Patents Assigned to Inside Secure
  • Patent number: 8619977
    Abstract: An elliptic curve cryptographic system where point coordinates are transformed from a first coordinate system to a second coordinate system. The transformed coordinates are processed by field operations, which have been modified for operating on the transformed point coordinates. In some implementations, the point coordinates are transformed from an affine coordinate system to a projective coordinate system using a non-random value for the projective coordinate. In some implementations, the transformed projective representation of the point can be changed from a first representation of the point in projective coordinates to a second representation of the point in projective coordinates, where the projective coordinate used in the representation change is a random value.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: December 31, 2013
    Assignee: Inside Secure
    Inventors: Michel Douguet, Vincent Dupaquis
  • Patent number: 8620214
    Abstract: A process for establishing a data link between a first processor configured to supply, upon a contact communication port, a first data carrying signal, and a second processor configured to supply, upon a contact communication port, a second data carrying signal is described. The process includes providing a first coupler and a second coupler, establishing a contactless coupling between the first and second couplers and, by the intermediary of the couplers and at least one RF signal, transferring the first data carrying signal to the second processor and transferring the second data carrying signal to the first processor. The second processor is, for example, a secure processor of a SIM card and the first processor is an NFC controller.
    Type: Grant
    Filed: March 19, 2010
    Date of Patent: December 31, 2013
    Assignee: Inside Secure
    Inventor: Bruno Charrat
  • Patent number: 8577410
    Abstract: A device includes a radio transceiver equipped with a UHF antenna, a clock generator associated with the radio transceiver, a processor configured to periodically connect to the radiotelephony network by way of the radio transceiver, and a UHF tag reader configured to conduct a transaction with a UHF tag only outside periods of connection of the processor to the radiotelephony network. The device is particularly directed for use in mobile telephones.
    Type: Grant
    Filed: November 21, 2011
    Date of Patent: November 5, 2013
    Assignee: Inside Secure
    Inventors: Bruno Charrat, Nicolas Cordier
  • Publication number: 20130288599
    Abstract: A method for sending data by inductive coupling includes: extracting an antenna signal from an antenna circuit, extracting from the antenna signal a first periodic signal, producing a second periodic signal by way of a synchronous oscillator, placing the oscillator in a free oscillation mode and applying to the antenna circuit the second periodic signal, modifying the impedance of the antenna circuit, restoring the amplitude of the antenna signal, then resynchronizing the oscillator on the first periodic signal.
    Type: Application
    Filed: September 21, 2011
    Publication date: October 31, 2013
    Applicant: INSIDE SECURE
    Inventors: Frédéric Bernard, Nicolas Cordier, Florian Pernisek, Bruno Charrat
  • Publication number: 20130282570
    Abstract: A method for performing a transaction between a portable device and a transaction terminal includes establishing a communication channel between the portable device and the transaction terminal; establishing a first data link between the transaction terminal and the transaction server; and using an application program in the transaction server to perform the transaction with the transaction terminal through the data link, on behalf of the portable device.
    Type: Application
    Filed: November 17, 2011
    Publication date: October 24, 2013
    Applicant: INSIDE SECURE
    Inventors: Bruno Charrat, Gary Chew
  • Publication number: 20130283393
    Abstract: A method for playing DRM-protected contents, the protected contents being downloaded by a user device from a media server in the form of protected segments, comprises executing a DRM proxy inside the user device, the DRM proxy interfacing the media server and a player configured to implement the HLS protocol; executing an HLS server in the DRM proxy; registering the DRM proxy to handle HTTP requests; producing by the DRM proxy a playlist in HLS format including a list of URLs locating the individual protected segments on the user device; processing the playlist in the player; in the DRM proxy, acquiring a license to access the protected segment identified by the URL of a current request; decrypting the protected segment in the DRM proxy based on the license; and returning a segment based on the decrypted segment to the player in response to the current URL request.
    Type: Application
    Filed: January 31, 2013
    Publication date: October 24, 2013
    Applicant: INSIDE SECURE
    Inventors: Oscar HIERRO, Guido Domenici
  • Patent number: 8566920
    Abstract: A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network from a protected domain. A packet processor part intercepts a packet that is in transit between the untrusted packet-switched information network and the protected domain. The packet is examined at the packet processor part in order to determine, whether the packet contains digital data that pertains to a certain protocol. If the packet is not found to contain such digital data, it is processed at the packet processor part. If the packet is found to contain digital data that pertains to said certain protocol, it gets redirected to an application gateway part that processes the packet according to a set of processing rules based on obedience to said certain protocol. The packet processor part is a kernel mode process running in a computer device and the application gateway part is a user mode process running in a computer device.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: October 22, 2013
    Assignee: Inside Secure
    Inventors: Tatu Ylönen, Tero Kivinen, Markus Levlin
  • Patent number: 8559625
    Abstract: In an elliptic curve cryptographic system, point coordinates in a first coordinate system are transformed into a second coordinate system. The transformed coordinates are processed by field operations, which have been modified for operating on the transformed point coordinates. In some implementations, the point coordinates are transformed using a linear transformation matrix having coefficients. The coefficients can be fixed, variable or random. In some implementations, the transformation matrix is invertible.
    Type: Grant
    Filed: August 7, 2007
    Date of Patent: October 15, 2013
    Assignee: Inside Secure
    Inventors: Michel Douguet, Vincent Dupaquis
  • Patent number: 8549218
    Abstract: A content-addressable memory (CAM) for managing the reallocation of erasable objects within a non-volatile memory is conceptually separated into two tables: a first table provides verification of whether or not a logical address has been reallocated and, if so, a second table provides the physical address of the reallocated erasable object.
    Type: Grant
    Filed: November 10, 2008
    Date of Patent: October 1, 2013
    Assignee: Inside Secure
    Inventors: Yves Fusella, Stephane Godzinski
  • Patent number: 8532295
    Abstract: A method for the secured loading of data into a first secured host processor of an NFC system comprising an NFC interface circuit for sending and receiving data, enabling a service to be accessed, the method comprising: generating a secret data, transmitting the secret data to the first host processor through a secured link, ciphering data to be loaded into the first host processor using a public key of the first host processor, and transmitting the ciphered data to the system for the first host processor which deciphers the data using a private key corresponding to the public key.
    Type: Grant
    Filed: December 7, 2007
    Date of Patent: September 10, 2013
    Assignee: Inside Secure
    Inventors: Bruno Benteo, Bruno Charrat, Philippe Martineau
  • Publication number: 20130212407
    Abstract: The invention relates to a method for managing non-volatile memory space in a secure processor comprising a secure non-volatile internal memory, the method comprising steps of: selecting data elements to remove from the internal memory, generating, by the secure processor, a data block comprising the selected data elements, and a signature computed from the selected data elements using a secret key generated by the secure processor, transmitting the data block by the secure processor, and storing the transmitted data block in an external memory.
    Type: Application
    Filed: April 2, 2012
    Publication date: August 15, 2013
    Applicant: INSIDE SECURE
    Inventors: Charles WALTON, Matthias LERCH
  • Publication number: 20130183897
    Abstract: An apparatus including inductive coupling communication circuitry configured to communicate in peer-to-peer mode with an identical apparatus includes an antenna coil presenting, relative to a longitudinal median or a transversal median axis of the antenna coil, an asymmetry corresponding to a coverage rate less than or equal to 0.6 if the antenna coil comprises 4 or more loops, less than or equal to 0.7 if the antenna coil comprises 3 loops, or less than or equal to 0.8 if the antenna coil comprises 1 or 2 loops.
    Type: Application
    Filed: March 11, 2013
    Publication date: July 18, 2013
    Applicant: INSIDE SECURE
    Inventor: INSIDE Secure
  • Publication number: 20130181875
    Abstract: An antenna circuit for near-field communications includes a planar active winding, connected between a first and a second access terminal; an auxiliary winding coplanar with the active winding and connected by a first end to the first access terminal; and a tuning capacitor connected to the second end of the auxiliary winding. The turns of the active and auxiliary windings are interleaved.
    Type: Application
    Filed: January 17, 2013
    Publication date: July 18, 2013
    Applicant: INSIDE SECURE
    Inventor: INSIDE SECURE
  • Patent number: 8457919
    Abstract: A process for testing an integrated circuit includes collecting a set of points of a physical property while the integrated circuit is executing a multiplication, dividing the set of points into a plurality subsets of lateral points, calculating an estimation of the value of the physical property for each subset, and applying to the subset of lateral points a step of horizontal transversal statistical processing by using the estimations of the value of the physical property, to verify a hypothesis about the variables manipulated by the integrated circuit.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: June 4, 2013
    Assignee: Inside Secure
    Inventors: Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
  • Patent number: 8412099
    Abstract: A method for managing application data in an NFC system embedded or to be embedded in a portable object including a contactless data sending/receiving interface, one or more host processors and a data routing or transferring processor is described. The method includes generating complementary application data in response to the routing or transferring of external application data, and supplying the complementary application data to a host processor of the NFC system.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: April 2, 2013
    Assignee: Inside Secure
    Inventor: Bruno Charrat
  • Patent number: 8401474
    Abstract: A method for managing application data in an NFC system embedded or to be embedded in a portable object and including a contactless data sending/receiving interface, one or more host processors, and a data routing or transferring processor is described. The method includes generating internal application data in response to the occurrence of an internal event within the NFC system, and supplying the internal application data to a host processor of the NFC system.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: March 19, 2013
    Assignee: Inside Secure
    Inventor: Bruno Charrat
  • Publication number: 20130055025
    Abstract: A microprocessor including a memory and a central processing unit configured to sign a binary word written in the memory, and during the reading of a binary word in the memory, verify the signature of the binary word and, if the signature is invalid, launching a protective action of the memory. According to the invention, the central processing unit is configured to execute a write instruction of a binary word accompanied by an invalid signature in a memory zone, so that a later read of the memory zone by the central processing unit launches the protective action.
    Type: Application
    Filed: August 22, 2012
    Publication date: February 28, 2013
    Applicant: INSIDE SECURE
    Inventors: Benoît FEIX, Georges GAGNEROT
  • Patent number: 8369517
    Abstract: Fast scalar multiplication operations are disclosed for use in an elliptic curve cryptographic system The operations use binary representations of a secret key and points on an elliptic curve defined over a prime field expressed in a coordinate system (e.g., Jacobian coordinates). The operations can be based on a modified Montgomery ladder that uses modified Meloni addition formulas. The operations can be more efficient than a double-and-add operation, and can be more resistant to side-channel attacks by hackers.
    Type: Grant
    Filed: August 12, 2008
    Date of Patent: February 5, 2013
    Assignee: Inside Secure
    Inventors: Alexandre Venelli, Francois Dassance
  • Publication number: 20130021106
    Abstract: A method for adjusting an oscillator clock frequency, comprising: providing a first oscillator, applying a first setpoint value to the first oscillator, determining a first oscillator frequency value within a first time frame, providing a second oscillator, applying a second setpoint value to the second oscillator, determining a second oscillator frequency value within a second time frame, determining a new frequency setpoint value from the first and second frequency values, the first and second setpoint values, and a desired frequency value, and applying the new frequency setpoint value to one of the first and second oscillators.
    Type: Application
    Filed: July 19, 2012
    Publication date: January 24, 2013
    Applicant: INSIDE SECURE
    Inventors: Gaetan BRACMARD, Jean-Pascal MARANINCHI, Julien ROCHE
  • Patent number: 8352752
    Abstract: In a device having a plurality of circuits that can store at least a first value and a second value, a method can include configuring at least one circuit to persistently store the first value; determining whether the at least one circuit is storing the second value; and initiating a countermeasure if the at least one circuit is storing the second value. Determining whether the at least one circuit is storing the second value can include detecting whether the device has been attacked. Non-limiting examples of initiating a countermeasure can include resetting a portion of the device, powering down a portion of the device, activating an alarm circuit, causing protected data stored in the device to be erased, causing portions of the device to self-destruct, or causing the device to not respond to input applied to the interface.
    Type: Grant
    Filed: September 1, 2006
    Date of Patent: January 8, 2013
    Assignee: Inside Secure
    Inventors: Alexandre Croguennec, Yves Fusella