Abstract: The invention relates to a method for securely drawing up a multiparty contract using digital certificates and electronic devices. Said method includes at least three steps: signing, countersigning, and formatting. The formatted document has the specific feature of being capable of being physically represented.
Abstract: The invention relates to a smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The invention also relates to the use of a portable object for implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via said interactive display.
Abstract: A cryptographic operation includes calculating a multiplication of an element of an additively denoted group by a scalar. After two registers R0+R1, are initialized, iterations are carried out over the components Ki of the scalar K. If Ki of the scalar equals 0, then the value in register R1 is replaced by 2(R0+R1) If Ki equals 1, the value in register R0 is replaced by 2(R0+R1). At the end of the algorithm, the value of the register R0 is returned as the calculated result. This method poses the advantage of carrying out a calculation of multiplying by a scalar by carrying out only doubling and adding operations of the type 2(A+B).
Abstract: A method for producing a portable electronic object having contact pads arranged on a plane with a thickness which differs from the thickness of a standard smartcard. The object is electrically connected to data transfer station connectors, by delivering a data transfer station having an electric probe connector and submitting the object to the data transfer station in such a way that the contact pads thereof are accessible to the electric probes in a direction perpendicular to the plane. Objects obtainable include UBS keys or PCMCIA cards or readers.
Type:
Application
Filed:
June 7, 2011
Publication date:
November 17, 2011
Applicant:
Gemalto SA
Inventors:
Pierre-André Collet, Thierry Karlisch, François Moutel
Abstract: The invention relates to a method for generating a session key between two communicating electronic devices not requiring any prerecorded information in one of the two devices and enabling the authentication of one of said devices. The method uses a close collaboration between a symmetrical algorithm and an asymmetrical algorithm.
Type:
Application
Filed:
January 26, 2010
Publication date:
November 17, 2011
Applicant:
Gemalto SA
Inventors:
Karine Villegas, Aline Gouget, Louis Goubin, Pascal Paillier
Abstract: The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key K0 and a message M, the cryptographic algorithm A is set to compute a value A(KO,M). Given a relationship R between A(KO,M) and A(f(K0),g(M)), where f and g are two bijections, and where f is different from the identity function, the method comprises: a. computing the expected result A(KO,M) of the cryptographic algorithm b. computing a modified result A(f(K0),g(M)), by applying the cryptographic algorithm A on a modified key f(K0) and on a message g(M), c. checking whether the relationship R between the values A(KO,M) and A(f(K0),g(M)) computed in the two preceding steps is verified d. detecting an attack if the relationship R is not verified. The invention also relates to a cryptographic device embodying the above method.
Abstract: The invention is a portable electronic device comprising a non volatile memory and a memory controller. The portable electronic device comprises a connector having eight pads able to communicate using a protocol of Secure Digital® type. The connector comprises at least one additional pad intended to be linked to an antenna. The additional pad is able to communicate using a protocol of SWP type.
Type:
Application
Filed:
August 21, 2009
Publication date:
November 3, 2011
Applicant:
GEMALTO SA
Inventors:
Francois-Xavier Marseille, Michel Thill
Abstract: The invention relates to a portable security device (SC, TK) comprising host connection means (PAD_H, USB_M) for connecting to a computer (PC), client connection means (PAD_C, USB_F) for connecting to an input device (KBD), filtering means for intercepting sensitive data transmitted from the client connection means (PAD_C, USB_F) to the host connection means (PAD_H, USB_M), and protection means for protecting said sensitive data. The invention also relates to an input device comprising a portable security device, to a server, to a system comprising a portable security device, a computer and an input device, and to a method for securing data entered into a computer (PC) with an input device (KBD), the method comprising installing a portable security device (TK) between the computer (PC) and the input device (KBD).
Abstract: The invention relates to a method for accessing an application or a set of applications from or through a token. The token is coupled to a terminal that comprises at least one touch surface. According to the invention, the method comprises steps in which the terminal compares an input touch pattern with at least one predetermined input touch pattern relating to one application or a set of applications accessible from the token, and, according to a comparison result, the terminal sends or not to the token either a command for requesting a display of a set of at least one application accessible from the token or a command for triggering an execution of an application accessible from the token, the command being associated with a matching predetermined input touch pattern. The invention relates also to a corresponding token and a corresponding system comprising the token.
Abstract: Method for checking the signature of a message. The message, signature, and a certificate are sent by a signer having a public key to a recipient having a message storage device. The certificate is checked by a protected device connected to the message storage device and a checking result data element is sent for checking to a display device connected to the protected device. When the certificate is verified, a reduction of the message is calculated in the protected device and the message is recopied onto the display device. The signature is decrypted using the public key in the protected device, and the decrypted signature is compared with the reduction carried out. According to the comparison, a message is sent from the protected device to the display device indicating whether the signature conforms or does not conform to the message or to the public key of the signer put forward.
Abstract: The invention is a method of protecting a data intended to be accessed by an operating system embedded in an electronic device. The operating system is intended to manage an object comprising a header and a body. The data is stored in the body. The object is recorded in a memory of the electronic device. The electronic device comprises a memory manager able to provide access to the memory. The memory manager forbids the operating system to access the body as long as a preset action has not been successfully performed.
Abstract: The invention relates to a method for establishing a secured link between an authentication card of a subscriber and a telecommunication network, the card being connected to a mobile terminal, wherein the method includes the steps of establishing a secure link between the terminal and an IMS network; and sharing the resources of the secure link between the terminal and the card.
Abstract: The present invention is a method to ensure a secure exchange of crypted numeric data between two entities, where their decryption depends to the approval of a third entity. The solution uses a combination of Identity Based Encryption scheme, and transcription trap use.
Abstract: The invention relates to a method of updating an authentication algorithm in at least one data processing device (CARD, SERV) which can store a subscriber identity (IMSI1) which is associated with an authentication algorithm (Algo1) in a memory element of said device (CARD, SERV). The inventive method comprises the following steps, namely: a step whereby a second inactive (Algo2) authentication algorithm is pre-stored in a memory element of the device and a step for switching from the first algorithm (Algo1) to the second algorithm (Algo2) which can inhibit the first algorithm (Algo1) and activate the second (Algo2).
Abstract: A chip card needs to be allocated in a secured manner to a network operator via a personalization center in order to determine a final authentication key which is attributed to a subscriber of the operator without its being transmitted via a network. The following is loaded into a card by a module: an algorithm and an allocation key; an algorithm for determination of the authentication key and at least one intermediate authentication key. A module transmits an allocation message which includes a final identity number, a random number and an allocation signature from the center to the card. The card authenticates the message by means of the allocation algorithm as a function of the allocation key and the allocation signature, and determines the final authentication key as a function of the intermediate key and the random number.
Type:
Grant
Filed:
December 6, 2005
Date of Patent:
October 4, 2011
Assignee:
Gemalto SA
Inventors:
Lionel Merrien, Gary Chew, Max De Groot
Abstract: The invention relates to a virtual machine. The virtual machine is set to recognize, in addition to a set of conventional bytecodes, at least one secure bytecode functionally equivalent to one of the conventional bytecodes. It is set to process secure bytecodes with increased security, while it is set to process conventional bytecodes with increased speed. The invention also relates to a computing device comprising such a virtual machine, to a procedure for generating bytecode executable by such a virtual machine, and to an applet development tool comprising such procedure.
Abstract: The invention relates to a radiofrequency communication device that comprises a gripping beating body having a surface; an electronic and/or electric circuit extending in the gripping beating body; at least one antenna provided in the vicinity of the electronic circuit. The device includes a connection circuit for connection to the antenna, that is provided at least partially in the gripping beating body and extends from the electronic circuit up to connection points of the antenna, said antenna connection points being accessible from the outside of the beating body.
Abstract: A card reader payment terminal including an electronic circuit including at least one printed circuit board, to which are connected electronic components, including a microcontroller designed to control different peripherals, where the microcontroller is connected to an associated microprocessor, where the card reader payment terminal is configured to receive a smart card comprising the associated microprocessor, where the associated microprocessor comprises a connector compatible with the standardized connector of smart cards for connection with the microcontroller, where the microcontroller and the associated microprocessor operate in parallel for executing a task, and where the associated microprocessor is adapted to calculate a security operation.
Abstract: A boot sequence method comprises a determination step 110 and 200, a first starting step 120, 210 or 240 for starting a first interface, a first negotiation step 140 or 220 wherein a power negotiation is performed, a second negotiation step 140 or 230 for determining the interfaces to activate simultaneously, and a second starting step 150 or 230 wherein the interfaces that can be activated simultaneously are started one after each other.
Abstract: A portable communication device for at least mono-directional communication with a terminal is disclosed. The portable communication device includes a micro-module including a chip that has an antenna allowing the micro-module to communicate with the terminal when the antenna is placed in the immediate vicinity of the terminal. The portable device further includes a reader receiving the removable micro-module, and the antenna is held by the reader such that the micro-module is removable relative to the antenna.