Patents by Inventor Mael Berthier
Mael Berthier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11212314Abstract: The invention proposes a method for an object (1) to communicate with a server (2) of a connected objects network to report that a clone may be impersonating the object in the network, which method comprises the following steps implemented by the object (1): transmitting (106) to the server (2) a request from the object (1) to join the connected objects network; after transmitting the join-request, detecting (110) whether a reference message (uplink) transmitted by the object (1) to the server (2) was rejected or ignored; in response to the detection, transmitting (114) to the server (2) an alert message indicating the rejection or ignoring.Type: GrantFiled: October 16, 2019Date of Patent: December 28, 2021Assignee: IDEMIA IDENTITY & SECURITY FRANCEInventors: Yoann Fages-Tafanelli, Aurélien Cuzzolin, Fabien Blanco, Maël Berthier
-
Publication number: 20200184068Abstract: The present invention relates to a device (1) such as a connected object comprising a first electronic circuit (2) comprising: a first processing unit (6) for executing a program, a first memory (8) for memorizing data during the execution of the program, a debug port (10) dedicated to checking the execution of the program from outside the first circuit, a second electronic circuit (4) connected to the debug port (10), comprising: a second memory (14) memorizing reference data related to the program, a second processing unit (12) for implementing the following steps automatically and autonomously via the debug port (10): checking the integrity of the data memorized by the first memory (8) and/or the compliance of the program's execution by the first processing unit (6) with a reference execution, assisted by the reference data.Type: ApplicationFiled: December 3, 2019Publication date: June 11, 2020Inventors: Fabien BLANCO, Jean-Yves Pierre BERNARD, Maël BERTHIER
-
Publication number: 20200120132Abstract: The invention proposes a method for an object (1) to communicate with a server (2) of a connected objects network to report that a clone may be impersonating the object in the network, which method comprises the following steps implemented by the object (1): transmitting (106) to the server (2) a request from the object (1) to join the connected objects network; after transmitting the join-request, detecting (110) whether a reference message (uplink) transmitted by the object (1) to the server (2) was rejected or ignored; in response to the detection, transmitting (114) to the server (2) an alert message indicating the rejection or ignoring.Type: ApplicationFiled: October 16, 2019Publication date: April 16, 2020Inventors: Yoann FAGES-TAFANELLI, Aurélien CUZZOLIN, Fabien BLANCO, Maël BERTHIER
-
Patent number: 10521586Abstract: The invention relates to a secured comparative processing method of the type in which a processor of an electronic component compares a set of proof data received by the processor as an input with main secret data stored in said electronic component, characterised in that the processor executes, in parallel with the comparison with the secret data, a series of complementary operations on the set of proof data which generate on the electronic component a variation in behaviour which is a function of the proof data which the component receives as an input and which is added to the variation in behaviour linked to the comparison with the main secret data, the series of complementary operations including a series of base operations repeated K times, and the execution of said series being preceded by an adjustment of execution parameters of said series, the parameters including: the identifier of the series of base operations to be executed, the series of base operations being comprised within a set of predefinedType: GrantFiled: December 23, 2014Date of Patent: December 31, 2019Assignee: IDEMIA IDENTITY & SECURITYInventors: Mael Berthier, Victor Servant
-
Patent number: 10489667Abstract: A biometric identification method includes the steps of comparing a candidate print with a reference print and of validating the identification according to a certain number of characteristics common to both prints and a predetermined validation threshold. The method includes the steps of creating at least one deceiving print and comparing same with a candidate print. An identification device designed for implementing this method is also provided.Type: GrantFiled: December 22, 2016Date of Patent: November 26, 2019Assignee: IDEMIA IDENTITY & SECURITYInventors: Marcelin Ragot, Mael Berthier, Yves Bocktaels, Julien Bringer
-
Patent number: 10404719Abstract: Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable memory and a volatile memory, the equipment including a rewritable non-volatile memory and a communication bus enabling the electronic device to store data in the rewritable non-volatile memory. The method includes: creating a secured channel by encryption between the equipment and a server; obtaining an authentication key from the server; loading data and a message authentication code from the rewritable non-volatile memory to the volatile memory, the message authentication code obtained by the electronic device from the authentication key and said data prior to the storage of said data and message authentication code in the rewritable non-volatile memory, the electronic device not having kept the authentication key following the obtaining of the message authentication code; verifying said data using the secret key and the message authentication code.Type: GrantFiled: November 21, 2017Date of Patent: September 3, 2019Assignees: IDEMIA IDENTITY & SECURITY FRANCE, STARCHIPInventors: Jean-Yves Bernard, Yves Fusella, Maël Berthier, Lauren Del Giudice
-
Patent number: 10148671Abstract: A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behavior of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program.Type: GrantFiled: July 8, 2013Date of Patent: December 4, 2018Assignee: IDEMIA IDENTITY & SECURITY FRANCEInventors: Thanh Ha Le, Julien Bringer, Louis-Philippe Goncalves, Maël Berthier
-
Patent number: 10083297Abstract: Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input with main secret data (CTRL, PIN) stored in said electronic component, characterized in that the processor implements, in addition to the comparison with the secret data (CTRL, PIN), complementary operations on the proof data (EPR, AUTH) which generate on the electronic component a variation of behavior which is dependent on the proof data (EPR, AUTH) which it receives as input and which is compounded with the behavioral variation related to the comparison with the main secret data (CTRL, PIN).Type: GrantFiled: July 9, 2013Date of Patent: September 25, 2018Assignee: MORPHOInventor: Mael Berthier
-
Publication number: 20180145992Abstract: Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable memory and a volatile memory, the equipment including a rewritable non-volatile memory and a communication bus enabling the electronic device to store data in the rewritable non-volatile memory. The method includes: creating a secured channel by encryption between the equipment and a server; obtaining an authentication key from the server; loading data and a message authentication code from the rewritable non-volatile memory to the volatile memory, the message authentication code obtained by the electronic device from the authentication key and said data prior to the storage of said data and message authentication code in the rewritable non-volatile memory, the electronic device not having kept the authentication key following the obtaining of the message authentication code; verifying said data using the secret key and the message authentication code.Type: ApplicationFiled: November 21, 2017Publication date: May 24, 2018Applicants: IDEMIA IDENTITY & SECURITY FRANCE, STARCHIPInventors: Jean-Yves Bernard, Yves Fusella, Maël Berthier, Lauren Del Giudice
-
Patent number: 9929754Abstract: An embedded system and, in particular, a communication protocol suitable for a data transmission using auxiliary physical channels of such an embedded system. A transmission method suitable for such a channel includes the transmission of a data signal based on the encoding of three symbols. The message consists of a preamble allowing recognition of the symbols used, followed by the significant part of the message. The decoding of the message comprises a first step of learning the symbols used, prior to the decoding of the significant part of the message.Type: GrantFiled: May 7, 2013Date of Patent: March 27, 2018Assignee: MORPHOInventors: Mael Berthier, Yves Bocktaels, Julien Bringer, Francois Lecocq
-
Patent number: 9922234Abstract: A biometric identification method comprising the steps of comparing a candidate print with a reference print and validating identification as a function of a number of characteristics that are common in the two prints and of a predetermined validation threshold, the method being characterized in that it comprises the steps of altering the biometric characteristics of one of the two prints prior to comparison and of taking the alteration into account during validation.Type: GrantFiled: June 16, 2016Date of Patent: March 20, 2018Assignee: MORPHOInventors: Yves Bocktaels, Julien Bringer, Mael Berthier, Marcelin Ragot
-
Publication number: 20170177961Abstract: A biometric identification method includes the steps of comparing a candidate print with a reference print and of validating the identification according to a certain number of characteristics common to both prints and a predetermined validation threshold. The method includes the steps of creating at least one deceiving print and comparing same with a candidate print. An identification device designed for implementing this method is also provided.Type: ApplicationFiled: December 22, 2016Publication date: June 22, 2017Inventors: Marcelin RAGOT, Mael BERTHIER, Yves BOCKTAELS, Julien BRINGER
-
Publication number: 20170017790Abstract: The invention relates to a secured comparative processing method of the type in which a processor of an electronic component compares a set of proof data received by the processor as an input with main secret data stored in said electronic component, characterised in that the processor executes, in parallel with the comparison with the secret data, a series of complementary operations on the set of proof data which generate on the electronic component a variation in behaviour which is a function of the proof data which the component receives as an input and which is added to the variation in behaviour linked to the comparison with the main secret data, the series of complementary operations including a series of base operations repeated K times, and the execution of said series being preceded by an adjustment of execution parameters of said series, the parameters including: the identifier of the series of base operations to be executed, the series of base operations being comprised within a set of predefinedType: ApplicationFiled: December 23, 2014Publication date: January 19, 2017Inventors: Maël BERTHIER, Victor SERVANT
-
Patent number: 9547498Abstract: A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card.Type: GrantFiled: May 21, 2013Date of Patent: January 17, 2017Assignee: MORPHOInventors: Mael Berthier, Louis-Philippe Goncalves, Francois Lecocq, Cyrille Pepin
-
Publication number: 20160371531Abstract: A biometric identification method comprising the steps of comparing a candidate print with a reference print and validating identification as a function of a number of characteristics that are common in the two prints and of a predetermined validation threshold, the method being characterized in that it comprises the steps of altering the biometric characteristics of one of the two prints prior to comparison and of taking the alteration into account during validation.Type: ApplicationFiled: June 16, 2016Publication date: December 22, 2016Inventors: Yves BOCKTAELS, Julien BRINGER, Mael BERTHIER, Marcelin RAGOT
-
Patent number: 9372791Abstract: The invention relates to a method for masking the end-of-life transition of an electronic microprocessor device comprising a reprogrammable non-volatile memory containing an end-of-life state variable (FdVE). The value of the variable (FdVE) is loaded (A) into random access memory. Prior to the execution of any current command (COM), the value of the variable (FdVR) in random access memory is checked (B). The end-of-life transition is executed (C) in the event of an empty value. Otherwise, the initialization or the execution of the command (COM) is continued (D). Upon detection (E) of an intrusive attack, the end-of-life state variable (FdVR) is written (F) in the single random-access memory, and the end-of-life state variable (FdVE) is deleted (G) from the non-volatile memory in a delayed manner. The invention is suitable for all electronic devices, microprocessor cards or the like.Type: GrantFiled: January 10, 2012Date of Patent: June 21, 2016Assignee: MORPHOInventors: Mael Berthier, Michael Barthe
-
Publication number: 20150213261Abstract: Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input with main secret data (CTRL, PIN) stored in said electronic component, characterized in that the processor implements, in addition to the comparison with the secret data (CTRL, PIN), complementary operations on the proof data (EPR, AUTH) which generate on the electronic component a variation of behaviour which is dependent on the proof data (EPR, AUTH) which it receives as input and which is compounded with the behavioural variation related to the comparison with the main secret data (CTRL, PIN).Type: ApplicationFiled: July 9, 2013Publication date: July 30, 2015Inventor: Mael Berthier
-
Publication number: 20150180882Abstract: A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behaviour of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program.Type: ApplicationFiled: July 8, 2013Publication date: June 25, 2015Applicant: MORPHOInventors: Thanh Ha Le, Julien Bringer, Louis-Philippe Goncalves, Maël Berthier
-
Publication number: 20150143096Abstract: A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card.Type: ApplicationFiled: May 21, 2013Publication date: May 21, 2015Applicant: MORPHOInventors: Mael Berthier, Louis-Philippe Goncalves, Francois Lecocq, Cyrille Pepin
-
Publication number: 20150098519Abstract: An embedded system and, in particular, a communication protocol suitable for a data transmission using auxiliary physical channels of such an embedded system. A transmission method suitable for such a channel includes the transmission of a data signal based on the encoding of three symbols. The message consists of a preamble allowing recognition of the symbols used, followed by the significant part of the message. The decoding of the message comprises a first step of learning the symbols used, prior to the decoding of the significant part of the message.Type: ApplicationFiled: May 7, 2013Publication date: April 9, 2015Applicant: MORPHOInventors: Mael Berthier, Yves Bocktaels, Julien Bringer, Francois Lecocq