Abstract:
A system and method for effecting secure transactions over a computer network in a manner designed to foil identity theft perpetrated from an untrusted computer. A connection from a client computer to the network wherein the client computer provides a user interface for a user, a connection from a server computer to the network, and a connection from a portable secure computing device to the network provides for secure transmission of private confidential user information from the user to a server. The private information is transmitted directly from the secure computing device to the server over the secure connection without possibility of capture on the computer with which the user is interacting.
Abstract:
A portable object comprises a memory where at least one credential is stored. The credential is associated with a service and used to verify that the entity requesting a service is an authorized entity for accessing the service. The method for protecting a portable object against denial of service type attacks comprises the steps of :- verifying that the entity requesting a service is an authorized entity for accessing the service, based on an algorithm involving the credential,- delivering the requested service only when the verification step succeeded,- blocking the credential associated with the service after a certain number of verification step failed.When the verification step failed, the method further comprises the steps of waiting during a duration before allowing a new verification step.
Abstract:
1) A method for synchronizing databases (DB1, DB2), a first database (DB1) being stored in a first data processing system (MOB), a second database (DB2) being stored in a second data processing system (MNO), said method comprising: a. A loading step in which an application (APP) is loaded into said first data processing system (MOB); b. An execution step in which the application (APP) executes a command; c. A requesting step in which said command requests the first data processing system (MOB) to process a synchronization step, said command providing the first data processing system (MOB) with the information about the synchronization parameters to be used for synchronizing the content of the first (DB1) and the second (DB2) databases, said method being characterized in that said first data processing system (MOB) includes a security token (CAR) controlled by an operator (OP) and in that said application (APP) is loaded into said security token (CAR).
Abstract:
Un système de réception radiofréquence comprenant un terminal et un objet portable de type carte à puce arrangé pour communiquer avec le terminal. Le système comprend un récepteur radiofréquence apte à recevoir une pluralité de flux de données à partir d'un signal radiofréquence. L'objet portable comprend une zone de stockage de données. La zone de stockage de données comprend une donnée prédéfinie identifiant un flux de données particulier. Le système comprend en outre des moyens de sélection pour sélectionner parmi la pluralité de flux de données, le flux de donnée particulier identifié par la donnée prédéfinie.
Abstract:
The invention concerns an automatic method to secure an electronic calculation assembly against attacks by error introduction or by radiation. The following are used: 1) Static information generated by the automatic process; 2) A dynamic part of the memory of the electronic system allocated by the automatic process; 3) Beacons and check points to mark out the code, introduced by the automatic process; 4) Beacon functions storing information in the dynamic memory; 5) History verification functions using the static information and the dynamic memory to check that no errors have been introduced.
Abstract:
The solution refers to an optimization of the memory space further to a data update in a data processing device such as a smartcard (SIM). The data to be updated comes from a remote machine (SRV) communicating with the said card. This machine stores a number of data (Sn) and comprises a storing step for each type of data in different memory areas (Z2,Z3) of the said device.
Abstract:
The invention relates to a computer comprising a local server and a local client. The local server is arranged to serve the local client. The computer is connectable to a network. The local server comprises a prevention module for preventing DOS attacks. The prevention module is set to forbid network access to the local server from outside the computer.
Abstract:
The invention relates to a portable mass storage device (1 ) comprising a security application. The security application is executable by a terminal (2) when the terminal (2) is connected with said device (1 ). The security application is arranged, when executed by the terminal (2), to secure at least a subset of the processes running on the terminal (2) by hooking said processes.
Abstract:
The invention relates to a method for rendering content on a mobile equipment, comprising rendering a content from a broadcasted stream (10), the method further comprising the step which consists in providing a mass memory in the mobile equipment and storing content from the broadcasted stream into the mass memory characterized in that it comprises the step which consists in a remote broadcaster entity commanding (11, 12, 13, 15) the mobile equipment into storing the content from the broadcasted stream into the mass memory.
Abstract:
The invention concerns the security of identification documents, in order to prevent the alteration or modification of the identification data and the fraudulent reuse of the documents. The identification document according to the invention comprises a first set of identification data (12, 48) and a second set of identification data (12') that takes the form of a reverse image of the first set of identification data.