Abstract: The invention is a system of managing indexation of memory. Said system has a microprocessor, and a flash memory. Said flash memory has an indexed area comprising indexed items, and an index that is structured in a plurality of index areas comprising a plurality of entries. Said flash memory comprises an index summary comprising a plurality of elements. Each index summary element is linked to an index area of said index. Each index summary element is built from all entries belonging to said linked index area and is built using k hash functions, with 1?k.
Abstract: The invention relates to a method for the preselection of at least one application hosted in a secure or non-embedded element in a mobile communication device comprising an NFC system, the said device being capable of accessing and reading data stored in a target NFC system, of the contactless tag or card type, the said NFC system being capable of operating in at least two communication modes including a reader mode, and a card emulation mode, or a Peer-to-Peer mode. When the NFC system is in the reader mode, an application is preselected during a stage wherein data stored in the said target NFC system are read.
Abstract: The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC.
Type:
Grant
Filed:
December 7, 2010
Date of Patent:
June 3, 2014
Assignee:
Gemalto SA
Inventors:
Francois Ennesser, Nicolas Joubert, Florent Labourie, Nicolas Roussel
Abstract: This invention proposes a method to obtain the cost of transmitting a set of data from a transmitting means (2, 3, 16) to a receiving means (2, 3, 16) via a network (4), which consists of creating and sending with the set of data itself a data item, called a ticket (19, 23), used to determine the volume and/or the value of said set of data transmitted. Using said ticket, the receiving means can take into account the cost of executing said set of data thereby simplifying the billing. This invention also concerns the systems used to implement said method especially in cellular packet radiocommunication networks.
Type:
Grant
Filed:
October 9, 2002
Date of Patent:
June 3, 2014
Assignee:
Gemalto SA
Inventors:
Christian Guion, Ghazi Ben Amor, Alain Rhelimi, Omar Habbal
Abstract: (EN)The invention relates to a method Method for accessing a service (S) of a service provider (SP 3) by providing anonymously an attribute or a set of attributes of a user determined and stored in an attribute provider (AP 2), comprising a step of processing pairs of public and private keys (KS,KP) of said user in a secure element (SE 1), each public key being used used once and for one set of attributes only for characterised in that it comprises—receiving (S5) by the service provider from the secure element a certificate (CAPKP) delivered by the attribute provider, and a list (LA[Y0]) of attribute values (AY) associated to random values (RandomY) in response to a list of attribute requests (L[Y0]);—determining (S6) by the service provider, digest codes (DiY) associated to said list (LA[Y0]) of attribute values (Ay) and corresponding random values (RandomY), wherein DiY=SHA?2 (Randomy, AY),—extracting data (CAL) from said certificate (CAPKP), accessing to said service (S) if said determined digest codes (Di
Abstract: The invention relates to a method for selecting an available memory size of a circuit including at least a CPU and a total memory, the method includes a stage for the selection of an available memory size that is smaller than or equal to that of the total memory. The selection stage is implemented by the manufacturer of the product incorporating the said circuit, different from the circuit manufacturer, and includes a stage for the generation of a configuration signature intended for the circuit manufacturer, which information is representative of the size of available memory size selected in this way by the product manufacturer.
Abstract: A method for transmitting a SIM application of a first terminal to a second terminal, the SIM application being stored in a secure element included in the first terminal, with access to the SIM application being locked by a PIN code. The method includes exporting the SIM application from the first terminal to a distant site, by including the PIN code as well as a remote loading code. A user of the second terminal is asked to enter the remote loading code in the second terminal. In the event the remote loading code entered by the user matches the remote loading code that has been exported, the installation of the SIM application in a secure element of the second terminal is authorized. Otherwise, the SIM application is not installed in the secure element of the second terminal.
Abstract: The invention relates to a radiofrequency device comprising a passive antenna tuned or intended to be tuned in frequency with at least one transponder, said transponder comprising an integrated circuit chip linked to an antenna interface defining an electromagnetic coupling surface periphery, said passive antenna comprising a main loop formed of turns comprising at least one portion of surface (B) inside the loop, at least one recess of the main loop, oriented from the interior to the exterior of the main loop, said portion of surface (B) being located in said recess so as to effect an electromagnetic coupling with a transponder circuit; the device is distinguished in that it comprises two recesses receiving or intended to receive a transponder each.
Type:
Application
Filed:
May 15, 2012
Publication date:
May 15, 2014
Applicant:
GEMALTO SA
Inventors:
Nizar Lahoui, Arek Buyukkalender, Frederick Seban
Abstract: A security document (1-1), comprising at least a first layer (2-2) and a second layer (2-4) above the first layer (2-2), the second layer (2-4) being of optically variable ink, and one or more personalization elements, the second layer (2-4) comprising one or more wholly ink free areas (2-12, 2-16, 2-21) that are optically variable elements of the one or more personalization elements and/or one or more partly ink free areas (2-14) that are optically variable elements of the one or more personalization elements.
Type:
Application
Filed:
April 13, 2012
Publication date:
May 15, 2014
Applicant:
GEMALTO SA
Inventors:
Teemu Pohjola, Maila Korhonen, Jarmo Nikkila
Abstract: A Trusted Service Manager (TSM) receives installation requests (INST) from Service Providers (SPx) comprising an application (APPx), a Service Provider identifier (SPx-ID) and an identifier (MOx-ID) of a target mobile communication device (MOx) that is equipped with a memory device (MIF) to store the application (APPx). The Trusted Service Manager (TSM) transmits the application (APPx) to the target mobile communication device (MOx) and keeps a repository (REP) of the received applications (APPx), their associated service provider identifiers (SPx-ID) and their associated target mobile communication device identifiers (MOx-ID). If the Trusted Service Manager (TSM) receives queries (QU) from a Mobile Network Operator (MNO) asking for the Service Providers associated with a specific mobile communication device identifier (MOx-ID) it retrieves from the repository (REP) those Service Providers (SPx) that are associated with the queried mobile communication device identifier (MOx-ID).
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Grant
Filed:
October 19, 2010
Date of Patent:
May 13, 2014
Assignee:
Gemalto SA
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: A method for establishing a communication channel between a local server and a remote server includes: i) transmitting, from the local server to a terminal, the IP address of the remote server and a communication port of the local server; ii) transmitting the IP address of the terminal from the terminal to the local server; iii) transmitting, from the local server to the terminal, a request to connect to the remote server, including the IP addresses of the remote server and the terminal, an identifier of the local server; and the communication port; iv) transmitting, from the local server to the remote server, the IP address of the terminal, an identifier of the local server, and the communication port; and v) combining, at the remote server, the identifier of the local server and the IP address of the terminal to ascertain an IP address of the local server.
Abstract: A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC.
Abstract: The invention relates to a method for the laser marking of a support having a body and a cover sheet. A laser beam is used to etch the body of the support through the thickness of the cover sheet. The support is laminated either during or after the laser marking in order to reduce or prevent deformations in the cover sheet resulting from etching.
Abstract: A method of operating a host computer having a web-browser with the capability of executing at least one web-browser add-on to provide a web application access to a smart card to protect the smart card from security threats associated with being connected to the Internet. Prior to establishing a connection between a web application executing in the web browser, verifying that the web application has been authorized to connect to a smart care using the web-browser add-on to provide a web application access to a smart card.
Type:
Grant
Filed:
March 5, 2010
Date of Patent:
April 29, 2014
Assignee:
Gemalto SA
Inventors:
Ksheerabdhi Krishna, Kapil Sachdeva, HongQian Karen Lu
Abstract: To allow the display of the latest transactions completed, a smart card 100c comprises at least one secure chip 101c with at least one communication interface in order to communicate with a card reader in order to carry out a transaction. The card further comprises an electronic display 103, an independent battery 104, and an interception circuit 150c connected to the at least one communication interface of the secure chip in order to be able to intercept at least one type of command and save at least one piece of information so as to be able to display it on the display.
Type:
Grant
Filed:
June 1, 2011
Date of Patent:
April 29, 2014
Assignee:
Gemalto SA
Inventors:
Michel Thill, Pierre Gravez, Francois-Xavier Marseille
Abstract: The invention relates to the securing of information media so as to prevent any alteration or modification of the identification information and the fraudulent reuse of the media. The identification document according to the invention comprises personalisation information placed on at least one of its main sides, and invisible anti-forgery means placed on at least part of the said side and designed to undergo a change in appearance in the event of an attempt to do additional personalisation.
Abstract: A secure device includes a non volatile memory and a secure storage unit for a contactless reader. The storage unit manages logical sectors comprising a preset number of 16-byte data blocks and provides secured access to these data blocks. The unit is a software agent. The secure device comprises a microprocessor able to run the secure storage unit. The unit is adapted to ensure consistency of the data blocks and to ensure a preset number of writing into the data blocks without erasing operations.
Abstract: The invention relates to the reuse of identity data from an identity module in a user equipment by a peripheral device. In order to enable the reuse of identity data from an identity module, such as a SIM or UICC card, in a user equipment by a peripheral device, the identifier of the peripheral device is transmitted to the module upon establishment of communication and authentication between the module and the peripheral device. Subsequently, identity data are transmitted, preferably selectively, by the identity module to the peripheral device when the transmitted identifier is recognized as one of the identifiers of the peripheral devices that were previously stored in the identity module. The identity data are reused by the peripheral device in order to establish a communication with the home network of the user equipment or with a local wireless network.
Abstract: A matching device carries out data exchange between a processing unit and a wireless peripheral device and/or a communication object associated with the peripheral device. The matching device includes a communication interface with the processing unit; a wireless communication interface with the wireless peripheral device; information stating means for stating technical capacity information to the processing unit, enabling the latter to select an appropriate driver/communication means; and data-processing means. The data-processing means is capable of carrying out a matching of an exchange protocol and/or formats of data to be exchanged between the processing unit and the communication object. The technical capacities stated by the stating means pertains to the wireless peripheral device and/or to the communication object associated therewith, the technical capacities being considered to pertain to the matching device by the processing unit.