Abstract: The invention relates to a cryptographic method that incorporates a modular exponentiation secured against hidden channel attacks, without requiring knowledge of the public exponent. The method includes a modular exponentiation and the following steps: drawing of a random value s; initialization of variables with the aid of s; application of an algorithm enabling a loop invariant to be retained by virtue of the properties of the Montgomery multiplier Mgt; unmasking of the result of the algorithm to obtain the signature of the message.
Abstract: The invention relates to a method for processing at least two application commands from at least two physical communication channels respectively using a portable electronic device. The method includes receiving each application command from one of the physical communication channels, determining a priority level associated with each application command, comparing priority levels and identifying the application command with the highest priority among the application commands and processing of the application command with highest priority. The invention also relates to the portable electronic device and an electronic system including a host device cooperating with such a portable electronic device.
Abstract: A client-side application extension executable on a host computer from within a web-browser having the capability of executing at least one web-browser add-on to provide a user access to a smart card, connected to the host computer having a smart card resource manager, via the web-browser. The web-browser extension has instructions to direct the central processing unit to access data on the smart card via a web-browser and platform independent interface module and a web-browser and platform dependent wrapper module connected to the web-browser and platform independent interface module and to the smart card resource manager having a function processing module operable to receive a call to the at least one function for accessing data on the smart card and for transforming the function call into a corresponding call to the smart card resource manager.
Abstract: The invention relates to a secure identification document having two main surfaces (S1, S2; S3,S4) and at least one edge, and comprising at least two constitution layers (20,22; 24,26), said identification document allowing preventing any separation of its constitution layers, by delamination for example, said separation being otherwise immediately apparent. The solution of the invention relates to the fact that the at least one edge of the identification document is marked with written data (23; 27) that are etched into said edge by means of a laser beam, said written data overlapping said constitution layers (20,22;24,26; 32,33,34), in order to prevent a fraudulent delamination of said document.
Abstract: A method of superimposing a first image onto a second image, wherein each image is defined by a plurality of pixels is disclosed. The method includes changing target pixels of the second image corresponding in position to pixels of the first image to be superimposed on the second image. Changing target pixels of the second image includes changing the values of some of these target pixels of the second image to respective new values. Each new value is based on the original value of at least one pixel of the second image. A personalization method including such an image superimposing method and a data carrier thereby personalized are also disclosed.
Abstract: The invention concerns a process for securing an electronic device incorporating a hardware component capable of autonomous implementation of calculation process f using one key K, the process involves calculating at least two new keys K?i such that at least one of said new keys is identical to key K, and one of said new keys is different from key K, and executing said calculation process f successively with each of said calculated keys K?i, using said hardware component.
Abstract: The invention concerns a method for making smart cards capable of operating with or without contact called mixed cards and contactless smart cards. In order to avoid the risk of deteriorating the antenna the method consists in producing an antenna comprising at least two turns, on a support sheet, said antenna having its turns located outside the connecting pads, and in providing an insulating bridge so as to connect each of the antenna ends to a connection pad respectively.
Type:
Grant
Filed:
August 6, 2007
Date of Patent:
June 22, 2010
Assignee:
Gemalto, S.A.
Inventors:
Stephane Ayala, Gerard Bourneix, Christine Beausoleil, David Martin, Laurent Oddou, Philippe Patrice, Michael Zafrany
Abstract: A mobile station that includes a smart card associated with a mobile host equipment communicates by means of a protocol that is organized in several layers. These layers include at least a data transport layer of the datagram type that is adapted to transmit integral data packets of a maximum size. The transmission method carries out the step of determining the value of the maximum size of data packets that are capable of being integrally transmitted by the transport layer of the mobile host equipment, and storing that value in the card.
Abstract: The invention relates to a cryptographic method secured against a covert channel attack. According to the invention, in order to carry out a selected block of instructions as a function of an input variable amongst N predefined instruction blocks, a common block is carried out on the predefined N instruction blocks, a predefined number of times, the predefined number being associated with the selected instruction block.
Abstract: A method for producing a device having a transponder antenna connected to contact pads. An antenna with terminal connections is provided in contact with a substrate. The contact pads are placed on the substrate and connected to the terminal sections of the antenna. The connection is produced by means of a soldering by introducing energy between the pads and the terminal sections. The pads are placed such as to provide a surface facing an antenna terminal connection section. The section is arranged on the substrate and the soldering energy is directly applied to the pads. The invention also relates to the device obtained.
Type:
Application
Filed:
May 13, 2008
Publication date:
June 17, 2010
Applicant:
GEMALTO SA
Inventors:
Jean-Francois Martinent, Laurence Robles, François Roussel
Abstract: The present invention concerns a method and a system for extending a server connected with at least one client(s), characterized in that it consists in providing said extension on the client side by means of a portable object which is connected to said client and which performs at least one of the server's operation(s) in part or entirely.
Abstract: A secure portable electronic device for providing secure services when used in conjunction with a host computer having a central processing unit use two hardware device protocols readily supported by computer operating systems. Other systems and methods are disclosed.
Abstract: Application protocol data units are conveyed in a universal serial bus so that a portable electronic object such as a smart card can be recognized by a terminal, such as a micro-computer, as being a peripheral. The header and the data field, when such a data field exists, of each command are encapsulated in data fields of data packets of respective downlink transactions. The data field, when such a data field exists, and the trailer of each response are encapsulated in the data packet data field of at least one uplink transaction. By means of this bus link, the data rate between the terminal and the electronic object is higher, and a plurality of portable electronic objects can be connected to the terminal.
Abstract: The invention relates to a method and to an automated device for the authentication of a set of candidate points relative to a set of reference points. The present invention is insensitive to unavoidable translation, rotation and scaling occurring upon successive but independent acquisitions of, for example, of fingerprints.
Abstract: The invention relates to a method for data management in a portable electronic device connected to a host machine, said device containing a first set of data, the host machine being connected to a remote data server containing a second set of data. Said method includes the steps of: drawing up, in the device, a unique list containing the first and second sets of data, transmitting the unique list from the device to the host machine.
Abstract: The invention relates to a memory index management system. The said system comprises an indexed storage memory, a memory zone containing the index and a microprocessor. The index is built in the form of a hierarchical tree structure and comprises at least two nodes. A node contains an identifier associated with a pointer that references either a node of the index or a memory zone in the storage memory. The content of a node is distributed over a first and a second memory zone that are separate in the memory zone. The first space has a first specific pointer that points to the second space and the second space has a second specific pointer whose value has a blank state.
Abstract: A method for loading data and programs in the memory of an electronic component includes a first phase in which data is loaded in the memory of the component. A validation phase then verifies the data loaded in the component memory. A second phase of loading data in the memory is carried out only if the data loaded during the first loading phase is valid. The second phase includes at least a step in which data is loaded and then validated.
Abstract: The invention relates to a method for rendering content on a mobile equipment. The method includes rendering a content from a broadcasted stream. More specifically, embodiments of the invention include providing a mass memory in the mobile equipment and storing content from the broadcasted stream into the mass memory, where a remote broadcaster entity commands the mobile equipment to store the content from the broadcasted stream to the mass memory.
Abstract: A method for producing a data carrier with a see-through portion is disclosed. The method includes applying a layer of separation material (14) to a surface of one of an at least translucent layer and a backing layer, and fixedly attaching the other of the translucent layer and the backing layer to that surface of the layer. The separation material prevents a part of the backing layer abutting it from being completely fixedly attached to the translucent layer. The method further includes removing at least a portion of the backing layer abutting the separation material to uncover a portion of the translucent layer adjacent the portion of the backing layer. The uncovered portion of the translucent layer defines a see-through portion of the data carrier. A data carrier with such a see-through portion is also disclosed.
Abstract: The invention relates to a method for checking the integrity of a set of data packets received by a receiving communication device from a sending communication device, the data packets of the set being received in unpredictable order. The invention also relates to a communication device implementing a method according to the invention, in particular to a smart card.
Type:
Application
Filed:
October 3, 2007
Publication date:
April 29, 2010
Applicant:
GEMALTO SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli