Abstract:
The invention relates to a method for processing a recurring transaction for access to a good or to a service by a transactional processing device (DTT), the method comprising an initial step for obtaining a piece of data representing a processing instruction (iTrR) for processing a recurring transaction (TrR), the method being characterized in that it comprises: a step (100) for transmitting a message (Msg) of interrogation of a given type, said message (Msg) comprising at least one piece of identification data (Id) for identifying said recurring transaction, to a terminal (TermU) of a user having previously taken out a subscription for said good or said service; a step (110) for inserting said recurring transaction into a deferred processing database (BT-TD); transactional processing (120), depending on the occurrence of at least one of the following events: reception (130) of a message (Msg2) from said terminal (TermU) of said user; expiry of the deadline for carrying out said recurring transaction (140).
Abstract:
A mobile electronic payment terminal includes a reversible fixed attachment to a support. The electronic payment terminal also includes a command module, which commands unlocking of the reversible fixed attachment enabling the mobile electronic payment terminal to be detached from the support.
Abstract:
A capsule is provided that aligns with at least one light source. The capsule includes a rim having its opaqueness interrupted to as to form at least four transparent portions. The capsule is capable of being oriented according to at least two positions: a first position in which two of the at least four portions, simultaneously let through light coming from the at least one light source; and a second position in which the rim blocks light coming from the at least one light source.
Abstract:
The disclosure relates to a method for transmitting data and to a corresponding method for receiving data. According to the disclosure, in the method for transmitting data, a cryptographic processing operation is performed on the data to be transmitted, after this data has been pre-subdivided into blocks of data, and a tag representing each block of encrypted data is computed. The tag is then transmitted in such a way that a hacker in not able to reproduce a correct transmission of tags. The method of reception, for its part, ensures that when an incorrect tag is received (because of a hacking attempt), the processing of the data blocks is not immediately stopped but a differential processing is implemented in order to jam an attempt to analyze the behavior of the receiver.
Abstract:
A method for loading an information-processing resource by a device having a processor and a random-access memory having the steps of: obtaining at least one address corresponding to at least one block of data within which the resource is at least partially recorded; and for said at least one previously obtained current address: loading a current block of data as a function of said current address; obtaining at least one reference certificate of the current block of data; obtaining at least one current certificate of the current block of data, said reference and current certificates being encrypted digital signatures of said current data block; issuing an assertion of validity as a function of said reference and current certificates when said reference and current certificates are identical; copying said current data block into the random-access memory, when said assertion of validity is positive.
Abstract:
The invention relates to a method for transmitting a message, said message coming from a server of a merchant, who wishes to transmit this message to a user having a communications terminal. According to this method, said message is transmitted to said communications terminal indirectly by using at least one data transmission service proper to a server of a banking institution with which said user possesses a bank account.
Abstract:
The invention relates to a method for transmitting data implemented between a terminal and an integrated circuit, said terminal and said integrated circuit communicating by means of an interface for transmitting and receiving data. According to the invention, said method comprises at least one iteration of the following steps, implemented by the terminal, generating (10) a command intended for said integrated circuit, said command comprising a command header; encrypting (20) said command (CX), delivering an encrypted command (CC); creating (20) a second command (CY), said command comprising a command header and data, said data being constituted at least partly by said encrypted commands (CC); transmitting (40) said second command (CY) to said integrated circuit.
Abstract:
A housing of a terminal is formed by at least one lower cover and an upper cover. The housing the lower cover and upper cover are fixed together in an articulated manner, the articulated fixing being able to take up at least one position closing the housing and a position opening the housing, in which the lower cover and upper cover are joined together.
Abstract:
Component for the protection of sensitive signals, corresponding device and method, wherein the invention relates to an electronic component that comprises: an envelope forming a package; a printed circuit board; and a plurality of balls integrated into a ball grid array (BGA); said printed circuit board comprising at least one circuit defining at least one guard ring.
Abstract:
A method is provided for detecting a fraudulent electronic payment terminal. The method includes an act, implemented by a mobile terminal independently and prior to a transaction phase, of generating an alarm indicating that the electronic payment terminal is fraudulent. The act of generating an alarm is activated: when no message coming from the electronic payment terminal is received by the mobile terminal before expiry of a predetermined timeout period; or when a phase of verifying a response, received from the electronic payment terminal to a challenge sent out by the mobile terminal delivers a negative verification result, the act of verification being implemented by the mobile terminal.