India
India

Time filter

Source Type

Method for deploying an authentication application in a secure element of a communication terminal comprising a non-secure processing unit executing a program for calling the authentication applications. The method comprises the step of transferring via at least one communication network data between a first trusted server associated with a provider of the security element so as to execute a first program for managing the security element, a second trusted server associated with at least one provider of authentication applications so as to execute a program for managing authentication applications, and the communication terminal, so as to create in the secure element a secure domain and install the authentication application therein.


Method for monitoring individuals in a place equipped with cameras, the method including the steps of: detecting representative characteristics of an individual in a first zone of the place; detecting representative characteristics of an individual in at least a second zone and comparing these representative characteristics with representative characteristics previously stored in order to determine whether the individual detected in the second zone has been detected in other zones; confirming the determination from a topography of the place by checking consistency of a path of the individual from one zone to another and of the time model by comparing temporal detection information on the representative characteristics in the zones. Device for implementing this method.


A method for participating in a lottery is proposed, comprising the following steps applied by a mobile terminal (1) comprising an input interface (2) and a secured element (12):


Patent
Morpho | Date: 2016-06-16

A biometric identification method comprising the steps of comparing a candidate print with a reference print and validating identification as a function of a number of characteristics that are common in the two prints and of a predetermined validation threshold, the method being characterized in that it comprises the steps of altering the biometric characteristics of one of the two prints prior to comparison and of taking the alteration into account during validation.


An image correction method includes: estimating a 3D model of an object as when an imaging device takes an image of the object; calculating the light intensity of each point of a simulated image as it would be taken by the imaging device, using the estimated 3D model of the object, a model of illumination of the object illuminated by a lighting system that illuminates the object, a model of reflection on a surface of the object, and a model of the imaging device, to obtain a simulated image of the object; and correcting the taken image by modifying the light intensity of each point on the taken image or on at least one area of interest of the taken image, according to the light intensity of the corresponding point in the simulated image or the respective light intensities of points adjacent to the corresponding point in the simulated image.


Disclosed is a checking device that is intended to check the authenticity of a fingerprint of a finger and which includes, among other things, a capture system for capturing an image of the finger and of the fingerprint, and acquisition means for acquiring a three-dimensional model of the finger. The checking device also includes means for determining the core on the image of the fingerprint, for locating the crown of the three-dimensional model, for determining the orientation and position of the end of the finger and for determining the relative positions of the end, the crown and the core. From these elements, the checking device can decide whether the fingerprint is real or false.


Patent
Morpho | Date: 2016-04-15

A method is proposed for managing a memory (2) of an electronic card (1), the electronic card (1) being able to execute a first program (P1) and a second program (P2), the method comprising steps of:


The invention deals with a method to control deployment of a program to be executed across a cluster of machines (M1-Mn), the method comprising steps of:


The invention relates to a method for generating a message signature intended to be validated by a verifier server, a client device being configured to hold a private key and a corresponding public key and comprising steps of:


Patent
Morpho | Date: 2016-01-07

The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d_(1), . . . , d_(n)) corresponding to reference entities and comprising:

Loading Morpho collaborators
Loading Morpho collaborators