Patents by Inventor Serge Vaudenay

Serge Vaudenay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230094432
    Abstract: A method for recognizing and/or identifying a user (9) with a chip (C) in an electronic identity object storing a digital identity (24), the method comprising steps of: —establishing a wireless or electrical connection between the electronic identity object (C) and a verification terminal (T); —verifying, in the electronic identity object, if the verification terminal is authorized to communicate with the electronic identity object (C), and in response of a positive verification sharing a secret (K): using the shared secret (K) for establishing an encrypted symmetric data link (5) between the electronic identity object and the verification terminal (T); transmitting, through the encrypted data link (5), said digital identity (24) stored in the electronic identity object to the verification terminal (T); and verifying in the verification terminal (T) the authenticity of said digital identity (24).
    Type: Application
    Filed: April 5, 2020
    Publication date: March 30, 2023
    Inventors: Lambert SONNA MOMO, Faith BALLI, Serge VAUDENAY, Betül DURAK
  • Publication number: 20230084042
    Abstract: A method for controlling access of users to desktops, comprising: 1. a user enters a login; 2. an organization server verifies if the user is authorized to access the desktop, and returns a pseudo of the user; 3. the user scans a pattern of fingerveins of one finger with a biometric scanner comprising cameras at different angles; 4. a file corresponding to said images is encrypted by said biometric scanner (B) with a public key of a biometric server and signed with a private key of said biometric scanner, and sent to the desktop; 5. the desktop forwards said file to said biometric server; 6. the biometric server decrypts the file, verifies the signature of the biometric scanner, and matches the received images with reference images associated with said pseudo; 7. the biometric server decides if the recognition succeeded, failed, or if an additional scan is needed.
    Type: Application
    Filed: February 2, 2021
    Publication date: March 16, 2023
    Inventors: Betül DURAK, Loïs HUGUENIN-DUMITTAN, Lambert SONNA MOMO, Serge VAUDENAY
  • Patent number: 9930523
    Abstract: The invention is related to a method allowing a prover holding a secret key (x) to prove its identity to a verifier and to prove to this verifier that he is within a predetermined distance of this verifier, said method comprising an initialization phase during which: the prover picks a first nonce (Np) and communicates this first nonce to the verifier; the verifier picks a first random vector (a), a leak function (L?), and a second nonce (Nv); the verifier uses said leak function (L?) to compute a modified secret (x?) depending on the leak (L?(x)) of said secret; the verifier transmits to said prover said leak function and said second nonce; the prover retrieves said first random vector and said modified secret, wherein said first random vector and said modified secret are used by said prover for computing responses (ri) to challenges (ci).
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: March 27, 2018
    Assignee: Ecole Polytechnique Federale De Lausanne (EPFL)
    Inventors: Serge Vaudenay, Ioana C. Carlson
  • Publication number: 20170034138
    Abstract: A wireless validation method between an first apparatus and a second apparatus comprising the following steps of communicating between the first apparatus and the second apparatus for agreeing in a protected way on a common symmetric key and performing a symmetric distance bounding validation between the first apparatus and the second apparatus over a wireless communication link on the basis of the agreed common symmetric key.
    Type: Application
    Filed: July 29, 2015
    Publication date: February 2, 2017
    Inventors: Serge VAUDENAY, JR., Handan KILINC
  • Publication number: 20150264570
    Abstract: The invention is related to a method allowing a prover holding a secret key (x) to prove its identity to a verifier and to prove to this verifier that he is within a predetermined distance of this verifier, said method comprising an initialization phase during which: the prover picks a first nonce (Np) and communicates this first nonce to the verifier; the verifier picks a first random vector (a), a leak function (L?), and a second nonce (Nv); the verifier uses said leak function (L?) to compute a modified secret (x?) depending on the leak (L?(x)) of said secret; the verifier transmits to said prover said leak function and said second nonce; the prover retrieves said first random vector and said modified secret, wherein said first random vector and said modified secret are used by said prover for computing responses (ri) to challenges (ci).
    Type: Application
    Filed: March 10, 2015
    Publication date: September 17, 2015
    Inventors: Serge Vaudenay, Ioana C. Carlson
  • Patent number: 9083535
    Abstract: A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided.
    Type: Grant
    Filed: November 5, 2010
    Date of Patent: July 14, 2015
    Assignee: Nokia Corporation
    Inventors: Atefeh Mashatan, Imad Aad, Rafik Chaabouni, Pentti Valtteri Niemi, Serge Vaudenay
  • Publication number: 20130238897
    Abstract: A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided.
    Type: Application
    Filed: November 5, 2010
    Publication date: September 12, 2013
    Inventors: Atefeh Mashatan, Imad Aad, Rafik Chaabouni, Pentti Valtteri Niemi, Serge Vaudenay
  • Patent number: 7512241
    Abstract: Provided is a method to generate sub-keys based on a main key in a case in which, each sub-key gives no information to recover the main key. The method has the steps of obtaining a first value by applying to the main key a linear diversification by mixing the main key with a constant and applying to the first value a non-linear transformation. The non-linear transformation includes obtaining a second value by applying the first value to a substitution layer, obtaining a third value formed of N blocks of the same size by using a diffusion box of multi-permutation type based on the second value, obtaining the fourth value formed by blocks, obtaining the fifth value by applying to the fourth value a substitution layer, obtaining the sub-key by applying to the fifth value a symmetrical encryption module. The first value serves as the key input for this method.
    Type: Grant
    Filed: August 11, 2004
    Date of Patent: March 31, 2009
    Assignee: Nagravision SA
    Inventors: Serge Vaudenay, Pascal Junod
  • Patent number: 7499542
    Abstract: The purpose of this invention is to propose a new encryption method which offers a high level of security combined with a high execution speed. This aim is achieved by a method to encrypt or decrypt blocks of data X to Y, based on a main key R, this method using several serially connected modules, each module using a sub-key RA derived from the main key R.
    Type: Grant
    Filed: May 14, 2004
    Date of Patent: March 3, 2009
    Assignee: Nagravision SA
    Inventors: Serge Vaudenay, Pascal Junod
  • Patent number: 7461261
    Abstract: The aim of the invention is to propose the generation, verification and denial of an undeniable signature which has a size smaller than the currently available undeniable signatures, i.e. less than 80 bits. This aim is achieved by the method to generate an undeniable signature (y1, . . . , yt) on a set of data, this method comprising the following steps: (1) transforming the set of data (m) to a sequence of a predetermined number (t) of blocks (x1, . . . , xt), these blocks being members of an Abelian group, this transformation being a one way function, and (2) applying to each block (xi) a group homomorphism (f) to obtain a resulting value(yi), in which the number of elements of the initial group (G) is larger than the number of elements (d) of the destination group (H).
    Type: Grant
    Filed: February 13, 2004
    Date of Patent: December 2, 2008
    Assignee: Ecole Polytechnique Federale de Lausanne (EPEL)
    Inventors: Serge Vaudenay, Jean Monnerat
  • Publication number: 20050193048
    Abstract: The aim of the invention is to propose the generation, verification and denial of an undeniable signature which has a size smaller than the currently available undeniable signatures, i.e. less than 80 bits. This aim is achieved by the method to generate an undeniable signature (y1, . . . , yt) on a set of data, this method comprising the following steps: transforming the set of data (m) to a sequence of a predetermined number (t) of blocks (x1, . . . , xt), these blocks being members of an Abelian group, this transformation being a one way function, applying to each block (xi) a group homomorphism (f) to obtain a resulting value (yi), in which the number of elements of the initial group (G) is larger than the number of elements (d) of the destination group (H).
    Type: Application
    Filed: February 13, 2004
    Publication date: September 1, 2005
    Inventors: Serge Vaudenay, Jean Monnerat
  • Publication number: 20050053233
    Abstract: The aim of this invention is to propose a method to generate sequences or sub-keys based on a main key, in which each sub-key gives no information to recover the main key or any other sub-keys.
    Type: Application
    Filed: August 11, 2004
    Publication date: March 10, 2005
    Inventors: Serge Vaudenay, Pascal Junod
  • Publication number: 20040247117
    Abstract: The purpose of this invention is to propose a new encryption method which offers a high level of security combined with a high execution speed.
    Type: Application
    Filed: May 14, 2004
    Publication date: December 9, 2004
    Inventors: Serge Vaudenay, Pascal Junod
  • Patent number: 6553120
    Abstract: Method for the cryptography of data recorded on a medium usable by a computing unit in which the computing unit processes an input information x using a key for supplying an information F(x) encoded by a function F. The function uses a decorrelation module Mk such that F(x)=[F′(Mk)](x), in which K is a random key and F′ a cryptographic function. This Abstract is neither intended to define the invention disclosed in this specification nor intended to limit, in any manner, the scope of the invention.
    Type: Grant
    Filed: June 28, 1999
    Date of Patent: April 22, 2003
    Assignee: Centre National de la Recherche Scientifique
    Inventor: Serge Vaudenay
  • Patent number: 5946397
    Abstract: Method of public key cryptography based on the discrete logarithm that makes use of the computation of the variable r=g.sup.k modp where p is a prime number called a modulus, the exponent k is a random number usually with a length of N bits and g is an integer called a base, wherein an entity E carries out operations of authentication and/or of signature, including exchanges of signals with another entity in which this variable comes into play.
    Type: Grant
    Filed: September 24, 1997
    Date of Patent: August 31, 1999
    Assignee: Gemplus S.C.A.
    Inventors: David M'Raihi, David Naccache, Jacques Stern, Serge Vaudenay