Patents by Inventor Louis-Philippe Goncalves
Louis-Philippe Goncalves has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10148671Abstract: A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behavior of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program.Type: GrantFiled: July 8, 2013Date of Patent: December 4, 2018Assignee: IDEMIA IDENTITY & SECURITY FRANCEInventors: Thanh Ha Le, Julien Bringer, Louis-Philippe Goncalves, Maël Berthier
-
Patent number: 9722971Abstract: The present invention concerns the field of the emulation of contactless payment cards and more particularly the routing of the contactless communication within a device comprising several contactless payment card emulation circuits. The invention proposes a method for routing messages within an NFC controller. This controller has a table of the various applications hosted by the various secure elements. When the controller receives a request for the list of applications contained in the virtual payment card, it intercepts this request and responds with the list of the various applications accessible on the various secure elements. When a request aimed at selecting an application is received, the controller stores the secure element concerned and redirects all the messages to this element as long as it does not receive any new selection request.Type: GrantFiled: December 20, 2012Date of Patent: August 1, 2017Assignee: MORPHOInventors: Louis-Philippe Goncalves, Sebastien Poly
-
Patent number: 9692754Abstract: Ensuring the security of a data transmission by verifying an identity of a user, comprising: a prior step of enrolling a terminal of the user, comprising: an association of a authentic identity data item of the user and a data item of a terminal available to the user and communicating via a network, the association being stored with data for contacting the terminal via the network, and a determination of an identity derived from at least said information, stored in the memory of the terminal, in correspondence with a data item specific to the user, for the purposes of a later strong authentication based on both the data item specific to the user and on the derived identity, as well as a current step of verifying the user identity.Type: GrantFiled: February 1, 2013Date of Patent: June 27, 2017Assignees: Orange, MorphoInventors: Philippe Genestier, Jerome Moreau, Louis-Philippe Goncalves, Bruno Benteo
-
Patent number: 9547498Abstract: A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card.Type: GrantFiled: May 21, 2013Date of Patent: January 17, 2017Assignee: MORPHOInventors: Mael Berthier, Louis-Philippe Goncalves, Francois Lecocq, Cyrille Pepin
-
Patent number: 9183160Abstract: An integrated circuit card including a processor unit associated with RAM and with data exchange means for exchanging data with an external device, the RAM including a memory zone dedicated to exchanged data, and the processor unit being arranged to secure the dedicated memory zone and to store the exchanged data in said zone, and a method of managing the RAM of such a card.Type: GrantFiled: September 12, 2008Date of Patent: November 10, 2015Assignee: MORPHOInventors: Alexis Bailly, David Decroix, Louis-Philippe Goncalves, Cyrille Pepin, Guillaume Roudiere
-
Publication number: 20150312251Abstract: Ensuring the security of a data transmission by verifying an identity of a user, comprising: a prior step of enrolling a terminal of the user, comprising: an association of a authentic identity data item of the user and a data item of a terminal available to the user and communicating via a network, the association being stored with data for contacting the terminal via the network, and a determination of an identity derived from at least said information, stored in the memory of the terminal, in correspondence with a data item specific to the user, for the purposes of a later strong authentication based on both the data item specific to the user and on the derived identity, as well as a current step of verifying the user identity.Type: ApplicationFiled: February 1, 2013Publication date: October 29, 2015Applicants: FRANCE TELECOM, MORPHOInventors: Philippe Genestier, Jerome Moreau, Louis-Philippe Goncalves, Bruno Benteo
-
Publication number: 20150180882Abstract: A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behaviour of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program.Type: ApplicationFiled: July 8, 2013Publication date: June 25, 2015Applicant: MORPHOInventors: Thanh Ha Le, Julien Bringer, Louis-Philippe Goncalves, Maël Berthier
-
Publication number: 20150143096Abstract: A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card.Type: ApplicationFiled: May 21, 2013Publication date: May 21, 2015Applicant: MORPHOInventors: Mael Berthier, Louis-Philippe Goncalves, Francois Lecocq, Cyrille Pepin
-
Publication number: 20150020160Abstract: The present invention concerns the field of the emulation of contactless payment cards and more particularly the routing of the contactless communication within a device comprising several contactless payment card emulation circuits. The invention proposes a method for routing messages within an NFC controller. This controller has a table of the various applications hosted by the various secure elements. When the controller receives a request for the list of applications contained in the virtual payment card, it intercepts this request and responds with the list of the various applications accessible on the various secure elements. When a request aimed at selecting an application is received, the controller stores the secure element concerned and redirects all the messages to this element as long as it does not receive any new selection request.Type: ApplicationFiled: December 20, 2012Publication date: January 15, 2015Inventors: Louis-Philippe Goncalves, Sebastien Poly
-
Patent number: 8621617Abstract: A method of securing execution of a main program that implements nested functions, the method comprising the steps of executing a security management program arranged to update a list of current functions, informing the security management program of the beginning of execution of each function of the main program and updating the list of current functions, informing the security management program of the end of execution of each function, and, after being informed of each end of execution of a function, verifying that the function is indeed the function that was begun the most recently.Type: GrantFiled: March 12, 2009Date of Patent: December 31, 2013Assignee: MORPHOInventors: Louis-Philippe Goncalves, Guillaume Roudiere, David Decroix
-
Patent number: 7966472Abstract: A method of managing a memory having stored elements that are organized in a hierarchy, each having a header containing individual identity information and a body containing data, the identity information of each element being encoded on a plurality of bits each of which can take a first value or a second value. The identity information of each element is obtained by repeating the identity information of an element constituting a direct antecedent of the element in question in the hierarchy, and in said identity information of the antecedent, by changing the value of a first value bit that follows the last second value bit in a direction for reading the identity information.Type: GrantFiled: May 25, 2007Date of Patent: June 21, 2011Assignee: MorphoInventors: David Decroix, Louis-Philippe Goncalves, Cyrille Pepin
-
Publication number: 20110067104Abstract: A method of securing execution of a main program that implements nested functions, the method comprising the steps of executing a security management program arranged to update a list of current functions, informing the security management program of the beginning of execution of each function of the main program and updating the list of current functions, informing the security management program of the end of execution of each function, and, after being informed of each end of execution of a function, verifying that the function is indeed the function that was begun the most recently.Type: ApplicationFiled: March 12, 2009Publication date: March 17, 2011Inventors: Louis-Philippe Goncalves, Guillaume Roudiere, David Decroix
-
Publication number: 20100211727Abstract: An integrated circuit card including a processor unit associated with RAM and with data exchange means for exchanging data with an external device, the RAM including a memory zone dedicated to exchanged data, and the processor unit being arranged to secure the dedicated memory zone and to store the exchanged data in said zone, and a method of managing the RAM of such a card.Type: ApplicationFiled: September 12, 2008Publication date: August 19, 2010Inventors: Alexis Bailly, David Decroix, Louis-Philippe Goncalves, Cyrille Pepin, Guillaume Roudiere
-
Publication number: 20100005256Abstract: A method of managing a memory having stored elements that are organized in a hierarchy, each having a header containing individual identity information and a body containing data, the identity information of each element being encoded on a plurality of bits each of which can take a first value or a second value. The identity information of each element is obtained by repeating the identity information of an element constituting a direct antecedent of the element in question in the hierarchy, and in said identity information of the antecedent, by changing the value of a first value bit that follows the last second value bit in a direction for reading the identity information.Type: ApplicationFiled: May 25, 2007Publication date: January 7, 2010Applicant: SAGEM SECURITEInventors: David Decroix, Louis-Philippe Goncalves, Cyrille Pepin