2024
|
Invention
|
Data carrier with clear effects. A method of producing a data carrier (1) comprising at least one... |
|
Invention
|
Secure non-volatile memory and integrated circuit including said non-volatile memory. The inventi... |
|
Invention
|
A method for authentication a device by an euicc. The invention concerns a method for authenticat... |
|
Invention
|
Secure non-volatile memory. The invention relates to a non-volatile memory circuit (300) comprisi... |
|
Invention
|
Secure non-volatile memory. The invention relates to a method for detecting a reading error cause... |
|
Invention
|
Method to perform a mutual authentication. The invention relates to a method to perform a mutual ... |
|
Invention
|
A method for establishing a secure communication channel between a mobile device and and a gnb of... |
|
Invention
|
Unique virtual identity creation enabling banishment. The present invention relates to a method t... |
|
Invention
|
Method for getting the agreement of the user to pursue a financial transaction. The invention is ... |
|
Invention
|
System and method to bring authenticity in the communication between mobile client and server. A ... |
|
Invention
|
Method for managing a payment transaction. The invention is a method for managing a payment trans... |
|
Invention
|
A method for installing a profile on an embedded sim. A virtual bound profile, created by the ste... |
|
Invention
|
Method of entrust data using a secure component. The invention relates to a method to entrust req... |
|
Invention
|
System and method for self issued verifiable credentials. The present invention provides a system... |
|
Invention
|
Method for securing against fault attacks an execution of a verification of a crystals-dilithium ... |
|
Invention
|
Method for managing a proximity monetary transaction. The invention is a method for managing a mo... |
|
Invention
|
Method for vsat restricted access. The present invention relates to a method to manage transmissi... |
|
Invention
|
Modular identity verification system and method. A modular identity verification system includes ... |
|
Invention
|
Securely generating and multi-party sharing of a root of trust in a clustered cryptosystem. Provi... |
|
Invention
|
Led circuit breaker, led illuminator and iris scanner. The invention relates to a LED circuit bre... |
|
Invention
|
Increasing the security of an fdo-compliant communication device. The invention provides a method... |
|
Invention
|
Method for securely protecting execution of a software code against fault injection attacks. The ... |
|
Invention
|
Method to secure a software code. The present invention relates to a method of securing a softwar... |
|
Invention
|
Method for securely protecting execution of a software code against physical attacks. The present... |
|
Invention
|
Loading method and code loader. The invention relates to code updating method for updating a prev... |
|
Invention
|
Image loader supporting image rollback and selective rollback of related data. The invention rela... |
|
Invention
|
Computer-implemented method for refined localizing an iris of an eye. The invention relates to a ... |
|
Invention
|
Method and system for preserving per-device diversified data when replacing firmware. A method fo... |
|
Invention
|
Method for manufacturing a smart card comprising user interface sensors. The invention is a metho... |
|
Invention
|
Method and system for upgrading the firmware of a device. A method for upgrading a firmware of a ... |
|
Invention
|
Safe mode loader for operating system of an embedded device. A method for providing a safe backup... |
|
Invention
|
Generation of a digital contract as a verifiable credential. The invention provides a method of g... |
|
Invention
|
Method for relay attack protection of monetary transactions. The invention is a method for relay ... |
|
Invention
|
Method for authenticating a user using a biometric sensor. The invention is a method for authenti... |
|
Invention
|
Filtering subjects subject to facial image processing in a face-tracking environment. Filtering s... |
|
Invention
|
A method for exporting a telecommunication profile from a source secure element to a target secur... |
|
Invention
|
1-to-n wire inlay connections. A data carrier (1), in particular a smart card, comprises a first ... |
2023
|
Invention
|
Electronic circuit and method for securing and desynchronizing register transfers to mitigate sid... |
|
Invention
|
Lawful interception of activity of an application function.
Provided is a method to enable lawfu... |
|
Invention
|
Method for enrolling a public key on a server.
Provided is a method for enrolling a public key i... |
|
Invention
|
Injection of cryptographic material during application delivery.
A method for mobile application... |
2022
|
Invention
|
Smartcards with metal layers.
Provided is a data carrier comprising at least a first metallic la... |
|
Invention
|
Method secured against side-channel attacks performing a cryptographic algorithm comprising a pol... |
|
Invention
|
Cross-spectral face recognition training and cross-spectral face recognition method.
Provided is... |
|
Invention
|
Method for managing a remote server.
The invention is a method for managing a remote server that... |
|
Invention
|
Method for updating a secure element cooperating with a telecommunication terminal.
The disclosu... |
|
Invention
|
Method for detecting a forgery of an identity document.
Provided is a method for detecting a for... |
|
Invention
|
Variable-appearance laser marking over printed layers.
A data carrier extends along an extension... |
|
Invention
|
Method for securely transferring data elements values.
Provided is a method for securely transfe... |
|
Invention
|
Secure element for a device.
A secure element for a device includes an operative system the secu... |