Abstract: An electronic object carries out at least one operation on one element of an application installed in a computer. The method includes transmitting a random value of the electronic object to the computer, when such operation is completed, while maintaining in the electronic object the right of access to the electronic object by the user; storing the random value in the computer; giving access to the electronic object by the application and, in the case of a new access to the electronic object by the application; transmitting the random values stored in the computer to the electronic object; comparing, in the electronic object, the random value received from the computer with the random value previously transmitted to the computer; and, in case the random values are matching, re-establishing the previously acquired rights in the electronic object and thereby giving the application the access to the electronic object.
Abstract: Personalization of identity card by producing a color image thereon by selectively exposing photon-sensitive layers on the card to change between transparent and opaque thereby selectively revealing opaque colors from the photon-sensitive layer or from a printed substrate. Other systems and methods are disclosed.
Type:
Grant
Filed:
October 18, 2009
Date of Patent:
November 20, 2012
Assignee:
Gemalto SA
Inventors:
Bart Bombay, Joseph Leibenguth, Jean-Luc Lesur
Abstract: The invention relates to a chip card comprising, a molded card body made by means of injection molding and, an integrated circuit chip, as well as to a method for manufacturing such a card. The invention is characterized in that the card body includes polyacrylic acid. The invention applies to SIM cards in particular.
Type:
Application
Filed:
January 11, 2011
Publication date:
November 15, 2012
Applicant:
GEMALTO SA
Inventors:
Alexis Froger, Jeremy Renouard, Laurent Oddou
Abstract: The invention is a method of power negotiation between a first contactless device and a second contactless device which provides an electromagnetic field set to a first power level. The method comprises the steps of: a) sending a request from the first device to the second device. The request targets a second power level and an associated duration. The next step is: b) sending a response to the first device. The response reflects a decision of the second device corresponding to the request. The final step is: c) switching the electromagnetic field to the second power level if the decision is positive.
Abstract: The invention relates to a personal token (10) for authentication in a network comprising a piece of software for initiating an SSL connection by generating a message authenticating said token to a remote server (30) characterized in that the piece of software controls the processing of the message so as to use of a data (12) which is prestored in the token (10) and which is specifically associated with the remote server (30) so that the message can be interpreted only by the specific remote server (30).
Abstract: A system and method to control a device having at least one configurable parameter. Enumerating the device as a first peripheral device and as a second peripheral device wherein the first peripheral device corresponds to a first microcontroller connected to a storage medium and the second peripheral device corresponds to a second microcontroller. Controlling the at least one configurable parameter of the first microcontroller with respect to the storage medium by the second microcontroller. On initialization of the device, transmitting the at least one configurable parameter from the second microcontroller to the first microcontroller. Other systems and methods are disclosed.
Type:
Grant
Filed:
November 12, 2007
Date of Patent:
November 6, 2012
Assignee:
Gemalto SA
Inventors:
Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D Shah, Mehdi Asnaashari
Abstract: The present invention provides a method for unlocking a secure device (1), said secure device (10) being adapted to be associated with a first device (11) and being adapted to be locked when it is associated to a second device (12) different from the first device (11), said first device (11) being the paired device, the method comprising a step of unlocking the secure device (1) over-the-air when the secure device (1) is connected to the second device (12).
Type:
Application
Filed:
December 24, 2010
Publication date:
November 1, 2012
Applicant:
GEMALTO SA
Inventors:
Lionel Merrien, Rodrigo Ferreira Da Silva
Abstract: (EN)The invention relates to an authentication device (TK) set to identify itself to a computer (PC) as a native human interface device. It also relates to a system comprising an authentication device (TK) and a computer (PC), as well as to a method to have a computer (PC) recognize an authentication device (TK).
Abstract: The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.
Abstract: The invention relates to a process to make secure a personal portable object comprising a body of the personal portable object, a microchip, a printed image and a device to enable said personal portable object to communicate with an entity external to the device. The process includes using an image file and an insertion algorithm to generate an image feature vector Vsi(num), storing the image feature vector Vsi(num) in the microchip, using the printed image obtained by a scanning device to generate an image feature vector Vsi(dig), and using a read-back algorithm to match the image feature vector Vsi(num) and the image feature vector Vsi(dig).
Type:
Grant
Filed:
September 28, 2005
Date of Patent:
October 30, 2012
Assignee:
Gemalto SA
Inventors:
Nathalie Launay, Fabrice Perion, Joseph Leibenguth, Frederic Ros
Abstract: A metal-plated copperless substrate for an electrochromic display. The display includes the substrate in the form of a backplane whereon circuitry of less than about 1 micron in thickness is patterned from the copperless metal. A transparent frontplane is coupled to the substrate with an electro-active ink material therebetween through which pixels may be activated to form an image for the display.
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Application
Filed:
June 9, 2012
Publication date:
October 4, 2012
Applicant:
GEMALTO SA
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: The invention is a method of personalizing an application embedded in a secured electronic token which is able to manage first and second channels that allow to convey personalization data exchanged with a distant machine. Said first and second channels are of different types. The application is of Javacard™ type and comprises at least a function which is invoked when personalization data is received from the distant machine regardless of the channel used for conveying the personalization data.
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Application
Filed:
June 9, 2012
Publication date:
October 4, 2012
Applicant:
GEMALTO SA
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: The invention is a method of customizing a memory lifespan management policy of an electronic token. The electronic token is intended to be connected to a device able to establish a wireless channel. The electronic token has a microprocessor, a communication interface, a first memory intended to comprise said memory lifespan management policy, first means for exchanging data with a distant machine by means of a wireless channel established by said connected device, second means for applying said memory lifespan management policy in said electronic token, and third means for updating said memory lifespan management policy. Said method comprises the steps of—sending data from the distant machine to the electronic token by means of a wireless channel,—updating said memory lifespan management policy as a function of data received from said distant machine.
Abstract: In general, the invention relates to a system that includes a smart phone and a smart card. The smart phone includes a web browser and a display for displaying a web page, where the web page includes at least one selectable entry. The smart card includes at least one proactive logic entity, where the at least one proactive logic entity is configured to respond to selection of the at least one selectable on the web page.
Abstract: A method which improves the security of the authentication between two entities in a telecommunication network, and particularly between a mobile terminal and the fixed network, notably visitor location and nominal recorders and an authentication center, in a cellular radiotelephony network. Prior to a first authentication of the terminal, and more precisely of the SIM card therein, by the fixed network, a second authentication is based on an algorithm in which there are entered a random number produced and transmitted by the fixed network and a key different from the key for the first authentication. A transmitted signature and a signature result are produced by the fixed network and the terminal, and compared in the terminal in order to enable the first authentication in the event of equality.
Abstract: (EN)The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC.
Type:
Application
Filed:
December 7, 2010
Publication date:
September 20, 2012
Applicant:
GEMALTO SA
Inventors:
Francois Ennesser, Nicolas Joubert, Florent Labourie, Nicolas Roussel
Abstract: The invention relates to a method for securing an on-line transaction, comprising a proximity test which permits the proximity of the physical presence of the client to the on-line processing station (PT) with the authentication authority (AA) to be verified, an authentication test for the holder of the chipcard (CP) and a non-repudiation test for the transaction.
Abstract: (EN)The invention relates to an identification document (21) comprising a non-transparent core (6), and one or more layers of a transparent material (14) arranged on at least a back (13) or a front surface (12) of said core. In order to achieve an identification document where forgery attempts are visibly detectable, the identification document (21) has a translucent security element in a region (7) where the thickness of the non-transparent core (6) material is smaller as compared to the thickness of the non-transparent core material in other parts of said core (6).