Abstract:
PROBLEM TO BE SOLVED: To provide a method for protecting a communication terminal (4) connecting to a module (5) used for identifying the user of a communication terminal.SOLUTION: A method includes: steps (10, 11) of securely loading a first program having a data collation key onto an identification information module; a step (12) of securely loading a second program linked with the first program onto a communication terminal; a transmission step (13) of transmitting a data collation key corresponding to the data collation key of the first program to the second program; a step of causing the communication terminal to store the transmitted collation key in a secure storage zone of the communication terminal; and a step (17) of transmitting, from the first program, an individual response to a request (step 14) from the second program only when verifying (steps 15, 16) that the second program effectively holds the data collation key.
Abstract:
An existing active base logic flow between a master transceiver and a slave transceiver, is selected as reference logic flow wherein is generated a set of concurrent logic flows. The concurrent logic flows are built with successive elementary packets segmenting pairs of command/response. An exchange of pairs of command/response is initialised and continued by the master transceiver on the basis of specific commands. The slave transceiver triggers a segmentation by transmitting specific responses on the reference logic flow.
Abstract:
An existing active base logic flow between a master transceiver and a slave transceiver, is selected as reference logic flow wherein is generated a set of concurrent logic flows. The concurrent logic flows are built with successive elementary packets segmenting pairs of command/response. An exchange of pairs of command/response is initialised and continued by the master transceiver on the basis of specific commands. The slave transceiver triggers a segmentation by transmitting specific responses on the reference logic flow.
Abstract:
Procedimiento de gestión de ficheros de registro en soportes físicos caracterizado porque comprende:a) la inscripción de ciertas informaciones de gestión de ficheros, llamadas IGR, en zonas de memoria contiguas a losregistros del fichero;b) la utilización de las IGR durante las operaciones de acceso al fichero;c) la actualización de ciertas IGR durante las operaciones de modificación de fichero, a condición de que, debido alhecho de que las IGF están contenidas en las mismas páginas que los registros, sólo se modifiquen esas páginas.
Abstract:
The invention concerns a method including a step of static analysis of the programme which determines its operational characteristics and which produces test requirements for evaluating the inaccurate operational characteristics, a step whereby the programme is subjected to a selection of tests consisting only of the tests and/or test fragments concerning the inaccurate operational characteristics, a step whereby the programme is subjected to a series of tests parameterized in accordance with the test requirements generated during the first step and a step whereby the operational characteristics of the programme are constituted from the characteristics determined by the static analysis, complemented by the operational characteristics evaluated following the tests.