Patents by Inventor Patrick Van Haver

Patrick Van Haver has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240098095
    Abstract: Techniques are described herein for applying access controls to logical secure elements (LSEs) running on the same secure element hardware platform. Embodiments include a firmware component that determines whether a message targeting an LSE is authorized to trigger an operation. For example, the firmware component may verify a signature of the received message using a public key, shared secret, or other access control key. Additionally or alternatively, access control policies may be defined to constrain the load of the LSEs on the SE platform hardware and/or to prioritize LSE access. For example, the access control policies may define usage thresholds, such as maximum threshold memory and/or processor utilization rates. As another example, the access controls may restrict the active time for an LSE to a threshold duration. If access constraints are violated or the message cannot be verified, then the firmware component may delay or deny the operation.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Applicant: Oracle International Corporation
    Inventors: Nicolas Michel Raphaël Ponsini, Patrick Van Haver, Sebastian Jürgen Hans
  • Publication number: 20240095328
    Abstract: Techniques are described herein for running multiple logical secure elements (LSEs) on the same physical secure element (SE) hardware. For example, embodiments may include running multiple logical Subscriber Identification Modules (SIM) cards on the same physical SIM card or universal integrated circuit card (UICC). Additionally or alternatively, embodiments may include running other secure element applications and services on the same SE hardware. The techniques allow for mobile devices users to access multiple security services, which may originate from different security service providers (SSPs), in a secure manner using the same SE hardware without requiring the integration of multiple physical slots on a mobile device or the physical exchange of different cards within the same slot.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Applicant: Oracle International Corporation
    Inventors: Nicolas Michel Raphaël Ponsini, Patrick Van Haver, Sebastian Jürgen Hans
  • Publication number: 20230351028
    Abstract: Techniques for implementing and enforcing a security policy in a secure element are disclosed. The secure element enforces the security policy to grant and/or deny access, such as from an application processor, to configuration of the device peripheral components and access to data of the device peripheral components across one or more bus architectures, such as an I3C bus. Implementing an access control policy in a secure element allows execution of code within the isolated secure element hardware processor, preventing software attacks that may emanate from code running in the application processor. This design also benefits from hardware protections against physical attacks.
    Type: Application
    Filed: April 29, 2022
    Publication date: November 2, 2023
    Applicant: Oracle International Corporation
    Inventors: Nicholas Michel Raphaël Ponsini, Patrick Van Haver
  • Patent number: 9569602
    Abstract: A method and system for receiving from an authenticated user, at an authorization server, via a service provider, an authorization request to perform a sensitive operation on a first device. The method also includes generating, by the authorization server and in response to receiving the authorization request, an authorization token that includes a device constraint and a binding code constraint, which includes a binding code. Additionally, the method includes transmitting the authorization token to an isolated execution environment of the first device, where the sensitive operation is not permitted on the first device unless the first device successfully performs a verification in the isolated execution environment using the authorization token. Furthermore, the method includes permitting the sensitive operation based on the verification.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: February 14, 2017
    Assignee: Oracle International Corporation
    Inventors: Thierry Violleau, Patrick Van Haver
  • Patent number: 9525705
    Abstract: A system and method can support on-device operation management. A token issuer on a backend server, and/or a tool, can generate an authorization token, which is bound to a user of one or more devices using a unique identifier (ID) that is assigned to the user. The unique ID can be known and/or shared between the an on-device authorizing entity and the token issuer. Then, the on-device authorizing entity can verify the authorization token before granting an execution of one or more protected on-device operations. Furthermore, the on-device authorizing entity may not grant the execution of the one or more protected on-device operations, when the unique ID is erased from the device.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: December 20, 2016
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Thierry Violleau, Nicolas Ponsini, Patrick Van Haver
  • Publication number: 20160232335
    Abstract: A method and system for receiving from an authenticated user, at an authorization server, via a service provider, an authorization request to perform a sensitive operation on a first device. The method also includes generating, by the authorization server and in response to receiving the authorization request, an authorization token that includes a device constraint and a binding code constraint, which includes a binding code. Additionally, the method includes transmitting the authorization token to an isolated execution environment of the first device, where the sensitive operation is not permitted on the first device unless the first device successfully performs a verification in the isolated execution environment using the authorization token. Furthermore, the method includes permitting the sensitive operation based on the verification.
    Type: Application
    Filed: February 5, 2015
    Publication date: August 11, 2016
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Thierry Violleau, Patrick Van Haver
  • Publication number: 20150143484
    Abstract: A system and method can support on-device operation management. A token issuer on a backend server, and/or a tool, can generate an authorization token, which is bound to a user of one or more devices using a unique identifier (ID) that is assigned to the user. The unique ID can be known and/or shared between the an on-device authorizing entity and the token issuer. Then, the on-device authorizing entity can verify the authorization token before granting an execution of one or more protected on-device operations. Furthermore, the on-device authorizing entity may not grant the execution of the one or more protected on-device operations, when the unique ID is erased from the device.
    Type: Application
    Filed: March 20, 2014
    Publication date: May 21, 2015
    Applicant: Oracle International Corporation
    Inventors: Thierry Violleau, Nicolas Ponsini, Patrick VAN HAVER
  • Publication number: 20100211784
    Abstract: The invention relates to a method for accessing a portable device, the portable device being connected to a host device. According to the invention, the host device, as a client, opens a communication channel to the portable device, as a server, according to a first network communication protocol, and the portable device, as a client, uses the communication channel to transport data to the host device, as a server, according to a second network communication protocol, without the implementation of any complex infrastructure. The invention relates also to a corresponding system for accessing a portable device, a corresponding portable device accessible from outside and a corresponding host device for accessing a portable device.
    Type: Application
    Filed: September 29, 2008
    Publication date: August 19, 2010
    Applicant: GEMALTO SA
    Inventors: Laurent Lagosanto, Patrick Van Haver, Patrice Amiel