G06F21/77

METHOD FOR ALLOCATING MEMORY SPACE
20170315906 · 2017-11-02 ·

The present invention concerns a method for allocating a space of predetermined size in a memory (2) of a smart card (1), characterized in that it comprises steps of: deterministic preselection (100) in the memory (2), of at least one free zone having a size larger than the predetermined size, selection, (104) in a preselected free zone of a sub-zone having a size equal to the predetermined size, the selection of the sub-zone being variable for one same preselected free zone, use (106) of the selected sub-zone as allocated memory space.

IMPROVED SYSTEM AND METHOD FOR PROVIDING IC CHIP CARDS
20170315857 · 2017-11-02 · ·

A method and system are disclosed for providing integrated circuit chip cards (e.g. transaction cards) pursuant to an order placed by or on behalf of a card issuer wherein a testing data file is provided in conjunction with prepersonalization data encoding for use in conjunction with subsequent testing of the accuracy of the encoded prepersonalization data. Such testing may be completed prior to personalization data encoding to facilitate the identification of prepersonalization data encoding errors, thereby further facilitating remedial action and reduction of production disruptions.

DYNAMIC MULTIPLE-APPLICATION SYSTEMATIC FRAMEWORK FOR INTEGRATED CIRCUIT CARD AND INFORMATION PROCESSING METHODS BASED ON THE FRAMEWORK
20170250810 · 2017-08-31 · ·

A multiple-application systematic framework for an IC card comprising a card issuer device 10, a service provider device 20 and a user terminal device 30, in which the three devices are interconnected by a first communications means. The card issuer device 10 comprises a card-issuing module 100 and a service provider management module 101. The service provider device 20 comprises a service module 200. The user terminal device 30 comprises an IC card 300 supplied by a card issuer and a communications device 301 comprising an application control module 3010, the IC card 300 comprises an authentication and security management module 3000 and a multi-application data storage area 3001. The communications device 301 and the IC card 300 communicate through a second communications means. The service provider management module 101 enables the service module 200 to use storage space in the multi-application data storage area 3001 for providing a service to a user via a service token, and the service module 200 communicates with the application control modulo 3010 enable a user and/or at least one service provider to manipulate one or more service tokens in the IC card 300.

Small Form Factor Wireless Communication Device and Method
20170250981 · 2017-08-31 ·

Disclosed herein is a small form factor device for selectively communicating an authorisation signal. The small form factor device comprises a processor configured to process force signals received from a force sensor to determine the occurrence of an authorisation gesture. If an authorisation gesture is determined to have occurred and light is detected by a light sensor of the device, the processor further causes a wireless communications module of the device to transmit an authorisation signal.

Method for personalizing a secure element, method for enabling a service, secure element and computer program product
09749303 · 2017-08-29 · ·

According to an aspect of the invention, a method for personalizing a secure element for a mobile device is conceived, wherein an application is stored in the secure element and wherein the application is pre-provisioned by loading secure credentials into the application without tying said secure credentials to a specific user of the secure element.

Method for personalizing a secure element, method for enabling a service, secure element and computer program product
09749303 · 2017-08-29 · ·

According to an aspect of the invention, a method for personalizing a secure element for a mobile device is conceived, wherein an application is stored in the secure element and wherein the application is pre-provisioned by loading secure credentials into the application without tying said secure credentials to a specific user of the secure element.

Secure data processing method and use in biometry
09747470 · 2017-08-29 · ·

The invention relates to a processing method, including the calculation of one function between a datum to be compared and a reference datum. The function can be written in the form of a sum of: a term that depends on the datum to be compared, a term that depends on the reference datum, and a polynomial, such that all the monomials of the polynomial include at least one coordinate of each datum. The method includes an initialization step including: generating masking data; scrambling reference data by means of a server unit on the basis of said masking data; and calculating, by means of a client unit, the term of the function that depends on the datum to be compared. The method also includes steps for executing the calculation of the function between the datum to be compared and the reference datum, indexed by an index c, during which: the client unit sends the coordinates of the datum to be compared to a secure component, which returns said datum, in a masked form, to said component; the client unit retrieves, from the server unit, the reference datum, indexed by the index c and scrambled by the masking data; and on the basis of the data obtained from the secure component and the server unit, the client unit calculates the sum of the term of the function that depends solely on the reference datum and the polynomial term and adds, to said sum, the term that depends on the datum to be compared, such as to obtain the result of the function.

Secure data processing method and use in biometry
09747470 · 2017-08-29 · ·

The invention relates to a processing method, including the calculation of one function between a datum to be compared and a reference datum. The function can be written in the form of a sum of: a term that depends on the datum to be compared, a term that depends on the reference datum, and a polynomial, such that all the monomials of the polynomial include at least one coordinate of each datum. The method includes an initialization step including: generating masking data; scrambling reference data by means of a server unit on the basis of said masking data; and calculating, by means of a client unit, the term of the function that depends on the datum to be compared. The method also includes steps for executing the calculation of the function between the datum to be compared and the reference datum, indexed by an index c, during which: the client unit sends the coordinates of the datum to be compared to a secure component, which returns said datum, in a masked form, to said component; the client unit retrieves, from the server unit, the reference datum, indexed by the index c and scrambled by the masking data; and on the basis of the data obtained from the secure component and the server unit, the client unit calculates the sum of the term of the function that depends solely on the reference datum and the polynomial term and adds, to said sum, the term that depends on the datum to be compared, such as to obtain the result of the function.

SYSTEMS AND METHODS FOR TRANSACTION CARD-BASED AUTHENTICATION
20220311627 · 2022-09-29 ·

A method is provided for communicating with a transaction card having a card data processor, a near card field communication (NFC) interface, and a card memory having a unique card identifier stored therein. In this method, a user communication device establishes an NFC session with the transaction card and transmits to the transaction card an NFC data exchange format (NDEF) WRITE TAG command including session-specific challenge information. The user communication device transmits to the transaction card an NDEF READ TAG command and receives from the transaction card, card-specific challenge response information. The challenge response information is then used to authenticate the transaction card.

SURVEILLANCE METHOD FOR A MOBILE TELECOMMUNICATIONS TERMINAL
20170223524 · 2017-08-03 ·

A surveillance method for a mobile telecommunications terminal having an eSIM card. A plurality of subscription profiles are stored in the eSIM card. The surveillance method includes steps of incrementing a counter each time a change of subscription profile order is received, determining a number of change of subscription profile orders received during a predetermined duration, and, if the number of change of subscription profile orders received during the predetermined duration is greater than a predetermined threshold, deducing therefrom that operation is suspect.