Abstract: The present invention relates to a method and system for securing a validation process of an online payment transaction. During an online transaction on a mobile device, it is requested a contactless tap from a contactless display card (thanks to NFC reader mode in the mobile device) to establish a contactless exchange session. During this contactless exchange session, the display card receives the amount requested for the transaction and the identification of merchant. The user is invited to check amount and merchant identification on the screen of the display card. When the user validates the transaction by for example pressing on a corresponding button then the display card creates an authorization message comprising enciphered financial user information and data on the transaction. With a second tap from the display card, the mobile device receives the authorization message which is transmitted to the display card issuer through the merchant for validation.
Abstract: The invention is a method of configuring a device and a wireless unit. The device is able to operate in tag mode and in wireless reader mode. The wireless unit is able to operate in wireless reader mode and in a card emulation mode. The method comprises the steps of: reading a setting data into the device running in tag mode, the setting data corresponding to a first configuration and being read by the wireless unit which operates in wireless reader mode, activating the first configuration in the unit, writing an acknowledgment data into the device and switching the unit to the card emulation mode, switching the device to the wireless reader mode when the presence of the acknowledgment data is detected in the device.
Abstract: The present invention relates to a smart card comprising a card body and an electronic module placed within a recess of the card body and further comprising at least one colored layer placed between the electronic module and the bottom of the recess of the card body.
Abstract: The invention relates to a method for managing a wireless link between a first device and a second device. The method includes the steps of polling an activity of a first wireless interface of the first device during a first predetermined lapse of time, suspending the wireless link and polling an activity of a first body-coupled communication interface of the first device during a second predetermined lapse of time when no activity is detected on the first wireless interface of the first device during the first predetermined lapse of time, and resuming the wireless link when at least one polling packet comprising a resume request is detected by the first body-coupled communication interface of the first device during the second predetermined lapse of time.
Abstract: The invention relates to a method for producing an intermediate device comprising an electronic module, said intermediate device being used to receive at least one film or portion of a film or covering layer, said device comprising: a supporting body; at least one area for the interconnection of an electric circuit, borne by the supporting body; and an electronic module connected to said interconnection area by an anisotropic connection material, said material being compressed between said area and the module. The method comprises the implementation of a means for maintaining the compressed state of said anisotropic material and/or a means for isolating said material from the outside of the supporting body.
Abstract: In an embodiment, there is provided a method for handling Machine to Machine M2M services in a communication system, said method comprising a step of, for charging for IP Connectivity Access Network IP-CAN bearer services in said communication system: providing global charging information for a plurality of terminals using a same M2M service.
Abstract: A method for managing a subscriber device includes a first detection step in which a first device detects a first status relating to a presence of a subscriber device under a radio coverage of a home mobile network. In the first detection step, the first device intercepts a message for requesting whether the subscriber device has or has not been stolen, as request message, the request message originating from a Mobile Switching Center relating to the home mobile network and being addressed to an Equipment Identity Register relating to the home mobile network. A corresponding first device is also disclosed.
Type:
Application
Filed:
June 19, 2014
Publication date:
May 12, 2016
Applicant:
GEMALTO SA
Inventors:
Daniel CHIARAMELLO, Aurelia BORDAS, Christophe LECUYER, François ZANNIN, Jean-François KUC, Daniel MAVRAKIS, Hervé TROADEC
Abstract: A method for making an intermediate electronic device, wherein said device is coated or is to be coated with a cover sheet or layer, the method comprising the step of forming a carrier-body comprising: a cavity provided in the carrier-body; an electric circuit comprising at least one electric interconnection area inside the cavity; an electronic module comprising at least one connection pad connecting said interconnection area and arranged in the cavity; a space or gap provided at the interface between the module and the carrier-body, substantially perpendicular to a main surface of the carrier-body, in communication with the surface of the carrier-body, and intended to be covered with a cover sheet or layer; the method is characterized in that a flexible or elastic material is arranged in the device so as to fill the space or gap between the module and the body-carrier or at least partially cover same.
Type:
Application
Filed:
June 3, 2014
Publication date:
May 5, 2016
Applicant:
GEMALTO SA
Inventors:
Francis ALLOT, Sophie LOMBARDO, Mikko LANKINEN, Youssiph KAMAGATE, Frédéric BLACHON
Abstract: A pairing device for establishing a secure wireless communication path between a first device having a first body-coupling communication interface and a second device having a screen.
Abstract: The method for protecting a logic or mathematical operator of the NOR operator type, able to be used for executing a program in a microprocessor electronic module wherein the execution of the NOR operator is replaced by the execution (CAL-XORSEC(1) of a sequence Si operations having for final result a result identical to that of the XOR function. The sequence of operations Si composed of elementary operations with AND, OR and NOT is selected at each XOR operator from a set of eight equivalent sequences (S1 to S8) after determination CAL-NDO) of an order number ND0=1 according to the parameters of the program and/or a random parameter R supplied by a pseudo-random number generator (14).
Type:
Grant
Filed:
December 20, 2001
Date of Patent:
April 26, 2016
Assignee:
GEMALTO SA
Inventors:
Nicolas Giraud, Abraham Brolh, Patrice Hameau
Abstract: A two-way communication device has a master transmitter connected to at least one slave transmitter by an active connection wire. The master transmitter and the slave transmitter have a common reference. The master transmitter can transmit a master signal to the slave transmitter and the slave transmitter can transmit a slave signal to the master transmitter. The master signal is a digital modulation in voltage. The slave signal is a digital modulation in current.
Abstract: Mutual authentication between: (i) a user terminal cooperating with a security element and an application for registering with a service, and (ii) a remote server that provides the service, by means of a third-party portal, includes: i) transmitting, to the remote server by means of the portal, signed information R enabling the security element to be authenticated in the remote server; ii) authenticating the security element in the remote server; iii) transmitting a value R? signed by the remote server to the application by means of the portal; iv) transmitting a request for verification of the signed value R? from the application to the security element; v) verifying, in the security element, the signature of the remote server and whether the requested service has been granted by the remote server; vi) establishing a secure connection with the remote server using the security element, and requesting that the service be executed.
Type:
Grant
Filed:
October 25, 2013
Date of Patent:
April 19, 2016
Assignee:
GEMALTO SA
Inventors:
Xavier Berard, Richard Pico, Frederic Faure, Benoit Gonzalvo
Abstract: The invention relates to a portable electronic device comprising a supporting member receiving on one side conductive contact lands or tracks extending substantially as far as the edge of the side and connecting an electronic microcircuit, the conductive contact lands or tracks comprising a plurality of perforations. The device is noteworthy in that the interior of the perforations is free, or intended to be kept free, of metal.
Abstract: A method of protecting a telecommunication terminal having a chip-card-type personal component which is required for telecommunication network access. The terminal includes a processing unit, at least one operating memory element containing the information necessary to the operation of the terminal, i.e. a terminal operating program, and the data necessary to the program. The method involves: a) encrypting the contents of the operating memory element of the telecommunication terminal using a pre-determined key K which is necessary for decryption; and b) allowing the terminal to commence decryption once the terminal has been started with a start-up program that is saved in a secure memory element and once the key for decryption has been calculated by same.
Abstract: The present invention relates to a method and device of performing Tracking Area Update TAU for a group of Machine-Type Communication MTC devices in a communication network. According to an embodiment of the present invention, the group comprises a first MTC device and at least one second MTC device that have the same group ID and location information, the communication network comprises an old Mobility Management Entity MME and a new Mobility Management Entity MME before and after TAU, respectively, for providing mobility management to the group of MTC devices, and the method comprises: after the new MME receives a TAU request about the first MTC device, obtaining a context of the first MTC device from the old MME; the new MME checking the context of the first MTC device to find the group ID of the group; and if the group ID is included in the context of the first MTC device, the new MME utilizing the group ID to obtain from the old MME a context of the at least one second MTC device.
Abstract: The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.
Abstract: A device comprises a memory. The memory stores data relating to at least one service profile template. The service profile template includes executable data. A server sends to the device a first message including a request for creating or modifying at least one service profile based upon a service profile template. The device executes the executable data. The device creates or modifies a memory area. The memory area is associated with a service profile by using the service profile template. The device sends to the server at least one second message including a request for loading into the device data relating to at least one service profile. The server sends to the device at least one third message including data relating to at least one service profile. And the device stores within the created or modified memory area the data relating to at least one service profile.
Abstract: A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC.
Abstract: The invention relates to a method for personalizing an electronic device using an encryption device adaptable to standard certified apparatuses. The encryption device makes it possible to ensure the confidentiality of the transfer of a secret code from the user to a possible personalization server.
Abstract: The invention relates to a smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The invention also relates to the use of a portable object for implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via said interactive display.