Abstract:
A method for transferring data from a server to at least one mobile station is disclosed. The method includes the server sending a notification to the mobile station for informing the mobile station that there is data to be transferred to the mobile station, the mobile station sending a request to the server for requesting the server to transfer data to the mobile station and the server sending a response to the mobile station for transferring data to the mobile station. A mobile station and a server for implementing the method are also disclosed.
Abstract:
Role-based hierarchical access control system and method. A computer system having a data storage capacity and a central processing unit and at least one resource has an access control data structure defining role-based access control lists for the resource, wherein the access control list defines based on the role of a user the types of access that the user may have to the at least one resource. A hierarchy of roles having at least a first role and a second role wherein the second role inherits the permissions granted to the first role for the at least one resource. Access to the resource is determined by comparing roles defined to have access privileges to the resource and the permissions granted to such roles to the role of an entity seeking access to the resource.
Abstract:
The invention relates to a computer comprising a local server and a local client. The local server is arranged to serve the local client. The computer is connectable to a network. The local server comprises a prevention module for preventing DOS attacks. The prevention module is set to forbid network access to the local server from outside the computer.
Abstract:
The invention relates to a system comprising a network device (NSC), a host computer (HOST) and a remote server (SRV). The host computer (HOST) and the network device (NSC) are connectable through a network. The host computer (HOST) and the remote server (SRV) are connectable through the Internet. The network device (NSC) comprises a web server accessible from the host computer (HOST). The network device (NSC) is set to store a user's authentication credential. The host computer (HOST) is set to display a web page produced by the remote server (SRV) to the user. The remote server (SRV) is set to include a login link in said web page, the login link pointing to said web server. The web server is set to display a login page to the user on the host computer (HOST) when the user clicks on said login link, in order to authenticate the user. Upon authentication of the user, the network device (NSC) is set to send the user's authentication credential to the remote server (SRV) in order to authenticate the user to the remote server (SRV).
Abstract:
The invention relates to a clamshell mobile phone (100) suitable for payment transactions. The clamshell mobile phone (100) comprises an inner part and an outer part, and has a regular user interface comprising hardware components (110-114) located on one part of the clamshell mobile phone (100). The clamshell mobile phone (100) further comprises a secure user interface dedicated to payment transactions, which hardware components are located on the other part of the clamshell mobile phone (100).
Abstract:
Secure authentication of a user on a host computer to a web server including a security device acquiring trust or a security context from the web server. The security device is operable of providing an X.509 certificate to a browser plug-in on the host computer. The browser plug-in on the host computer performing authentication of the security device and in response providing user credentials to the security device. The security device performing authentication of the user and requests a security context from the web server. In response, the web server provides a security context to the security device. The security device delegates the web server trust by transmitting the context to the host computer and enabling the user to securely access resources on the web server.
Abstract:
Secure authentication of a user on a host computer to a web server including a security device acquiring trust or a security context from the web server. The security device is operable of providing an X.509 certificate to a browser plug-in on the host computer. The browser plug-in on the host computer performing authentication of the security device and in response providing user credentials to the security device. The security device performing authentication of the user and requests a security context from the web server. In response, the web server provides a security context to the security device. The security device delegates the web server trust by transmitting the context to the host computer and enabling the user to securely access resources on the web server.
Abstract:
A method for authenticating a user for use of a server computing device wherein the server computing device is connected by a network to a host device. Generating a key representation image having thereon a plurality of individual key images placed at random positions, each corresponding to a possible character value in an authentication phrase. Accepting a sequence corresponding to locations of mouse clicks representing user selections of character values in an attempted authentication phrase. Verifying that the sequence of location values corresponds to a correct authentication phrase by mapping the locations of the mouse clicks to the locations of the randomly placed key images. Alternatively, accepting a sequence corresponding to a transformation of personal identification number based on a random number and a numerical operation or selection in a matrix.
Abstract:
The invention concerns a visual inspection system and process for electronic modules. More specifically it concerns the automatic visual inspection of electronic modules both on their contact face and on their chip face, before they are transferred to a card. The inspection of the contact face and of the chip face may be performed simultaneously or independently. The system comprises a first subsystem (Sl) dedicated to inspecting the contact face of the modules and a second, independent subsystem (S2), dedicated to inspecting the chip face of the modules. Each subsystem (Sl ; S2) comprises at least two cameras (11, 12 ; 13, 14), each camera being able to display the face dedicated to it of each module (21) positioned in a row (22) of modules of the microelectronic strip (20); a lighting bank (15 ; 16) for the microelectronic strip (20), and calculation means (40 ; 45) capable of delivering, based on the images captured by the cameras (11, 12 ; 13, 14), a diagnostic concerning whether or not there are defects present and a characterization of the defects .
Abstract:
The invention concerns a method to manufacture a component, such as a silicon wafer-based microcontroller, integrated circuit or equivalent (1, 14, 20), applicable in particular to smart cards, characterised in that means (18) are planned to destroy or damage said component in the event of an attempt to thin the silicon wafer; in particular, sais means can act on the polarisation of said wafer; in particular, the silicon substrate wafer is polarised from the back side (17) only. The invention also concerns a component so manufactured and a smart card including such components.