Patents by Inventor Stéphanie Salgado

Stéphanie Salgado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230239945
    Abstract: A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.
    Type: Application
    Filed: January 18, 2023
    Publication date: July 27, 2023
    Applicants: EM Microelectronic-Marin SA, ROBERT BOSCH GMBH
    Inventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
  • Patent number: 11356849
    Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 7, 2022
    Assignee: EM MICROELECTRONIC-MARIN S.A.
    Inventors: Stéphanie Salgado, Julian Guilloux
  • Patent number: 11308465
    Abstract: The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: April 19, 2022
    Assignee: EM Microelectronic-Marin S.A.
    Inventor: Stephanie Salgado
  • Patent number: 11134382
    Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: September 28, 2021
    Assignee: EM Microelectronic-Marin SA
    Inventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
  • Publication number: 20200204997
    Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.
    Type: Application
    Filed: November 19, 2019
    Publication date: June 25, 2020
    Applicant: EM Microelectronic-Marin SA
    Inventors: Stéphanie SALGADO, Julian GUILLOUX
  • Publication number: 20190261181
    Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.
    Type: Application
    Filed: February 5, 2019
    Publication date: August 22, 2019
    Applicant: EM Mircoelectronic-Marin SA
    Inventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
  • Patent number: 9807063
    Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.
    Type: Grant
    Filed: November 12, 2013
    Date of Patent: October 31, 2017
    Assignee: GEMALTO SA
    Inventor: Stéphanie Salgado
  • Patent number: 9774576
    Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: September 26, 2017
    Assignee: EM Microelectronic-Marin S.A.
    Inventors: James J. Springer, Stephanie Salgado
  • Patent number: 9544132
    Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: January 10, 2017
    Assignee: GEMALTO SA
    Inventors: Stephanie Salgado, Fabrice Perion
  • Publication number: 20160364704
    Abstract: The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.
    Type: Application
    Filed: June 7, 2016
    Publication date: December 15, 2016
    Applicant: EM Microelectronic-Marin S.A.
    Inventor: Stephanie SALGADO
  • Publication number: 20160277361
    Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.
    Type: Application
    Filed: November 12, 2013
    Publication date: September 22, 2016
    Applicant: GEMALTO SA
    Inventor: Stéphanie SALGADO
  • Publication number: 20150271159
    Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.
    Type: Application
    Filed: March 18, 2014
    Publication date: September 24, 2015
    Applicant: EM Microelectronic-Marin S.A.
    Inventors: James J. SPRINGER, Stephanie Salgado
  • Publication number: 20140301553
    Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.
    Type: Application
    Filed: November 30, 2012
    Publication date: October 9, 2014
    Applicant: GEMALTO SA
    Inventors: Stephanie Salgado, Fabrice Perion
  • Patent number: 8850221
    Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: September 30, 2014
    Assignee: Gemalto SA
    Inventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
  • Publication number: 20130238904
    Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
    Type: Application
    Filed: April 22, 2013
    Publication date: September 12, 2013
    Applicant: GEMALTO SA
    Inventors: Stephanie SALGADO, David VIGILANT, Guillaume FUMAROLI
  • Patent number: 8477933
    Abstract: The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key KO and a message M, the cryptographic algorithm A is set to compute a value A(KO,M). Given a relationship R between A(KO,M) and A(f(K0),g(M)), where f and g are two bijections, and where f is different from the identity function, the method comprises: a. computing the expected result A(KO,M) of the cryptographic algorithm b. computing a modified result A(f(K0),g(M)), by applying the cryptographic algorithm A on a modified key f(K0) and on a message g(M), c. checking whether the relationship R between the values A(KO,M) and A(f(K0),g(M)) computed in the two preceding steps is verified d. detecting an attack if the relationship R is not verified. The invention also relates to a cryptographic device embodying the above method.
    Type: Grant
    Filed: October 9, 2009
    Date of Patent: July 2, 2013
    Assignee: Gemalto SA
    Inventors: David Vigilant, Stéphanie Salgado
  • Patent number: 8429417
    Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
    Type: Grant
    Filed: October 3, 2007
    Date of Patent: April 23, 2013
    Assignee: Gemalto SA
    Inventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
  • Patent number: 8397151
    Abstract: The invention relates to a method for checking the integrity of a set of data packets received by a receiving communication device from a sending communication device, the data packets of the set being received in unpredictable order. The invention also relates to a communication device implementing a method according to the invention, in particular to a smart card.
    Type: Grant
    Filed: October 3, 2007
    Date of Patent: March 12, 2013
    Assignee: Gemalto SA
    Inventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
  • Publication number: 20110274268
    Abstract: The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key K0 and a message M, the cryptographic algorithm A is set to compute a value A(KO,M). Given a relationship R between A(KO,M) and A(f(K0),g(M)), where f and g are two bijections, and where f is different from the identity function, the method comprises: a. computing the expected result A(KO,M) of the cryptographic algorithm b. computing a modified result A(f(K0),g(M)), by applying the cryptographic algorithm A on a modified key f(K0) and on a message g(M), c. checking whether the relationship R between the values A(KO,M) and A(f(K0),g(M)) computed in the two preceding steps is verified d. detecting an attack if the relationship R is not verified. The invention also relates to a cryptographic device embodying the above method.
    Type: Application
    Filed: October 9, 2009
    Publication date: November 10, 2011
    Applicant: GEMALTO SA
    Inventors: David Vigilant, Stéphanie Salgado
  • Patent number: 7991994
    Abstract: An authentication method including operation of a personal token, a personal token for a terminal in a communication network, an authentication server, and a computer program for an authentication server. The secure server producing derived key material on the basis of a random and a secret key (K), said personal token including program instructions for re-computing the derived key material (Ck, Ik) on the basis of the received random and the secret key (K) as stored in the personal token. The personal token includes program instructions for using a re-computed part of the derived key material in order to interpret the received additional data.
    Type: Grant
    Filed: June 20, 2005
    Date of Patent: August 2, 2011
    Assignee: Gemalto SA
    Inventors: Stéphanie Salgado, Jorge Sevilla Abellan