Abstract:
The invention relates to a method for communicating with a personal token (10) over an IP network, in which method a request is made to the personal token and the personal token provides a response to this request, the method being characterized in that it comprises the step which consists in encapsulating (20) the said request to the personal token inside a message which is a response to a prior request emitted by the personal token for the purpose of such encapsulation.
Abstract:
The invention relates to a personal token (11,15) comprising a microprocessor and a memory, characterized in that it comprises a compression agent (12,16) for compressing data before the data are stored into the memory of the personal token (11,15).
Abstract:
The invention relates to a personal token (10) comprising a microprocessor and a memory, said personal token (10) storing and running a software entity which constitutes an end-point for communication over the internet, characterized in that the software entity constitutes an end-point according to a signaling protocol over the internet which signaling protocol is of the type intended at initiating a session (20, 30, 40, 50, 60) of real-time conferencing between end-points.
Abstract:
Patching of software application. A software application is stored on a smart card as partitions and is loaded from the smart card into the memory of a host computer to which the smart card is connected. The software application is executed on the host computer; which using the instructions of the software application establishes a communications channel between the software application and a remote patch server containing a patch for at least one partition of the software application. Upon detecting that a patch is available for the at least one partition of the software application, downloading the at least one partition from the remote server into volatile memory allocated to the software application on the host computer via the first communications channel, and uploading the at least one partition from the volatile memory allocated to the software application to the smart card. Other systems and methods are disclosed.
Abstract:
A secure portable electronic device for providing secure services when used in conjunction with a host computer. The secure portable device includes a read-only memory partition, a read/write memory partition, and a secure memory partition. The secure portable device includes instructions stored in the read-only partition including a host agent containing instructions executable by the host computer. The secure portable device also includes instructions stored in the secure memory partition. These instructions include a card agent containing instructions executable by central processing units secure portable electronic device, and includes a card agent communications module for communicating with the host agent; and a security module for accessing private information stored in the secure memory partition. The host agent includes a host agent communications module for communicating with the card agent and at least one function requiring use of private information stored in the secure memory partition of the portable device and operable to transmit a request to the card agent to perform a corresponding function requiring the use of private information stored on the portable device.
Abstract:
The invention relates to a method for displaying content on a mobile communication terminal hosting a personal security token, said method consisting in displaying HTML pages (20, 21, 22, 23) which are linked together so as to constitute a path of pages in which an end-user person can progress according to choices made by the end-user person along such path, characterized in that the personal security token comprises an engine which identifies a command of a set of Sim Tool Kit Service Bytecodes (10, 11, 12, 13) on the basis of a said choice of the end-user person along the path and converts such identified command of the set of Sim Tool Kit Service Bytecodes (10, 11, 12, 13) into an HTML page (20, 21, 22, 23) to be displayed to the end-user person.
Abstract:
The invention relates to a personal token (PT) for a hosting telecommunication terminal (T) such personal token (PT) storing a secret master key and comprising a microprocessor and a software equipment for interpreting at least one incoming command so as to generate first derived key material on the basis of the stored secret master key and on the basis of the content of said incoming at least one command, said software equipment controlling interpretation of said command so as to determine whether said command indicates that the first derived key material should be delivered to the hosting terminal (T) or not, characterized in that the software equipment performs a checking task as to whether the command comprises a content which complies with a predetermined content format and refuses to proceed to delivery of the first derived key material in case said content does not comply with said content format.
Abstract:
A method for authenticating a user for use of a server computing device wherein the server computing device is connected by a network to a host device. Generating a key representation image having thereon a plurality of individual key images placed at random positions, each corresponding to a possible character value in an authentication phrase. Accepting a sequence corresponding to locations of mouse clicks representing user selections of character values in an attempted authentication phrase. Verifying that the sequence of location values corresponds to a correct authentication phrase by mapping the locations of the mouse clicks to the locations of the randomly placed key images. Alternatively, accepting a sequence corresponding to a transformation of personal identification number based on a random number and a numerical operation or selection in a matrix.
Abstract:
This invention relates to a method for replacing a collective key (K, Km) present in an authentication token by a diversified key (Kd1, Kd2, …, Kdn), said method comprising a first step which consists in acquiring a master key (Km), a second step which consists in acquiring a unique data identifying the token (Id1, Id2, …, Idn), and a third step which consists in performing a calculation on the basis of said a master key (Km) and said unique data (Id1, Id2, …, Idn) so as to provide a unique diversified key (Kd1, Kd2, …, Kdn) and store it in the token, characterized in that said first, second and third steps are performed in the token.
Abstract:
Updating system software of a resource-constrained device having a microprocessor. The system software is updated by embedding native code instructions in an application program that is downloaded onto the resource-constrained device. The native code instructions are selected from the instruction set requiring no processing prior to execution by the microprocessor. In response to detecting that an application contains embedded native code, passing the embedded native code directly to the microprocessor for execution.