Abstract:
A method and a payment terminal enable verification of the authenticity of a payment terminal. More particularly, a method is provided for processing a piece of initial data, carried out within the payment terminal, the payment terminal being configured to authorize a verification of its authenticity by using the piece of initial data. The method includes: obtaining at least one piece of information external to the payment terminal, called a piece of initial data; cryptographic processing of the piece of initial data, delivering a piece of processed data; visual and/or sound rendering of the piece of processed data.
Abstract:
A method for securing at least one memory zone of an electronic device. The method includes: detecting deallocation of at least one portion of the memory zone, a so-called deallocated portion; replacing at least one part of the deallocated portion with at least one predetermined instruction, a so-called warning instruction, or at least one combination of predetermined instructions, a so-called warning instruction combination; and marking the deallocated portion.
Abstract:
A method is provided for authenticating a user's communications terminal with an authentication server connected to a gateway terminal by using a communications network. The method includes: obtaining a piece of data representing an identity of the user from the gateway terminal; configuring, by the authentication server, a data transmission link between the authentication server and the terminal, using a predefined data transmission interface of the gateway terminal and as a function of the piece of data representing the identity of the user; transmitting, by the authentication server, to the terminal, a piece of encrypted data for checking authentication, using the data transmission link; receiving, by the authentication user, coming from the terminal, a piece of encrypted data for counter-checking authentication; issuing an assertion of authentication of the user when the piece of data for the counter-checking of authentication corresponds to the piece of data for checking authentication.
Abstract:
A method for securing at least one memory zone of an electronic device. The method includes: detecting deallocation of at least one portion of the memory zone, a so-called deallocated portion; replacing at least one part of the deallocated portion with at least one predetermined instruction, a so-called warning instruction, or at least one combination of predetermined instructions, a so-called warning instruction combination; and marking the deallocated portion.
Abstract:
It is proposed a device and method for finding nilcatenations, and proposes nilcatenation detection techniques, which can be applied to blockchains, and even constitute a proof of useful work, as the periodic removal of nilcatenations keeps a ledger size as small as possible. Banks and blockchains need to keep track of an ever-increasing list of transactions between the accounts owned by their users. However, as time goes by, many of these transactions can be safely “forgotten”, in the sense that purging a set of transactions that compensate each other does not impact the network's semantic meaning i.e. the vector Bt of amounts representing the balances of users at a given point in time t. Nilcatenation refers to a collection of past transaction vectors having no effect on Bt. Removing these transactions yields a smaller, but equivalent set of transactions.
Abstract:
A method is provided for detecting a risk of replacement, at a sales point, of an authentic electronic payment terminal by a fraudulent electronic payment terminal. Wherein the method includes generating an alert when a number of transactions geographically associated with the sales point is above a pre-determined threshold.
Abstract:
The invention relates to a method for transmitting data from a first terminal, called a sender terminal (TermE), to a second terminal, called a receiver terminal (TermR), the method being characterized in that it comprises: a step (100) for obtaining a piece of current time data (DTC); a step (110) for determining a piece of transmission time data (DTC) as a function of the piece of current time data (DTC) and at least one predetermined parameter; a step (120) for obtaining a piece of data to be encrypted (DaCh) from at least one piece of data to be transmitted (DaTr) and from at least one piece of current time data (DTC); a step (130) for encrypting, by means of an encryption key (KeyC), said preliminarily obtained piece of data to be encrypted (DaCh), this step delivering a piece of encrypted data (DCh); a step for transmitting said piece of encrypted data (DCh) as a function of said piece of transmission time data (DTT).
Abstract:
A method of encryption of a message implemented by an electronic encryption device. The method includes: obtaining a current message; obtaining a current encryption key; determining, from a plurality of variants a basic encryption protocol, of a current variant of the encryption protocol; encrypting, by using the current variant and the encryption key, the message to be encrypted, delivering an encrypted message; and transmitting the encrypted key.
Abstract:
A mobile communications terminal, namely a terminal of the type having a screen, at least one radio communications component and at least one wireless charging terminal. The terminal furthermore includes a component for transmitting an F2F signal by using the at least one wireless charging coil.
Abstract:
A method and a payment terminal enable verification of the authenticity of a payment terminal. More particularly, a method is provided for processing a piece of initial data, carried out within the payment terminal, the payment terminal being configured to authorize a verification of its authenticity by using the piece of initial data. The method includes: obtaining at least one piece of information external to the payment terminal, called a piece of initial data; cryptographic processing of the piece of initial data, delivering a piece of processed data; visual and/or sound rendering of the piece of processed data.