Patents by Inventor Stéphanie Salgado
Stéphanie Salgado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250119751Abstract: The invention relates to a Bluetooth communication method implemented between a first electronic device (101) and a second electronic device (102), this second electronic device (102) being capable of sending a secure message comprising data to be processed by the first electronic device (101), the method comprising: obtaining (20) at least one security key by each of the first and second electronic devices (101, 102) the said at least one security key participating in a design of a secure tag; generating (36) a specific singular element for the secure message; transmitting (38) the secure message including its specific singular element and this secure tag by the second electronic device (102) to the first electronic device (101), the transmitting comprising establishing (44) a communication link in a Bluetooth advertising mode between these first and second devices (101, 102).Type: ApplicationFiled: January 20, 2023Publication date: April 10, 2025Applicants: EM Microelectronic-Marin SA, Robert Bosch GmbHInventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
-
Publication number: 20250071556Abstract: A Bluetooth communication method implemented between a first electronic device (101) and a second electronic device (102), the second electronic device (102) being capable of sending a secure message including data to be processed by the first electronic device (101). The method includes obtaining (20) at least one security key by each of the first and second electronic devices (101, 102); and transmitting (38) the secure message by the second electronic device (102) to the first electronic device (101) including establishing (44) a communication link in a Bluetooth advertising mode between these first and second devices (101, 102).Type: ApplicationFiled: January 20, 2023Publication date: February 27, 2025Applicant: EM Microelectronic-Marin SAInventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
-
Publication number: 20240211342Abstract: An electronic device including a Bluetooth communication unit configured to perform Bluetooth communication, this unit including a memory module containing a memory controller and a memory element equipped with at least one page (P) including at least one encoded data (E) including a binary code being formed by a word (W 0-N) and its associated redundancy code (RC 0-N), the memory controller being configured to store a user data in this page (P) by performing error correction code (ECC) calculations on this user data for providing an associated redundancy code (RC 0-N) corresponding to an erased redundancy code (RC E) for this user data, if this user data has a reference binary code of an erased word (W E), the erased redundancy code (RC E) having a binary value similar to that of the reference binary code.Type: ApplicationFiled: December 19, 2023Publication date: June 27, 2024Applicant: EM Microelectronic-Marin SAInventors: Stéphanie SALGADO, Thomas EBERHARDT
-
Publication number: 20240211348Abstract: A method for managing data stored in a page (P) within a memory element of a memory system including a controller, the page (P) including at least one encoded data (E) consisting in a binary code being formed by a word (W 0-N) and its associated redundancy code (RC 0-N), the method including a step of storing a user data in this page (P) implemented by the controller, this step including a sub-step of performing error correction code (ECC) calculations on the user data providing an associated redundancy code (RC 0-N) corresponding to an erased redundancy code (RC E) for this user data if it has a reference binary code (br) of an erased word (W E) the erased redundancy code (RC E) having a binary value similar to that of the reference binary code (br).Type: ApplicationFiled: November 28, 2023Publication date: June 27, 2024Applicant: EM Microelectronic-Marin SAInventors: Stéphanie SALGADO, Thomas EBERHARDT
-
Publication number: 20230239945Abstract: A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.Type: ApplicationFiled: January 18, 2023Publication date: July 27, 2023Applicants: EM Microelectronic-Marin SA, ROBERT BOSCH GMBHInventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
-
Patent number: 11356849Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.Type: GrantFiled: November 19, 2019Date of Patent: June 7, 2022Assignee: EM MICROELECTRONIC-MARIN S.A.Inventors: Stéphanie Salgado, Julian Guilloux
-
Patent number: 11308465Abstract: The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.Type: GrantFiled: June 7, 2016Date of Patent: April 19, 2022Assignee: EM Microelectronic-Marin S.A.Inventor: Stephanie Salgado
-
Patent number: 11134382Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.Type: GrantFiled: February 5, 2019Date of Patent: September 28, 2021Assignee: EM Microelectronic-Marin SAInventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
-
Publication number: 20200204997Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.Type: ApplicationFiled: November 19, 2019Publication date: June 25, 2020Applicant: EM Microelectronic-Marin SAInventors: Stéphanie SALGADO, Julian GUILLOUX
-
Publication number: 20190261181Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.Type: ApplicationFiled: February 5, 2019Publication date: August 22, 2019Applicant: EM Mircoelectronic-Marin SAInventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
-
Patent number: 9807063Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.Type: GrantFiled: November 12, 2013Date of Patent: October 31, 2017Assignee: GEMALTO SAInventor: Stéphanie Salgado
-
Patent number: 9774576Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.Type: GrantFiled: March 18, 2014Date of Patent: September 26, 2017Assignee: EM Microelectronic-Marin S.A.Inventors: James J. Springer, Stephanie Salgado
-
Patent number: 9544132Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.Type: GrantFiled: November 30, 2012Date of Patent: January 10, 2017Assignee: GEMALTO SAInventors: Stephanie Salgado, Fabrice Perion
-
Publication number: 20160364704Abstract: The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.Type: ApplicationFiled: June 7, 2016Publication date: December 15, 2016Applicant: EM Microelectronic-Marin S.A.Inventor: Stephanie SALGADO
-
Publication number: 20160277361Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.Type: ApplicationFiled: November 12, 2013Publication date: September 22, 2016Applicant: GEMALTO SAInventor: Stéphanie SALGADO
-
Publication number: 20150271159Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.Type: ApplicationFiled: March 18, 2014Publication date: September 24, 2015Applicant: EM Microelectronic-Marin S.A.Inventors: James J. SPRINGER, Stephanie Salgado
-
Publication number: 20140301553Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.Type: ApplicationFiled: November 30, 2012Publication date: October 9, 2014Applicant: GEMALTO SAInventors: Stephanie Salgado, Fabrice Perion
-
Patent number: 8850221Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.Type: GrantFiled: April 22, 2013Date of Patent: September 30, 2014Assignee: Gemalto SAInventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
-
Publication number: 20130238904Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.Type: ApplicationFiled: April 22, 2013Publication date: September 12, 2013Applicant: GEMALTO SAInventors: Stephanie SALGADO, David VIGILANT, Guillaume FUMAROLI
-
Patent number: 8477933Abstract: The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key KO and a message M, the cryptographic algorithm A is set to compute a value A(KO,M). Given a relationship R between A(KO,M) and A(f(K0),g(M)), where f and g are two bijections, and where f is different from the identity function, the method comprises: a. computing the expected result A(KO,M) of the cryptographic algorithm b. computing a modified result A(f(K0),g(M)), by applying the cryptographic algorithm A on a modified key f(K0) and on a message g(M), c. checking whether the relationship R between the values A(KO,M) and A(f(K0),g(M)) computed in the two preceding steps is verified d. detecting an attack if the relationship R is not verified. The invention also relates to a cryptographic device embodying the above method.Type: GrantFiled: October 9, 2009Date of Patent: July 2, 2013Assignee: Gemalto SAInventors: David Vigilant, Stéphanie Salgado