Patents Assigned to Gemalto SA
-
Patent number: 10146967Abstract: The present invention concerns a method of radio-frequency communication between a contactless transponder and a reader, in which at least one sideband of the carrier frequency is used for communicating a response from the transponder by modulation of the amplitude of this carrier frequency. The method is distinguished in that the modulation at least partly applies a modulation level greater than 100%, which causes a negative modulation. The invention also concerns a corresponding communication circuit.Type: GrantFiled: June 15, 2012Date of Patent: December 4, 2018Assignee: GEMALTO SAInventors: Jean-Paul Caruana, Grégory Capomaggio, Christophe Buton
-
Patent number: 10146965Abstract: The invention relates to a method of reading RF transponders disposed in one and the same magnetic interrogation field, in which a magnetic coupling of the transponders is ensured with a passive resonant circuit during reading. The method is distinguished in that the passive antenna of the resonant circuit is associated with at least one transponder antenna, and the passive resonant circuit is tuned in such a way that the resonant frequency resulting from the association corresponds to one of the frequencies of the emission side bands of the transponder to be read. The invention also relates to the system corresponding to the method, a transponder structure and an object containing the transponder, in particular a travel document.Type: GrantFiled: September 30, 2016Date of Patent: December 4, 2018Assignee: GEMALTO SAInventor: Jean-Paul Caruana
-
Publication number: 20180330220Abstract: Method of producing wire inlaid on a support and inlaid wire obtained. The invention relates to an antenna for radiofrequency transponder, said antenna comprising conducting wire portions which are to a major extent inlaid and conducting wire portions which are to a minor extent non-inlaid on a plane support. The antenna is characterized in that said wire portions which are to a minor extent non-inlaid extend over or cross at least one favoured fold line and/or one fold line predefined according to a standardized folding resistance test. The invention also relates to a portable electronic object comprising said antenna and a corresponding method of production.Type: ApplicationFiled: November 14, 2016Publication date: November 15, 2018Applicant: GEMALTO SAInventors: Sébastien GASPARI, Blandine ALLEYSSON, Elisabeth KERGUEN, Olivier LEVEQUE
-
Publication number: 20180323139Abstract: The invention relates to a method for manufacturing a device with a secure integrated-circuit chip, said device having an insulating substrate, electrically conductive surfaces on the substrate, which surfaces are connected or coupled to said electronic chip, said electrically conductive surfaces being produced by a step of depositing or transferring conductive material; the method is characterised in that said step of depositing or transferring conductive material is carried out by a technique of directly depositing metal microparticles, which are free of polymer or solvent, onto the substrate, said deposit being obtained by coalescence of the microparticles forming at least one or more uniform cohesive layers that rest directly in contact with the substrate. The invention also relates to the device obtained.Type: ApplicationFiled: October 28, 2016Publication date: November 8, 2018Applicant: GEMALTO SAInventors: Line Degeilh, Remy Janvrin, Lucile Dossetto, Alain Le Loc'h, Jean-Christophe Fidalgo
-
Patent number: 10120780Abstract: The invention relates to a method for loading at least one native code on at least one target secure element comprising a java card virtual machine, said method comprising the following steps: providing a modified CAP file composed of at least one custom CAP component comprising a native code; extracting said native code from the custom CAP component; installing said native code in the target secure.Type: GrantFiled: September 26, 2014Date of Patent: November 6, 2018Assignee: GEMALTO SAInventors: Francois Bogusz, Francois Millet, Julien Glousieau, Abdellah El Marouani, Andre Sintzoff, Ilyas Landikov
-
Publication number: 20180314810Abstract: The invention is a method for managing an application that includes a generic part and an additional part. The generic part is pre-installed on a device. The device gets a fingerprint of itself and after a user authentication sends to a server a request for getting the additional part. The request comprises credentials associated with the user or a reference of the user, the fingerprint and a reference of the application. The server generates a ciphered part of the additional part using a key based on both the credentials and the fingerprint and builds an auto-decrypt program configured to decipher the ciphered part. The device receives the ciphered part and the auto-decrypt program. It gets the fingerprint and the credentials and retrieves the additional part by running the auto-decrypt program with said fingerprint and credentials as input parameters.Type: ApplicationFiled: September 6, 2016Publication date: November 1, 2018Applicant: GEMALTO SAInventors: Milas FOKLE, Benoit GONZALVO, Guillaume HUYSMANS
-
Patent number: 10116654Abstract: The invention proposes a method for cloning a first secure element from a backup secure element of a user, said backup secure element comprising at least credentials of said user. The method comprises a preliminary phase of checking the authenticity of the first secure element using a second secure element, said second secure element being able to be paired with a third secure element.Type: GrantFiled: September 3, 2013Date of Patent: October 30, 2018Assignee: GEMALTO SAInventor: Alain Rhelimi
-
Publication number: 20180310148Abstract: The invention is a method for managing applications in a secure element comprising a communication interface. An application is installed in the secure element and configured to be implicitly selected on the communication interface. The method comprises the following steps: —the secure element receives a command requesting the installation of a new application configured to be implicitly selected on the communication interface, —upon receipt of the command, the secure element installs the new application, configures the new application to be implicitly selected on the communication interface and keeps the previous application unchanged.Type: ApplicationFiled: September 15, 2016Publication date: October 25, 2018Applicant: GEMALTO SAInventors: Heimi SAAD, Valérie GLEIZE, Fabien COURTIADE
-
Publication number: 20180307813Abstract: A method, a device and a system for printing a three dimensional object are disclosed. A printing device, as a first device, or a second device stores predetermined data relating to one or several printings. The second device cooperates with the first device. The first or the second device stores a predetermined printing threshold. The first or the second device determines and stores, during a printing of the three dimensional object, at least one current printing progress rate. The first or the second device compares the current printing progress rate to the predetermined printing threshold. As soon as the current printing progress rate is greater than or equal to the predetermined printing threshold, the first or the second device updates the data relating to one or several printings, so as to validate the printing of the three dimensional object.Type: ApplicationFiled: October 20, 2016Publication date: October 25, 2018Applicant: GEMALTO SAInventors: Anne-Marie Praden, Jean-Philippe Millard
-
Patent number: 10110567Abstract: The present invention relates to a server comprising at least an application outputting at least one cookie, the server including a scrambled cookie names generator, a correspondence mechanism associating connections attributes for the application with an unpredictable scrambled cookie name, the scrambled cookie name being the one provided in the cookie sent to client side for use in the next connections to the application.Type: GrantFiled: July 11, 2014Date of Patent: October 23, 2018Assignee: GEMALTO SAInventors: Eric Garreau, Alexandre Schaff
-
Publication number: 20180300120Abstract: The invention is a method of updating a first executable code comprised in a first package in a secure element, a class instance being instantiated from said first package and comprising instance data. The method comprises the following steps: loading in the secure element an upgrade file comprising a second executable code and creating a second package from said upgrade file, changing said first executable code for said second executable code by replacing a reference to the first package by a reference to the second package in a package list stored in the secure element, while leaving the class instance alive and said instance data unchanged.Type: ApplicationFiled: September 27, 2016Publication date: October 18, 2018Applicant: GEMALTO SAInventors: Christophe Franchi, François-Xavier Marseille
-
Publication number: 20180302224Abstract: A requester device sends to a server a request for proving a piece of user information and data identifying a requester. The server generates requester authentication data and associated data identifying a transaction. The server generates a proof of user information using the piece of user information and the requester authentication data. The server sends to the requester device, as a request response, the proof of user information and the associated data identifying the transaction. A verifier device sends to the server a request for getting authentication data associated with data identifying a transaction and the associated data identifying the transaction. The server sends to the verifier device, as a request response, authentication data associated with the data identifying the transaction. The verifier device or a verifier authenticates the piece of user information only if the received authentication data matches the requester authentication data.Type: ApplicationFiled: April 28, 2016Publication date: October 18, 2018Applicant: GEMALTO SAInventor: John Philip WILSON
-
Patent number: 10102468Abstract: The invention relates to a method for producing an intermediate device comprising an electronic module, said intermediate device being used to receive at least one film or portion of a film or covering layer, said device comprising: a supporting body; at least one area for the interconnection of an electric circuit, borne by the supporting body; and an electronic module connected to said interconnection area by an anisotropic connection material, said material being compressed between said area and the module. The method comprises the implementation of a means for maintaining the compressed state of said anisotropic material and/or a means for isolating said material from the outside of the supporting body.Type: GrantFiled: June 2, 2014Date of Patent: October 16, 2018Assignee: GEMALTO SAInventors: Christophe Bousquet, Yves Cuny, Brigitte Lacaze, Antoine Bajolle, Sébastien Gaspari, Frédérick Seban
-
Patent number: 10091883Abstract: The invention relates to an electronic module comprising a first metal layer including at least one contact pad or a conductive pad for connection or interconnection, an insulating layer that is electrically connected to the metal layer via a first surface, a second metal layer connected to the insulating layer on the opposite surface thereof, a chip location or an electronic chip electrically connected to the at least one contact pad through openings in the insulating layer, characterized in that the insulating layer is an adhesive.Type: GrantFiled: June 19, 2014Date of Patent: October 2, 2018Assignee: GEMALTO SAInventors: Stéphane Ottobon, Lucile Dossetto, Line Degeilh
-
Publication number: 20180279124Abstract: The invention relates to a method for authenticating to a mobile network. According to the invention, the method comprises the following steps. A device activates only a first temporary subscription identifier. The device sends to a first server the first temporary subscription identifier and first data. The first server sends to the device a first result message including an authentication failure based upon the first data. The device activates only a second temporary subscription identifier. The device sends to the first server the second temporary subscription identifier and second data. And the first server sends to the device a second result message including an authentication success based upon the associated first and second temporary subscription identifiers and the second data. The invention also relates to corresponding device and system and a server for authenticating devices to a mobile network.Type: ApplicationFiled: November 4, 2016Publication date: September 27, 2018Applicant: GEMALTO SAInventors: Daniel MAVRAKIS, François ZANNIN, Hervé TROADEC, Jean-François KUC, Pierre GIRARD
-
Publication number: 20180279123Abstract: The present invention relates to a method to authenticate a subscriber (IMSIi) within a local network (LNj) comprising preliminary step of deriving a subscriber key (SMKi) in local keys (LKi), one local key (LKiLNj) for each local network (LNj) the subscriber (IMSIi) is authorized to access, provisioning each local network (LNj) the subscriber (IMSIi) is authorized to access with its own local key (LKiLNj). When an authentication is required in a given local network (LNj), an UICC application derives a local key (LKiLNj) in the UICC application of the subscriber (IMSIi) using the network identifier (LNj), the key derivation function (KDF) and the subscriber key (SMKi) and use the derived local key (LKiLNj) in the algorithm to perform local authentication in the local network (LNj).Type: ApplicationFiled: July 5, 2016Publication date: September 27, 2018Applicant: GEMALTO SAInventors: Mireille PAULIAC, Anne-Marie PRADEN
-
Patent number: 10079682Abstract: The invention is a method for deploying a trusted identity for a user issued by an issuer. The user has a user device configured to send a request for signature to an issuer device handled by the issuer. The request comprises a user public key allocated to the user. The issuer device is configured to compute an issuer signature by signing both the user's trusted identity and the user public key using an issuer private key allocated to the issuer. A block chain transaction containing the issuer signature is created and submitted to a Block Chain for transaction verification and storage.Type: GrantFiled: December 22, 2015Date of Patent: September 18, 2018Assignee: GEMALTO SAInventor: HongQian Karen Lu
-
Publication number: 20180249397Abstract: A chip is coupled to a device. The device stores at least one configuration parameter for configuring an access to an Internet type network. According to the invention, the chip stores data relating to at least two subscriptions. The method comprises the following steps. The chip de-activates a first subscription. The chip activates a second subscription. The second subscription is distinct from the first subscription, as a previously active subscription. The second subscription is a currently active subscription. The chip detects whether the device does or does not read a currently active subscription. Only if the device reads a currently active subscription, then the chip detects whether at least one configuration parameter does or does not allow accessing an Internet type network. Only if at least one configuration parameter does not allow accessing an Internet type network, then the chip ascertains that at least one configuration parameter is corrupted.Type: ApplicationFiled: March 30, 2016Publication date: August 30, 2018Applicant: GEMALTO SAInventors: David CORRADINO, Philippe TIVOLLE, Stéphane QUETGLAS
-
Patent number: 10061920Abstract: The present invention relates to a secure platform implementing dynamic countermeasures in relation with the execution of a code, said secure platform having at least a security sensor, a countermeasure controller and countermeasure means. According to the invention, said countermeasure controller includes at least one security sensor flag able to take at least two sensor flag values depending on the output of the security sensor, a table storing N possible security configuration for the countermeasures, a random generator to generate a random configuration value, a decision function using the sensor flag value and the random configuration value to determine a security configuration in the table to be executed by countermeasure means.Type: GrantFiled: April 2, 2014Date of Patent: August 28, 2018Assignee: GEMALTO SAInventor: Philippe Loubet Moundi
-
Patent number: D830412Type: GrantFiled: August 15, 2016Date of Patent: October 9, 2018Assignee: GEMALTO SAInventors: Brian L. Linzie, Brett A. Howell