Abstract: A method for producing a device having a transponder antenna connected to contact pads. An antenna with terminal connections is provided in contact with a substrate. The contact pads are placed on the substrate and connected to the terminal sections of the antenna. The connection is produced by means of a soldering by introducing energy between the pads and the terminal sections. The pads are placed such as to provide a surface facing an antenna terminal connection section. The section is arranged on the substrate and the soldering energy is directly applied to the pads. The invention also relates to the device obtained.
Type:
Application
Filed:
May 13, 2008
Publication date:
June 17, 2010
Applicant:
GEMALTO SA
Inventors:
Jean-Francois Martinent, Laurence Robles, François Roussel
Abstract: The present invention concerns a method and a system for extending a server connected with at least one client(s), characterized in that it consists in providing said extension on the client side by means of a portable object which is connected to said client and which performs at least one of the server's operation(s) in part or entirely.
Abstract: Application protocol data units are conveyed in a universal serial bus so that a portable electronic object such as a smart card can be recognized by a terminal, such as a micro-computer, as being a peripheral. The header and the data field, when such a data field exists, of each command are encapsulated in data fields of data packets of respective downlink transactions. The data field, when such a data field exists, and the trailer of each response are encapsulated in the data packet data field of at least one uplink transaction. By means of this bus link, the data rate between the terminal and the electronic object is higher, and a plurality of portable electronic objects can be connected to the terminal.
Abstract: The invention relates to a method for data management in a portable electronic device connected to a host machine, said device containing a first set of data, the host machine being connected to a remote data server containing a second set of data. Said method includes the steps of: drawing up, in the device, a unique list containing the first and second sets of data, transmitting the unique list from the device to the host machine.
Abstract: The invention relates to a method and to an automated device for the authentication of a set of candidate points relative to a set of reference points. The present invention is insensitive to unavoidable translation, rotation and scaling occurring upon successive but independent acquisitions of, for example, of fingerprints.
Abstract: A method for loading data and programs in the memory of an electronic component includes a first phase in which data is loaded in the memory of the component. A validation phase then verifies the data loaded in the component memory. A second phase of loading data in the memory is carried out only if the data loaded during the first loading phase is valid. The second phase includes at least a step in which data is loaded and then validated.
Abstract: The invention relates to a method for rendering content on a mobile equipment. The method includes rendering a content from a broadcasted stream. More specifically, embodiments of the invention include providing a mass memory in the mobile equipment and storing content from the broadcasted stream into the mass memory, where a remote broadcaster entity commands the mobile equipment to store the content from the broadcasted stream to the mass memory.
Abstract: The invention relates to a method for checking the integrity of a set of data packets received by a receiving communication device from a sending communication device, the data packets of the set being received in unpredictable order. The invention also relates to a communication device implementing a method according to the invention, in particular to a smart card.
Type:
Application
Filed:
October 3, 2007
Publication date:
April 29, 2010
Applicant:
GEMALTO SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli
Abstract: A card-like portable article having a microcontroller comprises a memory that contains a set of instructions allowing the microcontroller to communicate in accordance with a first communication protocol. The card-like portable article further comprises an interface for converting commands in accordance with the first communication protocol into commands in accordance with a second communication protocol and vice versa. Preferably, the first communication protocol is in conformity with the ISO 7816-3 standard and the second communication protocol is in conformity with the USB standard.
Abstract: The invention proposes an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value nL (n being for example equal to 2) that he can parceled and spend anonymously and unlinkably. The invention allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a tree structure without using a trusted third party.
Abstract: A system comprises a first communication device and a second communication device. The first communication device is arranged to communicate with the second communication device via a communication network using a first communication protocol. The first communication device is arranged to send a message to the second communication device via the communication network using the first communication protocol. The message is designed for a second communication protocol. The second communication device is arranged to send the message to a third communication device. The third communication device is being arranged to understand the second communication protocol.
Abstract: A smart card includes a card bearing a module that is made up of a support supporting at least an electronic chip. The support is fixed on one surface of the card. This surface extends up to at least one of the edges of the card.
Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
Type:
Application
Filed:
October 3, 2007
Publication date:
March 25, 2010
Applicant:
GEMALTO SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli
Abstract: A data processing system (CAR), particularly a smart card coupled to a communication device (MOB), communicating with a remote entity (OP). The data processing system has a location for storing a file (F) which can be downloaded from said remote entity, A program (GS) of the data processing system performs the following steps: before performing data correction in the system, a checking step in which said program (GS) checks whether a file (F) has been downloaded, if such a file (F) is present, the program (GS) modifies the application (APP) on the basis of the data stored in the file (F).
Abstract: The invention concerns a device and a method for controlling a portable object life cycle, in particular a smart card, the life cycle being determined by successive state transitions, which states determine the services offered by the object. The object includes a processing unit, program storage units and data storage units, each storage unit having a content defining a plurality of configurations. The device controls the transition from a first state to a second state of the object and, preferably triggers actions when the transition crossover from one state to another occurs or when a transition crossover request is denied. The actions are dependent on the type of transitions implied in the requests for state transition crossover applied to the object.
Type:
Grant
Filed:
November 3, 1999
Date of Patent:
March 16, 2010
Assignee:
Gemalto SA
Inventors:
Marc Birkner, Jean-Luc Giraud, Laurent Talvard
Abstract: The invention concerns an anti-pirate method for the distribution of digital content by pro-active diversified transmission, associated transmitter device and portable receiving object. The method, designed to make the same information (Kc) available to several receivers (1) belonging to a group (G) of receivers, each receiver storing information (SAi) specific to it, is characterized in that it includes the following steps: define a relation Kc=f(K, bi, SAi) where (f) is a given function, (K) is information common to all the receivers, and (bi) is information different for each receiver and for each value of the information (K); —enable each receiver to access information (bi) before making (Kc) available; and transmit the information (K) to all receivers, just before making (Kc) available; so that each receiver can calculate information (Kc) using said relation.
Abstract: The invention relates to a method for executing at least one program pertaining to at least one service included in a device having at least one memory space intended to be allocated for executing at least one of the services, and at least two access points for accessing services accessible from a network external to the device. The device associates a centralizing service with at least two access points and allocates a memory space to a service for receiving a request to connect to one of the services. The centralizing service is executed, making it possible to await reception of a connection request. In the absence thereof, only the centralizing service has the use of an allocated memory space. The invention also relates to a corresponding electronic device and system.
Abstract: The invention relates to a personal token running a series of applications, wherein said personal token includes a thread controller which transmits data from the applications to an external device in a cyclic way, a cycle being constituted of a series of data transfers from the applications and to the external device, a cycle comprising a respective number of data transfers dedicated to each respective application which is different according to the respective application, the number of data transfers for a respective application in a cycle corresponding to a priority level of the application as taken into account by the thread controller.
Abstract: The invention relates to a method for synchronizing personal data between a memory of at least one mobile equipment unit and an external device. Each of the mobile equipment units includes or is connected to a SyncML synchronization client. The external device can include a SyncML synchronization server associated with the SyncML synchronization client. In one embodiment the external device is a smart card. The smart card is associated with the mobile equipment unit and the SyncML synchronization client transmits a synchronization request to the SyncML synchronization server. The SyncML synchronization server synchronizes the personal data between the smart card and the mobile equipment unit.
Abstract: In order to rapidly load from a server (1) an application to be deployed (AP) in a terminal (2) and a chip card (3), a message (MAP) containing both a first application part and second application part formatted so as to be compatible with a protocol for communication between the terminal and the card is transmitted by the server to the terminal, which stores the two parts. The first part (APT) extracted from the application message (MAP) is installed in the terminal. A specific loader (CAPC) loads the second part (APC) extracted from the message according to the communication protocol. The installations of the two application parts are thus synchronous under the control of the terminal.