Patents Assigned to Inside Secure
-
Patent number: 8342415Abstract: The invention relates to a method of conducting a transaction between an NFC device and a contactless integrated circuit of the passive reader type. The method includes providing, in the contactless integrated circuit, at least one reader application emulation program and, by an intermediary unit of the NFC device, establishing a communication with the contactless integrated circuit, receiving from the contactless integrated circuit reader application commands and transferring the commands to the first host processor, and receiving card application responses supplied by the first host processor and transferring the responses to the contactless integrated circuit.Type: GrantFiled: March 17, 2010Date of Patent: January 1, 2013Assignee: Inside SecureInventors: Kian Teck Soh, Jean-Bernard Blanchet
-
Publication number: 20120322500Abstract: A contactless integrated circuit includes modulation and demodulation circuits configured to connect to an HF antenna circuit to emit and receive HF signals by inductive coupling in a reader mode, modulation and demodulation circuits configured to connect to a UHF antenna to emit and receive UHF signals by electric coupling in a reader mode, a data processing circuit connected to the modulation and demodulation circuits, and configured to provide data to be emitted to the modulation circuits, and to process received signals, transmitted by the demodulation circuits, the demodulation circuits including a common demodulation circuit to equally process signals received by the UHF and HF antennas.Type: ApplicationFiled: June 7, 2012Publication date: December 20, 2012Applicant: INSIDE SecureInventors: Bruno CHARRAT, Nicolas CORDIER
-
Patent number: 8327100Abstract: A microcontroller system, such as a system-on-a-chip integrated circuit, including a processor (e.g., a Von Neumann processor), memory, and a memory protection unit (MPU), where the MPU provides execute-only access rights for one or more protected areas of the memory. The MPU can allow instructions fetched from within a protected area to access data in the protected area while preventing instructions fetched from outside the protected area from accessing data in the protected area.Type: GrantFiled: February 16, 2011Date of Patent: December 4, 2012Assignee: Inside SecureInventors: Sandrine Batifoulier, Stephane Godzinski, Vincent Dupaquis
-
Patent number: 8301905Abstract: A system and method for encrypting data. The system includes a controller and a processing element (PE) array coupled to the controller. The PE array is operative to perform one or more of encryption functions and decryption functions using an encryption algorithm. According to the system and method disclosed herein, by utilizing the PE array, the system encrypts and decrypts data efficiently and flexibly.Type: GrantFiled: September 8, 2006Date of Patent: October 30, 2012Assignee: Inside SecureInventors: Daniele Fronte, Eric Payrat, Annie Perez
-
Patent number: 8301890Abstract: A method of processing programming instructions may include identifying an instruction to be fetched; determining if the identified instruction is protected; if the identified instruction is protected, selecting an alternate instruction from a plurality of alternate instructions corresponding to the identified protected instruction, and fetching the selected alternate instruction; and if the identified instruction is not protected, fetching the identified instruction. Identifying the instruction to be fetched may include identifying an address stored in a program address pointer. Determining if the identified instruction is protected may include comparing the address stored in the program address pointer to one or more addresses stored in a first memory portion, and determining if there is a correspondence.Type: GrantFiled: August 10, 2006Date of Patent: October 30, 2012Assignee: Inside SecureInventors: Majid Kaabouch, Eric Le Cocquen, Dominique Parlange
-
Publication number: 20120265797Abstract: Disclosed is a method of modular multiplication of two L-bit numbers (X, Y), the result defined from XY+mM, where M is the modulo, of L bits, and m is a number of L bits found and is divisible by 2L. L/k iterations are performed, an iteration i involving XYi+miM+R, Yi, mi being k-bit digits of rank i of Y, m from least significant bits, and R the previous iteration result. In each iteration, a first sub-loop of k/p iterations calculates a partial result of XYi+miM+R on k least significant bits of X, M, R, following decomposition of X, mi into p-bit digits. Starting each sub-loop iteration, the p bits of the current digit of mi are simultaneously produced. A second sub-loop calculates and sums the remaining partial results of XYi+miM+R using mi from the first sub-loop.Type: ApplicationFiled: April 11, 2012Publication date: October 18, 2012Applicant: INSIDE SECUREInventor: Michael NIEL
-
Publication number: 20120265794Abstract: A circuit for calculating a sum of products, each product having a q-bit binary operand and a k-bit binary operand, where k is a multiple of q,includes a q-input carry-save adder (CSA); a multiplexer (10) by input of the adder, having four k-bit channels respectively receiving the value 0, a first (Yi) of the k-bit operands, the second k-bit operand (M[63:0], mi), and the sum of the two k-bit operands, the output of a multiplexer of rank t (where t is between 0 and q?1) being taken into account by the adder with a t-bit left shift; and each multiplexer having first and second path selection inputs, the bits of a first of the q-bit operands being respectively supplied to the first selection inputs, and the bits of the second q-bit operand being respectively supplied to the second selection inputs.Type: ApplicationFiled: April 11, 2012Publication date: October 18, 2012Applicant: INSIDE SECUREInventor: Michael NIEL
-
Patent number: 8285204Abstract: A contactless data transmission device includes an antenna circuit supplying an alternating voltage in the presence of an alternating excitation field, a charge modulation transistor having a control terminal receiving a charge modulation signal having at least one low state and one high state, and a conduction terminal receiving the alternating voltage. The device includes a circuit for supplying a boosted direct voltage greater than a peak value of the alternating voltage supplied by the antenna circuit, and a circuit for applying to the control terminal of the charge modulation transistor a charge modulation signal which, in the high state, has a voltage level equal to the boosted direct voltage.Type: GrantFiled: May 2, 2007Date of Patent: October 9, 2012Assignee: Inside SecureInventor: Michel Martin
-
Patent number: 8280041Abstract: A computer hardware implemented cryptography method computes a modular exponentiation, M :=Cd (mod p·q), upon a message data value C using a Chinese Remainder Theorem (CRT) based technique. To secure against cryptanalysis, the private key moduli p and q are transformed by multiplication with a generated random value s, so that p?: =p·s and q? :=q·s, as shown in an exemplary embodiment in FIG. 2. The CRT steps of the modular exponentiation are applied using the transformed moduli p? and q? to obtain a random intermediate message data value M?. A final reduction of M? modulo p·q yields the final message data value M. Values needed for the computation are loaded into data storage and accessed as needed by electronic processing hardware.Type: GrantFiled: March 12, 2007Date of Patent: October 2, 2012Assignee: Inside SecureInventors: Michel Douguet, Neil M. McKeeney
-
Publication number: 20120221618Abstract: A method and a device protected against hidden channel attacks includes a calculation of the result of the exponentiation of a data m by an exponent d. The method and the device are configured to execute only multiplications of identical large variables, by breaking down any multiplication of different large variables x, y into a combination of multiplications of identical large variables.Type: ApplicationFiled: February 23, 2012Publication date: August 30, 2012Applicant: INSIDE SECUREInventors: Benoît FEIX, Georges GAGNEROT, Myléne ROUSSELLET, Vincent VERNEUIL, Christophe CLAVIER
-
Publication number: 20120199948Abstract: A semiconductor chip includes a semiconductor substrate, an integrated circuit region having an integrated circuit, and conductive lines extending above the integrated circuit region. To protect the semiconductor chip against a physical attack, the semiconductor chip includes an array of protection capacitors extending above the conductive lines, at least first and second interconnection conductive lines, arranged to interconnect the protection capacitors in parallel, and a cprotection circuit configured to prevent at least some data from circulating on at least some conductive lines, when a short occurs in at least one protection capacitor.Type: ApplicationFiled: February 8, 2012Publication date: August 9, 2012Applicant: INSIDE SECUREInventor: Marc SAISSE
-
Patent number: 8233615Abstract: A special form of a modulus and a modified Barrett reduction method are used to perform modular arithmetic in a cryptographic system. The modified Barrett reduction is a method of reducing a number modulo another number without the use of any division. By pre-computing static values used in the Barrett reduction method and by using a special form of the modulus, the calculation of reducing a number modulo another number can be reduced. This can result in a decrease in computation time, speeding up the overall cryptographic process.Type: GrantFiled: February 19, 2008Date of Patent: July 31, 2012Assignee: Inside SecureInventors: Michel Douguet, Vincent Dupaquis
-
Patent number: 8233620Abstract: A cryptographic system can include a register containing a key and a processor coupled to the register. The processor can be operable for performing a first encrypting operation, where the encrypting operation includes computing a key schedule using the register as a workspace. At the end of the first encrypting operation, the key is recovered from the register for use in a second encrypting operation.Type: GrantFiled: February 27, 2009Date of Patent: July 31, 2012Assignee: Inside SecureInventors: Vincent Dupaquis, Michel Douguet
-
Publication number: 20120129571Abstract: A device includes a radio transceiver equipped with a UHF antenna, a clock generator associated with the radio transceiver, a processor configured to periodically connect to the radiotelephony network by way of the radio transceiver, and a UHF tag reader configured to conduct a transaction with a UHF tag only outside periods of connection of the processor to the radiotelephony network. The device is particularly directed for use in mobile telephones.Type: ApplicationFiled: November 21, 2011Publication date: May 24, 2012Applicant: INSIDE SECUREInventors: Bruno CHARRAT, Nicolas CORDIER
-
Publication number: 20120123945Abstract: A method for performing a transaction between a portable device and a transaction device includes: providing at least one transaction server having at least one application program configured to receive, process and emit application data, establishing at least one data link between the portable device and the transaction server, establishing a near field communication channel between the portable device and the transaction device, and, via the portable device, transferring to the application program of the server application data sent by the transaction device, and receiving application data sent by the application program of the server and transferring them to the transaction device.Type: ApplicationFiled: November 16, 2011Publication date: May 17, 2012Applicant: INSIDE SECUREInventor: Bruno CHARRAT
-
Publication number: 20120123883Abstract: A near field transaction system includes a first transaction device having near field communication circuitry, and a portable device having near field communication circuitry. The system also includes at least one transaction server having a memory area with at least one application program, and a mechanism for establishing a data link between the server and the near field communication circuitry of the portable device. The application program is configured to perform a transaction with the first transaction device, using the near field communication circuitry of the portable device as a proximity relay to communicate with the first transaction terminal.Type: ApplicationFiled: November 16, 2011Publication date: May 17, 2012Applicant: INSIDE SECUREInventor: Bruno CHARRAT
-
Publication number: 20120071090Abstract: An NFC card includes an antenna circuit including an antenna coil having at least one magnetic axis, and at least one integrated circuit linked to the antenna circuit. The magnetic axis of the antenna coil is substantially parallel to the plane of the card, and is at an angle of 45°±25° with respect to a longitudinal axis LX of the card. Embodiments of the invention are applicable in particular to SIM-NFC card and SD-NFC cards.Type: ApplicationFiled: September 20, 2011Publication date: March 22, 2012Applicant: INSIDE SECUREInventors: Bruno CHARRAT, Nicolas CORDIER
-
Publication number: 20120071088Abstract: An NFC card includes an antenna circuit including an antenna coil having at least one magnetic axis, and at least one integrated circuit linked to the antenna circuit. The magnetic axis of the antenna coil is substantially parallel to at least one side of the card, and the card further includes at least one electrically conductive screen extending near the antenna coil, which does not cross the magnetic axis. The card does not include any magnetically permeable material between the at least one conductive screen and the antenna coil. Embodiments of the invention are applicable in particular to SIM-NFC card and SD-NFC cards.Type: ApplicationFiled: September 14, 2011Publication date: March 22, 2012Applicant: INSIDE SECUREInventor: Nicolas CORDIER
-
Publication number: 20120071089Abstract: A data emission/reception device by inductive coupling includes an inductive antenna circuit in which an antenna signal appears, a mechanism configured to for extracting a first periodic signal from the antenna signal, a synchronous oscillator receiving the first periodic signal and supplying a second periodic signal, and an active load modulation circuit configured to apply bursts of the second periodic signal to the antenna circuit. The device is configured to place the oscillator in the synchronous oscillation mode before each application of a burst of the second periodic signal to the antenna circuit, then place the oscillator in the free oscillation mode.Type: ApplicationFiled: September 19, 2011Publication date: March 22, 2012Applicant: INSIDE SECUREInventors: Bruno CHARRAT, Florian PERNISEK
-
Publication number: 20120011572Abstract: The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.Type: ApplicationFiled: July 7, 2011Publication date: January 12, 2012Applicant: INSIDE SECUREInventors: Gary CHEW, Charles WALTON