Abstract: The invention relates to a personal token storing a javacard application code lying over an area of the memory of the personal token, the personal token being able to run such javacard application so as to deliver HTML page data to an external device for the external device to display an HTML page on the basis of the such delivered HTML page data, said personal token further storing data to be used as a constructing part of the HTML page, characterized in that the data to be used as a contributing part of the HTML page are in at least one file which is separate from the memory area over which the Javacard application code is lying, and the personal token is programmed for opening the at least one file storing the contributing part of the HTML page when such data are requested for delivering said HTML page data to said external device.
Abstract: Systems and methods for tracking assets from central stations using tracking devices enabled to receive GPS coordinates or site identities broadcast from transmitters at fixed locations within a wireless network. Plural position fixes are taken over time and forwarded to the central station. The position fixes are compared to establish a likelihood that apparent excursions from a predetermined boundary area are valid or not, prior to generating an alert signal that the asset has moved from the boundary area.
Abstract: The invention relates to a token for communicating with a host device. The token includes an interface for communicating through at least one USB communication channel. The token is adapted to receive, through at least one USB communication channel, a command for requesting the token to specify at least one capability of the token, and send, through at least one USB communication channel, as a reply to the received command, a response for specifying that the token supports a USB device class for HID. The invention also relates to corresponding communication system and method.
Abstract: A method for detecting faults by perturbations during execution of a computerized code in an electronic device. The computer code includes a sensitive process. The method includes a step of executing a redundant procedure of the sensitive process and a step of inserting a delay between the sensitive process and the redundant procedure. A trapping procedure is executed during the delay. The trapping procedure is sensitive to perturbations and supplies, in the absence of perturbation, a predictable result.
Abstract: A method for producing a device having a transponder antenna connected to contact pads. An antenna with terminal connections is provided in contact with a substrate. The contact pads are placed on the substrate and connected to the terminal sections of the antenna. The connection is produced by means of a soldering by introducing energy between the pads and the terminal sections. The pads are placed such as to provide a surface facing an antenna terminal connection section. The section is arranged on the substrate and the soldering energy is directly applied to the pads. The invention also relates to the device obtained.
Type:
Grant
Filed:
May 13, 2008
Date of Patent:
January 29, 2013
Assignee:
Gemalto SA
Inventors:
Jean-François Martinent, Laurence Robles, François Roussel
Abstract: The invention relates to a customized multi-layer support which takes the general form of a card, such as an identification card. The support includes a card body, the upper face of which is provided with externally-visible personal information; and a film which is at least partially transparent and which is fixed to the upper face of the card body. The support has boundary lines which define the areas of the aforementioned film with reduced or increased mechanical strength. The invention also relates to a method of producing one such customized support.
Abstract: To recharge the battery of a portable object communicating with a reader establishing communication over a modulated electromagneticfield, a recharging process is proposed. The portable object sends at least one waiting message to the reader. The said waiting message tells the reader a waiting time WTXM before the next message. The portable object uses energy from the electromagnetic field to recharge its battery during the waiting period.
Abstract: The invention relates to a computing device comprising means to store and execute bytecodes, the computing device storing bytecodes which comprise a bytecode for calling a method. An attack detection bytecode is present after the bytecode for calling the method, and when executing bytecode, the computing device is set, upon return from the method, to continue bytecode execution after the attack detection bytecode. The invention also relates to a procedure for generating secure bytecode and to an applet development tool.
Abstract: The invention is aimed at optimising the life of the power supply of mobile equipment with a radiofrequency communication interface by switching off the power to it when it reaches a given state. A mobile device (102) has a battery (206), a radiofrequency circuit (201) allowing the mobile device (102) to exchange information with a host device (101). The mobile device (102) comprises an electronic switch (202) connected between the battery (206) and at least the radiofrequency circuit (201), where the switch makes it possible to supply power or not to the radiofrequency circuit. A power control circuit (203) is capable of controlling the electronic switch (202) so that it ceases to power the radiofrequency circuit as soon a break in communication is detected.
Type:
Application
Filed:
March 16, 2011
Publication date:
January 10, 2013
Applicant:
GEMALTO SA
Inventors:
Michel Thill, Pierre Gravez, Matthieu Antoine
Abstract: The invention relates to a method 20 for accessing at least one service. A host device 14 is coupled to a chip 16. The chip stores data relating to at least one test SIM type application and/or data relating to at least one SIM type application. According to the invention, the method comprises the following steps. The host device sends to the chip a command 24 for switching from a first application to a second application. The first application is either a test SIM type application or a SIM type application. The second application is either a SIM type application or a test SIM type application. And the chip carries out an activation of the second application and a de-activation of the first application. The invention also relates to a corresponding system for accessing at least one service.
Abstract: The invention relates to a process to make secure a personal portable object comprising a body of the personal portable object, a microchip, a printed image and a device to enable said personal portable object to communicate with an entity external to the device. The process includes using an image file and an insertion algorithm to generate an image feature vector Vsi(num), storing the image feature vector Vsi(num) in the microchip, using the printed image obtained by a scanning device to generate an image feature vector Vsi(dig), and using a read-back algorithm to match the image feature vector Vsi(num) and the image feature vector Vsi(dig).
Type:
Application
Filed:
September 12, 2012
Publication date:
January 3, 2013
Applicant:
GEMALTO SA
Inventors:
Nathalie Launay, Fabrice Perion, Joseph Leibenguth, Frederic Ros
Abstract: The invention relates to a method for reading electronic certificates positioned in a document, each certificate comprising a support bearing an antenna linked to a microcircuit. The document has sheets of a determined format articulated around a hinge. The antennas are dimensioned to a format less than that of a half-sheet. The certificates are arranged at most in pairs on a sheet so that the antennas are spaced apart along a longitudinal axis of the sheet. The invention also relates to a set of certificates and the document containing the certificates.
Abstract: The invention relates to an electronic system having at least one host processing electronic device and at least one peripheral electronic device. The peripheral electronic device performs at least two functions. The host processing electronic device and the peripheral electronic device are interconnected via at least one interface. The host processing electronic device and the peripheral electronic device communicate via a single, common, “multi-function” interface, so that the host processing electronic device and the peripheral electronic device exchange at least one item of data relative to each of the two functions via the multi-function interface.
Abstract: The present invention relates to a method for obtaining a PIN validation signal in a data processing unit, the method including the steps of receiving a PIN in the data processing unit, submitting it to a first portable object for verifying it and obtaining a validation signal. The method further includes the steps of catching or receiving an entered PIN directly in said first portable object for verifying it; transmitting a fake PIN to the data processing unit, the fake PIN being seen by the data processing unit as a PIN to submit to the first portable object for verifying it, and returning a validation signal in case the entered PIN is verified successfully in the first portable object. The invention relates also to corresponding system and secure portable object.
Abstract: The invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.
Abstract: The invention is a method of managing an application embedded in a telecom device. The telecom device comprises a SIM card and a Push Registry as defined by the Mobile Information Device Profile® specifications. The application is intended to be registered in the Push Registry by defining a specific inbound connection associated to the application. The SIM card requires a local connection on the specific inbound connection for activating the application and for establishing a local communication channel between the SIM card and the application.
Abstract: The invention relates to a method for generating a permanent public SIP address associated with a private identity on an IMS network. According to the invention, the method consists of applying, to the private identity, a one-to-one, non-reversible and collision-free function in order to obtain the permanent public SIP address. The invention enables the ISIM of an end point to be directly addressed.
Abstract: The invention is a method of analyzing the wear of a non volatile memory embedded in a secure electronic token. A set of events are intended to generate writing and/or erasing operations in said memory. The token comprises a buffer. The method comprises the following steps: each time an event belonging to said set occurs, generating a data which reflects the event and storing said data in the buffer, sending the buffer to a remote machine, analyzing the buffer to determine the wear of the memory.
Abstract: In general, the invention relates to manufacturing a wafer. The method includes manufacturing a wafer that includes a front side and a back side, thinning the wafer down to a thickness suitable for an intended operation of the wafer, polarizing the substrate wafer from the back side, and cutting the wafer. The wafer is polarized such that an attempt to thin the wafer from the backside results in at least one selected from a group consisting of destruction of the wafer and damage to the wafer.
Abstract: The invention relates to an authentication and/or rights containing retrievable token such as an IC card comprising at least one physical channel of communication to at least one apparatus and at least two logical channels of communication with said at least one apparatus wherein each logical channel of communication is associated with a different execution environment.