Abstract:
A method for encrypting a piece of payment means data is disclosed. This method is implemented by a payment means having a data processor. Such a method has at least one iteration of the following steps: obtaining a current piece of payment means data from a memory of the payment means; generating a following piece of payment means data as a function of the current piece of payment means data and as a function of an encryption key of the payment means; replacing the current piece of payment means data by the following piece of payment means data within the memory of the payment means.
Abstract:
The invention relates to a magnetic reading head to be mounted in a terminal, said head having a generally rectangular parallelepiped shape and comprising a face for reading data coming from a magnetic stripe, said face comprising at least one component for reading data coming from a magnetic stripe.According to the invention, such a magnetic reading head comprises at least one flexible printed circuit board for protection against electromagnetic disturbances, said flexible printed circuit board being positioned on at least one face different from said reading face.
Abstract:
The disclosure relates to a method for transmitting data and to a corresponding method for receiving data. According to the disclosure, in the method for transmitting data, a cryptographic processing operation is performed on the data to be transmitted, after this data has been pre-subdivided into blocks of data, and a tag representing each block of encrypted data is computed. The tag is then transmitted in such a way that a hacker in not able to reproduce a correct transmission of tags. The method of reception, for its part, ensures that when an incorrect tag is received (because of a hacking attempt), the processing of the data blocks is not immediately stopped but a differential processing is implemented in order to jam an attempt to analyze the behavior of the receiver.
Abstract:
The invention relates to a method for transmitting data implemented between a terminal and an integrated circuit, said terminal and said integrated circuit communicating by means of an interface for transmitting and receiving data. According to the invention, said method comprises at least one iteration of the following steps, implemented by the terminal, generating (10) a command intended for said integrated circuit, said command comprising a command header; encrypting (20) said command (CX), delivering an encrypted command (CC); creating (20) a second command (CY), said command comprising a command header and data, said data being constituted at least partly by said encrypted commands (CC); transmitting (40) said second command (CY) to said integrated circuit.
Abstract:
The invention relates to a device for processing data coming from a contactless memory card, said device comprising at least one contactless memory card reader. Such a device comprises:means for acquiring input data coming from an input peripheral;means for processing at least one sequence of a remote transaction initialized on the basis of data coming from a contactless card;means for selecting a mode of operation comprising at least two states: a state, called an inactivation state, in which said processing means and said at least one memory card reader are inactive; a state, called an activation state, in which said processing means are active and in which the input data entered through said input peripheral are controlled by said processing means.
Abstract:
A method for controlling access to preliminarily identified resources is disclosed. The method is implemented by an electronic device having means of access to said resources to be controlled. The method has: a step for receiving a request, coming from a program, for access to a current resource; a step for obtaining at least one access parameter for access to said current resource within a resource-characterizing data structure; and a step for modulating access to said current resource as a function of said at least one preliminarily obtained access parameter.
Abstract:
The proposed technique relates to a method for securing a confirmation of a sequence of characters (SEQ) entered by a user on an electronic data entry device comprising an unsecured processor and a secured processor. This method, implemented in the secured processor, comprises determining a processing operation to be applied to said sequence of characters (SEQ), as a function of a signal (SIG_V) representing a confirmation, by the user, of the sequence of characters (SEQ), the signal (SIG_V) representing a confirmation being delivered by a confirmation means belonging to a set comprising at least two distinct confirmation means.
Abstract:
The invention relates to a method for transmitting data from a first terminal, called a sender terminal (TermE), to a second terminal, called a receiver terminal (TermR), the method being characterized in that it comprises: a step (100) for obtaining a piece of current time data (DTC); a step (110) for determining a piece of transmission time data (DTC) as a function of the piece of current time data (DTC) and at least one predetermined parameter; a step (120) for obtaining a piece of data to be encrypted (DaCh) from at least one piece of data to be transmitted (DaTr) and from at least one piece of current time data (DTC); a step (130) for encrypting, by means of an encryption key (KeyC), said preliminarily obtained piece of data to be encrypted (DaCh), this step delivering a piece of encrypted data (DCh); a step for transmitting said piece of encrypted data (DCh) as a function of said piece of transmission time data (DTT).