Abstract: The present invention relates to a countermeasure method against side channel analysis for cryptographic algorithm using Boolean operations and arithmetic operation. To protect a cryptographic algorithm combining Boolean and arithmetic instructions against first order side channel analysis, it is necessary to perform conversions between Boolean masking and arithmetic masking. The present invention proposes a new conversion method from arithmetic masking to Boolean masking, using only one precomputed table T. Said table T being configured so that to convert from arithmetic to Boolean masking k-bit nibble by k-bit nibble for integers having a size greater than k bits while adding a masked carry from the modular addition to the nibble.
Abstract: The invention is a method of programming a device comprising a USB® connector and a USB® chip. The USB® connector comprises first and second sets of connection pins. The USB® chip comprises a USB® interface and a programming interface. The method comprises a step of activating a selecting pin of said first set for selecting the programming interface and a step of sending programming data to the USB® chip through said second set and through the programming interface.
Abstract: A system for communicating via contact-less chip with an external contact-less communicating device comprises a removable chip card, a contact-less communicating chip and a terminal. The contact-less chip is carried by a flexible medium. A chip of the card is coupled, via a card connector, to the contact-less communicating chip, and a microprocessor of the terminal. The card chip is configured to act as an intermediary entity between the contact-less communicating chip and the terminal microprocessor. A card chip microprocessor exchanges data with the contact-less chip by using a first data communication protocol. The card chip microprocessor exchanges data with the terminal microprocessor by using a second data communication protocol. The terminal microprocessor is configured to send, through the card chip, to the contact-less communicating chip, data that is previously encapsulated within first communication protocol data that is itself encapsulated within second communication protocol data.
Abstract: The invention concerns a method for automatically switching from a Home IMSI to a Roaming IMSI and vice versa, said Home IMSI and Roaming IMSI being contained in a SIM card adapted to be used in a mobile station and adapted to comprise elementary files, wherein it comprises the step of triggering the switch from one IMSI to another when detecting an update of the elementary file comprising forbidden public land mobile networks (EFFPIMN).
Abstract: A remote server is connected to at least one energy box, each energy box being connected to at least one energy consuming device, and each energy box being connected to a metering device. The remote server sends to the energy box a transaction demand. The energy box sends to at least one energy consuming device an energy consumption reduction request. The metering device measures energy consumption of the energy consuming device. The metering device sends to the energy box the measured energy consumption. The energy box verifies whether the demanded transaction has been carried out based upon at least one test, the test depending on at least one measured energy consumption. If the demanded transaction has been carried out, the energy box sends to a remote server a transaction response.
Abstract: A two-way communication device has a master transmitter connected to at least one slave transmitter by an active connection wire. The master transmitter and the slave transmitter have a common reference. The master transmitter can transmit a master signal to the slave transmitter and the slave transmitter can transmit a slave signal to the master transmitter. The master signal is a digital modulation in voltage. The slave signal is a digital modulation in current.
Abstract: (EN) The invention relates to an authentication device (TK) set to identify itself to a computer (PC) as a native human interface device. It also relates to a system comprising an authentication device (TK) and a computer (PC), as well as to a method to have a computer (PC) recognize an authentication device (TK).
Abstract: A secured identification document has at least two flexible layers embedding an electronic module. The electronic module includes a flexible substrate on which are positioned an antenna and a radiofrequency microcontroller storing identification data. The radiofrequency microcontroller is electrically connected to said antenna. The secured identification document has the at least two flexible layers locally joined together by means of a chemically and mechanically tamper proof material that is applied in cavities that are distributed in each of said at least two flexible layers that surround the electronic module in order to make the electronic module interdependent with the at least two flexible layers.
Abstract: The invention relates to a portable security device (SIM) for authenticating a user (USR) of a communication device (MP1, MP2) to a server (SRV), the portable security device (SIM) comprising means for configuring said communication device (MP1, MP2). The portable security device (SIM) further comprises means for filtering the configuration of a first communication device (MP1), creating a backup of the filtered configuration of the communication device (MP1), detecting that the user (USR) changed a first communication device (MP1) for a second communication device (MP2), filtering the backup of the filtered configuration, and restoring the filtered backup of the filtered configuration of the first communication device (MP1) on the second communication device (MP2).
Abstract: In a call redirection method, an application of a second telecommunications terminal requests one of the active numbers in the security element of a first terminal. The application transmits a request for an active telephone number in the security element to its operator, and the latter retransmits it to a manager of the security element having knowledge of the active subscription in the security element. At least one subscription is inactive and at least one subscription is active. Each subscription has a corresponding call number. A call number is called an active call number if the corresponding subscription is active, and a call number is called an inactive call number if the corresponding subscription is inactive. The method includes composing the telephone number corresponding to one of the active subscriptions or prompting the user of the second terminal to validate the call to one of these active numbers.
Abstract: The present invention relates to a method for processing a plurality of radiofrequency communication streams by way of an integrated circuit card, the streams originating from at least two terminals, and the card being connected to a device equipped with a radiofrequency communication interface which is suitable for the connection of a plurality of host terminals. The method includes monitoring the reception and/or transmission at and/or to the card of a first and second stream of data originating respectively from a first and second host terminal. The monitoring step includes a step of checking the availability of the card before the second stream of data is transmitted to the card. The invention also relates to the corresponding monitoring system and device.
Type:
Grant
Filed:
June 7, 2011
Date of Patent:
February 24, 2015
Assignee:
Gemalto SA
Inventors:
François-Xavier Marseille, Michel Thill
Abstract: The invention relates to a security token comprising a communication interface adapted to communicate with a host computer; a security module, comprising encryption based security features; and a non volatile memory storing at least an application to be uploaded and executed in a host computer. The application makes use of the security features when executed in a host computer in communication with the communication interface. The security token is adapted to modify the content of the application as uploaded or its execution parameters at successive connections of the security token to a host computer.
Type:
Grant
Filed:
May 10, 2011
Date of Patent:
February 24, 2015
Assignee:
Gemalto SA
Inventors:
Jacques Fournier, Pierre Girard, Philippe Proust
Abstract: The invention relates to a smartcard (10) comprising: —a microcontroller (30); —a contact communication interface (11); —a supply line (Vcc) connecting the contact communication interface to the microcontroller, a clock line (Clk) connecting the contact communication interface to the microcontroller. The smartcard further comprises a power management circuit (20) including a switch (23) adapted to selectively open or close the supply line connection between the contact communication interface and the microcontroller, the power management circuit being adapted to detect the loss of a clock signal on the clock line (Clk), adapted to keep said switch closed during a predetermined period after a loss of clock signal is detected and adapted to open said switch after said predetermined period.
Type:
Grant
Filed:
November 29, 2011
Date of Patent:
February 17, 2015
Assignee:
Gemalto SA
Inventors:
Michel Thill, François-Xavier Marseille
Abstract: Secure password-based authentication for cloud service computing. A request for cloud computing resource access includes a derivative password that contains a parameter that the recipient may extract in order to independently calculate the derivative password based on the parameter and a stored password which may then be verified against a known-to-be-correct password. Other systems and methods are disclosed.
Abstract: The invention relates to a method of operating a module 100 or the like wireless communication terminal for wireless communication, wherein in operation the module 100 is in signaling relation to a device 3 of an integrated circuit card, wherein the operation is adapted for signaling between the module 100 and the integrated circuit card device 3 (ICC-device) via an interface system 10, the interface system 10 comprising at least one command interface instance 10.0, 10.1, 10.2, 10.3 adapted for direct command signaling between the module 100 and at least one application 1, 2, and a card application toolkit 80 (CAT) for direct command signaling between the module 100 and the integrated circuit card device 3 (ICC-device).
Abstract: The invention relates to a method for loading a list of preferred networks into a secure element contained in a mobile terminal. The loading is accomplished when the secure element detects that it is in a roaming condition within a telecommunication network. The method consists of: i) asking (12) for an IP channel to be opened between the telecommunication network and the secure element, the request for opening originating with the secure element; ii) requesting (13) the loading of the list of preferred networks; iii) uploading (14) via the IP channel the list of preferred networks into the secure element; and iv) transmitting (16) a request by the secure element to the mobile terminal to use one of said preferred networks in said list.
Abstract: This invention relates to a method used by an authorised user for the verification of a document having electronic verification means, The method comprises the various steps consisting in:—reading, with electronic reading equipment with which the authorised user is equipped, of information stored in the electronic verification means of the verified document;—transferring verification information, established on the basis of the information saved in the electronic verification means, from the electronic reading equipment to a viewing device of the authorised user, which viewing device is positioned, in normal conditions of use, in front of the eyes of the authorised user, the said viewing device being transparent to allow the said authorised user to see through it.
Type:
Application
Filed:
March 1, 2013
Publication date:
February 5, 2015
Applicant:
GEMALTO SA
Inventors:
Bruno Rouchouze, Mourad Faher, Francois Perticara, Guennole Tripotin
Abstract: The invention proposes a method for exporting data of a Javacard application stored in a UICC to a host, the method consisting in: transmitting a transfer order to the application through a Javacard API; formatting the data in a pack, wherein the formatting is realized by the application; exporting the pack to the host.
Type:
Application
Filed:
December 5, 2011
Publication date:
February 5, 2015
Applicant:
Gemalto SA
Inventors:
Fabrice Vergnes, Franck Imoucha, Nicolas Roussel
Abstract: A method for installing a NFC application (APP) that includes a picture (PIC) in a mobile communication device (3) comprises: at a Service Provider (1) transmitting the NFC application (APP) together with the picture (PIC) to a Trusted Service Manager (2); at the Trusted Service Manager (2), separating the picture (PIC) from the NFC application (APP) and storing it and transmitting the NFC application (APP) together with a reference (REF) to a storage location of the picture (PIC) to the mobile communication device (3); at the mobile communication device (3), installing the NFC application (APP) together with the reference (REF) and retrieving the picture (PIC) by sending the reference (REF) to the Trusted Service Manager (2) requesting download of the picture (PIC); at the Trusted Service Manager (2), fetching the picture (PIC) from the storage location indicated by the reference (REF) and downloading it to the mobile communication device (3).
Type:
Grant
Filed:
January 12, 2009
Date of Patent:
January 27, 2015
Assignee:
Gemalto SA
Inventors:
Vincent Lemonnier, Alexandre Corda, Jonathan Azoulai
Abstract: The embodiments of this invention relate to a smart card (1) comprising the following:—an integrated circuit chip (10),—a primary card body (3) with a first form factor, comprising a slot (5) on the front (7) designed to accommodate the integrated circuit chip (10), wherein the said primary card body (3) also comprises a detachable contour (c1), peripheral to the slot (5), which represents another form factor and defines a secondary card body (11), characterised in that the primary card body (3) has a first thickness (el), between the front (7) and a back (8), and in that the secondary card body (11) has a second thickness (e2), between a front (7, 12) and a back (14), which is smaller than the first thickness (el).
Type:
Application
Filed:
December 24, 2012
Publication date:
January 1, 2015
Applicant:
GEMALTO SA
Inventors:
Stephane Ottobon, Laurent Oddou, Alexis Froger, Jeremy Renouard