Abstract:
Le procédé selon l'invention a pour but d'améliorer l'efficacité et la consommation mémoire d'un système informatique. Il consiste à précalculer, partiellement ou totalement, des structures de données avant l'installation de ce système informatique, à les inscrire directement dans une zone de stockage en mémoire physique et à les mettre à disposition dudit système. Lorsqu'elles comportent des parties variables, ces structures de données sont installées dans ladite zone de stockage avec des infoimations constantes permettant de référencer des emplacements en mémoire volatile qui contiennent lesdites parties variables lors de l'exécution du système informatique.
Abstract:
The invention relates to a user authentication method for accessing an online service provided by a service provider, the user having a communication terminal (1 ) including a trusted execution environment (100) having dedicated user authentication means (101 ), said trusted execution environment storing an authentication policy (103) associated to said service and storing user authentication credentials (104) for said service, the method comprising the steps of: during a user access to said service, the trusted execution environment retrieves the authentication policy associated to said service and executes its dedicated user authentication means based on the retrieved authentication policy; upon a successful authentication by the dedicated authentication means (102), the trusted execution environment (100) provides the user authentication credentials for said online service to said service provider.
Abstract:
The invention relates to a secure portable object of the smart card type comprising (a) an object body and (b) a micro-module comprising a processor and at least one memory in which a first application executed by a first execution engine in a first execution space is stored. The invention is characterised in that a second application is further stored in the said at least one memory, where the said second application is executed by a second execution engine distinct from the first execution engine, in a second execution space distinct from the first execution space. The invention particularly applies to smart cards.
Abstract:
The invention concerns an execution process for a program comprising virtual instructions, executable by a virtual machine, each virtual instruction representing an action. The process comprises: for at least one virtual instruction of the program, called a corrected virtual instruction, beginning to execute a loop of instructions of virtual machine code (112) called an interpretation loop. Complete execution of the interpretation loop enables: determination of the action represented by the current virtual instruction; selection and execution of a translation of the action, comprising at least one real instruction of virtual machine code (112), and being associated with the determined action; selection of a subsequent virtual instruction on which the interpretation loop is intended to be executed; during execution of the interpretation loop for the corrected instruction, before restarting execution of the interpretation loop for a new instruction, searching in a lookup table for a patch associated with the corrected instruction, and commanding execution of the patch.
Abstract:
A transaction method comprising an identification step (S1) and an electronic transaction step (S2). The identification step identification (S1) of mobile telecommunication equipment (3) includes the transmission of at least one piece of identification information (ID) from the mobile telecommunication equipment (3) to an electronic transaction terminal (2) according to a first contactless proximity communication protocol (P1) when the telecommunication equipment (3) is placed in a detection zone (ZD) of the terminal (2). The electronic transaction step (S2) between the telecommunication equipment (3) and the electronic transaction terminal (2) is carried out according to a second contactless communication protocol (P2).
Abstract:
A transaction method comprising an identification step (S1) and an electronic transaction step (S2). The identification step identification (S1) of mobile telecommunication equipment (3) includes the transmission of at least one piece of identification information (ID) from the mobile telecommunication equipment (3) to an electronic transaction terminal (2) according to a first contactless proximity communication protocol (P1) when the telecommunication equipment (3) is placed in a detection zone (ZD) of the terminal (2). The electronic transaction step (S2) between the telecommunication equipment (3) and the electronic transaction terminal (2) is carried out according to a second contactless communication protocol (P2).
Abstract:
The invention relates to a method for securing a user interface that comprises a user interface including one or more peripheral hardware devices of the user interface for interaction with said interface, said peripheral hardware devices being driven by driver software, and one or more applications using the user interface. The invention also relates to a method for securing such an interface. The system of the invention is characterised in that the same further comprises a hypervisor and one or more virtual machines, the drivers of the peripheral hardware devices of the user interface being divided into two portions, i.e. a main portion of said drivers under the control of the hypervisor and a front-end portion of said drivers under the control of the virtual machines, wherein the front-end portion of the securing software component is in charge of managing the front-end portion of the drivers and the main portion of the securing software component is in charge of managing the main portion of the drivers. The invention can particularly be used in onboard systems.
Abstract:
Le procédé selon l'invention concerne l’authentification d'application d'un système informatique comportant un microprocesseur, une pluralité d'applications; un système d'exploitation généraliste (OS2), apte à exécuter et à gérer lesdites applications, ainsi qu'à associer à chaque identifiant d'application (3) les Informations d'Identification nécessaires à son exécution; et un Environnement de Confiance (EC) offrant des services à ces applications. Préalablement à tout accès aux services de l'Environnement de Confiance (EC) par une application, ce procédé exécute une opération de "hashage" sur les Informations d'Identification de cette application et l'Environnement de Confiance (EC) vérifie l'authenticité du résultat du "hashage".
Abstract:
The invention relates to a method of improving the memory consumption and effectiveness of a computer system. The inventive method consists in: either partially or completely precalculating the data structures prior to the installation of the computer system, entering said structures directly into a physical memory storage area, and making same available to the system. When the aforementioned data structures comprise variable parts, they are installed in the storage area with constant information, such that the volatile memory locations that contain said variable parts can be referenced during the running of the computer system.
Abstract:
L'invention concerne un procédé de chargement, d'installation et d'exécution de logiciels, dénommés unités de chargement, ayant des niveaux de confiance différents par une unité (1 ) de traitement informatique. Il consiste au moins à associer à chaque unité de chargement (2, 3, 7) au moins une structure de données (11 , 12, 13) d'information des besoins et caractéristiques de sécurité de cette unité de chargement, associer à ladite unité (1 ) de traitement informatique une structure de données (10) dynamique représentative de l'état de sécurité courant de l'unité (1 ) de traitement informatique, valider les besoins et caractéristiques de sécurité de chaque unité de chargement (2, 3, 7) vis-à-vis de l'état courant de l'unité (1) de traitement informatique contenu dans ladite structure de données (10) dynamique par l'intermédiaire d'un module de sécurité (9) autonome et si la validation est positive7- autoriser par le module de sécurité (9) le chargement, l'installation ou l'exécution de l'unité de chargement (2, 3, 7).