Abstract:
PROBLEM TO BE SOLVED: To provide a method to secure an electronic assembly implementing any arbitrary algorithm against attacks by error introduction. SOLUTION: The method consists in performing an additional calculation using a verification function on at least one intermediate result in order to obtain a calculation signature and in performing at least once more all or part of the calculation in order to recalculate the signature and compare them in order to detect a possible error. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To eliminate a risk of an "n-order DPA (Differential Power Analysis)" attack for all values of n of a cryptographic electronic assembly or a system having a secret key or a private key. SOLUTION: A securing process for an electronic system includes a processor and a memory for packaging a cryptographic calculation procedure stored in a memory by use of the secret key. An intermediate result during an input or an output of at least one critical function about the procedure is masked. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To optimize a memory space occupied by data in a card. SOLUTION: Data of a first format being a service program is stored from one end part of a predetermined storage space of a memory (the data of first format is stored in Z2), a second format data being an index indicating a location of a command constituting the service program is stored from the other end part of the storage space (the data of second format is stored in Z3), and an empty space Z4 is formed between the areas Z2 and Z3. When deleting the service program stored so as not to be adjacent to the empty space Z4, data of the service program stored after the deleted service program is shifted only by the deleted data, and a value of an index corresponding to the shifted service program is changed in accordance with the shift. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To enable a game to be played without carrying money and to achieve excellent security against various kinds of fraudulentness. SOLUTION: In this IC card security system for a game, in an adder 30 for a game token, when a game token is increased, history information write part 31 writes history information to an IC card 50, whereby even if the game token is increased unfair, an IC card suspected to be unfair is detected based upon the contents of history information to inhibit the use. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an iterative procedure for converting a structurized software object into a raw data stream and vice versa, providing for their direct transfer, using simple communication reresources such as those of an embedded computer station, and reset of the software objects or reutilisation a memory space allocated to them. SOLUTION: The procedure is usable by an embedded platform 2 or a portable object including at least one processor capable of exchanging information with a terminal, in the form of linear data sequence. The procedure includes a step of converting a data set, in one direction or the other, between a linear data sequence arrangement on the one hand, and a structured arrangement describing or representing an object-oriented software object on the other hand. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and/or mechanism for selecting a next application to be run on a multi-application smart card. SOLUTION: A multi-application smart card has a persistent storage unit. The persistent storage unit stores information and/or data indicating which application is to run next when the smart card is inserted into a terminal. The persistent storage unit may indicate a same application, a different user-selected application, or an application selection application. Alternatively, the persistent storage unit may indicate the next application on a predefined list as the application to be run next. An application selection terminal allows a user to manually select a user-selected application. The terminal may initiate communication with the smart card by sending a special, predefined signal to the smart card. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide the method of manufacturing an integrated circuit card capable of preventing short between adjacent conductor tracks when forming the conductor track of a conductive polymer by silk screen printing. SOLUTION: When the conductor track of a conductive polymer is formed. the track is made to be curved and inclined with an angle other than 90° to a reference direction by moving a scraper on a screen along at least one reference direction. This provides an escape length portion for expanding a track segment in a direction substantially equal to the reference direction. Thus, the conductive polymer in the shape of fluid is lead to the escape length portion. This makes it possible to avoid the formation of such flash as going to the adjoining conductor track. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
The invention relates to a document comprising a cover (1), at least one internal page (2-1, 2-2, 2-3), a radiofrequency microcontroller (3) and an antenna (4) electrically connected to contact pads of said microcontroller (3). The invention is characterised in that said document further comprises an electromagnetic shield (6) capable of disrupting, at least partially, the wireless communication with said microcontroller when the document is closed. The invention applies, in particular, to an electronic passport.
Abstract:
a invenção resolve o problema de marcação de imagem sistemática de objetos de comunicação portáteis, tais como cartões inteligentes ou terminais móveis, envolvidos em uma campanha em uma base de dados (bd) conectada a um servidor de download, liberando, dessa forma, o servidor, o acesso a um objeto de comunicação (gn) alvejado pela campanha é autorizado por uma operação de unidade única, enquanto o servidor (sac) gerencia o processamento prévio de dados para o objeto de comunicação durante a campanha, e é inibido para uma operação de unidade única referente a um objeto alvejado pela campanha quando o acesso é solicitado quando o servidor gerencia durante a campanha a transmissão da mensagem de dados para o objeto de comunicação, o reconhecimento transmitido pelo objeto de comunicação e o processamento posterior de dados relativos ao objeto de comunicação.