Patents by Inventor Laurent Gauteron
Laurent Gauteron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11606398Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: GrantFiled: June 4, 2020Date of Patent: March 14, 2023Assignee: NAGRAVISION S.A.Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Publication number: 20210058433Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: ApplicationFiled: June 4, 2020Publication date: February 25, 2021Applicant: NAGRAVISION S.AInventors: Francois FER, Marco MACCHETTI, Laurent GAUTERON, Jerome PERRINE
-
Patent number: 10715557Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: GrantFiled: September 13, 2018Date of Patent: July 14, 2020Assignee: NAGRAVISION S.A.Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Patent number: 10348698Abstract: Disclosed herein are methods and systems for link-based enforcement of routing of communication sessions via authorized media relays. In an embodiment, a media relay receives encrypted first payloads from a first endpoint and encrypted second payloads from a second endpoint as part of a session. The encrypted first payloads require a first key for decryption and the encrypted second payloads requite a second key for decryption. The media relay is preconfigured prior to the session with secrets useable for identifying the first and second keys. The media relay decrypts the first payloads using the first key and decrypts the second payloads using the second key, and transmits the first payloads to the second endpoint and the second payloads to the first endpoint as part of the session.Type: GrantFiled: September 15, 2016Date of Patent: July 9, 2019Assignee: Nagravision S.A.Inventors: Jean-Baptiste Fouet, Laurent Gauteron
-
Patent number: 10237730Abstract: Disclosed herein are methods and systems for encrypting communications using a secure element. An embodiment takes the form of a method including the steps of performing a key-exchange procedure with an endpoint via a voice-communication device to obtain a symmetric seed key for a secure voice session with the endpoint; generating first and second symmetric session keys for the secure voice session based on the obtained symmetric seed key; receiving outbound voice packets from the voice-communication device in connection with the secure voice session, each outbound voice packet including a header and an unencrypted payload; using a first symmetric encryption algorithm and the first symmetric session key, followed by a second symmetric encryption algorithm and the second symmetric session key to generate and output twice-encrypted outbound-voice-packet payloads to the voice-communication device for transmission to the endpoint in connection with the secure voice session.Type: GrantFiled: May 10, 2016Date of Patent: March 19, 2019Assignee: NAGRAVISION S.A.Inventors: Bernard Benoit, Jean-Claude Fournier, Jerome Perrine, Laurent Gauteron
-
Patent number: 10237305Abstract: Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element.Type: GrantFiled: June 14, 2016Date of Patent: March 19, 2019Assignee: NAGRAVISION S.A.Inventors: Bernard Benoit, Jean-Claude Fournier, Laurent Gauteron, Yishan Zhao, Francois Fer
-
Patent number: 10192041Abstract: Disclosed herein are methods and systems for authentication using zero-knowledge code. One embodiment takes the form of a process that includes detecting an accessory-access-request event associated with a trusted accessory. The process includes generating a seed sequence having a first number of seed-sequence elements. The process includes outputting an indication of at least one seed-sequence element. The process includes receiving at least one seed-sequence-element-modifier signal for at least one of the seed-sequence elements. The process includes modifying the generated seed sequence in accordance with the at least one received seed-sequence-element-modifier signal. The process includes comparing the modified seed sequence with a stored access sequence. The process includes granting operational access to the trusted accessory when the modified seed sequence matches the stored access sequence.Type: GrantFiled: September 22, 2015Date of Patent: January 29, 2019Assignee: NAGRAVISION S.A.Inventors: Nicolas Fischer, Laurent Gauteron
-
Publication number: 20190028518Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: ApplicationFiled: September 13, 2018Publication date: January 24, 2019Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Patent number: 10122767Abstract: System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: GrantFiled: May 29, 2015Date of Patent: November 6, 2018Assignee: NAGRAVISION S.A.Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Publication number: 20180077126Abstract: Disclosed herein are methods and systems for link-based enforcement of routing of communication sessions via authorized media relays. In an embodiment, a media relay receives encrypted first payloads from a first endpoint and encrypted second payloads from a second endpoint as part of a session. The encrypted first payloads require a first key for decryption and the encrypted second payloads requite a second key for decryption. The media relay is preconfigured prior to the session with secrets useable for identifying the first and second keys. The media relay decrypts the first payloads using the first key and decrypts the second payloads using the second key, and transmits the first payloads to the second endpoint and the second payloads to the first endpoint as part of the session.Type: ApplicationFiled: September 15, 2016Publication date: March 15, 2018Inventors: Jean-Baptiste Fouet, Laurent Gauteron
-
Publication number: 20170237780Abstract: Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element.Type: ApplicationFiled: June 14, 2016Publication date: August 17, 2017Inventors: Bernard Benoit, Jean-Claude Fournier, Laurent Gauteron, Yishan Zhao, Francois Fer
-
Publication number: 20170238172Abstract: Disclosed herein are methods and systems for encrypting communications using a secure element. An embodiment takes the form of a method including the steps of performing a key-exchange procedure with an endpoint via a voice-communication device to obtain a symmetric seed key for a secure voice session with the endpoint; generating first and second symmetric session keys for the secure voice session based on the obtained symmetric seed key; receiving outbound voice packets from the voice-communication device in connection with the secure voice session, each outbound voice packet including a header and an unencrypted payload; using a first symmetric encryption algorithm and the first symmetric session key, followed by a second symmetric encryption algorithm and the second symmetric session key to generate and output twice-encrypted outbound-voice-packet payloads to the voice-communication device for transmission to the endpoint in connection with the secure voice session.Type: ApplicationFiled: May 10, 2016Publication date: August 17, 2017Inventors: Bernard Benoit, Jean-Claude Fournier, Jerome Perrine, Laurent Gauteron
-
Publication number: 20170083690Abstract: Disclosed herein are methods and systems for authentication using zero-knowledge code. One embodiment takes the form of a process that includes detecting an accessory-access-request event associated with a trusted accessory. The process includes generating a seed sequence having a first number of seed-sequence elements. The process includes outputting an indication of at least one seed-sequence element. The process includes receiving at least one seed-sequence-element-modifier signal for at least one of the seed-sequence elements. The process includes modifying the generated seed sequence in accordance with the at least one received seed-sequence-element-modifier signal. The process includes comparing the modified seed sequence with a stored access sequence. The process includes granting operational access to the trusted accessory when the modified seed sequence matches the stored access sequence.Type: ApplicationFiled: September 22, 2015Publication date: March 23, 2017Inventors: Nicolas Fischer, Laurent Gauteron
-
Publication number: 20160352708Abstract: System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: ApplicationFiled: May 29, 2015Publication date: December 1, 2016Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Publication number: 20150249679Abstract: A protection device equips an electronic device comprising hardware and software capable of executing a sensitive process. This protection device comprises i) a detection means arranged for detecting a fault effect into the electronic device, resulting from at least one fault attack of an attacker during execution of the sensitive process, and ii) a correction means arranged for correcting this detected fault effect before it may be detected by the attacker, so that set up of the fault be considered as missed by this attacker.Type: ApplicationFiled: February 7, 2013Publication date: September 3, 2015Inventors: Karine Villegas, Olivier Pahaut, Laurent Gauteron
-
Publication number: 20150121510Abstract: The invention relates to a method for entering data, data to be entered comprising at least one digit. A first device comprises at least one touch sensitive interface. The touch sensitive interface is sensitive to at least one touch. According to the invention, at least one digit being associated with no touch or a count of at least one touch, the method comprises the following steps. The first device detects, in a predetermined time period, a count of at least one touch that is or is not present at once or several times. The first or a second device determines the digit associated with no detected touch or a detected count of at least one touch, the second device being connected to the first device. The invention also relates to corresponding device and system.Type: ApplicationFiled: October 18, 2012Publication date: April 30, 2015Applicant: GEMALTO SAInventors: Laurent Gauteron, Sébastien Volpe
-
Publication number: 20110258397Abstract: The invention is a method of protecting a data intended to be accessed by an operating system embedded in an electronic device. The operating system is intended to manage an object comprising a header and a body. The data is stored in the body. The object is recorded in a memory of the electronic device. The electronic device comprises a memory manager able to provide access to the memory. The memory manager forbids the operating system to access the body as long as a preset action has not been successfully performed.Type: ApplicationFiled: December 15, 2009Publication date: October 20, 2011Applicant: GEMALTO SAInventors: Laurent Gauteron, Daniel Le Cardinal
-
Patent number: 7991953Abstract: The invention relates to a verification of applications in interpreted language of the byte-code type (pseudo-code) loaded on portable electronic devices, in particular a chipcard and a method for verification of an application (31) interpreted by a virtual machine (42), said application being loaded on a portable electronic device (1), comprising at least one processor (2) and one RAM (5). The method comprises carrying out the following after loading said application in the device and before validation thereof, checks in the code of said application by means of a process carried out by the processor (2), characterized in comprising, on starting a sub-program, a step of backing up the actual verification context (200 to 203) in the RAM (5), a step for creation and activation of a new verification context (206 to 209) for the sub-program and a step for restoration of the verification context (200 to 203) previously backed-up.Type: GrantFiled: March 14, 2006Date of Patent: August 2, 2011Assignee: Gemalto SAInventors: Alexandre Benoit, Laurent Gauteron
-
Publication number: 20100239091Abstract: The invention relates to a method for generating masks in a communicating object, the masks being intended to mask data to be stored in the communicating object. At least one master mask is stored in the communicating object. According to the invention, the method involves applying at least one diversifier to the master mask so as to generate a diversified mask; masking the datum to be stored in the communicating object by a reversible function using the diversified mask, the mask generating a masked datum; and storing the masked datum in the communicating object with the diversifier used to generate the diversified mask for obtaining the masked datum. The invention also relates to a communicating object including components for implementing such a method.Type: ApplicationFiled: August 27, 2008Publication date: September 23, 2010Applicant: Gemalto SAInventors: Frederic Amiel, Laurent Gauteron
-
Publication number: 20090049258Abstract: The invention relates to a verification of applications in interpreted language of the byte-code type (pseudo-code) loaded on portable electronic devices, in particular a chipcard and a method for verification of an application (31) interpreted by a virtual machine (42), said application being loaded on a portable electronic device (1), comprising at least one processor (2) and one RAM (5). The method comprises carrying out the following after loading said application in the device and before validation thereof, checks in the code of said application by means of a process carried out by the processor (2), characterized in comprising, on starting a sub-programme, a step of backing up the actual verification context (200 to 203) in the RAM (5), a step for creation and activation of a new verification context (206 to 209) for the sub-programme and a step for restoration of the verification context (200 to 203) previously backed-up.Type: ApplicationFiled: March 14, 2006Publication date: February 19, 2009Applicant: GEMPLUSInventors: Alexandre Benoit, Laurent Gauteron