Abstract: A card-like portable article having a microcontroller comprises a memory that contains a set of instructions allowing the microcontroller to communicate in accordance with a first communication protocol. The card-like portable article further comprises an interface for converting commands in accordance with the first communication protocol into commands in accordance with a second communication protocol and vice versa. Preferably, the first communication protocol is in conformity with the ISO 7816-3 standard and the second communication protocol is in conformity with the USB standard.
Abstract: The invention proposes an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value nL (n being for example equal to 2) that he can parceled and spend anonymously and unlinkably. The invention allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a tree structure without using a trusted third party.
Abstract: A system and method for establishing uniqueness in type definition names. Each application vendor has associated therewith a unique data sequence. The data sequence is combined with the type definition name and then a digital operation is performed to produce a unique digital identifier that is used in place of the type name.
Abstract: A system comprises a first communication device and a second communication device. The first communication device is arranged to communicate with the second communication device via a communication network using a first communication protocol. The first communication device is arranged to send a message to the second communication device via the communication network using the first communication protocol. The message is designed for a second communication protocol. The second communication device is arranged to send the message to a third communication device. The third communication device is being arranged to understand the second communication protocol.
Abstract: A smart card includes a card bearing a module that is made up of a support supporting at least an electronic chip. The support is fixed on one surface of the card. This surface extends up to at least one of the edges of the card.
Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
Type:
Application
Filed:
October 3, 2007
Publication date:
March 25, 2010
Applicant:
GEMALTO SA
Inventors:
Stephanie Salgado, David Vigilant, Guillaume Fumaroli
Abstract: A data processing system (CAR), particularly a smart card coupled to a communication device (MOB), communicating with a remote entity (OP). The data processing system has a location for storing a file (F) which can be downloaded from said remote entity, A program (GS) of the data processing system performs the following steps: before performing data correction in the system, a checking step in which said program (GS) checks whether a file (F) has been downloaded, if such a file (F) is present, the program (GS) modifies the application (APP) on the basis of the data stored in the file (F).
Abstract: The invention concerns a device and a method for controlling a portable object life cycle, in particular a smart card, the life cycle being determined by successive state transitions, which states determine the services offered by the object. The object includes a processing unit, program storage units and data storage units, each storage unit having a content defining a plurality of configurations. The device controls the transition from a first state to a second state of the object and, preferably triggers actions when the transition crossover from one state to another occurs or when a transition crossover request is denied. The actions are dependent on the type of transitions implied in the requests for state transition crossover applied to the object.
Type:
Grant
Filed:
November 3, 1999
Date of Patent:
March 16, 2010
Assignee:
Gemalto SA
Inventors:
Marc Birkner, Jean-Luc Giraud, Laurent Talvard
Abstract: The invention concerns an anti-pirate method for the distribution of digital content by pro-active diversified transmission, associated transmitter device and portable receiving object. The method, designed to make the same information (Kc) available to several receivers (1) belonging to a group (G) of receivers, each receiver storing information (SAi) specific to it, is characterized in that it includes the following steps: define a relation Kc=f(K, bi, SAi) where (f) is a given function, (K) is information common to all the receivers, and (bi) is information different for each receiver and for each value of the information (K); —enable each receiver to access information (bi) before making (Kc) available; and transmit the information (K) to all receivers, just before making (Kc) available; so that each receiver can calculate information (Kc) using said relation.
Abstract: A data carrier is provided having a see-through portion (24) that allows revealing security features (36) with a different appearance on each of its sides (S1, S2) under special lighting conditions, and a method for making such a data carrier. The see-through portion has an improved security, which is more difficult to reproduce by infringers.
Abstract: Updating the access control of a smart card at multiple points of the smart card life cycle. The system and method for updating the access control mechanisms during the smart card life cycle includes implementing an interface having a method for providing access control and a method for registering an access manager as an active access manager. In response to a request to register an access manager, the system and method executes the method for determining whether registering the access manager may be allowed.
Abstract: The invention concerns a method for making smart cards capable of operating with or without contact called mixed cards and contactless smart cards. In order to avoid the risk of deteriorating the antenna the method consists in producing an antenna comprising at least two turns, on a support sheet, said antenna having its turns located outside the connecting pads, and in providing an insulating bridge so as to connect each of the antenna ends to a connection pad respectively.
Type:
Grant
Filed:
August 6, 2007
Date of Patent:
February 16, 2010
Assignee:
Gemalto, S.A.
Inventors:
Stephane Ayala, Gerard Bourneix, Christine Beausoleil, David Martin, Laurent Odduo, Philippe Patrice, Michael Zafrany
Abstract: The invention relates to a personal token running a series of applications, wherein said personal token includes a thread controller which transmits data from the applications to an external device in a cyclic way, a cycle being constituted of a series of data transfers from the applications and to the external device, a cycle comprising a respective number of data transfers dedicated to each respective application which is different according to the respective application, the number of data transfers for a respective application in a cycle corresponding to a priority level of the application as taken into account by the thread controller.
Abstract: The invention relates to a method for executing at least one program pertaining to at least one service included in a device having at least one memory space intended to be allocated for executing at least one of the services, and at least two access points for accessing services accessible from a network external to the device. The device associates a centralizing service with at least two access points and allocates a memory space to a service for receiving a request to connect to one of the services. The centralizing service is executed, making it possible to await reception of a connection request. In the absence thereof, only the centralizing service has the use of an allocated memory space. The invention also relates to a corresponding electronic device and system.
Abstract: The invention relates to a method for synchronizing personal data between a memory of at least one mobile equipment unit and an external device. Each of the mobile equipment units includes or is connected to a SyncML synchronization client. The external device can include a SyncML synchronization server associated with the SyncML synchronization client. In one embodiment the external device is a smart card. The smart card is associated with the mobile equipment unit and the SyncML synchronization client transmits a synchronization request to the SyncML synchronization server. The SyncML synchronization server synchronizes the personal data between the smart card and the mobile equipment unit.
Abstract: In order to rapidly load from a server (1) an application to be deployed (AP) in a terminal (2) and a chip card (3), a message (MAP) containing both a first application part and second application part formatted so as to be compatible with a protocol for communication between the terminal and the card is transmitted by the server to the terminal, which stores the two parts. The first part (APT) extracted from the application message (MAP) is installed in the terminal. A specific loader (CAPC) loads the second part (APC) extracted from the message according to the communication protocol. The installations of the two application parts are thus synchronous under the control of the terminal.
Abstract: A system and method of operating a device connected to a host computer in a manner to preserve knowledge of logon authentication status to the host computer. Upon initialization of the device perform a pattern matching operation of an instruction sequence received by the second microcontroller. When the instruction sequence matches a prestored sequence indicative of performance of a logon process on the host computer tracking a logon state by the second microcontroller. Exchanging the logon state between the second and first microcontrollers such that when the second microcontroller resets, the second microcontroller may recover the logon state from the first microcontroller. Other systems and methods are disclosed.
Type:
Application
Filed:
November 12, 2007
Publication date:
January 28, 2010
Applicant:
GEMALTO INC
Inventors:
Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D. Shah, Mehdi Asnaashari
Abstract: A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device. Determining a firmware update portion and an encrypted hash portion of the firmware update package wherein the encrypted hash portion is cryptographically signed by a signatory. Confirm that the encrypted hash portion conforms to the firmware update by independently computing the hash of the encrypted firmware update portion on the first microcontroller and comparing that value to the signed hash. Other systems and methods are disclosed.
Type:
Application
Filed:
November 12, 2007
Publication date:
January 28, 2010
Applicant:
GEMALTO INC
Inventors:
Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D. Shah, Mehdi Asnaashari
Abstract: The invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.
Abstract: An antennae device for reading electronic labels includes passive antennae arranged in the form of an array comprising L lines and C columns. The antennae are located in the array by co-ordinates (i, j), i ranging from 1 to L, j ranging from 1 to C. Each antenna (i, j) is controlled by two control switches, one controlling the antennae located on a line i, the other controlling the antennae located on a column j.