Abstract: The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an index list. The method comprises the step of inserting a request to a control message in the index list. The control message applies to a data reachable through one URI belonging to the index list.
Abstract: The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.
Abstract: The invention relates to a method for communicating information. A first device is coupled to a secure element. The secure element sends, at an initiative of the secure element, to the first device a secure element identifier. The first device sends to a second device at least one first message comprising the secure element identifier. The second device sends to a third device at least one second message comprising the secure element identifier and two communication network subscription identifiers, as associated data, the second device adding the two communication network subscription identifiers. The third device stores the associated data. The invention also relates to a corresponding system.
Abstract: A method for connecting to a remote server from a browser enabled with a browser's extension on a host device, wherein upon connection of a data processing device with a data processing device reader linked to the host device, the browser's extension receives data contained in a targeted file stored in said data processing device, said data being able to be interpreted by the browser so as to trigger a connection to the remote server and to display a subscribed service portal, said data being sent by the data processing device upon execution of a command transmitted by the browser's extension.
Abstract: The invention relates to method for updating data of an encoded file from a remote server, said encoded file being stored in a secure device, characterized in that it comprises step a): sending a message to said secure device, step b): decoding the encoded file to update, step c): locating a target data and performing an operation upon said target data, said message comprising configuration data and data block.
Abstract: A system for accessing a service comprises two contact-less readers and one portable device. A first contact-less reader is configured to send to the portable device, through a first range radiofrequency link, a first message comprising first data. The first data includes an identifier allocated to the portable device and an associated key for encrypting data. The portable device is configured to send to a second contact-less reader, through a second range radiofrequency link, a second message comprising second data. The second data includes the identifier received from the first message. The second data is encrypted by using the data encryption key received from the first message. The second range radio frequency is higher than the first range radio frequency.
Abstract: The invention is a method of power negotiation between a first contactless device and a second contactless device which provides an electromagnetic field set to a first power level. The method comprises the steps of: a) sending a request from the first device to the second device. The request targets a second power level and an associated duration. The next step is: b) sending a response to the first device. The response reflects a decision of the second device corresponding to the request. The final step is: c) switching the electromagnetic field to the second power level if the decision is positive.
Abstract: System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile.
Abstract: The invention relates in particular to a method for saving the state of a session of a game played by at least two players, the game including game elements having chips that are capable of contactless communication with a terminal via an interface. The terminal includes a screen, the game consisting of presenting game elements to the interface, each player being identified by the terminal by a game element referred to as the master element. According to the invention, the saving method involves: recording the history of the game session, recording the game elements which have not been in play, if applicable, and recording the game elements in the possession of the players at the time that the game was interrupted, by means of master elements, so as to be able subsequently to resume the game session in the same state in which the game was when interrupted.
Abstract: The invention relates to a communication system comprising a terminal (10), a first device (1) adapted to exchange data with said terminal (10), a second device (2) adapted to exchange data with said terminal (10), characterized in that it comprises means for pairing said first (1) and second (2) devices so as said second device (2) exchanges data with said terminal (10) through said first device (1).
Abstract: Secure password-based authentication for cloud service computing. A request for cloud computing resource access includes a derivative password that contains a parameter that the recipient may extract in order to independently calculate the derivative password based on the parameter and a stored password which may then be verified against a known-to-be-correct password. Other systems and methods are disclosed.
Abstract: The invention relates to a personalisable support comprising anti-forgery devices which are provided in order to indicate every attempt of fraudulent personalization. The support comprises a body (2) which is on one side equipped with personalization data (6,7) which are obtained by carbonization of the base material by means of a laser beam. The anti-forgery devices (8), which totally or partly cover these personalization data, draw a pattern (90, 80) along which bubbles (9) are created whose density (d1-d5) varies depending on the degree of carbonization of the areas (61-65) which are covered by the pattern.
Abstract: The invention relates to a method for manufacturing a USB electronic key, whereby a chip is cut out of a tape, provided with a plurality of chips, each chip defining contact pads in USB format and supporting an electronic component, connected to the pads. The thickness adjustment step is directly carried out on the chip to give a thickness conforming to the USB standard, at least in the area of the contact pads.
Type:
Grant
Filed:
October 4, 2004
Date of Patent:
October 15, 2013
Assignee:
Gemalto SA
Inventors:
Francois Moutel, Joel Barrier, Thierry Karlisch, Pierre-Andre Collet
Abstract: A secure portable electronic device for providing secure services when used in conjunction with a host computer having a central processing unit use two hardware device protocols readily supported by computer operating systems. Other systems and methods are disclosed.
Type:
Grant
Filed:
February 1, 2008
Date of Patent:
October 15, 2013
Assignee:
Gemalto SA
Inventors:
Lu Karen HongQian, Stephane Durand, Laurent Castillo, Asad Ali, Ed Dolph
Abstract: The present invention describes a method for securing the execution of a computer program in a multitask device. This method is based on the execution, in parallel with the program to be made secure, of a security thread, able to modify the parameters of the scheduler.
Abstract: A method wherein at least one service of an application stored in a microcontroller card is communicated to a terminal. The terminal transmits a command identifying the selected application to the card immediately after selecting the application. In order to reduce in the card the time for accessing the application service data by the terminal, a reply generator in the card selects the active services related to the application in the card in response to the command, and dynamically establishes a list of data identifying these services, to transmit a reply message including the identification data from the card to the terminal. A reply analyzer in the terminal analyzes the identification data of the reply message to communicate the at least one service of the application identified by the identification data.
Abstract: The invention is a method of managing communication between an electronic token and a remote web server. The token and the server are connected to a same host machine. The token comprises first and second token servers and a memory comprising HTML data. The host machine has an Internet web browser. Said method comprises the steps of: sending a first request from the Internet web browser to the first token server, returning a first answer to the Internet browser, said first answer comprising HTML data including a connection information associated to a script, on the Internet web browser, executing the script associated to the connection information. Script execution establishes a connection to the remote server allowing a two-way communication between the second token server and the remote server through the Internet browser acting as a gateway.
Abstract: The invention relates to a method for providing a user with an authenticated remote access to a remote secure device (2), said remote access being initiated from a local accessing device (1), said remote secure device (2) embedding secure data related to a specific service, characterized in that it comprises establishing a mutual authentication between said remote secure device (2) and a local secure device (3) different from the local accessing device (1) so as the user of the local accessing device (3) is able to access to the secure data of the remote secure device (2).
Abstract: The invention relates to a process to make secure a personal portable object comprising a body of the personal portable object, a microchip, a printed image and a device to enable said personal portable object to communicate with an entity external to the device. The process includes using an image file and an insertion algorithm to generate an image feature vector Vsi(num), storing the image feature vector Vsi(num) in the microchip, using the printed image obtained by a scanning device to generate an image feature vector Vsi(dig), and using a read-back algorithm to match the image feature vector Vsi(num) and the image feature vector Vsi(dig).
Type:
Grant
Filed:
September 12, 2012
Date of Patent:
September 17, 2013
Assignee:
Gemalto SA
Inventors:
Nathalie Launay, Fabrice Perion, Joseph Leibenguth, Frederic Ros
Abstract: The invention relates to a warning device for signaling the presence of a radio frequency communication. The system includes an indicator perceptible to a user and an activation circuit to sense or detect energy originating from the communication and to activate the indicator. The device is distinguished in that the indicator is a vibrator. The invention also relates to a radio frequency communication device, such as a chip card, a passport, an insert, a mobile telephone, having the warning system, and a method of fabrication.