Abstract: A security document having a first side (11) and a second side (12), the security document comprising a first pattern (31) and a second pattern (32) located closer to the second side (12) than the first pattern (31), the first pattern (31) and the second pattern (32) overlapping such that the overlapping area defines a shape of a security pattern (40).The first pattern (31) comprises first single fluorescent substance adapted to emit first visible light (61), and the second pattern (32) comprises second single fluorescent substance adapted to emit second visible light (62).When the security pattern (40) is irradiated from the direction of the first side (11) the first visible light (61) dominates the second visible light (62) at the first excitation radiation (51) and the second visible light (62) dominates the first visible light (61) at the second excitation radiation (52).
Abstract: The invention relates to a SIM (2) card in a first format, with an electronic module (4). The card body comprises a score line (6) surrounding the electronic module (4) in order to define the second card format (3). The said score line (6), comprises residual matter thickness that is smaller than the thickness of the card body. The thickness of the residual matter comprises a first thickness (9) over a first part of the score line (6), at least one second thickness (10) smaller than the first thickness (9) over a second part of the score line and at least one residual thickness change zone (11, 17), where the said thickness change zone is a gradual thickness change zone (11, 17) that goes from the first thickness to the second thickness.
Type:
Application
Filed:
October 29, 2012
Publication date:
October 16, 2014
Applicant:
GEMALTO SA
Inventors:
Alexis Froger, Jeremy Renouard, Georges Cogno
Abstract: The invention relates to a personal token running a series of applications, wherein said personal token includes a thread controller which transmits data from the applications to an external device in a cyclic way, a cycle being constituted of a series of data transfers from the applications and to the external device, a cycle comprising a respective number of data transfers dedicated to each respective application which is different according to the respective application, the number of data transfers for a respective application in a cycle corresponding to a priority level of the application as taken into account by the thread controller.
Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.
Abstract: Two service signals are transmitted from a service server through a first network in such a way that users' terminal devices display personalized service data items. When service signals are filtered, a terminal device extracts common data items accessible for several terminal devices and a parameter type from a service signal identified by a stored identifier. An end address is determined by applying a stored parameter, related to the parameter type, to a pre-recorded or transmitted algorithm. The end address is transmitted, through a second network, to a server which transmits a first personalized file associated with the end address and bearing personalized data items displayed with the common data items in the device.
Abstract: The present invention consists to a method of manufacturing a data carrier (1), comprising a data carrier body (3) and a module (5) fixed above a cavity in said data carrier body (3), said method comprising the following steps:—a first step (101) of providing a module (5),—a second step (102) of applying a preformed first layer (31) on the dielectric substrate (53) of said module (5), said first layer (31) having a hole (33) to receive the electronic chip (55), its wires (57) and the dielectric resin protection (59),—a third step (103) of applying a second layer (35) on the first layer (31), recovering the hole (33) of the first layer (35),—a fourth step (104) of laminating of the module (5), the first and second layers (31, 35),—a fifth step (105) of cutting or pre-cutting at the data carrier format.
Abstract: In order to broadcast a commercial content corresponding to the centers of interest of a user of a communicating object, the disclosed method involves generating a message including at least one piece of commercial content associated with at least one piece of meta-information characterising the subject concerned by the commercial content. The method is implemented by the object for extracting a piece of commercial content from the message only if the piece of meta-information of the content corresponds to a piece of meta-information characterising a center of interest of the user.
Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
Type:
Grant
Filed:
April 22, 2013
Date of Patent:
September 30, 2014
Assignee:
Gemalto SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli
Abstract: The invention relates to a method for securing the execution of an onboard NFC application in a secure element which does not include a native OTA application. The secure element interacts with a mobile terminal including a removable card. According to the invention, the method includes recording an identifier of the removable card in the secure element no later than when the NFC application is loaded onto the secure element. When an event occurs, a verification is made, in the secure element, whether or not the identifier of the removable card present in the mobile terminal corresponds to the identifier previously stored in the secure element, in order to detect a possible change of the removable card.
Type:
Grant
Filed:
September 29, 2010
Date of Patent:
September 16, 2014
Assignee:
Gemalto SA
Inventors:
Patrice Amiel, Stephane Poujol, Michel Martin, Gil Bernabeu
Abstract: The invention is a secure element comprising a virtual machine able to work in admin mode and in runtime mode. The secure element comprises two enhanced containers. Each of said enhanced containers can be either in an activated state or in a disabled state. Only one of the enhanced containers can be in activated state at any given time. The virtual machine is adapted to access each of the enhanced containers when working in admin mode. The virtual machine cannot access an enhanced container which is in disabled state when working in runtime mode.
Type:
Application
Filed:
September 18, 2012
Publication date:
September 4, 2014
Applicant:
Gemalto SA
Inventors:
Xavier Berard, Nicolas Roussel, Richard Pico, Frédéric Faure, Benoît Gonzalvo
Abstract: The present invention relates to a method for operating a RF communication device, a RF communication device (400), a method for operating an authentication server of a network entity and to corresponding computer programs. All aspects of the present invention take into account that a continuous operation of a RF communication device, in particular of a metering application, needs to be ensured, even if the function of a component SIM or initial SIM (410) has to be replaced or supplemented by an external new SIM (420). It is suggested to ascertain the validity of the external SIM by using information stored in the component/initial SIM. The validity of the external SIM can be ascertaining either solely on the side of the RF communication device or by sending a corresponding validity check request signal to a remote network entity.
Abstract: The invention is a method of managing an application embedded in a secured electronic token. The token is intended to receive a message from a server machine. The message has a header and a body. The token comprises an agent able to manage the message. The method comprises the steps of: a) registering the application in the agent by associating a reference of the application with a value of an element of the message header, b) when the message is received from the server machine, forwarding part of the message to the application if the message header contains an element having the value associated to the reference of the application.
Abstract: The invention relates to a system enabling the contactless transfer of personal data from a mobile terminal including a first antenna coupled to a first chip cooperating with a first memory to a second memory cooperating with a second chip, with said second chip being coupled to a second antenna. According to the invention, the second memory is included in a passive radiofrequency transponder supplied by the electromagnetic field emitted by said first antenna during said transfer of personal data.
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Application
Filed:
May 12, 2014
Publication date:
August 28, 2014
Applicant:
GEMALTO SA
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the invention, a terminal, such as a mobile device, which is associated with a portable communicating object, such as a multimedia smart card, includes an agent for facilitating access from a server to a mass storage unit capable of storing multimedia data and a security storage unit in the portable communicating object via a communication network. The agent establishes a single communication channel between the remote server and the terminal and processes data transmitted from one of the two elements including the server and one of the storage units of the portable communicating object to the agent so that the agent can transmit the data to the other of the two elements.
Type:
Grant
Filed:
February 2, 2007
Date of Patent:
August 26, 2014
Assignee:
Gemalto SA
Inventors:
Frëdëric Martinent, Anthony Bord, Franck Mosse
Abstract: The invention relates to a personal token for a mobile telecommunication network, hosting application software. The personal token is operable to receive an over-the-air SMS message encapsulating commands directed to the application, open the SMS and extract the commands from the SMS. The steps of opening the SMS and extracting the commands from the SMS are performed by a software entity in the personal token which is distinct from the application, so that the software entity initiates transmission of the extracted commands to the application.
Type:
Grant
Filed:
February 22, 2008
Date of Patent:
August 26, 2014
Assignee:
Gemalto SA
Inventors:
François Millet, Sylvain Chafer, Jan Nemec
Abstract: The invention relates to a token for communicating with a host device. The token includes an interface for communicating through at least one USB communication channel. The token is adapted to receive, through at least one USB communication channel, a command for requesting the token to specify at least one capability of the token, and send, through at least one USB communication channel, as a reply to the received command, a response for specifying that the token supports a USB device class for HID. The invention also relates to corresponding communication system and method.
Abstract: The present invention describes a method and a software module making it possible to secure communications with a sensitive application, for which exchanges with the outside have been delegated to a so-called interfacing application. Accordingly, the present invention describes the application of security rules to all or some of the commands destined for this sensitive application.
Abstract: The invention relates to a method for selecting a mobile telephony operator so as to allow a subscriber, having a main subscription, to enter into a roaming situation, wherein said subscriber is using a mobile terminal. According to the invention, the method involves: i) suggesting the name of at least one alternative operator network, capable of providing roaming service, to the subscriber having a main subscription, said suggestion being accompanied by an indication of the roaming rate charged by said alternative operator network; and ii) after the user selects an alternative operator network, sending an IMSI to the mobile terminal, which enables said user to be connected to the alternative operator network so as to benefit from the roaming rate thereof.
Abstract: A two-way communication device has a master transmitter (SysM1, TRM1, SysM2, TRM2) connected to at least one slave transmitter (SysS1, TRS1, SysS2, TRS2) by an active connection wire. The master transmitter and the slave transmitter have a common reference (GND). The master transmitter can transmit a master signal (S1) to the slave transmitter and the slave transmitter can transmit a slave signal (S2) to the master transmitter. The master signal (S1) is a digital modulation in voltage. The slave signal (S2) is a digital modulation in current.