Patents Assigned to EADS Secure Networks
  • Publication number: 20110030033
    Abstract: A terminal exhibits at least one functionality made secure on the basis of a security item. A security entity stores said security item as well as first authentication parameters. The terminal stores second authentication parameters. At the level of the terminal, an authentication of the security entity is performed on the basis of the first and second authentication parameters. Next, a secure contactless link is established with the security entity. Finally, the security item stored on said security entity is received in the course of said secure link.
    Type: Application
    Filed: April 7, 2009
    Publication date: February 3, 2011
    Applicant: EADS SECURE NETWORKS
    Inventor: Frédéric Rousseau
  • Publication number: 20110018683
    Abstract: The identity of a user to be associated with a terminal adapted for communication in a communication network is managed. The network provides a service based on the identity of the user. A contactless transaction is established at the terminal with an identification entity. During the transaction, a piece of information on the identity of the user stored in the identification entity is received. Finally, the identity of the user obtained from said information is stored. The identity of the user is erased at the terminal when the terminal is subjected to a specific action.
    Type: Application
    Filed: March 18, 2009
    Publication date: January 27, 2011
    Applicant: Eads Secure Networks
    Inventors: Frédéric Rousseau, Stéphane Eloy
  • Publication number: 20100309003
    Abstract: A method for producing a proof of the presence and/or of the availability of an entity in a site over a period that is greater than or equal to a presence threshold, the method including: successively transmitting messages, the messages being generated from a secret such that the secret may be reconstituted by having the knowledge of a given number of messages that is greater than or equal to a threshold, each message being transmitted over a transmission period whose duration is chosen such that the product of the duration of the transmission period times the threshold is substantially equal to the presence threshold; comparing the secret and a secret candidate generated from messages received by the entity; the proof being produced only if the secret and the secret candidate are equal.
    Type: Application
    Filed: December 18, 2008
    Publication date: December 9, 2010
    Applicant: EADS SECURE NETWORKS
    Inventor: Frederic Rousseau
  • Publication number: 20100290555
    Abstract: A radio communication emitter includes at least two antennas for emitting a signal including encoded bits that are converted into symbols distributed on subcarriers and in time intervals. The emitter includes a signal divider for distributing the set of the signal symbols into as many disjoined subsets of signal symbols as the antennas that the emitter comprises. Each subset is dedicated to one of the antennas. The union of the subsets is the set of the signal symbols. Symbols are distributed in at least two subsets for at least one time interval or for at least one subcarrier of the signal. The antennas synchronously emit the symbol subsets. The symbol subsets can comprise a substantially identical number of symbols to reduce a deviation between the power peaks and the average power of the signal emitted by each antenna.
    Type: Application
    Filed: July 17, 2008
    Publication date: November 18, 2010
    Applicant: EADS SECURE NETWORKS
    Inventor: Philippe Mege
  • Publication number: 20100262690
    Abstract: Determining an operation mode of a terminal, and recording communications data of the terminal, on the basis of the determined operation mode.
    Type: Application
    Filed: March 30, 2010
    Publication date: October 14, 2010
    Applicant: EADS SECURE NETWORKS OY
    Inventor: Vesa-Matti JOKINEN
  • Patent number: 7774677
    Abstract: For the transmission of information with verification of transmission errors, a useful information message (M) is transmitted in a determined frame while being associated with a determined number p of transmission error verification bits (CRC,S) also transmitted in the frame. In order to have an element allowing the verification of intentional errors, determined number p1 of the transmission error verification bits form a seal (S) obtained from a determined sealing function, where p1 is a number less than p. Application to radiocommunications equipment requiring the verification of the integrity and the authentication of the messages transmitted.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: August 10, 2010
    Assignee: EADS Secure Networks
    Inventors: Marc Mouffron, Jean-Michel Tenkes
  • Patent number: 7764633
    Abstract: A method for managing two-way alternate communication in half-duplex mode between at least two end equipments of a packet switching transport network in non-connected mode, provides that an indicating element serves, when it is present with a first given value in the packets transmitted from one of said end equipments to a central equipment managing the communication, to indicate to said central equipment that said end equipment acknowledges receipt of the right to send which is granted to it by said central equipment and that it requests the maintaining of said right to send.
    Type: Grant
    Filed: March 26, 2002
    Date of Patent: July 27, 2010
    Assignee: Eads Secure Networks
    Inventor: Gérard Marque-Pucheu
  • Publication number: 20100142528
    Abstract: A method for managing a data stream in a communication system. One or more user stations and switching and management infrastructure are configured with a function that maps packet data protocol addresses of data transmissions to defined service access point identifiers. A packet data context for data transmissions of a packet data service is created by associating a packet data protocol address with a service access point identifier used in an interface between one or more user stations and the switching and management structure. A function is used for determining independently in the one or more user stations or the switching and management infrastructure the service access point identifiers for data transmissions of the packet data service.
    Type: Application
    Filed: April 30, 2008
    Publication date: June 10, 2010
    Applicant: EADS SECURE NETWORKS OY
    Inventors: Ilpo Paltemaa, Timo Stenberg
  • Publication number: 20100138462
    Abstract: The invention related to a method for encoding information using non-linear evenly distributed functions, that comprises the following steps for building such a function: selecting a first natural integer n, a first set En of cardinal n, a group G operating on said first set En, a second natural integer q and a second set Eq of cardinal q; defining a set OG of the orbits of the group G operating on vectors of n elements in the set Eq, a function II that, for each vector of the n elements of the set Eq, associates the corresponding orbit and a second function ? allocating to each orbit of the group G a value of the set Eq; evenly distributing into a number q of sections the sums of the cardinals of the orbits of the group; defining a third function F comprising the first and second functions ?oII.
    Type: Application
    Filed: December 14, 2009
    Publication date: June 3, 2010
    Applicant: Eads Secure Networks
    Inventor: Marc Mouffron
  • Patent number: 7684980
    Abstract: For the transmission of a secondary information flow between a transmitter and a receiver, the secondary information flow is inserted at a parametric vocoder of the transmitter which generates a main information flow. The main information flow is a speech data flow encoding a speech signal and is transmitted from the transmitter to the receiver. Bits from the secondary information flow are inserted into only some of the frames of the main information flow, these frames being selected by a frame mask which is known to the transmitter and the receiver, and/or into a determined frame of the main information flow, by imposing a constraint on only some of the bits of the frame, these bits being selected by a bit mask known to the emitter and the receiver.
    Type: Grant
    Filed: September 6, 2004
    Date of Patent: March 23, 2010
    Assignee: Eads Secure Networks
    Inventor: Frédéric Rousseau
  • Patent number: 7675445
    Abstract: In order to convert a complex analog signal into a complex digital signal in an analog-digital conversion device having two channels, I and Q respectively, in quadrature, each comprising an input and an associated output, each output being fed back onto said associated input so as to form a first and a second feedback loops each comprising a digital-analog converter, the device comprising a complex filter with a first stage and a last stage, after sampling (508), a signal integration is performed in a first stage (501) of the filter without introducing any substantial delay. Then, an integration is performed in the last stage (502) of the filter. A substantial delay (507) is then introduced and the output signal of the last stage is converted into a digital signal over several bits. The digital signal is injected into the feedback loop (108) of said channel and the digital signal is converted into a feedback signal.
    Type: Grant
    Filed: September 19, 2005
    Date of Patent: March 9, 2010
    Assignee: Eads Secure Networks
    Inventors: Michel Robbe, Stéphane Doucet, Hervé Guegnaud
  • Patent number: 7668278
    Abstract: An oscillator (30) supplies a high frequency signal (S) to a frequency divider (31). A phase comparator (32) produces a signal measuring phase difference between the divided frequency signal (QA) and a reference signal. A low-pass filter (34) controls the oscillator on the basis of the measurement signal. A measurement window, of duration defined by counting cycles of the high frequency signal, is generated in response to each active edge of the divided frequency signal. The measurement signal is activated during the measurement window so that it comprises, when an active edge of the reference signal falls within the window, a first pulse between the start of the window and this edge and a second pulse, opposite to the first, between this edge and the end of the window.
    Type: Grant
    Filed: December 15, 2004
    Date of Patent: February 23, 2010
    Assignee: Eads Secure Networks
    Inventors: Michel Robbe, Sami Aissa
  • Patent number: 7664506
    Abstract: A communication system includes a plurality of channels, a first service that utilizes at least a first channel for transmission, and a second service that utilizes at least a second channel for transmission. Operating means are provided for operating the first service in connection with the second service, so that the first service can utilize the second channel. Adjusting means are provided for adjusting the utilization of the second channel by the second service at least during the connected operation of the first and the second service. The utilization of a channel whose capacity is essentially dynamically adjustable is facilitated by a service that, according to the pre-defined protocols, is directed to use a channel whose capacity is more statically adjustable.
    Type: Grant
    Filed: February 14, 2003
    Date of Patent: February 16, 2010
    Assignee: EADS Secure Networks Oy
    Inventor: Tero Pesonen
  • Publication number: 20100035603
    Abstract: In a communication system at least one operational criterion is applied for a group of one or more users. On the basis of such operational criterion, one or more interface rules are generated. An interface rule includes information that identifies an application that is capable of utilizing two or more communication interfaces, and also a function for determining a communication interface to be applied by that application in communications of the group of one or more users. A profile that includes interface rules generated on the basis of operational criteria to be applied for a user is created and stored in a user terminal of the user. Use of applications can be matched with operational requirements posed on or by the user, without substantial need to change the applications and/or the configuration of the terminal due to the matching.
    Type: Application
    Filed: July 30, 2009
    Publication date: February 11, 2010
    Applicant: EADS Secure Networks Oy
    Inventors: Jaakko SAIJONMAA, Juha Lehtonen, Ilpo Paltemaa
  • Publication number: 20090290575
    Abstract: An identifier (IDp) designates a group of terminals accessible via the network (RP) by packets having a multicast address as destination address. An equipment (EIm) between the network and a terminal (Tn) belonging to a group calculates the multicast address of the group using a function depending on the identifier (IDp) of the group each time that a packet including a message transmitted by the terminal is to be transmitted to the network. The equipment also calculates a group identifier (IDp) using a function depending on a multicast address extracted each time that a packet transmitted from the network is received by the equipment in order to transmit a message content extracted from the packet to be received by the terminal if the calculated group identifier is identical to the identifier of the group to which the terminal belongs. No table of mappings between the identifiers of the groups and the multicast addresses is stored in the equipment.
    Type: Application
    Filed: August 22, 2007
    Publication date: November 26, 2009
    Applicant: EADS SECURE NETWORKS
    Inventor: Patrice Simon
  • Patent number: 7620014
    Abstract: Radio signals are transmitted between a base station and mobile terminals. The radio signals are transmitted from the base station to the mobile terminals on a first frequency and are transmitted from the mobile terminals to the base station on a second frequency. The first frequency carries a downlink traffic channel, while the second frequency carries an uplink traffic channel. The first frequency further carries a first downlink signaling channel to a mobile terminal in the transmission phase on the uplink traffic channel, and a second downlink signaling channel to a mobile terminal in the reception phase on the downlink traffic channel. The second frequency further carries a first uplink signaling channel from a mobile terminal in the reception phase on the downlink logical traffic channel and a second uplink signaling channel from a mobile terminal in the transmission phase on the uplink traffic channel.
    Type: Grant
    Filed: May 17, 2000
    Date of Patent: November 17, 2009
    Assignee: Eads Secure Networks
    Inventors: Gérard Marques-Pucheu, Jean Pierre Metais
  • Patent number: 7620184
    Abstract: A process for transmitting encrypted data through a radio transmission channel having a frame structure such that a TDMA frame comprises at least time slots of a first type forming a traffic channel and at least one time slot of a second type forming an associated signaling channel, comprises steps according to which: a sequence of encrypted data packets is transmitted in the traffic channel on the basis of a determined time slot of the first type, whereas an associated cryptographic synchronization information cue is transmitted in the associated signaling channel inside a determined time slot of the second type, and a cryptographic synchronization delay information cue relating to the time gap between said determined time slot of the second type and said determined time slot of the first type, is also transmitted in the associated signaling channel.
    Type: Grant
    Filed: July 21, 2003
    Date of Patent: November 17, 2009
    Assignee: Eads Secure Networks
    Inventor: Gérard Marque Pucheu
  • Patent number: 7593477
    Abstract: There is disclosed a linearization training sequence that is transmitted by means of a radio frequency transmitter which is comprised in a mobile terminal or a base station of a radiocommunication system and transmits bursts according to a given frame structure. The sequence comprises a given number N of symbols which are part of an alphabet of symbols, N being an integer. At least one given number N1 of symbols of the sequence that is transmitted first is part of a sub-alphabet of symbols, which is contained in the alphabet of symbols, N1 being an integer that is smaller than or equal to N. The sub-alphabet of symbols consists of individual or a combination of symbols that provide the burst within which the sequence is transmitted with a narrower spectrum than the alphabet of symbols as a whole.
    Type: Grant
    Filed: October 24, 2003
    Date of Patent: September 22, 2009
    Assignee: Eads Secure Network
    Inventors: Sandrine Touchais, Xavier Checoury
  • Publication number: 20090172055
    Abstract: The invention concerns a random number generator comprising a n-bit LSFR at least one oscillator having at least one delay element introducing a variable delay in the counter feedback loop, and at least one sampling/holding device having at least one input coupled to an output of the oscillator, and at least one output coupled to a input of the LSFR, and a clock input receiving a sampling clock signal at a much lower frequency than the oscillator frequency. Said generator is for example configured to vary the delay introduced by the oscillator delay based on a number q of feedback bits among the n bits of the LSFR output, where q is a an integer such that 1?q?n.
    Type: Application
    Filed: March 26, 2007
    Publication date: July 2, 2009
    Applicant: Eads Secure Networks
    Inventors: Patrick Radja, Roland Stoffel
  • Publication number: 20090147956
    Abstract: A secret element is shared with a cryptographic module. The secret element can be obtained from at least first and second partial secret information items. A first transmission transmits the first partial secret information item to the cryptographic module but not the first partial information item, this second transmission being separate from the first transmission. The secret element can then be obtained in the cryptographic module from the first and second partial secret information items transmitted.
    Type: Application
    Filed: December 19, 2006
    Publication date: June 11, 2009
    Applicant: EADS SECURE NETWORKS
    Inventors: Frederic Rousseau, Jean-Michel Tenkes, Marc Mouffron