Abstract: The disclosure relates to a method for managing the triggering of an application in a terminal place in an environment consisting of-several access technologies. The disclosure also relates to a mobile telephone type terminal that implements the method. A test mechanism is implemented for at least one application on the basis of information contained in the tested application when a triggering event occurs for an application, thereby making it possible to recognize or deduce the network access technologies supported by the application.
Abstract: Flux-switching electrical machines. In particular, a flux-switching electrical machine having a stator and a rotor. The stator has permanent magnets, armature windings and excitation windings, and the rotor has no winding or permanent magnet but includes a plurality of flux-switching teeth. The stator is generally formed by a succession of elementary cells, each cell being intended to interact with only a single tooth of the rotor at a time. Each cell includes one of the permanent magnets; a first slot for at least partly housing one of the excitation windings at least; and second slots for housing one of the armature windings.
Type:
Application
Filed:
March 8, 2007
Publication date:
February 18, 2010
Applicant:
GEMPLUS
Inventors:
Emmanuel Kiên Lôc Hoang, Michel Roger René Lecrivain, Mohamed Gabsi
Abstract: The invention relates to a method for handling data between two memory areas of an electronic component having at least one working memory area for carrying out operations on the component, which bring into play at least some of the data. The same memory areas are used for executing an operation, whatever the operation to be executed is, in such a manner that each operation has a hidden signal trace that is identical in terms of location leakage outside the component.
Type:
Application
Filed:
October 27, 2006
Publication date:
February 18, 2010
Applicant:
GEMPLUS
Inventors:
Benoit Chevallier-Mames, Mathieu Ciet, Karine Villegas, Jacques Fournier
Abstract: A cryptographic method carries out a modular exponentiation of the type C=A<B1> mod N, where A is an operand, B1 is a first exponent, N is a modulus and C is a result. The method includes the steps of masking the operand A by a number s, carrying out a modular exponentiation of the masked operand by the exponent B1, and de masking the result of the exponentiation, by removing a contribution from the random number s from the result of the exponentiation. During the step of masking the operand A, the operand A is multiplied by a parameter of the form K<s.B2>, where K is a constant and B2 is a second exponent such that B1.B2=1 mod N. The method is implemented preferably by using a Montgomery multiplier. The preferred choice for the constant K is K=2P, p being an integer lying between 0 and n, n being an upper bound of the size of the modulus N and conventionally depending on the choice of implementation of the Montgomery multiplication.
Abstract: A catalyst is described which comprises at least one zeolite with structure type EUO, at least one zeolite selected from IM-5 zeolite and zeolites with structure type MFI, MOR, BEA and MTW, at least one group VIII metal, at least one group IIIA metal and at least one porous mineral matrix. The catalyst of the invention is used in a process for isomerizing a feed comprising aromatic compounds containing 8 carbon atoms per molecule.
Type:
Application
Filed:
November 3, 2006
Publication date:
December 3, 2009
Applicant:
GEMPLUS
Inventors:
Emmanuelle Guillon, Eric Sanchez, Sylvie Lacombe
Abstract: A contactless transponder includes an antenna and an electronic module placed on a substrate and connected to the antenna by a conducting wire passing through the contact pads in the form of at least one stitch. The module is produced as a single block, having at least one integrated circuit and contact pads. The module is transferred to the substrate before connection to the antenna.
Abstract: The invention relates to an integrated circuit comprising at least one microprocessor [12] linked to at least one non-volatile memory [14] that can be accessed by sectors. The integrated circuit comprises a detector [20] for discovering when a threshold number of bad sectors has been exceeded in said non-volatile memory [14].
Abstract: The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the invention, a terminal, such as a mobile device, which is associated with a portable communicating object, such as a multimedia smart card, includes an agent for facilitating access from a server to a mass storage unit capable of storing multimedia data and a security storage unit in the portable communicating object via a communication network. The agent establishes a single communication channel between the remote server and the terminal and processes data transmitted from one of the two elements including the server and one of the storage units of the portable communicating object to the agent so that the agent can transmit the data to the other of the two elements.
Type:
Application
Filed:
February 2, 2007
Publication date:
September 3, 2009
Applicant:
GEMPLUS
Inventors:
Frederic Martinent, Anthony Bord, Franck Mosse
Abstract: A method for producing a portable electronic object having contact pads arranged on a plane with a thickness which differs from the thickness of a standard smartcard. The object is electrically connected to data transfer station connectors, by delivering a data transfer station having an electric probe connector and submitting the object to the data transfer station in such a way that the contact pads thereof are accessible to the electric probes in a direction perpendicular to the plane. Objects obtainable include UBS keys or PCMCIA cards or readers.
Abstract: A cryptographic operation includes calculating a multiplication of an element of an additively denoted group by a scalar. After two registers R0+R1, are initialized iterations are carried out over the components Ki of the scalar K. If Ki of the scalar equals 0, then the value in register R1 is replaced by 2(R0+R1) If Ki equals 1, the value in register R0 is replaced by 2(R0+R1). At the end of the algorithm, the value of the register R0 is returned as the calculated result This method poses the advantage of carrying out a calculation of multiplying by a scalar by carrying out only doubling and adding operations of the type 2(A+B).
Abstract: A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data.
Abstract: The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a personal identification number of a chip card application is input erroneously. When this number reaches a threshold, the application or the chip card is blocked. The erroneous input count and unblocking the chip card or the application is restarted when the personal identification number of the chip card is input. In this way, PIN-secured applications offer a high level of security without requiring the storing of additional unblocking data.
Abstract: The invention relates to a method for the secure deposition of data, according to which a depositor encrypts the data with a transfer key and encrypts the transfer key with a key of a third party, then deposits the encrypted data and the encrypted transfer key on a storage support. The invention also relates to a method for recovering data, during which an addressee of the data recovers the content of the storage support, authenticates him/herself to the third party, and transmits the encrypted transfer key thereto. After having authenticated the addressee, the third party returns the decrypted transfer key. The addressee can then recover the data. The invention further relates to devices for implementing the foregoing methods.
Abstract: The invention relates to a method of creating a forgery-proof customised and/or printed graphic element on a support using an electromagnetic beam. At least one official marking seal is used which can divert and/or deform an electromagnetic beam. The support is printed or customised using the electromagnetic beam, which is diverted and/or deformed by the official marking seal. The invention also relates to the support thus obtained and to the official marking seal.
Abstract: A portable electronic device has a case including: a smart chip, an application which is stored in the smart chip, at least one interface for a user, and a microcontroller which controls the smart chip and the interface. The aforementioned microcontroller is configured to execute the primitive functions of the electronic key in order for the interface to be used, while the smart chip is configured to execute the application. The application is configured to generate calls to the primitive functions in order to communicate with the user by means of the interface.
Abstract: The invention relates to a method of electronically signing a message m, characterized in that it uses: p a prime integer, q a prime integer divider of (p?1), g, an element of order q of the set Zp of integers modulo p, H and G, hash functions, x a private key and y, for example y=g?x mod p, a public key of the set Zp, to carry out the following steps, consisting in: E1: generating k, a random number k of the set Zq of integers modulo q, and calculating u=gk mod p, h=H(u), z=hx mod p and v=hk mod p, E2: calculating c=G (m, g, h, y, z, u, v) and s=k+c.x mod q, and E3: producing an electronic signature of the message m equal to (z, s, c). The invention also relates to a verification method and a signature scheme associated with the signature method.
Abstract: The invention relates to a method for the laser marking of a support having a body and a cover sheet. A laser beam is used to etch the body of the support through the thickness of the cover sheet. The support is laminated either during or after the laser marking in order to reduce or prevent deformations in the cover sheet resulting from etching.
Abstract: An asymmetrical cryptographic method applied to a message M includes a private operation of signing or decrypting the message M to obtain a signed or decrypted message s. The private operation is based on at least one modular exponentiation EM in the form EM=MA mod B, A and B being respectively the exponent and the modular exponentiation EM. The private operation includes the following steps: calculating an intermediate module B*, an intermediate message M* and an intermediate exponent A*, based on B, M and/or A; the intermediate module B* being deterministically calculated and the intermediate message M* being randomly calculated; calculating an intermediate modular exponentiation EM*=MA mod B*; and calculating the signed or decrypted message s based on the intermediate modular exponentiation EM*. An electronic component for implementing the cryptographic method is also disclosed.
Abstract: A method of assessing compatibility between at least one application and at least one processing device that host and/or executes and/or interacts with the application. A comparison is carried out between: (i) at least one profile from among the profiles associated with the devices, that respectively describe the functions supported by each device, and (ii) at least one profile from among the profiles associated with the applications that respectively describe the functions used by each application, in order to sutomatically establish an analysis of the functional compatibility between one or more applications and one or more devices.
Abstract: A method for processing digital data X of an item of software coded on lx bits, for detecting faults in an electronic circuit comprising at least one bus, a processing unit, a memory for running the software, and a hardware architecture. The digital data X is transformed into digital data Z coded on lx+ly bits, the additional ly bits being the result of an integrity function f applied to the data X. The digital data Z is processed by the set of hardware resources of the circuit, these hardware resources working on words of lx+ly bits. The integrity of data Z is verified during the processing step.
Type:
Application
Filed:
July 19, 2006
Publication date:
May 14, 2009
Applicant:
Avenue du Pic de Bertagne, Parc d'Activite de Gemplus