Abstract: A method of demodulating signals of an electromagnetic field induced by a contactless transponder includes a step in which the signals from the transponder are detected at given times or frequency. The times or frequency of the detection are synchronised in phase with the electromagnetic field. An associated demodulator and reader are also disclosed.
Abstract: Transfer of data between two chip cards A means (SS, CT) external to a terminal (TM) transmits a specific application identifier and an encrypted first key and number to a first chip card (CA) in service in the terminal. In the first card, if the decrypted first number satisfies a first condition, the specific application is called up, application data are read, the data are encrypted using the decrypted first key in order to transmit them to the external means, and the application is made inoperable. Following replacement of the first card by a second card (CB), the external means transmits the identifier and an encrypted second key and number to the second card. In the latter, if the decrypted second number satisfies a second condition, the encrypted data are transmitted to the second card so that the latter calls up the application, decrypts the encrypted data using the decrypted second key and installs said data.
Abstract: A method for detecting portable objects from a network of N antennae controlled by a centralized management unit. Signals are simultaneously emitted by the management unit to all antennae. Resulting response signals from antennae that have detected a portable object are received by the management unit. Each object thus detected is successively selected from these signals according to a pre-established sequence. The invention applies in particular to access control.
Type:
Grant
Filed:
January 31, 2000
Date of Patent:
December 6, 2005
Assignee:
Gemplus
Inventors:
Omar Messlem, Philippe Porte, Denis Praca
Abstract: The invention relates to a customized multi-layer support which takes the general form of a card, such as an identification card. The support includes a card body, the upper face of which is provided with externally-visible personal information; and a film which is at least partially transparent and which is fixed to the upper face of the card body. The support has boundary lines which define the areas of the aforementioned film with reduced or increased mechanical strength. The invention also relates to a method of producing one such customized support.
Abstract: The invention relates to a method of verifying an intermediary code which can be executed by a limited resource microcircuit which is connected to an external data processing system. The method includes a step involving the modification of the intermediary code comprising the reallocation of real r-type registers to monomorphic-type virtual v registers and the construction of a re-allocated code having PC instructions which refer to the virtual v registers. In addition, the method includes a step involving the verification of the reallocated code in the limited resource microcircuit. Following the successful verification of the reallocated code in the microcircuit, the original intermediary code is installed in the limited resource microcircuit for the execution thereof.
Abstract: A method for producing contact-free chip card includes embedding metallized bumps of the chip into an antenna as the chip is mounted on the antenna.
Abstract: A method of generating electronic keys for a public-key cryptography method using an electronic device. In a first of two separate calculating steps, pairs of prime numbers (p, q) are calculated and stored independent of knowledge of the pair of values (e,l), in which e is the public exponent and l is the length of the key of the cryptography method. The second step is very quick and can be executed in real time by the device, in which a key d is calculated from the results of the first step and knowledge of the pair (e,l).
Abstract: A contact free electronic label, such as those designed to be affixed on conductive surfaces, has an insulating support one side of which bears a first winding having its ends connected to an electronic circuit. The opposite side of the support bears a second winding whose ends are connected to conductive pads. This opposite side of the support is designed to be secured to a conductive surface via an insulating dielectric layer. The labels are designed to be affixed on products having conductive surfaces such as laser discs, gas bottles and the like.
Abstract: The invention concerns an electronic device such as a smart card which includes at least a microcircuit embedded in a carrier medium and which includes exit hubs linked to interface elements composed of a terminal block and/or an antenna. The connections between the exit hubs and the interface elements are made by depositing a low-viscosity conducting substance which remains flexible after its application, using a syringe or similar device. Preferably, a polymer resin charged with conducting or intrinsically conducting particles is used for the connections.
Abstract: The invention relates to the installation of a compiled program, particularly in a chip card. In order to reduce the storage location of a compiled program (PGC) to be installed in a data processing device, such as a chip card (CP), installation information detected in the compiled program, which is also necessary for the installation of other programs in the device and which is only necessary for the installation of the compiled program respectively, is reformulated in first and second additional components (CAD1, CAD2). The compiled program is installed (C3, C4) and, in particular, checked according to pre-determined information in the additional components (CAD1, CAD2) in the device. The second additional component (CAD2) can then be deleted (C5) prior to the running of the compiled program.
Type:
Application
Filed:
October 21, 2002
Publication date:
August 18, 2005
Applicant:
GEMPLUS
Inventors:
Lilian Burdy, Ludovic Casset, Damien DeVille, Antoine Requet
Abstract: The present invention relates to a method for verifying the execution of a computer program, comprising the following steps: 1) a program is split up into at least two parts, one public and one secret, whereby the public part is executed on a first processing means and the second part is executed on a second secure processing means; 2) the public part is placed in a memory pertaining to the first processing means; 3) the secret part is placed on a secure support pertaining to the second processing means in order to be connected to the first processing means; 4) the following operations are performed so that the program can be executed by the first processing means: a) the second processing means is connected to the first and parameters and variables that are a function of external signals triggered by a user are transmitted from the first processing means to the second, b) at least one part of the program is executed by the second processing means, implementing a certain number of received parameters/variable
Abstract: A method for representing a first entity by a third party entity who is addressed by a second entity to request sensitive data from the first entity. The transmission of part at least of the sensitive data is controlled with a personal electronic medium held by the first entity. This medium can itself contain the sensitive data instead of the third party entity, and/or information for selectively locking or unlocking the third party entity if the latter holds it. The medium can be in the form of a smart card, for example a SIM card for the mobile telephone system.
Abstract: Prior to the execution of a program contained in a second chip card inserted in a terminal such as a mobile radio telephone terminal, in addition to a first chip card containing data and connected to a telecommunication network to which the terminal is linked, one of the cards is authenticated by the other, or the two cards are authenticated mutually. This double authentication ensures the authenticity of the program for its overall execution in the terminal and the origin of the second card, distributed through conventional channels, for the network operator.
Abstract: The invention relates to a cryptographic method secured against a covert channel attack. According to the invention, in order to carry out a selected block of instructions as a function of an input variable amongst N predefined instruction blocks, a common block is carried out on the predefined N instruction blocks, a predefined number of times, the predefined number being associated with the selected instruction block.
Abstract: A non-opaque plastic card, having a first sheet layer with a front surface and a back surface, and a second sheet layer having a front surface and a back surface. A filter dye is located on the first sheet layer and/or second sheet layer, and allows visible light to pass through, while blocking infrared light from passing through the card. Graphical elements are printed on different surfaces of the card, with different combinations of backgrounds, to produce 3-dimensional effects.
Abstract: The present invention concerns a countermeasure method in an electronic component using a public key cryptography algorithm based on the use of elliptic curves. From a private key d and a number of points n on an elliptic curve, a new deciphering integer d? is calculated. The present invention applies particularly to any existing electronic component, such as a smart card.
Abstract: A method for automatically establishing a configuration of a communication appliance functioning with a subscriber identification card in a communication network. The configuration of the appliance is established via the network, following the detection and communication of its identifier over the network by means of the card. The method includes a preliminary step in which a configuration requirement is detected by means of events or absence of an event stored in the card.
Abstract: The present invention concerns a cryptographic system, combining the so-called discrete logarithm and factorization principles, comprising an encryption and decryption system and a key escrow system, and the associated equipment and devices. It is particularly intended to be used in electronic systems of the type comprising chip cards, PCMCIA cards, badges, contactless cards or any other portable equipment.
Type:
Application
Filed:
April 5, 2004
Publication date:
June 9, 2005
Applicant:
Gemplus
Inventors:
David Naccache, Francoise Levy-Dit-Vehel, Jacque Stern
Abstract: A method for converting in a binary representation of a number based on a left-to-right processing of bits of the binary representation, to obtain a signed representation equivalent to the so-called Reitwiesner representation. The use of such a conversion method with left-to-right arithmetic processing improves hardware implementation of the method.
Abstract: Prior to the execution of a program contained in a second chip card inserted in a terminal such as a mobile radio telephone terminal, in addition to a first chip card containing data and connected to a telecommunication network to which the terminal is linked, one of the cards is authenticated by the other, or the two cards are authenticated mutually. This double authentication ensures the authenticity of the program for its overall execution in the terminal and the origin of the second card, distributed through conventional channels, for the network operator.