Abstract: A method of producing a smart card having a reduced format in relation to a second standard format and an adapter with the second format, which is associated with the smart card. A card body has a zone for the extraction of the smart card and a zone for the extraction of the adapter. At least the smart card is extracted from the support. The smart card is extracted from a zone located outside the peripheral outline of the adapter extraction zone. The invention also relates to the support thus obtained.
Abstract: A method for managing an original executable code downloaded into a reprogrammable computer on-board system such as a microprocessor card. The code includes a cryptographic signature and is executable by the microprocessor once the validity of the signature has been checked. Off the card, a modified executable code corresponding to the original code and adapted to a pre-defined specific use is identified. A software component is calculated, which when applied to the original code, enables the modified code to be reconstructed. The software component is signed, and the signed original code and the signed software component are downloaded into the card. On the card, the signature of the original code and the software component are checked, and the software component is applied to the original code in order to reconstruct the modified code for the execution of the same by the microprocessor.
Abstract: The method to check module chaining in a modular software architecture located in an electronic unit with microprocessor comprising, apart from the microprocessor, a memory space, uses an identification, secured by the hardware, of the calling module. The invention also concerns an electronic unit with microprocessor designed to implement the above method.
Type:
Grant
Filed:
December 11, 2002
Date of Patent:
November 23, 2010
Assignee:
Gemalto SA
Inventors:
Alain Boudou, Christoph Siegelin, Jean-Claude Marchetaux
Abstract: The invention relates to a portable token (SC) comprising a capability query mechanism (CQM). The capability query mechanism (CQM) is set to inform entities (PC, MW) willing to communicate with the portable token (SC) of at least a subset of the command(s) (C) available in the portable token (SC). The portable token (SC) is arranged to set a flag when the capability query mechanism (CQM) is invoked. When a command (C) is called, the portable token (SC) enforces first access conditions (AC1) for the command (C) if the flag is set, or second access conditions (AC2) if the flag is cleared.
Abstract: The invention relates to a method and a device to inform of database update on a terminal system of an end-user. This method for informing services available in a mobile system of a database update, relies on a software module signaling database update to the plurality of services following an ordered list of the services.
Type:
Application
Filed:
March 31, 2008
Publication date:
November 11, 2010
Applicant:
GEMALTO SA
Inventors:
Cédric Boutie, Hervé Collet, Fabien Peix
Abstract: An electronic object carries out at least one operation on one element of an application installed in a computer. The method includes transmitting a random value of the electronic object to the computer, when such operation is completed, while maintaining in the electronic object the right of access to the electronic object by the user; storing the random value in the computer; giving access to the electronic object by the application and, in the case of a new access to the electronic object by the application; transmitting the random values stored in the computer to the electronic object; comparing, in the electronic object, the random value received from the computer with the random value previously transmitted to the computer; and, in case the random values are matching, re-establishing the previously acquired rights in the electronic object and thereby giving the application the access to the electronic object.
Abstract: In order to broadcast a commercial content corresponding to the centres of interest of a user of a communicating object, the disclosed method involves generating a message including at least one piece of commercial content associated with at least one piece of meta-information characterising the subject concerned by the commercial content. The method is implemented by the object for extracting a piece of commercial content from the message only if the piece of meta-information of the content corresponds to a piece of meta-information characterising a centre of interest of the user.
Abstract: A bridge circuit 10 is provided between first data port A1, A2 and second data port B1, B2. The bridge circuit comprises a first transceiver stage 40 comprising at least one input buffer 11, 14 and at least one tri-state output buffer 12, 13 linked to the first data port, a second transceiver stage 50 comprising at least one input buffer 21, 24 and at least one tri-state output buffer 12, 13 linked to the second data port, a first detection circuit 31 for detecting the arrival of a packet by the first data port, a second detection circuit 37 for detecting the arrival of a packet by the second data port. A selection circuitry 34, 35 enables the output of tri-state output buffer of the first or of the second transceiver stage depending of the detection made by the first and second detection circuits.
Type:
Application
Filed:
December 21, 2007
Publication date:
November 4, 2010
Applicants:
GEMALTO SA, INVIA SAS
Inventors:
Robert Leydier, Alain Pomet, Benjamin Duval
Abstract: The invention relates to a system (10) for decrypting encrypted audio and/or video data. The system includes a terminal (13) and at least one portable object (14). The terminal and/or the portable object include means for receiving ciphered audio and/or video data from outside the system, means for determining at least one decrypting key, and means for decrypting the encrypted audio and/or video data. Said at least one decrypting key is necessary for decrypting the encrypted audio and/or video data. According to the invention, the terminal and at least one portable object each include at least one contactless communication interface for exchanging data relative to at least one decrypting key, encrypted audio and/or video data and/or decrypted audio and/or video data. The invention also relates to a corresponding portable object and to a corresponding terminal.
Abstract: Method of producing a device comprising at least two distinct components that are interconnected by interconnecting wires, and device thereby obtained. The invention relates to a method of producing a device having at least two distinct components which are interconnected on a substrate by at least one interconnecting wire. The method includes the following steps: creating the interconnecting wire by depositing individual wires on the substrate in a predefined interconnecting pattern, the wire comprising at least one terminal connection portion which is exposed on the substrate, bringing at least one contact of a component to face the terminal portion and connecting the contact to this terminal portion. The invention also relates to the device thereby obtained and to a multi-component product comprising same.
Type:
Application
Filed:
December 4, 2008
Publication date:
November 4, 2010
Applicant:
Gemalto SA
Inventors:
Frederick Seban, Jean-Christophe Fidalgo
Abstract: The invention is a method of customizing a memory lifespan management policy of an electronic token. The electronic token is intended to be connected to a device able to establish a wireless channel. The electronic token has a microprocessor, a communication interface, a first memory intended to comprise said memory lifespan management policy, first means for exchanging data with a distant machine by means of a wireless channel established by said connected device, second means for applying said memory lifespan management policy in said electronic token, and third means for updating said memory lifespan management policy. Said method comprises the steps of—sending data from the distant machine to the electronic token by means of a wireless channel,—updating said memory lifespan management policy as a function of data received from said distant machine.
Abstract: The invention relates to a method to select a telecommunication network with a mobile equipment (10,20) comprising a mobile communication device (10) and a personal token (20), the method operating an algorithm (25) which selects at least one network to be operated by the mobile equipment among a plurality of available networks, wherein in the method, the algorithm is stored and run in the personal token (20).
Abstract: The invention concerns a method to secure an electronic assembly implementing any algorithm against attacks by error introduction. The method according to the invention consists in performing an additional calculation using a verification function on at least one intermediate result in order to obtain a calculation signature and in performing a least once more all or part of the calculation in order to recalculate said signature and compare them in order to detect a possible error.
Abstract: The invention relates to a warning device for signaling the presence of a radio frequency communication. The system includes an indicator perceptible to a user and an activation circuit to sense or detect energy originating from the communication and to activate the indicator. The device is distinguished in that the indicator is a vibrator. The invention also relates to a radio frequency communication device, such as a chip card, a passport, an insert, a mobile telephone, having the warning system, and a method of fabrication.
Abstract: The invention concerns a method for interacting between a handheld device and a machine. The handheld device has an Internet browser for interacting with a physical element that is part of the machine. The physical element is a smart card web server for establishing a near-field wireless connection with the handheld device when the handheld device is in proximity of the machine. The physical element communicates over the air with at least a distant server, the server being able to update the content of the physical element.
Abstract: The invention relates to a method for inserting, into a data stream, at least one piece of concealed information as well as at least one mechanism for broadcasting the information, wherein the mechanism is revealed. According to the invention, these additions are made without altering the original data, i.e. neither their intrinsic content nor their integrity. The invention also relates to a device for implementing the method.
Abstract: The invention concerns a method for updating in at least a first mobile communication apparatus (48) of a network, in particular of the GSM type, a personal data file concerning at least a correspondent of the user of the first communication apparatus, said correspondent being equipped with a second mobile communication apparatus (60) and having modified at least one personal information concerning him. The invention is characterized in that it comprises the following main steps which consist in: (a) detecting in said second mobile communication apparatus (60) the call number of said first mobile communication apparatus (48), and (b) transmitting to at least said first mobile communication apparatus (48) said modified personal information.
Abstract: An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal.
Type:
Grant
Filed:
September 29, 2006
Date of Patent:
October 19, 2010
Assignee:
Gemalto Inc.
Inventors:
Timothy J. Wilkinson, Scott B. Guthery, Ksheerabdhi Krishna, Michael A. Montgomery
Abstract: Guilloches (preventing modification) and watermarking (preventing substitution) technologies are combined to protect a medium, such as a card or a passport. The major idea stems from their dual role for medium authentication: the presence of one is needed to check the validity of the other one. By nature, the guilloche network is visible in the image and easily detectable by image processing. This network is therefore used to generate reference points as elements of synchronization to retrieve watermark information originally embedded in the medium that has submitted an RST transformation. These reference points are by nature stronger than any other means involving invisible templates in the spatial or Fourier space.
Type:
Application
Filed:
November 28, 2008
Publication date:
October 14, 2010
Applicants:
GEMALTO SA, GEMALTO OY
Inventors:
Frederic Ros, Christophe Mourtel, Teemu Pohjola
Abstract: To recharge the battery of a portable object communicating with a reader establishing communication over a modulated electromagnetic field, a recharging process is proposed. The portable object sends at least one waiting message to the reader. The said waiting message tells the reader a waiting time WTXM before the next message. The portable object uses energy from the electromagnetic field to recharge its battery during the waiting period.