Abstract: An electronic device, such as a mini card, has an inlay substrate for the electronic device. The inlay includes a substrate layer, a communication interface having a first metallization supported by the substrate layer, a hole or a hole location area, for attachment to an external device, and a second metallization surrounding at least partially the hole or its location area. The second metallization strengthens the card at the hole area. The method includes realizing the first and second metallizations on the same machine and/or at the same time.
Abstract: An intermediation apparatus is designed to interconnect at least one service provider and at least one user by using a non-Internet channel. The apparatus includes an intelligent connection management unit for recognizing an incoming protocol and for selecting an outgoing protocol and an outgoing communications channel by referring to databases. A protocol conversion unit controlled by the management unit interconnects a service provider using a channel that implements a first communications protocol and a user using the non-Internet channel that implements a second communications protocol. The non-Internet channel is advantageously a wireless communications channel.
Abstract: A first user of a first communicating object shares personal data in response to a request from a second user. The shared data are associated with a reference of the second user in the first communicating object and are transmitted to the second communicating object in order to be recorded therein in association with a reference of the first user. The first user controls the shared personal data from the first communicating object by transmitting a control instruction to the second communicating object. The instruction contains at least the reference of the first user in order to find the personal data of the first user in association with the reference in the second communicating object, and to treat the personal data according to the transmitted control instruction.
Abstract: A broadcast system includes a terminal system having a display module for displaying an Electronic Service Guide (ESG) of programs to be broadcasted. The ESG initiates the storing of a program selected through such ESG and broadcasted to the terminal system. The broadcast system includes a module for creating and displaying a local ESG on the terminal system. This local ESG corresponds to programs which have been selected, broadcasted and stored in the terminal system. The local ESG launches the rendering of a stored program in response to actuating a corresponding item in the local ESG.
Abstract: The invention concerns a method for protecting the data of an application compiled in intermediate for execution executed on a digital apparatus equipped with a virtual machine managing the execution of the code via a execution stack defining at least one stack frame corresponding to a method called during the execution of the code. A secured execution mode of the code involves the determination of at least one global checksum associated with each stack frame and, each time that a datum of the code is manipulated, the calculation of a local checksum associated with that datum. The calculation is on one hand, on the global checksum associated with the stack frame corresponding to the manipulated datum and, on the other hand, on at least one part of the other data constituting the stack frame.
Type:
Application
Filed:
July 18, 2007
Publication date:
December 31, 2009
Applicant:
GEMALTO SA
Inventors:
Benoit Gonzalvo, Jacques Jean-Alain Fournier
Abstract: The invention concerns a cryptographic method which includes integer division of the type q=a div b and/or a modular reduction of the type r=a mod b, with q being a quotient, a being a number of m bits, b being a number of n bits, n being not more than m and bn?1 being the most significant bit of the number b. The number a is masked by a random number p before performing the integer division and/or the modular reduction. The invention also concerns an electronic component for implementing the method. The invention is applicable for making smart cards secure against hidden channel attacks, and in particular differential attacks.
Abstract: When a user records confidential data in a communicating object, the user inputs the confidential data which are encoded and transmitted, with a reference of the user, towards a server in order to record the encoded confidential data in association with the reference. When a user searches for a reference of another user of a communicating object in the communicating object, the user inputs a search datum which is encoded and transmitted to the server for comparing therein the encoded search datum transmitted to all of the encoded confidential data recorded in the server. The server transmits a reference associated with an encoded confidential datum corresponding to the encoded search data to the communicating object. In this way, the user of the communicating object is put into contact with the other user without knowing the data of the other user.
Type:
Application
Filed:
July 9, 2007
Publication date:
December 24, 2009
Applicant:
GEMALTO
Inventors:
Frederic Faure, Gary Chew, Lionel Martin
Abstract: Transmission of data between a download server and a communicating object through a communications network is initiated by a registration server, by transmitting connection parameters received from the download server to the communicating object via a first data channel opened by a first agent of the communicating object after attaching the object to the network. As a function of the connection parameters, a second agent in the communicating object opens a second data channel to the download server so as to transmit the data therein. As long as the first data channel is open, other servers can initiate a transmission via the registration server.
Abstract: The invention relates to a method of reading RF transponders disposed in one and the same magnetic interrogation field, in which a magnetic coupling of the transponders is ensured with a passive resonant circuit during reading. The method is distinguished in that the passive antenna of the resonant circuit is associated with at least one transponder antenna, and the passive resonant circuit is tuned in such a way that the resonant frequency resulting from the association corresponds to one of the frequencies of the emission side bands of the transponder to be read. The invention also relates to the system corresponding to the method, a transponder structure and an object containing the transponder, in particular a travel document.
Abstract: The invention relates to an electronic system having at least one host processing electronic device and at least one peripheral electronic device. The peripheral electronic device performs at least two functions. The host processing electronic device and the peripheral electronic device are interconnected via at least one interface. The host processing electronic device and the peripheral electronic device communicate via a single, common, “multi-function” interface, so that the host processing electronic device and the peripheral electronic device exchange at least one item of data relative to each of the two functions via the multi-function interface.
Abstract: Secure authentication of a user on a host computer to a web server including a security device acquiring trust or a security context from the web server. The security device is operable of providing an X.509 certificate to a browser plug-in on the host computer. The browser plug-in on the host computer performing authentication of the security device and in response providing user credentials to the security device. The security device performing authentication of the user and requests a security context from the web server. In response, the web server provides a security context to the security device. The security device delegates the web server trust by transmitting the context to the host computer and enabling the user to securely access resources on the web server.
Abstract: In an electronic component using a secret key cryptographic algorithm, one operation utilizes a first table for supplying output data from input data. The output data, and/or derived data, is manipulated by critical instructions. A countermeasure method involves the use of other tables such that the output data and the derived data are unpredictable. The other tables are obtained from the first table by an exclusive-OR operation with a random value, or a derived random value, on one and/or the other of the input and output data of the first table.
Abstract: A system and method to control a device having at least one configurable parameter. Enumerating the device as a first peripheral device and as a second peripheral device wherein the first peripheral device corresponds to a first microcontroller connected to a storage medium and the second peripheral device corresponds to a second microcontroller. Controlling the at least one configurable parameter of the first microcontroller with respect to the storage medium by the second microcontroller. On initialization of the device, transmitting the at least one configurable parameter from the second microcontroller to the first microcontroller. Other systems and methods are disclosed.
Type:
Application
Filed:
November 12, 2007
Publication date:
May 14, 2009
Applicant:
GEMALTO INC
Inventors:
Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D. Shah, Mehdi Asnaashari
Abstract: A system and method to control a device having at least one configurable parameter. Enumerating the device as a first peripheral device and as a second peripheral device wherein the first peripheral device corresponds to a first microcontroller connected to a storage medium and the second peripheral device corresponds to a second microcontroller. Controlling the at least one configurable parameter of the first microcontroller with respect to the storage medium by the second microcontroller. On initialization of the device, transmitting the at least one configurable parameter from the second microcontroller to the first microcontroller. Other systems and methods are disclosed.
Type:
Application
Filed:
November 12, 2007
Publication date:
May 14, 2009
Applicant:
GEMALTO INC
Inventors:
Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D Shah, Mehdi Asnaashari
Abstract: In a data processing device, a first key is produced based on a secret key so that the latter is never used in a clear form. In a preliminary step, the secret key and a random number are applied to a function producing a first key. The first key and the random number are pre-stored in the device. For each data processing, the first key and another random number are applied to another function to produce a second key, and the second key and the stored number are applied as inverse of the function to produce a third key used for processing the data. The device can be a smart card and the data the confidential code presented to the card.
Abstract: Secure communication between a resource-constrained device and remote network nodes over a network with the resource-constrained acting as a network node. The remote network nodes communicate with the resource-constrained device using un-modified network clients and servers. Executing on the resource-constrained device, a communications module implements one or more link layer communication protocols, operable to communicate with a host computer, operable to communicate with remote network nodes and operable to implement network security protocols thereby setting a security boundary inside the resource-constrained device.
Type:
Grant
Filed:
May 19, 2004
Date of Patent:
March 24, 2009
Assignee:
Gemalto Inc.
Inventors:
HongQian Karen Lu, Michael Andrew Montgomery, Asad Mahboob Ali
Abstract: A client-side application extension executable on a host computer from within a web-browser having the capability of executing at least one web-browser add-on to provide a user access to a smart card, connected to the host computer having a smart card resource manager, via the web-browser. The web-browser extension has instructions to direct the central processing unit to access data on the smart card via a web-browser and platform independent interface module and a web-browser and platform dependent wrapper module connected to the web-browser and platform independent interface module and to the smart card resource manager having a function processing module operable to receive a call to the at least one function for accessing data on the smart card and for transforming the function call into a corresponding call to the smart card resource manager.
Abstract: A contactless transponder includes an antenna made from a conductive material that is disposed on a surface of a substrate. An integrated circuit chip having electrical contacts is mounted on a surface of the antenna that is remote from the substrate. The contacts of the chip are embedded in the material of the antenna, and at least a portion of the chip protrudes above the surface of the plane defined by the remote surface of the antenna.
Abstract: The invention relieves an application programmer of the responsibility for managing access rights, by providing application code that is independent of the protection in a chip card. When an application, for example in a docking station, is given access to an object pertaining to another application in a chip card, two capabilities are created respectively in the applications, as objects, to protect all subsequent accesses to the object by filtering them through the two capabilities. On accessing an object pertaining to an application, if a second object pertaining to the other application is passed on to the latter, two other capabilities are added in the applications to protect access to the second object.
Type:
Grant
Filed:
December 8, 2000
Date of Patent:
February 10, 2009
Assignee:
Gemalto SA
Inventors:
Gilles Grimaud, Daniel Hagimont, Jean-Jacques Vandewalle
Abstract: A data-processing arrangement (3) comprises a data-handling circuit (4) and a supply-current circuit (8) whose dynamic behavior is inherently chaotic in the sense of Lyapunov. The data-processing arrangement is arranged so that a power supply current (io) consumed by the data-handling circuit flows through the supply-current circuit.