Abstract: The invention relates to a portable device for accessing a server. According to the invention, the device is adapted to send to a server or data relating to rights for accessing a server. The invention also relates to corresponding system, server and method.
Abstract: The invention relates to a method for managing on-street parking spaces. The method includes querying, by a unit of a vehicle, vehicle sensors about the occupancy status of a parking space around the vehicle, the setting up of a communication channel between the unit and a remote server, the authentication of the unit with the server, the sending of a message with a public encryption key by the server to the unit, the encryption of the geolocation data and the occupancy status, the sending of the encrypted data to server, the decryption by the server of the received encrypted data, the comparison of the geolocation data received with a database containing referenced parking spaces and the update in the database of the occupancy status of referenced parking spaces.
Abstract: The invention relates to a device (CD) comprising a capacitive keyboard (KB) constituted of a plurality of keys (KY), each key comprising an active electrode (AEL) and an active ground plane (AGP), a microcontroller (MC) connected to said keyboard (KB) through active electrode (AEL) and active ground plane (AGP). Said microcontroller (MC) is adapted for managing said keyboard (KB) in a reverse manner for emulating a sequence of tactile contacts on a capacitive screen.
Type:
Grant
Filed:
December 12, 2013
Date of Patent:
January 30, 2018
Assignee:
GEMALTO SA
Inventors:
François-Xavier Marseille, Michel Thill
Abstract: The invention relates to an intelligent portable personal security object including graphical personalization data visible from a face of the object, wherein the graphical personalization data are presented by electronic display. The invention also relates to a use of the portable object in the carrying out of secure electronic transaction; and/or in the authentication and visual monitoring of at least one person; and/or in logical access control for at least one user; and/or in the displaying of data other than graphical personalization data.
Type:
Grant
Filed:
November 27, 2009
Date of Patent:
January 30, 2018
Assignee:
GEMALTO SA
Inventors:
Philippe Biton, Gérald Maunier, William Berges, Daniel Boucher
Abstract: Remote subscription management of an eUICC comprising a private key and a public certificate, the public certificate comprising information allowing a subscription manager server to decide if it can agree to manage the eUICC.
Abstract: A device comprises a chip storing a first subscription relating to the first mobile network operator in a home country. The chip stores a second subscription relating to a second mobile network operator and associated with a preferred communication technology. The chip receives location information and analyses whether an extended cell identity value is present within the location information. The chip detects, based upon the analysis, a currently available communication technology relating to a second mobile network. The chip compares the currently available communication technology to at least one preferred communication technology. If the currently available communication technology matches at least one preferred communication technology, then the chip switches to a second subscription associated with the preferred communication technology. The chip sends to the device at least one identifier relating to the second subscription related to the second mobile network.
Abstract: In a method for accessing a service, a device receives data. The device gets, based upon the received data, transaction data. The device signs the transaction data by using a private key relating to a transaction processing, a signature operation result being a transaction signature. The device generates a transaction analysis result. The device stores the transaction data and the transaction signature. The device analyses whether the transaction analysis result is or is not a transaction authorization. Only if the transaction analysis result is a transaction authorization, the device gets, based upon the received data, service data. The device sends to a first external entity the service data. The device sends the transaction data and the transaction signature to either the first external entity or a second external entity.
Abstract: The invention is a method for managing communication between a secure element and a device. The secure element comprises a physical communication interface and first and second virtual profiles. It is configured to exchange data targeting the virtual profiles with the device through the physical communication interface. The method comprises the steps of: running simultaneously said first and second virtual profiles, demultiplex incoming data received through the physical communication interface and multiplex outgoing data sent through the physical communication interface, resetting one of said virtual profiles individually without affecting the other virtual profiles in response to receiving a specific signal sent by the device through the physical communication interface.
Abstract: The invention is a method of managing communication between a host device and a secure element comprising two virtual profiles. The method comprises the steps of: running simultaneously both virtual profiles in the secure element, generating an incoming data from the host device by multiplexing a first command targeting one virtual profile and another command targeting the other virtual profile and sending the incoming data to the secure element, demultiplexing both commands at the secure element side and sending each command to the targeted virtual profile, getting response messages generated by both virtual profiles by executing said commands, generating an outgoing data by multiplexing the response messages and sending this outgoing data to the host device, and demultiplexing the response messages at the host device side.
Abstract: A roaming device sends, through a visited network and a proxy network, to a home network, an identifier for a first subscription. The home network sends, through the proxy network, to the visited network, data relating to the first subscription. The proxy network sends to the home network a first temporary address. The visited network sends to the proxy network a second temporary address. The device activates a second subscription. The device sends, through the visited network and the proxy network, to the roaming provider network, an identifier for the second subscription. The roaming provider network sends, through the proxy network, to the visited network, data relating to the second subscription. The proxy network registers the first subscription identifier, the second subscription identifier, the first temporary address and the second temporary address. The proxy network sends to the roaming provider network the first temporary address.
Abstract: A security document (1, 1?), comprising: a base layer (10, 10?) having a through hole (15, 15?) extending from a first side of the base layer (10, 10?) to a second side of the base layer (10, 10?); a first cover layer (11, 11?) attached on the first side of the base layer (10, 10?); a second cover layer (12, 12?) attached on the second side of the base layer (10, 10?); and an electronic module (4, 4?) arranged in said through hole (15, 15?). The security document (1, 1?) further comprises a first patch (21, 21?) attached to the security document (1, 1?) by hot stamping and located between the base layer (10, 10?) and the first cover layer (11, 11?), the first patch (21, 21?) surrounding the through hole (15, 15?) and covering a perimeter area around the through hole (15, 15?) on the first side of the base layer (10, 10?), thereby preventing attachment of the base layer (10, 10?) to the first cover layer (11, 11?) in the region of the perimeter area.
Abstract: The invention relates to a method for producing a module having an electronic chip including metallisations which are accessible from a first side of the metallisations and an integrated circuit chip which is arranged on the second side of the metallisations, opposite the first side. The method comprises the step of forming electrical interconnection elements which are separate from the metallisations, directly connecting the chip, and are arranged on the second side of the metallisations. The invention also relates to a module corresponding to the method and to a device comprising said module.
Abstract: The card comprises a first translucent or transparent substrate layer, preferably in PVC, and a second substrate layer, and a cracked layer of ink between the two substrate layers so as to allow the second substrate layer to show through the cracks of the layer of ink. The cracked layer of printing ink comprises mirror-effect ink, that reflects light through the first translucent or transparent substrate layer. The cracking of the layer of ink is achieved when the card is manufactured by laminating it.
Abstract: The invention relates, in particular, to a method for registering at least one public address in an IMS network including a terminal that interacts with a security element. According to the invention, the security element includes an application that invites the user of the terminal, upon the occurrence of an event, to enter a public address, selected by the user, via the man/machine interface of the terminal, the application transmitting the public address, accompanied by at least one identifier of the security element, to a remote network via the terminal such that the remote network associates the public address with the identifier.
Abstract: In one aspect, there is provided is a method for preventing congestion at radio access in a mobile or wireless communication system, said method comprising, in an embodiment, a step of: barring a Mobile Terminal from radio access, except if said Mobile Terminal belongs to a given one of different ranges into which Mobile Terminals are split, said given range being referred to as allowed range, said allowed range changing upon time.
Abstract: The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory RAM and NVM and at least one bus access controller, wherein the bus access controller defines at least a first area PBL, a second area SBL and a secure area MZ. The first area comprises a first loader program capable of loading a program package in the second area. The secure area comprises an authentication key capable of authenticating the program package loaded in the second area. After authentication of the program package loaded in the second area, the access right of the first loader program is changed in such a way that a program in the first area can no more access the second area.
Abstract: The present invention relates to a method (100) for personalizing a document, said document comprising a support comprising printed patterns (201, 202), wherein said method (100) comprises generating at least a laser pulse on said support for carbonizing at least a printed pattern.
Abstract: A system and method of operating a database system to protect personal identifiers from being revealed. The system and method obfuscates personal identifiers using a secret value, storing in a database records containing the obfuscated personal identifier, storing the secret value in a identifier translation device, receiving at a request preparer a record request identifying a requested record using a non-obfuscated personal identifier, and operating the request preparer to direct the identifier translation device to translate the non-obfuscated personal identifier into an obfuscated personal identifier using the secret value stored in the identifier translation device and using the obfuscated personal identifier in a query to the database.
Abstract: The invention concerns notably a method for detecting dynamically that secure elements are eligible to at least one OTA campaign for updating these secure elements, each secure element cooperating with a telecommunication terminal in a telecommunication network, this updating being realized by an OTA server. According to the invention, the method consists in: Detecting which secure elements have not polled the OTA server for a given time frame; Checking eligibility for these secure elements; Updating the secure elements that did not poll the OTA server for this given time frame and that are eligible to the OTA campaign by pushing messages to these secure elements.
Type:
Grant
Filed:
September 15, 2015
Date of Patent:
December 12, 2017
Assignee:
GEMALTO SA
Inventors:
Gabriel Pereira, Tristan Boiteux, Kim Depusse
Abstract: The present invention relates to a method to execute by a processing unit a sensitive computation using multiple different and independent branches each necessitating a given number of processing unit time units to be executed, characterized in that it comprises the following steps of, at each execution of a sensitive computation: generating at least as many identifiers as the number of branches, associating each identifier to a unique branch, generating a random permutation of identifiers, the number of occurrences of each identifier in the permutation being at least equal to the number of central processing unit time units in the shortest of the branches, by processing each identifier in the random permutation, determining successively the branch to execute by each successive central processing unit time units according to the identifier value, for each identifier of the random permutation, executing a central processing unit time unit for the branch determined according to the identifier value.