Patents Assigned to GEMALTO
  • Patent number: 7642630
    Abstract: An electronic device, such as a mini card, has an inlay substrate for the electronic device. The inlay includes a substrate layer, a communication interface having a first metallization supported by the substrate layer, a hole or a hole location area, for attachment to an external device, and a second metallization surrounding at least partially the hole or its location area. The second metallization strengthens the card at the hole area. The method includes realizing the first and second metallizations on the same machine and/or at the same time.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: January 5, 2010
    Assignee: Gemalto, S.A.
    Inventor: Jerome Ajdenbaum
  • Patent number: 7643497
    Abstract: An intermediation apparatus is designed to interconnect at least one service provider and at least one user by using a non-Internet channel. The apparatus includes an intelligent connection management unit for recognizing an incoming protocol and for selecting an outgoing protocol and an outgoing communications channel by referring to databases. A protocol conversion unit controlled by the management unit interconnects a service provider using a channel that implements a first communications protocol and a user using the non-Internet channel that implements a second communications protocol. The non-Internet channel is advantageously a wireless communications channel.
    Type: Grant
    Filed: February 18, 2003
    Date of Patent: January 5, 2010
    Assignee: Gemalto SA
    Inventor: Murielle Rose
  • Publication number: 20090327420
    Abstract: A first user of a first communicating object shares personal data in response to a request from a second user. The shared data are associated with a reference of the second user in the first communicating object and are transmitted to the second communicating object in order to be recorded therein in association with a reference of the first user. The first user controls the shared personal data from the first communicating object by transmitting a control instruction to the second communicating object. The instruction contains at least the reference of the first user in order to find the personal data of the first user in association with the reference in the second communicating object, and to treat the personal data according to the transmitted control instruction.
    Type: Application
    Filed: July 10, 2007
    Publication date: December 31, 2009
    Applicant: GEMALTO SA
    Inventors: Frédéric Faure, Lionel Mallet
  • Publication number: 20090328099
    Abstract: A broadcast system includes a terminal system having a display module for displaying an Electronic Service Guide (ESG) of programs to be broadcasted. The ESG initiates the storing of a program selected through such ESG and broadcasted to the terminal system. The broadcast system includes a module for creating and displaying a local ESG on the terminal system. This local ESG corresponds to programs which have been selected, broadcasted and stored in the terminal system. The local ESG launches the rendering of a stored program in response to actuating a corresponding item in the local ESG.
    Type: Application
    Filed: July 19, 2007
    Publication date: December 31, 2009
    Applicant: GEMALTO SA
    Inventors: Anne-Marie Praden, Hervé Brugal
  • Publication number: 20090328231
    Abstract: The invention concerns a method for protecting the data of an application compiled in intermediate for execution executed on a digital apparatus equipped with a virtual machine managing the execution of the code via a execution stack defining at least one stack frame corresponding to a method called during the execution of the code. A secured execution mode of the code involves the determination of at least one global checksum associated with each stack frame and, each time that a datum of the code is manipulated, the calculation of a local checksum associated with that datum. The calculation is on one hand, on the global checksum associated with the stack frame corresponding to the manipulated datum and, on the other hand, on at least one part of the other data constituting the stack frame.
    Type: Application
    Filed: July 18, 2007
    Publication date: December 31, 2009
    Applicant: GEMALTO SA
    Inventors: Benoit Gonzalvo, Jacques Jean-Alain Fournier
  • Patent number: 7639796
    Abstract: The invention concerns a cryptographic method which includes integer division of the type q=a div b and/or a modular reduction of the type r=a mod b, with q being a quotient, a being a number of m bits, b being a number of n bits, n being not more than m and bn?1 being the most significant bit of the number b. The number a is masked by a random number p before performing the integer division and/or the modular reduction. The invention also concerns an electronic component for implementing the method. The invention is applicable for making smart cards secure against hidden channel attacks, and in particular differential attacks.
    Type: Grant
    Filed: December 11, 2003
    Date of Patent: December 29, 2009
    Assignee: Gemalto SA
    Inventor: Marc Joye
  • Publication number: 20090319488
    Abstract: When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
    Type: Application
    Filed: July 9, 2007
    Publication date: December 24, 2009
    Applicant: GEMALTO
    Inventors: Frederic Faure, Gary Chew, Lionel Martin
  • Publication number: 20090307358
    Abstract: Transmission of data between a download server and a communicating object through a communications network is initiated by a registration server, by transmitting connection parameters received from the download server to the communicating object via a first data channel opened by a first agent of the communicating object after attaching the object to the network. As a function of the connection parameters, a second agent in the communicating object opens a second data channel to the download server so as to transmit the data therein. As long as the first data channel is open, other servers can initiate a transmission via the registration server.
    Type: Application
    Filed: April 24, 2007
    Publication date: December 10, 2009
    Applicant: GEMALTO SA
    Inventors: Stéphane Poujol, Xavier Berard, Patrice Amiel
  • Publication number: 20090224888
    Abstract: The invention relates to a method of reading RF transponders disposed in one and the same magnetic interrogation field, in which a magnetic coupling of the transponders is ensured with a passive resonant circuit during reading. The method is distinguished in that the passive antenna of the resonant circuit is associated with at least one transponder antenna, and the passive resonant circuit is tuned in such a way that the resonant frequency resulting from the association corresponds to one of the frequencies of the emission side bands of the transponder to be read. The invention also relates to the system corresponding to the method, a transponder structure and an object containing the transponder, in particular a travel document.
    Type: Application
    Filed: September 11, 2006
    Publication date: September 10, 2009
    Applicant: Gemalto SA
    Inventor: Jean-Paul Caruana
  • Publication number: 20090210569
    Abstract: The invention relates to an electronic system having at least one host processing electronic device and at least one peripheral electronic device. The peripheral electronic device performs at least two functions. The host processing electronic device and the peripheral electronic device are interconnected via at least one interface. The host processing electronic device and the peripheral electronic device communicate via a single, common, “multi-function” interface, so that the host processing electronic device and the peripheral electronic device exchange at least one item of data relative to each of the two functions via the multi-function interface.
    Type: Application
    Filed: June 22, 2007
    Publication date: August 20, 2009
    Applicant: Gemalto SA
    Inventors: Jean Lusetti, Nathalie Guille
  • Patent number: 7565536
    Abstract: Secure authentication of a user on a host computer to a web server including a security device acquiring trust or a security context from the web server. The security device is operable of providing an X.509 certificate to a browser plug-in on the host computer. The browser plug-in on the host computer performing authentication of the security device and in response providing user credentials to the security device. The security device performing authentication of the user and requests a security context from the web server. In response, the web server provides a security context to the security device. The security device delegates the web server trust by transmitting the context to the host computer and enabling the user to securely access resources on the web server.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: July 21, 2009
    Assignee: Gemalto Inc
    Inventors: Apostol Vassilev, Kapil Sachdeva
  • Patent number: 7558386
    Abstract: In an electronic component using a secret key cryptographic algorithm, one operation utilizes a first table for supplying output data from input data. The output data, and/or derived data, is manipulated by critical instructions. A countermeasure method involves the use of other tables such that the output data and the derived data are unpredictable. The other tables are obtained from the first table by an exclusive-OR operation with a random value, or a derived random value, on one and/or the other of the input and output data of the first table.
    Type: Grant
    Filed: October 29, 1999
    Date of Patent: July 7, 2009
    Assignee: Gemalto SA
    Inventors: Christophe Clavier, Jean-Sébastien Coron
  • Publication number: 20090125643
    Abstract: A system and method to control a device having at least one configurable parameter. Enumerating the device as a first peripheral device and as a second peripheral device wherein the first peripheral device corresponds to a first microcontroller connected to a storage medium and the second peripheral device corresponds to a second microcontroller. Controlling the at least one configurable parameter of the first microcontroller with respect to the storage medium by the second microcontroller. On initialization of the device, transmitting the at least one configurable parameter from the second microcontroller to the first microcontroller. Other systems and methods are disclosed.
    Type: Application
    Filed: November 12, 2007
    Publication date: May 14, 2009
    Applicant: GEMALTO INC
    Inventors: Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D. Shah, Mehdi Asnaashari
  • Publication number: 20090125645
    Abstract: A system and method to control a device having at least one configurable parameter. Enumerating the device as a first peripheral device and as a second peripheral device wherein the first peripheral device corresponds to a first microcontroller connected to a storage medium and the second peripheral device corresponds to a second microcontroller. Controlling the at least one configurable parameter of the first microcontroller with respect to the storage medium by the second microcontroller. On initialization of the device, transmitting the at least one configurable parameter from the second microcontroller to the first microcontroller. Other systems and methods are disclosed.
    Type: Application
    Filed: November 12, 2007
    Publication date: May 14, 2009
    Applicant: GEMALTO INC
    Inventors: Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D Shah, Mehdi Asnaashari
  • Patent number: 7529369
    Abstract: In a data processing device, a first key is produced based on a secret key so that the latter is never used in a clear form. In a preliminary step, the secret key and a random number are applied to a function producing a first key. The first key and the random number are pre-stored in the device. For each data processing, the first key and another random number are applied to another function to produce a second key, and the second key and the stored number are applied as inverse of the function to produce a third key used for processing the data. The device can be a smart card and the data the confidential code presented to the card.
    Type: Grant
    Filed: June 20, 2001
    Date of Patent: May 5, 2009
    Assignee: Gemalto SA
    Inventor: Pascal Guterman
  • Patent number: 7509487
    Abstract: Secure communication between a resource-constrained device and remote network nodes over a network with the resource-constrained acting as a network node. The remote network nodes communicate with the resource-constrained device using un-modified network clients and servers. Executing on the resource-constrained device, a communications module implements one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes and operable to implement network security protocols thereby setting a security boundary inside the resource-constrained device.
    Type: Grant
    Filed: May 19, 2004
    Date of Patent: March 24, 2009
    Assignee: Gemalto Inc.
    Inventors: HongQian Karen Lu, Michael Andrew Montgomery, Asad Mahboob Ali
  • Publication number: 20090064301
    Abstract: A client-side application extension executable on a host computer from within a web-browser having the capability of executing at least one web-browser add-on to provide a user access to a smart card, connected to the host computer having a smart card resource manager, via the web-browser. The web-browser extension has instructions to direct the central processing unit to access data on the smart card via a web-browser and platform independent interface module and a web-browser and platform dependent wrapper module connected to the web-browser and platform independent interface module and to the smart card resource manager having a function processing module operable to receive a call to the at least one function for accessing data on the smart card and for transforming the function call into a corresponding call to the smart card resource manager.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: GEMALTO, INC.
    Inventors: Kapil Sachdeva, Ksheerabdhi Krishna
  • Patent number: 7494068
    Abstract: A contactless transponder includes an antenna made from a conductive material that is disposed on a surface of a substrate. An integrated circuit chip having electrical contacts is mounted on a surface of the antenna that is remote from the substrate. The contacts of the chip are embedded in the material of the antenna, and at least a portion of the chip protrudes above the surface of the plane defined by the remote surface of the antenna.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: February 24, 2009
    Assignee: Gemalto SA
    Inventor: Philippe Patrice
  • Patent number: 7490333
    Abstract: The invention relieves an application programmer of the responsibility for managing access rights, by providing application code that is independent of the protection in a chip card. When an application, for example in a docking station, is given access to an object pertaining to another application in a chip card, two capabilities are created respectively in the applications, as objects, to protect all subsequent accesses to the object by filtering them through the two capabilities. On accessing an object pertaining to an application, if a second object pertaining to the other application is passed on to the latter, two other capabilities are added in the applications to protect access to the second object.
    Type: Grant
    Filed: December 8, 2000
    Date of Patent: February 10, 2009
    Assignee: Gemalto SA
    Inventors: Gilles Grimaud, Daniel Hagimont, Jean-Jacques Vandewalle
  • Patent number: 7486794
    Abstract: A data-processing arrangement (3) comprises a data-handling circuit (4) and a supply-current circuit (8) whose dynamic behavior is inherently chaotic in the sense of Lyapunov. The data-processing arrangement is arranged so that a power supply current (io) consumed by the data-handling circuit flows through the supply-current circuit.
    Type: Grant
    Filed: July 11, 2001
    Date of Patent: February 3, 2009
    Assignee: Gemalto SA
    Inventor: Fabrice Pautot