Abstract: The invention concerns a method for automatically switching from a Home IMSI to a Roaming IMSI and vice versa, said Home IMSI and Roaming IMSI being contained in a SIM card adapted to be used in a mobile station and adapted to comprise elementary files, wherein it comprises the step of triggering the switch from one IMSI to another when detecting an update of the elementary file comprising forbidden public land mobile networks (EFFPIMN)
Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
Type:
Grant
Filed:
October 3, 2007
Date of Patent:
April 23, 2013
Assignee:
Gemalto SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli
Abstract: The invention relates to a method for securing a first image by means of graphical anti-counterfeiting means and to a method for securing an identification document with such graphical anti-counterfeiting means. The invention also relates to a secure identification document that allows detecting either a fraudulent modification of the existing personalization or a fraudulent falsified document. For that, graphical anti-counterfeiting image is inserted into an identification image, each image being defined by a plurality of pixels. The characteristic level (for example grey level) of each pixel i of the graphical anti-counterfeiting image is linked, by a function F, to a matrix ?i of pixels defined in the identification image, said pixels of the matrix ?i surrounding the location i of a pixel of the graphical anti-counterfeiting image, said function F taking into account the characteristic level (for example average grey level) G(?i) and the texture level T(?i) of said matrix ?i.
Type:
Grant
Filed:
July 7, 2009
Date of Patent:
April 23, 2013
Assignees:
Gemalto SA, Gemalto Oy
Inventors:
Teemu Pohjola, Christophe Mourtel, Frédéric Ros
Abstract: The embodiments of this invention describe a method for managing the transfer of data between a peripheral comprising a Bluetooth type interface and a computer device comprising a Bluetooth type interface configured to manage Bluetooth profiles allowing the transfer of audio type data characterised in that the exchange of digital non-audio type data between the peripheral and the computer device is achieved by encoding the digital data in audio format and by transmitting those digital data by means of the audio channel of the Bluetooth interface.
Abstract: The invention relates to a method for authenticating a user accessing a remote server from a computer. The method comprises connecting to the remote server from the computer; logging into the remote server using a user-specific identifier; authenticating the remote server in the computer; sending an unpredictable message from the remote server to the computer; establishing communication between the remote server and a terminal belonging to the user; authenticating the remote server in the terminal; authenticating the terminal in the remote server; inviting the user to enter the unpredictable message in the terminal; using the terminal to send the message entered by the user in the terminal to the remote server; and if the message entered by the user in the terminal matches the unpredictable message, authenticating the user in the remote server.
Type:
Grant
Filed:
August 27, 2008
Date of Patent:
April 16, 2013
Assignee:
Gemalto SA
Inventors:
Gabriel Rangoni, Jerome Sion, Edouard Lafargue
Abstract: In order to allow a display of the latest transactions, a smart card 100c for secure transactions comprises at least one secure chip 101c, for example of the EMV type, with at least one communication interface to communicate with a card reader in order to carry out a transaction, an electronic display 103, an independent battery 104, a card reader circuit 150c connected to a communication interface of the secure chip in order to access the information contained in the secure chip to be able to display it on the display.
Type:
Application
Filed:
May 31, 2011
Publication date:
April 11, 2013
Applicant:
GEMALTO SA
Inventors:
Francois-Xavier Marseille, Pierre Gravez, Michel Thill
Abstract: The present invention relates to a method for processing a plurality of radiofrequency communication streams by way of an integrated circuit card, the streams originating from at least two terminals, and the card being connected to a device equipped with a radiofrequency communication interface which is suitable for the connection of a plurality of host terminals. The method includes monitoring the reception and/or transmission at and/or to the card of a first and second stream of data originating respectively from a first and second host terminal. The monitoring step includes a step of checking the availability of the card before the second stream of data is transmitted to the card. The invention also relates to the corresponding monitoring system and device.
Type:
Application
Filed:
June 7, 2011
Publication date:
April 11, 2013
Applicant:
Gemalto SA
Inventors:
François-Xavier Marseille, Michel Thill
Abstract: In a terminal device for controlling access to multicast services over a broadcasting network, an application outputs a user-preselected broadcast service request to a router that receives the broadcast services. The request contains an address of the selected service. The device includes a filtering entity that compares the address in the request with addresses in an address list generated on the basis of at least one filtering criterion, in order to authorize the transmission of the selected service from the router to the application so that the service is delivered when the address is included in the list.
Abstract: A boot sequence method comprises a determination step 110 and 200, a first starting step 120, 210 or 240 for starting a first interface, a first negotiation step 140 or 220 wherein a power negotiation is performed, a second negotiation step 140 or 230 for determining the interfaces to activate simultaneously, and a second starting step 150 or 230 wherein the interfaces that can be activated simultaneously are started one after each other.
Abstract: A bridge circuit 10 is provided between first data port A1, A2 and second data port B1, B2. The bridge circuit comprises a first transceiver stage 40 comprising at least one input buffer 11, 14 and at least one tri-state output buffer 12, 13 linked to the first data port, a second transceiver stage 50 comprising at least one input buffer 21, 24 and at least one tri-state output buffer 12, 13 linked to the second data port, a first detection circuit 31 for detecting the arrival of a packet by the first data port, a second detection circuit 37 for detecting the arrival of a packet by the second data port. A selection circuitry 34, 35 enables the output of tri-state output buffer of the first or of the second transceiver stage depending of the detection made by the first and second detection circuits.
Type:
Grant
Filed:
December 21, 2007
Date of Patent:
April 2, 2013
Assignees:
Gemalto SA, Invia SAS
Inventors:
Robert Leydier, Alain Pomet, Benjamin Duval
Abstract: Guilloches (preventing modification) and watermarking (preventing substitution) technologies are combined to protect a medium, such as a card or a passport. The major idea stems from their dual role for medium authentication: the presence of one is needed to check the validity of the other one. By nature, the guilloche network is visible in the image and easily detectable by image processing. This network is therefore used to generate reference points as elements of synchronization to retrieve watermark information originally embedded in the medium that has submitted an RST transformation. These reference points are by nature stronger than any other means involving invisible templates in the spatial or Fourier space.
Type:
Grant
Filed:
November 28, 2008
Date of Patent:
March 26, 2013
Assignees:
Gemalto SA, Gemalto Oy
Inventors:
Frederic Ros, Christophe Mourtel, Teemu Pohjola
Abstract: The downloading of data from a server into one (Cn) of the portable communicating objects (C1 CN), such as chip cards or mobile terminals, over a radiocommunications network involves: a preprocessing of data (PRET) in the server into at least one data message intended for the communicating object; a sending (E) of the data message from the server to the communicating object; a reception (R) by the server of an acknowledgement of reception by the communicating object, and; a post-processing of data (POST) in the server contingent on the acknowledgement of reception. The pre-processings of data (P1) and post-processings of data (P3) concerning the communicating objects are respectively executed before and after sending the data message and receiving the acknowledgements of reception (P2) concerning the communicating objects. The server communicates with the radiocommunications network only during the sending and receiving of messages.
Type:
Grant
Filed:
July 28, 2005
Date of Patent:
March 26, 2013
Assignee:
Gemalto SA
Inventors:
Nadir Boussoukaia, Frédéric Martinent, Laurent Loubaud, Guillaume Pascal
Abstract: The embodiments of this invention also describe to a data medium comprising a holographic memory carried on the medium, and a photonic crystal configured, firstly, to filter the light received from a broad-spectrum light source in order to select a frequency band of the said spectrum and secondly, to guide the light corresponding to the said selected frequency band so as to light the said holographic memory in a predefined direction.
Type:
Application
Filed:
May 30, 2011
Publication date:
March 21, 2013
Applicant:
GEMALTO SA
Inventors:
Frances Allot, Antoine Bajolle, Sabastien Gaspari
Abstract: To allow the display of the latest transactions performed, a chip card 100c comprises at least one secure chip 101c furnished with at least one communication interface so as to be able to communicate with a card reader so as to perform a transaction. The card furthermore comprises an electronic display 103, an autonomous battery 104, and an interception circuit 150c linked to the at least one communication interface of the secure chip so as to be able to intercept at least one type of command and store at least one item of information so as to be able to display it on the display.
Type:
Application
Filed:
June 1, 2011
Publication date:
March 21, 2013
Applicant:
GEMALTO SA
Inventors:
Michel Thill, Pierre Gravez, Francois-Xavier Marseille
Abstract: The invention relates to a cryptographic mechanism and to a cryptographic device incorporating such cryptographic mechanism. The cryptographic mechanism offers a better resistance to side channel attacks than that of known cryptographic mechanisms by incorporating a new type of masking mechanism.
Abstract: The invention relates to a method for checking the integrity of a set of data packets received by a receiving communication device from a sending communication device, the data packets of the set being received in unpredictable order. The invention also relates to a communication device implementing a method according to the invention, in particular to a smart card.
Type:
Grant
Filed:
October 3, 2007
Date of Patent:
March 12, 2013
Assignee:
Gemalto SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli
Abstract: The invention relates to a security token comprising a communication interface adapted to communicate with a host computer; a security module, comprising encryption based security features; a non volatile memory storing at least an application to be uploaded and executed in a host computer. The application makes use of the security features when executed in a host computer in communication with the communication interface. The security token is adapted to modify the content of the application as uploaded or its execution parameters at successive connexions of the security token to a host computer.
Type:
Application
Filed:
May 10, 2011
Publication date:
March 7, 2013
Applicant:
Gemalto SA
Inventors:
Jacques Fournier, Pierre Girard, Philippe Proust
Abstract: A slave wireless device includes several applications, a wireless communication interface and a processing module. The processing module interprets a presentation request and time-slotted markers received on the communication interface, selects several applications or application groups corresponding to the presentation request, and transmits the wireless slave device identifier distinctive for each application or application group selected in the distinctive time slot in response to the presentation request. The slave device is thus enabled to indicate several application groups in response to a single presentation request.
Abstract: When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
Type:
Grant
Filed:
July 9, 2007
Date of Patent:
February 26, 2013
Assignee:
Gemalto SA
Inventors:
Frederic Faure, Gary Chew, Lionel Martin
Abstract: A system, method and computer-readable storage medium with instructions for operating a digital signature server and a portable security device to cooperate to provide digital signature services using a private key stored on the portable security device by delegating to a user's smart card the actual task of digitally signing documents. Other systems and methods are disclosed.