Abstract:
The invention relates to a method for checking the integrity of a set of data packets received by a receiving communication device from a sending communication device, the data packets of the set being received in unpredictable order. The invention also relates to a communication device implementing a method according to the invention, in particular to a smart card.
Abstract:
A method of indicating that a phone number of at least one entry in an electronic phonebook of a device (6) belongs to a particular service provider is disclosed. The method includes applying (48) an indicium to the entry to indicate that the phone number belongs to the service provider. A subscriber identity module and a device that is capable of performing the method are also disclosed. A server for providing the subscriber identity module or the device with the relevant service provider information is also disclosed.
Abstract:
The invention relates to a personal token comprising a processing and a memory equipment, characterized in that it comprises a logic for interpreting a received command and deducing from said received command an expected upcoming command (B, C), said logic initiating a preparation (107,107a) of an answer (B', C') to the expected command (B, C) which preparation begins before said expected command (B, C) is received.
Abstract:
The invention relates to a resource constrained network device comprising detection means for detecting DOS attacks, and data-in interrupt means for notifying the device of network data input requests. The device comprises means to disable data-in interrupt means notifications when a DOS attack is detected.
Abstract:
The invention relates to a portable object having at least a contact interface flushing its surface, and to the coloration of such contact interface (10, 11). The method of coloration comprises the steps of : - applying a conductive coloured layer comprising a ITO ceramic on the whole surface of the contact interface (10, 11) and, - removing the applied layer at least in spaces (15) between the contacts (13) of the contact interface.
Abstract:
The invention relates to a mobile phone (100) comprising a user interface and communication means (150, 160), the mobile phone further comprising a bill inputting module (180), a bill archiving module (181), and a bill printing module (182).
Abstract:
A system and method for detecting network-based attacks on an electronic device. The system and method operable to detect network-based attacks on the electronic device comprising receiving data packets on the electronic device, tracking disposition of the data packets by the electronic device by recording one or more paths through a finite state machine model of the processing of data packets by the electronic device, and raising an alert that the electronic device is under a network-based attack based on patterns of the one or more recorded paths
Abstract:
The invention relates to a personal token (20) for playing Digital Rights Content on a mobile rendering device (10), the personal token (20) comprising a service key (SEKsim) for contributing to decryption of a traffic key which encrypts the Digital Rights content, the personal token (20) also storing a service key (SEKhandset) for the handset and delivering such service key (SEKhandset) to the handset for the handset to perform a contribution to decryption of the traffic key with the said service key (SEKhandset) of the handset. characterized in that the service key (SEKsim) of the personal token (20) remains secret to the handset.
Abstract:
The invention relates to a personal token (20) for playing Digital Rights Content on a mobile rendering device (10), the personal token (20) comprising a service key (SEKsim) for contributing to decryption of a traffic key which encrypts the Digital Rights content, the personal token (20) also storing a service key (SEKhandset) for the handset and delivering such service key (SEKhandset) to the handset for the handset to perform a contribution to decryption of the traffic key with the said service key (SEKhandset) of the handset. characterized in that the service key (SEKsim) of the personal token (20) remains secret to the handset.
Abstract:
One delay circuit is inserted in open loop inside a clock recovery circuit for improving the accuracy of clock recovery. One oscillator signal φ(0) to φ(2 i -1) is provided with a basic Step of Time. A rational number of Step of Time corresponding to a bit-duration is measured inside a received flow of bits. The oscillator signal φ(0) to j(2 i -1) is transformed into a clock signal CK having active edges of said clock signal in phase with at least one oscillator signal φ(0) to φ(2 i -1), two consecutive active edges being separated by a time duration proportional to the integer part of the number of Step of Time. A time delay is computed proportional to the fractional part of the number of Step of Time. The next active edge of the clock signal CK is delayed of said computed delay.