Patents Assigned to Gieseck & Devrient GmbH
-
Patent number: 9274258Abstract: The present invention relates to a thin-film element (30) having an interference layer structure for security papers, value documents and the like, having at least two semitransparent absorber layers (34, 38) and at least one dielectric spacing layer (36) arranged between the at least two absorber layers. According to the present invention, it is provided that the two absorber layers (34, 38) are each formed from a material having a complex refractive index N whose real part n and imaginary part k differ at least in a portion of the visible spectral range by a factor of 5 or more.Type: GrantFiled: September 10, 2010Date of Patent: March 1, 2016Assignee: Giesecke & Devrient GMBHInventors: Christian Fuhse, Michael Rahm, Manfred Heim, Ralf Liebler
-
Publication number: 20160023495Abstract: An optically variable surface pattern is made available, having at least two partial areas with reflection elements, wherein the reflection elements of the first partial region on the one hand and the reflection elements of the second partial region on the other hand reflect impinging light in different reflection directions. The first partial region is so covered with a first glazing ink layer that a viewer, upon a change of the viewing angle at which the viewer views the optically variable surface pattern, sees the first partial region glow in a first color upon reaching a first viewing angle. The second partial region glows in a second color that is different from the first color upon reaching a second viewing angle.Type: ApplicationFiled: January 30, 2014Publication date: January 28, 2016Applicant: Giesecke & Devrient GmbHInventors: Christian FUHSE, Andreas RAUCH, Winfried HOFFMULLER
-
Patent number: 9238383Abstract: The present invention relates to a method for producing a security element (1), to a security element (1) obtainable by the method according to the invention, to transfer materials having the security elements according to the invention, and to objects of value secured by the security elements according to the invention. The security element (1) according to the invention has at least two functional layers (12, 22), whereby each functional layer forms a motif and the motifs are either congruent, or one motif represents a photographic negative of the other motif. In the method according to the invention, the motif of one functional layer (12) is transferred into the other functional layer (22) with the help of an adhesive layer (30).Type: GrantFiled: August 4, 2009Date of Patent: January 19, 2016Assignee: Giesecke & Devrient GmbHInventors: Winfried Hoffmuller, Patrick Renner, Manfred Heim
-
Publication number: 20150352884Abstract: A security element for manufacturing value documents, such as banknotes, checks or the like, comprises a top on which a microrelief structure is developed that has at least two sub-regions that each comprise a plurality of groove- and/or rib-shaped structural elements that lie adjacent to one another and extend along a longitudinal direction, and are reflecting or backscattering. The longitudinal directions of the sub-regions are different, and the structural elements are each not resolvable with the naked eye with respect to the width transverse to the longitudinal direction, and fan out incident parallel light achromatically in a fan that lies transverse to the longitudinal direction and has an opening angle of at least 30°.Type: ApplicationFiled: January 29, 2014Publication date: December 10, 2015Applicant: Giesecke & Devrient GmbHInventors: Christian FUHSE, Hans LOCHBIHLER
-
Patent number: 9210168Abstract: On a portable data carrier (2) with a communication interface (5) and a control device (5) the control device (4) allows a transaction in a communication network (10) between a communication device (1) connected with the data carrier (2) via the communication interface (5) and a network server (3). For this purpose the control device (4) sends, in response to a request (S2; S15) concerning a transaction between the communication device (1) and a network server (3), received from the connected communication device (1) via the communication interface (5), a request redirection message (S3; S19) concerning the transaction to the communication device (1).Type: GrantFiled: October 15, 2008Date of Patent: December 8, 2015Assignee: Giesecke & Devrient GmbHInventors: Axel Heider, Erich Englbrecht
-
Publication number: 20150350881Abstract: A method of providing a secure element of a mobile terminal with a subscription profile in which the mobile terminal is configured to communicate with a cellular communications network and the subscription profile comprises a network specific portion related to the cellular communications network or a different cellular communications network as well as a hardware specific portion related to the hardware of the mobile terminal and/or the secure element. The method comprises the steps of: assembling the subscription profile, wherein the network specific portion of the subscription profile is provided by a first server and the hardware specific portion of the subscription profile is provided by a second server; and providing the subscription profile over-the-air to the secure element. A corresponding secure element, mobile terminal and subscription management backend system involves features of the method.Type: ApplicationFiled: December 17, 2013Publication date: December 3, 2015Applicant: Giesecke & Devrient GmbHInventors: Dieter WEISS, Klaus VEDDER, Michael MEYER, Michael TAGSCHERER, Jens RUDOLPH, Ulrich DIETZ, Jari NYHOLM, Thomas LARSSON, Jorgen HULT
-
Patent number: 9193553Abstract: The stacking wheel has one or a plurality of first and second stacking-wheel disks which are disposed on an axle in a mutually concentric relationship and spaced apart in the axial direction. Distributed over their circumference, the stacking-wheel disks respectively have a plurality of sheet slots for receiving a sheet and are disposed in a mutually staggered relationship in a portion of the sheet slots. An azimuthal profile offset of the stacking-wheel disks has the effect that the sheet slots of the first stacking-wheel disk run ahead of or run behind the sheet slots of the second stacking-wheel disk. The sheet slots of the first and second stacking-wheel disks have at their radially inside end an azimuthal profile offset that is reduced or eliminated again up to the slot end of the sheet slots. This avoids damage to the stacked sheets.Type: GrantFiled: April 15, 2013Date of Patent: November 24, 2015Assignee: Giesecke & Devrient GMBHInventor: Markus Haberstroh
-
Publication number: 20150317268Abstract: A system for evaluating a stream of sensor data formed by means of at least one sensor for a plurality of value documents includes at least two evaluation units and a data bus. Each of the evaluation units has first and second interfaces for receiving or transferring the sensor data stream with the sensor data, a third interface for receiving and transferring evaluation data, a working memory, at least one processor connected to the working memory for evaluating the sensor data in the working memory, and a relaying device connected to the first and the second interfaces and to the working memory for receiving a sensor data stream received via the first interface, at least partial relaying to the second interface and to storage of at least part of the data of the sensor data stream in the working memory, with the data bus being connected to the third interface.Type: ApplicationFiled: December 11, 2013Publication date: November 5, 2015Applicant: Giesecke & Devrient GmbHInventors: Wolfgang ROHRL, Oliver HARTMANN
-
Publication number: 20150302248Abstract: A method for making available measuring data of a value-document processing apparatus for processing value documents includes feeding individual value documents in real time, measuring data for the value documents are captured by means of a sensor device and stored in an intermediate memory, such that feeding of individual value documents and/or the capturing of measuring data the current utilization of the intermediate memory is compared to a predetermined limit utilization, dependent on the comparison. The feeding of value documents is interrupted and measuring data from the intermediate memory are permanently stored in a permanent memory, and during the permanent storing and/or after the permanent storing of the measuring data in the permanent memory the intermediate memory is released again. After release of the intermediate memory the feeding of individual value documents and capturing and storing of measuring data for the fed value documents in the intermediate memory is restarted.Type: ApplicationFiled: December 11, 2013Publication date: October 22, 2015Applicant: Giesecke & Devrient GmbHInventors: Matthias HECHT, Klaus VRANA, Karl-Dieter FORSTER
-
Publication number: 20150302230Abstract: A method for operating a communication system comprises a transponder having at least one antenna, in particular in the form of a portable data carrier, and a reading device having at least one antenna. The reading device is configured to exchange data with the transponder. An exchange of data between the transponder and the reading device is possible within a predetermined range. A measurement and evaluation is effected of the time of a command transmitted from the reading device to the transponder and the receipt of a corresponding response of the transponder by the reading device. In so doing, a processing is effected of a card-individual length of time T_icc, wherein the card-individual length of time T_icc specifies how long the transponder takes for the receipt and the processing of a command received from the reading device and the sending of a corresponding response.Type: ApplicationFiled: November 19, 2013Publication date: October 22, 2015Applicant: Giesecke & Devrient GmbHInventors: Dirk WACKER, Ullrich MARTINI
-
Publication number: 20150289140Abstract: A method for incorporating subscriber identity data into a subscriber identity module involves the subscriber identity module being incorporated in ready-to-operate condition in an end device. The subscriber identity module is arranged to manage a plurality of subscriber identity data and to receive subscriber identity data, and the subscriber identity data is stored in a file system. The method includes receiving a load command from a subscriber identity data management in the subscriber identity module; preparing the file system in the memory area of the subscriber identity module for storing subscriber identity data; receiving subscriber identity data in the subscriber identity module; storing the subscriber identity data in the prepared file system; and checking the data integrity of the received subscriber identity data by the subscriber identity module.Type: ApplicationFiled: October 16, 2013Publication date: October 8, 2015Applicant: Giesecke & Devrient GmbHInventor: Jens Rudolph
-
Publication number: 20150286473Abstract: A method for installing an application in a security element of a portable end device comprises the following steps: the installation device receives an installation job for installing a pre-specified application on a pre-specified security element. The job is processed by the installation device which receives the installation job from the pre-specified security element itself or from a further security element different from the pre-specified security element.Type: ApplicationFiled: November 20, 2013Publication date: October 8, 2015Applicant: Giesecke & Devrient GmbHInventor: Dieter Weiss
-
Publication number: 20150281957Abstract: A subscriber identity module for authenticating a subscriber on a communication network includes: a first set of subscriber identity data for authenticating the subscriber; a second set of subscriber identity data for authenticating the subscriber, with the first set of subscriber identity data differing from the second set of subscriber identity data; and a means for managing the first and second sets of subscriber identity data, with the managing being realized by management functions. The subscriber identity module can be extended to a method for managing the subscriber identity module, to a use of the subscriber identity module in a mobile end device, and to a system comprising subscriber end devices and a remote entity.Type: ApplicationFiled: August 22, 2013Publication date: October 1, 2015Applicant: Giesecke & Devrient GmbHInventors: Karl Eglof Hartel, Ulrich Huber, Nils Nitsch
-
Publication number: 20150258838Abstract: The present invention relates to an optically variable surface pattern having a substrate that comprises a first and a second surface region, the two surface regions being developed in such a way that the first surface region presents, in a first solid angle range (?1) a bulged-appearing first view, and the second surface region presents, in a second solid angle range (?2) that is different from the first solid angle range (?1), a bulged-appearing second view.Type: ApplicationFiled: October 14, 2013Publication date: September 17, 2015Applicant: Giesecke & Devrient GmbHInventor: Christian Fuhse
-
Publication number: 20150245213Abstract: The invention creates a mobile station comprising a mobile end device (ME) with a secured runtime environment (TEE) and a removable or firmly implemented security element (SE), with an end device send server (TEE-TSM) arranged in the security element (SE), which is arranged to send to the secured runtime environment (TEE) end device messages which can be received by the secured runtime environment (TEE). The end device messages are sent by a trusted service manager (SE-TSM), which is provided for the security element (SE), to the security element (SE), thereby higher efficiency being guaranteed at maintained security.Type: ApplicationFiled: September 10, 2013Publication date: August 27, 2015Applicant: Giesecke & devrient GMBHInventors: Claus Dietze, Gero Galka
-
Publication number: 20150244524Abstract: The invention provides a method, in a processor, for executing a cryptographic computation. Upon the execution of the computation there is applied a base masking through which intermediate values are incorporated into the computation as masked intermediate values. Upon the execution of the computation a secondary masking is additionally applied, wherein for each intermediate value masked by means of the base masking the one's complement of the masked intermediate value is formed, the masked intermediate value and the one's complement of the masked intermediate value are made available, and randomly the computation is executed either with the masked intermediate value or with the one's complement of the masked intermediate value.Type: ApplicationFiled: September 23, 2013Publication date: August 27, 2015Applicant: Giesecke & Devrient GmbHInventor: Jurgen Pulkus
-
Publication number: 20150236858Abstract: There is provided a method for creating an authentication entity derived from an original data carrier, wherein the original data carrier has a key pair that is individual to the original data carrier and comprises a public key and a secret key of the original data carrier, and a certificate for the public key of the original data carrier. The method comprises the following steps: deriving a secret key for the derived authentication entity from the secret key of the original data carrier by the original data carrier; forming derivation data for the derived authentication entity; transferring authentication data to the derived authentication entity, wherein the authentication data have the derivation data, the certificate of the public key of the original data carrier as well as a derived key pair which comprises the derived secret key and the public key of the original data carrier.Type: ApplicationFiled: July 22, 2013Publication date: August 20, 2015Applicant: Giesecke & Devrient GmbHInventors: Gisela Meister, Jens Urmann
-
Patent number: 9047167Abstract: A method for calculating the modular inverse of a value in relation to a module is used for cryptographic calculations on a portable data carrier. The method includes determining a breakdown of the module into at least two factors, calculating a respective auxiliary value for each of the factors, wherein each auxiliary value is the modular inverse of the value in relation to the respective factor as module, and calculating the modular inverse of the value in relation to the module using the calculated auxiliary values. The method offers an increase in efficiency, with greater efficiency obtained the stronger the computing outlay depends on the length of the module in the inversion method. The method is suitable for execution by relatively low-power processors, and security of the calculation against spying attacks is not impaired. If security requirements are high, combining the method with suitable measures against spying presents no problems.Type: GrantFiled: May 5, 2003Date of Patent: June 2, 2015Assignee: Giesecke & Devrient GmbHInventor: Helmut Kahl
-
Patent number: 9031307Abstract: The invention relates to an apparatus and a method for checking documents of value having luminescent feature substances. By carrying out the evaluation of the captured luminescence radiation on the basis of an integrated luminescence measuring, which is obtained by integrating the measured luminescence radiation of a track extending transversely across the document of value, a particularly easy capturing and differentiation even of faintly glowing feature substances is permitted.Type: GrantFiled: October 5, 2004Date of Patent: May 12, 2015Assignee: Giesecke & Devrient GmbHInventor: Thomas Giering
-
Patent number: 9027741Abstract: The invention is related to a transport system for sheet material including a conveyor belt charged with a vacuum. The transport system includes a vacuum chamber providing the vacuum to charge the conveyor belt while moving along the vacuum chamber in a transport direction, wherein the conveyor belt is permeable to air by recesses having specified distances from each other, and air nozzles arranged at a deflection position inside the vacuum chamber. The specified distances from each other correlate with the distances of the recesses in the conveyor belt to allow pressurized air charged to the air nozzles to pass through the recesses in the conveyor belt.Type: GrantFiled: January 12, 2011Date of Patent: May 12, 2015Assignee: Giesecke & Devrient GmbHInventor: Andrey Galkin