Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
Type:
Application
Filed:
April 22, 2013
Publication date:
September 12, 2013
Applicant:
GEMALTO SA
Inventors:
Stephanie SALGADO, David VIGILANT, Guillaume FUMAROLI
Abstract: A method for automatically establishing a configuration of a communication appliance functioning with a subscriber identification card in a communication network. The configuration of the appliance is established via the network, following the detection and communication of its identifier over the network by means of the card. The method includes a preliminary step in which a configuration requirement is detected by means of events or absence of an event stored in the card.
Abstract: The invention relates to a portable authentication token comprising connection means for connecting to a computer, browser communication means for communicating with a browser running on the computer, and user authentication means for authenticating a user of the token to a server. The user authentication means are triggered via the browser communication means when the user connects to the server from the browser of the computer. The user authentication means are set to authenticate the user by communicating with the server through the browser. The token comprises out-of-band token communication means set to validate user authentication by establishing a communication channel between the token and the server, the communication channel bypassing the browser. The invention also relates to an authentication method and to a system comprising a token, a computer and a server to which the user authenticates with the token.
Abstract: The invention relates to a method for accessing an application. A token includes at least one application that is executable by a device. The token is coupled to the device. The method comprises the following steps. The token sends to the device data for identifying the token and data for authenticating the token. The device analyses whether the token identification data is included within a list of at least one authorized token. Only if the token identification data is included within a list of at least one authorized token, then the device analyses whether the token is authenticated. And only if the device authenticates the token, then the device authorizes to execute the application. The invention also relates to a corresponding device.
Abstract: The invention is a method of analyzing the behavior of a secure electronic token which comprises an interface for exchanging data with an external entity. The token has a lifecycle wherein the token is intended to be created then issued. The method comprises the steps of: loading and installing a dedicated application into the token after the electronic token has been issued, spying the data exchanged through the interface and providing the dedicated application with these exchanged data, generating a buffer from the exchanged data by the dedicated application, sending the buffer to an external machine.
Abstract: A portable intelligent object has first and second communication interfaces with a station. The first communication interface can send and/or receive data by means of inductive coupling with the station. The object also has an integrated peripheral circuit. All of the data exchanged between the peripheral circuit and the central circuit passes through the station.
Abstract: A document with a cover having a first cover part, a second cover part, at least one internal page located between the two cover parts when the document is closed, a radiofrequency microcontroller, an antenna electrically connected to the radiofrequency microcontroller, and an electromagnetic shield capable of disrupting, at least partially, the wireless communication with the radiofrequency microcontroller when the document is closed and not disrupting the wireless communication when the document is opened. The electromagnetic shield is a wire grid. The wire mesh distance between each two adjacent wires of the wire grid is smaller than a radio-frequency wavelength used for communicating with the radiofrequency microcontroller, and is at least 0.1 millimeters and at most 40 millimeters.
Abstract: The invention concerns a terminal (T) comprising an agent (AS) for processing a secure content encrypted with a key (KCN) and transmitted by a first server (SCN). In order to manage a secure access to the secure content, an application (AG) of a portable communicating object, such as a chip card, associated with a terminal stores one type of related digital right (TDN) and a certificate and transmitted by the agent and stores an access right (DA) and the key (KCN) related to the secure content transmitted from a second server (SAD). The application adapts the access right and the key and modifies the secure content, based on the type of right, and produces a secure access file based on the adapted access right and the key and on the certificate, the produced file being accessible by the terminal so that the agent may process the modified content.
Abstract: The invention relates to a personal token (10) for being associated with a mobile telecommunication device (20) and for storing credentials for access to an operator's network, characterized that the personal token (10) is arranged for loading the credentials into a memory (23) of the mobile telecommunication device (20), so that the mobile telecommunication device (20) is taken away from the personal token (10) and operative for connecting to the operator's network with the credentials in its memory (23).
Abstract: The invention relates to a personal token including a microprocessor and a memory, said personal token storing and running a software entity which constitutes an end-point for communication over the internet. The software entity constitutes an end-point according to a signaling protocol over the internet and the signaling protocol is of the type intended when the session for real-time conferencing is initiated between end-points.
Abstract: The invention relates to a portable device for accessing a server. According to the invention, the device is adapted to send to a server or data relating to rights for accessing a server. The invention also relates to corresponding system, server and method.
Abstract: The invention relates to a method for accessing at least one service. A host device is coupled to a chip. The chip stores data relating to at least one test Subscriber Identity Module (SIM) type application and/or data relating to at least one SIM type application. The host device sends to the chip a command for switching from a first application to a second application. The first application is either a test SIM type application or a SIM type application. The second application is either a SIM type application or a test SIM type application. And the chip carries out an activation of the second application and a de-activation of the first application. The invention also relates to a corresponding system for accessing at least one service.
Abstract: This invention relates to a method for the transmission using the half-duplex mode of a data signal from a first transmission/reception device to a second transmission/reception device, called the remote device, comprising a logical coding step in which at least two distinct transmission times are associated with two respective statuses of the data signal to transmit. The method is characterized in that it comprises the generation by the first device of a signal (10, 11) comprising, for the transmission of a status of the signal, more or less exclusively a plateau at a first voltage level for the time defined as the transmission time associated with the status to transmit and a falling edge, to the exclusion of any rising edge, the transmission of a data signal status from the second device to the first device comprising the generation of a signal (20, 21) by the second device comprising more or less exclusively a plateau at a second voltage level and a rising edge, to the exclusion of any falling edge.
Abstract: A method and system for providing authentication of a user to a first peripheral device connected to a host computer using an authentication of the user on a second peripheral device, thereby allowing the user access to both devices through a single authentication. A security function on the second peripheral device is used to create an authorization phrase. Subsequent accesses to the first peripheral device requires the second peripheral device to re-create the same authorization phrase thereby demonstrating that the same second peripheral device is being used to access the first peripheral device and that a user was successfully authenticated to the second peripheral device. Other systems and methods are disclosed.
Type:
Grant
Filed:
October 27, 2009
Date of Patent:
July 2, 2013
Assignee:
Gemalto SA
Inventors:
Asad Mahboob Ali, Bart John Bombay, Ashish Malpani
Abstract: The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key KO and a message M, the cryptographic algorithm A is set to compute a value A(KO,M). Given a relationship R between A(KO,M) and A(f(K0),g(M)), where f and g are two bijections, and where f is different from the identity function, the method comprises: a. computing the expected result A(KO,M) of the cryptographic algorithm b. computing a modified result A(f(K0),g(M)), by applying the cryptographic algorithm A on a modified key f(K0) and on a message g(M), c. checking whether the relationship R between the values A(KO,M) and A(f(K0),g(M)) computed in the two preceding steps is verified d. detecting an attack if the relationship R is not verified. The invention also relates to a cryptographic device embodying the above method.
Abstract: The invention relates to a method for personalizing an electronic device using an encryption device adaptable to standard certified apparatuses. The encryption device makes it possible to ensure the confidentiality of the transfer of a secret code from the user to a possible personalization server.
Abstract: The invention relates to a method for making a device comprising a transponder antenna, wherein the method comprises the steps of: making an assembly including a thin substrate carrying at least one antenna, the antenna having connection end portions bearing on the substrate at substrates locations. The substrate forms or includes a sheet- or strip-like adhesive body in contact with the antenna. The invention also relates to the resulting device.
Abstract: The invention relates to a method for creating a multi-component device, including the following steps, creating a module having a multilayer structure comprising electrical/electronic components arranged on at least one substrate in stacked layers, the components each having a main surface exposed to the outside, wherein the components are arranged such that the respective main surfaces thereof are oriented in mutually opposite directions. The invention also relates to the corresponding device.
Type:
Application
Filed:
May 24, 2011
Publication date:
June 13, 2013
Applicant:
GEMALTO SA
Inventors:
Jean-Christophe Fidalgo, Joseph Leibenguth
Abstract: The invention concerns a method enabling a server manager to prove subsequently that the server was authorized to read a user's personal data in a terminal station (ST), comprising: transmitting server policy data (PS) to the station; comparing the server policy data with private policy data (PP) pre-stored in the station; determining a signature (SGST) of server policy data received in the station; and transmitting the signature with the personal data (DP) read in the station to the server when the compared policy data (PS, PP) are compatible.
Abstract: A method of detecting an abnormal environmental operating condition of an element embedded in an apparatus. The element is able to communicate with a telecommunications network. The method includes cyclically measuring at least one environmental operating parameter of the element, detecting that the element is operating for an excessive duration in at least one reference operating span, and transmitting an alert message to the telecommunications network if the element has operated for an excessive duration in the reference operating span.