Abstract:
L'invention concerne un procédé de réalisation dispositif comportant une antenne de transpondeur connectée à des plages de contact, ledit procédé comportant des étapes de: fourniture ou réalisation d'une antenne (3) comportant des portions terminales (7b, 8b) de connexion reposant sur un substrat, - report des plages de contact (5, 6) sur le substrat et leur connexion aux portions terminales de l'antenne (7b, 8b) la connexion étant réalisée sous forme d'une soudure (38) par apport d'énergie entre les plages (5, 6) et les portions terminales (7b, 8b); Le procédé se distingue en ce que les plages (5, 6) sont reportées de manière à présenter une surface (40) en regard d'une portion terminale (7b, 8b) de connexion de l'antenne, ladite portion étant disposée sur le substrat (2, 2b, 2f ), l'énergie de soudure étant appliquée directement sur les plages (5, 6). L'invention concerne également le dispositif obtenu.
Abstract:
Patching of software application. A software application is stored on a smart card as partitions and is loaded from the smart card into the memory of a host computer to which the smart card is connected. The software application is executed on the host computer; which using the instructions of the software application establishes a communications channel between the software application and a remote patch server containing a patch for at least one partition of the software application. Upon detecting that a patch is available for the at least one partition of the software application, downloading the at least one partition from the remote server into volatile memory allocated to the software application on the host computer via the first communications channel, and uploading the at least one partition from the volatile memory allocated to the software application to the smart card. Other systems and methods are disclosed.
Abstract:
The invention relates to a personal token (40) comprising logic for checking a PIN/password as transmitted from a user interface (10,12) and for blocking operation of the token (40) when a predetermined number of erroneous PIN/password attempts have been transmitted to the token (40), characterized in that it comprises an interpreting logic which performs a detection of an unconscious mishandling of the user interface (10,12) so that the token (10) avoids to count such unconscious mishandling of the user interface (10,12) as a said erroneous PIN/password attempt concurring to reaching the said predetermined number of erroneous attempts.
Abstract:
The inventions relates to a personal security token (10) for a mobile telecommunicaction terminal (20) said personal security token (10) comprising a memory and a processor, said memory storing a content file (11), an access condition list (ACL) to such file (11) under a first security environment and an access condition list (ACL) to such file (11) under a second security environment, the two access condition lists being both stored in a given file (12) which is divided into records, characterized in that the access condition list (ACL) under the first security environment and the access condition list (ACL) under the second security environment are stored in the same record (13) of the said given file (12), and the token (10) stores and runs a program for identifying wether the token (10) is currently actuated under the first security environment or under the second security environment and reading only the access condition list which corresponds to the current security environment.
Abstract:
The invention relates to a personal token (20) storing a temporary account (32) identifier and a permanent account (34) identifier, said token storing and running a set of instructions for disabling said temporary account identifier and activating said permanent account identifier, characterized in that the set of instructions comprises instructions for controlling the personal token (20) into collecting and sending personal information concerning the user by means of the terminal (10) to a remote telecommunication system (30,40) before disabling said temporary account (32) identifier and activating said permanent account (34) identifier.
Abstract:
The invention relates to a personal authenticating token comprising a microprocessor and a set of memorized instructions for controlling the microprocessor into monitoring an update command onto an elementary file and, when encountering said update command onto an elementary file, retrieving parameters of the update command which identify a location in the memory of the personal token where data is to be updated by said update command, retrieving the data which are present at said location and placing said data into a location in memory where said data can be recovered (80).
Abstract:
The present invention relates to a subscriber identity module (1) comprising a card in which is embedded at least one integrated circuit, on a surface of which said card is provided: - a first set of contacts (11) providing a first electrical interface; and - a second set of contacts (10) providing a second electrical interface. According to the invention: - said first set of contacts (11) is flush to the surface of the card; and - said second set of contacts (10) is slightly set back from the surface of the card.
Abstract:
This invention relates to a method for introducing logical protective means comprising a collective key (K,Km) in a series of retrievable authentication tokens (310) each token including memory and processing means said protective logical means being common to said series of authentication tokens (310), said protective logical means comprising the collective key and comparing software means for comparing a key which is submitted to the token with the collective key so as to allow access to a predetermined content of the token when said submitted key corresponds to the memorized key, characterized in that said method for introducing the logical protective means includes two different steps a) and b), which consist in: a) introducing first protective logical means in the token which include a sub-part (K1) of the collective key (Km) said first protective logical means being efficient for preventing access to said predetermined content, b) introducing complement protective logical means in the token which include a complement part (K2) of the collective key (Km) so that the protective logical means become able to perform a key comparing function allowing access to the said predetermined memory area when a submitted key corresponds to the collective key (Km).
Abstract:
A system comprises a smart phone (100) and a smart card (130). The smart phone comprises a web browser and a display (110) such that the smart phone is able to display a web page comprising at least one selectable entry. The smart card includes at least one proactive logic entity. The proactive logic entity is set as responsive to selection of the displayed web page's entry. The web page can be a web phone book. SIM toolkit is a possible mechanism for implementing the proactive logic entity. The smart card can be a TCP/IP smart card.
Abstract:
A method of indicating that a phone number of at least one entry in an electronic phonebook of a device (6) belongs to a particular service provider is disclosed. The method includes applying (48) an indicium to the entry to indicate that the phone number belongs to the service provider. A subscriber identity module and a device that is capable of performing the method are also disclosed. A server for providing the subscriber identity module or the device with the relevant service provider information is also disclosed.