Abstract: The invention relates to a module with integrated circuit chip, comprising an insulating substrate, metallisations comprising conductive tracks produced on one side of the substrate, forming an antenna and comprising two connection ends, and a coating area or location of the radiofrequency integrated circuit chip and of a device in the form of a surface-mounted device, the radiofrequency integrated circuit chip and the device being disposed on the same face of the substrate and connected to the antenna. The metallisations are on a single same side of the insulating substrate, the connection being made by means of perforations through the insulating film or directly on the surface metallisations.
Type:
Application
Filed:
December 13, 2016
Publication date:
December 6, 2018
Applicant:
GEMALTO SA
Inventors:
Remy Janvrin, Line Degeilh, Lucile Dossetto, Stéphane Ottobon
Abstract: The present invention relates to a method for operating a wireless device, said wireless device being adapted for communicating with a cellular network by means of a serving base node, being the one of a plurality of base nodes of the cellular network the wireless device is currently camping on, configured to support extended coverage mode, the method comprising for the wireless device the steps of: —determining an extended coverage support level, relating to the capability of the wireless device for operating in extended coverage mode, —receiving extended coverage maximum support level broadcasted by a plurality of base nodes, —selecting one of the plurality of base nodes for registration as serving base node, —providing upon registration with the selected base node its extended coverage support level towards the base node.
Abstract: The present invention concerns a method of radio-frequency communication between a contactless transponder and a reader, in which at least one sideband of the carrier frequency is used for communicating a response from the transponder by modulation of the amplitude of this carrier frequency. The method is distinguished in that the modulation at least partly applies a modulation level greater than 100%, which causes a negative modulation. The invention also concerns a corresponding communication circuit.
Abstract: The invention relates to a method of reading RF transponders disposed in one and the same magnetic interrogation field, in which a magnetic coupling of the transponders is ensured with a passive resonant circuit during reading. The method is distinguished in that the passive antenna of the resonant circuit is associated with at least one transponder antenna, and the passive resonant circuit is tuned in such a way that the resonant frequency resulting from the association corresponds to one of the frequencies of the emission side bands of the transponder to be read. The invention also relates to the system corresponding to the method, a transponder structure and an object containing the transponder, in particular a travel document.
Abstract: Method of producing wire inlaid on a support and inlaid wire obtained. The invention relates to an antenna for radiofrequency transponder, said antenna comprising conducting wire portions which are to a major extent inlaid and conducting wire portions which are to a minor extent non-inlaid on a plane support. The antenna is characterized in that said wire portions which are to a minor extent non-inlaid extend over or cross at least one favoured fold line and/or one fold line predefined according to a standardized folding resistance test. The invention also relates to a portable electronic object comprising said antenna and a corresponding method of production.
Type:
Application
Filed:
November 14, 2016
Publication date:
November 15, 2018
Applicant:
GEMALTO SA
Inventors:
Sébastien GASPARI, Blandine ALLEYSSON, Elisabeth KERGUEN, Olivier LEVEQUE
Abstract: The invention relates to a method for manufacturing a device with a secure integrated-circuit chip, said device having an insulating substrate, electrically conductive surfaces on the substrate, which surfaces are connected or coupled to said electronic chip, said electrically conductive surfaces being produced by a step of depositing or transferring conductive material; the method is characterised in that said step of depositing or transferring conductive material is carried out by a technique of directly depositing metal microparticles, which are free of polymer or solvent, onto the substrate, said deposit being obtained by coalescence of the microparticles forming at least one or more uniform cohesive layers that rest directly in contact with the substrate. The invention also relates to the device obtained.
Type:
Application
Filed:
October 28, 2016
Publication date:
November 8, 2018
Applicant:
GEMALTO SA
Inventors:
Line Degeilh, Remy Janvrin, Lucile Dossetto, Alain Le Loc'h, Jean-Christophe Fidalgo
Abstract: The invention relates to a method for loading at least one native code on at least one target secure element comprising a java card virtual machine, said method comprising the following steps: providing a modified CAP file composed of at least one custom CAP component comprising a native code; extracting said native code from the custom CAP component; installing said native code in the target secure.
Type:
Grant
Filed:
September 26, 2014
Date of Patent:
November 6, 2018
Assignee:
GEMALTO SA
Inventors:
Francois Bogusz, Francois Millet, Julien Glousieau, Abdellah El Marouani, Andre Sintzoff, Ilyas Landikov
Abstract: The invention is a method for managing an application that includes a generic part and an additional part. The generic part is pre-installed on a device. The device gets a fingerprint of itself and after a user authentication sends to a server a request for getting the additional part. The request comprises credentials associated with the user or a reference of the user, the fingerprint and a reference of the application. The server generates a ciphered part of the additional part using a key based on both the credentials and the fingerprint and builds an auto-decrypt program configured to decipher the ciphered part. The device receives the ciphered part and the auto-decrypt program. It gets the fingerprint and the credentials and retrieves the additional part by running the auto-decrypt program with said fingerprint and credentials as input parameters.
Abstract: The invention proposes a method for cloning a first secure element from a backup secure element of a user, said backup secure element comprising at least credentials of said user. The method comprises a preliminary phase of checking the authenticity of the first secure element using a second secure element, said second secure element being able to be paired with a third secure element.
Abstract: A method, a device and a system for printing a three dimensional object are disclosed. A printing device, as a first device, or a second device stores predetermined data relating to one or several printings. The second device cooperates with the first device. The first or the second device stores a predetermined printing threshold. The first or the second device determines and stores, during a printing of the three dimensional object, at least one current printing progress rate. The first or the second device compares the current printing progress rate to the predetermined printing threshold. As soon as the current printing progress rate is greater than or equal to the predetermined printing threshold, the first or the second device updates the data relating to one or several printings, so as to validate the printing of the three dimensional object.
Abstract: The invention is a method for managing applications in a secure element comprising a communication interface. An application is installed in the secure element and configured to be implicitly selected on the communication interface. The method comprises the following steps: —the secure element receives a command requesting the installation of a new application configured to be implicitly selected on the communication interface, —upon receipt of the command, the secure element installs the new application, configures the new application to be implicitly selected on the communication interface and keeps the previous application unchanged.
Abstract: The present invention relates to a server comprising at least an application outputting at least one cookie, the server including a scrambled cookie names generator, a correspondence mechanism associating connections attributes for the application with an unpredictable scrambled cookie name, the scrambled cookie name being the one provided in the cookie sent to client side for use in the next connections to the application.
Abstract: The invention is a method of updating a first executable code comprised in a first package in a secure element, a class instance being instantiated from said first package and comprising instance data. The method comprises the following steps: loading in the secure element an upgrade file comprising a second executable code and creating a second package from said upgrade file, changing said first executable code for said second executable code by replacing a reference to the first package by a reference to the second package in a package list stored in the secure element, while leaving the class instance alive and said instance data unchanged.
Abstract: A requester device sends to a server a request for proving a piece of user information and data identifying a requester. The server generates requester authentication data and associated data identifying a transaction. The server generates a proof of user information using the piece of user information and the requester authentication data. The server sends to the requester device, as a request response, the proof of user information and the associated data identifying the transaction. A verifier device sends to the server a request for getting authentication data associated with data identifying a transaction and the associated data identifying the transaction. The server sends to the verifier device, as a request response, authentication data associated with the data identifying the transaction. The verifier device or a verifier authenticates the piece of user information only if the received authentication data matches the requester authentication data.
Abstract: The invention relates to a method for producing an intermediate device comprising an electronic module, said intermediate device being used to receive at least one film or portion of a film or covering layer, said device comprising: a supporting body; at least one area for the interconnection of an electric circuit, borne by the supporting body; and an electronic module connected to said interconnection area by an anisotropic connection material, said material being compressed between said area and the module. The method comprises the implementation of a means for maintaining the compressed state of said anisotropic material and/or a means for isolating said material from the outside of the supporting body.
Abstract: The invention relates to an electronic module comprising a first metal layer including at least one contact pad or a conductive pad for connection or interconnection, an insulating layer that is electrically connected to the metal layer via a first surface, a second metal layer connected to the insulating layer on the opposite surface thereof, a chip location or an electronic chip electrically connected to the at least one contact pad through openings in the insulating layer, characterized in that the insulating layer is an adhesive.
Type:
Grant
Filed:
June 19, 2014
Date of Patent:
October 2, 2018
Assignee:
GEMALTO SA
Inventors:
Stéphane Ottobon, Lucile Dossetto, Line Degeilh
Abstract: The invention relates to a method for authenticating to a mobile network. According to the invention, the method comprises the following steps. A device activates only a first temporary subscription identifier. The device sends to a first server the first temporary subscription identifier and first data. The first server sends to the device a first result message including an authentication failure based upon the first data. The device activates only a second temporary subscription identifier. The device sends to the first server the second temporary subscription identifier and second data. And the first server sends to the device a second result message including an authentication success based upon the associated first and second temporary subscription identifiers and the second data. The invention also relates to corresponding device and system and a server for authenticating devices to a mobile network.
Type:
Application
Filed:
November 4, 2016
Publication date:
September 27, 2018
Applicant:
GEMALTO SA
Inventors:
Daniel MAVRAKIS, François ZANNIN, Hervé TROADEC, Jean-François KUC, Pierre GIRARD
Abstract: The present invention relates to a method to authenticate a subscriber (IMSIi) within a local network (LNj) comprising preliminary step of deriving a subscriber key (SMKi) in local keys (LKi), one local key (LKiLNj) for each local network (LNj) the subscriber (IMSIi) is authorized to access, provisioning each local network (LNj) the subscriber (IMSIi) is authorized to access with its own local key (LKiLNj). When an authentication is required in a given local network (LNj), an UICC application derives a local key (LKiLNj) in the UICC application of the subscriber (IMSIi) using the network identifier (LNj), the key derivation function (KDF) and the subscriber key (SMKi) and use the derived local key (LKiLNj) in the algorithm to perform local authentication in the local network (LNj).