Patents Assigned to Gemplus
  • Publication number: 20100273521
    Abstract: The disclosure relates to a method for managing the triggering of an application in a terminal place in an environment consisting of-several access technologies. The disclosure also relates to a mobile telephone type terminal that implements the method. A test mechanism is implemented for at least one application on the basis of information contained in the tested application when a triggering event occurs for an application, thereby making it possible to recognize or deduce the network access technologies supported by the application.
    Type: Application
    Filed: February 27, 2004
    Publication date: October 28, 2010
    Applicant: GEMPLUS
    Inventors: Robert Vong, Abraham Yap-Jr
  • Publication number: 20100042851
    Abstract: The invention relates to a method for handling data between two memory areas of an electronic component having at least one working memory area for carrying out operations on the component, which bring into play at least some of the data. The same memory areas are used for executing an operation, whatever the operation to be executed is, in such a manner that each operation has a hidden signal trace that is identical in terms of location leakage outside the component.
    Type: Application
    Filed: October 27, 2006
    Publication date: February 18, 2010
    Applicant: GEMPLUS
    Inventors: Benoit Chevallier-Mames, Mathieu Ciet, Karine Villegas, Jacques Fournier
  • Publication number: 20100038978
    Abstract: Flux-switching electrical machines. In particular, a flux-switching electrical machine having a stator and a rotor. The stator has permanent magnets, armature windings and excitation windings, and the rotor has no winding or permanent magnet but includes a plurality of flux-switching teeth. The stator is generally formed by a succession of elementary cells, each cell being intended to interact with only a single tooth of the rotor at a time. Each cell includes one of the permanent magnets; a first slot for at least partly housing one of the excitation windings at least; and second slots for housing one of the armature windings.
    Type: Application
    Filed: March 8, 2007
    Publication date: February 18, 2010
    Applicant: GEMPLUS
    Inventors: Emmanuel Kiên Lôc Hoang, Michel Roger René Lecrivain, Mohamed Gabsi
  • Publication number: 20100014656
    Abstract: A cryptographic method carries out a modular exponentiation of the type C=A<B1> mod N, where A is an operand, B1 is a first exponent, N is a modulus and C is a result. The method includes the steps of masking the operand A by a number s, carrying out a modular exponentiation of the masked operand by the exponent B1, and de masking the result of the exponentiation, by removing a contribution from the random number s from the result of the exponentiation. During the step of masking the operand A, the operand A is multiplied by a parameter of the form K<s.B2>, where K is a constant and B2 is a second exponent such that B1.B2=1 mod N. The method is implemented preferably by using a Montgomery multiplier. The preferred choice for the constant K is K=2P, p being an integer lying between 0 and n, n being an upper bound of the size of the modulus N and conventionally depending on the choice of implementation of the Montgomery multiplication.
    Type: Application
    Filed: December 22, 2006
    Publication date: January 21, 2010
    Applicant: GEMPLUS
    Inventors: Mathieu Ciet, Benoit Feix
  • Publication number: 20090299115
    Abstract: A catalyst is described which comprises at least one zeolite with structure type EUO, at least one zeolite selected from IM-5 zeolite and zeolites with structure type MFI, MOR, BEA and MTW, at least one group VIII metal, at least one group IIIA metal and at least one porous mineral matrix. The catalyst of the invention is used in a process for isomerizing a feed comprising aromatic compounds containing 8 carbon atoms per molecule.
    Type: Application
    Filed: November 3, 2006
    Publication date: December 3, 2009
    Applicant: GEMPLUS
    Inventors: Emmanuelle Guillon, Eric Sanchez, Sylvie Lacombe
  • Publication number: 20090271972
    Abstract: A contactless transponder includes an antenna and an electronic module placed on a substrate and connected to the antenna by a conducting wire passing through the contact pads in the form of at least one stitch. The module is produced as a single block, having at least one integrated circuit and contact pads. The module is transferred to the substrate before connection to the antenna.
    Type: Application
    Filed: November 20, 2006
    Publication date: November 5, 2009
    Applicant: Gemplus
    Inventors: Jean-Paul Caruana, Frédérick Seban
  • Publication number: 20090254777
    Abstract: The invention relates to an integrated circuit comprising at least one microprocessor [12] linked to at least one non-volatile memory [14] that can be accessed by sectors. The integrated circuit comprises a detector [20] for discovering when a threshold number of bad sectors has been exceeded in said non-volatile memory [14].
    Type: Application
    Filed: December 12, 2006
    Publication date: October 8, 2009
    Applicant: GEMPLUS
    Inventors: Nathalie Feyt, Christophe Arnoux
  • Publication number: 20090222655
    Abstract: The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the invention, a terminal, such as a mobile device, which is associated with a portable communicating object, such as a multimedia smart card, includes an agent for facilitating access from a server to a mass storage unit capable of storing multimedia data and a security storage unit in the portable communicating object via a communication network. The agent establishes a single communication channel between the remote server and the terminal and processes data transmitted from one of the two elements including the server and one of the storage units of the portable communicating object to the agent so that the agent can transmit the data to the other of the two elements.
    Type: Application
    Filed: February 2, 2007
    Publication date: September 3, 2009
    Applicant: GEMPLUS
    Inventors: Frederic Martinent, Anthony Bord, Franck Mosse
  • Publication number: 20090203262
    Abstract: A method for producing a portable electronic object having contact pads arranged on a plane with a thickness which differs from the thickness of a standard smartcard. The object is electrically connected to data transfer station connectors, by delivering a data transfer station having an electric probe connector and submitting the object to the data transfer station in such a way that the contact pads thereof are accessible to the electric probes in a direction perpendicular to the plane. Objects obtainable include UBS keys or PCMCIA cards or readers.
    Type: Application
    Filed: June 16, 2006
    Publication date: August 13, 2009
    Applicant: GEMPLUS
    Inventors: Pierre-Andre Collet, Thierry Karlisch, Francois Moutel
  • Publication number: 20090175455
    Abstract: A cryptographic operation includes calculating a multiplication of an element of an additively denoted group by a scalar. After two registers R0+R1, are initialized iterations are carried out over the components Ki of the scalar K. If Ki of the scalar equals 0, then the value in register R1 is replaced by 2(R0+R1) If Ki equals 1, the value in register R0 is replaced by 2(R0+R1). At the end of the algorithm, the value of the register R0 is returned as the calculated result This method poses the advantage of carrying out a calculation of multiplying by a scalar by carrying out only doubling and adding operations of the type 2(A+B).
    Type: Application
    Filed: March 8, 2007
    Publication date: July 9, 2009
    Applicant: Gemplus
    Inventor: Marc Joye
  • Publication number: 20090165149
    Abstract: A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data.
    Type: Application
    Filed: December 12, 2006
    Publication date: June 25, 2009
    Applicant: GEMPLUS
    Inventors: Benoit Gonzalvo, Pierre Girard
  • Publication number: 20090159692
    Abstract: The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a personal identification number of a chip card application is input erroneously. When this number reaches a threshold, the application or the chip card is blocked. The erroneous input count and unblocking the chip card or the application is restarted when the personal identification number of the chip card is input. In this way, PIN-secured applications offer a high level of security without requiring the storing of additional unblocking data.
    Type: Application
    Filed: October 24, 2005
    Publication date: June 25, 2009
    Applicant: GEMPLUS
    Inventors: Gary Chew, Eric Plet, Max De Groot
  • Publication number: 20090154710
    Abstract: The invention relates to a method for the secure deposition of data, according to which a depositor encrypts the data with a transfer key and encrypts the transfer key with a key of a third party, then deposits the encrypted data and the encrypted transfer key on a storage support. The invention also relates to a method for recovering data, during which an addressee of the data recovers the content of the storage support, authenticates him/herself to the third party, and transmits the encrypted transfer key thereto. After having authenticated the addressee, the third party returns the decrypted transfer key. The addressee can then recover the data. The invention further relates to devices for implementing the foregoing methods.
    Type: Application
    Filed: October 27, 2006
    Publication date: June 18, 2009
    Applicant: GEMPLUS
    Inventors: Eric Brier, Mathieu Ciet
  • Publication number: 20090146409
    Abstract: The invention relates to a method of creating a forgery-proof customised and/or printed graphic element on a support using an electromagnetic beam. At least one official marking seal is used which can divert and/or deform an electromagnetic beam. The support is printed or customised using the electromagnetic beam, which is diverted and/or deformed by the official marking seal. The invention also relates to the support thus obtained and to the official marking seal.
    Type: Application
    Filed: October 3, 2006
    Publication date: June 11, 2009
    Applicant: Gemplus
    Inventor: Jean-Luc Lesur
  • Publication number: 20090144556
    Abstract: A portable electronic device has a case including: a smart chip, an application which is stored in the smart chip, at least one interface for a user, and a microcontroller which controls the smart chip and the interface. The aforementioned microcontroller is configured to execute the primitive functions of the electronic key in order for the interface to be used, while the smart chip is configured to execute the application. The application is configured to generate calls to the primitive functions in order to communicate with the user by means of the interface.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 4, 2009
    Applicant: GEMPLUS
    Inventors: Eric Plet, Max De Groot
  • Publication number: 20090138718
    Abstract: The invention relates to a method of electronically signing a message m, characterized in that it uses: p a prime integer, q a prime integer divider of (p?1), g, an element of order q of the set Zp of integers modulo p, H and G, hash functions, x a private key and y, for example y=g?x mod p, a public key of the set Zp, to carry out the following steps, consisting in: E1: generating k, a random number k of the set Zq of integers modulo q, and calculating u=gk mod p, h=H(u), z=hx mod p and v=hk mod p, E2: calculating c=G (m, g, h, y, z, u, v) and s=k+c.x mod q, and E3: producing an electronic signature of the message m equal to (z, s, c). The invention also relates to a verification method and a signature scheme associated with the signature method.
    Type: Application
    Filed: October 18, 2005
    Publication date: May 28, 2009
    Applicant: GEMPLUS
    Inventor: Benoit Chevallier-Mames
  • Publication number: 20090130394
    Abstract: The invention relates to a method for the laser marking of a support having a body and a cover sheet. A laser beam is used to etch the body of the support through the thickness of the cover sheet. The support is laminated either during or after the laser marking in order to reduce or prevent deformations in the cover sheet resulting from etching.
    Type: Application
    Filed: April 25, 2006
    Publication date: May 21, 2009
    Applicant: GEMPLUS
    Inventor: Jean-Luc Lesur
  • Publication number: 20090124251
    Abstract: A method of assessing compatibility between at least one application and at least one processing device that host and/or executes and/or interacts with the application. A comparison is carried out between: (i) at least one profile from among the profiles associated with the devices, that respectively describe the functions supported by each device, and (ii) at least one profile from among the profiles associated with the applications that respectively describe the functions used by each application, in order to sutomatically establish an analysis of the functional compatibility between one or more applications and one or more devices.
    Type: Application
    Filed: November 4, 2005
    Publication date: May 14, 2009
    Applicant: Gemplus,
    Inventor: Marc Niccolini
  • Publication number: 20090122980
    Abstract: An asymmetrical cryptographic method applied to a message M includes a private operation of signing or decrypting the message M to obtain a signed or decrypted message s. The private operation is based on at least one modular exponentiation EM in the form EM=MA mod B, A and B being respectively the exponent and the modular exponentiation EM. The private operation includes the following steps: calculating an intermediate module B*, an intermediate message M* and an intermediate exponent A*, based on B, M and/or A; the intermediate module B* being deterministically calculated and the intermediate message M* being randomly calculated; calculating an intermediate modular exponentiation EM*=MA mod B*; and calculating the signed or decrypted message s based on the intermediate modular exponentiation EM*. An electronic component for implementing the cryptographic method is also disclosed.
    Type: Application
    Filed: July 13, 2006
    Publication date: May 14, 2009
    Applicant: GEMPLUS
    Inventors: Mathieu Ciet, Karine Villegas
  • Publication number: 20090126029
    Abstract: A method for processing digital data X of an item of software coded on lx bits, for detecting faults in an electronic circuit comprising at least one bus, a processing unit, a memory for running the software, and a hardware architecture. The digital data X is transformed into digital data Z coded on lx+ly bits, the additional ly bits being the result of an integrity function f applied to the data X. The digital data Z is processed by the set of hardware resources of the circuit, these hardware resources working on words of lx+ly bits. The integrity of data Z is verified during the processing step.
    Type: Application
    Filed: July 19, 2006
    Publication date: May 14, 2009
    Applicant: Avenue du Pic de Bertagne, Parc d'Activite de Gemplus
    Inventors: Olivier Benoit, Mickael Tunstall, Khanh Quoc Nguyen