Patents Assigned to Gemalto SA
  • Publication number: 20120198238
    Abstract: The invention relates to a method for generating and validating a digital authorization request, as well as to the method for supervising said authorization. The method of invention enables the guarantee, due to a combination of a series of signatures, at any time, of the identity of the bearer of the document and of the validating body.
    Type: Application
    Filed: August 11, 2010
    Publication date: August 2, 2012
    Applicant: GEMALTO SA
    Inventor: Bruno Rouchouze
  • Patent number: 8233614
    Abstract: The invention relates to a cryptographic method involving an integer division of type q=a div b and r=a mod b, wherein a is a number of m bits, b is a number of n bits, with n being less than or equal to m, and bn?1 being non-null and the most significant bit of b. In addition, each iteration of a loop subscripted by i, which varies between 1 and m?n+1, involves a partial division of a word A of n bits of number a by number b in order to obtain one bit of quotient q. According to the invention, the same operations are performed with each iteration, regardless of the value of the quotient bit obtained. In different embodiments of the invention, one of the following is also performed with each iteration: the addition and subtraction of number b to/from word A; the addition of number b or a complementary number /b of b to word A; or a complement operation at 2n of an updated datum (b or /b) or a dummy datum (c or /c) followed by the addition of the datum updated with word A.
    Type: Grant
    Filed: November 13, 2003
    Date of Patent: July 31, 2012
    Assignee: Gemalto SA
    Inventors: Marc Joye, Karine Villegas
  • Publication number: 20120190340
    Abstract: The present invention provides a method for binding a (smart) secure device (2) to a wireless phone, said wireless phone comprising an identifier parameter, said secure device (2) being adapted to communicate with an Over-The-Air (OTA) server and being suitable for receiving services from a network operator in an authorised area determined with localisation parameters stored in the OTA server, wherein the method comprises the following steps: a. storing the identifier parameter of the wireless phone into the secure device (2) at a first powering on of the wireless phone; b. requesting a user registration on the OTA server so as to download the localisation parameters from the OTA server into the secure device (2). After successful registration confirmation from OTA server, for each powering on, the secure device (2) compares the above two parameters in the secure device (2) with the values from the phone, if they are not the same, authentication is forbidden.
    Type: Application
    Filed: September 8, 2009
    Publication date: July 26, 2012
    Applicant: GEMALTO SA
    Inventors: Ruifeng Li, Jing Ouyang, Bin Zhang, Fang Yang
  • Patent number: 8229112
    Abstract: A method for encrypting/decrypting a message includes the initial step of generating keys by the sub-steps of generating a public key; generating a decryption key; and generating a derivation key. For a first entity, the message is encrypted using the public key and a cipher. For a second entity, the cipher is decrypted to find the message. A trapdoor associated with said message is generated. The trapdoor corresponds to a derivative of the derivation key specific to the message. A test cipher is tested, using the trapdoor associated with the message, to determine if the test cipher is an encryption of the message using the public key.
    Type: Grant
    Filed: March 8, 2007
    Date of Patent: July 24, 2012
    Assignee: Gemalto SA
    Inventors: Thomas Fuhr, Pascal Paillier
  • Patent number: 8230404
    Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
    Type: Grant
    Filed: October 19, 2010
    Date of Patent: July 24, 2012
    Assignee: Gemalto SA
    Inventors: Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
  • Patent number: 8229997
    Abstract: In general, the invention relates to a method for executing at least a portion of a server operation. The method includes providing an extension to a client connected to the server, where the extension includes a portable object connected to the client. The method further includes performing at least the portion of server operation by the extension, where performing at least the portion of the server operation includes executing a copy of at least a portion of server software stored on the portable object.
    Type: Grant
    Filed: June 22, 2006
    Date of Patent: July 24, 2012
    Assignee: Gemalto SA
    Inventors: Laurent Castillo, Christoph Siegelin
  • Publication number: 20120178422
    Abstract: (EN)The invention relates to a portable security device (SIM) for authenticating a user (USR) of a communication device (MP1, MP2) to a server (SRV), the portable security device (SIM) comprising means for configuring said communication device (MP1, MP2). The portable security device (SIM) further comprises means for filtering the configuration of a first communication device (MP1), creating a backup of the filtered configuration of the communication device (MP1), detecting that the user (USR) changed a first communication device (MP1) for a second communication device (MP2), filtering the backup of the filtered configuration, and restoring the filtered backup of the filtered configuration of the first communication device (MP1) on the second communication device (MP2).
    Type: Application
    Filed: September 15, 2010
    Publication date: July 12, 2012
    Applicant: GEMALTO SA
    Inventor: Jose Luis Gayosso Sanchez
  • Patent number: 8219148
    Abstract: The invention provides a method for activating the subscription of an UICC, said UICC comprising an activation application, said method comprising the step of activating the subscription of the holder of the UICC by sending a message to an activation server, said message being sent by the activation application to the activation server by using an IP based communication.
    Type: Grant
    Filed: April 6, 2010
    Date of Patent: July 10, 2012
    Assignee: Gemalto SA
    Inventors: Patrice Amiel, Xavier Berard, Hervé Ganem, Lionel Merrien
  • Publication number: 20120173482
    Abstract: The invention relates to a method for the enrichment of an electronic directory stored in a first electronic communication device, based on the changes in a second electronic communication device and by the application of decisional rules. The changes can also be related to a change in the hardware or software functionalities or to a modification of data contained in said second device.
    Type: Application
    Filed: December 17, 2008
    Publication date: July 5, 2012
    Applicant: GEMALTO SA
    Inventors: Alain Brun, David Halle, Christophe Foesser, Lionel Mallet, Frédéric Faure
  • Publication number: 20120164981
    Abstract: The invention relates to a method for communicating data between a first secure element and a network access point. The first secure element is coupled with a network access point. The network access point is comprised within a communication network. According to the invention, at least one of the first secure element and the network access point sends, to the other of the network access point and the first secure element respectively, data relating to an identity of a communication link, as logical link, between the first secure element and the network access point. The invention also relates to a corresponding secure element.
    Type: Application
    Filed: August 30, 2010
    Publication date: June 28, 2012
    Applicant: GEMALTO SA
    Inventor: Mireille Pauliac
  • Publication number: 20120158940
    Abstract: The present invention relates to a method for a secure device to resolve an IP address of a target server to which the secure device is willing to access, said secure device being suitable to be inserted in a wireless device, wherein the secure device sends a request to a DNS client that resides on said wireless device to resolve the IP address of the target server, said target server being identified by its FQDN.
    Type: Application
    Filed: August 31, 2010
    Publication date: June 21, 2012
    Applicant: GEMALTO SA
    Inventor: Kenji Nishi
  • Publication number: 20120151519
    Abstract: The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point.
    Type: Application
    Filed: August 11, 2010
    Publication date: June 14, 2012
    Applicant: GEMALTO SA
    Inventor: Olivier Guichard
  • Patent number: 8200937
    Abstract: The invention is a method of managing flash memory-allocation in an electronic token. Said token has a memory comprising a list area and a managed area. Said managed area comprises allocated spaces and at least one free memory chunk. Said list area comprises at least one valid entry referencing a free memory chunk. Said valid entry comprises a state field. Said method comprises the step of selecting a free memory chunk further to an allocation request where said free memory chunk is referenced by an old entry, and the step of identifying a new allocated space in the selected free memory chunk. The state field of said valid entry is preset with a virgin state. Said method comprises the step of invalidating the old entry referencing the selected free memory chunk.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: June 12, 2012
    Assignee: Gemalto SA
    Inventors: Franck Dehlinger, Francois-Xavier Marseille, Laurent Castillo
  • Publication number: 20120144474
    Abstract: The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an index list. The method comprises the step of inserting a request to a control message in the index list. The control message applies to a data reachable through one URI belonging to the index list.
    Type: Application
    Filed: August 18, 2010
    Publication date: June 7, 2012
    Applicant: GEMALTO SA
    Inventors: Louis Gregoire, Alexis Pottier
  • Patent number: 8186496
    Abstract: The invention concerns a method for reducing factory customizing time in a smart card (CPn), wherein a pre-customizing manager (GM) into a customizing machine loads post-customizing data (AP, OP1-OP1, DOP1-DOP1) in the smart card. Then a post-customizing application (AP) included in the smart card is enabled after delivery of the card to a user following a connection of the smart card to a terminal to process the loaded post-customizing data so as to make the smart card operational.
    Type: Grant
    Filed: October 11, 2006
    Date of Patent: May 29, 2012
    Assignee: Gemalto SA
    Inventor: Olivier Potonniee
  • Publication number: 20120131634
    Abstract: The invention is a method of executing an application embedded in a portable electronic device. The application comprises one instruction handling an object. The electronic device comprises a firewall which is intended to check the compliance of the object with preset security rules. The portable electronic device comprises a volatile memory area intended to store a data set uniquely associated to the object. The data set comprises an indicator reflecting the result of the checking of the compliance of the object with the preset security rules. The method comprises the following steps before execution of the instruction, checking the presence in the volatile memory area of a data set associated to the object and comprising an indicator reflecting a successful checking of security rules, and if successful in the checking of the data set, authorizing the execution of the instruction without further security rules checking done by the firewall.
    Type: Application
    Filed: May 21, 2010
    Publication date: May 24, 2012
    Applicant: Gemalto SA
    Inventors: François Millet, Sylvain Chafer, Franck Dehlinger
  • Publication number: 20120124605
    Abstract: The invention relates to a method for monitoring an audience measurement relating to data. The data is broadcast, through a broadcast channel, from a broadcast device and to be received by at least one terminal. According to the invention, the method comprises steps in which the broadcast device broadcasts, through the broadcast channel, at least one piece of information relating to a request for measuring an audience of at least one content of the data, said audience report request; and at least one terminal sends back, through a return channel, to an audience report collecting device, as a response to the audience report request, an audience report relating to the at least one content of the broadcast data processed by the at least one terminal, said audience report response. The invention relates also to corresponding terminal and system comprising the broadcast device and the terminal, and a corresponding token likely to cooperate with a terminal.
    Type: Application
    Filed: January 6, 2010
    Publication date: May 17, 2012
    Applicant: Gemalto SA
    Inventor: Annemarie Praden
  • Publication number: 20120115443
    Abstract: The invention relates to a method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element. The first identifier is a temporary identifier and the second identifier is a final identifier of the secure element in a telecommunications network. According to the invention, the method comprises the steps of: a—during the first attempt to connect the mobile terminal to the telecommunications network, calculating the first identifier according to the second identifier; b—transmitting the first identifier to the telecommunications network; c—in response to a message of acceptance of the first identifier from the telecommunications network, inhibiting the use of the first identifier by the secure element and, for every subsequent attempt to connect to the telecommunications network, using the second identifier to authenticate the secure element.
    Type: Application
    Filed: June 4, 2010
    Publication date: May 10, 2012
    Applicant: GEMALTO SA
    Inventors: Radouane Ait Aissa, Jean-François Gros
  • Publication number: 20120117219
    Abstract: The invention is a method of managing an application embedded in a secured electronic token. The token is intended to receive a message from a server machine. The message has a header and a body. The token comprises an agent able to manage the message. The method comprises the steps of: a) registering the application in the agent by associating a reference of the application with a value of an element of the message header, b) when the message is received from the server machine, forwarding part of the message to the application if the message header contains an element having the value associated to the reference of the application.
    Type: Application
    Filed: June 24, 2010
    Publication date: May 10, 2012
    Applicant: Gemalto SA
    Inventors: Patrice Amiel, Xavier Berard, Frédéric Gallas
  • Publication number: 20120110265
    Abstract: Method of securing exchanges between two electronic devices, by using an imprint of at least one of the two devices. This imprint is obtained on the basis of all or part of the electronic components of which this device is composed. This imprint will serve, either to protect the confidentiality of the data exchanged, or to attest to the identity of the device issuing the data.
    Type: Application
    Filed: June 18, 2010
    Publication date: May 3, 2012
    Applicant: Gemalto SA
    Inventors: Jacques Fournier, Franck Imoucha, Laurent Gauterron, Véronique Charpeignet