Abstract: A pairing device for establishing a secure wireless communication path between a first device having a first body-coupling communication interface and a second device having a screen.
Abstract: A method for establishing a first secured communication channel between an administrative agent in a device and a distant server, the device comprising a secure element communicating with the administrative agent, the secure element being administrated through the administrative agent by the distant server, the administrative agent being administrated by a third party server through a second secured communication channel, the distant server and the third party server being connected through a third secured channel. The third party server requests, from the distant server, an operation on the secure element and a one-time PSK. The distant server sends, to the third party server, the one-time PSK. The third party server sends, to the administrative agent, a triggering message including the one-time PSK. A TLS-PSK handshake is performed between the administrative agent and the distant server with the one-time PSK to establish the first secured communication channel.
Abstract: A device according to claim 6, characterised in that the interrupting zone is positioned outside the switch zone in which two wires (54, 56) of a circuit are so arranged as to cooperate with the switch are positioned.
Abstract: To authorize a transaction, a first device sends to a first server a transaction-authorization request accompanied with an Id-PAN relating to a user account, and including an identifier of a second device. The first server sends to a second server a user-authorization request accompanied with the Id-PAN and transaction data. The second server sends to the second device a request for user approval including the transaction data and the user account data. The second device requests whether the device user approves a requested transaction. The second device sends to the second server a request for authorizing the transaction and data relating to user approval. The second server verifies whether the requested transaction is approved by the user. The second server sends to a server a verification result including a transaction authorization or refusal.
Abstract: Method of producing a device comprising at least two distinct components that are interconnected by interconnecting wires, and device thereby obtained. The invention relates to a method of producing a device having at least two distinct components which are interconnected on a substrate by at least one interconnecting wire. The method includes the following steps: creating the interconnecting wire by depositing individual wires on the substrate in a predefined interconnecting pattern, the wire comprising at least one terminal connection portion which is exposed on the substrate, bringing at least one contact of a component to face the terminal portion and connecting the contact to this terminal portion. The invention also relates to the device thereby obtained and to a multi-component product comprising same.
Type:
Grant
Filed:
December 4, 2008
Date of Patent:
July 4, 2017
Assignee:
GEMALTO SA
Inventors:
Frederick Seban, Jean-Christophe Fidalgo
Abstract: The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising personalized data, the data carrier comprising a first side and a second side opposite to the first side and at least one recording layer provided with at least a first piece of authentication data of said authentication data, an array of lenticular elements being arranged at the first side of the data carrier to provide from a first predetermined angle of view an image of said at least first piece of authentication data. In order that the data carrier according to the invention shall not suffer from greyness and in order to make the data carrier esthetically appealing and manufacture it at low costs, the recording layer is a non-doped transparent PVC layer comprising said at least first piece of authentication data.
Abstract: The invention proposes a method for exporting data of a Javacard application stored in a UICC to a host, the method consisting in: transmitting a transfer order to the application through a Javacard API; formatting the data in a pack, wherein the formatting is realized by the application; exporting the pack to the host.
Type:
Grant
Filed:
December 5, 2011
Date of Patent:
June 27, 2017
Assignee:
GEMALTO SA
Inventors:
Fabrice Vergnes, Franck Imoucha, Nicolas Roussel
Abstract: The invention is a method for deploying a trusted identity for a user issued by an issuer. The user has a user device configured to send a request for signature to an issuer device handled by the issuer. The request comprises a user public key allocated to the user. The issuer device is configured to compute an issuer signature by signing both the user's trusted identity and the user public key using an issuer private key allocated to the issuer. A block chain transaction containing the issuer signature is created and submitted to a Block Chain for transaction verification and storage.
Abstract: The invention relates to a method for producing an electronic device including at least one electronic component in a substrate body, said method including at least one step of transferring said electronic component to a surface of a removable dielectric substrate, of delivering a protective resin on said electronic component, and of transferring, onto the protective resin, a reinforcement disc having a main front surface with a peripheral contour, wherein the protective resin extends up to the peripheral contour of the disc in order to form, together with the disc, the peripheral side contours and the final layer of the substrate body of the device.
Abstract: The invention is a method for managing communication between a secure element and a device. The secure element comprises a physical communication interface and first and second virtual profiles. It is configured to exchange data targeting the virtual profiles with the device through the physical communication interface. The method comprises the steps of: running simultaneously said first and second virtual profiles, demultiplex incoming data received through the physical communication interface and multiplex outgoing data sent through the physical communication interface, resetting one of said virtual profiles individually without affecting the other virtual profiles in response to receiving a specific signal sent by the device through the physical communication interface.
Abstract: The present invention relates to a method to build a non-alterable structure and to such a non-alterable structure including data relative to a set of cryptographic material generated randomly or derived from a secret key linked to a business use, the non-alterable structure being intended to be transferred from a first entity to a second entity, the entities sharing at least an encryption/decryption key and a signature key, the structure comprising at least business data relative to the intended use of cryptographic material, an encrypted protection key encrypted with the encryption key, an encrypted set of cryptographic material encrypted with the protection key, a signature of the set of cryptographic material, the protection key and the data relative to the intended use of cryptographic material signed with the signature key.
Type:
Grant
Filed:
December 3, 2013
Date of Patent:
June 13, 2017
Assignee:
GEMALTO SA
Inventors:
Frank Detcheverry, Patrick Lambert, Fabien Poplin
Abstract: The invention relates to the technical field of smart cards with displays. Such a card comprises, embedded in a transparent core, a multi-component module supporting the display. The card comprises: at least one layer of ink printed on the surface of the transparent core, except in a zone facing the display, said at least one layer being opaque in at least one region; and a transparent film covering the at least one ink layer. The card is characterized in that the at least one layer is formed by a first opaque ink layer printed on the surface of the transparent core, except in a zone facing the display and a second ink layer forming a graphic design allowing customization printed on the first ink layer.
Abstract: The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising personalized data, the data carrier comprising a first side and a second opposite side, and a plurality of layers comprising personalized data, a transparent recording layer, a transparent plastic upper layer and an opaque layer between the recording layer and the upper layer.
Abstract: A method of operating a mobile radio communication terminal, in which execution of at least one step of the method is controlled according to a device parameter which is assigned to the mobile radio communication terminal and which has exactly one of two possible device parameter values which indicate whether the mobile radio communication terminal is permanently stationary or not permanently stationary.
Abstract: The invention concerns a method for attaching a roaming telecommunication terminal to a visited network, the terminal having a security element. The method includes transmitting from the home network to the terminal a rejection message that is function of the features of the terminal and the security element.
Abstract: The invention relates to a method of communicating data with an electronic device, comprising the step of receiving signals conveyed by an electrical lead. The method is distinguished in that it comprises the following steps: fitting an RF radiofrequency interface with electrical terminals in the device, extracting signals from the electrical lead, and injecting signals resulting from the extracted signals, in the form of frames of radiofrequency signals in the RF interface with electrical terminals. The invention also relates to a radiofrequency communication device, a system comprising the device and a machine using the device.
Abstract: System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile.
Abstract: A method for operating a wireless device within a cellular network having at least two base nodes and providing common channels and at least one downlink non-common channel. The wireless device decodes at least one common channel and the downlink non-common channel, and performs the steps of determining a value relative to the total amount of resources provided by one of the base nodes, determining a value relative to the amount of resources provided by the one base node for the common channels out of the total resources, determining a value relative to the amount of resources suitable of being received by the wireless device, calculating the share of usable resources in comparison to said total resources excluding common resources, and adapting the operation of the wireless device within the cellular network in dependence of the calculated share of usable resources.
Abstract: A communication device comprises an RF interface (20) and a CPU (10). The RF interface (20) has a physical channel PhCh to exchange radio messages on a wireless network. The physical channel PhCh is coupled with at least two logical channels LCi. The CPU (10) is connected to the RF interface (20) to provide at least two services Si on the wireless network. Each service Si is associated with a logical channel LCi of the RF interface (20). The CPU (10) associates a transmission parameter Pi with each service Si and sends the said transmission parameter Pi to the logical channel LCi associated with the service Si. The RF interface (20) configures the physical channel PhCh on the basis of the transmission parameter Pi depending on the logical channel LCi under transmission.
Abstract: The invention is a method for allowing a user to establish a secure session between a device and a server by using a username/password associated with the user. The user provides the username for the device. In response to a message comprising the username, the server opens a session and generates an identifier of the session and sends the identifier to the device. The identifier is transmitted to a machine distinct from the device. The user provides the password for the machine. The machine sends an authenticating message to the server, the authenticating message comprises the identifier and an authenticating data generated from the password. The server sends a result message reflecting the result of the authenticating data checking to the device.