Patents by Inventor Pascal Guterman

Pascal Guterman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9313662
    Abstract: A method of protecting a telecommunication terminal having a chip-card-type personal component which is required for telecommunication network access. The terminal includes a processing unit, at least one operating memory element containing the information necessary to the operation of the terminal, i.e. a terminal operating program, and the data necessary to the program. The method involves: a) encrypting the contents of the operating memory element of the telecommunication terminal using a pre-determined key K which is necessary for decryption; and b) allowing the terminal to commence decryption once the terminal has been started with a start-up program that is saved in a secure memory element and once the key for decryption has been calculated by same.
    Type: Grant
    Filed: March 19, 2004
    Date of Patent: April 12, 2016
    Assignee: GEMALTO SA
    Inventors: Pascal Moitrel, Pascal Guterman, Philippe Proust, Laurent Sustek, Mireille Pauliac, Cedric Cardonnel
  • Publication number: 20140110930
    Abstract: The invention relates to the securing of information media so as to prevent any alteration or modification of the identification information and the fraudulent reuse of the media. The identification document according to the invention comprises personalisation information placed on at least one of its main sides, and invisible anti-forgery means placed on at least part of the said side and designed to undergo a change in appearance in the event of an attempt to do additional personalisation.
    Type: Application
    Filed: May 22, 2008
    Publication date: April 24, 2014
    Applicant: GEMALTO SA
    Inventors: Jean-Luc Lesur, Pascal Guterman
  • Patent number: 8583934
    Abstract: A method for preventing secret code manipulation in a data processing device, such as a smart card, to which a presented code is applied. Prior to implementation of a code transforming function in the processing device, the secret code is transformed into a transformed secret code in the card. For each use of the card, the presented code is transformed into a transformed presented code in accordance with the implemented transformation function. A comparison of the transformed secret code with the transformed secret code in the card is then performed.
    Type: Grant
    Filed: June 20, 2001
    Date of Patent: November 12, 2013
    Assignee: Gemalto SA
    Inventors: Christophe Bidan, David Naccache, Pierre Girard, Pascal Guterman, Ludovic Rousseau
  • Patent number: 7975057
    Abstract: An entity of the smart card type has an application layer linked to a communication protocol layer. A time manager containing a timer interfaces with the protocol layer. The time manager substantially periodically constructs waiting time extension requests transmitted to a terminal through the protocol layer as long as data are being processed in the application layer. The application layer is thus freed from any time constraint.
    Type: Grant
    Filed: February 2, 2001
    Date of Patent: July 5, 2011
    Assignee: Gemalto SA
    Inventors: Pascal Guterman, Laurent Bonnet
  • Publication number: 20100011344
    Abstract: The present invention relates to the field of securing and protecting the execution of a source code by a processing unit of an item of electronic equipment, as well as the associated devices, for example chip cards. The invention presents a method for securing the execution of a source code by a processing unit of an item of electronic equipment, the method comprising steps of inserting dummy operations, in which some of the dummy operations do not execute in full.
    Type: Application
    Filed: December 3, 2007
    Publication date: January 14, 2010
    Inventor: Pascal Guterman
  • Patent number: 7529369
    Abstract: In a data processing device, a first key is produced based on a secret key so that the latter is never used in a clear form. In a preliminary step, the secret key and a random number are applied to a function producing a first key. The first key and the random number are pre-stored in the device. For each data processing, the first key and another random number are applied to another function to produce a second key, and the second key and the stored number are applied as inverse of the function to produce a third key used for processing the data. The device can be a smart card and the data the confidential code presented to the card.
    Type: Grant
    Filed: June 20, 2001
    Date of Patent: May 5, 2009
    Assignee: Gemalto SA
    Inventor: Pascal Guterman
  • Publication number: 20080117889
    Abstract: A method of protecting a telecommunication terminal having a chip-card-type personal component which is required for telecommunication network access. The terminal includes a processing unit, at least one operating memory element containing the information necessary to the operation of the terminal, i.e. a terminal operating program, and the data necessary to the program. The method involves: a) encrypting the contents of the operating memory element of the telecommunication terminal using a pre-determined key K which is necessary for decryption; and b) allowing the terminal to commence decryption once the terminal has been started with a start-up program that is saved in a secure memory element and once the key for decryption has been calculated by same.
    Type: Application
    Filed: March 19, 2004
    Publication date: May 22, 2008
    Applicant: GEMPLUS
    Inventors: Pascal Moitrel, Pascal Guterman, Philippe Proust, Laurent Sustek, Mireille Pauliac, Cedric Cardonnel
  • Publication number: 20040015594
    Abstract: An entity of the smart card (CP) type, having an application layer (AP) linked to a communication protocol layer (PR), comprises a time manager (GD) containing a timer (CD) interfacing with the protocol layer (PR) for substantially periodically constructing waiting time extension (WTX) requests transmitted to a terminal (TE) through the protocol layer as long as data are in the process of being processed in the application layer. The application layer is thus freed from any time constraint.
    Type: Application
    Filed: September 18, 2002
    Publication date: January 22, 2004
    Inventors: Pascal Guterman, Laurent Bonnet
  • Publication number: 20030188170
    Abstract: The invention concerns a method aimed at preventing secret codes manipulations is a data processing means, such as a smart card (CA), by applying thereto a presented code. The method for accessing a functionality of the card comprises prior to implementation (E1) of a code transforming function (FT) in the processing means (CP), transformation (E2) of the secret code (CS) into a transformed secret code (CST) in the card. For each use of the card are provided transformation function, and a comparison (E7) of the transformed secret code with the transformed secret code in the card.
    Type: Application
    Filed: May 30, 2003
    Publication date: October 2, 2003
    Inventors: Christophe Bidan, David Naccache, Pierre Girard, Pascal Guterman, Ludovic Rousseau
  • Publication number: 20030179884
    Abstract: In a data processing device (DTD), a first key (K1) is produced based on a secret key (K) so that the latter is never used in clear. In a preliminary step, the secret key (K) and a random number (R1) are applied (I2) to a function (F1) producing the first key (K1). The first key and the random number are pre-stored (I3) in the device. For example, for each data (BD) processing (ET), the first key and another random number (R2) are applied (E2) to another function (F2) to produce a second key (K2), and the second key and the stored number (R1) are applied (E3) as inverse (F1−1) of the function (F1) to produce a third key (K3) used for processing the data, properly speaking. The device can be a smart card and the data the confidential code presented to the card.
    Type: Application
    Filed: December 19, 2002
    Publication date: September 25, 2003
    Inventor: Pascal Guterman
  • Publication number: 20030089786
    Abstract: Data in a write request (RE1) transmitted by a processor (PR) to a read/write controller (CM) must be written in a non-volatile memory (MNV) in a portable electronic object, such as a smart card. An application can be executed in the processor simultaneously with the writing of the data in the memory in response to an acknowledgement (AC) indicating the availability of the controller for writing. However, another write request transmitted before the end of the writing is put on standby until the end of the writing. The controller also provides a verification of integrity of the data to be written in the memory.
    Type: Application
    Filed: September 18, 2002
    Publication date: May 15, 2003
    Inventors: Laurence Bringer, Pascal Guterman
  • Patent number: 6539453
    Abstract: The invention relates to a storage system including at least one non-volatile memory containing information likely to be updated, and more particularly, to storage supports such as chip cards. The invention likewise relates to a process of management of the memory. According to the invention, the system includes a memory manager that is able to displace all or a portion of the contents of the memory respectively over all or a portion of the memory, in order to limit the attrition of memory cells due to the frequent updating of certain data.
    Type: Grant
    Filed: December 22, 1999
    Date of Patent: March 25, 2003
    Assignee: Gemplus
    Inventor: Pascal Guterman