Abstract: The invention relates to a process to make secure a personal portable object comprising a body of the personal portable object, a microchip, a printed image and a device to enable said personal portable object to communicate with an entity external to the device. The process includes using an image file and an insertion algorithm to generate an image feature vector Vsi(num), storing the image feature vector Vsi(num) in the microchip, using the printed image obtained by a scanning device to generate an image feature vector Vsi(dig), and using a read-back algorithm to match the image feature vector Vsi(num) and the image feature vector Vsi(dig).
Type:
Grant
Filed:
September 28, 2005
Date of Patent:
October 30, 2012
Assignee:
Gemalto SA
Inventors:
Nathalie Launay, Fabrice Perion, Joseph Leibenguth, Frederic Ros
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Application
Filed:
June 9, 2012
Publication date:
October 4, 2012
Applicant:
GEMALTO SA
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: The invention is a method of personalizing an application embedded in a secured electronic token which is able to manage first and second channels that allow to convey personalization data exchanged with a distant machine. Said first and second channels are of different types. The application is of Javacard™ type and comprises at least a function which is invoked when personalization data is received from the distant machine regardless of the channel used for conveying the personalization data.
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Application
Filed:
June 9, 2012
Publication date:
October 4, 2012
Applicant:
GEMALTO SA
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: In general, the invention relates to a system that includes a smart phone and a smart card. The smart phone includes a web browser and a display for displaying a web page, where the web page includes at least one selectable entry. The smart card includes at least one proactive logic entity, where the at least one proactive logic entity is configured to respond to selection of the at least one selectable on the web page.
Abstract: A method which improves the security of the authentication between two entities in a telecommunication network, and particularly between a mobile terminal and the fixed network, notably visitor location and nominal recorders and an authentication center, in a cellular radiotelephony network. Prior to a first authentication of the terminal, and more precisely of the SIM card therein, by the fixed network, a second authentication is based on an algorithm in which there are entered a random number produced and transmitted by the fixed network and a key different from the key for the first authentication. A transmitted signature and a signature result are produced by the fixed network and the terminal, and compared in the terminal in order to enable the first authentication in the event of equality.
Abstract: The invention is a method of customizing a memory lifespan management policy of an electronic token. The electronic token is intended to be connected to a device able to establish a wireless channel. The electronic token has a microprocessor, a communication interface, a first memory intended to comprise said memory lifespan management policy, first means for exchanging data with a distant machine by means of a wireless channel established by said connected device, second means for applying said memory lifespan management policy in said electronic token, and third means for updating said memory lifespan management policy. Said method comprises the steps of—sending data from the distant machine to the electronic token by means of a wireless channel,—updating said memory lifespan management policy as a function of data received from said distant machine.
Abstract: (EN)The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC.
Type:
Application
Filed:
December 7, 2010
Publication date:
September 20, 2012
Applicant:
GEMALTO SA
Inventors:
Francois Ennesser, Nicolas Joubert, Florent Labourie, Nicolas Roussel
Abstract: The invention relates to a method for securing an on-line transaction, comprising a proximity test which permits the proximity of the physical presence of the client to the on-line processing station (PT) with the authentication authority (AA) to be verified, an authentication test for the holder of the chipcard (CP) and a non-repudiation test for the transaction.
Abstract: The invention relates to a method for securing the execution of an onboard NFC application in a secure element which does not include a native OTA application. The secure element interacts with a mobile terminal including a removable card. According to the invention, the method includes recording an identifier of the removable card in the secure element no later than when the NFC application is loaded onto the secure element. When an event occurs, a verification is made, in the secure element, whether or not the identifier of the removable card present in the mobile terminal corresponds to the identifier previously stored in the secure element, in order to detect a possible change of the removable card.
Type:
Application
Filed:
September 29, 2010
Publication date:
September 13, 2012
Applicant:
Gemalto SA
Inventors:
Patrice Amiel, Stephane Poujol, Michel Martin, Gil Bernabeu
Abstract: (EN)The invention relates to an identification document (21) comprising a non-transparent core (6), and one or more layers of a transparent material (14) arranged on at least a back (13) or a front surface (12) of said core. In order to achieve an identification document where forgery attempts are visibly detectable, the identification document (21) has a translucent security element in a region (7) where the thickness of the non-transparent core (6) material is smaller as compared to the thickness of the non-transparent core material in other parts of said core (6).
Abstract: A cryptographic method carries out a modular exponentiation of the type C=A<B1> mod N, where A is an operand, B1 is a first exponent, N is a modulus and C is a result. The method includes the steps of masking the operand A by a number s, carrying out a modular exponentiation of the masked operand by the exponent B1, and demasking the result of the exponentiation, by removing a contribution from the random number s from the result of the exponentiation. During the step of masking the operand A, the operand A is multiplied by a parameter of the form K<s.B2>, where K is a constant and B2 is a second exponent such that B1.B2=1 mod N. The method is implemented preferably by using a Montgomery multiplier. The preferred choice for the constant K is K=2p, p being an integer lying between 0 and n, n being an upper bound of the size of the modulus N and conventionally depending on the choice of implementation of the Montgomery multiplication.
Abstract: A portable device including a biometric voice sensor configured to detect voice information and to take an action in response to speech spoken into the voice sensor. The device also includes a voice processor configured to process the voice sensor signal characteristics. The portable device may encrypt the detected signal and may compare the detected signal characteristics with voice characteristics that are stored in a memory of the portable device for applications such as voice enabled authentication, identification, command execution, encryption, and free speech recognition. The voice sensor may include a thin membrane portion that detects pressure waves caused by human speech. The portable device may be a contact-type smart card, a contactless smart card, or a hybrid smart card with contact and contactless interfaces. The device may be powered by an internal battery or by a host via contacts or by a power signal making use of the antenna in a contactless implementation.
Abstract: The invention relates to a system enabling the contactless transfer of personal data from a mobile terminal including a first antenna coupled to a first chip cooperating with a first memory to a second memory cooperating with a second chip, with said second chip being coupled to a second antenna. According to the invention, the second memory is included in a passive radiofrequency transponder supplied by the electromagnetic field emitted by said first antenna during said transfer of personal data.
Abstract: The invention relates to a portable device (in particular a SIM card), a communication device (in particular a cellular phone) and a system comprising a portable device and a communication device. The portable device of the invention comprises processing means, external communication means, message storage means, and a web server. It has no messaging user interface. The portable device further comprises a messaging client comprising web communication means for communicating with the web server, and comprising message management means for managing messages including at least one message stored in the portable device. The communication device of the invention may comprise a message proxy.
Abstract: The invention relates to a method for the radio-frequency communication of data, in which the receiving of and/or access to said data is controlled by control means, including an electronic microcircuit, on the basis of access rights. The transmitted data includes time information, and the access rights are controlled on the basis of said time information. The invention also relates to a device for controlling access rights as well as to a radio-frequency receiving device including same.
Abstract: The disclosure relates to a method for managing the triggering of an application in a terminal place in an environment consisting of several access technologies. The disclosure also relates to a mobile telephone type terminal that implements the method. A test mechanism is implemented for at least one application on the basis of information contained in the tested application when a triggering event occurs for an application, thereby making it possible to recognize or deduce the network access technologies supported by the application.
Abstract: Portable communication device for at least mono-directional communication with a terminal, comprising a micro-module including a chip that comprises an antenna allowing the micro-module to communicate with a terminal when the antenna is placed in the immediate vicinity of the terminal, the device being characterized in that it comprises a reader receiving the removable micro-module, said antenna being held by said reader such that the micro-module is removable relative to the antenna.
Abstract: A device, such as a chip card, is connected to a host platform that is linked to a packet network such as the Internet. The device detects security policy designation parameters in packets leaving and entering the platform and processes the packets according to stored security policies designated by the designation parameters detected. The security information linked to a user can therefore be moved from one platform to another and it is not processed by the platform. Security policies are managed by a server with which the device can initiate a communication when no security policy corresponding to the policy designation parameters detected in a packet is recognized, so that the server can assist the device in negotiating a security policy.
Abstract: (EN) The invention makes it possible to allow several applications to coexist in the same card; the implementation of the applications uses reading and writing of data by the reader in the same memory location. The invention is a method for exchanging data between a mobile authentication device 3 supporting several applications Z1 to Z3 and a reader dedicated to one application in which the reader sends an authentication command and at least one read and/or write command. The authentication command allows the mobile device to authorise a transaction for at least part of an application Z1 to Z3 supported by the said mobile device. In response to the authentication command, the mobile device selects the application of the device that corresponds to the reader. The read and/or write command is carried out by addressing a definite block of data. In response to the read and/or write command, the mobile device addresses the block of the selected application.
Type:
Application
Filed:
October 19, 2010
Publication date:
August 9, 2012
Applicant:
GEMALTO SA
Inventors:
Serge Barbe, Sylvain Chafer, Michel Martin, Patrice Amiel, Jan Nemec