Patents Assigned to Inside Secure
  • Patent number: 8342415
    Abstract: The invention relates to a method of conducting a transaction between an NFC device and a contactless integrated circuit of the passive reader type. The method includes providing, in the contactless integrated circuit, at least one reader application emulation program and, by an intermediary unit of the NFC device, establishing a communication with the contactless integrated circuit, receiving from the contactless integrated circuit reader application commands and transferring the commands to the first host processor, and receiving card application responses supplied by the first host processor and transferring the responses to the contactless integrated circuit.
    Type: Grant
    Filed: March 17, 2010
    Date of Patent: January 1, 2013
    Assignee: Inside Secure
    Inventors: Kian Teck Soh, Jean-Bernard Blanchet
  • Publication number: 20120322500
    Abstract: A contactless integrated circuit includes modulation and demodulation circuits configured to connect to an HF antenna circuit to emit and receive HF signals by inductive coupling in a reader mode, modulation and demodulation circuits configured to connect to a UHF antenna to emit and receive UHF signals by electric coupling in a reader mode, a data processing circuit connected to the modulation and demodulation circuits, and configured to provide data to be emitted to the modulation circuits, and to process received signals, transmitted by the demodulation circuits, the demodulation circuits including a common demodulation circuit to equally process signals received by the UHF and HF antennas.
    Type: Application
    Filed: June 7, 2012
    Publication date: December 20, 2012
    Applicant: INSIDE Secure
    Inventors: Bruno CHARRAT, Nicolas CORDIER
  • Patent number: 8327100
    Abstract: A microcontroller system, such as a system-on-a-chip integrated circuit, including a processor (e.g., a Von Neumann processor), memory, and a memory protection unit (MPU), where the MPU provides execute-only access rights for one or more protected areas of the memory. The MPU can allow instructions fetched from within a protected area to access data in the protected area while preventing instructions fetched from outside the protected area from accessing data in the protected area.
    Type: Grant
    Filed: February 16, 2011
    Date of Patent: December 4, 2012
    Assignee: Inside Secure
    Inventors: Sandrine Batifoulier, Stephane Godzinski, Vincent Dupaquis
  • Patent number: 8301905
    Abstract: A system and method for encrypting data. The system includes a controller and a processing element (PE) array coupled to the controller. The PE array is operative to perform one or more of encryption functions and decryption functions using an encryption algorithm. According to the system and method disclosed herein, by utilizing the PE array, the system encrypts and decrypts data efficiently and flexibly.
    Type: Grant
    Filed: September 8, 2006
    Date of Patent: October 30, 2012
    Assignee: Inside Secure
    Inventors: Daniele Fronte, Eric Payrat, Annie Perez
  • Patent number: 8301890
    Abstract: A method of processing programming instructions may include identifying an instruction to be fetched; determining if the identified instruction is protected; if the identified instruction is protected, selecting an alternate instruction from a plurality of alternate instructions corresponding to the identified protected instruction, and fetching the selected alternate instruction; and if the identified instruction is not protected, fetching the identified instruction. Identifying the instruction to be fetched may include identifying an address stored in a program address pointer. Determining if the identified instruction is protected may include comparing the address stored in the program address pointer to one or more addresses stored in a first memory portion, and determining if there is a correspondence.
    Type: Grant
    Filed: August 10, 2006
    Date of Patent: October 30, 2012
    Assignee: Inside Secure
    Inventors: Majid Kaabouch, Eric Le Cocquen, Dominique Parlange
  • Publication number: 20120265797
    Abstract: Disclosed is a method of modular multiplication of two L-bit numbers (X, Y), the result defined from XY+mM, where M is the modulo, of L bits, and m is a number of L bits found and is divisible by 2L. L/k iterations are performed, an iteration i involving XYi+miM+R, Yi, mi being k-bit digits of rank i of Y, m from least significant bits, and R the previous iteration result. In each iteration, a first sub-loop of k/p iterations calculates a partial result of XYi+miM+R on k least significant bits of X, M, R, following decomposition of X, mi into p-bit digits. Starting each sub-loop iteration, the p bits of the current digit of mi are simultaneously produced. A second sub-loop calculates and sums the remaining partial results of XYi+miM+R using mi from the first sub-loop.
    Type: Application
    Filed: April 11, 2012
    Publication date: October 18, 2012
    Applicant: INSIDE SECURE
    Inventor: Michael NIEL
  • Publication number: 20120265794
    Abstract: A circuit for calculating a sum of products, each product having a q-bit binary operand and a k-bit binary operand, where k is a multiple of q,includes a q-input carry-save adder (CSA); a multiplexer (10) by input of the adder, having four k-bit channels respectively receiving the value 0, a first (Yi) of the k-bit operands, the second k-bit operand (M[63:0], mi), and the sum of the two k-bit operands, the output of a multiplexer of rank t (where t is between 0 and q?1) being taken into account by the adder with a t-bit left shift; and each multiplexer having first and second path selection inputs, the bits of a first of the q-bit operands being respectively supplied to the first selection inputs, and the bits of the second q-bit operand being respectively supplied to the second selection inputs.
    Type: Application
    Filed: April 11, 2012
    Publication date: October 18, 2012
    Applicant: INSIDE SECURE
    Inventor: Michael NIEL
  • Patent number: 8285204
    Abstract: A contactless data transmission device includes an antenna circuit supplying an alternating voltage in the presence of an alternating excitation field, a charge modulation transistor having a control terminal receiving a charge modulation signal having at least one low state and one high state, and a conduction terminal receiving the alternating voltage. The device includes a circuit for supplying a boosted direct voltage greater than a peak value of the alternating voltage supplied by the antenna circuit, and a circuit for applying to the control terminal of the charge modulation transistor a charge modulation signal which, in the high state, has a voltage level equal to the boosted direct voltage.
    Type: Grant
    Filed: May 2, 2007
    Date of Patent: October 9, 2012
    Assignee: Inside Secure
    Inventor: Michel Martin
  • Patent number: 8280041
    Abstract: A computer hardware implemented cryptography method computes a modular exponentiation, M :=Cd (mod p·q), upon a message data value C using a Chinese Remainder Theorem (CRT) based technique. To secure against cryptanalysis, the private key moduli p and q are transformed by multiplication with a generated random value s, so that p?: =p·s and q? :=q·s, as shown in an exemplary embodiment in FIG. 2. The CRT steps of the modular exponentiation are applied using the transformed moduli p? and q? to obtain a random intermediate message data value M?. A final reduction of M? modulo p·q yields the final message data value M. Values needed for the computation are loaded into data storage and accessed as needed by electronic processing hardware.
    Type: Grant
    Filed: March 12, 2007
    Date of Patent: October 2, 2012
    Assignee: Inside Secure
    Inventors: Michel Douguet, Neil M. McKeeney
  • Publication number: 20120221618
    Abstract: A method and a device protected against hidden channel attacks includes a calculation of the result of the exponentiation of a data m by an exponent d. The method and the device are configured to execute only multiplications of identical large variables, by breaking down any multiplication of different large variables x, y into a combination of multiplications of identical large variables.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 30, 2012
    Applicant: INSIDE SECURE
    Inventors: Benoît FEIX, Georges GAGNEROT, Myléne ROUSSELLET, Vincent VERNEUIL, Christophe CLAVIER
  • Publication number: 20120199948
    Abstract: A semiconductor chip includes a semiconductor substrate, an integrated circuit region having an integrated circuit, and conductive lines extending above the integrated circuit region. To protect the semiconductor chip against a physical attack, the semiconductor chip includes an array of protection capacitors extending above the conductive lines, at least first and second interconnection conductive lines, arranged to interconnect the protection capacitors in parallel, and a cprotection circuit configured to prevent at least some data from circulating on at least some conductive lines, when a short occurs in at least one protection capacitor.
    Type: Application
    Filed: February 8, 2012
    Publication date: August 9, 2012
    Applicant: INSIDE SECURE
    Inventor: Marc SAISSE
  • Patent number: 8233615
    Abstract: A special form of a modulus and a modified Barrett reduction method are used to perform modular arithmetic in a cryptographic system. The modified Barrett reduction is a method of reducing a number modulo another number without the use of any division. By pre-computing static values used in the Barrett reduction method and by using a special form of the modulus, the calculation of reducing a number modulo another number can be reduced. This can result in a decrease in computation time, speeding up the overall cryptographic process.
    Type: Grant
    Filed: February 19, 2008
    Date of Patent: July 31, 2012
    Assignee: Inside Secure
    Inventors: Michel Douguet, Vincent Dupaquis
  • Patent number: 8233620
    Abstract: A cryptographic system can include a register containing a key and a processor coupled to the register. The processor can be operable for performing a first encrypting operation, where the encrypting operation includes computing a key schedule using the register as a workspace. At the end of the first encrypting operation, the key is recovered from the register for use in a second encrypting operation.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: July 31, 2012
    Assignee: Inside Secure
    Inventors: Vincent Dupaquis, Michel Douguet
  • Publication number: 20120129571
    Abstract: A device includes a radio transceiver equipped with a UHF antenna, a clock generator associated with the radio transceiver, a processor configured to periodically connect to the radiotelephony network by way of the radio transceiver, and a UHF tag reader configured to conduct a transaction with a UHF tag only outside periods of connection of the processor to the radiotelephony network. The device is particularly directed for use in mobile telephones.
    Type: Application
    Filed: November 21, 2011
    Publication date: May 24, 2012
    Applicant: INSIDE SECURE
    Inventors: Bruno CHARRAT, Nicolas CORDIER
  • Publication number: 20120123945
    Abstract: A method for performing a transaction between a portable device and a transaction device includes: providing at least one transaction server having at least one application program configured to receive, process and emit application data, establishing at least one data link between the portable device and the transaction server, establishing a near field communication channel between the portable device and the transaction device, and, via the portable device, transferring to the application program of the server application data sent by the transaction device, and receiving application data sent by the application program of the server and transferring them to the transaction device.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 17, 2012
    Applicant: INSIDE SECURE
    Inventor: Bruno CHARRAT
  • Publication number: 20120123883
    Abstract: A near field transaction system includes a first transaction device having near field communication circuitry, and a portable device having near field communication circuitry. The system also includes at least one transaction server having a memory area with at least one application program, and a mechanism for establishing a data link between the server and the near field communication circuitry of the portable device. The application program is configured to perform a transaction with the first transaction device, using the near field communication circuitry of the portable device as a proximity relay to communicate with the first transaction terminal.
    Type: Application
    Filed: November 16, 2011
    Publication date: May 17, 2012
    Applicant: INSIDE SECURE
    Inventor: Bruno CHARRAT
  • Publication number: 20120071090
    Abstract: An NFC card includes an antenna circuit including an antenna coil having at least one magnetic axis, and at least one integrated circuit linked to the antenna circuit. The magnetic axis of the antenna coil is substantially parallel to the plane of the card, and is at an angle of 45°±25° with respect to a longitudinal axis LX of the card. Embodiments of the invention are applicable in particular to SIM-NFC card and SD-NFC cards.
    Type: Application
    Filed: September 20, 2011
    Publication date: March 22, 2012
    Applicant: INSIDE SECURE
    Inventors: Bruno CHARRAT, Nicolas CORDIER
  • Publication number: 20120071088
    Abstract: An NFC card includes an antenna circuit including an antenna coil having at least one magnetic axis, and at least one integrated circuit linked to the antenna circuit. The magnetic axis of the antenna coil is substantially parallel to at least one side of the card, and the card further includes at least one electrically conductive screen extending near the antenna coil, which does not cross the magnetic axis. The card does not include any magnetically permeable material between the at least one conductive screen and the antenna coil. Embodiments of the invention are applicable in particular to SIM-NFC card and SD-NFC cards.
    Type: Application
    Filed: September 14, 2011
    Publication date: March 22, 2012
    Applicant: INSIDE SECURE
    Inventor: Nicolas CORDIER
  • Publication number: 20120071089
    Abstract: A data emission/reception device by inductive coupling includes an inductive antenna circuit in which an antenna signal appears, a mechanism configured to for extracting a first periodic signal from the antenna signal, a synchronous oscillator receiving the first periodic signal and supplying a second periodic signal, and an active load modulation circuit configured to apply bursts of the second periodic signal to the antenna circuit. The device is configured to place the oscillator in the synchronous oscillation mode before each application of a burst of the second periodic signal to the antenna circuit, then place the oscillator in the free oscillation mode.
    Type: Application
    Filed: September 19, 2011
    Publication date: March 22, 2012
    Applicant: INSIDE SECURE
    Inventors: Bruno CHARRAT, Florian PERNISEK
  • Publication number: 20120011572
    Abstract: The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.
    Type: Application
    Filed: July 7, 2011
    Publication date: January 12, 2012
    Applicant: INSIDE SECURE
    Inventors: Gary CHEW, Charles WALTON