Patents by Inventor David Naccache

David Naccache has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090224872
    Abstract: A method is provided for controlling access by a series of users to a space and/or particular service. The method includes the following steps for each of the users: requesting access to the space and/or service by the user, issuing an access authorization or denial; opening of an access to the space or the service, if an access authorization was issued; estimating a waiting period prior to accessing the space and/or service when the opening is delayed; and issuing to the user at least one piece of information representative of the waiting period. The estimation step takes account of a number of users having already passed through the access and still waiting in the space and/or the service.
    Type: Application
    Filed: February 12, 2009
    Publication date: September 10, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventors: David Naccache, Christophe Dolique
  • Publication number: 20090207021
    Abstract: A traceability method is provided for an electronic payment terminal, in the event of a theft thereof. The method includes the following steps: detection of a lack of contact with a base and/or another terminal associated with the terminal, for a predetermined time span, generating a passage of the terminal into a stolen state; and in the stolen state, storage, in a secure memory area of the terminal, of a series of successive tracking data each associated with time stamp information, so as to enable reconstruction of a route followed by the terminal.
    Type: Application
    Filed: February 12, 2009
    Publication date: August 20, 2009
    Applicant: Compagnie Industrielle Et Financiere D"Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20090204952
    Abstract: A method for securing use of a primary computer program driving at least one data receiving and delivery device. The method implements a secondary computer checking program, different from the primary program and capable of delivering the same output data as at least a portion of the primary program, referred to as the critical portion, in the presence of identical input data. The following steps are performed when at least one of the critical portions of the primary program is activated: executing the critical portion, delivering first output data based on input data; executing the checking program, delivering second output data based on the input data; comparing the first and second output data and generating anomaly information, if the first and second output data are different; transmitting the anomaly information to a remote server; and continuing the primary program, based on the first and second output data.
    Type: Application
    Filed: February 10, 2009
    Publication date: August 13, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20090200372
    Abstract: A method is provided for authenticating micro-processor cards to determine whether a card is a genuine card or a fake card. Authentication is performed by a checking program of at least one card reader terminal. The program sends to each card commands belonging to a standard and public set of commands. The method includes: modifying the checking program in the terminal or terminals, in such a way that the program additionally sends, to each card to be authenticated, at least one additional command, called a secret command, from a set of at least one additional command, pre-inserted into each genuine card, and different from the standard and public set of commands; and a step of detecting authenticity of the card, if the secret command is recognised and/or processed correctly, or the presence of a clone, if the secret command is not recognised and/or is processed wrongly.
    Type: Application
    Filed: February 11, 2009
    Publication date: August 13, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "ingenico"
    Inventor: David Naccache
  • Publication number: 20090172268
    Abstract: A method is provided for securing a microprocessor containing at least one main program, which operates with at least one memory. The method includes implementing counter-measures, during which additional operations, that are not required for the main program, are implemented so as to modify the consumption of current and/or the processing time of the microprocessor. The method also includes: identification of at least one address or one memory zone of the memory(ies), called critical addresses, and which contain, or which may contain, critical data for said main program; monitoring the addressing ports of the memory(ies), so as to detect the access to the critical address(es); and activation of the step of implementing counter-measures, when an access to the critical address(es) is detected.
    Type: Application
    Filed: December 26, 2008
    Publication date: July 2, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventors: David Naccache, Nora Dabbous
  • Publication number: 20090151010
    Abstract: A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected.
    Type: Application
    Filed: December 5, 2008
    Publication date: June 11, 2009
    Applicant: COMPAGNIE INDUSTRIELLE ET FINANCIERE D'INGENIERIE "INGENICO"
    Inventor: David Naccache
  • Publication number: 20090100269
    Abstract: A biometric authentication method and apparatus are provided. A user to be authenticated uses a portable object including at least one biometric sensor. The portable object is adapted to cooperate with a terminal. The method includes: capturing, by the portable object, a biometric sample to be compared coming from the user to be authenticated; transmitting, by the portable object, the biometric sample, in a secure form to an authentication server; and determining, by the authentication server, a signature to be authenticated using said biometric sample, then comparing the signature with a reference signature.
    Type: Application
    Filed: October 13, 2008
    Publication date: April 16, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20090100240
    Abstract: A method is provided for authenticating a carrier of a portable object having a memory for memorising at least one item of secret information. The method includes: authentication processing of a signature provided by said carrier, taking account of said secret information; supplying an item of information for the authentication decision, positive or negative, implementing, in a non volatile memory of said portable object, an incorrect signature indicator which may adopt a value indicating a normal situation and at least one value indicating an abnormal situation. The step of implementing including: after said information supplying step, writing, in said incorrect signature indicator, a value indicating an abnormal situation, if said authentication decision is negative; and before said authentication step, and if said incorrect signature indicator contains a value indicating an abnormal situation, a step generating a delay.
    Type: Application
    Filed: October 10, 2008
    Publication date: April 16, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20090097714
    Abstract: A biometric authentication method if provided for an individual to be authenticated amongst a very large quantity of individuals with an authentication system storing a set of reference information each associated to one of the individuals. The reference information is distributed across a plurality of sub-databases. The method includes a phase of adding reference information representative of a new individual, including selecting the sub-database that is best adapted to store the reference information to be added.
    Type: Application
    Filed: October 13, 2008
    Publication date: April 16, 2009
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20090095809
    Abstract: A method and apparatus are provided for transmitting a secret code of a new microprocessor card held by a user. The method includes: insertion by the user of the new card into a card reading terminal; sending a request to obtain the secret code by the card reading terminal to a management server; and transmission by the management server, via a communication network, of the secret code or of an item of information permitting the secret code to be obtained, to a communication terminal of the user.
    Type: Application
    Filed: October 13, 2008
    Publication date: April 16, 2009
    Applicant: COMPAGNIE INDUSTRIELLE ET FINANCIERE D'INGENIERIE "INGENICO"
    Inventor: David Naccache
  • Publication number: 20090095808
    Abstract: A method is provided for manufacturing a payment terminal. The method includes: obtaining a dedicated battery with a predetermined complex shape adapted for cooperating with the shape of at least one other adjacent component of said terminal; and assembling the components of said terminal, including positioning said battery in an imbricated way with said adjacent component(s).
    Type: Application
    Filed: October 10, 2008
    Publication date: April 16, 2009
    Applicant: Compagnie Financiere Et Industrielle D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20080257954
    Abstract: An electronic payment terminal includes a data entry device, a processor and a memory. The memory contains a structure arranged to list at least one customer identifier, a personal identification number and an amount, all associated. The memory also contains a program having comprising instructions for storing, in an example of the structure after entry, the customer identifier and the personal identification number. The same example of the structure is then updated locally by payments out and in made on the terminal on behalf of the customer identified.
    Type: Application
    Filed: April 18, 2008
    Publication date: October 23, 2008
    Applicant: Compagnie Industrielle et Financiere D'Ingenierie "Ingenico"
    Inventors: David Naccache, Michael Troumelin
  • Patent number: 7433501
    Abstract: A method and associated device for checking a biometric signature by a simple and secure calculation adapted to personal objects of the chip card type. The method is based on the storage within the object of an obscured biometric signature and an associated authentication code. A terminal capturing a fingerprint compares the fingerprint data with the obscured biometric signature transmitted by the card and transfers the result of this comparison to the chip card, which validates this result with the authentication code.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: October 7, 2008
    Assignee: Gemplus
    Inventors: David Naccache, Claude Barral, Jean-Sebastien Coron, Cédric Cardonnel
  • Publication number: 20080232582
    Abstract: A method for dynamically authenticating an executable program, that is the continuation of the instructions defined thereby, is performed repeatedly during the very execution of the program. The method for making secure an electronic portable object through execution of a program supplied by another insecure electronic object uses, inter alia, a secret key protocol.
    Type: Application
    Filed: February 25, 2005
    Publication date: September 25, 2008
    Applicant: GEMPLUS
    Inventors: Benoit Chevallier-Mames, David Naccache, Pascal Paillier
  • Publication number: 20080218347
    Abstract: A method and apparatus are provided for securing a mobile digital processing device. The method includes: a protective step that is self-activated when the mobile device measures an evolutionary value approaching a threshold value and wherein the mobile device executes a protective action; and includes a step of self-setting the evolutionary value when the mobile device and a holder associated therewith are detected in a common vicinity. The evolutionary value is positioned at a value remote from the threshold value, so as to allow the evolutionary value to approach the threshold value naturally, when the mobile device and the holder are no longer detected in a common vicinity.
    Type: Application
    Filed: March 3, 2008
    Publication date: September 11, 2008
    Applicant: Compagnie Industrielle Et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20080195345
    Abstract: An integrated circuit is provided, which includes at least one external input, a power supply and a plurality of elementary components, each having at least one internal input and at least one internal output. The circuit further includes at least one test unit having an AND gate, each input of which is connected to an internal output of one of the elementary components and an output of which is connected to the power supply via a resistor.
    Type: Application
    Filed: February 13, 2008
    Publication date: August 14, 2008
    Applicant: Compagnie Industrielle et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20080163376
    Abstract: A hardware security module is provided, which includes: a memory able to store a secret; a processor coupled to the memory; a sealed chamber containing a gas; a transducer coupled to the processor, sensitive to a property of the gas, able to convert this property into a signal and to supply this signal to the processor. The processor is able to generate or accept a secret in the event of the reception of a signal, supplied by the transducer, corresponding to a first substantial variation in said property of the gas. The processor is able to act on the secret in the event of the reception of a signal, supplied by the transducer, corresponding to a second substantial variation in said property of the gas. A method is also provided for commissioning such a module as well as an electronic payment terminal including this module.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 3, 2008
    Applicant: Compagnie Industrielle et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20080155507
    Abstract: A method is provided for auditing compliance of an electronic platform, referred to as the platform being tested, and/or a computer program being tested, which is present on the platform being tested. The method includes the following steps: transmitting the same data set, via an auditing device, to the platform being tested, on the one hand, and, on the other hand, to a compliant reference platform present in the auditing device; and deciding upon the compliance of the platform being tested and/or the computer program being tested, based on an analysis of the respective behaviors of the platform being tested and the reference platform. The auditing device then issues a compliance decision.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 26, 2008
    Applicant: Compagnie Industrielle et Financiere D'Ingenierie "Ingenico"
    Inventor: David Naccache
  • Publication number: 20080100449
    Abstract: A process is provided for deterring the theft of notes equipped with a radio-tag type authenticity check element, capable of returning an item of authenticity information, in response to an authentication request emitted by a check device. Such a process includes the following steps: transmission to the check element of at least one inactivation code, rendering the note invalid; storage and/or transport of the invalid note; and reactivation of the check element, using at least one activation code, depending on the inactivation code, rendering the note valid.
    Type: Application
    Filed: October 25, 2007
    Publication date: May 1, 2008
    Applicant: "Compagnie Industrielle et Financiere D'Ingenierie" Ingenico
    Inventor: David Naccache
  • Publication number: 20080103912
    Abstract: A method is provided for supplying data representative of transactions between a client and at least one merchant, via a banking institution. The banking institution issues a statement to the client which, for each transaction, includes a statement line containing at least one reference for said transaction and/or the merchant, and an amount corresponding thereto. The method includes a transaction phase, including: storing data representative of said transaction, in a statement server; acquiring and storing, in an illustrative data server, at least one information representative of a photograph and/or illustration representative of said merchant, called illustrative information. A supplying phase includes: creating the statement, associating to at least one of the statement lines the data representative of the transaction and at least some of the illustrative information, and/or at least one information pointing via one hyperlink to at least some of said illustrative information, called access information.
    Type: Application
    Filed: October 25, 2007
    Publication date: May 1, 2008
    Applicant: "Compagnie Industrielle et Financiere D'Ingenierie" Ingenico
    Inventor: David Naccache