Patents by Inventor Paolo Di Iorio

Paolo Di Iorio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8874170
    Abstract: The present invention relates to a chip card comprising: an interface (112) to a master device (120), a single tasking processor (102) for receiving chip card commands from the master via the interface, first program instructions (106) for execution by the processor, the first program instructions implementing a chip card function, second program instructions (110) for execution by the processor, the second program instructions implementing an endless loop, third program instructions (108) for execution by the processor, the third program instructions being adapted to start execution of the second program instructions in response to a blocking signal.
    Type: Grant
    Filed: August 26, 2010
    Date of Patent: October 28, 2014
    Assignee: Morpho Cards GmbH
    Inventors: Fred Benkelberg, Christian Winter, Paolo Di Iorio
  • Patent number: 8666686
    Abstract: A method for detecting possible correlations between signal patterns of a power signal used by an electronic device during execution of operations, including setting couples of windows including respective pairs of sequences of the sampling values. The method includes computing values of correlations between the respective pairs of sequences. Each values may be determined by computing a maximum value of correlation between one sequence of a couple and a plurality of sequences of sampled values included in corresponding moving windows.
    Type: Grant
    Filed: March 12, 2007
    Date of Patent: March 4, 2014
    Assignee: STMicroelectronics International N.V.
    Inventor: Paolo Di Iorio
  • Patent number: 8566927
    Abstract: The approach defines a protection mechanism against attacks to a security enforcing operation performed by cryptographic token or smart card. It is based on an attack detector which signals the main elaboration or processing system regarding a potential attack situation. The approach addresses SIM cloning problems of telecommunications operators who use old and breakable cryptographic algorithms such as the COMP-128 and do not want to invest in updating the network authentication systems with more resistant authentication cryptographic algorithms. The approach may be applicable to the typical telecommunications operator in an emerging market that does not use state of the art technology.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: October 22, 2013
    Assignee: STMicroelectronics International N.V.
    Inventor: Paolo Di Iorio
  • Publication number: 20120309451
    Abstract: The present invention relates to a chip card comprising: an interface (112) to a master device (120), a single tasking processor (102) for receiving chip card commands from the master via the interface, first program instructions (106) for execution by the processor, the first program instructions implementing a chip card function, second program instructions (110) for execution by the processor, the second program instructions implementing an endless loop, third program instructions (108) for execution by the processor, the third program instructions being adapted to start execution of the second program instructions in response to a blocking signal.
    Type: Application
    Filed: August 26, 2010
    Publication date: December 6, 2012
    Applicant: MORPHO CARDS GMBH
    Inventors: Fred Benkelberg, Christian Winter, Paolo Di Iorio
  • Patent number: 8011591
    Abstract: A multi-application IC card may include a runtime environment for managing executions of a plurality of stored application. Each application may include a set of rules, to be satisfied by their execution, and a corresponding set of reactions, to be taken if the rules are not satisfied. The runtime environment may include security and reaction registers to reference, respectively, the set of rules and reactions associated with the applications. A security policy manager may initialize, for each application, a reference between the security registers and the rules set between the reactions register and the reactions set. Checking the rules set and/or an activation of the reactions set is controlled by the security policy manager through the security registers and reaction registers. The security policy manager may include a registration function for initializing the security and reaction registers. The registration function may be called from the applications or an administrative user.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: September 6, 2011
    Assignee: Incard SA
    Inventor: Paolo Di Iorio
  • Publication number: 20100324842
    Abstract: A method for detecting possible correlations between signal patterns of a power signal used by an electronic device during execution of operations, including setting couples of windows including respective pairs of sequences of the sampling values. The method includes computing values of correlations between the respective pairs of sequences. Each values may be determined by computing a maximum value of correlation between one sequence of a couple and a plurality of sequences of sampled values included in corresponding moving windows.
    Type: Application
    Filed: March 12, 2007
    Publication date: December 23, 2010
    Inventor: Paolo Di Iorio
  • Publication number: 20080209550
    Abstract: The approach defines a protection mechanism against attacks to a security enforcing operation performed by cryptographic token or smart card. It is based on an attack detector which signals the main elaboration or processing system regarding a potential attack situation. The approach addresses SIM cloning problems of telecommunications operators who use old and breakable cryptographic algorithms such as the COMP-128 and do not want to invest in updating the network authentication systems with more resistant authentication cryptographic algorithms. The approach may be applicable to the typical telecommunications operator in an emerging market that does not use state of the art technology.
    Type: Application
    Filed: June 30, 2005
    Publication date: August 28, 2008
    Applicant: ST INCARD S.R.L.
    Inventor: Paolo Di Iorio
  • Publication number: 20080128515
    Abstract: A multi-application IC card may include a runtime environment for managing executions of a plurality of stored application. Each application may include a set of rules, to be satisfied by their execution, and a corresponding set of reactions, to be taken if the rules are not satisfied. The runtime environment may include security and reaction registers to reference, respectively, the set of rules and reactions associated with the applications. A security policy manager may initialize, for each application, a reference between the security registers and the rules set between the reactions register and the reactions set. Checking the rules set and/or an activation of the reactions set is controlled by the security policy manager through the security registers and reaction registers. The security policy manager may include a registration function for initializing the security and reaction registers. The registration function may be called from the applications or an administrative user.
    Type: Application
    Filed: November 30, 2007
    Publication date: June 5, 2008
    Applicant: INCARD SA
    Inventor: Paolo Di Iorio