Patents by Inventor Mael Berthier

Mael Berthier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11212314
    Abstract: The invention proposes a method for an object (1) to communicate with a server (2) of a connected objects network to report that a clone may be impersonating the object in the network, which method comprises the following steps implemented by the object (1): transmitting (106) to the server (2) a request from the object (1) to join the connected objects network; after transmitting the join-request, detecting (110) whether a reference message (uplink) transmitted by the object (1) to the server (2) was rejected or ignored; in response to the detection, transmitting (114) to the server (2) an alert message indicating the rejection or ignoring.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: December 28, 2021
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Yoann Fages-Tafanelli, Aurélien Cuzzolin, Fabien Blanco, Maël Berthier
  • Publication number: 20200184068
    Abstract: The present invention relates to a device (1) such as a connected object comprising a first electronic circuit (2) comprising: a first processing unit (6) for executing a program, a first memory (8) for memorizing data during the execution of the program, a debug port (10) dedicated to checking the execution of the program from outside the first circuit, a second electronic circuit (4) connected to the debug port (10), comprising: a second memory (14) memorizing reference data related to the program, a second processing unit (12) for implementing the following steps automatically and autonomously via the debug port (10): checking the integrity of the data memorized by the first memory (8) and/or the compliance of the program's execution by the first processing unit (6) with a reference execution, assisted by the reference data.
    Type: Application
    Filed: December 3, 2019
    Publication date: June 11, 2020
    Inventors: Fabien BLANCO, Jean-Yves Pierre BERNARD, Maël BERTHIER
  • Publication number: 20200120132
    Abstract: The invention proposes a method for an object (1) to communicate with a server (2) of a connected objects network to report that a clone may be impersonating the object in the network, which method comprises the following steps implemented by the object (1): transmitting (106) to the server (2) a request from the object (1) to join the connected objects network; after transmitting the join-request, detecting (110) whether a reference message (uplink) transmitted by the object (1) to the server (2) was rejected or ignored; in response to the detection, transmitting (114) to the server (2) an alert message indicating the rejection or ignoring.
    Type: Application
    Filed: October 16, 2019
    Publication date: April 16, 2020
    Inventors: Yoann FAGES-TAFANELLI, Aurélien CUZZOLIN, Fabien BLANCO, Maël BERTHIER
  • Patent number: 10521586
    Abstract: The invention relates to a secured comparative processing method of the type in which a processor of an electronic component compares a set of proof data received by the processor as an input with main secret data stored in said electronic component, characterised in that the processor executes, in parallel with the comparison with the secret data, a series of complementary operations on the set of proof data which generate on the electronic component a variation in behaviour which is a function of the proof data which the component receives as an input and which is added to the variation in behaviour linked to the comparison with the main secret data, the series of complementary operations including a series of base operations repeated K times, and the execution of said series being preceded by an adjustment of execution parameters of said series, the parameters including: the identifier of the series of base operations to be executed, the series of base operations being comprised within a set of predefined
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: December 31, 2019
    Assignee: IDEMIA IDENTITY & SECURITY
    Inventors: Mael Berthier, Victor Servant
  • Patent number: 10489667
    Abstract: A biometric identification method includes the steps of comparing a candidate print with a reference print and of validating the identification according to a certain number of characteristics common to both prints and a predetermined validation threshold. The method includes the steps of creating at least one deceiving print and comparing same with a candidate print. An identification device designed for implementing this method is also provided.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: November 26, 2019
    Assignee: IDEMIA IDENTITY & SECURITY
    Inventors: Marcelin Ragot, Mael Berthier, Yves Bocktaels, Julien Bringer
  • Patent number: 10404719
    Abstract: Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable memory and a volatile memory, the equipment including a rewritable non-volatile memory and a communication bus enabling the electronic device to store data in the rewritable non-volatile memory. The method includes: creating a secured channel by encryption between the equipment and a server; obtaining an authentication key from the server; loading data and a message authentication code from the rewritable non-volatile memory to the volatile memory, the message authentication code obtained by the electronic device from the authentication key and said data prior to the storage of said data and message authentication code in the rewritable non-volatile memory, the electronic device not having kept the authentication key following the obtaining of the message authentication code; verifying said data using the secret key and the message authentication code.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: September 3, 2019
    Assignees: IDEMIA IDENTITY & SECURITY FRANCE, STARCHIP
    Inventors: Jean-Yves Bernard, Yves Fusella, Maël Berthier, Lauren Del Giudice
  • Patent number: 10148671
    Abstract: A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behavior of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program.
    Type: Grant
    Filed: July 8, 2013
    Date of Patent: December 4, 2018
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Thanh Ha Le, Julien Bringer, Louis-Philippe Goncalves, Maël Berthier
  • Patent number: 10083297
    Abstract: Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input with main secret data (CTRL, PIN) stored in said electronic component, characterized in that the processor implements, in addition to the comparison with the secret data (CTRL, PIN), complementary operations on the proof data (EPR, AUTH) which generate on the electronic component a variation of behavior which is dependent on the proof data (EPR, AUTH) which it receives as input and which is compounded with the behavioral variation related to the comparison with the main secret data (CTRL, PIN).
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: September 25, 2018
    Assignee: MORPHO
    Inventor: Mael Berthier
  • Publication number: 20180145992
    Abstract: Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable memory and a volatile memory, the equipment including a rewritable non-volatile memory and a communication bus enabling the electronic device to store data in the rewritable non-volatile memory. The method includes: creating a secured channel by encryption between the equipment and a server; obtaining an authentication key from the server; loading data and a message authentication code from the rewritable non-volatile memory to the volatile memory, the message authentication code obtained by the electronic device from the authentication key and said data prior to the storage of said data and message authentication code in the rewritable non-volatile memory, the electronic device not having kept the authentication key following the obtaining of the message authentication code; verifying said data using the secret key and the message authentication code.
    Type: Application
    Filed: November 21, 2017
    Publication date: May 24, 2018
    Applicants: IDEMIA IDENTITY & SECURITY FRANCE, STARCHIP
    Inventors: Jean-Yves Bernard, Yves Fusella, Maël Berthier, Lauren Del Giudice
  • Patent number: 9929754
    Abstract: An embedded system and, in particular, a communication protocol suitable for a data transmission using auxiliary physical channels of such an embedded system. A transmission method suitable for such a channel includes the transmission of a data signal based on the encoding of three symbols. The message consists of a preamble allowing recognition of the symbols used, followed by the significant part of the message. The decoding of the message comprises a first step of learning the symbols used, prior to the decoding of the significant part of the message.
    Type: Grant
    Filed: May 7, 2013
    Date of Patent: March 27, 2018
    Assignee: MORPHO
    Inventors: Mael Berthier, Yves Bocktaels, Julien Bringer, Francois Lecocq
  • Patent number: 9922234
    Abstract: A biometric identification method comprising the steps of comparing a candidate print with a reference print and validating identification as a function of a number of characteristics that are common in the two prints and of a predetermined validation threshold, the method being characterized in that it comprises the steps of altering the biometric characteristics of one of the two prints prior to comparison and of taking the alteration into account during validation.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: March 20, 2018
    Assignee: MORPHO
    Inventors: Yves Bocktaels, Julien Bringer, Mael Berthier, Marcelin Ragot
  • Publication number: 20170177961
    Abstract: A biometric identification method includes the steps of comparing a candidate print with a reference print and of validating the identification according to a certain number of characteristics common to both prints and a predetermined validation threshold. The method includes the steps of creating at least one deceiving print and comparing same with a candidate print. An identification device designed for implementing this method is also provided.
    Type: Application
    Filed: December 22, 2016
    Publication date: June 22, 2017
    Inventors: Marcelin RAGOT, Mael BERTHIER, Yves BOCKTAELS, Julien BRINGER
  • Publication number: 20170017790
    Abstract: The invention relates to a secured comparative processing method of the type in which a processor of an electronic component compares a set of proof data received by the processor as an input with main secret data stored in said electronic component, characterised in that the processor executes, in parallel with the comparison with the secret data, a series of complementary operations on the set of proof data which generate on the electronic component a variation in behaviour which is a function of the proof data which the component receives as an input and which is added to the variation in behaviour linked to the comparison with the main secret data, the series of complementary operations including a series of base operations repeated K times, and the execution of said series being preceded by an adjustment of execution parameters of said series, the parameters including: the identifier of the series of base operations to be executed, the series of base operations being comprised within a set of predefined
    Type: Application
    Filed: December 23, 2014
    Publication date: January 19, 2017
    Inventors: Maël BERTHIER, Victor SERVANT
  • Patent number: 9547498
    Abstract: A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card.
    Type: Grant
    Filed: May 21, 2013
    Date of Patent: January 17, 2017
    Assignee: MORPHO
    Inventors: Mael Berthier, Louis-Philippe Goncalves, Francois Lecocq, Cyrille Pepin
  • Publication number: 20160371531
    Abstract: A biometric identification method comprising the steps of comparing a candidate print with a reference print and validating identification as a function of a number of characteristics that are common in the two prints and of a predetermined validation threshold, the method being characterized in that it comprises the steps of altering the biometric characteristics of one of the two prints prior to comparison and of taking the alteration into account during validation.
    Type: Application
    Filed: June 16, 2016
    Publication date: December 22, 2016
    Inventors: Yves BOCKTAELS, Julien BRINGER, Mael BERTHIER, Marcelin RAGOT
  • Patent number: 9372791
    Abstract: The invention relates to a method for masking the end-of-life transition of an electronic microprocessor device comprising a reprogrammable non-volatile memory containing an end-of-life state variable (FdVE). The value of the variable (FdVE) is loaded (A) into random access memory. Prior to the execution of any current command (COM), the value of the variable (FdVR) in random access memory is checked (B). The end-of-life transition is executed (C) in the event of an empty value. Otherwise, the initialization or the execution of the command (COM) is continued (D). Upon detection (E) of an intrusive attack, the end-of-life state variable (FdVR) is written (F) in the single random-access memory, and the end-of-life state variable (FdVE) is deleted (G) from the non-volatile memory in a delayed manner. The invention is suitable for all electronic devices, microprocessor cards or the like.
    Type: Grant
    Filed: January 10, 2012
    Date of Patent: June 21, 2016
    Assignee: MORPHO
    Inventors: Mael Berthier, Michael Barthe
  • Publication number: 20150213261
    Abstract: Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input with main secret data (CTRL, PIN) stored in said electronic component, characterized in that the processor implements, in addition to the comparison with the secret data (CTRL, PIN), complementary operations on the proof data (EPR, AUTH) which generate on the electronic component a variation of behaviour which is dependent on the proof data (EPR, AUTH) which it receives as input and which is compounded with the behavioural variation related to the comparison with the main secret data (CTRL, PIN).
    Type: Application
    Filed: July 9, 2013
    Publication date: July 30, 2015
    Inventor: Mael Berthier
  • Publication number: 20150180882
    Abstract: A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behaviour of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program.
    Type: Application
    Filed: July 8, 2013
    Publication date: June 25, 2015
    Applicant: MORPHO
    Inventors: Thanh Ha Le, Julien Bringer, Louis-Philippe Goncalves, Maël Berthier
  • Publication number: 20150143096
    Abstract: A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card.
    Type: Application
    Filed: May 21, 2013
    Publication date: May 21, 2015
    Applicant: MORPHO
    Inventors: Mael Berthier, Louis-Philippe Goncalves, Francois Lecocq, Cyrille Pepin
  • Publication number: 20150098519
    Abstract: An embedded system and, in particular, a communication protocol suitable for a data transmission using auxiliary physical channels of such an embedded system. A transmission method suitable for such a channel includes the transmission of a data signal based on the encoding of three symbols. The message consists of a preamble allowing recognition of the symbols used, followed by the significant part of the message. The decoding of the message comprises a first step of learning the symbols used, prior to the decoding of the significant part of the message.
    Type: Application
    Filed: May 7, 2013
    Publication date: April 9, 2015
    Applicant: MORPHO
    Inventors: Mael Berthier, Yves Bocktaels, Julien Bringer, Francois Lecocq