Abstract:
The disclosure relates to a method for transmitting data and to a corresponding method for receiving data. According to the disclosure, in the method for transmitting data, a cryptographic processing operation is performed on the data to be transmitted, after this data has been pre-subdivided into blocks of data, and a tag representing each block of encrypted data is computed. The tag is then transmitted in such a way that a hacker in not able to reproduce a correct transmission of tags. The method of reception, for its part, ensures that when an incorrect tag is received (because of a hacking attempt), the processing of the data blocks is not immediately stopped but a differential processing is implemented in order to jam an attempt to analyze the behavior of the receiver.
Abstract:
A method for encrypting a piece of payment means data is disclosed. This method is implemented by a payment means having a data processor. Such a method has at least one iteration of the following steps: obtaining a current piece of payment means data from a memory of the payment means; generating a following piece of payment means data as a function of the current piece of payment means data and as a function of an encryption key of the payment means; replacing the current piece of payment means data by the following piece of payment means data within the memory of the payment means.
Abstract:
A method for securing the processing of transactional data is disclosed. The method is implemented within a communications terminal comprising a transactional data processing module. The method has: a step for the detection, by the processing module, of a display of at least one entry area relating to a piece of payment means data; a step for the activation, by the processing module, of a contactless data reading module; a step for the obtaining, by the contactless data reading module, of at least one piece of payment means data coming from a payment means; and a step for the furnishing, at said at least one entry area, of at least one piece of payment means data previously obtained.
Abstract:
A method for controlling access to preliminarily identified resources is disclosed. The method is implemented by an electronic device having means of access to said resources to be controlled. The method has: a step for receiving a request, coming from a program, for access to a current resource; a step for obtaining at least one access parameter for access to said current resource within a resource-characterizing data structure; and a step for modulating access to said current resource as a function of said at least one preliminarily obtained access parameter.
Abstract:
The proposed technique relates to a method for securing a confirmation of a sequence of characters (SEQ) entered by a user on an electronic data entry device comprising an unsecured processor and a secured processor. This method, implemented in the secured processor, comprises determining a processing operation to be applied to said sequence of characters (SEQ), as a function of a signal (SIG_V) representing a confirmation, by the user, of the sequence of characters (SEQ), the signal (SIG_V) representing a confirmation being delivered by a confirmation means belonging to a set comprising at least two distinct confirmation means.