Patents by Inventor Nicolas Prawitz
Nicolas Prawitz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11216712Abstract: Described is a system (SY) comprising a card (DV1) and a peripheral device (DV2) configured to cooperate together to enable a biometric print to be acquired. The smartcard (DV1) includes a biometric print sensor (10) and a control module for transmitting control signals (SG) to the peripheral device (DV2), each control signal (SG) being defined by a respective single level of an electrical characteristic. Apart from a possible internal power supply, the peripheral device (DV2) may include passive components only, including a user interface (20) configured to put itself into a predetermined state in response to each received control signal (SG), so as to guide a user in acquiring a biometric print by means of the biometric print sensor (10).Type: GrantFiled: August 6, 2019Date of Patent: January 4, 2022Assignee: IDEMIA IDENTITY & SECURITY FRANCEInventors: Nicolas Prawitz, Olivier Latrille, David Lucas, Sébastien Douche
-
Publication number: 20210399899Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: ApplicationFiled: July 8, 2021Publication date: December 23, 2021Applicant: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 11068766Abstract: Disclosed is a semi-rigid enrolment case for a smart card, formed by folding and gluing an envelope-like cardboard blank of the dimensions of the card. The case includes an electrical circuit printed directly on the cardboard of an inner surface. The circuit includes contact studs connected to a power supply interface and arranged to connect electrical contacts of the card to the power supply interface when the card is inserted into the case. A biometric sensor of the card remains accessible to the user when it is out of the case for making the enrolment. Through-openings are made in the cardboard on either side of contact stud lines and allow forming independent flexible areas, providing better contact between the studs and the electrical contacts of the card.Type: GrantFiled: April 28, 2020Date of Patent: July 20, 2021Assignee: IDEMIA IDENTITY & SECURITY FRANCEInventors: Nicolas Prawitz, Patrick Bauban, Joël-Yann Fourre
-
Patent number: 11063768Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: GrantFiled: March 31, 2020Date of Patent: July 13, 2021Assignee: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20200382316Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: ApplicationFiled: March 31, 2020Publication date: December 3, 2020Applicant: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20200349408Abstract: Disclosed is a semi-rigid enrolment case for a smart card, formed by folding and gluing an envelope-like cardboard blank of the dimensions of the card. The case includes an electrical circuit printed directly on the cardboard of an inner surface. The circuit includes contact studs connected to a power supply interface and arranged to connect electrical contacts of the card to the power supply interface when the card is inserted into the case. A biometric sensor of the card remains accessible to the user when it is out of the case for making the enrolment. Through-openings are made in the cardboard on either side of contact stud lines and allow forming independent flexible areas, providing better contact between the studs and the electrical contacts of the card.Type: ApplicationFiled: April 28, 2020Publication date: November 5, 2020Inventors: Nicolas PRAWITZ, Patrick BAUBAN, Joël-Yann FOURRE
-
Patent number: 10630482Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: GrantFiled: April 13, 2017Date of Patent: April 21, 2020Assignee: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20200050911Abstract: Described is a system (SY) comprising a card (DV1) and a peripheral device (DV2) configured to cooperate together to enable a biometric print to be acquired. The smartcard (DV1) includes a biometric print sensor (10) and a control module for transmitting control signals (SG) to the peripheral device (DV2), each control signal (SG) being defined by a respective single level of an electrical characteristic. Apart from a possible internal power supply, the peripheral device (DV2) may include passive components only, including a user interface (20) configured to put itself into a predetermined state in response to each received control signal (SG), so as to guide a user in acquiring a biometric print by means of the biometric print sensor (10).Type: ApplicationFiled: August 6, 2019Publication date: February 13, 2020Inventors: Nicolas PRAWITZ, Olivier LATRILLE, David LUCAS, Sébastien DOUCHE
-
Publication number: 20170287366Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: ApplicationFiled: April 13, 2017Publication date: October 5, 2017Applicant: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 9653004Abstract: A method for downloading information into a secure non-volatile memory of a secure embedded device (SED) during a manufacturing or personalization process. The method involves communicating the information and a software program from a device to a temporary storage memory of the SED. The method also involves starting the software program provided to facilitate an initialization of a first key and to facilitate a transfer of at least a portion of the information from the temporary storage memory to the secure non-volatile memory. In response to starting, the software program, the first key is initialized and the portion of information is transformed into transformed information locally at the SED using at least one of a scramble algorithm and a cipher algorithm. Thereafter, the transformed information is written to a memory element of the secure non-volatile memory.Type: GrantFiled: October 16, 2008Date of Patent: May 16, 2017Assignee: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 8386681Abstract: The claimed subject matter can provide an architecture that interfaces a single slave device such as a UICC smartcard with multiple host controllers. For example, a secondary host can be interfaced between a primary host (e.g., a controller in a cellular phone, a PDA, an MP3 player . . . ) to manage all transactions with the slave device. The secondary host can operate transparently to the primary host and thus does not require any modifications to the primary host. This can be accomplished, e.g., by employing the CMD channel (which is relatively sparsely used by the primary host) to communicate both commands and data with the slave.Type: GrantFiled: March 2, 2012Date of Patent: February 26, 2013Assignee: Spansion LLCInventors: Bruno Charrat, Jean-Yves Grall, Nicolas Prawitz, Roni Kornitz
-
Patent number: 8370644Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.Type: GrantFiled: May 30, 2008Date of Patent: February 5, 2013Assignee: Spansion LLCInventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joël Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau
-
Publication number: 20120226840Abstract: The claimed subject matter can provide an architecture that interfaces a single slave device such as a UICC smartcard with multiple host controllers. For example, a secondary host can be interfaced between a primary host (e.g., a controller in a cellular phone, a PDA, an MP3 player . . . ) to manage all transactions with the slave device. The secondary host can operate transparently to the primary host and thus does not require any modifications to the primary host. This can be accomplished, e.g., by employing the CMD channel (which is relatively sparsely used by the primary host) to communicate both commands and data with the slave.Type: ApplicationFiled: March 2, 2012Publication date: September 6, 2012Inventors: Bruno Charrat, Jean-Yves Grall, Nicolas Prawitz, Roni Kornitz
-
Patent number: 8156272Abstract: The claimed subject matter can provide an architecture that interfaces a single slave device such as a UICC smartcard with multiple host controllers. For example, a secondary host can be interfaced between a primary host (e.g. a controller in a cellular phone, a PDA, an MP3 player . . . ) to manage all transactions with the slave device. The secondary host can operate transparently to the primary host and thus does not require any modifications to the primary host. This can be accomplished, e.g. by employing the CMD channel (which is relatively sparsely used by the primary host) to communicate both commands and data with the slave. Moreover, the transactions initiated by the secondary host can be segmented into many smaller fragments and interleaved between transactions initiated by the primary host. In addition, the secondary host can temporarily take on the role of the slave device and affect direct communication with the primary host.Type: GrantFiled: September 1, 2006Date of Patent: April 10, 2012Assignee: Spansion LLCInventors: Bruno Charrat, Jean-Yves Grall, Nicolas Prawitz, Roni Kornitz
-
Patent number: 7921322Abstract: Systems and/or methods that facilitate expediently transmitting and programming data to an electronic device that contains nonvolatile memory are presented. A host component facilitates the determination of different clock frequencies that an electronic device(s) can accommodate for transmitting data to and receiving data from the electronic device. The host component can facilitate transmitting data to the electronic device at a higher clock frequency than the clock frequency utilized to transmit data from the electronic device to the host component in order to facilitate programming large amounts of data to the electronic device efficiently. The host component can select a downlink and/or uplink clock frequency based in part on the type of electronic device(s), the size of a memory buffer associated with the nonvolatile memory device, and/or a type of protocol associated with the electronic device.Type: GrantFiled: October 17, 2007Date of Patent: April 5, 2011Assignee: Spansion LLCInventors: Fredric Cherpantier, Nicolas Prawitz
-
Publication number: 20100100747Abstract: A method (400) for downloading information into a secure non-volatile memory (150) of a secure embedded device (SEP) during a manufacturing or personalization process. The method involves communicating the information and a software program from a device (104) to a temporary storage memory (108) of the SEP (106). The method also involves starting the software program provided to facilitate an initialization of a first key and to facilitate a transfer of at least a portion of the information from the temporary storage memory to the secure non-volatile memory. In response to starting the software program, the first key is initialized and the portion of information is transformed into transformed information locally at the SED using at least one of an SED scramble algorithm and a cipher algorithm. Thereafter, the transformed information is written to a memory element (216) of the secure non-volatile memory.Type: ApplicationFiled: October 16, 2008Publication date: April 22, 2010Inventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20090300312Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.Type: ApplicationFiled: May 30, 2008Publication date: December 3, 2009Applicant: SPANSION LLCInventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joel Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau
-
Patent number: 7558907Abstract: The claimed subject matter can provide an architecture that can transparently provide more robust interactions between a host device and a smartcard or other mass media storage device by way of block level read or write operations provided as part of a standard interface protocol. A virtual controller can be installed on the smartcard to manage access to the data store of a smartcard. The virtual controller can provide special objects (e.g., files, directories, partitions . . . ) to the host, and upon an access to one of these special files, call an application to manage pre- or post-processing of the data transferred between the host and the smartcard.Type: GrantFiled: October 13, 2006Date of Patent: July 7, 2009Assignee: Spansion LLCInventors: Julien Stern, Christophe Carvounas, Cedric Colnot, Nicolas Prawitz, Jean-Yves Grall, Thomas Pornin
-
Publication number: 20090106577Abstract: Systems and/or methods that facilitate expediently transmitting and programming data to an electronic device that contains nonvolatile memory are presented. A host component facilitates the determination of different clock frequencies that an electronic device(s) can accommodate for transmitting data to and receiving data from the electronic device. The host component can facilitate transmitting data to the electronic device at a higher clock frequency than the clock frequency utilized to transmit data from the electronic device to the host component in order to facilitate programming large amounts of data to the electronic device efficiently. The host component can select a downlink and/or uplink clock frequency based in part on the type of electronic device(s), the size of a memory buffer associated with the nonvolatile memory device, and/or a type of protocol associated with the electronic device.Type: ApplicationFiled: October 17, 2007Publication date: April 23, 2009Applicant: Spansion LLCInventors: Frederic Cherpantier, Nicolas Prawitz
-
Publication number: 20080091878Abstract: The claimed subject matter can provide an architecture that can transparently provide more robust interactions between a host device and a smartcard or other mass media storage device by way of block level read or write operations provided as part of a standard interface protocol. A virtual controller can be installed on the smartcard to manage access to the data store of a smartcard. The virtual controller can provide special objects (e.g., files, directories, partitions . . . ) to the host, and upon an access to one of these special files, call an application to manage pre- or post-processing of the data transferred between the host and the smartcard.Type: ApplicationFiled: October 13, 2006Publication date: April 17, 2008Applicants: SPANSION, LLC, CRYPTOLOGInventors: Julien Stern, Christophe Carvounas, Cedric Colnot, Nicolas Prawitz, Jean-Yves Grall, Thomas Pornin