Abstract: A card reader payment terminal including an electronic circuit including at least one printed circuit board, to which are connected electronic components, including a microcontroller designed to control different peripherals, where the microcontroller is connected to an associated microprocessor, where the card reader payment terminal is configured to receive a smart card comprising the associated microprocessor, where the associated microprocessor comprises a connector compatible with the standardized connector of smart cards for connection with the microcontroller, where the microcontroller and the associated microprocessor operate in parallel for executing a task, and where the associated microprocessor is adapted to calculate a security operation.
Abstract: The invention relates to an authentication token for a communication network. The token may include a microprocessor, a memory, a stored secret key (Ki) and a set of instructions for controlling the microprocessor into performing an authentication calculation on the basis of a received random (RAND) and on the basis of the stored secret key. The token further includes a memory location dedicated for storing a counter value and it includes instructions for making the counter value evolve each time the authentication calculation is performed.
Abstract: The invention relates to a method to select a telecommunication network with a mobile equipment (10,20) comprising a mobile communication device (10) and a personal token (20), the method operating an algorithm (25) which selects at least one network to be operated by the mobile equipment among a plurality of available networks, wherein in the method, the algorithm is stored and run in the personal token (20).
Abstract: The invention relates to a secured element (9) including: —a communication interface (91); —an integrated circuit comprising a security module (93) comprising encryption based security features and configured to process authentication requests received on the communication interface. The secured element further. includes a MEMS microphone (94), said microphone being configured to capture a sound sequence and to provide the captured sound sequence to the security module.
Type:
Application
Filed:
May 24, 2012
Publication date:
March 27, 2014
Applicant:
GEMALTO SA
Inventors:
Yvon Gressus, Benoit Arnal, Bernard Deniau
Abstract: The invention relates, in particular, to a method for updating secure elements included in terminals of a telecommunication network. The terminals connect, for recurring updates and according to a first order, to a server of the network such that said server can transmit data thereto. In the context of a process for updating the secure elements, the method comprises transmitting messages requesting connection to the secure elements such that the latter connect to the server. According to the invention, the method comprises the prioritized transmission of the messages requesting connection to the secure elements in an order that is the reverse of the first order, in order to update, on a prioritized basis, the last secure elements that were updated by the recurrent updates from the start of the update process.
Type:
Application
Filed:
March 23, 2012
Publication date:
March 20, 2014
Applicant:
GEMALTO SA
Inventors:
Franck Mosse, Lionel Mallet, Richard Pico
Abstract: The invention is a method of managing a NFC transaction between two hosts and a reader device. The two hosts are embedded in NFC devices and are intended to be identified by the reader device during an anti-collision phase through a first identifier and a second identifier respectively. The first identifier comprises a variable part. The method includes the steps of generating the first identifier, the variable part of the first identifier and the second identifier comprising a common pattern, looking for a common pattern into the first and second identifiers on the reader device side, and if a common pattern is found and if the variable part of the first identifier comprises said common pattern, concluding that the first and second hosts are embedded in a unique NFC device.
Abstract: The invention relates to a radiofrequency communication device that comprises a gripping beating body having a surface; an electronic and/or electric circuit extending in the gripping beating body; at least one antenna provided in the vicinity of the electronic circuit. The device includes a connection circuit for connection to the antenna, that is provided at least partially in the gripping beating body and extends from the electronic circuit up to connection points of the antenna, said antenna connection points being accessible from the outside of the beating body.
Abstract: The present invention concerns a method for transferring securely the subscription information and user data from a first terminal to a second terminal, the terminals respectively containing a first and a second UICC. According to the invention, the method consists in: i—transmitting an identifier of the second terminal to the first terminal; ii—transmitting from the first terminal to a secure vault the identifier of the second terminal and an identifier of the first UICC; iii—transmitting from the secure vault to the first terminal a subscription installation public key of the second terminal; iv—in the first UICC, packaging and encrypting the subscription information and user data with the subscription public installation key of the second terminal; v—transmitting the package to the second UICC of the second terminal; vi—installing the package on the second UICC.
Abstract: A graphic printing machine and method for a card-type storage medium employs a jet printing head and a controller to perform ink jet printing on the medium. The invention is useful for printing plastic or cardboard or paper cards.
Abstract: The invention relates to a system for managing multiple subscriptions in a UICC, this system comprising a central server able to manage subscriptions stored on a UICC comprised in a mobile terminal in the field, at the request of a subscriber of one of these subscriptions.
Abstract: A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data.
Abstract: The invention concerns the contact-less technology MIFARE, and describes a method to update a state by injecting an IV using a non-linear feedback shift register that makes use of only look-up tables and basic operations on 8-bit words.
Abstract: The invention relates to a method for generating a session key between two communicating electronic devices not requiring any prerecorded information in one of the two devices and enabling the authentication of one of said devices. The method uses a close collaboration between a symmetrical algorithm and an asymmetrical algorithm.
Type:
Grant
Filed:
January 26, 2010
Date of Patent:
February 18, 2014
Assignee:
Gemalto SA
Inventors:
Karine Villegas, Aline Gouget, Louis Goubin, Pascal Paillier
Abstract: A method for minimizing an interfering current induced in an antenna receiving an electromagnetic field, where the field is generated by a transmitting antenna located near the receiving antenna. The receiving antenna is arranged relative to the transmitting antenna such that the induced current is at least partially cancelled out in the receiving antenna. The invention also relates to an antenna arrangement and to a device comprising the same.
Abstract: The present invention is a method to ensure a secure exchange of crypted numeric data between two entities, where their decryption depends to the approval of a third entity. The solution uses a combination of Identity Based Encryption scheme, and transcription trap use.
Abstract: The invention concerns a method for protecting the data of an application compiled in intermediate for execution executed on a digital apparatus equipped with a virtual machine managing the execution of the code via a execution stack defining at least one stack frame corresponding to a method called during the execution of the code. A secured execution mode of the code involves the determination of at least one global checksum associated with each stack frame and, each time that a datum of the code is manipulated, the calculation of a local checksum associated with that datum. The calculation is on one hand, on the global checksum associated with the stack frame corresponding to the manipulated datum and, on the other hand, on at least one part of the other data constituting the stack frame.
Type:
Grant
Filed:
July 18, 2007
Date of Patent:
February 4, 2014
Assignee:
Gemalto SA
Inventors:
Benoit Gonzalvo, Jacques Jean-Alain Fournier
Abstract: An activated contactless communication circuit includes a device for receiving and transmitting a data-carrying electromagnetic field; a first circuit resonating with a first antenna for receiving data; and a second circuit resonating with a second antenna for transmitting data, the first and second resonating circuits being separate from each other. The transmission is carried out at a frequency phase-synchronized with the frequency of the electromagnetic field for reception.
Abstract: A method for switching between first and second logical U ICCs in the same physical U ICC. Each logical UICC has an area for storing overlapped volatile data and an area for storing overlapped persistent data. The physical UICC also has an OS area. When a switch order is received to switch from the first logical UICC to the second logical U ICC. Overlapped volatile data from the OS area is backed up to the area for storing overlapped volatile data of the first logical U ICC. Overlapped persistent data from the OS area is backed up to the area for storing overlapped persistent data of the first logical U ICC. Volatile data from the area for storing overlapped volatile data from the second logical UICC is restored to the OS area. Persistent data from the area for storing overlapped persistent data from the second logical UICC is restored to the OS area.
Abstract: A system and method for distributing symmetric keys in a system including an end-user computer operated by an end-user, a service provider server of a service provider having a service provider identifier, and a manufacturer backend server operated by the manufacturer of the OTP token. The manufacturer backend server operates to verify one-time passwords generated by the OTP tokens and upon verifying the authenticity of the OTP token based on the generated passwords, transmitting the symmetric key to a service provider server or an authentication server. Other systems and methods are disclosed.
Abstract: The invention relates to a method and to an electronic device for securing the computation of a modular exponentiation x=mD mod N against invasive attacks. The invention comprises applying a mask to the message m, and after the modular exponentiation is carried out, in verifying that the exponentiation was not altered thanks to properties introduced by the mask.