Method for securing a chip card transaction, write terminal for securing such transaction, and secured chip card
FR2898747A1
Dechiffrable cherchable encryption process, system for such encryption
FR2898421A1
Method for operating and managing free memory in a reinscriptible non-volatile memory, and associated memory
FR2898199A1
Method of securing the execution of a following logically enchanced steps
FR2898001A1
Secured digital content`s e.g. musical piece, secured access management method, involves producing file based on adapted access right, key and certificate, where file is accessible by terminal so that officer processes content based on file
FR2898008A1
Portable electronic object e.g. contactless chip card, identifying method for use in e.g. airport, involves utilizing stored variable data as variable identifier of card for establishing ulterior transaction between card and terminal
FR2897704A1
Detachable electronic device e.g. combi-chip, for e.g. portable telephone, has control unit transmitting activation signal based on detection of activation data for passing selection unit from one selection position to another position
FR2897192A1
Method of securely updating volatile memory
FR2896060A1
Generic electronic key having a personalized chip card
FR2895814A1
Computer application program execution securing method for chip card, involves initializing program counter and continuing program execution when content of counter is equal to stored number of neutral instructions
FR2895609A1
Cryptographic method for forming modular exponentiation, involves masking operand with random number, and forming modular exponentiation of operand masked by exponent using Montgomery multiplier
FR2895631A1
Controlling access to diffused services in a terminal device
FR2895632A1
Controlling access to multicast mode services in a terminal device
FR2894709A1
"detector of abnormal destruction of memory sector"
FR2893735A1
Method for making a contactless contactor transponder from a contactless module to an antenna and a transponder obtained
FR2893438A1
Data carrier, electronic identity part and corresponding security method
FR2893183A1
Method for protecting an electronic component against fault injection attacks
FR2892876A1
Data e.g. digital data, deposition method for mobile communication field, involves encrypting data with key using symmetric encrypting method, and encrypting transfer key with public key of third party by asymmetric encrypting method
FR2892837A1
Downloading data in portable communicating objects present in a radio communication network during a campaign