Abstract:
Mutual authentication between: (i) a user terminal cooperating with a security element and an application for registering with a service, and (ii) a remote server that provides the service, by means of a third-party portal, includes: i) transmitting, to the remote server by means of the portal, signed information R enabling the security element to be authenticated in the remote server; ii) authenticating the security element in the remote server; iii) transmitting a value R′ signed by the remote server to the application by means of the portal; iv) transmitting a request for verification of the signed value R′ from the application to the security element; v) verifying, in the security element, the signature of the remote server and whether the requested service has been granted by the remote server; vi) establishing a secure connection with the remote server using the security element, and requesting that the service be executed.
Abstract:
The invention is a method for authenticating a device which comprises a chip and a body carrying the chip. The body comprises a graphical security feature. The method comprises the steps of: running a first physical unclonable function for generating a first response representative of the chip, extracting a first reference from the graphical security feature, authenticating the device by checking that said first response and first reference are linked by a preset mathematical function. The extracting step and the authenticating step are carried out by a machine distinct from the device.
Abstract:
The invention relates to a method for authenticating a user when accessing to an application securely stored on a secure element of a portable device, said method comprising a step of authenticating the user via two authentication factors. The method comprises requesting a further authentication factor to said user, in a form of challenge-response based on a randomised request associated to a biometric data of said user.
Abstract:
A device having a card (40) and a support (PC). The card has (a) no internal battery, (b) a single antenna (10) that receives electromagnetically data and power, (c) a data processor, (d) rectifying and filtering circuitry receiving the electromagnetic input and supplying at output terminals (A, B) a voltage to the processor. and (e) two terminals (36, 38) on an external surface of the card which are connected to the output terminals (A, B). The support is mechanically and electrically connectable to the card. It has (a) a power source that may be a battery, (b) surface terminals that mate with the card's external terminals, (c) a switch for connecting the power source to the surface terminals, and (d) a mechanism for holding together the card and support with the card's and the support terminal's electrically engaged to one another.
Abstract:
The invention relates to a system (1) for issuing electonic money, transfering said money from an e-Money sender (30) to an e-Money receiver (40) and compensating said money, said system comprising an issuer (10) or e-Money Issuer for issuing said electonic money, characterized in that it comprises at least one regulated entity (60), so that the issuance of the electonic money is regulated, and the transfer and subsequent usage or misuse of the e-money is monitored.
Abstract:
The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.
Abstract:
A method is intended for transforming a secure electronic device, associated to a first identifier and having a sensitive mode disabled after production, for a new sensitive use. This method comprises the steps of: (i) externally computing a cipher of the first identifier with a predetermined function fed with this first identifier and a predetermined secret key; (ii) transforming an accessible metal layer of the electronic device to form an activation pattern representing this externally computed cipher of the first identifier; (iii) getting a value representative of this activation pattern into the electronic device; and (iv) computing a second identifier with this transformed electronic device by feeding a reverse function of the predetermined function with this value and this secret key, to trigger a comeback to the sensitive mode if this second identifier is equal to the first identifier.
Abstract:
The present invention relates to a method to securely and asynchronously provisioning keys from one source secure device to a target secure device through a key provisioning server for which the keys to be provisioned through the method remain unknown.
Abstract:
A device having a card (40) and a support (PC). The card has (a) no internal battery, (b) a single antenna (10) that receives electromagnetically data and power, (c) a data processor, (d) rectifying and filtering circuitry receiving the electromagnetic input and supplying at output terminals (A, B) a voltage to the processor. and (e) two terminals (36, 38) on an external surface of the card which are connected to the output terminals (A, B). The support is mechanically and electrically connectable to the card. It has (a) a power source that may be a battery, (b) surface terminals that mate with the card's external terminals, (c) a switch for connecting the power source to the surface terminals, and (d) a mechanism for holding together the card and support with the card's and the support terminal's electrically engaged to one another.
Abstract:
Privacy-preserving smart metering for a smart grid. Issuing a privacy-enhanced credential to a consumer node having smart meter. Operating the consumer node to associate an id with the credential and to use the id to report usage. Other systems and methods are disclosed.