Abstract:
A technique for controlling the reading of a digital object by a user device. The digital object is stored locally in the memory of the user device. The reading of the digital object is conditioned by receiving at least one datum broadcast by a transmitting device using a radio communication channel. An area for reading the digital object is thus located in the radio range of the transmitter device. Reading is blocked outside of this reading area.
Abstract:
The invention relates to a technique for managing an activation state of a module for radio access to a main network of a user device (30, 31). The device also includes a module for wireless access to a secondary network, which is activated. The user device looks for a beacon signal of the secondary network when the module for wireless access to the main network is deactivated. The user device detects a beacon signal of the secondary network broadcast by a transmitter device (21) associated with an access point (20) of the main network and, following said detection, activates the module for wireless access to the main network. The user device then connects to the main network via the access point. In a specific embodiment, following the detection of the beacon signal, the user device receives information broadcast on the beacon signal and obtains an identifier of the access point from said broadcast information.
Abstract:
A technique for controlling the reading of a digital object by a user device. The digital object is stored locally in the memory of the user device. The reading of the digital object is conditioned by receiving at least one datum broadcast by a transmitting device using a radio communication channel. An area for reading the digital object is thus located in the radio range of the transmitter device. Reading is blocked outside of this reading area.
Abstract:
The invention relates to a technique for managing an activation state of a module for radio access to a main network of a user device (30, 31). The device also includes a module for wireless access to a secondary network, which is activated. The user device looks for a beacon signal of the secondary network when the module for wireless access to the main network is deactivated. The user device detects a beacon signal of the secondary network broadcast by a transmitter device (21) associated with an access point (20) of the main network and, following said detection, activates the module for wireless access to the main network. The user device then connects to the main network via the access point. In a specific embodiment, following the detection of the beacon signal, the user device receives information broadcast on the beacon signal and obtains an identifier of the access point from said broadcast information.
Abstract:
The invention relates to a method for managing the use, in a terminal, of a plurality of security modules (SIM1, SIM2) managed by an entity (STK) capable of requiring the provision of security codes in order to unlock the modules. The method is characterised in that it comprises: a first phase of accessing the modules (PH1), including a step of receiving (ET13-1, ET13-2), by the entity, codes of the modules, a step of transmitting (ET14-1, ET14-2) the received codes to the security modules, followed by a step of storing (ET16), in a security module referred to as the main module, at least one code received by the entity relative to a module (SIM2) other than the main module; and a second subsequent access phase during which the unlocking of the main module is followed by a step of transmitting at least one code from the main module to at least one other security module (SIM2) corresponding to said at least one code.
Abstract:
A device for accessing a wide area network via a mobile communication network. The device includes a first connection module for connection to the mobile communication network, a second connection module suitable for generating a local network, a data processing module and a subscriber identification card. The data processing module is configured to connect the first and second connection modules via a channel. The subscriber identification card is configured to implement a control module suitable for controlling the use of the channel.
Abstract:
The invention relates to a method for managing the use, in a terminal, of a plurality of security modules (SIM1, SIM2) managed by an entity (STK) capable of requiring the provision of security codes in order to unlock the modules. The method is characterized in that it comprises: a first phase of accessing the modules (PH1), including a step of receiving (ET13-1, ET13-2), by the entity, codes of the modules, a step of transmitting (ET14-1, ET14-2) the received codes to the security modules, followed by a step of storing (ET16), in a security module referred to as the main module, at least one code received by the entity relative to a module (SIM2) other than the main module; and a second subsequent access phase during which the unlocking of the main module is followed by a step of transmitting at least one code from the main module to at least one other security module (SIM2) corresponding to said at least one code.
Abstract:
Management of the use of a gateway by a plurality of terminals. A method is provided for managing the use of a gateway capable of interconnecting networks. The gateway is capable of receiving requests to access a network from a plurality of terminals. The maximum number of simultaneous accesses via the gateway varies with time.
Abstract:
A method of providing a digital ticket allowing access to at least one digital object comprising the following steps: following a selection by a first user of at least one digital object, a step of submission of a request to a management server to obtain a digital ticket comprising a unique identification code, a first step of generation of said digital ticket, a first step of transmission of said digital ticket to the first user, and a step of activation of the digital ticket.
Abstract:
Management of the use of a gateway by a plurality of terminals. A method is provided for managing the use of a gateway capable of interconnecting networks. The gateway is capable of receiving requests to access a network from a plurality of terminals. The maximum number of simultaneous accesses via the gateway varies with time.