Patents by Inventor Marc BRUGNON

Marc BRUGNON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10776092
    Abstract: The invention relates to a method for obtaining a program intended to be executed by an electronic device (1), such as a smart card, comprising a non-volatile memory, the process comprising the insertion (E12, E14), in a source code, of a first function at the start of a source code instruction block, and a second function at the end of the source code instruction block, then generation (E16) of the executable program from the source code, wherein the first function is configured to disable a wear-reduction mechanism of the non-volatile memory, when the program is executed by the electronic device, and the second function is configured to enable the wear-reduction mechanism of the non-volatile memory, when the program is executed by the electronic device.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: September 15, 2020
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Fadi Osman, Marc Brugnon, Houssem Maghrebi
  • Patent number: 10747877
    Abstract: A method for protecting an electronic device executing a program against fault injection and type confusion attacks likely to affect a variable (Z) intended to be used by the program. The method includes calculating integrity check data (X, Y) of variable (Z), dependent on a type (T) of the variable (Z), and a value (V) of the variable (Z) stored in an execution stack (P1) and/or of a first addressing datum (A) stored in a first index register (ind1). The first addressing datum (A) adapted to locate the value (V) stored in the execution stack (storing the integrity check data (X, Y) on the variable (Z) in at least one control stack (P2, P3) different to the execution stack (P1). Storing in a second index register (ind2), a unique second addressing datum (A2) adapted to locate the integrity check data (X, Y) in the or each control stack (P2, P3).
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: August 18, 2020
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Alexis Bailly, Houssem Maghrebi, Ahmadou Serre, Marc Brugnon
  • Publication number: 20190163454
    Abstract: The invention relates to a method for obtaining a program intended to be executed by an electronic device (1), such as a smart card, comprising a non-volatile memory, the process comprising the insertion (E12, E14), in a source code, of a first function at the start of a source code instruction block, and a second function at the end of the source code instruction block, then generation (E16) of the executable program from the source code, wherein the first function is configured to disable a wear-reduction mechanism of the non-volatile memory, when the program is executed by the electronic device, and the second function is configured to enable the wear-reduction mechanism of the non-volatile memory, when the program is executed by the electronic device.
    Type: Application
    Filed: November 26, 2018
    Publication date: May 30, 2019
    Inventors: Fadi OSMAN, Marc BRUGNON, Houssem MAGHREBI
  • Publication number: 20180144129
    Abstract: The present invention relates to a method for protecting an electronic device (1) executing a program against fault injection and type confusion attacks likely to affect a variable (Z) intended to be used by the program, the method being characterized in that it comprises steps of: calculating integrity check data (X, Y) of variable (Z), the integrity check data dependent on: a type (T) of the variable (Z), and a value (V) of the variable (Z) stored in an execution stack (P1) and/or of a first addressing datum (A) stored in a first index register (ind1), the first addressing datum (A) being adapted to locate the value (V) stored in the execution stack (P1), storing the integrity check data (X, Y) on the variable (Z) in at least one control stack (P2, P3) different to the execution stack (P1), storage, in a second index register (ind2), of a unique second addressing datum (A2) adapted to locate the integrity check data (X, Y) in the or each control stack (P2, P3).
    Type: Application
    Filed: November 20, 2017
    Publication date: May 24, 2018
    Inventors: Alexis BAILLY, Houssem MAGHREBI, Ahmadou SERRE, Marc BRUGNON