Patents Assigned to GEMALTO
  • Publication number: 20130299595
    Abstract: A device having an integrated-circuit chip includes an insulating body containing at least one conductive pad, at least one electrical contact opposite the electrically conductive pad, and at least one recess in the body, including a bottom and one aperture. The recess is connected, at the bottom thereof, to the conductive pad and, at the aperture thereof, to the electrical contact. At least one coil spring is arranged in the recess and connecting the conductive pad to the electrical contact. The installation of the spring in the recess is facilitated by means of the friction of the central portion of the spring relative to the walls of the recess. The invention also relates to a method for producing an electrical connection between at least one conductive pad arranged in an insulating body and at least one electrical contact arranged opposite the electrically conductive pad.
    Type: Application
    Filed: November 3, 2011
    Publication date: November 14, 2013
    Applicant: GEMALTO SA
    Inventors: Antoine Bajolle, Frédérick Seban, Joseph Leibenguth, François Roussel, Jean-Christophe Fidalgo
  • Publication number: 20130301828
    Abstract: The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (skc,pkc), said remote server generating an ephemeral key (sks,pks), the method comprising a mutual authentication step wherein the client (C) sends a public key (pkc) of said long-term key pair (skc, pkc) and the proof that said public key (pkc) is valid to the server (S), and wherein the remote server (S) sends the public key (pks) of said ephemeral key pair (sks,pks) to the client (C). The client (C) generates an ephemeral key pair (skCc,pkCc) and sends the public key (pKcc) of said ephemeral key pair (skcc,pkcc) to the server (S) so as to generate a secret common to the client (C) and to the remote server (S) for opening the secure communication channel.
    Type: Application
    Filed: September 6, 2011
    Publication date: November 14, 2013
    Applicant: GEMALTO SA
    Inventors: Aline Gouget, Mourad Faher
  • Patent number: 8584223
    Abstract: The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an index list. The method comprises the step of inserting a request to a control message in the index list. The control message applies to a data reachable through one URI belonging to the index list.
    Type: Grant
    Filed: August 18, 2010
    Date of Patent: November 12, 2013
    Assignee: Gemalto SA
    Inventors: Louis Gregoire, Alexis Pottier
  • Patent number: 8582774
    Abstract: An aim of this invention is to eliminate the risks of aggression “DPA of the n order” attacks, for all n values, of cryptography electronic assemblies or systems with a secret or private key. The process according to this invention concerns a securing process for an electronic system using a cryptographic calculation procedure using a secret key. The process consists of masking intermediate results in input or output of at least one critical function for the said procedure.
    Type: Grant
    Filed: March 4, 2003
    Date of Patent: November 12, 2013
    Assignee: Gemalto SA
    Inventors: Louis Goubin, Mehdi-Laurent Akkar
  • Patent number: 8583081
    Abstract: The invention relates to a method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element. The first identifier is a temporary identifier and the second identifier is a final identifier of the secure element in a telecommunications network. According to the invention, the method comprises the steps of: a—during the first attempt to connect the mobile terminal to the telecommunications network, calculating the first identifier according to the second identifier; b—transmitting the first identifier to the telecommunications network; c—in response to a message of acceptance of the first identifier from the telecommunications network, inhibiting the use of the first identifier by the secure element and, for every subsequent attempt to connect to the telecommunications network, using the second identifier to authenticate the secure element.
    Type: Grant
    Filed: June 4, 2010
    Date of Patent: November 12, 2013
    Assignee: Gemalto SA
    Inventors: Radouane Ait Aissa, Jean-François Gros
  • Patent number: 8583934
    Abstract: A method for preventing secret code manipulation in a data processing device, such as a smart card, to which a presented code is applied. Prior to implementation of a code transforming function in the processing device, the secret code is transformed into a transformed secret code in the card. For each use of the card, the presented code is transformed into a transformed presented code in accordance with the implemented transformation function. A comparison of the transformed secret code with the transformed secret code in the card is then performed.
    Type: Grant
    Filed: June 20, 2001
    Date of Patent: November 12, 2013
    Assignee: Gemalto SA
    Inventors: Christophe Bidan, David Naccache, Pierre Girard, Pascal Guterman, Ludovic Rousseau
  • Patent number: 8578452
    Abstract: The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.
    Type: Grant
    Filed: April 27, 2011
    Date of Patent: November 5, 2013
    Assignee: Gemalto SA
    Inventor: HongQian Karen Lu
  • Publication number: 20130290479
    Abstract: A method for connecting to a remote server from a browser enabled with a browser's extension on a host device, wherein upon connection of a data processing device with a data processing device reader linked to the host device, the browser's extension receives data contained in a targeted file stored in said data processing device, said data being able to be interpreted by the browser so as to trigger a connection to the remote server and to display a subscribed service portal, said data being sent by the data processing device upon execution of a command transmitted by the browser's extension.
    Type: Application
    Filed: May 26, 2011
    Publication date: October 31, 2013
    Applicant: GEMALTO SA
    Inventors: Mourad Faher, Jacques Seif SEIF
  • Publication number: 20130291084
    Abstract: The invention relates to a method for communicating information. A first device is coupled to a secure element. The secure element sends, at an initiative of the secure element, to the first device a secure element identifier. The first device sends to a second device at least one first message comprising the secure element identifier. The second device sends to a third device at least one second message comprising the secure element identifier and two communication network subscription identifiers, as associated data, the second device adding the two communication network subscription identifiers. The third device stores the associated data. The invention also relates to a corresponding system.
    Type: Application
    Filed: November 24, 2011
    Publication date: October 31, 2013
    Applicant: GEMALTO SA
    Inventors: Patrice Amiel, Xavier Berard, Grégory Valles
  • Publication number: 20130290273
    Abstract: The invention relates to method for updating data of an encoded file from a remote server, said encoded file being stored in a secure device, characterized in that it comprises step a): sending a message to said secure device, step b): decoding the encoded file to update, step c): locating a target data and performing an operation upon said target data, said message comprising configuration data and data block.
    Type: Application
    Filed: December 6, 2011
    Publication date: October 31, 2013
    Applicant: GEMALTO SA
    Inventor: Jose Luis Gayosso Sanchez
  • Publication number: 20130287211
    Abstract: A system for accessing a service comprises two contact-less readers and one portable device. A first contact-less reader is configured to send to the portable device, through a first range radiofrequency link, a first message comprising first data. The first data includes an identifier allocated to the portable device and an associated key for encrypting data. The portable device is configured to send to a second contact-less reader, through a second range radiofrequency link, a second message comprising second data. The second data includes the identifier received from the first message. The second data is encrypted by using the data encryption key received from the first message. The second range radio frequency is higher than the first range radio frequency.
    Type: Application
    Filed: October 27, 2011
    Publication date: October 31, 2013
    Applicant: GEMALTO SA
    Inventor: Alain Rhelimi
  • Patent number: 8571596
    Abstract: The invention is a method of power negotiation between a first contactless device and a second contactless device which provides an electromagnetic field set to a first power level. The method comprises the steps of: a) sending a request from the first device to the second device. The request targets a second power level and an associated duration. The next step is: b) sending a response to the first device. The response reflects a decision of the second device corresponding to the request. The final step is: c) switching the electromagnetic field to the second power level if the decision is positive.
    Type: Grant
    Filed: November 16, 2010
    Date of Patent: October 29, 2013
    Assignee: Gemalto SA
    Inventor: Jean-Paul Caruana
  • Patent number: 8568864
    Abstract: A data carrier is provided having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of its sides (S1, S2) under special lighting conditions, and a method for making such a data carrier. The see-through portion has an improved security, which is more difficult to reproduce by infringers.
    Type: Grant
    Filed: December 5, 2007
    Date of Patent: October 29, 2013
    Assignee: Gemalto Oy
    Inventors: Taru Syrjänen, Teemu Pohjola
  • Publication number: 20130283047
    Abstract: System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile.
    Type: Application
    Filed: August 4, 2011
    Publication date: October 24, 2013
    Applicant: GEMALTO SA
    Inventors: Lionel Merrien, Serge Barbe
  • Publication number: 20130273846
    Abstract: The invention relates to a communication system comprising a terminal (10), a first device (1) adapted to exchange data with said terminal (10), a second device (2) adapted to exchange data with said terminal (10), characterized in that it comprises means for pairing said first (1) and second (2) devices so as said second device (2) exchanges data with said terminal (10) through said first device (1).
    Type: Application
    Filed: December 6, 2011
    Publication date: October 17, 2013
    Applicant: Gemalto SA
    Inventor: Alain Rhelimi
  • Publication number: 20130275748
    Abstract: Secure password-based authentication for cloud service computing. A request for cloud computing resource access includes a derivative password that contains a parameter that the recipient may extract in order to independently calculate the derivative password based on the parameter and a stored password which may then be verified against a known-to-be-correct password. Other systems and methods are disclosed.
    Type: Application
    Filed: April 17, 2012
    Publication date: October 17, 2013
    Applicant: GEMALTO SA
    Inventor: HongQian Karen LU
  • Publication number: 20130273999
    Abstract: The invention relates in particular to a method for saving the state of a session of a game played by at least two players, the game including game elements having chips that are capable of contactless communication with a terminal via an interface. The terminal includes a screen, the game consisting of presenting game elements to the interface, each player being identified by the terminal by a game element referred to as the master element. According to the invention, the saving method involves: recording the history of the game session, recording the game elements which have not been in play, if applicable, and recording the game elements in the possession of the players at the time that the game was interrupted, by means of master elements, so as to be able subsequently to resume the game session in the same state in which the game was when interrupted.
    Type: Application
    Filed: October 14, 2011
    Publication date: October 17, 2013
    Applicant: GEMALTO SA
    Inventors: Fabien Seheux, Jean-François Martinent
  • Patent number: 8555496
    Abstract: The invention relates to a method for manufacturing a USB electronic key, whereby a chip is cut out of a tape, provided with a plurality of chips, each chip defining contact pads in USB format and supporting an electronic component, connected to the pads. The thickness adjustment step is directly carried out on the chip to give a thickness conforming to the USB standard, at least in the area of the contact pads.
    Type: Grant
    Filed: October 4, 2004
    Date of Patent: October 15, 2013
    Assignee: Gemalto SA
    Inventors: Francois Moutel, Joel Barrier, Thierry Karlisch, Pierre-Andre Collet
  • Patent number: 8560852
    Abstract: A secure portable electronic device for providing secure services when used in conjunction with a host computer having a central processing unit use two hardware device protocols readily supported by computer operating systems. Other systems and methods are disclosed.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: October 15, 2013
    Assignee: Gemalto SA
    Inventors: Lu Karen HongQian, Stephane Durand, Laurent Castillo, Asad Ali, Ed Dolph
  • Patent number: 8556298
    Abstract: The invention relates to a personalisable support comprising anti-forgery devices which are provided in order to indicate every attempt of fraudulent personalization. The support comprises a body (2) which is on one side equipped with personalization data (6,7) which are obtained by carbonization of the base material by means of a laser beam. The anti-forgery devices (8), which totally or partly cover these personalization data, draw a pattern (90, 80) along which bubbles (9) are created whose density (d1-d5) varies depending on the degree of carbonization of the areas (61-65) which are covered by the pattern.
    Type: Grant
    Filed: April 14, 2009
    Date of Patent: October 15, 2013
    Assignee: Gemalto SA
    Inventor: Jean-Luc Lesur