Patent application number | Description | Published |
20080218347 | SECURING METHOD AND MOBILE DEVICE THUS SECURED - A method and apparatus are provided for securing a mobile digital processing device. The method includes: a protective step that is self-activated when the mobile device measures an evolutionary value approaching a threshold value and wherein the mobile device executes a protective action; and includes a step of self-setting the evolutionary value when the mobile device and a holder associated therewith are detected in a common vicinity. The evolutionary value is positioned at a value remote from the threshold value, so as to allow the evolutionary value to approach the threshold value naturally, when the mobile device and the holder are no longer detected in a common vicinity. | 09-11-2008 |
20080232582 | Method for Dynamically Authenticating Programmes with an Electronic Portable Object - A method for dynamically authenticating an executable program, that is the continuation of the instructions defined thereby, is performed repeatedly during the very execution of the program. The method for making secure an electronic portable object through execution of a program supplied by another insecure electronic object uses, inter alia, a secret key protocol. | 09-25-2008 |
20080257954 | PAYMENT TERMINAL, AND ASSOCIATED METHOD AND PROGRAM - An electronic payment terminal includes a data entry device, a processor and a memory. The memory contains a structure arranged to list at least one customer identifier, a personal identification number and an amount, all associated. The memory also contains a program having comprising instructions for storing, in an example of the structure after entry, the customer identifier and the personal identification number. The same example of the structure is then updated locally by payments out and in made on the terminal on behalf of the customer identified. | 10-23-2008 |
20090095808 | METHOD FOR MANUFACTURING A PORTABLE PAYMENT TERMINAL, CORRESPONDING TERMINAL, DEVICE AND BATTERY - A method is provided for manufacturing a payment terminal. The method includes: obtaining a dedicated battery with a predetermined complex shape adapted for cooperating with the shape of at least one other adjacent component of said terminal; and assembling the components of said terminal, including positioning said battery in an imbricated way with said adjacent component(s). | 04-16-2009 |
20090095809 | METHOD OF TRANSMITTING A SECRET CODE, CARD READING TERMINAL, MANAGEMENT SERVER AND CORRESPONDING COMPUTER SOFTWARE PROGRAMMES - A method and apparatus are provided for transmitting a secret code of a new microprocessor card held by a user. The method includes: insertion by the user of the new card into a card reading terminal; sending a request to obtain the secret code by the card reading terminal to a management server; and transmission by the management server, via a communication network, of the secret code or of an item of information permitting the secret code to be obtained, to a communication terminal of the user. | 04-16-2009 |
20090097714 | BIOMETRIC AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, CORRESPONDING PROGRAM AND TERMINAL - A biometric authentication method if provided for an individual to be authenticated amongst a very large quantity of individuals with an authentication system storing a set of reference information each associated to one of the individuals. The reference information is distributed across a plurality of sub-databases. The method includes a phase of adding reference information representative of a new individual, including selecting the sub-database that is best adapted to store the reference information to be added. A phase of authentication includes: provision by the individual of authentication biometric information and of an identifier forming addressing information, designating at least one of said sub-databases likely to contain the reference information representative of said individual; and searching amongst the reference information stored by the authentication system, of reference information corresponding to the individual, the searching being carried out on a subset of said set of reference information, identified by the addressing information. | 04-16-2009 |
20090100240 | AUTHENTICATION METHOD, CORRESPONDING PORTABLE OBJECT AND COMPUTER SOFTWARE PROGRAM - A method is provided for authenticating a carrier of a portable object having a memory for memorising at least one item of secret information. The method includes: authentication processing of a signature provided by said carrier, taking account of said secret information; supplying an item of information for the authentication decision, positive or negative, implementing, in a non volatile memory of said portable object, an incorrect signature indicator which may adopt a value indicating a normal situation and at least one value indicating an abnormal situation. The step of implementing including: after said information supplying step, writing, in said incorrect signature indicator, a value indicating an abnormal situation, if said authentication decision is negative; and before said authentication step, and if said incorrect signature indicator contains a value indicating an abnormal situation, a step generating a delay. The writing step also includes memorising at least one item of context-related information. | 04-16-2009 |
20090100269 | BIOMETRIC AUTHENTICATION METHOD, COMPUTER PROGRAM, AUTHENTICATION SERVER, CORRESPONDING TERMINAL AND PORTABLE OBJECT - A biometric authentication method and apparatus are provided. A user to be authenticated uses a portable object including at least one biometric sensor. The portable object is adapted to cooperate with a terminal. The method includes: capturing, by the portable object, a biometric sample to be compared coming from the user to be authenticated; transmitting, by the portable object, the biometric sample, in a secure form to an authentication server; and determining, by the authentication server, a signature to be authenticated using said biometric sample, then comparing the signature with a reference signature. | 04-16-2009 |
20090151010 | TERMINAL THEFT PROTECTION PROCESS, AND CORRESPONDING SYSTEM, TERMINAL AND COMPUTER PROGRAM - A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected. | 06-11-2009 |
20090172268 | METHOD FOR SECURING A MICROPROCESSOR, CORRESPONDING COMPUTER PROGRAM AND DEVICE - A method is provided for securing a microprocessor containing at least one main program, which operates with at least one memory. The method includes implementing counter-measures, during which additional operations, that are not required for the main program, are implemented so as to modify the consumption of current and/or the processing time of the microprocessor. The method also includes: identification of at least one address or one memory zone of the memory(ies), called critical addresses, and which contain, or which may contain, critical data for said main program; monitoring the addressing ports of the memory(ies), so as to detect the access to the critical address(es); and activation of the step of implementing counter-measures, when an access to the critical address(es) is detected. | 07-02-2009 |
20090200372 | METHOD FOR AUTHENTICATING MICRO-PROCESSOR CARDS, CORRESPONDING MICRO-PROCESSOR CARD, CARD READER TERMINAL AND PROGRAMS - A method is provided for authenticating micro-processor cards to determine whether a card is a genuine card or a fake card. Authentication is performed by a checking program of at least one card reader terminal. The program sends to each card commands belonging to a standard and public set of commands. The method includes: modifying the checking program in the terminal or terminals, in such a way that the program additionally sends, to each card to be authenticated, at least one additional command, called a secret command, from a set of at least one additional command, pre-inserted into each genuine card, and different from the standard and public set of commands; and a step of detecting authenticity of the card, if the secret command is recognised and/or processed correctly, or the presence of a clone, if the secret command is not recognised and/or is processed wrongly. | 08-13-2009 |
20090204952 | METHOD OF SECURING A COMPUTER PROGRAM. AND CORRESPONDING DEVICE, METHOD OF UPDATING AND UPDATE SERVER - A method for securing use of a primary computer program driving at least one data receiving and delivery device. The method implements a secondary computer checking program, different from the primary program and capable of delivering the same output data as at least a portion of the primary program, referred to as the critical portion, in the presence of identical input data. The following steps are performed when at least one of the critical portions of the primary program is activated: executing the critical portion, delivering first output data based on input data; executing the checking program, delivering second output data based on the input data; comparing the first and second output data and generating anomaly information, if the first and second output data are different; transmitting the anomaly information to a remote server; and continuing the primary program, based on the first and second output data. | 08-13-2009 |
20090207021 | TRACEABILITY METHOD FOR AN ELECTRONIC PAYMENT TERMINAL IN THE EVENT OF A THEFT THEREOF, AND CORRESPONDING COMPUTER PROGRAM - A traceability method is provided for an electronic payment terminal, in the event of a theft thereof. The method includes the following steps: detection of a lack of contact with a base and/or another terminal associated with the terminal, for a predetermined time span, generating a passage of the terminal into a stolen state; and in the stolen state, storage, in a secure memory area of the terminal, of a series of successive tracking data each associated with time stamp information, so as to enable reconstruction of a route followed by the terminal. | 08-20-2009 |
20090230180 | TERMINAL, METHOD OF CHECKING CONFORMITY OF AT LEAST ONE REMOVABLE BATTERY OF AN ELECTRONIC PAYMENT TERMINAL, AND THE CORRESPONDING REMOVABLE BATTERY AND COMPUTER PROGRAM PRODUCT - A portable electronic payment terminal is provided, which includes at least one removable battery. The removable battery carries an electronic chip containing at least one item of identification information and is able to communicate with a contactless reading device present in the terminal. The terminal further includes: a transmitter for transmitting the identification information to a distant control server of the terminal manufacturer; and a receiver for receiving from the server conformity or non-conformity information according to whether the identification information belongs to a list approved by the manufacturer. | 09-17-2009 |
20090260084 | METHOD FOR VERIFYING CONFORMITY OF THE LOGICAL CONTENT OF A COMPUTER APPLIANCE WITH A REFERENCE CONTENT - A computer appliance and method are provided. The computer appliance includes a processor, a memory in which the processor can read and write, and an input/output device for interfacing the appliance processor with the outside world. In order to verify conformity of the logical content of the appliance with the reference content, the method includes sending to the appliance a request for loading into the memory and executing a verification program. The verification program is capable or writing data into the memory of the appliance and of reading data in the memory to send them to the input/output device. Then, the method includes sending to the appliance a request for executing the program to saturate the memory available not taken up by the program. Finally, it includes exchanging messages with the appliance by executing the program. Based on the exchanged messages, the conformity of the logical content of the appliance is verified. | 10-15-2009 |
20100030696 | BIOMETRIC ELECTRONIC PAYMENT TERMINAL AND TRANSACTION METHOD - An electronic payment terminal includes a device for acquiring biometric data and a program capable of: acquiring biometric data during a transaction by a biometric data acquisition device; and storing the biometric data in the payment terminal. A corresponding transaction method is also provided. | 02-04-2010 |
20100044425 | METHOD OF PRINTING RECEIPTS - An electronic payment terminal and method are provided for printing tickets. The method includes: carrying out payment transactions with the terminal; after each transaction, simultaneously printing several tickets concerning the transaction made. Accordingly, when several transactions are carried out successively, the time required for printing the tickets is shortened since the tickets are printed at the same time. | 02-25-2010 |
20100185535 | METHOD FOR ASSISTING IN THE CHECKING OF TRANSACTION RECORDS, TRANSACTION DEVICE, SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAMS - A method and apparatus are provided for assisting in checking accuracy of bank transaction records edited in a bank statement and performed by at least one transaction device. The method includes, for at least one of the transactions: emission, by the transaction device, of at least one first signal including a message relating to the transaction; receipt, by at least one mobile terminal, of the at least one first signal; transmission, by the mobile terminal, of a second signal including at least the message, to at least one banking organization; association, by a server of the banking organization in charge of the transaction, of the message with at least one datum relating to the transaction, and marking of the transaction as a pre-checked transaction. | 07-22-2010 |
20100198725 | METHOD FOR SECURING TRANSACTIONS, TRANSACTION DEVICE, BANK SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAMS - A method for securing a transaction by an electronic card paired with at least one mobile terminal, wherein a banking organization in charge of managing transactions involving the card has previously recorded an identifier of the mobile terminal among data relating to the owner of the card. The securing method includes: transmission, by the mobile terminal, of at least one first signal including a message containing the identifier; receipt, by at least one transaction device near the mobile terminal, of the first signal; transmission, by the transaction device, of a second signal including at least the message to at least one remote banking organization; assignment, by a control server of the banking organization, to a transaction involving the electronic card, by a control server of the banking organization, of information representing proximity between the electronic card and the mobile terminal, according to the second signal received by the banking organization. | 08-05-2010 |
20100211929 | DISPLAY METHOD, CORRESPONDING COMPUTER PROGRAM AND DEVICE - A method is provided for displaying the properties of a source code element of a computer program being edited. The includes selecting, within the source code, the source code element; searching, within the source code, a set of related code elements of the selected source code element, the elements of the set comprising typified properties; creating a data structure comprising the properties of the code elements of the set of code elements; grouping, within the data structure, the properties in function of their types; displaying the properties grouped within a portion of a display displaying the source code. | 08-19-2010 |
20110064216 | CRYPTOGRAPHIC MESSAGE SIGNATURE METHOD HAVING STRENGTHENED SECURITY, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING DEVICES AND COMPUTER PROGRAM PRODUCTS - A cryptographic message signature method are provided, which have strengthened security. The method implements two sets of signature algorithms SA | 03-17-2011 |
20110087995 | METHOD FOR SIMPLIFYING THE INPUT, BY A USER, OF A VERY LONG NUMERICAL SEQUENCE, AND CORRESPONDING DEVICE AND COMPUTER PROGRAM PRODUCT - A method is provided for simplifying the input, by a user, of a very long numerical sequence, via an input module of a communications terminal. The method includes: inputting, via the input module, at least one word forming alphanumerical sequences, the word or words being previously associated with the numerical sequence; transferring the word or words to a conversion module; and receiving, by the input module, the numerical sequence, provided by the conversion module, after the words have been processed. The words are determined and provided to the user by the conversion module, in a prior initialization phase, by a conversion algorithm that associates the word or words in a unique way with a very long numerical sequence. The word or words are chosen from a pre-selected dictionary consisting of words that are of significance to the user. | 04-14-2011 |
20110214000 | METHOD FOR REDUCING THE ENERGY CONSUMPTION OF AN ELECTRONIC TERMINAL, CORRESPONDING TERMINAL AND COMPUTER PROGRAM - A method and apparatus are provided for reducing the energy consumption of an electronic terminal. The method implements a step of modifying the timeout-before-standby duration for said terminal after an action performed by and/or on said terminal at a current instant, depending on the membership of the current instant in a given temporal category, from among at least two predefined temporal categories. | 09-01-2011 |
20110238513 | METHOD AND SYSTEM FOR VALIDATING A TRANSACTION, CORRESPONDING TRANSACTIONAL TERMINAL AND PROGRAM - A method and apparatus are provided for validating a transaction on a transactional terminal, the transaction being associated with a user. The method includes a step of decoding a validation code preliminarily generated and displayed by the transactional terminal, entered by the user in a validation message, and transmitted by a mobile device of the user to an entity of a telecommunications network to which the mobile device and said transactional terminal are connected. | 09-29-2011 |
20120290773 | INFORMATION PROCESSING DEVICE COMPRISING A READ-ONLY MEMORY AND A METHOD FOR PATCHING THE READ-ONLY MEMORY - Patching a read-only memory, including a program executable by a processor is performed with a MRAM-based CAM device connected to the address bus and comparing in the background the addresses requested by the processor with the elements of a vector of addresses. The match-in-place operation is done in parallel on all the elements of the vector and typically is performed in less than a clock cycle. If a match is found, the CAM device outputs a diversion address that's used to retrieve a substitution machine code element from a flash memory that is presented to the processor in lieu of the one addressed in the ROM. This patching scheme is totally transparent, has little overhead, and extreme granularity. | 11-15-2012 |
20130040606 | METHOD OF BIOMETRIC AUTHENTICATION, CORRESPONDING AUTHENTICATION SYSTEM AND PROGRAM - A method and apparatus are provided for biometric authentication of a user to be authenticated, from among a plurality of users, with an authentication system storing a set of pieces of reference biometric data, each associated with one of the users. The method includes providing, by the user to be authenticated, a piece of biometric authentication data by a device for obtaining biometric data from a transactional terminal. A subset of the set of pieces of reference biometric data stored by the authentication system is searched for a piece of reference biometric data corresponding to the user to be authenticated as a function of the piece of biometric authentication data. The step of searching includes filtering the pieces of reference biometric data as a function of: a base station of a mobile communications network; and a set of mobile devices for which a connection indicator is activated for the base station. The transactional terminal is substantially near a zone of coverage of the base station. | 02-14-2013 |
20130135238 | PORTABLE DEVICE COMPRISING A TOUCH SCREEN AND CORRESPONDING METHOD OF USE - A portable device is provided, which includes a touch screen and at least one area bearing reference information, referred to as a reference area, which can be identified by detecting a variation in the surface state on the device. | 05-30-2013 |
20130201106 | METHOD FOR CONTROLLING ACTIONS BY USE OF A TOUCH SCREEN - A method for controlling a pointer having a position determined by the position of at least one end of a member on a touch screen. An offset is inserted between the position of the pointer and that of the end of the member for driving movements of the pointer such that the end does not have to cover an object displayed on the screen in order to effectively select the object. | 08-08-2013 |
20130321302 | DEVICE FOR KEYING IN DATA IN BRAILLE, CORRESPONDING METHOD AND COMPUTER PROGRAM PRODUCT - A device is provided for logging data in Braille. The device includes a touch-sensitive surface and is configured to detect a plurality of pressures on the touch-sensitive surface, wherein the plurality of pressures form a Braille character, construct an image formed from the points associated with the plurality of pressures; and recognize the Braille character based on an analysis of the image. | 12-05-2013 |
20130326612 | Apparatus and Method for Forming Secure Computational Resources - A computer implemented method includes collecting logged operations associated with a computation resource. Permitted operations for the computation resource are inferred based at least in part on the logged operations. A computation resource is augmented to block all operations that can be performed by the computation resource except the permitted operations. | 12-05-2013 |
20140233731 | Device and Method for Generating Keys with Enhanced Security for Fully Homomorphic Encryption Algorithm - There is proposed a method of generating secret and public keys vDGHV with enhanced security, implemented in a device including at least one microprocessor and a memory. The method includes generating a secret key SK corresponding the generation of a prime random number p or product of prime numbers. | 08-21-2014 |