Abstract:
PROBLEM TO BE SOLVED: To provide a radio frequency electron insert which exhibits excellent communication characteristics, is thin, and has a low cost.SOLUTION: In a method for manufacturing a device comprising a transponder antenna connected to contact pads, the method comprises the steps of: providing or manufacturing an antenna comprising connection terminal parts 7b and 8b mounted on a substrate; placing the contact pads 5 and 6 on the substrate and connecting the contact pads to the connection terminal parts 7b and 8b of the antenna in a form of welding 38 produced by introducing energy between the contact pads 5 and 6 and the connection terminal parts 7b and 8b. In the method, the contact pads 5 and 6 are disposed so as to comprise one surface facing the connection terminal parts 7b and 8b of the antenna, the connection terminal parts 7b and 8b are disposed on the substrate and welding energy is directly applied to the contact pads 5 and 6.
Abstract:
PROBLEM TO BE SOLVED: To prevent accessing secret data by complicating analysis of electronic signatures of a device with an integrated circuit. SOLUTION: The integrated circuit device (2) is designed so as to be incorporated in a portable memory object having a memory, particularly, of card format. The integrated circuit device (2) comprises at least one capacitor (8) for making the amplitude of current peaks (Idd) consumed by the integrated circuit device (2) attenuate. Attenuation of such current peaks is particularly useful in attenuating electrical signatures of smart cards. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
The present invention relates to a method of securely using a first tenant secret key stored under an encrypted form in a first token (TKA) of a first tenant (A) identified by a first tenant identifier (UIDA) and having said first tenant secret key, wherein: each tenant identifier (UIDT) for a tenant (T) comprises a first value and, when said tenant (T) is allowed to use a secret key of a parent tenant (Tp) identified by a parent tenant identifier (UIDTP), said parent tenant identifier, appended before said first value, and said first token (TKA) has been generated from said first tenant identifier (UIDA) and a first tenant secret key encrypted with said first tenant identifier (UIDA) and with a first tenant customer master key (CMKA), said first tenant customer master key (CMKA) having been derived from said first tenant identifier (UIDA) and a secure domain master key (SDMK), said method comprising the following steps performed by a secure device storing said secure domain master key (SDMK), on request of a second tenant (B) identified by a second tenant identifier (UIDB): —getting a first tenant identifier (UIDA) of said first tenant (A) from said first token (TKA), —checking if the first tenant identifier (UIDA) is a prefix of or is equal to said second tenant identifier (UIDB), —when said first tenant identifier (UIDA) is a prefix of or is equal to said second tenant identifier (UIDB), recovering said first tenant secret key stored in said first token (TKA) and using it for the second tenant (B).
Abstract:
The invention relates to a method for sending data to at least one device. According to the invention, a data sending control server sends to at least one data storage server at least one predetermined rule or a first request for sending data to at least one data processing server. The data storage server sends, based upon the at least one predetermined rule or the first request for sending data, data to the data processing server. The data sending control server sends to the data processing server a second request for sending to the device the data received or to be received by the data processing server. The data processing server sends, based upon the second request for sending the data, the received data to the at least one device.
Abstract:
The invention relates to a method for detecting a failure in a PDP context or an EPS PDN connection. A chip incorporated within or coupled to a device receives from the device a call control PDP context activation type event or a call control EPS PDN connection activation type event. The chip receives from the device an updated value relating to an HFN start PS. The chip compares the last updated value relating to the HFN start PS to a predetermined value relating to the HFN start PS. If the last updated value relating to the HFN start PS is greater than or is less than/equal to the predetermined value relating to the HFN start PS, then the chip detects that the PDP context or the EPS PDN connection has been successfully or unsuccessfully activated respectively.
Abstract:
A method and system for providing proof of personal information includes a first device sending a request to a server for proving user information and data identifying a requester. The server generates (i) requester authentication data and associated data identifying a transaction, and (ii) a proof of user information using the user information and the requester authentication data. The server then sends the proof of user information and the associated data identifying the transaction to the first device. A second device sends to the server a request for getting authentication data associated with data identifying a transaction and the associated data identifying the transaction. In response to the request, the server sends authentication data associated with the data identifying the transaction to the second device. The second device or a verifier may then authenticate the user information only if the received authentication data matches the requester authentication data.
Abstract:
The invention relates to a method for managing data access. The method includes receiving at least one request for accessing data; capturing data relating to at least one current context signal during each data access request; comparing, as a current authorization step, the data relating to at least one captured current context signal to predetermined reference data relating to at least one corresponding context signal according to at least one corresponding predetermined authorization policy; determining, based upon the current authorization result and at least one predetermined dynamic data access policy, whether the data access is or is not authorized, as a data access decision; and issuing the data access decision. The invention also relates to corresponding first device, second device and system.
Abstract:
The invention relates to a method for managing an memory LNVM erasable by block. The method comprises an index management of the memory blocks wherein the index indicates if a block is erased (Erased) or to be erased (TBE). A memory manager performs a block erasing when the memory is not in use and a block is to be erased and when the number of erased blocks is lower than a predetermined number.