Abstract:
The invention concerns a particular structure of enhanced short message, and a method for synchronising and ensuring the security of exchanged enhanced short messages having this structure. Conventionally, an enhanced message is transmitted by a message service centre to a subscriber identification module (or SIM module) of a mobile station. The body (2) of this enhanced message contains in particular a first field (3) for remote commands pertaining to a remote application. This body (2) also contains a second field (4) for storing the current value of a synchronising counter, to be compared to a previous value of the synchronising counter, stored in the SIM module. The body (2) can contain another field (6) for storing a certificate, the body signature, for proving the authenticity of the enhanced message and the identity of its transmitter. The enhanced message is accepted or refused by the SIM module depending on the coherence of these values with the internal status of the SIM module.
Abstract:
The invention relates to a system for managing multiple subscriptions in a UICC, this system comprising a central server (90) able to manage subscriptions stored on a UICC (91) comprised in a mobile terminal in the field, at the request of a subscriber of one of these subscriptions. The management relates to temporarily or definitely blocking one or several subscriptions, blocking one or several services, deletion or encryption of data on the terminal etc. in case the terminal is lost or stolen.
Abstract:
L'invention concerne un procédé de protection d'un terminal de télécommunication comprenant un composant personnel nécessaire à l'accès réseau de télécommunication, de type carte à puce, le terminal comprenant une unité de traitement, au moins une mémoire de fonctionnement contenant les informations nécessaires au fonctionnement du terminal à savoir un programme de fonctionnement du terminal, et des données nécessaires à ce programme. Selon l'invention, le procédé consiste a) à chiffrer le contenu de la mémoire de fonctionnement du terminal de télécommunication, à partir d'une clé K prédéterminée nécessaire au déchiffrement, b) à permettre le déchiffrement par le terminal après : démarrage de ce dernier au moyen d'un programme de démarrage enregistré dans une mémoire sécurisée (21) et, calcul par ce dernier de la clé servant au déchiffrement.
Abstract:
The invention relates to a method of protecting a telecommunication terminal comprising a chip-card-type personal component which is required for telecommunication network access. The aforementioned terminal comprises a processing unit, at least one operating memory element containing the information necessary to the operation of the terminal, i.e. a terminal operating program, and the data necessary to said program. According to the invention, the method consists in: a) encrypting the contents of the operating memory element of the telecommunication terminal using a pre-determined key K which is necessary for decryption; and b) allowing the terminal to commence decryption once said terminal has been started up using a start-up program that is saved in a secure memory element (21) and once the key for decryption has been calculated by same.
Abstract:
The invention features a communication system comprising multiple terminal equipment (1), each consisting of a terminal (4) co-operating with a microprocessor-driven user card (SIM module; 5). Each user card includes data memorising means (8) comprising a plurality of objects and serving as medium to at least two separate applications, the user card comprising means (6, 7) for executing instructions pertaining to the applications. Each object contained in the user card data memorising means is associated with a first defined access control policy by a set of first access conditions. Each object is also associated with at least another access control policy defined by a set of at least one alternative access condition. Each alternative access condition is applicable, for the said object, to a group of at least one instruction pertaining to the application(s) using the said other defined access control policy. Each object is also associated with a plurality of access control policy indicators each indicating, for one of the applications, which access control policy to use with the application, the control access policy indicators being stored in the data memorising means (8).
Abstract:
The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.
Abstract:
L'invention porte sur un procédé de transmission sécurisée de données sur des connexions entre deux modules fonctionnels (CPU, PERIPH) d'un composant électronique, comprenant les étapes de: -codage injectif par un premier module, d'un message de k bits en un mot de code de n bits présentant un poids de Hamming constant de w; -émission du mot de code vers un second module; -génération d'un signal d'erreur lorsque le poids de Hamming du mot de code de n bits reçu par le second module est différent de w; -décodage en absence d'erreur; k, w et n sont des entiers ainsi définis : (I) . L'invention porte également sur un circuit électronique correspondant.
Abstract:
The invention concerns method for secure operation of a functional module in an electronic component. It consists for each operation of said module, in producing m correct executions and n dummy executions of said module, in random order.
Abstract:
The invention relates to a security token (ST) comprising: -a communication interface (USB-C, USB-DC) adapted to communicate with a host computer (HC); -a security module (SM), comprising encryption based security features (CR); -a non volatile memory (RO) storing at least an application (OA) to be uploaded and executed in a host computer, said application making use of said security features when executed in a host computer in communication with the communication interface. The security token is adapted (AMM) to modify the content of the application as uploaded or its execution parameters at successive connexions of the security token (ST) to a host computer (HC).
Abstract:
The present invention relates to a method for downloading a subscription from an operator to a UlCC (91) embedded in a terminal (92). According to the invention, the method consists in: - transmitting from the terminal (92) to a platform (90) an identifier and a request for downloading the subscription; - verifying in the platform (90) that this terminal (92) is authorized to download the subscription by verifying the rights (R) of the terminal (92) thanks to its identifier; - downloading the subscription to the UlCC (91) if the rights (R) are confirmed and, otherwise, refusing to download the subscription.