliers utilisant des charges, des pigments, des agents thixotropiques
H05K 1/18 - Circuits imprimés associés structurellement à des composants électriques non imprimés
C08L 75/06 - Polyuréthanes à partir des polyesters
C08L 75/14 - Polyuréthanes comportant des liaisons non saturées carbone-carbone
C08L 75/16 - Polyuréthanes comportant des liaisons non saturées carbone-carbone comportant des liaisons non saturées carbone-carbone terminales
B32B 27/08 - Produits stratifiés composés essentiellement de résine synthétique comme seul composant ou composant principal d'une couche adjacente à une autre couche d'une substance spécifique d'une résine synthétique d'une sorte différente
B32B 3/26 - Produits stratifiés comprenant une couche ayant des discontinuités ou des rugosités externes ou internes, ou une couche de forme non planeProduits stratifiés comprenant une couche ayant des particularités au niveau de sa forme caractérisés par une couche continue dont le périmètre de la section droite a une allure particulièreProduits stratifiés comprenant une couche ayant des discontinuités ou des rugosités externes ou internes, ou une couche de forme non planeProduits stratifiés comprenant une couche ayant des particularités au niveau de sa forme caractérisés par une couche comportant des cavités ou des vides internes
C08L 63/10 - Résines époxy modifiées par des composés non saturés
H05K 1/16 - Circuits imprimés comprenant des composants électriques imprimés incorporés, p. ex. une résistance, un condensateur, une inductance imprimés
B32B 3/18 - Produits stratifiés comprenant une couche ayant des discontinuités ou des rugosités externes ou internes, ou une couche de forme non planeProduits stratifiés comprenant une couche ayant des particularités au niveau de sa forme caractérisés par une couche discontinue, c.-à-d. soit continue et percée de trous, soit réellement constituée d'éléments individuels caractérisés par une couche interne formée d'éléments individuels
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
B32B 37/06 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par le procédé de chauffage
B32B 37/08 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par le procédé de refroidissement
B32B 37/10 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par la technique de pressage, p. ex. faisant usage de l'action directe du vide ou d'un fluide sous pression
C08L 27/06 - Homopolymères ou copolymères du chlorure de vinyle
47.
VEHICLE-USE DIGITAL KEY SYSTEM, VEHICLE-USE DIGITAL KEY MANAGEMENT METHOD, VEHICLE-USE DEVICE, AND MOBILE TERMINAL
This vehicle-use device comprises, as operation modes: an owner registration acceptance mode for accepting the registration of owner information; and an owner registration prohibition mode for not accepting the registration of the owner information. The vehicle-use device normally operates in the owner registration prohibition mode. The vehicle-use device shifts into the owner registration acceptance mode only if a registration start signal indicating that a registrant is the owner has been inputted from a server or a dedicated device.
G06F 21/44 - Authentification de programme ou de dispositif
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
In the present invention, a server, on the basis of a request from the portable terminal, issues a service key for using a designated vehicle and a plurality of one-time authentication keys, and transmits the service key and the authentication keys to the portable terminal. The one-time authentication keys are throwaway authentication keys generated on the basis of the service key, and have a set validity period. The one-time authentication keys are used up when the vehicle device authenticates the portable terminal as a communication partner. The portable terminal replaces the one-time authentication key held by the portable terminal as necessary.
G06F 21/44 - Authentification de programme ou de dispositif
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
49.
DIGITAL KEY SYSTEM FOR VEHICLES, METHOD FOR MANAGING DIGITAL KEY FOR VEHICLES, DEVICE FOR VEHICLES, AND MOBILE TERMINAL
In the present invention, an owner terminal is configured such that a key subject to deletion, which is a guest key that is subject to deletion, can be selected via a guest list screen. Upon selection of the key subject to deletion, the owner terminal sends to a server (3) a signal requesting deletion of the guest key. The server (3) sends a deletion instruction command to a mobile terminal (1) corresponding to the key subject to deletion, so as to delete key data from that terminal. The server (3) sends, to the terminal and the owner terminal, a data set for deleting the key subject to deletion from an authentication ECU (4). The data set is forwarded from the terminal or the owner terminal to the authentication ECU (4) via short-range communication such that the key subject to deletion is also deleted from the authentication ECU (4).
G06F 21/44 - Authentification de programme ou de dispositif
B60R 25/24 - Moyens pour enclencher ou arrêter le système antivol par des éléments d’identification électroniques comportant un code non mémorisé par l’utilisateur
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
50.
Methods and terminal for updating converted applet file, and Java Card device
A method implemented by a Java Card device for updating a CAP file including at least one existing component on the Java Card device. The method includes: receiving from a terminal one or multiple first commands including an update file for updating the CAP file; determining at least one element type or location of at least one existing first element of the CAP file using type information or first location information included in the update file; searching the CAP file on the Java Card device for the at least one existing first element using the at least one determined element type or location; and if the at least one existing first element is found, replacing each of the at least one existing first element by one of at least one new first element included in the update file.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
51.
IMPROVED EXECUTION OF AN OPERATION IN A SECURE ELEMENT
The present invention relates to managing the execution of resource-intensive operations within a secure element. The operation is formed of a plurality of basic operations. In order to prevent the operation from monopolising resources over a long period while high responsiveness of the secure element is being sought, in particular in 5G-related technologies, upon receipt of an APDU command originating from a host device, a timer is triggered in order to determine an actual processing duration of the APDU command. If this duration proves shorter than a predefined duration assigned to the APDU command, one or more of said basic operations can be executed during the remaining time of said assigned duration. When this assigned duration expires, the secure element sends a response to the APDU command. The operation can thus be executed gradually without preventing the secure element from being highly responsive to APDU commands received.
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method carried out by a smart card including a fingerprint sensor, the method including an authentication phase including: acquiring a sequence of object prints from objects detected over time by the fingerprint sensor; comparing the sequence of object prints with reference data defining a reference sequence of object prints according to at least two different print types; and determining that the authentication phase is successful if the sequence of object prints coincides with the reference data. During a digital enrollment phase, the smart card generates, from at least one fingerprint, called enrollment fingerprint, digital enrollment data; and records these digital enrollment data so as to allow subsequent digital authentication from said digital enrollment data.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
53.
METHOD FOR PERSONALISING A SECURITY DEVICE, PERSONALISED SECURITY DEVICE, IDENTITY DOCUMENT COMPRISING SUCH A DEVICE, AND METHOD FOR AUTHENTICATING SUCH A DEVICE
The invention relates to a method for personalising a security device comprising at least one uniqueness parameter (8) in a predetermined geometric object space (E), the method comprising the steps of: - identifying at least one uniqueness parameter (8) of the security device; - determining a location of the at least one uniqueness parameter (8) in the geometric object space (E) of the security device; - generating a location of at least one micropattern (9) in an image geometric space (E') of the security device by means of a mathematical function, based on the location of the at least one uniqueness parameter (8), the geometric object space (E) being determined such that the mathematical function is injective on said space; and - marking the at least one micropattern (9) at the location generated by the mathematical function in the security device.
A method for personalizing embedded secure elements, eSE, allows for simplified manufacturing before being integrated into host devices. An eSE implements services executed by an embedded operating system, OS, whereupon it is loaded into the eSE. The non-personalized eSE comprises an OS loader and a master cryptographic key common to a plurality of secure elements. It can therefore be produced in large numbers. The OS loader obtains an operating system package from a server and installs it. In response to the installation, the OS loader generates a derivation cryptographic key by diversifying the master cryptographic key, and then the OS generates personalized data by deriving pre-personalization data with the derivation key. The eSE, deployed in the field in a simple non-personalized state, is fully personalized without exchanging secret personalized data.
A method for producing an electronic document including a concealed magnetic strip, comprising a step of providing a surface of an electronic document body, a step of applying of a magnetic strip to at least part of the surface of the electronic document body, a visible surface, formed by the surface of the body covered at least in part by the magnetic strip, having a Delta E contrast equal to or less than 15, and a step of applying a decor that covers the surface of the body over the magnetic strip, the decor having a thickness of at most 10 μm and having an opacity ratio at wavelengths in the visible domain of at least 70%; and a corresponding electronic document.
The disclosure relates to an enrolment method carried out by a smart card using an internal or external electrical power supply, comprising: determining an applied mode among a first and second mode in which the electrical power supply is respectively below and above a predefined threshold; obtaining of N fingerprints in the form of image pixels, N being an integer greater than or equal to 2; extracting digital data representative of characteristic points of the fingerprints by a reading of the pixels at a predetermined resolution level; and generating a fingerprint template by aggregation of the digital data, the enrolment further comprising: determining based on the applied mode of at least one among the number N and the resolution level, so that the fingerprint template has a higher definition in the second mode than in the first mode.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06V 40/50 - Traitement de données biométriques ou leur maintenance
Method for handling the execution of an applet function by an electronic device, comprising: - receiving (RX_EXEC) a request to execute the function, - checking (VERIF_TYPE) a type associated with the function, - if the type of the function is a given type, determining (DET_INFO) information relating to the arguments that are handled and/or to the data that are delivered by the function, - observing (OBS) the progress of the function and, if the function handles data inconsistently with the information relating to the arguments that are handled and/or to the data that are delivered by the function, performing security handling (T_SEC). The invention also relates to the loading of an applet.
G06F 21/77 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les cartes à puce intelligentes
58.
FORMATION OF A 3D IMAGE FROM A LENTICULAR STRUCTURE
The invention relates to the formation of a 3D image from a lenticular structure (15) which comprises: a support layer (40) including an arrangement (30) of coloured sub-pixels (32); and a lenticular array (20) comprising convergent lenses (22) opposite the sub-pixels. The invention also relates to a method which comprises: visually inspecting the lenticular structure, during which sub-pixels which can be viewed through the lenses (22) are detected for a plurality of viewing directions; determining, from the colour of the sub-pixels detected for each viewing direction, grey levels (70) in order to reveal M images which can be viewed through the lenticular array in the M viewing directions, respectively; and customising the arrangement (30) of sub-pixels, during which the grey levels (70) are etched opposite the sub-pixels (32) in the support layer (40) by focusing laser radiation through the lenses.
The invention proposes a novel type of infective countermeasure against fault injection attacks. Instead of determining the injected error before amplifying it, the novel countermeasure applies the same diffusion function to two intermediate ciphers obtained by executing a cryptographic operation on an input. The error is therefore amplified within the same intermediate ciphers, referred to as infective ciphers after diffusion. It is then possible to use diffusion functions which do not map the cipher 0 as an output equal to 0. A cipher recomposed from bits of undiffused ciphers is also generated. These infective and recomposed ciphers are XOR-combined to provide an output cipher. This approach makes it possible to adapt, by simple duplication of the pairs and associated specific diffusion functions, the protection offered by the countermeasure to a desired number of injected faults.
G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
60.
SYSTEM ON A CHIP AND METHOD GUARANTEEING THE FRESHNESS OF THE DATA STORED IN AN EXTERNAL MEMORY
The invention relates to a system on a chip comprising a secure element comprising a processing unit that is configured to send instructions to a rewritable non-volatile memory external to the system on a chip and connected thereto, the secure element further comprising a secure non-volatile memory and a secure volatile memory, wherein the processing unit of the system on a chip is configured to control:
the storage, in the rewritable non-volatile memory of at least one object having a current version, and of a dedicated directory associating an identifier of each object with an identifier of the current version of this object, the dedicated directory further comprising an identifier of its own current version; and
the storage, in the non-volatile memory of the secure element, of the identifier of the current version of the dedicated directory
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p. ex. les mémoires adressables directement
G06F 21/74 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information opérant en mode dual ou compartimenté, c.-à-d. avec au moins un mode sécurisé
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
61.
Memory management in a transaction processing device
The disclosure proposes a method in a first device comprising a transaction history and a generation counter, this device processing transactions with a second device. During a current transaction: receipt of data comprising a public key of the second device, a second generation counter and an identifier of the current transaction; verification that the first and second generation counters coincide; verification that the history comprises an input associated with the public key; approval of the current transaction if the transaction identifier satisfies a condition indicating the uniqueness of the current transaction; storage in the history of a new input with the public key; and update of an account balance to pay a credit to an account. The method also comprises: detection of a risk of saturation of the memory of the first device; update of the first generation counter and eviction of the memory.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
62.
Dynamic adaption of a secure element execution environment to profiles
An eUICC card comprising an initial runtime environment, subscriber profiles, associated adapters, and an adaptive routine configured to apply these adapters. An adapter enables the initial runtime environment to be adapted to the specificities of the corresponding profile when the latter is enabled. To enable dynamic adaptation of the runtime environment to the profiles used, the eUICC card further comprises inverse adapters associated with the profiles. The inverse adapter of the active profile makes it possible to restore the initial runtime environment upon disabling or deleting this profile. The adaptation can consist of modifying a Java class of the Java Card runtime environment of the eUICC, to the specificities of a profile.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 8/20 - Transfert de données utilisateur ou abonné
63.
ELECTRONIC DOCUMENT MODULE COMPRISING A CHIP AND A CONTACT INTERFACE WITH AN ANTENNA CONNECTED TO AN I/O PORT OF THE CHIP, ELECTRONIC DOCUMENT COMPRISING SUCH A MODULE AND METHOD FOR CHECKING A CONNECTION BETWEEN THE MODULE AND A CORRESPONDING ANTENNA
The present application relates to an electronic document module comprising a medium having a so-called internal face provided with at least two contact interfaces with an antenna, each of the contact interfaces with the antenna of the internal face of the medium being configured to be in contact with a connection pad of an antenna of an electronic document body, and with a chip comprising at least one I/O port, and one of the two contact interfaces with the antenna of the internal face of the medium being connected to the I/O port of the chip. The application also relates to an electronic document comprising such a module and a method for checking a connection between the module and a corresponding antenna.
A processing method implemented by a first device including receiving first data including a challenge datum; obtaining key data including an encrypted cryptographic key which is masked by executing a cryptographic masking function; receiving an unmasking key; determining the encrypted cryptographic key by executing a cryptographic unmasking function on the basis of the unmasking key; determining a decrypted cryptographic key by a decryption by executing a decryption algorithm with white-box implementation on the basis of the encrypted cryptographic key; determining an answer datum by a cryptographic operation by executing a predetermined cryptographic algorithm on the basis of the decrypted cryptographic key and the challenge datum; and sending the answer datum to authenticate the first device.
The disclosure relates to a collecting method implemented by a first device including a first volatile memory, this first device interacting with a second device including a second non-volatile memory, the memories comprising objects each constituting an instance of an object-oriented language class. The method comprises an analysis of the objects by running through an object tree from the persistent roots; and on detecting that the analysis is finished, a collecting from the first and second memories for deleting each object that has not been analyzed during said analysis. This analysis in particular comprises, for each object: the identification of each reference pointing to another object; and the definition of a first or second type for each identified reference, this analysis continuing only along the references of the first type.
G06F 3/00 - Dispositions d'entrée pour le transfert de données destinées à être traitées sous une forme maniable par le calculateurDispositions de sortie pour le transfert de données de l'unité de traitement à l'unité de sortie, p. ex. dispositions d'interface
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 12/0868 - Transfert de données entre une mémoire cache et d'autres sous-systèmes, p. ex. des dispositifs de stockage ou des systèmes hôtes
G06F 12/0804 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache avec mise à jour de la mémoire principale
G06F 12/0817 - Protocoles de cohérence de mémoire cache à l’aide de méthodes de répertoire
The invention relates to a method implemented by a system (S1) comprising a first server (H-TSP) of a home token service provider and a second server (R-TSP) of a roaming token service provider, the method comprising: receiving (S86), by the second server, a roaming token (R-PAN) allocated to a mobile payment card (C1) for operating in a roaming banking network (R-NT); obtaining (S88), by the second server, based on the roaming token (R-PAN), a home token (H-PAN) allocated to the mobile payment card for operating in a home banking network (H-NT); receiving (S94), by the first server, the home token (H-PAN); and obtaining (S96), by the first server, based on the home token (H-PAN), a primary card number (C-PAN) of the mobile payment card for operating in the home banking network.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
The invention relates to an electronic access pass allowing a person associated with the pass to access at least one restricted-access area of a building, and to a method implemented by such a pass for accessing a restricted-access area of a building. According to some embodiments, when a pass reader authorizes access to said area after reading the pass, information selected on the basis of the restricted-access area is temporarily displayed on the pass. This makes it possible to identify the carrier within the area based on the information displayed on the pass, while at the same time limiting the possibility of information being recovered through a simple glance outside the area. Overall security is thereby improved as a result, both within the area and outside it, due to the temporary nature of the display.
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
G07C 9/22 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
69.
PERSONALISED IMAGE FORMED FROM A METAL LAYER AND A LENTICULAR ARRAY
The invention relates, in particular, to a security document (10) comprising: a metal layer (14) comprising an arrangement of diffractive nanostructures arranged periodically in the metal layer so as to form a diffractive holographic structure forming an arrangement of pixels each comprising a plurality of sub-pixels of distinct colours; a lenticular array (12) comprising convergent lenses (13) positioned facing the metal layer; and a support layer (16) on which the metal layer is disposed so that the metal layer (14) is sandwiched between the lenticular array (12) and the support layer (16). The metal layer comprises perforations (20) formed by focusing laser radiation (RY) through the lenticular array on the metal layer (14), the perforations comprising at least one group of perforations (RY) produced by focusing the laser radiation (RY) at a respective angle of incidence (Θ) so as to reveal a corresponding personalised image (IG) when the security document is observed at this angle of incidence.
A process for processing a received message, where the message includes encrypted data and at least one indicator element, is disclosed. The process includes generating a complete indicator from data stored in the electronic device and from the received indicator element, generating a key from the complete indicator, and decrypting the encrypted data using said key. The disclosure also relates to a corresponding sending process.
A cardholder enters (305) payment information and a freely-selected transaction CVV in a merchant system (20). A payment system (30) receives (400) a request from the merchant system including the transaction CVV and transaction information, and sends (405) a transaction authorization request to a cardholder device (13). The transaction information are displayed (310) on the cardholder device and invites the cardholder to enter the transaction CVV for confirmation purpose. In response, the cardholder enters (315) a confirmation CVV. The payment system approves (240, 415) the transaction when the transaction and confirmation CVVs are the same. As a result, the CVV can have a short life and be changed at each transaction, thereby increasing the security of the transactions. Also, PCI certification constraints on servers are reduced since no issuer master key is required for the CVVs. Lastly, the cardholder has more control on the transaction validation.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
72.
Method of verifying a microcircuit card, method of personalizing a microcircuit card, related microcircuit card and electronic device
Disclosed is a microcircuit card includes a module for identification within a mobile telephone network storing a first piece of data, and a memory module storing a second piece of data. wherein the first piece of data and the second piece of data comply with a predetermined rule. Also disclosed is a method for verifying this microcircuit card when the card is housed in an electronic device includes a step of verifying that the first piece of data and the second piece of data comply with a predetermined rule, as well as methods for personalizing the microcircuit card, the microcircuit card, and the electronic device are also described.
09 - Appareils et instruments scientifiques et électriques
16 - Papier, carton et produits en ces matières
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Integrated circuit cards; chip cards; cards for access to
computer and/or telecommunications networks;
telecommunication cards; cards for the control of
communication; magnetic or chip-based cards with units of
credit; mobile telephone cards; electronic cards for
secure access, to computer and/or telecommunications
networks; electronic cards used for accessing services
and/or performing operations and transactions on computer
and/or telecommunications networks; computer programs;
software for interpreting finger or palm prints, features of
the iris, veins, voice, facial features or other biometric
features; computer programs and software for use in
connection with cards; computer programs and software
recorded on cards or intended for being recorded on cards
and/or telecommunications apparatus; software for providing
access to electronic mail services; messaging software;
software for providing access to electronic communication
networks; software for providing access to the Internet
and/or Internet sites; software for telecommunications,
software for navigation (browsing); software for operations
and transactions by card, namely, chip-based cards;
electronic signature support software, encryption software;
encryption keys; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for identifying and
authenticating persons and/or electronic signatures for
accessing networks, payment, operations and transactions,
including online e-commerce; computer servers, in particular
for the downloading, distribution and management of
applications on cards, including chip cards; computer
programs and software for communication between chip-based
cards and chip card readers and/or computer terminals;
computer programs and software for transmitting, displaying
and storing identification and/or operations and
transactions related information or data, in particular
online; authentication software for controlling access to
computers and computer networks and controlling
communication between computers and computer networks;
apparatus for the storage, conversion, processing and
transmission of data, information and signals; computers
and computer peripherals for use in connection with cards
and/or telecommunications apparatus; apparatus for
controlling secure access to computer and/or
telecommunications networks. Packaging of cardboard, packaging of paper; mounting
brackets of paper or cardboard containing a SIM card; small
bags [envelopes, pouches] of paper, cardboard or plastics
for packaging. Telecommunications; telephone services; automatic
telephone exchange services (telecommunications services);
communications by telephone; computerized telephony
services; electronic messaging services; telephone voice
messaging services; information relating to
telecommunications; communications by computer terminals or
by fiber-optic networks; communications by radio or
telephone; mobile radio telephony services; transmission
of data via telephone lines; providing telecommunications
connections for hotlines and call centers; broadcasting of
multimedia content via the Internet; streaming of audio,
visual and audiovisual content via a global computer
network; multimedia, audio and video dissemination via the
Internet and other communication networks; dissemination of
data; providing user access to global computer networks;
provision of access to a web portal, messaging services;
providing forums online; provision of access to chat lines,
chat rooms and forums on the Internet, including the mobile
Internet; provision of access to electronic information,
communication and transaction platforms on the Internet;
transfer of all types of messages to Internet addresses [web
messaging]; providing access to databases; electronic
bulletin board services (telecommunication services);
connection by telecommunications to a global computer
network; news or information agencies; rental of
telecommunication apparatus; broadcasting and transmission
of radio or television programs; teleconferencing or
videoconferencing services; rental of access time to global
computer networks; Transmission of information, data or
software via telephone line, telecommunications and/or
computer networks, cable, satellite, radio relay;
information concerning the aforesaid services. Advisory and information services concerning environmental
protection; auditing and advisory services enabling
ecological footprint reduction; computer engineering;
technical consultant services relating to computer hardware
use; telecommunication technology consultancy services;
design, development, maintenance and updating of software
and database software, design and development of computers;
development (design), installation, maintenance, updating or
rental of software; programming for computers; consultancy
relating to computer software; design, development and
updating of programs and computer software for interpreting
fingerprints, palm prints, features of the iris, veins, the
voice, facial features or other biometric features in the
field of access control and the authentication of persons;
technical design services, namely development of cards and
badges, including cards for payment, remote payment,
electronic wallets, intended for securing all transactions
by code, particularly online and updating of software
relating to these goods; loan and rental of cards and keys
for access to telecommunication systems and networks and
computer systems and networks; hosting, development and
design of networks and servers for the processing and
management of a customer's computer system; provision of
temporary use of non-downloadable online authentication
software for controlling access to computers and computer
networks as well as for controlling communication between
computers and computer networks; testing services for
certification of quality or standards, testing, analysis and
evaluation of third-party goods and services for the purpose
of issuing a certification; technical expertise and studies
with respect to telecommunications; electronic security
consultancy.
74.
IC CARD CAPABLE OF COMMUNICATING WITH A WIRELESS DEVICE UPON DETECTION OF A SIGNAL BY MEANS OF A CAPACITIVE SENSITIVE SURFACE, CORRESPONDING COMMUNICATION METHOD AND SYSTEM
IC card capable of communicating with a wireless communication device (300, 400), comprising: - a pattern (102) made of an electrically conductive material and configured such that the card is placed against a capacitive sensitive surface (201, 401) and a user comes into contact with the card according to a given contact movement (MVT, 104), and a signal is detected by means of the capacitive sensitive surface, - a module (105) for receiving information sent by the wireless communication device, - a module (106) for opening a channel for secure communication with the wireless communication device if the information transmitted by the wireless communication device is information associated with the signal. The invention also relates to a communication method and system.
G06K 19/067 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/073 - Dispositions particulières pour les circuits, p. ex. pour protéger le code d'identification dans la mémoire
75.
Cryptographic processing method, related electronic device and computer program
G06F 7/72 - Méthodes ou dispositions pour effectuer des calculs en utilisant une représentation numérique non codée, c.-à-d. une représentation de nombres sans baseDispositifs de calcul utilisant une combinaison de représentations de nombres codées et non codées utilisant l'arithmétique des résidus
76.
METHOD FOR INCREASING THE SECURITY OF AN AUTHENTICATION IMAGE ON A SECURITY DOCUMENT USING ANTAGONISTIC IMAGES
The invention relates to a method for increasing the security of an image to be recorded in a security document, a face of the holder of the security document being shown in the image, the method comprising: determining (S10) an image of the image that is antagonistic to an artificial neural network designed to undergo machine learning in order to detect the presence of a face in images and to the face class, transferring (S20) the antagonistic image to the security document. The invention also relates to the authentication of a security document.
G06F 21/16 - Traçabilité de programme ou de contenu, p. ex. par filigranage
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 50/26 - Services gouvernementaux ou services publics
G06T 1/00 - Traitement de données d'image, d'application générale
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
A profile management device is provided. The device comprises a profile management module capable of dynamically creating and executing an execution task to respond to a need for remote management of a communication profile in a secure element embedded in a terminal; a communication module capable of setting up a first communications channel between the execution task and a communication profile manager; the execution task being capable of obtaining the communication profile from the manager via the first communications channel; the communication module being capable of setting up a communications session between the execution task and a communication agent configured to send to the secure element, at least one management command of the profile encapsulated in at least one message sent by the execution task in terms of the session; and a module configured to delete the execution task when an action responding to the need has been performed.
A cryptographic method is provided. The cryptographic method comprises an initialisation phase for determining a provisional generator point G′ equal to a first product G′=[d′]G, where d′ is a first random scalar forming a secret key of N bits and G is a generator point of an elliptical curve, and determining a provisional key Q′ equal to a second product Q′=[d′]Q, where Q is a point of the elliptical curve forming a public key. During an encryption phase a second random scalar forming a second secret key k of M bits, with M
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A card (35) generates a dynamic security code for a card transaction, e.g. a card not present (CNP) transaction. The card (35) receives a request (83) to generate a dynamic security code from an electronic device (10) external to the card via an external card interface (330). The card (35) receives a message (87) comprising a time via the external card interface (330). The card (35) computes (89) the dynamic security code based on the time and a key (dCVV-key) stored at the card. The card (35) sends the dynamic security code (90) to the electronic device (10) via the external card interface (330) for display on a display (14) of the electronic device (10). The card (35) may determine (88) an authenticity of the message comprising the time.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
80.
Prelaminate for an electronic card, and methods for producing such a prelaminate and an electronic card comprising such a prelaminate
The present invention relates to a prelaminate for an electronic card, wherein at least a first group of pads is formed from a metal plate formed from a piece comprising a central part and branches extending from the central part, the branches of the metal plate forming the pads of the first group. The invention also relates to a method for producing such a prelaminate and an electronic card comprising such a prelaminate.
H05K 1/03 - Emploi de matériaux pour réaliser le substrat
81.
Process implemented in an integrated circuit module, corresponding integrated circuit module, system comprising such a module and corresponding computer program
A method implemented in an integrated-circuit module including a processor accessing a non-volatile memory wherein execution-context-defining software applications to be executed by the processor for communication with a device are stored, and to access a volatile memory storing execution data of a software application currently being executed. The software applications include a first being executed and a second previously suspended, the method including, upon receiving a command from the electronic device: suspending execution of the first software application being executed including saving the content of the volatile memory in a first backup location of the non-volatile memory, stopping the execution of the first software application; and resuming the previously suspended execution of the second software application including transferring into the volatile memory, from a second backup location of the non-volatile memory, execution data relating to the previously suspended execution of the second software, and executing the second software application.
G06F 9/46 - Dispositions pour la multiprogrammation
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
The invention targets a chip card (CD1) comprising: an upper metal layer (2) and a lower metal layer arranged opposite one another; an internal cavity made between the upper and lower metal layers; and an RF antenna (13) arranged in the internal cavity; in which the upper and lower metal layers each comprise a partially hollowed zone (Z1) opposite the RF antenna (13), each partially hollowed zone comprising at least one opening (18) through the thickness of the metal layer and each partially hollowed zone being partially covered by at least one metal protrusion (15) extending from an edge (16) of the partially hollowed zone so as to define the contour of said at least one opening (18).
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
83.
CRYPTOGRAPHIC PROCESSING METHOD, ASSOCIATED ELECTRONIC DEVICE AND COMPUTER PROGRAM
A cryptographic processing method transforming an input byte into an output byte comprises the following steps:
converting a plurality of words, each comprising at least one bit of the input byte, into input cryptograms by application, to each of said words, of a homomorphic encryption function from a first group to a second group provided with an operation;
obtaining output cryptograms as a function of the input cryptograms, this obtaining step including at least one processing during which said operation is applied to two intermediate cryptograms, this processing producing a cryptogram that is an image by the homomorphic encryption function of a word including a Boolean logic combination of two bits comprised respectively in two words that are arguments, for the homomorphic encryption function, of said two intermediate cryptograms;
determining bits of the output byte by applying respectively to the output cryptograms, an inverse function of the homomorphic encryption function.
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
G09C 1/00 - Appareils ou méthodes au moyen desquels une suite donnée de signes, p. ex. un texte intelligible, est transformée en une suite de signes inintelligibles en transposant les signes ou groupes de signes ou en les remplaçant par d'autres suivant un système préétabli
84.
METHOD FOR PRODUCING AN ELECTRONIC DOCUMENT COMPRISING A CONCEALED MAGNETIC STRIP, AND ELECTRONIC DOCUMENT THEREBY OBTAINED
A method for producing an electronic document (30) comprising a concealed magnetic strip, comprising a step (22) of providing a surface (310) of an electronic document body (30), a step (23) of applying a magnetic strip (33) to at least part of the surface (310) of the electronic document body (30), a visible surface (34), formed by the surface (310) of the body covered at least in part by the magnetic strip (33), having a Delta E contrast equal to or less than 15, and a step (24, 25, 26) of applying a decor (32) that covers the surface (310) of the body above the magnetic strip (33), the decor (32) having a thickness of at most 10 µm and having an opacity ratio at wavelengths in the visible domain of at least 70%; and a corresponding electronic document (30).
The invention targets an enrolment method performed by way of a chip card (CD1) using an internal or external electric power supply (PS0-PS2), comprising: determining an applied mode from among a first and second mode in which the electric power supply is respectively less than and greater than a predefined threshold; obtaining N fingerprints (FG1) in the form of image pixels (PX), N being an integer greater than or equal to 2; extracting digital data (DT1) representative of characteristic points (MT) of the fingerprints by reading the pixels at a predetermined resolution level (RL); and generating a fingerprint model (ML) by aggregating the digital data, the enrolment furthermore comprising: determining, on the basis of the applied mode, at least one from among the number N and the resolution level, such that the fingerprint model has a higher definition in the second mode than in the first mode.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
86.
SECURITY DOCUMENT HAVING A PERSONALISED IMAGE FORMED FROM A METAL HOLOGRAM AND METHOD FOR THE PRODUCTION THEREOF
The invention relates to a security document comprising: a first layer (24) comprising a metal holographic structure (32) forming an arrangement (29) of pixels (30) each comprising a plurality of sub-pixels (31) of distinct colours; and a second layer (34) positioned facing the first layer (24), this second layer being opaque with respect to the wavelength spectrum of the visible. The first layer (24) comprises perforations (40) formed by a first laser emission (LS1), these first perforations locally revealing through the holographic structure (32) dark regions (42) in the sub-pixels (31), these dark regions being caused by subjacent regions (41) of the opaque second layer (34) that are located facing the perforations, so as to form a personalised image (IG) from the arrangement of pixels (30) combined with the dark regions (42).
B42D 25/00 - Cartes ou structures de type feuille portant des informations caractérisées par leurs éléments d’identification ou de sécuritéLeur fabrication
during one of the periods, implementing by the slave device of a processing capable of causing the master device to send a connection update comprising second parameters for communicating with the master device to be used in place of the first communication parameters, the processing comprising an action (210) on one of the frequency channels capable of causing the master device to detect a degradation in communication quality on the frequency channel.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 72/0453 - Ressources du domaine fréquentiel, p. ex. porteuses dans des AMDF [FDMA]
09 - Appareils et instruments scientifiques et électriques
16 - Papier, carton et produits en ces matières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Telecommunications services, namely, transmission of voice, data, graphics, sound and video by means of broadband power line or wireless networks; telephone services; telecommunications services, namely, automatic telephone exchange services; communications by telephone; computerized telephony services; electronic messaging services; telephone voice messaging services; information relating to telecommunications; communications by computer terminals or by fiber-optic networks; communications by radio or telephone; mobile radio telephony services; transmission of data via telephone lines; providing telecommunications connections for hotlines and call centers, namely, providing local and long distance telephone services; broadcasting of multimedia content via the Internet; streaming of audio, visual and audiovisual content via a global computer network; multimedia, audio and video dissemination via the Internet and other communication networks, namely, transmission of sound, video, and information, video broadcasting services via the Internet; dissemination of data, namely, transmission of data by satellite, cable, network; providing user access to global computer networks; provision of access to electronic sites, namely, web portal and messaging services; providing forums online for exchanging messages among computer users in the field of general interest; provision of access to chat lines, chat rooms and forums on the Internet, including the mobile Internet; provision of access to electronic information, communication and transaction platforms on the Internet; web messaging services, namely, text and picture wireless messaging services in order to transfer of all types of messages to Internet addresses; providing access to databases; telecommunication services, namely, electronic bulletin board services; connection by telecommunications, namely, providing access to a global computer network; news or information agencies, namely, transmission of news items to news reporting organizations; rental of telecommunication apparatus; broadcasting and transmission of radio or television programs; teleconferencing or videoconferencing services; rental of access time to global computer networks; Transmission of information, data or software via telephone line, telecommunications and/or computer networks, cable, satellite, radio relay; information concerning the aforesaid services, namely, telecommunications Integrated circuit cards; chip cards, namely, blank electronic chip cards, encoded electronic chip cards for mobile operators; electronically encoded swipe cards, electronic and magnetic ID cards, encoded electronic chip cards for access to computer and/or telecommunications networks; telecommunication cards, namely, encoded electronic chip cards for mobile operators; electronically encoded swipe cards, electronic and magnetic ID cards, encoded electronic chip cards for the control of communication; magnetic cards and encoded electronic chip-based cards with units of credit for use in connection with payment for services; electronically encoded swipe cards, electronic and magnetic ID cards, encoded electronic chip cards for mobile telephone; electronic cards in the nature of encoded chip cards for secure access, to computer and/or telecommunications networks; electronic cards in the nature of encoded chip cards used for accessing services and/or performing operations and transactions on computer and/or telecommunications networks; recorded computer programs for telecommunications through mobile phones; recorded software for interpreting finger or palm prints, features of the iris, veins, voice, facial features or other biometric features; recorded computer programs and software for use in connection with cards, for telecommunications through mobile phones; recorded computer programs and software recorded on cards or intended for being recorded on cards in the nature of encoded chip cards and/or telecommunications apparatus; recorded software for providing access to electronic mail services; recorded messaging software in the nature of instant messaging software; recorded software for providing access to electronic communication networks; recorded software for providing access to the Internet and/or Internet sites; recorded software for telecommunications through mobile phones; recorded software for browsing the internet and worldwide web; recorded software for operations and transactions by card, namely, electronic encoded chip-based cards in connection with payment for services; recorded electronic signature support software for authenticating persons or electronic signatures for accessing networks; recorded encryption software for authenticating persons or electronic signatures for accessing networks; encryption keys in the nature of electronically encoded chip cards for authenticating persons or electronic signatures for accessing networks; recorded computer programs and software for storage, retrieval and secure transmission of information or data; recorded computer programs and software for identifying and authenticating persons and/or electronic signatures for accessing networks, payment, operations and transactions, including online e-commerce; computer servers, in particular for the downloading, distribution and management of applications on cards, including chip cards; recorded computer programs and software for communication between chip-based cards and chip card readers and/or computer terminals; recorded computer programs and software for transmitting, displaying and storing identification and/or operations and transactions related information or data, in particular online; recorded authentication software for controlling access to computers and computer networks and controlling communication between computers and computer networks; apparatus for the storage, conversion, processing and transmission of data, information and signals; computers and computer peripherals for use in connection with cards and/or telecommunications apparatus; apparatus in the nature of computer hardware for controlling secure access to computer and/or telecommunications networks Packaging of cardboard, packaging of paper; mounting brackets of paper or cardboard containing a SIM card; small bags [envelopes, pouches] of paper, cardboard or plastics for packaging Advisory and information services concerning environmental protection research; energy auditing and advisory services enabling ecological footprint reduction; computer engineering; technical consultant services relating to computer hardware use; telecommunication technology consultancy services; design, development, maintenance and updating of software and database software, design and development of computers; design, development, installation, maintenance, updating or rental of software; programming for computers; consultancy relating to computer software; design, development and updating of programs and computer software for interpreting fingerprints, palm prints, features of the iris, veins, the voice, facial features or other biometric features in the field of access control and the authentication of persons; technical design services, namely, development of cards and badges, including cards for payment, remote payment, electronic wallets, intended for securing all transactions by code, particularly online and updating of software relating to these goods; Rental of magnetically or RFID encoded cards and electronic security keys, all used for providing access to telecommunication networks and computer networks; hosting, development and design of networks and servers for the processing and management of a customer's computer system; provision of temporary use of non-downloadable online authentication software for controlling access to computers and computer networks as well as for controlling communication between computers and computer networks; testing services for certification of quality or standards in relation with energy consumption; testing, analysis and evaluation of third-party goods and services to determine conformity with certification standards for the purpose of issuing a certification; electronic computer security consultancy
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Electronic detectors of bank notes or access documents;
apparatus and instruments for authenticating banknotes,
access passes and payment documents; chips [integrated
circuits]; computer chips; computer chips; semiconductor
chips; electronic chips for manufacturing integrated
circuits; semi-conductors; semi-conductor wafers;
electronic semi-conductors; magnetic or electronic cards
and badges, contact or contactless, intended for use as
payment, credit, debit, remote payment, loyalty or cash
cards, including those with dynamic codes for securing all
transactions online; magnetic or electronic cards for use
as data banks and databases; electronic cards used for
accessing services and/or performing operations and
transactions on computer and/or telecommunications networks;
software for operations and transactions by card, namely,
chip-based cards; integrated circuits; electronic chips;
electronic signature support software, encryption software;
encryption keys; electronic apparatus for checking the
authenticity of cards; computer programs and software for
storage, retrieval and secure transmission of information or
data; computer programs and software for identifying and
authenticating persons and/or electronic signatures for
accessing networks, payment, operations and transactions,
including online e-commerce; traceability software for the
management and securing of documents and/or printed matter;
computer servers, in particular for the downloading,
distribution and management of applications on cards,
including chip cards; computer programs and software for
communication between chip-based cards and chip card readers
and/or computer terminals; computer programs and software
for transmitting, displaying and storing identification
and/or operations and transactions related information or
data, in particular online; computer software for
processing electronic payments and transferring funds to and
from third parties. Maintenance of data in computer databases. Banking, financial and monetary affairs; insurance
services; consultancy and information with respect to
financial, money and banking; consultancy and information
relating to insurance underwriting; financial services,
namely the electronic transfer of funds; clearing and
reconciling of financial transactions; providing a wide
range of payment and financial services, namely credit card
services, issuance of credit cards, payment cards and credit
lines, processing and transmission of bills and payments
thereof, bill payment services with guaranteed provision of
payment, and brokerage of money market funds, all via global
communication networks; processing of transactions carried
out by credit card and immediate debit card; reimbursement
of funds for disputed items in the field of purchases via
electronic payment; provision of purchase protection for
goods and services purchased by others via global computer
and wireless networks; processing of credit card
transactions; credit services, namely, provision of
revolving credit account services; bill payment services;
provision of mobile electronic payment services for others;
credit card and payment processing services; processing of
payments through electronic foreign exchange operations;
payment processing services, namely providing transaction
processing services in virtual currency for others, deposits
of valuables, deposits in safe boxes; issuing of travelers'
checks, vacation checks and payment orders in general;
financing of loans for security and surveillance systems. Computer engineering; technical consultant services
relating to computer hardware use; telecommunication
technology consultancy services; software design,
development, maintenance and updating; design and
development of computers; development (design),
installation, maintenance, updating or rental of software;
computer programming; computer and software consultancy;
programming for microprocessor cards and badges; rental of
computers, computer peripherals, computer programs and
software; design, development, maintenance and updating of
software for managing, securing and transferring cash;
technical design services, namely development of cards and
badges, including cards for payment, remote payment,
electronic wallets, intended for securing all transactions
by code, particularly online and updating of software
relating to these goods; technical design and development of
currency, payment documents, access documents,
identification documents, cards, badges, banners and labels;
technical design services, namely development of card and
badge readers and updating of software relating to these
goods; information and advice regarding design of currency,
payment documents, access documents, identification
documents, cards, badges, banners and labels; technical
advice and information regarding development of currency,
payment documents, access documents, identification
documents, cards, badges, banners and labels; rental of
cards and badges, including cards for payment, remote
payment, electronic wallets intended for securing all
transactions by code, particularly online; expert reports,
studies, consultancy and technical advice relating to
computer technology and/or management systems and/or
securing the transfer of funds; electronic security
consultancy; expert reports, studies, technical consulting
and advice, in the field of electronic card management
systems; downloading of data or software on cards and
badges, including payment cards, remote payment, electronic
cash, intended for securing transactions by code,
particularly online; design and customization of documents
and printed matter, currency, payment documents, access
documents, identification documents, cards, badges, banners
and labels.
90.
ELECTRONIC DOCUMENT MODULE COMPRISING A CHIP AND A CONTACT INTERFACE WITH AN ANTENNA CONNECTED TO AN I/O PORT OF THE CHIP, ELECTRONIC DOCUMENT COMPRISING SUCH A MODULE AND METHOD FOR CHECKING A CONNECTION BETWEEN THE MODULE AND A CORRESPONDING ANTENNA
The present application relates to an electronic document module comprising a medium (31) having a so-called internal surface (34) provided with at least two contact interfaces with an antenna (L1a, L2b), each of the contact interfaces with the antenna (L1a, L2b) of the internal surface of the medium being configured to be in contact with a connection pad (L1, L2) of an antenna (L) of an electronic document (10) body (20), and with a chip (38) comprising at least one I/O port, and one of the two contact interfaces with the antenna (L1a, L2b) of the internal surface (34) of the medium being connected to the I/O port of the chip (38). The application also relates to an electronic document comprising such a module and a method for checking a connection between the module and a corresponding antenna.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
92.
METHOD FOR MANUFACTURING A TWO-DIMENSIONAL COLOURED BAR CODE AND ASSOCIATED SECURITY DEVICE
The invention substantially relates to a method for manufacturing a two-dimensional coloured bar code comprising an arrangement of coloured basic structural elements which encode at least one information element, the manufacturing method comprising the following steps: determining (E304) by data-processing means a group of coloured basic structural elements corresponding to the at least one information element, at least one structural element of the group comprising a pattern, and forming (E308) the at least one structural element of the group on a support in order to create the arrangement, wherein: the support comprises a printed matrix comprising a plurality of pixels, and the formation of the at least one coloured basic structural element comprises modification of the support in at least a portion of at least one sub-pixel of at least one pixel of the matric, the modification making it possible to obtain the colour and pattern of the at least one basic structural element.
Method for controlling commands suitable to be processed by a peripheral (2) comprising the following steps implemented by a control circuit (6) connected to a communication bus (8), a command circuit (4) and the peripheral (3) also being connected to the communication bus (8): granting or refusing authorization to the command circuit (4) to transmit a command signal of the peripheral via the bus (8), detecting the possible transmission of the command signal for the peripheral by the command circuit via the bus (8), implementing protection measures (614) when the control circuit detects that the command signal has been transmitted as the control circuit has not granted authorization, or that the command signal has not been transmitted as the control circuit has granted authorization.
a second processing unit (12) for implementing the following steps automatically and autonomously via the debug port (10): checking the integrity of the data memorized by the first memory (8) and/or the compliance of the program's execution by the first processing unit (6) with a reference execution, assisted by the reference data.
G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
The invention concerns a method implemented by a chip card (C1) interacting with a terminal (T1) using a near field contact-free communication or communication by contact, the method comprising: receiving a first command; in response, sending instruction data (DT1) to the terminal (T1) for presentation to a user (UR), the instruction data specifying: N predetermined events to be performed by the user by means of the chip card (C1) or the terminal (T1), N being equal to at least two, and time data defining a time sequence according to which the N events must be performed; after sending the instruction data, detecting events; determining whether the detected events conform with the instruction data (DT1); and, if so, successfully authenticating a user of the chip card.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06F 21/40 - Authentification de l’utilisateur sous réserve d’un quorum, c.-à-d. avec l’intervention nécessaire d’au moins deux responsables de la sécurité
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
The invention relates to an electronic access pass allowing a person associated with the pass to access at least one restricted-access area of a building, and to a method implemented by such a pass for accessing a restricted-access area of a building. According to some embodiments, when a pass reader authorizes access to said area after reading the pass, information selected on the basis of the restricted-access area is temporarily displayed on the pass. This makes it possible to identify the carrier within the area based on the information displayed on the pass, while at the same time limiting the possibility of information being recovered through a simple glance outside the area. Overall security is thereby improved as a result, both within the area and outside it, due to the temporary nature of the display.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/28 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer permettant le repérage ou signalant la présence
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
Disclosed is a semi-rigid enrolment case for a smart card, formed by folding and gluing an envelope-like cardboard blank of the dimensions of the card. The case includes an electrical circuit printed directly on the cardboard of an inner surface. The circuit includes contact studs connected to a power supply interface and arranged to connect electrical contacts of the card to the power supply interface when the card is inserted into the case. A biometric sensor of the card remains accessible to the user when it is out of the case for making the enrolment. Through-openings are made in the cardboard on either side of contact stud lines and allow forming independent flexible areas, providing better contact between the studs and the electrical contacts of the card.
G06K 5/00 - Méthodes ou dispositions pour vérifier l'exactitude du marquage sur un support d'enregistrementDispositifs de localisation de colonne
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06K 19/04 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par la forme
G06K 19/073 - Dispositions particulières pour les circuits, p. ex. pour protéger le code d'identification dans la mémoire
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G07F 7/08 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée
A smartcard includes a fingerprint sensor and a detector circuit comprising at least first and second electrodes that are insulated from each other and that form an open circuit. The first electrode and the second electrode is arranged in such a manner that. When a user applies a first finger on the fingerprint sensor and uses a second finger to grip the smartcard, the first finger contacts the first electrode and the second finger contacts the second electrode so as to form a loop that closes the open circuit. The detector circuit further comprises a filter circuit connected to the first electrode and to the second electrode, a generator arranged to generate first signals across the terminals of the filter circuit, and processor means arranged to acquire second signals and, from the second signals, to detect whether the first and second fingers include a fake finger.
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
99.
Display on a smartphone screen of a positioning pattern of a contactless card to improve near field communication
To ensure the quality of NFC communication between a contactless card and a smartphone, a positioning pattern, for example a portion of the card visual, is displayed on the screen of the smartphone. This is a visual aid to help the user to position the contactless card, in proximity to the smartphone, toward a position where a card indicator for which provision is made on the card, typically the portion complementary to the card visual, is aligned with the displayed pattern. The positioning is made easy as the positioning pattern and the card indicator are preferably chosen to be visually complementary. Also, the contactless card is in the appropriate position when the card indicator visually complements the positioning pattern. The positioning pattern is thus displayed at a location of the screen allowing the best NFC coupling between the card and the smartphone.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G07F 7/08 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée
H04B 5/00 - Systèmes de transmission en champ proche, p. ex. systèmes à transmission capacitive ou inductive
100.
Method for determining the behavior of a smart card, and related server
A method for determining a behavior of a smart card, which may be implemented by a server. The method includes operations for obtaining a first reference time data corresponding to a time for setting a smart card clock, and a second reference time data corresponding to a time for reading a first time data from the clock, determining a time drift associated with the smart card based on the first reference time data and on the second reference time data, and determining a behavior of the smart card from the time drift.
G06F 1/14 - Dispositions pour le contrôle du temps, p. ex. horloge temps réel
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système