Patents by Inventor Hugues Thiebeauld De La Crouee

Hugues Thiebeauld De La Crouee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8555390
    Abstract: The method of protection of a microcircuit against an attack includes: a step (205) of determining if an attack has been detected, if an attack has been detected, a step (210, 510) of executing a protection function, and if no attack has been detected, a step (215, 515) of executing a decoy function simulating the protection function and perceptible from outside the microcircuit in a manner substantially identical to the protection function. In some embodiments the decoy function has a power consumption substantially identical to that of the protection function, the protection function effects a step of writing predetermined data at a first address of a non-volatile memory, and the decoy function effects a step of writing in non-volatile memory at a second address different from the first address.
    Type: Grant
    Filed: September 10, 2009
    Date of Patent: October 8, 2013
    Assignee: Oberthur Technologies
    Inventors: Hugues Thiebeauld de la Crouee, Oliver Chamley
  • Patent number: 8386791
    Abstract: The invention relates to a secure data processing method comprising the steps of generating (E204; E304) a first random value (A1); executing (E206; E306) a first cryptographic algorithm (FK) using the first random value (A1); generating (E208; E308) a second random value (A2); executing (E210; E310) a second cryptographic algorithm (FK; GK) using the second random value (A2); and generating a result (V) to verify that the first algorithm (FK) was properly executed.
    Type: Grant
    Filed: March 7, 2005
    Date of Patent: February 26, 2013
    Assignee: Oberthur Technologies
    Inventors: RĂ©gis Bevan, Christophe Giraud, Hugues Thiebeauld De La Crouee
  • Patent number: 8311212
    Abstract: A data processing method comprises the following steps: determining a first result data word from a first input data word and a first secret data word; obtaining a first compressed data word from the first result data word or the first input data word using a compression algorithm; determining a second result data word from a second input data word and a second secret data word; obtaining a second compressed data word from the second result data word using the compression algorithm; comparing the first compressed data word and the second compressed data word.
    Type: Grant
    Filed: August 1, 2008
    Date of Patent: November 13, 2012
    Assignee: Oberthur Technologies
    Inventors: Christophe Giraud, Hugues Thiebeauld de la Crouee
  • Patent number: 8266423
    Abstract: A method for securing a program against attacks by error, i.e. in a chip card, wherein at least one jump instruction, including a relative address chosen from a plurality of possible relative addresses, is identified in the program, wherein the at least one jump instruction makes it possible to reach a targeted address inside the memory area extending before and after the jump instruction and regrouping the plurality of possible relative addresses, inside the memory area, wherein an instruction to be preserved is identified and, in order to secure at least the instruction, at least one first non-operative batch including at least one instruction is inserted, the insertion being carried out in such a way as to ensure that the insertion is compatible with maintenance of the address targeted by the jump instruction inside the memory area and that the insertion is compatible with the normal running of the program.
    Type: Grant
    Filed: October 18, 2005
    Date of Patent: September 11, 2012
    Assignee: Oberthur Technologies
    Inventors: Christophe Giraud, Hugues Thiebeauld De La Crouee
  • Publication number: 20100064370
    Abstract: The method of protection of a microcircuit against an attack includes: a step (205) of determining if an attack has been detected, if an attack has been detected, a step (210, 510) of executing a protection function, and if no attack has been detected, a step (215, 515) of executing a decoy function simulating the protection function and perceptible from outside the microcircuit in a manner substantially identical to the protection function. In some embodiments the decoy function has a power consumption substantially identical to that of the protection function, the protection function effects a step of writing predetermined data at a first address of a non-volatile memory, and the decoy function effects a step of writing in non-volatile memory at a second address different from the first address.
    Type: Application
    Filed: September 10, 2009
    Publication date: March 11, 2010
    Applicant: OBERTHUR TECHNOLOGIES
    Inventors: Hugues Thiebeauld de la Crouee, Olivier Chamley
  • Publication number: 20090254761
    Abstract: A secure data processing method includes the following steps: padding (E206) a memory area (MAC?) with a pad value (A); writing (E208) a first datum in the memory area (MAC?); in the area, reading (E210) a second datum with at least one part of the first datum as it was written in the memory area (MAC?); and executing an operation (E210) using the second datum.
    Type: Application
    Filed: April 14, 2005
    Publication date: October 8, 2009
    Inventors: Hugues Thiebeauld De La Crouee, Christophe Giraud
  • Publication number: 20090034717
    Abstract: A data processing method comprises the following steps: determining a first result data word from a first input data word and a first secret data word; obtaining a first compressed data word from the first result data word or the first input data word using a compression algorithm; determining a second result data word from a second input data word and a second secret data word; obtaining a second compressed data word from the second result data word using the compression algorithm; comparing the first compressed data word and the second compressed data word.
    Type: Application
    Filed: August 1, 2008
    Publication date: February 5, 2009
    Applicant: OBERTHUR TECHNOLOGIES
    Inventors: Christophe GIRAUD, Hugues Thiebeauld De La Crouee
  • Publication number: 20070250703
    Abstract: A method for securing a program against attacks by error, i.e. in a chip card, wherein at least one jump instruction, including a relative address chosen from a plurality of possible relative addresses, is identified in the program, wherein the at least one jump instruction makes it possible to reach a targeted address inside the memory area extending before and after the jump instruction and regrouping the plurality of possible relative addresses, inside the memory area, wherein an instruction to be preserved is identified and, in order to secure at least the instruction, at least one first non-operative batch including at least one instruction is inserted, the insertion being carried out in such a way as to ensure that the insertion is compatible with maintenance of the address targeted by the jump instruction inside the memory area and that the insertion is compatible with the normal running of the program.
    Type: Application
    Filed: October 18, 2005
    Publication date: October 25, 2007
    Applicant: Oberthur Card System SA
    Inventors: Christophe Giraud, Hugues Thiebeauld De La Crouee
  • Publication number: 20070177720
    Abstract: The invention relates to a secure data processing method comprising the steps of generating (E204; E304) a first random value (A1); executing (E206; E306) a first cryptographic algorithm (FK) using the first random value (A1); generating (E208; E308) a second random value (A2); executing (E210; E310) a second cryptographic algorithm (FK; GK) using the second random value (A2); and generating a result (V) to verify that the first algorithm (FK) was properly executed.
    Type: Application
    Filed: March 7, 2005
    Publication date: August 2, 2007
    Applicant: OBERTHUR CARD SYSTEMS SA
    Inventors: Regis Bevan, Christophe Giraud, Hugues Thiebeauld De La Crouee
  • Publication number: 20060242700
    Abstract: A method for making secure execution of a computer program includes the following steps: stacking a predetermined value in a pile of instructions of the program; and stack popping the pile, the stack popping step being adapted, as the case may be, to enable detection of an anomalous execution.
    Type: Application
    Filed: July 6, 2004
    Publication date: October 26, 2006
    Inventors: Jean-Bernard Fischer, Hugues Thiebeauld De La Crouee