Patents by Inventor Said Gharout

Said Gharout has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11922384
    Abstract: The method of the invention comprises: an identification step (E30-E50) of identifying the user of the mobile terminal; a generation step, triggered if identification is successful, of a secure element of the terminal generating (E70) at least one identification value for the terminal by using a first secret key shared between the secure element and a token service provider device; a sending step (E100) of sending a request to the token service provider device to obtain at least one security token, the request including said at least one identification value for the terminal; and a reception step (F90) of receiving from the token service provider device said at least one security token in encrypted form, each security token being associated with a random number generated by the token service provider device and being encrypted by means of an encryption key generated for that token from the random number and from a second secret key shared between the token service provider device and the secure element of th
    Type: Grant
    Filed: April 14, 2017
    Date of Patent: March 5, 2024
    Assignee: ORANGE
    Inventors: Alicia Filipiak, Saïd Gharout, Jacques Traore, Véronique Cortier
  • Publication number: 20220295281
    Abstract: A mobile data communications system comprises a mobile device having a reconfigurable identification module to store a set of one or more mobile identity profiles, the mobile device being configured to provide mobile data communication using a currently active mobile identity profile selected from the set of one or more mobile identity profiles; and control circuitry external to the mobile device to communicate mobile identity profile management information with the reconfigurable identification module; in which the control circuitry and the reconfigurable identification module are configured to establish a secure communication channel for the communication of at least some of the mobile identity profile management information.
    Type: Application
    Filed: March 8, 2022
    Publication date: September 15, 2022
    Inventors: Said GHAROUT, William David HUNTER
  • Patent number: 11443022
    Abstract: A method for controlling access to a security module [of a mobile terminal by an application of the mobile terminal is described. The method includes sending by a current application of the mobile terminal a request to access the security module, said access request comprising the current identifier of an applet comprised in the security module. The operating system of the mobile terminal reads a look-up table comprising a set of access control rules, an access control rule comprising the identifier of an applet of the security module associated with a control value for an application of the mobile terminal, said access control rule indicating that said application of the mobile terminal is authorized to communicate with the applet of the security module.
    Type: Grant
    Filed: June 22, 2018
    Date of Patent: September 13, 2022
    Assignee: ORANGE
    Inventors: Alicia Filipiak, Saïd Gharout
  • Patent number: 11425117
    Abstract: A method for obtaining a profile for access to a communication network by a secondary terminal via a main terminal. The main terminal includes a security element having an authentication key, the authentication key being used by the network and by the main terminal to generate at least one session master key specific to the main terminal. The secondary terminal: provides its identifier to the main terminal; receives from the main terminal a temporary key specific to the secondary terminal, a temporary identifier of the secondary terminal, and an identifier of the network for access to the network. The temporary key is based on the temporary identifier of the secondary terminal and the session master key of the main terminal. The temporary key, the temporary identifier, the identifier of the secondary terminal, and the identifier of the access network are included in an profile for access to the network.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: August 23, 2022
    Assignee: ORANGE
    Inventors: Todor Gamishev, Said Gharout
  • Patent number: 11412369
    Abstract: A method for obtaining a command relating to a profile for a security module of the equipment to access a network by mobile equipment. The method includes: sending, to a first server, a request including an anonymous identifier of the security module based on a physical identifier of the module and a random variable; receiving, from the first server, an address of a second server, which prepared the command and associated the command with the anonymous identifier, a request of the command having been previously received from a third server via the second server; sending, to the second server, the physical identifier of the module and of the random variable; receiving, from the second server, the command when a verification by the second server that the anonymous identifier of the security module has been computed on the basis of the received physical identifier and of the random variable is positive.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: August 9, 2022
    Assignee: ORANGE
    Inventors: Said Gharout, Laurent Coureau
  • Patent number: 11349831
    Abstract: A technique for downloading a profile for access to a communication network by a security module. This access profile has been prepared by a network operator and is available from a server configured to provide this access profile by downloading to the security module. The security module obtains a first verification datum prepared by the network operator. A secure downloading session is established thereafter. During establishment, session keys are jointly generated between the server and the security module and the server is authenticated by the security module using a public downloading key. The security module verifies authenticity of the public downloading key by using the first verification datum enabling verification that the server uses a secret downloading key corresponding to that provided by the network operator during preparation of the first verification datum. When the public downloading key is not authentic, the security module interrupts downloading of the access profile.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: May 31, 2022
    Assignee: ORANGE
    Inventors: Said Gharout, Laurent Coureau
  • Patent number: 11290877
    Abstract: A method for setting up an execution rule of an operating environment for a communication terminal in a mobile network of an operator. The environment is referred to as a operator profile. The operator profile is stored in a subscriber module embedded in the terminal. According to the method, the subscriber module: obtains a first token signed by the operator and includes information relative to the identification of the rule; obtains a second token signed by a third party other than the operator and including a first element for verifying the authenticity of the first token; verifies the authenticity of the first token by using the first verification element; verifies the authenticity of the second token by using a second verification element; and sets up the rule in the subscriber module if the authenticity of the first and second tokens is verified.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: March 29, 2022
    Assignee: ORANGE
    Inventors: Laurent Coureau, Said Gharout
  • Patent number: 11218873
    Abstract: A communication system which includes a terminal, a telecommunications network server able to provide a network service to the terminal; and an application server able to provide application services to the terminal via the network and the network server. The terminal and the network server share and store a same network root key kept secret from the application server and are configured to generate, on the basis of this network root key, a network session key used to sign and verify the integrity of messages exchanged on the network between the terminal and the network server. The terminal and the application server share and store a same application root key kept secret from the network server, and configured to generate, on the basis of this application root key, an application session key used to encrypt and decrypt messages exchanged between the terminal and this application server via the network.
    Type: Grant
    Filed: April 17, 2018
    Date of Patent: January 4, 2022
    Assignee: ORANGE
    Inventors: Suman Bala, Said Gharout, Dominique Barthel
  • Patent number: 11210386
    Abstract: A technique for managing a right of access to a service for a communicating device. A security element of the device authenticates a security element of an electrical power supply module subsequent to a detection of a start of distribution of electrical energy to the device so as to power it electrically. These security elements are then associated. The security element of the power supply module then configures the security element of the device, the latter having, once configured, a right of access to a valid service allowing it to access the service and this right of access remaining valid as long as the device is powered by this electrical power supply module.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: December 28, 2021
    Assignee: ORANGE
    Inventors: Nicolas Ducrot, Julien Sicart, Said Gharout
  • Patent number: 11051162
    Abstract: A method for anonymously identifying a security module by a server. The method includes: receiving, from the module, a request for the address of a server managing subscription data of an operator, the request including a current identification value of the module, which depends on an identifier of the module and a current date; searching for the current identification value in at least one set of identification values, the set being associated with an operator and including, for a given module, a plurality of identification values, which are calculated depending on the identifier of the module and a date, the date varying for the plurality of identification values of the set between a start date and an end date; and sending, to the security module, the address of the server managing subscription data associated with the operator when the current identification value appears in the set of identification values.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: June 29, 2021
    Assignee: ORANGE
    Inventors: Amira Barki, Said Gharout, Jacques Traore, Laurent Coureau
  • Publication number: 20210120411
    Abstract: A method for obtaining a profile for access to a telecommunications network by a mobile equipment. The method includes: sending by the mobile equipment to a network entity a request for accessing the network, the request including an initial subscriber identifier included in an initial profile; mutual authentication between the mobile equipment and the network entity by using an initial secret key associated with the initial identifier; and receiving from the network entity a new profile for access to the network, the new access profile including a new subscriber identifier and a new secret key, the new profile being configured for accessing the network.
    Type: Application
    Filed: December 11, 2017
    Publication date: April 22, 2021
    Inventors: Said Gharout, Charles Hartmann
  • Publication number: 20200389439
    Abstract: A method for obtaining a command relating to a profile for a security module of the equipment to access a network by mobile equipment. The method includes: sending, to a first server, a request including an anonymous identifier of the security module based on a physical identifier of the module and a random variable; receiving, from the first server, an address of a second server, which prepared the command and associated the command with the anonymous identifier, a request of the command having been previously received from a third server via the second server; sending, to the second server, the physical identifier of the module and of the random variable; receiving, from the second server, the command when a verification by the second server that the anonymous identifier of the security module has been computed on the basis of the received physical identifier and of the random variable is positive.
    Type: Application
    Filed: April 4, 2018
    Publication date: December 10, 2020
    Inventors: Said Gharout, Laurent Coureau
  • Publication number: 20200288312
    Abstract: A communication system which includes a terminal, a telecommunications network server able to provide a network service to the terminal; and an application server able to provide application services to the terminal via the network and the network server. The terminal and the network server share and store a same network root key kept secret from the application server and are configured to generate, on the basis of this network root key, a network session key used to sign and verify the integrity of messages exchanged on the network between the terminal and the network server. The terminal and the application server share and store a same application root key kept secret from the network server, and configured to generate, on the basis of this application root key, an application session key used to encrypt and decrypt messages exchanged between the terminal and this application server via the network.
    Type: Application
    Filed: April 17, 2018
    Publication date: September 10, 2020
    Inventors: Suman Bala, Said Gharout, Dominique Barthel
  • Publication number: 20200267141
    Abstract: A method for obtaining a profile for access to a communication network by a secondary terminal via a main terminal. The main terminal includes a security element having an authentication key, the authentication key being used by the network and by the main terminal to generate at least one session master key specific to the main terminal. The secondary terminal: provides its identifier to the main terminal; receives from the main terminal a temporary key specific to the secondary terminal, a temporary identifier of the secondary terminal, and an identifier of the network for access to the network. The temporary key is based on the temporary identifier of the secondary terminal and the session master key of the main terminal. The temporary key, the temporary identifier, the identifier of the secondary terminal, and the identifier of the access network are included in an profile for access to the network.
    Type: Application
    Filed: July 26, 2018
    Publication date: August 20, 2020
    Inventors: Todor Gamishev, Said Gharout
  • Publication number: 20200151312
    Abstract: A method for controlling access to a security module [of a mobile terminal by an application of the mobile terminal is described. The method includes sending by a current application of the mobile terminal a request to access the security module, said access request comprising the current identifier of an applet comprised in the security module. The operating system of the mobile terminal reads a look-up table comprising a set of access control rules, an access control rule comprising the identifier of an applet of the security module associated with a control value for an application of the mobile terminal, said access control rule indicating that said application of the mobile terminal is authorized to communicate with the applet of the security module.
    Type: Application
    Filed: June 22, 2018
    Publication date: May 14, 2020
    Inventors: Alicia Filipiak, Saïd Gharout
  • Publication number: 20190332761
    Abstract: A technique for managing a right of access to a service for a communicating device. A security element of the device authenticates a security element of an electrical power supply module subsequent to a detection of a start of distribution of electrical energy to the device so as to power it electrically. These security elements are then associated. The security element of the power supply module then configures the security element of the device, the latter having, once configured, a right of access to a valid service allowing it to access the service and this right of access remaining valid as long as the device is powered by this electrical power supply module.
    Type: Application
    Filed: November 27, 2017
    Publication date: October 31, 2019
    Inventors: Nicolas Ducrot, Julien Sicart, Said Gharout
  • Publication number: 20190230087
    Abstract: A technique for downloading a profile for access to a communication network by a security module. This access profile has been prepared by a network operator and is available from a server configured to provide this access profile by downloading to the security module. The security module obtains a first verification datum prepared by the network operator. A secure downloading session is established thereafter. During establishment, session keys are jointly generated between the server and the security module and the server is authenticated by the security module using a public downloading key. The security module verifies authenticity of the public downloading key by using the first verification datum enabling verification that the server uses a secret downloading key corresponding to that provided by the network operator during preparation of the first verification datum. When the public downloading key is not authentic, the security module interrupts downloading of the access profile.
    Type: Application
    Filed: June 19, 2017
    Publication date: July 25, 2019
    Inventors: Said Gharout, Laurent Coureau
  • Publication number: 20190141525
    Abstract: A method for setting up an execution rule of an operating environment for a communication terminal in a mobile network of an operator. The environment is referred to as a operator profile. The operator profile is stored in a subscriber module embedded in the terminal. According to the method, the subscriber module: obtains a first token signed by the operator and includes information relative to the identification of the rule; obtains a second token signed by a third party other than the operator and including a first element for verifying the authenticity of the first token; verifies the authenticity of the first token by using the first verification element; verifies the authenticity of the second token by using a second verification element; and sets up the rule in the subscriber module if the authenticity of the first and second tokens is verified.
    Type: Application
    Filed: May 5, 2017
    Publication date: May 9, 2019
    Applicant: ORANGE
    Inventors: Laurent Coureau, Said Gharout
  • Publication number: 20190122191
    Abstract: The method of the invention comprises: an identification step (E30-E50) of identifying the user of the mobile terminal; a generation step, triggered if identification is successful, of a secure element of the terminal generating (E70) at least one identification value for the terminal by using a first secret key shared between the secure element and a token service provider device; a sending step (E100) of sending a request to the token service provider device to obtain at least one security token, the request including said at least one identification value for the terminal; and a reception step (F90) of receiving from the token service provider device said at least one security token in encrypted form, each security token being associated with a random number generated by the token service provider device and being encrypted by means of an encryption key generated for that token from the random number and from a second secret key shared between the token service provider device and the secure element of th
    Type: Application
    Filed: April 14, 2017
    Publication date: April 25, 2019
    Inventors: Alicia Filipiak, Said Gharout, Jacques Traore, Véronique Cortier
  • Publication number: 20180352432
    Abstract: A method for anonymously identifying a security module by a server. The method includes: receiving, from the module, a request for the address of a server managing subscription data of an operator, the request including a current identification value of the module, which depends on an identifier of the module and a current date; searching for the current identification value in at least one set of identification values, the set being associated with an operator and including, for a given module, a plurality of identification values, which are calculated depending on the identifier of the module and a date, the date varying for the plurality of identification values of the set between a start date and an end date; and sending, to the security module, the address of the server managing subscription data associated with the operator when the current identification value appears in the set of identification values.
    Type: Application
    Filed: November 9, 2016
    Publication date: December 6, 2018
    Inventors: Amira Barki, Said Gharout, Jacques Traore, Laurent Coureau