Abstract: A device having an integrated-circuit chip includes an insulating body containing at least one conductive pad, at least one electrical contact opposite the electrically conductive pad, and at least one recess in the body, including a bottom and one aperture. The recess is connected, at the bottom thereof, to the conductive pad and, at the aperture thereof, to the electrical contact. At least one coil spring is arranged in the recess and connecting the conductive pad to the electrical contact. The installation of the spring in the recess is facilitated by means of the friction of the central portion of the spring relative to the walls of the recess. The invention also relates to a method for producing an electrical connection between at least one conductive pad arranged in an insulating body and at least one electrical contact arranged opposite the electrically conductive pad.
Type:
Application
Filed:
November 3, 2011
Publication date:
November 14, 2013
Applicant:
GEMALTO SA
Inventors:
Antoine Bajolle, Frédérick Seban, Joseph Leibenguth, François Roussel, Jean-Christophe Fidalgo
Abstract: The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (skc,pkc), said remote server generating an ephemeral key (sks,pks), the method comprising a mutual authentication step wherein the client (C) sends a public key (pkc) of said long-term key pair (skc, pkc) and the proof that said public key (pkc) is valid to the server (S), and wherein the remote server (S) sends the public key (pks) of said ephemeral key pair (sks,pks) to the client (C). The client (C) generates an ephemeral key pair (skCc,pkCc) and sends the public key (pKcc) of said ephemeral key pair (skcc,pkcc) to the server (S) so as to generate a secret common to the client (C) and to the remote server (S) for opening the secure communication channel.
Abstract: The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an index list. The method comprises the step of inserting a request to a control message in the index list. The control message applies to a data reachable through one URI belonging to the index list.
Abstract: An aim of this invention is to eliminate the risks of aggression “DPA of the n order” attacks, for all n values, of cryptography electronic assemblies or systems with a secret or private key. The process according to this invention concerns a securing process for an electronic system using a cryptographic calculation procedure using a secret key. The process consists of masking intermediate results in input or output of at least one critical function for the said procedure.
Abstract: The invention relates to a method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element. The first identifier is a temporary identifier and the second identifier is a final identifier of the secure element in a telecommunications network. According to the invention, the method comprises the steps of: a—during the first attempt to connect the mobile terminal to the telecommunications network, calculating the first identifier according to the second identifier; b—transmitting the first identifier to the telecommunications network; c—in response to a message of acceptance of the first identifier from the telecommunications network, inhibiting the use of the first identifier by the secure element and, for every subsequent attempt to connect to the telecommunications network, using the second identifier to authenticate the secure element.
Abstract: A method for preventing secret code manipulation in a data processing device, such as a smart card, to which a presented code is applied. Prior to implementation of a code transforming function in the processing device, the secret code is transformed into a transformed secret code in the card. For each use of the card, the presented code is transformed into a transformed presented code in accordance with the implemented transformation function. A comparison of the transformed secret code with the transformed secret code in the card is then performed.
Type:
Grant
Filed:
June 20, 2001
Date of Patent:
November 12, 2013
Assignee:
Gemalto SA
Inventors:
Christophe Bidan, David Naccache, Pierre Girard, Pascal Guterman, Ludovic Rousseau
Abstract: The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.
Abstract: A method for connecting to a remote server from a browser enabled with a browser's extension on a host device, wherein upon connection of a data processing device with a data processing device reader linked to the host device, the browser's extension receives data contained in a targeted file stored in said data processing device, said data being able to be interpreted by the browser so as to trigger a connection to the remote server and to display a subscribed service portal, said data being sent by the data processing device upon execution of a command transmitted by the browser's extension.
Abstract: The invention relates to a method for communicating information. A first device is coupled to a secure element. The secure element sends, at an initiative of the secure element, to the first device a secure element identifier. The first device sends to a second device at least one first message comprising the secure element identifier. The second device sends to a third device at least one second message comprising the secure element identifier and two communication network subscription identifiers, as associated data, the second device adding the two communication network subscription identifiers. The third device stores the associated data. The invention also relates to a corresponding system.
Abstract: The invention relates to method for updating data of an encoded file from a remote server, said encoded file being stored in a secure device, characterized in that it comprises step a): sending a message to said secure device, step b): decoding the encoded file to update, step c): locating a target data and performing an operation upon said target data, said message comprising configuration data and data block.
Abstract: A system for accessing a service comprises two contact-less readers and one portable device. A first contact-less reader is configured to send to the portable device, through a first range radiofrequency link, a first message comprising first data. The first data includes an identifier allocated to the portable device and an associated key for encrypting data. The portable device is configured to send to a second contact-less reader, through a second range radiofrequency link, a second message comprising second data. The second data includes the identifier received from the first message. The second data is encrypted by using the data encryption key received from the first message. The second range radio frequency is higher than the first range radio frequency.
Abstract: The invention is a method of power negotiation between a first contactless device and a second contactless device which provides an electromagnetic field set to a first power level. The method comprises the steps of: a) sending a request from the first device to the second device. The request targets a second power level and an associated duration. The next step is: b) sending a response to the first device. The response reflects a decision of the second device corresponding to the request. The final step is: c) switching the electromagnetic field to the second power level if the decision is positive.
Abstract: A data carrier is provided having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of its sides (S1, S2) under special lighting conditions, and a method for making such a data carrier. The see-through portion has an improved security, which is more difficult to reproduce by infringers.
Abstract: System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile.
Abstract: The invention relates to a communication system comprising a terminal (10), a first device (1) adapted to exchange data with said terminal (10), a second device (2) adapted to exchange data with said terminal (10), characterized in that it comprises means for pairing said first (1) and second (2) devices so as said second device (2) exchanges data with said terminal (10) through said first device (1).
Abstract: Secure password-based authentication for cloud service computing. A request for cloud computing resource access includes a derivative password that contains a parameter that the recipient may extract in order to independently calculate the derivative password based on the parameter and a stored password which may then be verified against a known-to-be-correct password. Other systems and methods are disclosed.
Abstract: The invention relates in particular to a method for saving the state of a session of a game played by at least two players, the game including game elements having chips that are capable of contactless communication with a terminal via an interface. The terminal includes a screen, the game consisting of presenting game elements to the interface, each player being identified by the terminal by a game element referred to as the master element. According to the invention, the saving method involves: recording the history of the game session, recording the game elements which have not been in play, if applicable, and recording the game elements in the possession of the players at the time that the game was interrupted, by means of master elements, so as to be able subsequently to resume the game session in the same state in which the game was when interrupted.
Abstract: The invention relates to a method for manufacturing a USB electronic key, whereby a chip is cut out of a tape, provided with a plurality of chips, each chip defining contact pads in USB format and supporting an electronic component, connected to the pads. The thickness adjustment step is directly carried out on the chip to give a thickness conforming to the USB standard, at least in the area of the contact pads.
Type:
Grant
Filed:
October 4, 2004
Date of Patent:
October 15, 2013
Assignee:
Gemalto SA
Inventors:
Francois Moutel, Joel Barrier, Thierry Karlisch, Pierre-Andre Collet
Abstract: A secure portable electronic device for providing secure services when used in conjunction with a host computer having a central processing unit use two hardware device protocols readily supported by computer operating systems. Other systems and methods are disclosed.
Type:
Grant
Filed:
February 1, 2008
Date of Patent:
October 15, 2013
Assignee:
Gemalto SA
Inventors:
Lu Karen HongQian, Stephane Durand, Laurent Castillo, Asad Ali, Ed Dolph
Abstract: The invention relates to a personalisable support comprising anti-forgery devices which are provided in order to indicate every attempt of fraudulent personalization. The support comprises a body (2) which is on one side equipped with personalization data (6,7) which are obtained by carbonization of the base material by means of a laser beam. The anti-forgery devices (8), which totally or partly cover these personalization data, draw a pattern (90, 80) along which bubbles (9) are created whose density (d1-d5) varies depending on the degree of carbonization of the areas (61-65) which are covered by the pattern.