Abstract: The invention proposes a method for downloading a subscription in an UICC embedded in a terminal, this method consisting in: transferring an ICCID to the terminal; sending the ICCID over an IP link to a secure vault; selecting in the secure vault a subscription corresponding to the ICCID; transmitting the subscription to the terminal over the IP link; storing the subscription in the terminal.
Abstract: The invention relates to a smartcard receiving device, comprising a contact interface (11) for communicating with the received smartcard (2); a remote communication interface (13) for communicating with a first remote device (3); a protocol bridge (12) designed to establish a transaction with the received smartcard (2) through the contact interface (11). The smartcard receiving device further comprises a communicating device detector (14, 15) adapted to detect a second remote device (5) communicating according to a remote communication protocol different from the communication protocol used by said remote communication interface (13). The protocol bridge (12) interrupts the transaction with the received smartcard (2) when the second remote device (5) communicating according to said different remote communication protocol is detected.
Abstract: Method for providing user-to-user delegation service in federated identity environment, characterized in that it comprises a delegation or assignment step wherein a delegator specifies said delegation at an identity provider for delegating a privilege or task to a delegatee to be performed at a service provider.
Abstract: The invention proposes a method for personalizing a first secure element comprised in a first terminal, said method consisting in: Providing the user of the first terminal with a second secure element; Linking the first and second secure elements in or through the first terminal; Personalizing securely the first secure element with data comprised in the second secure element, security being based on certificate verification and asymmetric encryption between the secure elements.
Abstract: The invention relates to a method for inputting a text in a distributed system that comprises a secured device, or server, communicating with at least one electronic device, or terminal. The method makes it possible to prepare an image by associating certain values to areas defining said image. The image is projected to the user who can touch the areas of the images that he wants to select as he would do with the keys of keyboard. The finger movements are analysed and the position of the virtual keys selected by the user is transmitted to the server that establishes a correlation between these positions and the previously associated values.
Abstract: The present invention provides a method for steering a handset's user on preferred networks while roaming, said user being able to move from a home network to a visited network characterised in that on detecting a roaming event, the handset automatically switches from 2G/3G visited networks to Wi-Fi preferred networks when available.
Type:
Application
Filed:
September 6, 2011
Publication date:
January 2, 2014
Applicant:
GEMALTO SA
Inventors:
Vincent Veran, Kaoutar Mazali, Jean-Francois Kuc
Abstract: The invention relates to a smartcard (10) comprising: a microcontroller (30); a contact communication interface (11); a supply line (Vcc) connecting the contact communication interface to the microcontroller, a clock line (Clk) connecting the contact communication interface to the microcontroller. The smartcard further comprises a power management circuit (20) including a switch (23) adapted to selectively open or close the supply line connection between the contact communication interface and the microcontroller, the power management circuit being adapted to detect the loss of a clock signal on the clock line (Clk), adapted to keep said switch closed during a predetermined period after a loss of clock signal is detected and adapted to open said switch after said predetermined period.
Type:
Application
Filed:
November 29, 2011
Publication date:
December 19, 2013
Applicant:
GEMALTO SA
Inventors:
Michel Thill, François-Xavier Marseille
Abstract: The invention relates to a method for selecting one of a plurality of contactless electronic devices by means of a voluntary action of the user in accordance with a display of visual information, said visual information being from each of the contactless electronic devices. The invention also relates to a contactless terminal capable of implementing said method.
Abstract: The invention proposes a method consisting in: opening, at the request of the UICC, a data channel between the terminal and the server; performing a mutual authentication between the UICC and the server by using the bootstrap credentials; requesting, from the UICC to the server, the delivery of a subscription profile by using the unique serial number; if a subscription profile exists for the U ICC, downloading the subscription profile to the UICC.
Abstract: This invention concerns a computer communication method using asynchronous messages in a distributed software architecture, for example of type AAA-MOM (Agent Anytime Anywhere - Messages Oriented Middleware), including a disconnectable platform such as a smartcard. This communication is carried out between firstly a card agent (CA), stored in a removable platform (31, 32), connectable to a terminal (21, 22), and secondly at least one standard software agent (AS). This standard agent can be stored in this computer network (1), in another renmovable platform. A message sent by the card agent (CA) to a standard agent (AS) or sent by a standard agent AS) to the card agent (CA), is stored in the network by at least one intermediate agent (CEPA,CAPA) managing the communications of this card agent (CA) with network (1).
Type:
Grant
Filed:
February 26, 2003
Date of Patent:
December 10, 2013
Assignee:
Gemalto SA
Inventors:
Olivier Fambon, André Freyssinet, Philippe Laumay
Abstract: An adapter device for connecting a memory card to a host. The adapter having a primary connector to be connected with the host taking up the adapter device and a secondary connector to take up the memory card. An interrupter of the adapter is connected to the primary connector and to the secondary connector. A device interface circuit connected to the primary connector controls the opening and closing of the interrupter depending on the commands received by the first connector, wherein the device interface circuit is configured so that if the primary connector receives a command from the host that is not related to the memory card, the device interface circuit opens the interrupter after the command has passed.
Type:
Grant
Filed:
July 1, 2009
Date of Patent:
December 10, 2013
Assignee:
Gemalto SA
Inventors:
Michel Thill, Francois-Xavier Marseille
Abstract: The invention relates to a chip card comprising, a molded card body made by means of injection molding and, an integrated circuit chip, as well as to a method for manufacturing such a card. The invention is characterized in that the card body includes polyacrylic acid. The invention applies to SIM cards in particular.
Type:
Grant
Filed:
January 11, 2011
Date of Patent:
December 10, 2013
Assignee:
Gemalto SA
Inventors:
Alexis Froger, Jeremy Renouard, Laurent Oddou
Abstract: The present invention relates to a method for downloading a subscription from an operator to a UICC embedded in a terminal. The method includes transmitting from the terminal, to a platform, an identifier and a request for downloading the subscription; verifying in the platform that the terminal is authorized to download the subscription by verifying the rights of the terminal in accordance with its identifier; and downloading the subscription to the UICC if the rights are confirmed and, otherwise, refusing to download the subscription.
Abstract: The invention concerns a method for managing content on a secure element connected to an equipment, this content being managed on the secure element from a distant administrative platform. According to the invention, the method consists in: establishing, at the level of the administrative platform a secure channel between the equipment and the administrative platform, thanks to session keys generated by the secure element and transmitted to the equipment; transmitting to the administrative platform a request to manage content of the secure element; and verifying at the level of the administrative platform that this request originates from the same secure element that has generated the session keys and, if positive, authorizing the management and, if negative, forbid this management.
Abstract: A device having an integrated-circuit chip includes an insulating body containing at least one conductive pad, at least one electrical contact opposite the electrically conductive pad, and at least one recess in the body, including a bottom and one aperture. The recess is connected, at the bottom thereof, to the conductive pad and, at the aperture thereof, to the electrical contact. At least one coil spring is arranged in the recess and connecting the conductive pad to the electrical contact. The installation of the spring in the recess is facilitated by means of the friction of the central portion of the spring relative to the walls of the recess. The invention also relates to a method for producing an electrical connection between at least one conductive pad arranged in an insulating body and at least one electrical contact arranged opposite the electrically conductive pad.
Type:
Application
Filed:
November 3, 2011
Publication date:
November 14, 2013
Applicant:
GEMALTO SA
Inventors:
Antoine Bajolle, Frédérick Seban, Joseph Leibenguth, François Roussel, Jean-Christophe Fidalgo
Abstract: A system for communicating via contact-less chip with an external contact-less communicating device comprises a removable chip card, a contact-less communicating chip and a terminal. The contact-less chip is carried by a flexible medium. A chip of the card is coupled, via a card connector, to the contact-less communicating chip, and a microprocessor of the terminal. The card chip is configured to act as an intermediary entity between the contact-less communicating chip and the terminal microprocessor. A card chip microprocessor exchanges data with the contact-less chip by using a first data communication protocol. The card chip microprocessor exchanges data with the terminal microprocessor by using a second data communication protocol. The terminal microprocessor is configured to send, through the card chip, to the contact-less communicating chip, data that is previously encapsulated within first communication protocol data that is itself encapsulated within second communication protocol data.
Abstract: The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (skc,pkc), said remote server generating an ephemeral key (sks,pks), the method comprising a mutual authentication step wherein the client (C) sends a public key (pkc) of said long-term key pair (skc, pkc) and the proof that said public key (pkc) is valid to the server (S), and wherein the remote server (S) sends the public key (pks) of said ephemeral key pair (sks,pks) to the client (C). The client (C) generates an ephemeral key pair (skCc,pkCc) and sends the public key (pKcc) of said ephemeral key pair (skcc,pkcc) to the server (S) so as to generate a secret common to the client (C) and to the remote server (S) for opening the secure communication channel.
Abstract: The invention relates to a method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element. The first identifier is a temporary identifier and the second identifier is a final identifier of the secure element in a telecommunications network. According to the invention, the method comprises the steps of: a—during the first attempt to connect the mobile terminal to the telecommunications network, calculating the first identifier according to the second identifier; b—transmitting the first identifier to the telecommunications network; c—in response to a message of acceptance of the first identifier from the telecommunications network, inhibiting the use of the first identifier by the secure element and, for every subsequent attempt to connect to the telecommunications network, using the second identifier to authenticate the secure element.
Abstract: A method for preventing secret code manipulation in a data processing device, such as a smart card, to which a presented code is applied. Prior to implementation of a code transforming function in the processing device, the secret code is transformed into a transformed secret code in the card. For each use of the card, the presented code is transformed into a transformed presented code in accordance with the implemented transformation function. A comparison of the transformed secret code with the transformed secret code in the card is then performed.
Type:
Grant
Filed:
June 20, 2001
Date of Patent:
November 12, 2013
Assignee:
Gemalto SA
Inventors:
Christophe Bidan, David Naccache, Pierre Girard, Pascal Guterman, Ludovic Rousseau
Abstract: An aim of this invention is to eliminate the risks of aggression “DPA of the n order” attacks, for all n values, of cryptography electronic assemblies or systems with a secret or private key. The process according to this invention concerns a securing process for an electronic system using a cryptographic calculation procedure using a secret key. The process consists of masking intermediate results in input or output of at least one critical function for the said procedure.