Abstract: The invention relates to a portable electronic device comprising a supporting member receiving on one side conductive contact lands or tracks extending substantially as far as the edge of the side and connecting an electronic microcircuit, the conductive contact lands or tracks comprising a plurality of perforations. The device is noteworthy in that the interior of the perforations is free, or intended to be kept free, of metal.
Abstract: A method of protecting a telecommunication terminal having a chip-card-type personal component which is required for telecommunication network access. The terminal includes a processing unit, at least one operating memory element containing the information necessary to the operation of the terminal, i.e. a terminal operating program, and the data necessary to the program. The method involves: a) encrypting the contents of the operating memory element of the telecommunication terminal using a pre-determined key K which is necessary for decryption; and b) allowing the terminal to commence decryption once the terminal has been started with a start-up program that is saved in a secure memory element and once the key for decryption has been calculated by same.
Abstract: The present invention relates to a method and device of performing Tracking Area Update TAU for a group of Machine-Type Communication MTC devices in a communication network. According to an embodiment of the present invention, the group comprises a first MTC device and at least one second MTC device that have the same group ID and location information, the communication network comprises an old Mobility Management Entity MME and a new Mobility Management Entity MME before and after TAU, respectively, for providing mobility management to the group of MTC devices, and the method comprises: after the new MME receives a TAU request about the first MTC device, obtaining a context of the first MTC device from the old MME; the new MME checking the context of the first MTC device to find the group ID of the group; and if the group ID is included in the context of the first MTC device, the new MME utilizing the group ID to obtain from the old MME a context of the at least one second MTC device.
Abstract: The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.
Abstract: A device comprises a memory. The memory stores data relating to at least one service profile template. The service profile template includes executable data. A server sends to the device a first message including a request for creating or modifying at least one service profile based upon a service profile template. The device executes the executable data. The device creates or modifies a memory area. The memory area is associated with a service profile by using the service profile template. The device sends to the server at least one second message including a request for loading into the device data relating to at least one service profile. The server sends to the device at least one third message including data relating to at least one service profile. And the device stores within the created or modified memory area the data relating to at least one service profile.
Abstract: A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC.
Abstract: The invention relates to a method for personalizing an electronic device using an encryption device adaptable to standard certified apparatuses. The encryption device makes it possible to ensure the confidentiality of the transfer of a secret code from the user to a possible personalization server.
Abstract: The invention relates to a smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The invention also relates to the use of a portable object for implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via said interactive display.
Abstract: The present invention relates to a method to execute a modular exponentiation R=Xe mod N, said method implementing several variable registers and an indicator register m and performing looped calculations. In the invention each loop includes at least two operations from values stored in variable registers, said operations depending on the value stored in m and on the value of the bit(s) of the exponent currently processed, m indicating if the calculation is completed for the current exponent bit at the end of the operations in the current loop.
Abstract: The present invention relates to a secure platform implementing dynamic countermeasures in relation with the execution of a code, said secure platform having at least a security sensor, a countermeasure controller and countermeasure means. According to the invention, said countermeasure controller includes at least one security sensor flag able to take at least two sensor flag values depending on the output of the security sensor, a table storing N possible security configuration for the countermeasures, a random generator to generate a random configuration value, a decision function using the sensor flag value and the random configuration value to determine a security configuration in the table to be executed by countermeasure means.
Abstract: The present invention relates to a method to establish a secure voice communication session between two user equipments with the help of a dedicated Network Application Function (NAF) and at least one Bootstrapping Server Function. A session key is calculated from bootstrapping service derived external or internal NAF keys of the first and the second user equipments. A secured voice communication is established using the calculated session key.
Abstract: A method to manage modification of encryption credentials for an encryption server. The encryption server is used to encrypt data uploaded by a user after provision of user encryption credentials associated with an encryption account. The data is encrypted by using a user encryption key stored in a cloud storage server.
Abstract: The invention relates to a radio frequency device including an antenna connected to a capacitor. Said capacitor includes first and second conductive plates that are opposite each other and separated by an insulator. At least one of said first and second plates is formed of a plurality of wire capacitor portions. Said radio frequency device is different in that the antenna and at least one capacitor plate are formed with wire portions placed on a substrate in a guided manner.
Abstract: The invention relates to a device (CD) comprising a capacitive key-board (KB) constituted of a plurality of keys (KY), each key comprising an active electrode (AEL) and an active ground plane (AGP), a microcontroller (MC) connected to said keyboard (KB) through active electrode (AEL) and active ground plane (AGP). Said microcontroller (MC) is adapted for managing said keyboard (KB) in a reverse manner for emulating a sequence of tactile contacts on a capacitive screen.
Type:
Application
Filed:
December 12, 2013
Publication date:
January 28, 2016
Applicant:
GEMALTO SA
Inventors:
François-Xavier MARSEILLE, Michel THILL
Abstract: The invention relates to an identification document (21) comprising a non-transparent core (6), and one or more layers of a transparent material (14) arranged on at least a back (13) or a front surface (12) of said core. In order to achieve an identification document where forgery attempts are visibly detectable, the identification document (21) has a translucent security element in a region (7) where the thickness of the non-transparent core (6) material is smaller as compared to the thickness of the non-transparent core material in other parts of said core (6).
Abstract: The invention is a method for negotiating a parameter of an optical communication protocol between two devices. One device displays a first calibration image comprising a series of pixel patterns having a predetermined position and different sizes. The other device takes a first calibration picture of the first calibration image, identifies a set comprising at least one detectable pixel pattern in the first calibration picture and selects a setting data based on the set. Then it displays a second calibration image comprising this setting data which is read by the first device via another calibration picture. The first device retrieves the setting data from the calibration picture, selects a value based on the setting data and updates the parameter with the selected value.
Type:
Application
Filed:
March 3, 2014
Publication date:
January 7, 2016
Applicant:
GEMALTO SA
Inventors:
Ali ZEAMARI, Jacques DUBROIS, Abdellah EL MAROUANI
Abstract: A method designed to allow the printing of a matrix (MPC) of pixels, in N colours defining a colour coding system, on a selected part of a physical medium (MP). That method comprises a stage in which colour pixels are printed in at least one pass along oblique lines in relation to the physical medium (MP), wherein the pixels of an oblique line are all in the same colour selected from the N colours and different from that used for the previous oblique line, in order to generate a matrix (MPC) of M horizontal lines comprising P pixels each in the N colours successively in a selected order, and wherein each horizontal line other than the first one comprises a first pixel that is identical to the second pixel of the previous horizontal line.
Abstract: A method for sharing applications (APPI, APP2, APPx; APP4) being stored in a source mobile communication device (MOx; MOI) with a destination mobile communication device (MO1; MOx) comprises: transmitting a sharing request (SR) from the source mobile communication device (MOx; MO1) to a Trusted Service Manager (TSM) with information about the application and the destination mobile communication device (MO1; MOx); at the Trusted Service Manager (TSM), retrieving the Service Provider (SP1, SP2, SPx) that has provided said application and sending a query (QU) to it; at the Service Provider (SP1, SP2, SPx), sending an installation request (INST) to the Trusted Service Manager (TSM) with an adapted version (APPx?) of the application and update instructions (UPD) for the source mobile communication device (MOx; MO1); at the Trusted Service Manager (TSM), getting the adapted application (APPx?) installed in the destination mobile communication device (MO1; MOx) and updating the source mobile communication device (MO
Type:
Grant
Filed:
November 5, 2008
Date of Patent:
December 8, 2015
Assignee:
GEMALTO SA
Inventors:
Alexandre Corda, Jonathan Azoulai, Vincent Lemonnier
Abstract: A smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The smart portable object also relates to implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via the interactive display.
Abstract: Method and System for enhanced privacy in privacy-preserving identity solutions. The technology provides for a redirect of a request to generate a proof of an attribute from a service provider to a separator. The separator removes source identification from the attribute-proof request and redirects the attribute-proof request, free of original source identification, to a credential issuer which issues the credential. A security device of the user generates a presentation token from the privacy-preserving credential and presents the presentation token to the service provider as proof of the attribute. Other systems and methods are disclosed.
Type:
Application
Filed:
December 20, 2013
Publication date:
November 26, 2015
Applicant:
GEMALTO SA
Inventors:
HongQian Karen LU, Laurent CASTILLO, Philippe SMADJA