Abstract: The invention relates to a method for loading a software having several modules loadable in the non-volatile memory of a portable digital device. The loading of at least one module includes testing the existence of a data structure associated with the module in the non-volatile memory and, when necessary, to create the data structure indicating it as empty. The method further includes resolving links for totality of internal elements and, afterwards, in marking the structure as loaded. The existence of an associated data structure is determined for each other module referenced in the loadable module and, when necessary, the structure is created and indicated as empty. The invention makes it possible to reduce the space occupied by the on-board software during loading of modules.
Abstract: The invention relates to a method of masking a plain datum b having n bits. The inventive method is characterised in that a masked datum m is produced using the following masking function: (I), wherein p is a prime number, bi is the bit at position i of plain datum b, and qi is the prime number at position i in a set of prime numbers (q1, . . . , qn). The invention also relates to a method of masking a biometric print, consisting in: determining a set of s real minutiae which are characteristic of the print; mixing and arranging the real minutiae with t false minutiae; and forming a mixed biometric datum b having n=s+t bits, such that, for any i: bi=1 if position i corresponds to a real minutia, and bi=0 if position i corresponds to a false minutia. The invention can be used to secure a security document such as a bank cheque.
Type:
Grant
Filed:
May 11, 2005
Date of Patent:
February 22, 2011
Assignee:
Gemalto SA
Inventors:
Cédric Cardonnel, Eric Brier, David Naccache, Jean-Sébastien Coron
Abstract: The solution concerns the access to a number of data files stored in the memory of a data processing device. The device includes a privilege file (P1-P3) associated with a user type (ADM, PUBLIC, USER1, USER2), the privilege file identifying for at least one command (SEL, INS, UPD, SUP) the data files on which the command can be executed. A microcontroller is programmed to create, when a user accesses the data files, a set of flags from the privilege file, each flag being associated with a unique data file, the flag indicating whether or not the command can be executed on the associated file.
Abstract: The invention relates to a personalisable support comprising anti-forgery devices which are provided in order to indicate every attempt of fraudulent personalisation. The support comprises a body (2) which is on one side equipped with personalisation data (6,7) which are obtained by carbonisation of the base material by means of a laser beam. The anti-forgery devices (8), which totally or partly cover these personalisation data, draw a pattern (90, 80) along which bubbles (9) are created whose density (d1-d5) varies depending on the degree of carbonisation of the areas (61-65) which are covered by the pattern.
Abstract: The invention relates to a personal token (10) for being associated with a mobile telecommunication device (20) and for storing credentials for access to an operator's network, characterized that the personal token (10) is arranged for loading the credentials into a memory (23) of the mobile telecommunication device (20), so that the mobile telecommunication device (20) is taken away from the personal token (10) and operative for connecting to the operator's network with the credentials in its memory (23).
Abstract: One delay circuit is inserted in open loop inside a clock recovery circuit for improving the accuracy of clock recovery. One oscillator signal ?(0) to ?(2i?1) is provided with a basic Step of Time. A rational number of Step of Time corresponding to a bit-duration is measured inside a received flow of bits. The oscillator signal ?(0) to j(2i?1) is transformed into a clock signal CK having active edges of said clock signal in phase with at least one oscillator signal ?(0) to ?(2i?1), two consecutive active edges being separated by a time duration proportional to the integer part of the number of Step of Time. A time delay is computed proportional to the fractional part of the number of Step of Time. The next active edge of the clock signal CK is delayed of said computed delay.
Type:
Grant
Filed:
June 10, 2006
Date of Patent:
February 1, 2011
Assignees:
Gemalto SA, STMicroelectronics, SA
Inventors:
Robert Leydier, Alain Pomet, Benjamin Duval
Abstract: The chip card comprises a card body and an embedded chip module having a plurality of contact fields connected to respective terminals of the chip. The card body further comprises a positioning feature adapted to univocally identify said contact fields according to their location and orientation on the card body. The positioning feature is a hole or a notch formed on the card body in an area including the chip module such as a contact field which has no electrical functionality as contact field C6 according to ISO 7816-2. The invention is particularly adapted to card bodies including a plug-in removable portion of smaller size comprising said chip module and said positioning feature such as smaller size “mini-plug” SIMs for mobile phones.
Type:
Grant
Filed:
June 20, 2005
Date of Patent:
January 18, 2011
Assignee:
Gemalto SA
Inventors:
Yves Reignoux, Dorothée Nerot, François Roussel
Abstract: The system comprises a terminal (10, 12), an independent portable device (20) including a data processing means, and a wireless coupling means (RF COMMUNICATION) for exchanging individual-identification data between said terminal and said portable device. A body-medium communication means (OSC COMMUNICATION) including a transmitter in the terminal and a receiver in the portable device is provided to transmit from the terminal to the portable device a connection code (CONNECTION CODE) at the onset of a transaction upon physical contact established by the individual between the terminal and the portable device. A control means in the portable device checks said connection code received and conditionally issues to the terminal through said wireless coupling means (RF COMMUNICATION) a signal for enabling further execution of said transaction in response to said connection code complying with predetermined criteria.
Abstract: The invention relates to a method for making a stack of memory circuits, wherein the method includes the step of testing the validity of at least two memory circuits. According to the invention, the method includes the phase of configuring each memory circuit, the configuration phase including the step of writing, within a configuration device of each memory circuit included in the stack, a piece of information on an identifier allocated to the memory circuit in the stack, and a piece of information on the results of the validity test of the memory circuit. The invention also relates to a method for addressing a memory circuit, to a stack of memory circuits, and to an electronic device including such a stack.
Abstract: A portable electronic device 1 comprising a battery 14 coupled with an electronic circuit 10-12 through a switching circuit 15 for switching on or off the supply voltage Vcc to the electronic circuit using the battery. The portable device comprises at least one electromagnetic field detection circuit 13 coupled with the switching circuit 15 to start the power supply to the electronic circuit 10-12 if an electromagnetic field is detected.
Abstract: A method of unlocking a mobile terminal after a period of use and ensuring that the first operator who sold the terminal receives adequate payment prior to the use thereof. The identity of the terminal is saved and a security algorithm, which is not known to the operator, is implemented in a security module which is introduced into a server that is managed by the operator. After the period of use, the security module determines a secret key which is obtained by applying the terminal identity transmitted thereby and an operator code to the security algorithm, following a request transmitted by the service entity. The determined secret key, which is encrypted at the terminal, is transmitted over the operator's radiocommunications network and decrypted in the mobile terminal so that it can be compared to the saved secret key in order for the mobile terminal to be unlocked when the compared secret keys are identical.
Abstract: A method for the secure application of a cryptographic algorithm of the RSA type in an electronic component obtains the value of a public exponent e from a given set of probable values, without a priori knowledge of that value. Having determined the value for the public exponent e, the application of countermeasures using the value of e, to block error attacks and side channel attacks, particularly of the DPA and SPA type, are carried out on the application of a private operation of the cryptographic algorithm.
Type:
Grant
Filed:
February 22, 2008
Date of Patent:
December 28, 2010
Assignee:
Gemalto SA
Inventors:
Karine Villegas, Marc Joye, Benoit Chevallier-Mames
Abstract: The invention relates to a method for secure data transmission in connections between two functional modules of an electronic unit. A first module of a message of k bits in a word code of n bits is injection coded with a constant Hamming weight of w. The word of code is transmitted to a second module. An error signal is generated when the Hamming weight of the word of code of n bits, received by the second module, is different from w. In the absence of error, the code word is decoded, where k, w and n are whole numbers. The invention further relates to a corresponding electronic circuit.
Type:
Grant
Filed:
May 14, 2004
Date of Patent:
December 21, 2010
Assignee:
Gemalto SA
Inventors:
Eric Brier, Jacques Fournier, Pascal Moitrel, Olivier Benoit, Philippe Proust
Abstract: A personal mobile TV system (T, CP) stores an end-user profile, and it stores and runs a content personalization program controlling the system into automatic selection of a video segment source (BN2) depending on the end-user profile.
Abstract: The invention relates to a personal token storing a javacard application code lying over an area of the memory of the personal token, the personal token being able to run such javacard application so as to deliver HTML page data to an external device for the external device to display an HTML page on the basis of the such delivered HTML page data, said personal token further storing data to be used as a constructing part of the HTML page, characterized in that the data to be used as a contributing part of the HTML page are in at least one file which is separate from the memory area over which the Javacard application code is lying, and the personal token is programmed for opening the at least one file storing the contributing part of the HTML page when such data are requested for delivering said HTML page data to said external device.
Abstract: The invention relates to an electronic radiofrequency-transaction device that comprises a first switch capable of providing a radiofrequency operation of the device upon actuation of the switch and an operation stop when the actuation is released. The device is characterised in that it comprises a timer circuit capable of maintaining, after the actuation of the first switch, a continuous radiofrequency operation for a duration at least equal to the duration of a transaction to be carried out. The invention also relates to a smart card containing the device and to a module for an electronic radiofrequency-transaction device.
Type:
Application
Filed:
September 30, 2008
Publication date:
December 9, 2010
Applicant:
GEMALTO SA
Inventors:
Frédérick Seban, Jean-Christophe Fidalgo, Michael Zafrany
Abstract: For securing the data areas of a memory in an electronic component, said component is able to modify said data areas. A method includes a single backup memory of data areas including means of reference of the data to be secured, and means of backing up information on said data areas.
Abstract: This invention relates to a secured identification medium and a method for securing such a medium. The secured identification medium comprises an integrated circuit and, printed on one side, identification information (Ip) about the holder of the medium. It further comprises a set of characteristic attributes Att(Ipi) of the identification information, generated from a capture (Ipi) of the identification information and an extraction algorithm. The set of characteristic attributes of the printed analog image is stored in the integrated circuit and is designed to be compared, during an authentication stage, with a second set of characteristic attributes of the same printed image on the medium.
Abstract: The invention relates to a value-added service applied to the broadcasting of video programs or content and more particularly to mobile television (Mobile TV). The invention promotes service continuity during the broadcasting of programs having an undefined duration and the broadcasting of which has been subject to a Pay-Per-View type purchase.
Abstract: The invention concerns the personalisation graphics of identification documents. The identification document comprises a body where at least one of the main surfaces forms a print surface, on which artwork (14A, 14B) and/or personalised information (24A, 24B) are printed, the said print surface being covered with reinforced protective film (31A, 31B). The identification document further comprises a protective overlay (25A, 25B) transferred to the print surface with an ink ribbon, the said protective overlay being capable of enabling the adherence of the said reinforced protective film (31A, 31B) on the ink transferred to the said print surface.