Patents by Inventor Saverio Donatiello

Saverio Donatiello has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8804949
    Abstract: A method for protecting data against power analysis attacks includes at least a first phase of executing a cryptographic operation for ciphering data in corresponding enciphered data through a secret key. The method includes at least a second phase of executing an additional cryptographic operation for ciphering additional data in corresponding enciphered additional data. An execution of the first and second phases is undistinguishable by the data power analysis attacks. Secret parameters are randomly generated and processed by the at least one second phase. The secret parameters include an additional secret key ERK for ciphering the additional data in the corresponding enciphered additional data.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: August 12, 2014
    Assignee: STMicroelectronics International N.V.
    Inventors: Giovanni Fontana, Saverio Donatiello, Giovanni Di Sirio
  • Patent number: 8495306
    Abstract: A method is for executing n data updates in an IC Card which has memory pages supporting m erase operations per page, with m<n. The method includes the step of allocating a cyclic elementary file including N records, each record associated to a memory page of the IC Card, and the cyclic elementary file indexing a less recently updated record which is erased before writing data to be updated.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: July 23, 2013
    Assignee: STMicroelectronics International N.V.
    Inventors: Saverio Donatiello, Corrado Guidobaldi, Mariangela Rauccio
  • Patent number: 8464012
    Abstract: A method is for controlling access to a data file of an IC card and may include storing a plurality of access conditions to be evaluated for accessing the data file, and enabling access to the file if the access conditions are satisfied. The method may further include ordering the access conditions to be evaluated in a Reverse Polish Notation inside a memory queue of the IC card, and evaluating the access conditions starting from a head of the memory queue.
    Type: Grant
    Filed: July 8, 2010
    Date of Patent: June 11, 2013
    Assignee: Incard S.A.
    Inventors: Saverio Donatiello, Giovanni Fontana, Corrado Guidobaldi
  • Patent number: 8360326
    Abstract: A method for pre-programming an IC card may include transmitting a memory image of a gold version sample IC card to the IC card and storing the memory image in a memory of the IC card. The method may further include dividing the memory image into memory blocks of set size to be transmitted separately to the IC card and by the fact that the storing may include writing at least one memory block in the memory while one or more memory blocks are transmitted.
    Type: Grant
    Filed: September 24, 2010
    Date of Patent: January 29, 2013
    Assignee: Incard S.A.
    Inventors: Saverio Donatiello, Corrado Guidobaldi
  • Patent number: 8347055
    Abstract: A method may defrag a memory for an IC card having a plurality of files stored in memory portions, each file including respective links to one or more other files. The method may include detecting a start address of a first free memory portion of the memory, detecting an address of a memory portion following the start address and storing one file to be moved, detecting files including links to the address of the file to be moved, moving the file to be moved to the start address of the first free memory portion, updating the links to point at the start address, and repeating the above steps until at least two free memory portions following the moved files are separated by one or more of files.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: January 1, 2013
    Assignee: Incard S.A.
    Inventor: Saverio Donatiello
  • Patent number: 8296566
    Abstract: A key session derivation is provided during a mutual authentication between a master IC card storing a master key, and a user IC card storing a key-seed. The master IC card and the user IC card are connected through a communication interface for a communication session. A first random number associated to the user IC card is generated. First and second sub keys are derived from the key-seed. First and second session sub keys are respectively derived through the first sub key in combination with the first random number, and through the second sub key in combination with the first random number. The first and second session sub keys are joined in at least a session key for the communication session.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: October 23, 2012
    Assignee: Incard S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello
  • Patent number: 8195941
    Abstract: An authentication method between a first IC card and a second IC card interconnected through a terminal includes transmitting an identification number from the second IC card to the first IC card for deriving and storing a key in the first IC card. An authentication number is generated and stored in the first IC card, and is transmitted to the second IC card. The authentication number is encrypted inside the second IC card, and is transmitted to the first IC card. The encrypted authentication number is decrypted through the derived key, and is compared with the authentication number. The second IC card is authorized if the encrypted authentication number in the first IC card is equal to the authentication number. At least one of the transmissions includes an identification and/or authentication number to authorize the first IC card from the second IC card. The identification and/or authentication numbers include a reverse authentication number.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: June 5, 2012
    Assignee: Incard S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello
  • Publication number: 20110107041
    Abstract: A method is for executing n data updates in an IC Card which has memory pages supporting m erase operations per page, with m<n. The method includes the step of allocating a cyclic elementary file including N records, each record associated to a memory page of the IC Card, and the cyclic elementary file indexing a less recently updated record which is erased before writing data to be updated.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 5, 2011
    Applicant: INCARD S.A.
    Inventors: Saverio DONATIELLO, Corrado Guidobaldi, Mariangela Rauccio
  • Publication number: 20110073662
    Abstract: A method for pre-programming an IC card may include transmitting a memory image of a gold version sample IC card to the IC card and storing the memory image in a memory of the IC card. The method may further include dividing the memory image into memory blocks of set size to be transmitted separately to the IC card and by the fact that the storing may include writing at least one memory block in the memory while one or more memory blocks are transmitted.
    Type: Application
    Filed: September 24, 2010
    Publication date: March 31, 2011
    Applicant: INCARD S.A.
    Inventors: Saverio DONATIELLO, Corrado GUIDOBALDI
  • Patent number: 7894601
    Abstract: Key diversification is performed during a mutual authentication between a SAM integrated circuit (IC) card storing a master key, and a user IC card storing an identification number. The user IC card is connected to the SAM IC card through a communications interface. The key diversification includes deriving sub keys from the master key, and computing ciphered strings through corresponding cryptographic computations on a string obtained by an elaboration on the identification number with the sub keys. A diversification key is generated by linking together a combination of bytes of the ciphered strings.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: February 22, 2011
    Assignee: Incard S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello
  • Publication number: 20110010516
    Abstract: A method is for controlling access to a data file of an IC card and may include storing a plurality of access conditions to be evaluated for accessing the data file, and enabling access to the file if the access conditions are satisfied. The method may further include ordering the access conditions to be evaluated in a Reverse Polish Notation inside a memory queue of the IC card, and evaluating the access conditions starting from a head of the memory queue.
    Type: Application
    Filed: July 8, 2010
    Publication date: January 13, 2011
    Applicant: INCARD S.A.
    Inventors: Saverio DONATIELLO, Giovanni Fontana, Corrado Guidobaldi
  • Publication number: 20100332752
    Abstract: A method may defrag a memory for an IC card having a plurality of files stored in memory portions, each file including respective links to one or more other files. The method may include detecting a start address of a first free memory portion of the memory, detecting an address of a memory portion following the start address and storing one file to be moved, detecting files including links to the address of the file to be moved, moving the file to be moved to the start address of the first free memory portion, updating the links to point at the start address, and repeating the above steps until at least two free memory portions following the moved files are separated by one or more of files.
    Type: Application
    Filed: June 29, 2010
    Publication date: December 30, 2010
    Applicant: INCARD S.A.
    Inventor: Saverio Donatiello
  • Publication number: 20080019507
    Abstract: A method for protecting data against power analysis attacks includes at least a first phase of executing a cryptographic operation for ciphering data in corresponding enciphered data through a secret key. The method includes at least a second phase of executing an additional cryptographic operation for ciphering additional data in corresponding enciphered additional data. An execution of the first and second phases is undistinguishable by the data power analysis attacks. Secret parameters are randomly generated and processed by the at least one second phase. The secret parameters include an additional secret key ERK for ciphering the additional data in the corresponding enciphered additional data.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 24, 2008
    Applicant: INCARD S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello, Giovanni Di Sirio
  • Publication number: 20080016351
    Abstract: An authentication method between a first IC card and a second IC card interconnected through a terminal includes transmitting an identification number from the second IC card to the first IC card for deriving and storing a key in the first IC card. An authentication number is generated and stored in the first IC card, and is transmitted to the second IC card. The authentication number is encrypted inside the second IC card, and is transmitted to the first IC card. The encrypted authentication number is decrypted through the derived key, and is compared with the authentication number. The second IC card is authorized if the encrypted authentication number in the first IC card is equal to the authentication number. At least one of the transmissions includes an identification and/or authentication number to authorize the first IC card from the second IC card. The identification and/or authentication numbers include a reverse authentication number.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 17, 2008
    Applicant: INCARD S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello
  • Publication number: 20080008315
    Abstract: Key diversification is performed during a mutual authentication between a SAM integrated circuit (IC) card storing a master key, and a user IC card storing an identification number. The user IC card is connected to the SAM IC card through a communications interface. The key diversification includes deriving sub keys from the master key, and computing ciphered strings through corresponding cryptographic computations on a string obtained by an elaboration on the identification number with the sub keys. A diversification key is generated by linking together a combination of bytes of the ciphered strings.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 10, 2008
    Applicant: INCARD S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello
  • Publication number: 20080008322
    Abstract: A key session derivation is provided during a mutual authentication between a master IC card storing a master key, and a user IC card storing a key-seed. The master IC card and the user IC card are connected through a communication interface for a communication session. A first random number associated to the user IC card is generated. First and second sub keys are derived from the key-seed. First and second session sub keys are respectively derived through the first sub key in combination with the first random number, and through the second sub key in combination with the first random number. The first and second session sub keys are joined in at least a session key for the communication session.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 10, 2008
    Applicant: INCARD S.A.
    Inventors: Giovanni Fontana, Saverio Donatiello