Patents by Inventor Stéphanie Salgado

Stéphanie Salgado has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250119751
    Abstract: The invention relates to a Bluetooth communication method implemented between a first electronic device (101) and a second electronic device (102), this second electronic device (102) being capable of sending a secure message comprising data to be processed by the first electronic device (101), the method comprising: obtaining (20) at least one security key by each of the first and second electronic devices (101, 102) the said at least one security key participating in a design of a secure tag; generating (36) a specific singular element for the secure message; transmitting (38) the secure message including its specific singular element and this secure tag by the second electronic device (102) to the first electronic device (101), the transmitting comprising establishing (44) a communication link in a Bluetooth advertising mode between these first and second devices (101, 102).
    Type: Application
    Filed: January 20, 2023
    Publication date: April 10, 2025
    Applicants: EM Microelectronic-Marin SA, Robert Bosch GmbH
    Inventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
  • Publication number: 20250071556
    Abstract: A Bluetooth communication method implemented between a first electronic device (101) and a second electronic device (102), the second electronic device (102) being capable of sending a secure message including data to be processed by the first electronic device (101). The method includes obtaining (20) at least one security key by each of the first and second electronic devices (101, 102); and transmitting (38) the secure message by the second electronic device (102) to the first electronic device (101) including establishing (44) a communication link in a Bluetooth advertising mode between these first and second devices (101, 102).
    Type: Application
    Filed: January 20, 2023
    Publication date: February 27, 2025
    Applicant: EM Microelectronic-Marin SA
    Inventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
  • Publication number: 20240211342
    Abstract: An electronic device including a Bluetooth communication unit configured to perform Bluetooth communication, this unit including a memory module containing a memory controller and a memory element equipped with at least one page (P) including at least one encoded data (E) including a binary code being formed by a word (W 0-N) and its associated redundancy code (RC 0-N), the memory controller being configured to store a user data in this page (P) by performing error correction code (ECC) calculations on this user data for providing an associated redundancy code (RC 0-N) corresponding to an erased redundancy code (RC E) for this user data, if this user data has a reference binary code of an erased word (W E), the erased redundancy code (RC E) having a binary value similar to that of the reference binary code.
    Type: Application
    Filed: December 19, 2023
    Publication date: June 27, 2024
    Applicant: EM Microelectronic-Marin SA
    Inventors: Stéphanie SALGADO, Thomas EBERHARDT
  • Publication number: 20240211348
    Abstract: A method for managing data stored in a page (P) within a memory element of a memory system including a controller, the page (P) including at least one encoded data (E) consisting in a binary code being formed by a word (W 0-N) and its associated redundancy code (RC 0-N), the method including a step of storing a user data in this page (P) implemented by the controller, this step including a sub-step of performing error correction code (ECC) calculations on the user data providing an associated redundancy code (RC 0-N) corresponding to an erased redundancy code (RC E) for this user data if it has a reference binary code (br) of an erased word (W E) the erased redundancy code (RC E) having a binary value similar to that of the reference binary code (br).
    Type: Application
    Filed: November 28, 2023
    Publication date: June 27, 2024
    Applicant: EM Microelectronic-Marin SA
    Inventors: Stéphanie SALGADO, Thomas EBERHARDT
  • Publication number: 20230239945
    Abstract: A Bluetooth communication method implemented between first and second electronic devices, including establishing a communication in a connected mode between the first and second devices including a key exchange operation between these two devices, and establishing a communication in an advertising mode between the first and second devices including a periodic broadcast by the second device to the first device of a message including a payload and a calculated tag from this key.
    Type: Application
    Filed: January 18, 2023
    Publication date: July 27, 2023
    Applicants: EM Microelectronic-Marin SA, ROBERT BOSCH GMBH
    Inventors: Julian GUILLOUX, Stéphanie SALGADO, Marcel RUECKER, Joachim NAGEL, Yann RAVIER
  • Patent number: 11356849
    Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 7, 2022
    Assignee: EM MICROELECTRONIC-MARIN S.A.
    Inventors: Stéphanie Salgado, Julian Guilloux
  • Patent number: 11308465
    Abstract: The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: April 19, 2022
    Assignee: EM Microelectronic-Marin S.A.
    Inventor: Stephanie Salgado
  • Patent number: 11134382
    Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: September 28, 2021
    Assignee: EM Microelectronic-Marin SA
    Inventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
  • Publication number: 20200204997
    Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.
    Type: Application
    Filed: November 19, 2019
    Publication date: June 25, 2020
    Applicant: EM Microelectronic-Marin SA
    Inventors: Stéphanie SALGADO, Julian GUILLOUX
  • Publication number: 20190261181
    Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.
    Type: Application
    Filed: February 5, 2019
    Publication date: August 22, 2019
    Applicant: EM Mircoelectronic-Marin SA
    Inventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
  • Patent number: 9807063
    Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.
    Type: Grant
    Filed: November 12, 2013
    Date of Patent: October 31, 2017
    Assignee: GEMALTO SA
    Inventor: Stéphanie Salgado
  • Patent number: 9774576
    Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: September 26, 2017
    Assignee: EM Microelectronic-Marin S.A.
    Inventors: James J. Springer, Stephanie Salgado
  • Patent number: 9544132
    Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: January 10, 2017
    Assignee: GEMALTO SA
    Inventors: Stephanie Salgado, Fabrice Perion
  • Publication number: 20160364704
    Abstract: The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.
    Type: Application
    Filed: June 7, 2016
    Publication date: December 15, 2016
    Applicant: EM Microelectronic-Marin S.A.
    Inventor: Stephanie SALGADO
  • Publication number: 20160277361
    Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.
    Type: Application
    Filed: November 12, 2013
    Publication date: September 22, 2016
    Applicant: GEMALTO SA
    Inventor: Stéphanie SALGADO
  • Publication number: 20150271159
    Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.
    Type: Application
    Filed: March 18, 2014
    Publication date: September 24, 2015
    Applicant: EM Microelectronic-Marin S.A.
    Inventors: James J. SPRINGER, Stephanie Salgado
  • Publication number: 20140301553
    Abstract: The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.
    Type: Application
    Filed: November 30, 2012
    Publication date: October 9, 2014
    Applicant: GEMALTO SA
    Inventors: Stephanie Salgado, Fabrice Perion
  • Patent number: 8850221
    Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: September 30, 2014
    Assignee: Gemalto SA
    Inventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
  • Publication number: 20130238904
    Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
    Type: Application
    Filed: April 22, 2013
    Publication date: September 12, 2013
    Applicant: GEMALTO SA
    Inventors: Stephanie SALGADO, David VIGILANT, Guillaume FUMAROLI
  • Patent number: 8477933
    Abstract: The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key KO and a message M, the cryptographic algorithm A is set to compute a value A(KO,M). Given a relationship R between A(KO,M) and A(f(K0),g(M)), where f and g are two bijections, and where f is different from the identity function, the method comprises: a. computing the expected result A(KO,M) of the cryptographic algorithm b. computing a modified result A(f(K0),g(M)), by applying the cryptographic algorithm A on a modified key f(K0) and on a message g(M), c. checking whether the relationship R between the values A(KO,M) and A(f(K0),g(M)) computed in the two preceding steps is verified d. detecting an attack if the relationship R is not verified. The invention also relates to a cryptographic device embodying the above method.
    Type: Grant
    Filed: October 9, 2009
    Date of Patent: July 2, 2013
    Assignee: Gemalto SA
    Inventors: David Vigilant, Stéphanie Salgado