Gemalto SA

France

Retour au propriétaire

1-100 de 1 016 pour Gemalto SA Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 1 013
        Marque 3
Juridiction
        International 969
        États-Unis 32
        Canada 14
        Europe 1
Date
2020 1
2019 50
Avant 2019 965
Classe IPC
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 183
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support 108
H04W 12/06 - Authentification 72
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système 67
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison 62
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 3
13 - Armes à feu; explosifs 1
35 - Publicité; Affaires commerciales 1
38 - Services de télécommunications 1
39 - Services de transport, emballage et entreposage; organisation de voyages 1
Voir plus
Statut
En Instance 1
Enregistré / En vigueur 1 015
  1     2     3     ...     11        Prochaine page

1.

METHOD AND SYSTEM FOR MANAGING ACCESS TO A SERVICE

      
Numéro d'application EP2019064098
Numéro de publication 2020/141025
Statut Délivré - en vigueur
Date de dépôt 2019-05-29
Date de publication 2020-07-09
Propriétaire GEMALTO SA (France)
Inventeur(s) Paert, Jonas

Abrégé

The invention method (30) comprises: - authenticating successfully, by a user authentication server (16), through a logon agent (22) in a device, a device user (11); - sending, by the user authentication server, to the logon agent, session data (220) relating to the successful authentication session; - sending, by the logon agent, to a logon application (24) the session data (222); - receiving, by at least one browser (32), from the device user, a first request (310) for accessing the service with a first server identifier; - sending, by the logon application, to the at least one browser, the session data (320); - sending, by the browser, based on the first server identifier, to a first receiving server, the session data (322); - verifying (324), by the first receiving server, whether the session data is or is not valid, and, if yes, authorizing access (326) to the service.

Classes IPC  ?

  • G06F 21/41 - Authentification de l’utilisateur par une seule ouverture de session qui donne accès à plusieurs ordinateurs
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/31 - Authentification de l’utilisateur
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

2.

METHOD AND SYSTEM FOR IMPLEMENTING A VIRTUAL SMART CARD SERVICE

      
Numéro d'application EP2019062681
Numéro de publication 2019/224106
Statut Délivré - en vigueur
Date de dépôt 2019-05-16
Date de publication 2019-11-28
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Tabak, Danny
  • Hugo, Didier
  • Der-Krikorian, Anthony
  • Grosmark, Boris
  • Cohen, Alon
  • Paert, Jonas

Abrégé

The invention relates to a method (20) and a system for implementing a virtual smart card service.The virtual smart card service corresponds to an execution of a smart card application. At least one key is stored at a server side. The smart card application uses application metadata to emulate a smart card application logic. The method comprises: - processing (24), by at least one client (12), the smart card application logic; - running (26), by the at least one client, the smart card application while retrieving smart card data from the smart card application logic; - identifying (28), by the at least one client, while running the smart card application, at least one key operation within the smart card application; - generating (210), by the at least one client, while running the smart card application, a key operation request by using the at least one identified key operation and data relating to the client; - sending (212, 214), by the at least one client, through the smart card application, to the first server the generated key operation request; - processing (216), by the first (14) or a second (16) server, the generated key operation request by using the at least one key and the client data, the second server being connected to the first server; - getting, by the first or second server, a key operation result, the key operation result being the result of the at least one identified key operation on the client data; and - sending (218), by the first or second server, through the smart card application, to the client the key operation result.

Classes IPC  ?

  • G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

3.

METHOD FOR PROTECTING AN EXECUTABLE CODE

      
Numéro d'application EP2019051846
Numéro de publication 2019/149630
Statut Délivré - en vigueur
Date de dépôt 2019-01-25
Date de publication 2019-08-08
Propriétaire
  • GEMALTO SA (France)
  • SFNT GERMANY GMBH (Allemagne)
Inventeur(s)
  • Garreau, Eric
  • Volpe, Sébastien
  • Garba, Peter

Abrégé

A method for transforming an executable code (10), said method comprising a step of identifying a set of portions (P1, P2, P3) of said executable code to be replaced, a step of automatically analyzing the executable code and identifying a collection of sequences (S1, S2, S3) of instructions that end in an unconditional transfer of control, said sequences being included in the executable code only, and a step of generating an updated executable code (20) by replacing each of said portions by an entity which may be either an indirection to one of said sequences or a series of indirections to sequences of the collection, the entity providing an equivalent functionality to that of the portion it replaces.

Classes IPC  ?

  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p.ex. décodage d'instructions
  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p.ex. par masquage
  • G06F 8/52 - Binaire à binaire

4.

Method to counter DCA attacks of order 2 and higher on table-based implementations

      
Numéro d'application 16337197
Numéro de brevet 11201724
Statut Délivré - en vigueur
Date de dépôt 2017-09-22
Date de la première publication 2019-07-25
Date d'octroi 2021-12-14
Propriétaire GEMALTO SA (France)
Inventeur(s) Gouget, Aline

Abrégé

The present invention relates to a method to counter DCA attacks of order 2 and higher order applied on an encoded table-based (TCabi,j) implementation of block-cipher of a cryptographic algorithm to be applied to a message (m), said method comprising the steps of: —translating a cryptographic algorithm block-cipher to be applied on a message (m) into a series of look-up tables (Tabi,j),—applying secret invertible encodings to get a series of look-up tables (TCi,j),—computing message-dependent masking values, comprising the computation of at least two shares of masking value (mmask1, mmask2) for the input of the table network based on at least two different message derivation functions (F1, F2),—re-randomizing the tables (TCi,j) using the computed message-dependent masking values (mmask1, mmask2),—computing rounds to be applied on the message (m) based on the randomized network of tables (TCi,j).

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES

5.

AUTHENTICATION METHOD, DEVICE AND SYSTEM

      
Numéro d'application EP2018081759
Numéro de publication 2019/129422
Statut Délivré - en vigueur
Date de dépôt 2018-11-19
Date de publication 2019-07-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Delhoste, Fabrice
  • Paillart, Frédéric
  • Petit, Sébastien

Abrégé

The invention relates to an authentication method. The method comprises: - collecting (24), based on a predetermined authentication policy, at least one context data element; - constituting (28), based on the at least one collected context data element, a data packet; - generating (216), by using a predetermined hash type algorithm and the data packet, as input to the predetermined hash type algorithm, a hash; - sending the generated hash; - generating (220), as a hash distance generation step, a hash distance between the generated hash and a predetermined reference hash; and - authenticating (224) successfully or not (223) based on the generated hash distance, as an authentication step. The invention also relates to corresponding device and system.

Classes IPC  ?

  • G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
  • G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils

6.

A METHOD FOR UPDATING A ONE-TIME SECRET KEY

      
Numéro d'application EP2018084212
Numéro de publication 2019/129481
Statut Délivré - en vigueur
Date de dépôt 2018-12-10
Date de publication 2019-07-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Anslot, Michel
  • D'Souza, Francis

Abrégé

This invention relates to a method for updating a one-time secret key Kn maintained in a subscription module implemented in a communication apparatus, a wireless communication network maintaining an identical version of said one-time secret key Kn and configured to determine a result XRES expected from the communication apparatus when an authentication function is applied by the subscription module using a random challenge and said one-time secret key Kn as an input, the method comprising the following steps: receiving from the communication network an authentication request message containing at least a random challenge RANDn; determining by the subscription module a result RES by applying the authentication function using the random number RANDn and the one- time secret key Kn as inputs; transmitting said result RES to the communication network for it to be compared with the expected result XRES determined by the communication network using the random number RANDn and the corresponding version of the one-time secret key Kn, the subscriber being authenticated if said first and second results are matching; updating the one-time secret key Kn by replacing its current version with a new version obtained by applying a first key derivation function using the random challenge RANDn as an input, the updated version of the one-time secret key Kn being used by the subscription module for processing a subsequent authentication request, the same update being carried out by a server accessible or part of the wireless communication network in order to maintain an identical version of the one-time secret key Kn.

Classes IPC  ?

  • H04W 12/04 - Gestion des clés, p.ex. par architecture d’amorçage générique [GBA]
  • H04W 12/06 - Authentification
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04W 12/12 - Détection ou prévention de fraudes

7.

COLOR LASER MARKING OF SECURITY DOCUMENT AND A METHOD FOR PRODUCING SUCH SECURITY DOCUMENT

      
Numéro d'application EP2018085258
Numéro de publication 2019/129527
Statut Délivré - en vigueur
Date de dépôt 2018-12-17
Date de publication 2019-07-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Lesur, Jean-Luc
  • Larina, Nina
  • Nikkila, Jarmo

Abrégé

The present invention relates generally to a data carrier and a method for making the data carrier. More particularly, this invention relates to color laser marking of article, especially security documents. The present invention proposes a security document comprising a multilayers assembly instead of a single color component mixture in a layer. The multilayer assembly comprises at least two laser sensitive layer. Each layer comprises at least one coloring agent component. The order arrangement of the multilayers of bleachable coloring agent component is made so that each layer behaves as a wavelength filter configured to selectively transmit longer wavelengths and block or attenuate shorter wavelengths while protecting the underneath coloring agent component from bleaching interference.

Classes IPC  ?

  • B42D 25/41 - Marquage par rayonnement électromagnétique
  • B42D 25/45 - Fabrication associant plusieurs couches
  • B42D 25/23 - Cartes d’identité
  • B42D 25/24 - Passeports
  • B42D 25/29 - Papiers-valeurs; Billets de banque
  • B42D 25/351 - Pièces translucides ou en partie translucides, p.ex. fenêtres
  • B42D 25/382 - Encres spéciales absorbant ou reflétant la lumière infrarouge
  • B42D 25/387 - Encres spéciales absorbant ou reflétant la lumière ultraviolette
  • B42D 25/378 - Encres spéciales

8.

METHOD, FIRST DEVICE, SECOND DEVICE AND SYSTEM FOR MANAGING ACCESS TO DATA

      
Numéro d'application EP2018085298
Numéro de publication 2019/129530
Statut Délivré - en vigueur
Date de dépôt 2018-12-17
Date de publication 2019-07-04
Propriétaire
  • GEMALTO SA (France)
  • SAFENET INC (USA)
Inventeur(s)
  • Hugot, Didier
  • Ali, Asad Mahbaab
  • Arora, Gorav

Abrégé

The invention relates to a method (20) for managing data access. The method comprises: - receiving (22) at least one request for accessing data; - capturing (26) data relating to at least one current context signal during each data access request; - comparing (210), as a current authorization step, the data relating to at least one captured current context signal to predetermined reference data relating to at least one corresponding context signal according to at least one corresponding predetermined authorization policy; - determining (212) and (214), based upon the current authorization result and at least one predetermined dynamic data access policy, whether the data access is or is not authorized, as a data access decision; and - issuing the data access decision (216). The invention also relates to corresponding first device (14), second device (16) and system (10).

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/44 - Authentification de programme ou de dispositif
  • G06F 21/60 - Protection de données
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

9.

METHOD, FIRST DEVICE, SECOND DEVICE AND SYSTEM FOR AUTHENTICATING A FIRST DEVICE TO A SECOND DEVICE

      
Numéro d'application EP2018085268
Numéro de publication 2019/129528
Statut Délivré - en vigueur
Date de dépôt 2018-12-17
Date de publication 2019-07-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Tabak, Danny
  • Josefsson, Johan
  • Vigroux, Gregory

Abrégé

The invention relates to a method (20) for authenticating a first device (12) to a second device (16). The method comprises: - generating, by the first device, by using a predetermined key generation algorithm, a secret key; - sharing (22) and (24), by the first device with the second device, a secret key and a predetermined permanent authentication data generation algorithm; - generating (26), by the first device, first authentication data by using the permanent authentication data generation algorithm and at least the secret key, as input to the permanent authentication data generation algorithm; - broadcasting (28), by the first device, the first authentication data; - scanning (210), by the second device, broadcast data; - generating, by the second device, second authentication data by using the permanent authentication data generation algorithm and at least the secret key, as input to the permanent authentication data generation algorithm; - comparing (216), by the second device, the second authentication data to the broadcast first authentication data; and - authenticating (220), by the second device, the first device only if the second authentication data matches the broadcast first authentication data. The invention also pertains to corresponding first device, second device and system for authenticating a first device to a second device.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04W 12/06 - Authentification
  • H04W 12/10 - Intégrité
  • H04W 12/04 - Gestion des clés, p.ex. par architecture d’amorçage générique [GBA]

10.

IDENTIFICATION DOCUMENT WITH SEVERAL VISUAL MARKINGS AND METHOD FOR MANUFACTURING THEREOF

      
Numéro d'application EP2018085278
Numéro de publication 2019/129529
Statut Délivré - en vigueur
Date de dépôt 2018-12-17
Date de publication 2019-07-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Syrjanen, Taru
  • Lankinen, Mikko

Abrégé

The invention concerns a method for manufacturing an identification document (100) comprising a body (150) with a first visual marking (140) and a second visual marking (130), the first and the second visual markings depicting same identification data. The method comprises the following steps of: - engraving a first area of the identification document (100) with a first laser beam for obtaining the first visual marking (140); - providing at least one see-through portion (120) in a second area of the identification document; - providing an optically variable printing ink patch (131), laminated to at least one first transparent layer (101) located in the see-through portion; and - engraving the surface of the laminated optically variable printing ink patch (132) with a second laser beam for obtaining the second visual marking (130), said second laser beam having a lower power than the first laser beam. The invention concerns also the identification document (100) obtained by this method.

Classes IPC  ?

  • B42D 25/435 - Marquage par enlèvement de matière par rayonnement électromagnétique, p.ex. laser
  • B42D 25/378 - Encres spéciales

11.

A METHOD FOR CONTROLLING BY A SERVER THE USE OF AT LEAST ONE DATA ELEMENT OF A DATA OWNER

      
Numéro d'application EP2018084056
Numéro de publication 2019/121075
Statut Délivré - en vigueur
Date de dépôt 2018-12-07
Date de publication 2019-06-27
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frederic

Abrégé

The invention relates to a method for controlling by a server (201) called secure server the use of a first set of at least one data element of a data owner and provided by a communication device (200), the method comprising the steps of: receiving (204) at least one digital signature representative of a process authorized by the data owner and adapted to carry out a series of at least one instructions using the first set of at least one data element; receiving (209) from a process entity (202) the series of at least one instruction, and a ciphered version of the first set of at least one data element which is communicated to the process entity (202) by the communication device (200); verifying that the series of at least one instruction correspond to a process authorized by the data owner of the communication device by comparing the at least one digital signature received (204) by the secure server (201) with a digital signature obtained by the secure server (201) using as an input the series of at least one instruction received by the secure server (201); and if the series of at least one instruction correspond to an authorized process: deciphering the first set of at least one data element; generating a result data by executing the series of at least one instruction using the first set of at least one data element as an input; transmitting the result data to the process entity (202).

Classes IPC  ?

  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p.ex. protection des informations personnellement identifiables [PII]
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine

12.

METHOD OF ACTIVATING A FEATURE OF A CHIP

      
Numéro d'application EP2018083521
Numéro de publication 2019/120991
Statut Délivré - en vigueur
Date de dépôt 2018-12-04
Date de publication 2019-06-27
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Berzati, Alexandre
  • Bonizec, Loïc
  • Dou Nassre, Alaa

Abrégé

Method for activating a feature of a chip(10) having an interface (20) comprising at least two power pins (GND, VCC). The method comprises the following steps: -the chip measures a series of voltage values between said power pins, -the chip detects a series of sync signals different from clock signals, said sync signals being interleaved with said voltage values, -the chip identifies a data sequence from said series of voltage values, and the chip activates the feature only if the data sequence matches a predefined pattern

Classes IPC  ?

  • G06F 13/42 - Protocole de transfert pour bus, p.ex. liaison; Synchronisation
  • G11C 7/00 - Dispositions pour écrire une information ou pour lire une information dans une mémoire numérique
  • H03K 3/037 - Circuits bistables
  • H03K 5/19 - Contrôle de la configuration de trains d'impulsions

13.

METHOD OF MANAGING A TAMPER-PROOF DEVICE COMPRISING A PLURALITY OF SOFTWARE CONTAINERS

      
Numéro d'application EP2018083513
Numéro de publication 2019/115294
Statut Délivré - en vigueur
Date de dépôt 2018-12-04
Date de publication 2019-06-20
Propriétaire
  • GEMALTO SA (France)
  • GEMALTO HOLDING PTE LTD. BRANCH IN KOREA (République de Corée)
Inventeur(s)
  • Bogusz, François
  • Courtiade, Fabien

Abrégé

The invention is a method for managing a tamper-proof device (30) comprising first and second software containers (32, 34),said tamper-proof device (30) being included in a host device (80) comprising a baseband unit (10). Said first software container (32) is designed to emulate a eUICC and is in a deactivated state. The second software container comprises a set (36) of rules. The baseband unit comprises an activator agent (12)which retrieves both a location data broadcasted by a telecom network and the set of rules from the second software container. The activator agent checks if activation of the first software container is authorized by one of said rules for the location data and requests activation of the first software container only in case of successful checking.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • H04W 36/14 - Resélection d'un réseau ou d'une interface hertzienne
  • H04W 48/04 - Restriction d'accès effectuée dans des conditions spécifiques sur la base des données de localisation ou de mobilité de l'utilisateur ou du terminal, p.ex. du sens ou de la vitesse de déplacement

14.

METHOD FOR CUSTOMISING/MARKING A SMART CARD

      
Numéro d'application EP2018083543
Numéro de publication 2019/115299
Statut Délivré - en vigueur
Date de dépôt 2018-12-04
Date de publication 2019-06-20
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Byrne, David
  • Bertolotti, Jean-Marie
  • Dhers, Gilles

Abrégé

The invention concerns a method for customising/marking a smart card (1) using visible patterns (5-8) on the surface of the card, said method comprising a step of embossing the patterns on the card body (2), said patterns having raised areas (16) extending over a main surface (3) of the smart card body (2). The method is characterised in that the method comprises a step of at least partially levelling (17) said raised areas (16). The invention also concerns the obtained card.

Classes IPC  ?

  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support

15.

METHOD FOR AUTHENTICATING A USER BASED ON AN IMAGE RELATION RULE AND CORRESPONDING FIRST USER DEVICE, SERVER AND SYSTEM

      
Numéro d'application EP2018083997
Numéro de publication 2019/115393
Statut Délivré - en vigueur
Date de dépôt 2018-12-07
Date de publication 2019-06-20
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Famechon, Benoit
  • Siddiqui, Najam
  • Lu, Hongqian Karen
  • Ali, Asad Mahboob

Abrégé

A server (16) accesses a user identifier associated with a first user device (12) and a reference image, as a first image set, to be displayed. The server sends to a second user device (14) an image (24), as a second image set, to be displayed, and a user request to select an image within the first image set. The second user device displays (210) the second image set and the user request. The user of the first user device selects at least one displayed (214) first image, the selected first image matching an image visually selected within the displayed second image set, according to a rule known to the user and the server. The first user device sends to the server the first user device identifier accompanied with data relating to the selected first image (222). If the data relating to the selected first image matches the data relating to the first reference image, the server authenticates the user.

Classes IPC  ?

  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06F 21/42 - Authentification de l’utilisateur par des canaux séparés pour les données de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/06 - Authentification
  • H04L 9/08 - Répartition de clés

16.

METHOD FOR PRODUCING A CHIP CARD COMPRISING WOOD

      
Numéro d'application EP2018084835
Numéro de publication 2019/115727
Statut Délivré - en vigueur
Date de dépôt 2018-12-13
Date de publication 2019-06-20
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Kodjagueuzian, Gilles
  • Karafotis, Stéphane

Abrégé

The invention relates to a method for producing a chip card (10A, 11A) comprising a card body (17) comprising wooden sheets (5B, 6B), said method comprising the steps of: providing two wooden sheets (5B, 6B); providing an insert (1) comprising at least one sheet or leaf of metal (3); and inserting the insert (1) between said sheets (5B, 6B) before assembly of all of the elements, the outer faces of the wooden sheets being outwardly oriented and predominantly covering the two main surfaces of the card body (17), said method being characterised in that it comprises a step of printing (15) or fixing a layer of material (14) onto the edge (T) of the card body (17), which is designed to interconnect layers in the region of the edge. The invention also relates to a corresponding card produced by the method.

Classes IPC  ?

  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support

17.

PROCESS FOR PRODUCING A PORTABLE ELECTRONIC DEVICE WITH INTERFACE SWITCHING AND CORRESPONDING DEVICE

      
Numéro d'application EP2018082858
Numéro de publication 2019/110390
Statut Délivré - en vigueur
Date de dépôt 2018-11-28
Date de publication 2019-06-13
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Printemps, Morgan
  • Zeamari, Ali

Abrégé

The invention relates to a process for producing a portable electronic device (2) including: - an electronic chip-based microcontroller (SE, 4); - a first communication interface (9-11) connecting, or configured to connect, said microcontroller (SE, 4); - at least one second communication interface (12-13) connecting, or configured to connect, said microcontroller (SE, 4) to a peripheral electronic component, characterized in that it includes the following steps: - providing a switch (7, 8) that is configured to switch communications from the microcontroller (SE, 4) either to said first communication interface (9, 10, 11) or to said second interface (12, 13); - configuring (P1) the microcontroller (SE, 4) to drive said switch (7, 8) so as to select said first or second interface. The invention also relates to the corresponding device and to a communication system using said device.

Classes IPC  ?

  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
  • G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré

18.

METHOD FOR PRODUCING A RADIOFREQUENCY CHIP SUPPORT

      
Numéro d'application EP2018083114
Numéro de publication 2019/110437
Statut Délivré - en vigueur
Date de dépôt 2018-11-30
Date de publication 2019-06-13
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Seban, Frederick
  • Buyukkalender, Arek
  • Poitrasson, Eric
  • Torrado, Antonio
  • Durano, Frédéric

Abrégé

The invention concerns a method for producing a radiofrequency chip support, said method comprising the step of forming a first spiral (2) with electrical interconnection zones (3, 4) on a support. The method is characterised in that it comprises the step of forming a second spiral (5) connected to one of the interconnection zones (3, 4) by a link (6), the configuration of the first and second spiral forming a passive antenna (2-5). The invention also concerns the corresponding chip support.

Classes IPC  ?

  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support

19.

METHOD FOR PROTECTING A SOURCE OF ENTROPY USED IN COUNTERMEASURES SECURING A WHITEBOX CRYPTOGRAPHIC ALGORITHM

      
Numéro d'application EP2018082850
Numéro de publication 2019/106016
Statut Délivré - en vigueur
Date de dépôt 2018-11-28
Date de publication 2019-06-06
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Gouget, Aline
  • Vacek, Jan

Abrégé

The present invention relates to a method for a secure execution of a whitebox cryptographic algorithm applied to a message (m) and protected by countermeasures based on pseudo-random values, comprising the steps of : - executing a pseudo-random function (PRP) generating pseudo-random output values and an encrypted main output value based on an encrypted input value (*Xi*) derived from said message, - securing said cryptographic algorithm by applying to the cryptographic algorithm said countermeasures based on said generated pseudo-random output values - retrieving, from said generated encrypted main output value, the input value or part of the input value, under an encrypted form (*Xi*), - executing said secured cryptographic algorithm on said encrypted retrieved value.

Classes IPC  ?

  • H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

20.

CRYPTOGRAPHY DEVICE HAVING IMPROVED SECURITY AGAINST SIDE-CHANNEL ATTACKS

      
Numéro d'application EP2018083115
Numéro de publication 2019/106139
Statut Délivré - en vigueur
Date de dépôt 2018-11-30
Date de publication 2019-06-06
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Georgieva, Mariya
  • Gouget, Aline

Abrégé

Secure cryptography operations on a white-box cryptography device. Receiving a first message. Receiving a cryptographic key encrypted using a homomorphic encryption scheme. Performing a cryptographic operation, e.g., decryption or digital signature, using the encrypted cryptographic key. Performing a homorphically encrypted tracer calculation that traces the performance of the cryptography operations on the white-box cryptography device thereby allowing verification that all steps of the cryptography operation has been performed without external manipulation. Performing a key-exchange operation. Decrypting the key-exchange output using an alternate cryptographic key stored on the cryptographic device.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

21.

CRYPTOGRAPHY DEVICE HAVING SECURE PROVISION OF RANDOM NUMBER SEQUENCES

      
Numéro d'application EP2018083184
Numéro de publication 2019/106166
Statut Délivré - en vigueur
Date de dépôt 2018-11-30
Date de publication 2019-06-06
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Georgieva, Mariya
  • Gouget, Aline

Abrégé

Secure computation of a random number sequence in a cryptographic device. The computation is secured by receiving a homomorphic ciphertext seed vector, selecting an initial internal state from the seed vector, the initial internal state composed of a subset of elements of the seed vector, updating an internal state from a previous internal state using multivariate functions accepting elements of the previous internal state as inputs to produce a homomorphic ciphertext from homomorphic ciphertext input values, generating an intermediate result vector of homomorphic ciphertexts from the homomorphic ciphertext internal state multivariate functions accepting the elements of the internal state as inputs to produce a homomorphic ciphertext from homomorphic ciphertext input values, and decrypting the intermediate result vector elements into plaintext vector elements, thereby producing a plaintext deterministic random sequence vector corresponding to plaintext seed elements used to produce the seed vector. Other systems and methods are disclosed.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

22.

METHOD OF MANAGING PRIVILEGES IN A TAMPER-PROOF DEVICE COMPRISING SEVERAL SOFTWARE CONTAINERS

      
Numéro d'application EP2018080318
Numéro de publication 2019/101507
Statut Délivré - en vigueur
Date de dépôt 2018-11-06
Date de publication 2019-05-31
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Courtiade, Fabien
  • Labourie, Florent
  • Dubois, Denis
  • Ahmad, Syarif
  • Yang, Jianrong
  • Pahala, Nopiga
  • Yong, Shier Loon Sharon

Abrégé

The invention is a method for managing a tamper-proof device (10) comprising a processor (40) and an operating system (12) able to handle a set of communication protocols with external entities. The operating system accesses a ruling data (14) specifying for each communication protocol of the set whether Card Lock, Card Terminate and Final Application privileges as defined by GlobalPlatform Card Specification (V2.3) are authorized or forbidden. Upon receipt of a command from one of said external entities, the operating system uses the ruling data to deny or to authorize execution of the command based on the communication protocol used to convey the command.

Classes IPC  ?

  • G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
  • H04W 12/04 - Gestion des clés, p.ex. par architecture d’amorçage générique [GBA]
  • H04W 12/08 - Sécurité d'accès
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

23.

METHOD OF MANAGING A TAMPER-PROOF DEVICE COMPRISING SEVERAL SOFTWARE CONTAINERS

      
Numéro d'application EP2018080329
Numéro de publication 2019/101508
Statut Délivré - en vigueur
Date de dépôt 2018-11-06
Date de publication 2019-05-31
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Courtiade, Fabien
  • Labourie, Florent
  • Dubois, Denis
  • Ahmad, Syarif
  • Yang, Jianrong
  • Pahala, Nopiga
  • Yong, Shier Loon Sharon

Abrégé

The invention is a method for managing a tamper-proof device (10) comprising a plurality of software containers (20, 30) and an operating system (12). The operating system is able to handle a set of communication protocols with external entities. The operating system accesses a pairing data (14) in which each communication protocol of said set has been associated with a single software container and upon receipt of a message from one of the external entities, the operating system uses the pairing data to route the message to the software container associated with the communication protocol used to convey the message.

Classes IPC  ?

  • G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
  • H04W 12/04 - Gestion des clés, p.ex. par architecture d’amorçage générique [GBA]
  • H04W 12/08 - Sécurité d'accès
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

24.

METHOD FOR MANAGING LIFECYCLE OF CREDENTIALS

      
Numéro d'application EP2018080344
Numéro de publication 2019/101509
Statut Délivré - en vigueur
Date de dépôt 2018-11-06
Date de publication 2019-05-31
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Mosse, Franck
  • Sahli, Chaouki

Abrégé

The invention is a method for managing lifecycle of credentials of an application (40) installed on an application server (10). The method comprises the steps of: - monitoring execution of the application by a credential agent (50) separate from the application and installed on the application server, said credential agent having an access token previously provided by a security server (30), - upon detection of a predefined event by the credential agent, sending to the security server a polling message comprising the access token, - checking the access token is genuine by the security server and in case of successful checking sending a security data to the credential agent in response to the polling message (M7), the security data being a secret value and/or an associated metadata, - updating a security configuration of the application using said security data, then making the security configuration effective.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 12/24 - Dispositions pour la maintenance ou la gestion
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 21/45 - Structures ou outils d’administration de l’authentification

25.

A METHOD FOR IMPROVING USER AUTHENTICATION PERFORMED BY A COMMUNICATION DEVICE

      
Numéro d'application EP2018078300
Numéro de publication 2019/096521
Statut Délivré - en vigueur
Date de dépôt 2018-10-16
Date de publication 2019-05-23
Propriétaire GEMALTO SA (France)
Inventeur(s) Faure, Frédéric

Abrégé

NΑΝΝ1 ί N NS(i)NSiN ANN iNLH(i) NLH(i)S(jc,i,c,i, Sj NU_CSjU_CSjj) as an input signal that is not associated to the requesting user.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/06 - Authentification
  • G06N 3/08 - Méthodes d'apprentissage

26.

A METHOD FOR A SERVICE PROVIDER TO LAUNCH A TARGETED SERVICE IMPLEMENTED BY AN APPLICATION BELONGING TO A SECURITY DOMAIN OF AN EUICC

      
Numéro d'application EP2018078299
Numéro de publication 2019/091723
Statut Délivré - en vigueur
Date de dépôt 2018-10-16
Date de publication 2019-05-16
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Glinka-Hecquet, Gerald
  • Dubois,, Denis

Abrégé

This invention related to a method for a service provider to launch a targeted service implemented by an application belonging to a security domain of an e UICC (504) embedded into a communication device, said security domain and application being respectively called transversal security domain and transversal application, the e UICC (504) comprising a set of at least one profile allowing the communication device to access to a specific mobile network infrastructure, one profile being activated at a time, the method comprising the following steps: receiving by the e UICC (504) from an SM-SR server (502) on a communication interface (E5) a command (512) for enabling a profile, said command comprising an identifier of the transversal security domain; interpreting by the e UICC (504) the command for enabling a profile as a command for transmitting a subscription address associated to the profile which is activated in the e UICC; sending (514) an SMS message comprising a subscription address associated to the profile which is currently active; establishing between the server operated by the service provider (503) and the e UICC (515) a communication channel, this establishment being initiated by the server operated by the service provider (504) using the subscription address transmitted by SMS; receiving (515) by the e UICC (504) on said communication channel a command for launching the targeted service; launching by the e UICC (504) the targeted service.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • H04W 4/50 - Fourniture de services ou reconfiguration de services
  • H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine

27.

METHOD FOR SECURING THE CUSTOMIZED AREA OF A SECURITY DOCUMENT AND SECURITY DEVICE COMPRISING SUCH A CUSTOMIZED AREA

      
Numéro d'application EP2018079577
Numéro de publication 2019/086380
Statut Délivré - en vigueur
Date de dépôt 2018-10-29
Date de publication 2019-05-09
Propriétaire GEMALTO SA (France)
Inventeur(s) Lesur, Jean-Luc

Abrégé

The invention relates to a method for securing a customized area (120) of a security document (100), comprising the following steps: - inserting, by a first insertion method, a customized color image (122) on a first surface (121, 123) of the security document; - inserting, by a second insertion method, guilloche patterns (124, 126) in color on a second surface (121, 123, 125) of the security document, wherein the first and second surfaces are stacked on top of each other such that the guilloche patterns and the customized image at least partially overlap; and - inserting a colored marking (160) on the customized image and the guilloche patterns by at least two laser beams of different wavelengths, wherein the colored marking passes at least partially through the customized image and the guilloche patterns, and wherein, for the purpose of the colored marking, said wavelengths allow to generate colors obtained by chemical reaction with the pigments of the customized image and the guilloches such that the colors of the colored marking directly depend on the pigments used in the guilloches and the customized image.

Classes IPC  ?

28.

METHOD FOR SECURING A DISPLAY OF SENSITIVE DATA BY A GRAPHICS PROCESSING UNIT OF AN ELECTRONIC DEVICE

      
Numéro d'application EP2018079769
Numéro de publication 2019/086493
Statut Délivré - en vigueur
Date de dépôt 2018-10-30
Date de publication 2019-05-09
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Fokle Kokou, Milas
  • Loubet Moundi, Philippe

Abrégé

The present invention relates to a method for securing a display of sensitive data on a display device by a graphics processing unit (GPU) (2) of an electronic device, said display being triggered by a user application (9) executed by a central processing unit (CPU) (4) of said electronic device and calling a display function of a graphics library (10), said electronic device comprising a tamper resistant secure element (SE) (5), an unprotected GPU memory (7) accessible by the graphics processing unit (GPU), the secure element and the central processing unit (CPU) and a protected GPU memory (8) only accessible by the graphics processing unit (GPU) and by said secure element, said secure element (SE) being integrated in the graphics processing unit (GPU), said method comprising, performed by said secure element (5), the steps of : - in response to the triggering of the display of said sensitive data by the user application (9), providing (S2) said user application with an encryption function specified as an encryption algorithm and a cryptographic key to be used with said encryption algorithm enabling said user application to encrypt said sensitive data, - reading (S6), in the unprotected GPU memory (7), encrypted display data generated by said display function of the graphics library from said encrypted sensitive data, - decrypting (S7) said encrypted display data to generate decrypted display data, - writing (S8) the decrypted display data in the protected GPU memory (8), such that the graphics processing unit (GPU) (2) accesses said decrypted display data in the protected GPU memory (8) and displays it on the display device.

Classes IPC  ?

  • G06F 21/84 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs d’affichage, p.ex. écrans ou moniteurs
  • G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
  • G06F 21/60 - Protection de données
  • H04L 9/16 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération

29.

METHOD OF IMPLEMENTING A PHYSICAL UNCLONABLE FUNCTION

      
Numéro d'application EP2018075580
Numéro de publication 2019/081138
Statut Délivré - en vigueur
Date de dépôt 2018-09-21
Date de publication 2019-05-02
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Duval, Benjamin
  • Berzati, Alexandre
  • Fourquin, Olivier

Abrégé

Method generating and selecting primitives for implementing a Physical Unclonable Function providing a response representative of a device comprising a plurality of primitives coupled in pairs (P1,…,P6). The method comprises the following steps: - selecting a subset (20) of the pairs, - assessing difference between electrical characteristics values provided by primitives belonging to each pair of said subset (20), and - qualifying all pairs of primitives for which the assessed difference is higher than a reference threshold.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

30.

METHODS FOR RECORDING AND SHARING A DIGITAL IDENTITY OF A USER USING DISTRIBUTED LEDGERS

      
Numéro d'application EP2018079064
Numéro de publication 2019/081530
Statut Délivré - en vigueur
Date de dépôt 2018-10-23
Date de publication 2019-05-02
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Castillo, Laurent
  • Wang, Yesong
  • Aung, Khaing Phyo
  • Lao, Vincent

Abrégé

The present invention relates to a method for recording a digital identity of a first user (102) comprising, performed by a computing device (301) of a first verification entity (101) identified by a first verification entity identifier : - receiving from the first user at least one first user identity document (302) and extracting user personal identifiable information data elements from said user identity document, - after verification, encrypting using a public key of the first verification entity and recording said encrypted user personal identifiable information data elements (304) in a first distributed ledger (103) whose access is authorized to a first set of computing devices only, - generating a user identifier (KYC ID) to be sent to said user and recording a hash of said user identifier in a second distributed ledger and, for each verified user personal identifiable information data element, an attestation (303) including the first verification entity identifier and a hash of said user personal identifiable information data element, and recording each generated attestation in said second distributed ledger, - for each generated attestation, recording in said second distributed ledger a relationship between the generated user identifier and said generated attestation, wherein said first and second distributed ledgers are configured such that access to the first distributed ledger is more restricted than access to the second distributed ledger and wherein all data stored in the second distributed ledger form a graph data model in which each node represents an attestation of a user personal identifiable information data element or a user identifier, and wherein the links between the nodes of the model represent the relationships recorded in the second distributed ledger between user identifiers and said recorded attestations, such that any entity having access to the second distributed ledger is able to perform verifications on the relationship between users whose identities have been recorded in the ledgers without having access to said recorded identities.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

31.

A METHOD FOR A COMMUNICATION DEVICE TO RETRIEVE A PLAINTEXT FROM A CIPHERTEXT MEMORIZED IN A REMOTE DATABASE

      
Numéro d'application EP2018076927
Numéro de publication 2019/072666
Statut Délivré - en vigueur
Date de dépôt 2018-10-03
Date de publication 2019-04-18
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Jemli, Nejib
  • Wies, Thomas
  • Gouget, Aline

Abrégé

This invention relates to a method for a first communication device (100) to retrieve a plaintext P from a first ciphertext C memorized in a first server called remote database (102), the first ciphertext C being generated by a second communication device (101) by applying a first encryption function E() in order to perform an homomorphic encryption of plaintext P by combining it with a first encryption key eHE provisioned in said second communication device. The method comprises the following steps carried out by the first communication device (100): receiving (200) from the remote database (102) the first ciphertext C; generating (201) a second ciphertext C' by applying a second encryption function F() that combines a single-use encryption key K generated by a random number generator with the first ciphertext C; transmitting (202) the second ciphertext C' to a second remote server (103) provisioned with a first decryption key dHE corresponding to the first encryption key eHE; receiving (203) from the second remote server (103) a third ciphertext M generated by applying a first decryption function D() corresponding to the first encryption function E() in order to combine the second ciphertext C' with the first decryption key dHE; retrieving (204) the plaintext P by applying a second decryption function G() corresponding to the second encryption function F() in order to combine the single-use encryption key K with the third ciphertext M.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

32.

SMART CARD WITH SECURED ELECTRONIC MODULE AND MANUFACTURING METHOD TECHNICAL FIELD

      
Numéro d'application EP2018077387
Numéro de publication 2019/072791
Statut Délivré - en vigueur
Date de dépôt 2018-10-09
Date de publication 2019-04-18
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Degeilh, Line
  • Janvrin, Rémy
  • Dossetto, Lucile
  • Ottobon, Stéphane

Abrégé

The invention relates to a smart card (100) comprising: - a card body (120) comprising a cavity and a front side provided with a first printed pattern (123), and - an electronic module (110) accommodated in the cavity of the card body and comprising a dielectric support (116) equipped, on a first side, with an electronic chip and, on a second side, with an area of electrical contacts (117), wherein the dielectric support (116) is formed from an at least partially transparent material and partially covers the first printed pattern (123) of the card body, so that a portion of said first printed pattern is visible, due to transparency, through the dielectric support.

Classes IPC  ?

  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
  • G06K 19/073 - Dispositions particulières pour les circuits, p.ex. pour protéger le code d'identification dans la mémoire

33.

A METHOD FOR TRANSMITTING TO A PHYSICAL OR VIRTUAL ELEMENT OF A TELECOMMUNICATIONS NETWORK AN ENCRYPTED SUBSCRIPTION IDENTIFIER STORED IN A SECURITY ELEMENT, CORRESPONDING SECURITY ELEMENT, PHYSICAL OR VIRTUAL ELEMENT AND TERMINAL COOPERATING WITH THIS SECURITY ELEMENT

      
Numéro d'application EP2018076850
Numéro de publication 2019/068731
Statut Délivré - en vigueur
Date de dépôt 2018-10-02
Date de publication 2019-04-11
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Bradley, Paul
  • Pauliac, Mireille

Abrégé

The invention concerns a method for transmitting to a physical or virtual element (11) of a telecommunications network an encrypted subscription identifier stored in a security element (13 - SUCI), or an encrypted identifier of the security element (13) or an encrypted identifier of a terminal (12) cooperating with the security element (13), characterized in that it consists in pre-calculating proactively at the occurrence of an event the encrypted identifier using a key and storing it in a file or memory of the security element (13) with a parameter enabling the key to be calculated by the element (11) of the telecommunications network in order to be able to transmit to the element (11) of the telecommunications network the encrypted identifier and the parameter, without having to compute the encrypted identifier when the terminal (12) is asking for it.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/06 - Authentification
  • H04W 88/02 - Dispositifs terminaux

34.

METHOD AND SYSTEM FOR CARRYING OUT A PAYMENT TRANSACTION ON A BANK TERMINAL USING AN ELECTRONIC DEVICE

      
Numéro d'application EP2018076876
Numéro de publication 2019/068742
Statut Délivré - en vigueur
Date de dépôt 2018-10-02
Date de publication 2019-04-11
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Lemaire, François
  • Lambert, Jean

Abrégé

The invention relates to a method for carrying out a payment transaction on a bank terminal (2, POS) using an electronic payment device (1), said device comprising at least two payment applications (1-4), said method comprising: - a step of data communication (STATUS) from the device to the terminal during a transaction, said data comprising at least information of a first type (ADF) identifying each payment application of the device; - a step of configuring the device so that said data comprise information of a first type (ADF) relative to at least one disabled payment application (1, 3). The invention likewise relates to the corresponding system.

Classes IPC  ?

  • G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
  • G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques

35.

METHOD FOR THE INSERTION OF GUILLOCHE PATTERNS, METHOD FOR THE EXTRACTION OF GUILLOCHE PATTERNS, METHOD FOR THE AUTHENTICATION OF THESE GUILLOCHE PATTERNS AND DEVICES FOR IMPLEMENTATION

      
Numéro d'application EP2018075980
Numéro de publication 2019/063556
Statut Délivré - en vigueur
Date de dépôt 2018-09-25
Date de publication 2019-04-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Leibenguth, Joseph
  • Jourlin, Michel
  • Carré, Maxime
  • Bouabdellah, Mohamed

Abrégé

The invention concerns a method of inserting guilloche patterns in a document, each guilloche pattern being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure, the method comprising an operation (300-600) of determining an insertion intensity of each guilloche pattern previously generated (100) on the basis of a mid-gray level of the document near said guilloche pattern. The invention also concerns a device for implementing this insertion method. The invention also concerns a method for extracting guilloche patterns (601 -608) from a secure document (600) likely to be degraded, the method comprising the following operations: - determining (710) a contrast card (c) of at least one portion of the secure document that includes the guilloche patterns; - identifying (720), on this contrast card an optimal percolation trajectory; and - extracting (730) the optimal percolation trajectory, said trajectory corresponding to the guilloche pattern. The invention also concerns a method of authentication of the guilloche patterns of a secure document likely to be degraded, involving: - the preceding extraction operations, and - an operation (740) of comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.

Classes IPC  ?

36.

METHOD FOR GENERATING VARIABLE GUILLOCHE PATTERNS, IMPLEMENTING DEVICE AND IDENTIFICATION DOCUMENT COMPRISING SUCH PATTERNS

      
Numéro d'application IB2018057608
Numéro de publication 2019/064286
Statut Délivré - en vigueur
Date de dépôt 2018-10-01
Date de publication 2019-04-04
Propriétaire
  • GEMALTO SA (France)
  • CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
  • UNIVERSITE JEAN MONNET SAINT ETTIENNE (France)
Inventeur(s)
  • Leibenguth, Joseph
  • Fournel, Thierry
  • Coltuc, Dinu

Abrégé

The invention relates to a method for generating 1 D guilloche patterns able to be affixed on a document, each guilloche pattern (201 -228) being able to encode variable alphanumeric data providing a different appearance to each guilloche pattern, the method comprising the following operations: formatting (420) alphanumeric data (410) to be encoded in the form of a predefined number of data blocks with a predefined size; generating a carrier function (430) comprising a plurality of parameters, the formatted data blocks forming at least one of the parameters; and modulating (450) the carrier function by the formatted data blocks so as to encode the alphanumeric data (410) graphically, each data block defining a guilloche pattern (201 -228), the number of data blocks (n) defining the number of guilloche patterns, the carrier function associated with a formatted data block is modulated locally, each datum of the block being encoded locally in the guilloche pattern, by interpolation of a predefined point associated with the carrier function.

Classes IPC  ?

  • B42D 25/337 - Guillochages
  • G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
  • H04N 1/32 - Circuits ou dispositions pour la commande ou le contrôle entre l'émetteur et le récepteur

37.

METHOD OF MANAGING A NFC TRANSACTION

      
Numéro d'application EP2018074040
Numéro de publication 2019/063262
Statut Délivré - en vigueur
Date de dépôt 2018-09-06
Date de publication 2019-04-04
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Courtiade, Fabien
  • Zaiti, Reda
  • Boulard, Laurent

Abrégé

Method for managing a NFC transaction between a NFC reader and a device including an application and a NFC controller having an ability to communicate in contactless mode which is deactivated. The device includes an indicator uniquely associated with the application. This indicator is set to either a first or a second value. When the NFC controller is awakened by the electromagnetic field generated by the NFC reader, it sends a first message to the application. On receipt of the first message, the application checks the indicator and activates the NFC controller ability to communicate in contactless mode only if the indicator is set to the first value. The NFC transaction is performed through the NFC controller and when the NFC transaction is ended the NFC controller sends a second message to request the application to deactivate the NFC controller ability to communicate in contactless mode.

Classes IPC  ?

  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
  • G06F 1/32 - Moyens destinés à économiser de l'énergie

38.

METHOD FOR AMENDING THE FIRMWARE OF A RESOURCE CONSTRAINED DEVICE

      
Numéro d'application EP2018074307
Numéro de publication 2019/052944
Statut Délivré - en vigueur
Date de dépôt 2018-09-10
Date de publication 2019-03-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Lepavec, Emmanuel
  • Bouveron, Dominique
  • Minette De Saint Martin, Xavier
  • Vienne, Nicolas
  • Phan, Guillaume Chi-Dan

Abrégé

1. Method for amending the firmware (3) of a device (1), the device comprises a memory unit (2) and a firmware amending software (4), and the firmware comprises: at least two functional components (9.1, 9.2), wherein the first functional component comprises at least one public function (11.1, 11.2), configured to be called by at least one second functional component different from the first functional component, a call dispatch unit (5), where each call addressing one of the public functions is dispatched, further the device comprises in the memory unit (2) a functional component table (10), wherein at least one of the functional components is registered, and the device comprises a set of access rights (17) governing access to said at least one public function (11.1), wherein the firmware amendment comprises the steps for the firmware amending software (4) of: storing a new functional component (9.3) at a memory location (14) of the memory unit (2), updating the functional component table (10) with the memory location of said new functional component, and handing over control to the firmware (3), wherein a call of the at least one public function (11.1) of the first functional component (9.1) comprises for the second functional component (9.2) executing a call of the call dispatch unit (5), wherein the call to the call dispatch unit includes a target indication relative to the first functional component and the public function to be called, and wherein the calling of the at least one public function comprises for the call dispatch unit the step of calling the public function indicated by the target indication by retrieving the memory location (14) of the first functional component from the functional component table (10), and wherein the calling of the at least one public function comprises for the call dispatch unit (5) the step of checking the set of access rights for the second functional component (9.2) before calling the indicated public function of the first functional component (9.1).

Classes IPC  ?

  • G06F 8/654 - Mises à jour utilisant des techniques spécialement adaptées aux mémoires de masse réinscriptibles, p.ex. aux mémoires EEPROM ou flash

39.

DATA CARRIER AND A METHOD FOR PRODUCING SUCH DATA CARRIER

      
Numéro d'application EP2018075160
Numéro de publication 2019/053281
Statut Délivré - en vigueur
Date de dépôt 2018-09-18
Date de publication 2019-03-21
Propriétaire GEMALTO SA (France)
Inventeur(s) Pohjola, Teemu

Abrégé

The present invention relates generally a method to authenticate a data carrier, such as passports, licenses, identification card…by hiding at least two optically encoded image within a data carrier so that the data carrier is authenticated through at least two factor authentication process. In the methods of the present invention, at least two reliable, readable optically encoded image are hidden within the data carrier wherein each of the encoded image is visible through a same decoder device but under different specific lighting conditions without the former having influence on the quality of the latter. The authentication methodology of the present invention provides an improved security, being even more difficult to reproduce by infringers, even more difficult to remove, replace or exchange and easy to check.

Classes IPC  ?

  • G06K 9/18 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales utilisant des caractères imprimés pourvus de marques de codage additionnelles ou comportant des marques de codage, p.ex. le caractère étant composé de barres distinctes de formes différentes, chacune représentant une valeur de code différente
  • G06K 9/26 - Obtention de l'image en utilisant une fente déplacée sur la surface de l'image
  • B42D 25/30 - Caractéristiques d’identification ou de sécurité, p.ex. pour empêcher la falsification

40.

A FIRST COMMUNICATION DEVICE CONFIGURED TO COMMUNICATE USING A SHORT RANGE WIRELESS INTERFACE WITH A SECOND COMMUNICATION DEVICE FOR UNLOCKING A BOOT SEQUENCE

      
Numéro d'application EP2018074469
Numéro de publication 2019/053008
Statut Délivré - en vigueur
Date de dépôt 2018-09-11
Date de publication 2019-03-21
Propriétaire GEMALTO SA (France)
Inventeur(s) Bernabeu, Gil

Abrégé

This invention relates to a first communication device (201) configured to communicate using a short range wireless interface (216) with a secure enclave (211) embedded in a second communication device (200), the second communication device (200) further comprising a main processor (210) adapted to execute at least one portion of a boot sequence (214), said secure enclave (211) implementing a boot application (215) configured to lock the at least one portion of the boot sequence (214) of the second communication device (200) such that it cannot be executed when an electronic signature derived from the at least one portion is not matching with a reference electronic signature memorised by the secure enclave (211) and associated to said at least one portion, wherein the first communication device is further configured to establish (302) with the secure enclave (211) a secure communication channel, receive audit data from the secure enclave (211) in order to verify if at least one portion of the boot sequence is locked; transmit to the secure enclave (211) a message for unlocking the at least one locked portion of the boot sequence.

Classes IPC  ?

  • G06F 21/51 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p.ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 9/4401 - Amorçage
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

41.

A METHOD FOR ALLOCATING TEMPORARILY A SUBSCRIPTION TO A CREDENTIAL CONTAINER

      
Numéro d'application EP2018074470
Numéro de publication 2019/053009
Statut Délivré - en vigueur
Date de dépôt 2018-09-11
Date de publication 2019-03-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Anslot, Michel
  • Lamberton, Marc

Abrégé

This invention relates to a method for a credential container embedded into a wireless communication device (300) to obtain a temporary wireless connectivity through a first wireless network (MNO1), the credential container being provisioned with an identifier ID identifying the wireless communication device or the credential container and a pre-loaded subscription profile comprising a range of International Mobile Subscription Identifiers (IMSI) associated to a second network operator (MNO2).

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné

42.

METHOD TO PREVENT UNAUTHORIZED ACCESS TO A CONTACTLESS DEVICE

      
Numéro d'application EP2018075187
Numéro de publication 2019/053283
Statut Délivré - en vigueur
Date de dépôt 2018-09-18
Date de publication 2019-03-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Rantala, Janne
  • Massbacka, Janne

Abrégé

This invention relates generally to a method of preventing unauthorized access to a contactless device. The invention relates more particularly to the field of methods implemented so that an owner consent is provided to a reader before any access to its contactless device. The invention proposes to introduce slight modification on the behavior of the contactless device and an adaptation from the reader. With the present invention, the reader need to know in advance the UID of the contactless device he would like to establish a communication. The UID is generated by the reader from identity information provided by a positive action corresponding to a user consent. The present invention proposes to send a SELECT command directly to the corresponding contactless device with the complete UID, without using the ANTICOLLISION loop compliant with the standard 14443 type A. The contactless device will grant access to only reader sending a SELECT command with the complete UID.

Classes IPC  ?

  • H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie

43.

METHOD FOR SECURING A MACHINE LEARNING BASED DECISION SYSTEM

      
Numéro d'application EP2018070743
Numéro de publication 2019/038036
Statut Délivré - en vigueur
Date de dépôt 2018-07-31
Date de publication 2019-02-28
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Dao, Frédéric
  • Dandelot, Thomas
  • Paillart, Frédéric
  • Faure, Frédéric
  • Delhoste, Fabrice

Abrégé

The present invention relates to a method for securing a system being configured to perform decision tasks carried out by a machine learning engine, equipped for operating with at least one machine learning model, the system comprising at least one training component for improving the at least one machine learning model, a device for carrying out decisions based on said machine learning model and a set of input data, and an interaction interface for exchanging said at least one machine learning model between training component and device, wherein the device comprises a model attestation checker, the method comprising the steps of: for the device: -acquiring input data, -ascertaining at least one machine learning model over the interaction interface, for the model attestation checker: -checking if said at least one machine learning model is trusted by a model attestation, -considering by the machine learning engine for said decision making only those machine learning models that are trusted, for the machine learning engine: -carrying out the decision task for acquired input data by using said at least one trusted machine learning model, -providing a result attestation for the decision output.

Classes IPC  ?

  • G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/06 - Authentification
  • G06F 19/24 - pour l'apprentissage automatique, l'exploration de données ou les bio statistiques, p.ex. détection de motifs, extraction de connaissances, extraction de règles, corrélation, agrégation ou classification
  • G06N 5/00 - Agencements informatiques utilisant des modèles fondés sur la connaissance
  • G06N 99/00 - Matière non prévue dans les autres groupes de la présente sous-classe

44.

METHOD FOR AUTHENTICATING A USER AND CORRESPONDING USER DEVICES, SERVER AND SYSTEM

      
Numéro d'application EP2018071941
Numéro de publication 2019/034619
Statut Délivré - en vigueur
Date de dépôt 2018-08-13
Date de publication 2019-02-21
Propriétaire GEMALTO SA (France)
Inventeur(s) Hutchinson, Michael

Abrégé

The invention relates to a method (20) for authenticating a user. A server (14) accesses a user identifier associated with a second user device (16) identifier. The server accesses, for the user, a predetermined reference location(s) within a reference table. The method comprises: Sending from a first user device (12) to the server, through a first communication channel, a message (24) including the user identifier and a request to get a challenge table. Generating (26), by the server, a first challenge table including a valid first set of characters. Sending, thanks to the second user device identifier, from the server to the second user device, through a second communication channel, a message (210) including the first challenge table and a first request to display the first challenge table. Displaying (212), by or through the second user device, the first challenge table. Selecting (216), by a user, through a first user device man machine interface, a a selected character(s). Sending, from the first user device to the server, through the first communication channel, a message (220) including the selected character(s), as submitted user authentication data. Determining (224), by the server, based upon the predetermined reference location(s) within the first challenge table a corresponding reference character(s), as reference user authentication data. Verifying (226), by the server, for the user, whether the submitted user authentication data does or does not match the reference user authentication data. And, only if yes, succeeding, by the server, in authenticating the user. The invention also relates to corresponding user devices (12) and (16), server (14) and system (10).

Classes IPC  ?

  • G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • G06F 21/42 - Authentification de l’utilisateur par des canaux séparés pour les données de sécurité
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

45.

METHOD TO SECURE A SOFTWARE CODE PERFORMING ACCESSES TO LOOK-UP TABLES

      
Numéro d'application EP2018069409
Numéro de publication 2019/025181
Statut Délivré - en vigueur
Date de dépôt 2018-07-17
Date de publication 2019-02-07
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Adjedj, Michael
  • Leveque, Sylvain

Abrégé

0 1n0 1nPPPP).

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p.ex. par masquage
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES

46.

CONSENSUS PROTOCOL FOR PERMISSIONED LEDGERS

      
Numéro d'application EP2018069347
Numéro de publication 2019/020428
Statut Délivré - en vigueur
Date de dépôt 2018-07-17
Date de publication 2019-01-31
Propriétaire GEMALTO SA (France)
Inventeur(s) Gouget, Aline

Abrégé

The present invention relates to a method for reaching a consensus for appending, at a current round (j), a new block of data to a permissioned ledger distributed through a network comprising network connected devices authorized by the ledger, called nodes, said method being performed by a tamper-proof computing device configured for managing securely digital keys and comprising a random number generator and a cryptoprocessor for generating signatures with said keys, and comprising, for a set of transactions to be validated, the steps of : - receiving (S2), from at least a first node (Nk), a candidate block (Bj,Nk) computed by said first node on transactions among said set of transactions, - for each received candidate block, generating a random value (RAND) (S3) by the random number generator, and generating (S4) a signed selection message comprising: an identifier of the current round (j), said received candidate block (B j,Nk ) and said generated random value (RAND) by said cryptoprocessor, - broadcasting (S5) said signed selection messages to the nodes of said network, enabling them to select the new block (Bj) to be appended to the ledger for the current round based on said random values comprised in said signed selection messages.

Classes IPC  ?

  • G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

47.

METHOD FOR AUTHENTICATING A USER AND CORRESPONDING USER DEVICE, SERVER AND SYSTEM

      
Numéro d'application EP2018068410
Numéro de publication 2019/016000
Statut Délivré - en vigueur
Date de dépôt 2018-07-06
Date de publication 2019-01-24
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Suwirya, Darmawan
  • Ali, Asad Mahboob

Abrégé

The invention relates to a method for authenticating a user. A server registers at least one user identifier associated with at least one identifier relating to at least one reference short range communication device to be detected in a vicinity of at least one user device. The method comprises the following steps:connecting to the server from a user device, loading from the server to the user device data including executable data, detecting by the user device, while executing the executable data, whether at least one identifier relating to at least one short range communication device does or does not exist in a vicinity of the user device, sending from the user device to the server at least one user identifier accompanied with the at least one detected short range communication device identifier only if the at least one identifier relating to at least one detected short range communication device exists in the vicinity of the user device, verifying by the server for the identified user whether the at least one detected short range communication device identifier or no detected short range communication device identifier does or does not match at least a predetermined part of the at least one reference short range communication device identifier. The method further comprises: granting access from the server only if the at least one detected short range communication device identifier matches the at least predetermined part of the at least one reference short range communication device identifier, or denying access while requesting user authentication data by sending from the server to the user device a corresponding message only if the at least one detected short range communication device identifier or no detected short range communication device identifier does not match the at least predetermined part of the at least one reference short range communication device identifier. The invention also relates to corresponding user device, server and system.

Classes IPC  ?

  • H04W 12/06 - Authentification
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 8/00 - Gestion de données relatives au réseau
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • H04W 48/02 - Restriction d'accès effectuée dans des conditions spécifiques
  • G06F 21/30 - Authentification, c. à d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison

48.

A METHOD FOR GRANTING ACCESS TO A SERVICE PROVIDED BY A CONNECTED DEVICE

      
Numéro d'application EP2018067650
Numéro de publication 2019/007849
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de publication 2019-01-10
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Schmitt, Sébastien
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frederic

Abrégé

The invention relates to a method for granting access to a service provided by a connected device (202) for a user having a user's device (201) and requesting said access, the method comprising the steps of: receiving (211) by the user's device (201) from the connected device (202) a request to validate a user profile, a user profile corresponding to a list of at least one data item representing the user's capabilities to use a service provided by the given connected device; requesting by the user's device (201) to a verification server (203) associated to the at least one data item to validate said data item, and receiving (213) a digital signature of said data item generated by the verification server (203) as a proof of the validation; transmitting (214) the data item of the user profile and its digital signature to a device (200) belonging to the owner of the connected device (202) for it to be informed that said data item is validated, the user profile being considered as validated when the digital signatures of all the data items listed in the user profile are correctly verified by the owner's device; granting (230, 231) for the user access to the service provided by the connected device (202) when the user profile is validated.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • G07F 7/00 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement
  • G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
  • B60R 25/00 - VÉHICULES, ÉQUIPEMENTS OU PARTIES DE VÉHICULES, NON PRÉVUS AILLEURS Équipements ou systèmes pour interdire ou signaler l’usage non autorisé ou le vol de véhicules

49.

ELECTRONIC DEVICE WITH BIOMETRIC FINGERPRINT SENSOR FOR ASSISTANCE IN THE CAPTURE OR READING OF A DIGITAL FINGERPRINT

      
Numéro d'application EP2018067662
Numéro de publication 2019/007853
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de publication 2019-01-10
Propriétaire GEMALTO SA (France)
Inventeur(s) Martinez, Frédéric

Abrégé

The invention relates to an electronic monitoring device comprising a card body (2) or accessory to be carried, a fingerprint sensor (5) opening out at the surface (3) of the body, a first mark on the body for assisting in an initial positioning (24) of a finger (6s, 6g) of a user at a first predetermined location, in order to capture said digital fingerprint information. The device is characterized in that it is configured to present at least one second visible and/or tactile positioning mark (21-23) near the fingerprint sensor, said second mark forming a guide for (or leading to) a second positioning of the finger at a second location distinct from the first predetermined location. The invention also relates to a method and system for assistance in the capture or reading of a digital fingerprint using the electronic device.

Classes IPC  ?

  • G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
  • G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques

50.

METHOD FOR SECURING A CRYPTOGRAPHIC PROCESS WITH SBOX AGAINST HIGH-ORDER SIDE-CHANNEL ATTACKS

      
Numéro d'application EP2018067421
Numéro de publication 2019/002470
Statut Délivré - en vigueur
Date de dépôt 2018-06-28
Date de publication 2019-01-03
Propriétaire GEMALTO SA (France)
Inventeur(s) Vigilant, David

Abrégé

010110212011,11,1111,121,11,i1,i-11,i-11,i-11,i1,i-11,i00 in at least said first round of the cryptographic process.

Classes IPC  ?

  • G06F 7/76 - Dispositions pour le réagencement, la permutation ou la sélection de données selon des règles prédéterminées, indépendamment du contenu des données
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
  • G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p.ex. pour empêcher l'ingénierie inverse

51.

DATA CARRIER WITH TACTILE PRINTED AREA FOR INK WRITING DATA

      
Numéro d'application EP2018067644
Numéro de publication 2019/002577
Statut Délivré - en vigueur
Date de dépôt 2018-06-29
Date de publication 2019-01-03
Propriétaire GEMALTO SA (France)
Inventeur(s) Kaskiala, Toni

Abrégé

The present invention relates generally to a data carrier comprising a data sheet. Said data sheet comprises a substrate material wherein at least one printed area is printed. Said printed area is configured for ink written signature. Said printed area is produced by imprinting via intaglio printing and comprises tactile perceptibility structured embossed pattern produced by the imprinting. Said tactile structured embossed pattern is configured to hold the ink of the ink written. The present invention prevents unwanted smudging or spreading when writing on the printed area. Moreover, the present invention addresses also the forgery and manipulation drawbacks on ink written data on data carrier.

Classes IPC  ?

  • B42D 25/425 - Marquage par déformation, p.ex. gaufrage

52.

COMPUTING DEVICE PROCESSING EXPANDED DATA

      
Numéro d'application EP2018066487
Numéro de publication 2018/234415
Statut Délivré - en vigueur
Date de dépôt 2018-06-20
Date de publication 2018-12-27
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Madec, Steven
  • Vigilant, David

Abrégé

The present invention relates to a computing device (101) for executing a first cryptographic operation of a cryptographic process on useful input data (d1), said computing device comprising a first processor (2011), a second processor (2012) and a selection circuit (207) wherein : - said selection circuit (207) is configured : - for receiving, from an input bus (208), expanded input data (d1') obtained by interleaving dummy input data (r1) with said useful input data (d1), - for determining positions of the dummy input data (r1) in said expanded input data (d1'), - and for extracting said dummy input data (r1) and said useful input data (d1) from the expanded input data (d1') based on said determined positions, - said first processor (2011) is configured for executing said first cryptographic operation of said cryptographic process on said extracted useful input data (d1) to obtain useful output data (d2), - said second processor (2012) is configured for executing a second operation on said extracted dummy input data (r1) to obtain dummy output data (r2), said computing device being configured for having said operations executed such that leakage generated by said first cryptographic operation is jammed by leakage generated by the second operation.

Classes IPC  ?

  • G09C 1/00 - Appareils ou méthodes au moyen desquels une suite donnée de signes, p.ex. un texte intelligible, est transformée en une suite de signes inintelligibles en transposant les signes ou groupes de signes ou en les remplaçant par d'autres suivant un systèm
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

53.

METHOD FOR MUTUAL SYMMETRIC AUTHENTICATION BETWEEN A FIRST APPLICATION AND A SECOND APPLICATION

      
Numéro d'application EP2018058641
Numéro de publication 2018/228732
Statut Délivré - en vigueur
Date de dépôt 2018-04-04
Date de publication 2018-12-20
Propriétaire
  • GEMALTO SA (France)
  • SAFENET CANADA INC. (Canada)
Inventeur(s)
  • Huapaya, Luis Miguel
  • Praden, Anne Marie

Abrégé

A first server exchanges with a second server a master (symmetric) key(s). The first server sends to the first application the master key(s). The second server generates dynamically a first derived key by using a generation parameter(s) and a first master key. The second server sends to the second application the first derived key and the generation parameter(s). The second application generates and sends to the first application a first (key possession) proof and the generation parameter(s). The first application verifies successfully by using the generation parameter(s), the first master key and the first proof, that the first proof has been generated by using the first derived key, generates and sends to the second application a second (key possession) proof. The second application verifies successfully that the second proof has been generated by using the first derived key, as a dynamically generated and proven shared key.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

54.

METHOD FOR MANAGING A LINK BETWEEN TWO USERS

      
Numéro d'application EP2018063292
Numéro de publication 2018/228781
Statut Délivré - en vigueur
Date de dépôt 2018-05-22
Date de publication 2018-12-20
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Alicki, Artur
  • Ohanian, Henri
  • Martin, Pierre
  • Sieprawski, Nicolas

Abrégé

Method for managing a link between two users The invention is a method for managing a link between first and second users (UA, UB). The first user owns a first private reference(PA) and has a first terminal (TA). The second user owns a second private reference(PB) and has a second terminal(TB). The first terminal shares with the second terminal a first identifier (H[0,1]). The second terminal shares with the first terminal a second identifier (H[0,2]). Both terminals separately compute from said first and second identifiers a common agreement token (HRoot[1,0]) which reflects thelink. The first terminal provides a first set comprising theagreement token (HRoot[1,0]), the first identifier (H[0,1]) and the first private reference to a trusted entity (TE) which records said first set. Similarly, the second terminal provides a second set comprising theagreement token (HRoot[1,0]), the second identifier (H[0,2]) and the second private reference(PB) to the trusted entity which records thesecond set.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

55.

METHOD FOR MANAGING AN INSTANCE OF A CLASS

      
Numéro d'application EP2018062414
Numéro de publication 2018/228763
Statut Délivré - en vigueur
Date de dépôt 2018-05-14
Date de publication 2018-12-20
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Phan, Guillaume Chi-Dan
  • Minette De Saint Martin, Xavier
  • Vienne, Nicolas

Abrégé

The invention is a method for managing an instance (15) of a class in a secure element (10) embedded in a hosting machine (20) and including a Central Processing Unit (12), a storage area (13) and a virtual machine (141). The method comprises a step of receiving by the secure element aload file (30) containing a binary representation of a package of the class and a step of instantiating the instance from the package and storing the instance in the storage area. The load file includes a specific component (40) which is a custom component withinthe meaning of Java Card™ specifications and which contains executable data (41). The instance requests the execution of a subset of said executable data by directly invoking said subset of executable data through an Application Programming Interface.

Classes IPC  ?

  • G06F 21/77 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les cartes à puce intelligentes

56.

METHOD OF CONTROLLING COMPLIANCE BETWEEN A PAYMENT KEY AND A CARDHOLDER VERIFICATION METHOD

      
Numéro d'application EP2018062613
Numéro de publication 2018/228767
Statut Délivré - en vigueur
Date de dépôt 2018-05-15
Date de publication 2018-12-20
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Bellet, François
  • Bourachot, Pascal
  • Affouard, Baptiste

Abrégé

The invention is a method for controlling that a payment key(41) used in a payment transaction is compliant with a cardholder verification method (71). The method comprises the steps of: -receiving at a server (30) transaction data (80) reflecting the payment transaction, said transaction data including an amount (81), a cryptogram (82) computed using said payment key and a seed (51)used to derive said payment key, -identifying a key index (61) from a risk parameter extracted fromsaid transaction data or specific to previous payment transactions, said key index reflecting said cardholder verification method, and -checking that said key index and said seed are linked bya predefined mathematical function.

Classes IPC  ?

  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
  • G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails

57.

METHOD FOR CONTROLLING PHYSICAL ACCESS TO A RESTRICTED SPACE

      
Numéro d'application EP2018062975
Numéro de publication 2018/224287
Statut Délivré - en vigueur
Date de dépôt 2018-05-17
Date de publication 2018-12-13
Propriétaire IGEMALTO SA (France)
Inventeur(s)
  • Martinez, Frédéric
  • Caruana, Jean-Paul

Abrégé

The invention is a method for controlling physical access to a restricted space. A gateless control area is located at an entrance of the restricted space and is equipped with both an image sensor (40) and an Ultra- Wideband reader (30). The method comprises the steps of: -selecting a user (80) from a crowd (60) located in the gateless control area and capturing both a digital picture and coordinates of the user, -extracting from the digital picturea measured biometric pattern, -securely reading a secure data memorized in a wearable identity device (50) whose distance with said coordinates is less than a predetermined thresholdand getting a reference biometric pattern(52) using said secure data, -checking that said measured biometric pattern matches said reference biometric pattern, the user being identified as authorized only in case of successful checking.

Classes IPC  ?

  • G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
  • G08B 13/00 - Alarmes contre les cambrioleurs, les voleurs ou tous intrus

58.

METHOD FOR AUTHENTICATING A FIRST USER AND CORRESPONDING FIRST DEVICE AND SYSTEM

      
Numéro d'application EP2018064606
Numéro de publication 2018/224433
Statut Délivré - en vigueur
Date de dépôt 2018-06-04
Date de publication 2018-12-13
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Le Cardinal, Daniel
  • Pin, Yannick
  • Aillaud, Christophe

Abrégé

The invention relates to a method (20) for authenticating a first user. A device (12) accesses a sequence (20) of at least one reference graphical item, as a reference graphical item sequence. The reference graphical item sequence is known only to the first user. The method comprises the following steps. The (or another cooperating) device requests a user to point consecutively at at least one area in which at least one graphical item is included. The (or another cooperating) device (presents (410) a sequence of at least one graphical item. The (or another cooperating) device captures (414) a sequence of at least one area pointed by the userby detecting at least one predetermined change relating to at least one physical user feature to validate each or at least one user pointed area. The (or another cooperating) device verifies (418) whether the sequence of the at least one user pointed area does or does not include the reference graphical item sequence. And the (or another cooperating) device authenticates (420) the first user only if the sequence of the at least one user pointed area includes the reference graphical item sequence. The invention also relates to corresponding device and system.

Classes IPC  ?

  • G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
  • H04W 12/06 - Authentification
  • G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes

59.

A METHOD FOR PERSONALIZING A SECURE ELEMENT, CORRESPONDING APPLICATION AND SECURE ELEMENT

      
Numéro d'application EP2018064638
Numéro de publication 2018/224445
Statut Délivré - en vigueur
Date de dépôt 2018-06-04
Date de publication 2018-12-13
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • El Marouani, Abdellah
  • Le Saux, Nicolas
  • Rade, Daniel

Abrégé

The invention concerns a secure element comprising: - pre-issuance data installed in said secure element in a first physical personalization site; - an application triggered at each reset of said secure element before all data allowing said secure element to be operational are installed in said secure element, said application constituting a firewall for the installation on said secure element of post-issuance data through a secure channel in a second physical personalization site.

Classes IPC  ?

60.

A METHOD FOR PROVISIONING A DEVICE WITH AN INFORMATION ELEMENT ALLOWING TO IDENTIFY UNAUTHORIZED USERS IN A RESTRICTED AREA

      
Numéro d'application EP2018064971
Numéro de publication 2018/224579
Statut Délivré - en vigueur
Date de dépôt 2018-06-07
Date de publication 2018-12-13
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Caruana, Jean-Paul
  • Leroy, Pascal
  • Martinez, Frédéric

Abrégé

This invention relates to a method for provisioning a wireless control device (115) with an information element allowing to identify visually at least one unauthorized user in a restricted area, the restricted area comprising a gateless control area being equipped with at least an image sensor (112) and an electronic reader (113) supporting a short range radio technology allowing to read data memorized into a wearable device (111) carried by a user (110). The method comprises the steps of: providing (120, 121) by the image sensor a digital image of at least one user that is detected as passing through the gateless control area; extracting from the provided digital image of the detected user a first face detection dataset; providing (122, 123) by the electronic reader a second face detection dataset memorized in a wearable device carried by said detected user; applying (130) facial recognition over the first and second face detection datasets in order to determine if the user associated to the first face detection dataset is the same as the one associated to the second face detection dataset, the detected user being identified as authorized in that case and identified as unauthorized otherwise; sending (126) to a wireless control device a message comprising an information item adapted to ease the visual identification of an unauthorized user.

Classes IPC  ?

  • G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
  • H04W 12/08 - Sécurité d'accès

61.

METHOD FOR MANAGING EXECUTION OF AN OPERATING SYSTEM IN A DEVICE

      
Numéro d'application EP2018058640
Numéro de publication 2018/197171
Statut Délivré - en vigueur
Date de dépôt 2018-04-04
Date de publication 2018-11-01
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Guichard, Olivier
  • Fabre, Thierry
  • Chene, Gilles

Abrégé

The invention is a method for managing execution of a normal operating system (30) in a device (10) comprising a hardware platform (20) and a bare metal hypervisor (32) controlling all requests for access to the hardware platform. The hypervisor handles two separate environments: a normal execution environment, NEE, and a secure execution environment, SEE. The NEE comprises a normal operating system and the SEE comprises a secure operating system (50). The SEE comprises a DRM agent (40) run by the secure operating system. The hypervisor schedules execution of normal and secure operating systems in parallel. The DRM agent assesses a validity of a right to use the device by checking a parameter and sends a message reflecting said validity to the hypervisor. The hypervisor denies execution of the normal operating system if the right to use the device is invalid.

Classes IPC  ?

  • G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
  • G06F 21/44 - Authentification de programme ou de dispositif

62.

A METHOD FOR MANAGING THE REPUTATION LEVEL OF A COMMUNICATION DEVICE

      
Numéro d'application EP2018059266
Numéro de publication 2018/192818
Statut Délivré - en vigueur
Date de dépôt 2018-04-11
Date de publication 2018-10-25
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Ferreira, Marcio
  • Schmitt, Sébastien
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frédéric
  • Boutie, Cédric
  • Huguenin, David

Abrégé

The invention relates to a method for managing the reputation level of a first communication device (100), said reputation level (103) being stored into a first secure enclave (102) embedded in said first communication device (100). The method comprises the steps of: receiving from the first communication device (100) by a second communication device (110) an information message; verifying that the information message is consistent with data obtained from a sensor embedded in the second communication device (110); generating a feedback message by the second communication device (110) to be transmitted to the first communication device (100) indicating if the information message is consistent for the secure enclave (102) of the first communication device (100) to update its reputation level.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/10 - Intégrité
  • H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans fil; Leurs installations
  • H04W 12/12 - Détection ou prévention de fraudes

63.

ENCRYPTED MEMORY CARD

      
Numéro d'application EP2018056994
Numéro de publication 2018/188911
Statut Délivré - en vigueur
Date de dépôt 2018-03-20
Date de publication 2018-10-18
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Lacouture, Dominique
  • Lambert, Patrick
  • Rocha Furtado, Daniel

Abrégé

The present invention relates to a memory card comprising a memory, a processor, an interface and a positioning system, said memory card being configured for being inserted in a user apparatus, for storing a first encryption key generated depending on intended geo-parameter values and for, - when a command for writing first data in said memory is received from said user apparatus on the interface, encrypting said first data with said first encryption key by the processor and storing said encrypted first data in said memory, - when a user command for reading said first data stored in said memory is received from said user apparatus on the interface, ○ obtaining current geo-parameter values from said positioning system, ○ generating by said processor from the obtained current geo-parameter values a second encryption key and an associated decryption key, ○ verifying if said first and second encryption keys match and when the keys match, decrypting said encrypted first data stored in said memory by the processor with said decryption key and outputting said decrypted encrypted first data to said user apparatus (2) on said interface.

Classes IPC  ?

  • G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données

64.

METHOD FOR RENEWING A CERTIFICATE IN A SECURE ELEMENT

      
Numéro d'application EP2018057124
Numéro de publication 2018/184841
Statut Délivré - en vigueur
Date de dépôt 2018-03-21
Date de publication 2018-10-11
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Dubois, Denis
  • Duprez, Jérôme
  • Dao, Frédéric

Abrégé

The invention proposes a secure element (10) cooperating with a telecommunication terminal, the secure element (10) being provisioned with: - A secret key of a proxy server (31); - A secret key shared with a certificate delivery server (30) of the manufacturer of the secure element (10); - A first certificate of the manufacturer of the secure element (10); the secure element (10) comprising a certificate renewal application (51) for: - Generating (35), at an triggering event (34): e- a new key pair composed by a new private key and a new public key; f- a Certificate Signing Request ciphered by the secret key shared with the delivery server (30) of the manufacturer of the secure element (10), and for sending the ciphered Certificate Signing Request also ciphered by the secret key of the proxy server (31) to the certificate delivery server (30) through the proxy server (31); the certificate renewal application (51) receiving from the certificate delivery server (30) through the proxy server (31) a second certificate generated by the certificate delivery server (30).

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

65.

PERMUTATION GENERATION

      
Numéro d'application EP2018056997
Numéro de publication 2018/172342
Statut Délivré - en vigueur
Date de dépôt 2018-03-20
Date de publication 2018-09-27
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Adjedj, Michael
  • Minette De Saint Martin, Xavier
  • Vienne, Nicolas

Abrégé

The present invention relates to a permutation generator circuit comprising: - a first memory storing an input vector of N input numbers, N being a first integer value, and a second integer value STEP coprime with a third integer value M; - a first processor and an output circuit configured to output input numbers one by one, and wherein: - said first processor is configured to select at least one of the input numbers located at the input vector indexes START + i * STEP modulo M, with i an integer in {0, 1,..., K-1}, START a first random integer value between 0 and N-1 and K a fourth integer value, - and said permutation generator circuit is configured to iteratively, until each input number has been output once: - either make the output circuit output the input number located at a current input vector index START + i * STEP modulo M, with i>=K, - or make the output circuit output one of the selected input numbers, and select the input number located at the current input vector index as selected input number for the next iterations, - and when the number of outputted input numbers is equal to (N – K), make the output circuit output one by one all selected input numbers.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • G06F 7/58 - Générateurs de nombres aléatoires ou pseudo-aléatoires

66.

METHOD OF RSA SIGNATURE OR DECRYPTION PROTECTED USING ASSYMETRIC MULTIPLICATIVE SPLITTING

      
Numéro d'application EP2018056993
Numéro de publication 2018/172339
Statut Délivré - en vigueur
Date de dépôt 2018-03-20
Date de publication 2018-09-27
Propriétaire GEMALTO SA (France)
Inventeur(s) Gouget, Aline

Abrégé

The present invention relates to a method of secure generation of an RSA signature of a message to be signed with a private exponent component d of an RSA key (p, q, N, d, e), where e is a public exponent component, N is a RSA modulus, p and q are primes such that N = p.q and e.d = 1 modulo φ(Ν) with φ(.) Euler's function, wherein said private exponent component of the RSA key is split into at least a first private exponent component share and a second private exponent component share such that : - the product of said private exponent component shares is equal to said private exponent component d modulo φ(N) and, - one private exponent component share among said private exponent component shares, called server private exponent component share, is superior or equal to φ(N) and, - other private exponent component shares among said private exponent component shares, called client private exponent component shares, are inferior to φ(Ν), the smaller private exponent component share among the first and second private exponent component shares being a client private exponent component share called primal client private exponent component share and the bigger private exponent component share being the server private exponent component share said method comprising the following steps performed by a standalone client device comprising a memory, an interface and a processor: - obtaining a hashed message, said hashed message being computed by hashing said message with a public hash function H :{0,1}*-> Z*N; - generating a first part of the RSA signature from said hashed message and said first private exponent component share, - generating a second part of the RSA signature from said first part of the RSA signature and said second private exponent component share, - determining the RSA signature from said second part of the RSA signature, and wherein the step of generation of a part of the RSA signature from the primal client private exponent component share is performed using a whitebox protection method and the step of generation of a part of the RSA signature from the server private exponent component share is performed using lower security requirements.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/08 - Répartition de clés
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité

67.

METHOD FOR OPTIMIZING A COLOUR LASER IMAGE AND DOCUMENT ON WHICH A COLOUR LASER IMAGE IS PRODUCED IN THIS WAY

      
Numéro d'application EP2018055358
Numéro de publication 2018/166832
Statut Délivré - en vigueur
Date de dépôt 2018-03-05
Date de publication 2018-09-20
Propriétaire GEMALTO SA (France)
Inventeur(s) Lesur, Jean-Luc

Abrégé

The present invention generally relates to a method of forming a color laser image with a white or light color background, and a document having a final color laser personalized image made thereon in this way. The invention provides an assembly comprising a transparent protection layer over color subpixels printed on a laser markable layer. A first laser beam passes through the protection layer, through the subpixels and forms the gray levels of the final personalized image in the laser markable layer. A second laser with a single wavelength, preferably with a high-energy wavelength in the blue or ultraviolet spectrum, penetrates into the subpixels forming the light color of the background image and is absorbed by the color pigments which lose their absorption property, at least partially resulting in light color image representing the background of the final personalized image.

Classes IPC  ?

  • B41M 5/26 - Thermographie
  • B41M 5/28 - Thermographie utilisant des composés thermochromes ou des couches contenant des cristaux liquides, des microcapsules, des colorants blanchissables ou des composés thermodégradables, p.ex. libérant un gaz

68.

METHOD FOR AUTHENTICATING A USER AND CORRESPONDING DEVICE, FIRST AND SECOND SERVERS AND SYSTEM

      
Numéro d'application EP2018056739
Numéro de publication 2018/167298
Statut Délivré - en vigueur
Date de dépôt 2018-03-16
Date de publication 2018-09-20
Propriétaire GEMALTO SA (France)
Inventeur(s) Hugot, Didier

Abrégé

A first server 162 receives from a device(s) an identifier (22), retrieves (24) a reference credential(s) associated with the identifier(s), generates (28) a reference token(s) using the reference credential(s) and a predetermined key(s) and sends to a second server the reference token(s) and a script(s) for requesting the user to provide a credential(s) (210 and 212). The second server gets a device identifier(s) and sends to the device a request(s) (216) by executing (214) the script(s). The device gets (218) a submitted credential(s), generates (222) and sends to the second server a submitted token 224 generated by using the submitted credential(s) and the predetermined key(s) stored by the device. The second server compares (226) each of the submitted token(s) to the received reference token(s) and generates and sends to the first server a comparison and/or an authentication result(s) (236 and 238). The invention also relates to corresponding device, first and second server and system.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

69.

A METHOD FOR OPTIMIZING DATA EXCHANGES BETWEEN A FIRST AND AT LEAST ONE SECOND WIRELESS COMMUNICATION DEVICE

      
Numéro d'application EP2018055832
Numéro de publication 2018/162678
Statut Délivré - en vigueur
Date de dépôt 2018-03-08
Date de publication 2018-09-13
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frederic
  • Schmitt, Sébastien

Abrégé

This invention relates to a method for anticipating the setup of a relation of trust between a first vehicle (100) called central vehicle and at least a second vehicle, wherein two interaction areas (130, 140) are defined relatively to the position of the central vehicle (100), the first interaction area (130) called exchange area comprising the central vehicle (100) and the second interaction area (140) called pre-authentication area being defined in a way that it has to be crossed by said second vehicle for it to enter into the exchange area (130), the method comprising the steps of: detecting if the second vehicle is localized in the pre-authentication area (140) associated with the central vehicle (100); authenticating the central vehicle (100) and the second vehicle if not already authenticated; upon successful authentication, providing the central vehicle (100) and the second vehicle with at least one credential to set up the relation of trust for it to be already established when the second vehicle is present in the exchange area associated with the central vehicle (100).

Classes IPC  ?

  • H04W 12/06 - Authentification
  • H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans fil; Leurs installations

70.

METHOD FOR GENERATING A PRIME NUMBER FOR A CRYPTOGRAPHIC APPLICATION

      
Numéro d'application EP2018053247
Numéro de publication 2018/153684
Statut Délivré - en vigueur
Date de dépôt 2018-02-09
Date de publication 2018-08-30
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Berzati, Alexandre
  • Roussellet, Mylène

Abrégé

The present invention relates to a method for generating a prime number and using it in a cryptographic application, comprising the steps of: a) determining at least one binary base B with a small size b = log2(B) bits and for each determined base B at least one small prime pi such that B mod pi = 1, with i an integer, b) selecting a prime candidate YP, c) decomposing the selected prime candidate YP in a base B selected among said determined binary bases : YP = ∑yjBi d) computing a residue yPB from the candidate YP for said selected base such that yPB = ∑yj e) testing if said computed residue yPB is divisible by one small prime pi selected among said determined small primes for said selected base B, f) while said computed residue yPB is not divisible by said selected small prime, iteratively repeating above step e) until tests performed at step e) prove that said computed residue yPB is not divisible by any of said determined small primes for said selected base B, g) when said computed residue yPB is not divisible by any of said determined small primes for said selected base B, iteratively repeating steps c) to f) for each base B among said determined binary bases, h) when, for all determined bases B, said residue yPB computed for a determined base is not divisible by any of said determined small primes for said determined base B, executing a known rigorous probable primality test on said candidate YP, and when the known rigorous probable primality test is a success, storing said prime candidate YP and using said stored prime candidate YP in said cryptographic application.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • G06F 7/72 - Méthodes ou dispositions pour effectuer des calculs en utilisant une représentation numérique non codée, c. à d. une représentation de nombres sans base; Dispositifs de calcul utilisant une combinaison de représentations de nombres codées et non codées utilisant l'arithmétique des résidus

71.

METHOD FOR GENERATING A PRIME NUMBER FOR A CRYPTOGRAPHIC APPLICATION

      
Numéro de document 03053213
Statut Délivré - en vigueur
Date de dépôt 2018-02-09
Date de disponibilité au public 2018-08-30
Date d'octroi 2022-05-31
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Berzati, Alexandre
  • Roussellet, Mylene

Abrégé

The present invention relates to a method for generating a prime number and using it in a cryptographic application, comprising the steps of: a) determining at least one binary base B with a small size b = log2(B) bits and for each determined base B at least one small prime pi such that B mod pi = 1, with i an integer, b) selecting a prime candidate YP, c) decomposing the selected prime candidate YP in a base B selected among said determined binary bases : YP = ?yjBi d) computing a residue yPB from the candidate YP for said selected base such that yPB = ?yj e) testing if said computed residue yPB is divisible by one small prime pi selected among said determined small primes for said selected base B, f) while said computed residue yPB is not divisible by said selected small prime, iteratively repeating above step e) until tests performed at step e) prove that said computed residue yPB is not divisible by any of said determined small primes for said selected base B, g) when said computed residue yPB is not divisible by any of said determined small primes for said selected base B, iteratively repeating steps c) to f) for each base B among said determined binary bases, h) when, for all determined bases B, said residue yPB computed for a determined base is not divisible by any of said determined small primes for said determined base B, executing a known rigorous probable primality test on said candidate YP, and when the known rigorous probable primality test is a success, storing said prime candidate YP and using said stored prime candidate YP in said cryptographic application.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • G06F 7/72 - Méthodes ou dispositions pour effectuer des calculs en utilisant une représentation numérique non codée, c. à d. une représentation de nombres sans base; Dispositifs de calcul utilisant une combinaison de représentations de nombres codées et non codées utilisant l'arithmétique des résidus

72.

METHOD FOR MANAGING COMMUNICATION BETWEEN A SERVER AND A USER EQUIPMENT

      
Numéro d'application EP2018052605
Numéro de publication 2018/141889
Statut Délivré - en vigueur
Date de dépôt 2018-02-02
Date de publication 2018-08-09
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Rhelimi, Alain
  • Anslot, Michel

Abrégé

The invention is a method for communication between a server (30) and a user equipment (20) through a set of command/response pairs. The the user equipment (20) uses an IMSI field of an Attach Request frame as defined by ETSI TS 124.008 to convey a command to the server (30). The server (30) uses an Authentication parameter RAND field or an Authentication parameter AUTN field of an Authentication Request frame as defined by ETSI TS 124.008 to convey a response corresponding to the received command. The server (30) sends the Authentication Request frame in response to the Attach Request frame.

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité

73.

METHOD FOR ESTABLISHING A BIDIRECTIONAL COMMUNICATION CHANNEL BETWEEN A SERVER AND A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT.

      
Numéro d'application EP2018052629
Numéro de publication 2018/141895
Statut Délivré - en vigueur
Date de dépôt 2018-02-02
Date de publication 2018-08-09
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Anslot, Michel
  • Lamberton, Marc

Abrégé

The invention concerns a method for establishing a bidirectional communication channel between a server and a secure element cooperating with a terminal in a cellular telecommunication network for exchanging data and commands, the method comprising: a- Sending a first attachment request signaling message from the terminal to the server, the first message comprising a MCC and a MNC of the server, and at least a part of a unique identifier of the secure element, the server being provisioned with the unique identifier; b- Sending from the server to the secure element, in at least a first signaling message: - At least a command; - A correlation identifier if further messages have to be sent from the secure element to the server; - A first payload comprising data; c- Executing at the secure element the command.

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné

74.

A METHOD FOR TRANSMITTING AN EXISTING SUBSCRIPTION PROFILE FROM A MOBILE NETWORK OPERATOR TO A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT

      
Numéro d'application EP2018052631
Numéro de publication 2018/141896
Statut Délivré - en vigueur
Date de dépôt 2018-02-02
Date de publication 2018-08-09
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Anslot, Michel
  • Lamberton, Marc

Abrégé

The invention concerns a method for transmitting a subscription profile from a MNO to a secure element cooperating with a terminal (10), the secure element being pre-provisioned with a temporary profile comprising a unique identifier, a first MCC and a first MNC, the method comprising: - Transmitting from a POS (BSS/OSS) of the MNO the unique identifier of the secure element to a SM-DP (403); - Creating or reserving the subscription profile at the SM-DP (403); - Provisioning in a D-HSS server (401) having the first MCC/MNC the unique identifier and a temporary IMSI (t-IMSI) comprising a second MCC, a second MNC; - Provisioning in the HSS (404) of the MNO the temporary IMSI (t-IMSI) and an ephemeral Ki (e-Ki); - At the first attempt of the secure element to connect to the D-HSS server (401) with its temporary profile, exchanging data in signaling messages between the secure element and the D-HSS (401) for provisioning the secure element with the temporary IMSI (t-IMSI); - At the next attempt of the secure element to connect to the MNO network with the temporary IMSI (t-IMSI), open an APN and send from the SM-DP (403) to the secure element the subscription profile.

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité

75.

A METHOD FOR ALLOWING A USER OF A TERMINAL TO CHOOSE AN OPERATOR FOR DOWNLOADING A SUBSCRIPTION PROFILE, CORRESPONDING SERVERS AND SECURE ELEMENT

      
Numéro d'application EP2018052632
Numéro de publication 2018/141897
Statut Délivré - en vigueur
Date de dépôt 2018-02-02
Date de publication 2018-08-09
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Anslot, Michel
  • Lamberton, Marc

Abrégé

The invention concerns a method for allowing a user of a terminal (10) to choose an operator, the terminal (10) comprising a secure element containing an unique identifier and an ephemeral Ki, the method comprising: a- establishing a bidirectional communication channel between a server (131) and the secure element (11) for exchanging data and commands by: a1- Sending a first attachment request signaling message from the secure element to the server (131), the first attachment request signaling message comprising a MCC and a MNC of the server (131), and at least a part of a unique identifier of the secure element, the server (131) being provisioned with the unique identifier; a2- Sending from the server (131) to the secure element, in at least a first signaling message: - At least a command requesting the secure element to send the remaining part of its unique identifier if necessary; - A correlation identifier if further messages have to be sent from the secure element to the server (131); - A first payload comprising data; a3- Executing at the secure element the command; b- repeating steps -a1- to -a3- until the server (131) has received the unique identifier; c- Sending from the server (131) to the secure element in a signaling message a command prompting the user to select an operator; d- Sending from the secure element to the server (131) an identifier identifying the operator chosen by the user in another signaling message; e- Allocating by the server (131) a temporary IMSI (t-IMSI) from the selected operator to the secure element; f- Sending the temporary IMSI to the secure element with a command to replace its current IMSI by the temporary IMSI (t-IMSI) and provisioning the temporary IMSI (t-IMSI) and the ephemeral Ki (e-Ki) in another server (133) able to order a subscription profile to be downloaded to the secure element (11) from a provisioning server (134).

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité

76.

A METHOD FOR AN EUICC EMBEDDED INTO A MACHINE TYPE COMMUNICATION DEVICE TO TRIGGER THE DOWNLOAD OF A SUBSCRIPTION PROFILE

      
Numéro d'application EP2018052045
Numéro de publication 2018/141665
Statut Délivré - en vigueur
Date de dépôt 2018-01-29
Date de publication 2018-08-09
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Anslot, Michel
  • Lamberton, Marc
  • Berard, Xavier
  • Rhelimi, Alain

Abrégé

The invention related to a method for an eUICC embedded into a machine type communication device (300) to trigger the download of a subscription profile from a first network operator (MNO1), the eUICC being provisioned with an eUICC identifier (EID) and a pre-loaded data set memorizing a range of International Mobile Subscription Identifiers (IMSI) associated to a second network operator (MNO2), the method comprising the steps of: selecting randomly by the eUICC an IMSI number in the range memorized in the pre- loaded data set; sending an attachment request (310) comprising the randomly selected IMSI (R-IMSI); receiving in an authentication request message (313) the request for getting the eUICC identifier (EID); as a response, sending to the discovery server (302) a authentication failure message (314); receiving in an authentication request message (317) a temporary IMSI (t-IMSI) from the discovery server (302) so that the machine type communication device is able to attach to the first network operator (MNO1) and download the pending subscription profile.

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné

77.

METHOD TO SECURE A SOFTWARE CODE

      
Numéro d'application EP2018051866
Numéro de publication 2018/138212
Statut Délivré - en vigueur
Date de dépôt 2018-01-25
Date de publication 2018-08-02
Propriétaire
  • GEMALTO SA (France)
  • SFNT GERMANY GMBH (Allemagne)
Inventeur(s)
  • Garreau, Eric
  • Volpe, Sébastien
  • Garba, Peter

Abrégé

The present invention relates to a method of securing a compiled software code (SC) comprising computer code instructions organized in a plurality of basic blocks, said method generating a secure software code (SSC) and comprising the steps of : • determining (S1) by a processor a portion of the software code to be protected, • inserting (S2) by the processor in a selected basic block of the software code a first sequence of instructions which when executed at runtime: computes an integrity check value on said portion of the software code to be protected and computes an index value based on said computed integrity check value, • inserting (S3) by the processor in the selected basic block of the software code an indexed array of memory addresses in which the address, when executing the secure software code, of a following basic block to be executed after the selected basic block is indexed by said index value, • inserting (S4) by the processor at the end of the selected basic block of the software code a jump instruction to the address indexed in the array by said index value computed at runtime.

Classes IPC  ?

  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p.ex. par masquage

78.

METHOD TO SECURE A SOFTWARE CODE

      
Numéro d'application EP2018051865
Numéro de publication 2018/138211
Statut Délivré - en vigueur
Date de dépôt 2018-01-25
Date de publication 2018-08-02
Propriétaire
  • GEMALTO SA (France)
  • SFNT GERMANY GMBH (Allemagne)
Inventeur(s)
  • Garreau, Eric
  • Volpe, Sébastien
  • Garba, Peter

Abrégé

The present invention relates to method of securing a software code comprising at least one constant value, said method generating a secure software code and comprising the steps of: − determining (S1) by a processor in the software code a constant value to be protected, − inserting (S2) by the processor in the software code an indexed array of values such that the constant value to be protected can be determined from one value of the array, − replacing (S3) by the processor in the software code the constant value to be protected by a replacement variable, − inserting (S4) by the processor in the software code a first sequence of instructions which, when executed at runtime: • computes the index in the array of the value from which the constant value to be protected can be determined, • extracts from said array the value located at said computed index in said array, • from said extracted value, determines the constant value to be protected, • sets the value of said replacement variable equal to the determined constant value.

Classes IPC  ?

  • G06F 21/12 - Protection des logiciels exécutables
  • G06F 21/14 - Protection des logiciels exécutables contre l’analyse de logiciel ou l'ingénierie inverse, p.ex. par masquage

79.

METHOD FOR SECURE MANAGEMENT OF SECRETS IN A HIERARCHICAL MULTI-TENANT ENVIRONMENT

      
Numéro d'application EP2017082779
Numéro de publication 2018/114574
Statut Délivré - en vigueur
Date de dépôt 2017-12-14
Date de publication 2018-06-28
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Lacouture, Dominique
  • Lambert, Patrick
  • Rocha Furtado, Daniel

Abrégé

The present invention relates to a method of securely using a first tenant secret key stored under an encrypted form in a first token (TKA) of a first tenant (A) identified by a first tenant identifier (UIDA) and having said first tenant secret key, wherein : each tenant identifier (UIDT) for a tenant (T) comprises a first value and, when said tenant (T) is allowed to use a secret key of a parent tenant (Tp) identified by a parent tenant identifier (UIDTP), said parent tenant identifier, appended before said first value, and said first token (TKA) has been generated from said first tenant identifier (UIDA) and a first tenant secret key encrypted with said first tenant identifier (UIDA) and with a first tenant customer master key (CMKA), said first tenant customer master key (CMKA) having been derived from said first tenant identifier (UIDA) and a secure domain master key (SDMK), said method comprising the following steps performed by a secure device storing said secure domain master key (SDMK), on request of a second tenant (B) identified by a second tenant identifier (UIDB) : - getting a first tenant identifier (UIDA) of said first tenant (A) from said first token (TKA), - checking if the first tenant identifier (UIDA) is a prefix of or is equal to said second tenant identifier (UIDB), - when said first tenant identifier (UIDA) is a prefix of or is equal to said second tenant identifier (UIDB), recovering said first tenant secret key stored in said first token (TKA) and using it for the second tenant (B).

Classes IPC  ?

80.

METHOD AND SYSTEM FOR PERFORMING SECURE TRANSACTIONS ESPECIALLY IN THE INTERNET OF THINGS

      
Numéro d'application EP2017081063
Numéro de publication 2018/108558
Statut Délivré - en vigueur
Date de dépôt 2017-11-30
Date de publication 2018-06-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Delsuc, Julien
  • Cogniaux, Geoffroy

Abrégé

The invention relates to a method for securing electronic transactions between communicating devices (5-7) and merchant Web sites (SM) through a communication gateway (2) and/or server (200); the method is characterized in that it comprises the following steps consisting in: -equipping said gateway (2) and/or server (200) with at least one secure element (SE), said element (SE) comprising in memory (17) a transaction and/or identification information item to perform a transaction and/or an identification on the Web sites and/or all or part of a control program to govern/control said electronic transactions, -and then in carrying out said transactions (4) automatically by using all or part of the control program (11, 13) and/or said payment information item (9, 10) and/or identification information item. The invention also relates to the system corresponding to the method.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
  • H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]

81.

METHOD FOR GENERATING A CRYPTOGRAM IN A USER DEVICE AND VERIFYING THIS CRYPTOGRAM IN A PAYMENT SERVER, CORRESPONDING USER DEVICE AND PAYMENT SERVER

      
Numéro d'application EP2017082031
Numéro de publication 2018/108737
Statut Délivré - en vigueur
Date de dépôt 2017-12-08
Date de publication 2018-06-21
Propriétaire GEMALTO SA (France)
Inventeur(s) Martin, Alain

Abrégé

The invention concerns a method for generating a cryptogram in a user device (32) and verifying the cryptogram in a payment server (33), the cryptogram being in the form of a dynamic Card Verification Value (dCW) generated in the user device (32) by a generation algorithm from an authentication key and a diversification value, the diversification value having been synchronized previously between the user device (32) and the payment server (33) through a telecommunication network distinct from a payment network, so that the user device (32) and the payment server (33) store in their respective memories the same diversification value, the method comprising: a- Displaying the dCW generated in the user device(16) on the screen of the user device (32); b- Copying the dCW, together with payment credentials into a payment form of a merchant server (38); c- Sending from the merchant server (38) through the payment network an authorisation request to the payment server (33), the authorisation request comprising the payment credentials and the dCW; d- Verifying at the payment server (33), by a verification algorithm, that the received dynamic CW (dCW) corresponds to a dynamic CW generated from the diversification value stored in its memory, and: - if the verification is positive, sending a positive authorization message to a bank server (39); - if the verification is negative, sending a negative authorization message to the bank server (39).

Classes IPC  ?

  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives

82.

METHOD FOR SYNCHRONIZED SIGNATURE WITH ADDITIVE RSA KEY SPLITTING USING A SLIDING WINDOW

      
Numéro d'application EP2017082421
Numéro de publication 2018/108907
Statut Délivré - en vigueur
Date de dépôt 2017-12-12
Date de publication 2018-06-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Atmopawiro, Alsasian
  • Dang, Thi Tra Giang

Abrégé

The present invention relates to a method of secure generation by a client device and a server device of an RSA signature of a message to be signed with a private exponent component d of an RSA key (p, q, N, d, e), wherein said client device stores a client device private exponent component dA, a client value, and a client dynamic offset, and said server device stores a server device private exponent component dB, where dB = d - dA modulo phi(N), a server value, a server dynamic offset and a failure counter, comprising: a. receiving from the client device a client part of said RSA signature (HS1 ) of said message to be signed, after incrementing its client value (pvA) by a first predetermined step E, from the client device private exponent component and from an updated client dynamic offset function of said client dynamic offset and of said client value, b. setting said failure counter to a first default value, c. incrementing said server value (pvB) by a second predetermined step (Ε'), d. generating a server part of said RSA signature (HS2) of said message to be signed, from the server device private exponent component and from an updated server dynamic offset function of said server dynamic offset and of said server value, e. generating said RSA signature by combining said client part of said RSA signature (HS1 ) and said server part of said RSA signature (HS2), f. checking if the generation of the RSA signature was a failure and when it was a failure, incrementing said failure counter and g\ iteratively repeating above steps c\ to f\, until said RSA signature is successfully generated or said failure counter reaches a first predetermined threshold S.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/12 - Dispositifs de chiffrement d'émission et de réception synchronisés ou initialisés d'une manière particulière

83.

USE OF PERSONAL DEVICE FOR CONVENIENT AND SECURE AUTHENTICATION

      
Numéro d'application EP2017079719
Numéro de publication 2018/108456
Statut Délivré - en vigueur
Date de dépôt 2017-11-20
Date de publication 2018-06-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Hutchinson, Michael
  • Lu, Hongqian Karen

Abrégé

The present invention relates to a method to authenticate a user (US) using an authenticator (PIN) at an access device (AD) using another registered device named personal device (PD), said authenticator (PIN) being stored by the access device (AD) after registration (steps Si) of the personal device (PD) comprising a double encryption using an access device's secret key (SK(AD)) and a personal device's public key (PK(PD)) to be retrieved (T10) at each request of authentication (T4) received from the personal device (PD), encrypted (T12) using a session key (Ks) and sent (T14) with the session key (Ks) encrypted (T13) using the personal device's public key (PK(PD)) to the personal device (PD) for partial decryption (T18,T20) using the decrypted (T17) session key (Ks) and the personal device's private key (SK(PD)), re- encryption (T21 ) using the session key (Ks) and sending back (T23) to the access device (AD) for total decryption (T25,T26) of the authenticator (PIN), using the session key (Ks) and the access device's secret key (SK(AD)), and use of the thus decrypted authenticator (PIN) to authenticate at the access device (AD).

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/08 - Répartition de clés
  • H04W 12/06 - Authentification
  • H04W 12/08 - Sécurité d'accès

84.

METHOD FOR MANUFACTURING ELECTRONIC OBJECT COMPRISING A BODY AND A POROUS-MEMBRANE-COMPRISING BATTERY

      
Numéro d'application EP2017080718
Numéro de publication 2018/108521
Statut Délivré - en vigueur
Date de dépôt 2017-11-28
Date de publication 2018-06-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Fidalgo, Jean-Christophe
  • Dubois, Béatrice
  • Robles, Laurence

Abrégé

The invention relates to a method for manufacturing a portable electronic-chip-comprising object (8) including a body (1) and a metal-air battery that is integrated into the body, said battery comprising an electrolyte layer (2e) and a protective air-porous membrane (3m) covering the electrolyte. The method comprises a step of forming at least one air-supply duct (3) extending from the protective membrane (3m) to an air source; the process is characterised in that an air-porous material (3a, 3c, 3f) is contained in said duct and completely blocks said duct on its course at least in one place on its course. The invention also relates to the object corresponding to this method.

Classes IPC  ?

  • H01M 12/06 - PROCÉDÉS OU MOYENS POUR LA CONVERSION DIRECTE DE L'ÉNERGIE CHIMIQUE EN ÉNERGIE ÉLECTRIQUE, p.ex. BATTERIES Éléments hybrides; Leur fabrication composés d'un demi-élément du type élément à combustible et d'un demi-élément du type élément primaire avec une électrode métallique et une électrode à gaz
  • H01M 8/04089 - Dispositions pour la commande des paramètres des réactifs, p.ex. de la pression ou de la concentration des réactifs gazeux
  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
  • H01M 10/42 - Procédés ou dispositions pour assurer le fonctionnement ou l'entretien des éléments secondaires ou des demi-éléments secondaires
  • H01M 12/08 - PROCÉDÉS OU MOYENS POUR LA CONVERSION DIRECTE DE L'ÉNERGIE CHIMIQUE EN ÉNERGIE ÉLECTRIQUE, p.ex. BATTERIES Éléments hybrides; Leur fabrication composés d'un demi-élément du type élément à combustible et d'un demi-élément du type à élément secondaire

85.

METHOD FOR SYNCHRONIZED SIGNATURE WITH ADDITIVE RSA KEY SPLITTING USING EARLY FLOATING EXPONENT NEGOTIATION

      
Numéro d'application EP2017082430
Numéro de publication 2018/108915
Statut Délivré - en vigueur
Date de dépôt 2017-12-12
Date de publication 2018-06-21
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Atmopawiro, Alsasian
  • Dang, Thi Tra Giang

Abrégé

The present invention relates to a method of secure generation by a client device A and a server device B of at least a RSA current signature and a RSA next signature with a private exponent component d of an RSA key, comprising : • a handshake phase (P1) comprising: a. receiving (S1) a handshake request comprising a hash of the next client value (pvA_next), b. checking (S2) the value of the next client value (pvA_next) and: - when the next client value (pvA_next) equals a first default value (DUMMY): generating (S3) a new value (x) and updating the next server value (pvB_next) with the generated new value, and sending (S4) to the client device (A) the generated new value (x), to be used by the client device as next client value (pvA_next), - when the next client value (pvA_next) is not equal to said first default value (DUMMY): checking the value of the next server value (pvB_next) and when the next server value (pvB_next) is equal to a second default value (NULL) and the next client value (pvA_next) equals the current server value (pvB): sending to the client device (A) a fix request; and when the next server value (pvB_next) is equal to said second default value (NULL) and the next client value (pvA_next) is not equal to the current server value (pvB), suspending performing said method. • a signing phase (P2) performed by the server device (B) after the handshake phase and generating the current signature; said signing phase comprising : a. generating (S5) a server part of the current RSA signature (HS2) from the server device private exponent component (dB) and from an updated server dynamic offset (hB') function of the current server dynamic offset (hB) and of a server shift value (cB), said server shift value (cB) being function of the current server value (pvB), such that the current RSA signature can be generated by combining said server part of the current RSA signature (HS2) and a client part of the current RSA signature (HS1) generated by the client device (A), b. setting (S8) the current server dynamic offset (hB) to the updated server dynamic offset (hB') value, the current server value (pvB) to the value of the next server value (pvB_next) and the next server value (pvB_next) to a second default value (NULL), • performing the handshake phase and the signing phase with the next signature as current signature, for generating the next signature.

Classes IPC  ?

  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/12 - Dispositifs de chiffrement d'émission et de réception synchronisés ou initialisés d'une manière particulière

86.

SECURE DOCUMENT OR SUPPORT ASSEMBLY

      
Numéro d'application EP2017081907
Numéro de publication 2018/104482
Statut Délivré - en vigueur
Date de dépôt 2017-12-07
Date de publication 2018-06-14
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Gaspari, Sébastien
  • Alleysson, Blandine
  • Bousquet, Christophe

Abrégé

The invention relates to a method for producing a security document (1), wherein a body (8, 11) is created that comprises two superimposed layers (12, 15), a circuit (13) which is electric and/or has an electronic chip (3) arranged on the interface between said two layers, and a first adhesive (4) between the two layers, which adheres to the two layers and/or the circuit. The method is characterised in that it comprises a step of depositing a second adhesive (5) which is different from, or has a different behaviour from the first adhesive in relation to the solvents or the temperature and partially adheres to at least one of the two layers (12, 15) and/or the circuit (13).

Classes IPC  ?

  • G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
  • G06K 19/073 - Dispositions particulières pour les circuits, p.ex. pour protéger le code d'identification dans la mémoire

87.

METHOD OF RSA SIGNATURE OR DECRYPTION PROTECTED USING A HOMOMORPHIC ENCRYPTION

      
Numéro d'application EP2017081756
Numéro de publication 2018/104412
Statut Délivré - en vigueur
Date de dépôt 2017-12-06
Date de publication 2018-06-14
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Georgieva, Mariya
  • Gouget, Aline

Abrégé

The present invention relates to a method of generating a secure RSA key by a server comprising the steps of : · generating (S1) a private RSA key d and a RSA modulus integer N; • splitting (S2) the secret key integer d in j key shares dJ of length n, with j in [1, J], J being an integer, and such that d = d1+ d2 +...+ dJ mod phi(N), with each key share dj being equal to (dj(0)... dj(i)... dj(n/b -1) ) with each key share component dj(i) in {0..2∧b-1} and i in [0, n/b-1], b being an integer inferior to n and phi the Euler's totient function; • encrypting (S3) with a fully homomorphic encryption (FHE) algorithm each key share component dj(i) of the private RSA key d by using a Fully Homomorphic Encryption secret key ps of a set Ss comprising the index couple (i,j), to generate an encrypted key share component edj(i) of said secure RSA key, said set Ss being a set of integer couples, among a predetermined integer number u of disjoint sets {S1, S2 Ss, Ss+1,...Su} generated such that : U{Ss} = { (i,j) such that i in [0, n/b-1], j in [1, J]} and each said set among {S1,.. Su} being associated with a Fully Homomorphic Encryption (FHE) secret key.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/08 - Répartition de clés
  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret

88.

METHOD FOR OPTIMIZING THE POLLING EVENT OF A SECURE ELEMENT AND CORRESPONDING GATEWAY, SECURE ELEMENT, BASEBAND DEVICE AND OTA PLATFORM

      
Numéro d'application EP2017081759
Numéro de publication 2018/104415
Statut Délivré - en vigueur
Date de dépôt 2017-12-06
Date de publication 2018-06-14
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Rozak-Draicchio, Lionel
  • Gravallon, Sébastien

Abrégé

The invention concerns among others a method for optimizing the polling event of a secure element (30) cooperating with a terminal, the terminal comprising a baseband device (31), the method consisting in: Sending from a OTA platform (32) to a gateway (33) of a telecommunication network of an operator a polling date for the secure element (30); Sending from the gateway (33) to the baseband device (31), in a container of a PCO, the polling date; Sending from the baseband device (31) to the secure element (30) the polling date, in order that the secure element (30) polls the OTA platform (32) at the polling date.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans fil; Leurs installations
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 8/24 - Transfert des données du terminal

89.

METHOD AND SYSTEM FOR SECURING SENSITIVE OPERATIONS PERFORMED IN AN UNSECURED COMMUNICATION ENVIRONMENT

      
Numéro d'application EP2017080565
Numéro de publication 2018/099874
Statut Délivré - en vigueur
Date de dépôt 2017-11-27
Date de publication 2018-06-07
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Hugot, Didier
  • Der-Krikorian, Anthony

Abrégé

The invention relates to a method for securing a sensitive operation between one processing unit comprising a computer browser and a service server of a communication network (5), a request (RT1) for or initiating said sensitive operation being sent to the service server (3). The method is characterized in that it comprises the following steps: - installation of a trusted server (TS) and storing of a client-type trusted program (P1) in the browser (P0) or in the processing unit (2) or in the communication network (5), - redirection (RT2) of said sensitive operation request (RT1) to the trusted server (TS), - performance of all or part of the sensitive operation between the trusted server (TS) and the trusted program (P1) following the redirection. The invention also relates to a system corresponding to the method.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
  • H04W 12/06 - Authentification

90.

METHOD, FIRST DEVICE AND SYSTEM FOR AUTHENTICATING TO A SECOND DEVICE

      
Numéro d'application EP2017080274
Numéro de publication 2018/099808
Statut Délivré - en vigueur
Date de dépôt 2017-11-23
Date de publication 2018-06-07
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Tabak, Danny
  • Josefsson, Johan

Abrégé

A first device (16) shares with the second device at least one session key. The first device sends to at least one third device (18) at least one first session key (28). The at least one third device connects (210) directly to the second device by using the at least one first session key. According to the invention, the method further comprises the following steps. The first device sends to the at least one third device a command (216) for disconnecting from or switching to a non-connected mode with the second device. And the at least one third device disconnects (218) from or switches to a non- connected mode with the second device based upon the received command. The invention also pertains to corresponding first device and system for authenticating to a second device.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 12/06 - Authentification
  • G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
  • G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
  • G06F 21/30 - Authentification, c. à d. détermination de l’identité ou de l’habilitation des responsables de la sécurité

91.

DEVICE AND METHOD FOR MANAGING A CELLULAR NETWORK IN RELATION WITH CELLULAR TERMINALS ACCEPTING A PLURALITY OF SUBSCRIBER MODULES

      
Numéro d'application EP2017081083
Numéro de publication 2018/100118
Statut Délivré - en vigueur
Date de dépôt 2017-11-30
Date de publication 2018-06-07
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Saffache, Philippe
  • Anslot, Michel
  • Bouckaert, Philippe

Abrégé

A method, wherein a cellular terminal (CT) is configured so that several subscriber modules (SIM A,SIM B) can simultaneously be attached respectively to their corresponding voice cellular communication network (NV A,NV B), and only one among the subscriber modules (SIM A,SIM B) can be attached to its data cellular communication network (ND A,ND B), for detecting if the first subscriber module (SIM A) is selected or not for data cellular communication network access, comprising the steps of: checking for the reception of a first message emanating from a subscriber module (SIM A), from the first voice cellular communication network (NV A), checking for the reception of a second message emanating from the same subscriber module (SIM A), from the corresponding first data cellular communication network (ND A), and being similar to said first message, wherein said first subscriber module (SIM A) is considered being selected for data cellular communication network access if a second message is received either before the reception of said first message or after the reception of said first message but not later than a predetermined time duration after the reception of said first message and is considered not being selected if no second message is received before the expiration of said predetermined time duration.

Classes IPC  ?

  • H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
  • H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
  • H04W 8/02 - Traitement de données de mobilité, p.ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]; Transfert de données de mobilité, p.ex. entre HLR, VLR ou réseaux externes
  • H04W 8/04 - Enregistrement dans un registre de localisation nominal ou un serveur d'abonnés locaux [HSS Home Subscriber Server]
  • H04W 8/06 - Enregistrement dans un registre de localisation de réseau-serveur, un VLR ou un serveur de mobilité des utilisateurs
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • H04W 8/22 - Traitement ou transfert des données du terminal, p.ex. statut ou capacités physiques
  • H04W 88/18 - Dispositifs de logistique; Dispositifs de gestion de réseaux
  • H04W 60/00 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement

92.

METHOD AND SYSTEM FOR CARRYING OUT A SENSITIVE OPERATION IN THE COURSE OF A COMMUNICATION SESSION

      
Numéro d'application EP2017081168
Numéro de publication 2018/100145
Statut Délivré - en vigueur
Date de dépôt 2017-12-01
Date de publication 2018-06-07
Propriétaire GEMALTO SA (France)
Inventeur(s) Hugot, Didier

Abrégé

The invention relates to a method for carrying out a sensitive operation in the course of a communication between a processing unit (2) and a first service server (3), said first server (3) being accessible via a first domain name (ND1) and/or first electronic address (IP1); Said method is characterized in that it comprises the step of using at least one second domain name (ND2) different from the first (ND1) and/or a second electronic address (IP2) different from said first (IP1) to carry out all or part of said sensitive operation. The invention also relates to a system corresponding to the method and comprising the server 3 and/or the processing unit.

Classes IPC  ?

  • H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
  • H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
  • G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole

93.

METHOD OF ISSUING AN IDENTITY DOCUMENT

      
Numéro d'application EP2017078223
Numéro de publication 2018/091289
Statut Délivré - en vigueur
Date de dépôt 2017-11-03
Date de publication 2018-05-24
Propriétaire GEMALTO SA (France)
Inventeur(s) Viljanen, Petri

Abrégé

The invention is a method for issuing an identity document uniquely allocated to a user. The method comprises the steps of: - extracting a biometric reference from a face of the user during an enrollment phase, - generating a biometric pattern from the biometric reference using a secret key of an asymmetric key pair, - writing a visual pattern on a surface of said identity document, said visual pattern including the biometric pattern.

Classes IPC  ?

  • G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
  • G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
  • H04N 1/32 - Circuits ou dispositions pour la commande ou le contrôle entre l'émetteur et le récepteur
  • B42D 25/333 - Filigranes

94.

METHOD FOR MANAGING A PATCH OF A PACKAGE

      
Numéro d'application EP2017077582
Numéro de publication 2018/091254
Statut Délivré - en vigueur
Date de dépôt 2017-10-27
Date de publication 2018-05-24
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Labourie, Florent
  • Yanto, Rudy

Abrégé

The invention is a method for managing a patch of a software package in a secure element comprising several subscription profiles. The patch is installed on the secure element and no more than one of said subscription profiles is enabled at a time. The method comprises the steps of: -on receipt of an activation command, recording a description of a link that attaches the patch only to a target subscription profile, -enabling the patch for the software package either as soon as the target subscription profile becomes enabled or as soon as the description is recorded if the target subscription profile is already enabled.

Classes IPC  ?

  • H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans fil; Leurs installations
  • G06F 21/77 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les cartes à puce intelligentes
  • H04W 12/06 - Authentification
  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • G06F 9/445 - Chargement ou démarrage de programme

95.

METHOD FOR PRODUCING A DATA CARRIER AND DATA CARRIER PRODUCED THEREFROM

      
Numéro d'application EP2017077142
Numéro de publication 2018/086874
Statut Délivré - en vigueur
Date de dépôt 2017-10-24
Date de publication 2018-05-17
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Pohjola, Teemu
  • Lappalainen, Kristian

Abrégé

The present invention relates generally to a data carrier comprising an opaque layer and a method for making the data carrier. During personalization phase, the ablation of the opaque layer by laser through the data carrier allows to define a see- through portion of the data carrier carrying opaque security, said see-through portion having an improved security corresponding to opaque embossing pattern overlapping at least partially the opaque security partially destroyed. Said defined see-through portion carrying opaque security partially destroyed with opaque embossing pattern on its surface is even more difficult to reproduce by forger, even more difficult to remove, replace or exchange and easy to check.

Classes IPC  ?

96.

A PHYSICAL KEY FOR PROVISIONING A COMMUNICATION DEVICE WITH DATA ALLOWING IT TO ACCESS A VEHICLE RESOURCE

      
Numéro d'application EP2017078876
Numéro de publication 2018/087284
Statut Délivré - en vigueur
Date de dépôt 2017-11-10
Date de publication 2018-05-17
Propriétaire GEMALTO SA (France)
Inventeur(s) Castillo, Laurent

Abrégé

This invention relates to a physical key (100) for provisioning a communication device (101) with data allowing said communication device (101) to access a vehicle resource by operating remotely a vehicle lock system (130) in which a first cryptographic key called master key is stored, comprising a secure enclave also storing the master key, the physical key being configured to: establish a communication link (110) with the communication device (101); derive by the secure enclave a second cryptographic key called derived key from the master key; transmit to the communication device (101) via the secure communication link (110) the derived key for enabling the communication device (101) to answer a security challenge from the vehicle lock system (130) and the vehicle lock system (130) to verify said answer, the access to the vehicle resource being allowed if the answer is successfully verified.

Classes IPC  ?

  • G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

97.

METHOD AND SYSTEM FOR AUTOMATICALLY RECEIVING AND/OR TRANSMITTING INFORMATION RELATING TO TRANSACTIONS

      
Numéro d'application EP2017076819
Numéro de publication 2018/077736
Statut Délivré - en vigueur
Date de dépôt 2017-10-20
Date de publication 2018-05-03
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Muller, Marc
  • Gibert, Sylvie
  • Barbe, Serge

Abrégé

The invention relates to a method for automatically receiving and/or transmitting information (1) intended for or relating to a holder of an alphanumeric account identifier (PAN, UID), said method comprising a step of creating an electronic address (Email, URL) comprising an identifier (IDT), characterised in that the identifier (IDT) is obtained or derived from at least a portion of the alphanumeric identifier (PAN) of the account or associated with an account (UID). The invention also concerns the corresponding electronic system.

Classes IPC  ?

98.

METHOD FOR PRODUCING A BISTABLE DISPLAY DEVICE WITH LOW-VOLTAGE MICROCONTROLLER

      
Numéro d'application EP2017076853
Numéro de publication 2018/073415
Statut Délivré - en vigueur
Date de dépôt 2017-10-20
Date de publication 2018-04-26
Propriétaire GEMALTO SA (France)
Inventeur(s) Touvet, Stéphane

Abrégé

Method for producing an electrophoretic display device comprising a low-voltage microcontroller. The invention relates to a method for producing a segmented electrophoretic display device (1A) comprising a bistable display (2) operating at predetermined opposing voltages (+dV; -dV) and an electronic circuit (10A, 25) with microcontroller (10, 24) for controlling the display according to a control programme (P). The method is characterised in that it comprises the following steps: - supplying the controller (24), which is different from a specific display controller for a bistable display and configured to deliver voltages (Vsegment), lower in absolute value to the predetermined voltages (+dV; -dV), - compensating said voltages (Vsegment) with at least one compensation voltage (Vcom) to at least reach the predetermined opposing voltages (+dV; -dV). The invention also relates to the corresponding device.

Classes IPC  ?

  • G09G 3/34 - Dispositions ou circuits de commande présentant un intérêt uniquement pour l'affichage utilisant des moyens de visualisation autres que les tubes à rayons cathodiques pour la présentation d'un ensemble de plusieurs caractères, p.ex. d'une page, en composant l'ensemble par combinaison d'éléments individuels disposés en matrice en commandant la lumière provenant d'une source indépendante

99.

A PROCESSING DEVICE ADAPTED TO COOPERATE WITH A SECURE ENCLAVE FOR EXECUTING A PROGRAM

      
Numéro d'application EP2017075919
Numéro de publication 2018/069386
Statut Délivré - en vigueur
Date de dépôt 2017-10-11
Date de publication 2018-04-19
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Delsuc, Julien
  • Cogniaux, Geoffroy

Abrégé

This invention related to a processing device (100) adapted to cooperate with a secure enclave (101) for executing a program, the processing device (100) being configured to: receive (110) a message comprising input data; generate from these input data a first execution context (103), an execution context corresponding to a data structure (103) comprising at least data required for executing a task corresponding to a portion of the program, the first execution context (103) being memorized into a memory managed by the processing device (100); send a notification message (120) to the secure enclave (101) indicating that the first execution context (103) is available so that the secure enclave (101) is triggered to read the first execution context (103), to download (130) in its internal memory data of the first execution context (103) that is required for executing the associated task and to execute (131) said task.

Classes IPC  ?

  • G06F 9/445 - Chargement ou démarrage de programme
  • G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée

100.

METHOD, DEVICE AND SYSTEM FOR SECURING AN ACCESS TO AT LEAST ONE SERVICE

      
Numéro d'application EP2017075132
Numéro de publication 2018/065439
Statut Délivré - en vigueur
Date de dépôt 2017-10-04
Date de publication 2018-04-12
Propriétaire GEMALTO SA (France)
Inventeur(s)
  • Bradley, Paul
  • Chalvin, Nicolas
  • Payraud, Emmanuel

Abrégé

The invention relates to a method (20) for securing an access to at least one service. According to the invention, a device (14) is set in a restricted operation mode. The restricted operation mode allows addressing only a first server (182). The restricted operation mode is associated with a first identifier relating to a first connectivity gateway (162). The first connectivity gateway allows accessing the first server. The device accesses the first identifier relating to the first connectivity gateway. The device accesses a subscription profile. The subscription profile is active during the restricted operation mode. The first server receives from the device or a chip (12) a request (26) for enrolling a device or chip user. The request for enrolling the device or chip user comprises or is accompanied with at least one feature relating to a user identity, as a user identity feature. The chip is embedded within or coupled to the device. The first server or another server connected to the first server verifies (28) whether the at least one user identity feature is or is not valid. Only if the at least one user identity feature is valid, the first server or another server connected to the first server sends to the device or, through the device, to the chip a command message (214) including a command for deactivating the restricted operation mode. The device or the chip deactivates (216) the restricted operation mode while storing or letting store, instead of the first identifier relating to the first connectivity gateway, a second identifier relating to a second connectivity gateway (164). The second identifier relating to the second connectivity gateway allows accessing a second server (184). The subscription profile is still active after the restricted operation mode deactivation. The second server manages the at least one service. The invention also relates to corresponding device and system.

Classes IPC  ?

  • H04W 12/08 - Sécurité d'accès
  • H04M 15/00 - Dispositions de comptage, de contrôle de durée ou d'indication de durée
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
  • H04W 48/00 - Restriction d'accès; Sélection de réseau; Sélection de point d'accès
  1     2     3     ...     11        Prochaine page