Gemalto SA

France

Back to Profile

1-100 of 991 for Gemalto SA Sort by
Query
Aggregations
IP Type
        Patent 990
        Trademark 1
Jurisdiction
        World 969
        United States 22
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 182
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier 105
H04W 12/06 - Authentication 71
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 68
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 62
See more
  1     2     3     ...     10        Next Page

1.

METHOD AND SYSTEM FOR MANAGING ACCESS TO A SERVICE

      
Application Number EP2019064098
Publication Number 2020/141025
Status In Force
Filing Date 2019-05-29
Publication Date 2020-07-09
Owner GEMALTO SA (France)
Inventor Paert, Jonas

Abstract

The invention method (30) comprises: - authenticating successfully, by a user authentication server (16), through a logon agent (22) in a device, a device user (11); - sending, by the user authentication server, to the logon agent, session data (220) relating to the successful authentication session; - sending, by the logon agent, to a logon application (24) the session data (222); - receiving, by at least one browser (32), from the device user, a first request (310) for accessing the service with a first server identifier; - sending, by the logon application, to the at least one browser, the session data (320); - sending, by the browser, based on the first server identifier, to a first receiving server, the session data (322); - verifying (324), by the first receiving server, whether the session data is or is not valid, and, if yes, authorizing access (326) to the service.

IPC Classes  ?

  • G06F 21/41 - User authentication where a single sign-on provides access to a plurality of computers
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/31 - User authentication
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

2.

METHOD AND SYSTEM FOR IMPLEMENTING A VIRTUAL SMART CARD SERVICE

      
Application Number EP2019062681
Publication Number 2019/224106
Status In Force
Filing Date 2019-05-16
Publication Date 2019-11-28
Owner GEMALTO SA (France)
Inventor
  • Tabak, Danny
  • Hugo, Didier
  • Der-Krikorian, Anthony
  • Grosmark, Boris
  • Cohen, Alon
  • Paert, Jonas

Abstract

The invention relates to a method (20) and a system for implementing a virtual smart card service.The virtual smart card service corresponds to an execution of a smart card application. At least one key is stored at a server side. The smart card application uses application metadata to emulate a smart card application logic. The method comprises: - processing (24), by at least one client (12), the smart card application logic; - running (26), by the at least one client, the smart card application while retrieving smart card data from the smart card application logic; - identifying (28), by the at least one client, while running the smart card application, at least one key operation within the smart card application; - generating (210), by the at least one client, while running the smart card application, a key operation request by using the at least one identified key operation and data relating to the client; - sending (212, 214), by the at least one client, through the smart card application, to the first server the generated key operation request; - processing (216), by the first (14) or a second (16) server, the generated key operation request by using the at least one key and the client data, the second server being connected to the first server; - getting, by the first or second server, a key operation result, the key operation result being the result of the at least one identified key operation on the client data; and - sending (218), by the first or second server, through the smart card application, to the client the key operation result.

IPC Classes  ?

  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
  • G06Q 20/38 - Payment protocolsDetails thereof

3.

METHOD FOR PROTECTING AN EXECUTABLE CODE

      
Application Number EP2019051846
Publication Number 2019/149630
Status In Force
Filing Date 2019-01-25
Publication Date 2019-08-08
Owner
  • GEMALTO SA (France)
  • SFNT GERMANY GMBH (Germany)
Inventor
  • Garreau, Eric
  • Volpe, Sébastien
  • Garba, Peter

Abstract

A method for transforming an executable code (10), said method comprising a step of identifying a set of portions (P1, P2, P3) of said executable code to be replaced, a step of automatically analyzing the executable code and identifying a collection of sequences (S1, S2, S3) of instructions that end in an unconditional transfer of control, said sequences being included in the executable code only, and a step of generating an updated executable code (20) by replacing each of said portions by an entity which may be either an indirection to one of said sequences or a series of indirections to sequences of the collection, the entity providing an equivalent functionality to that of the portion it replaces.

IPC Classes  ?

  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • G06F 21/12 - Protecting executable software
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
  • G06F 8/52 - Binary to binary

4.

Method to counter DCA attacks of order 2 and higher on table-based implementations

      
Application Number 16337197
Grant Number 11201724
Status In Force
Filing Date 2017-09-22
First Publication Date 2019-07-25
Grant Date 2021-12-14
Owner GEMALTO SA (France)
Inventor Gouget, Aline

Abstract

The present invention relates to a method to counter DCA attacks of order 2 and higher order applied on an encoded table-based (TCabi,j) implementation of block-cipher of a cryptographic algorithm to be applied to a message (m), said method comprising the steps of: —translating a cryptographic algorithm block-cipher to be applied on a message (m) into a series of look-up tables (Tabi,j),—applying secret invertible encodings to get a series of look-up tables (TCi,j),—computing message-dependent masking values, comprising the computation of at least two shares of masking value (mmask1, mmask2) for the input of the table network based on at least two different message derivation functions (F1, F2),—re-randomizing the tables (TCi,j) using the computed message-dependent masking values (mmask1, mmask2),—computing rounds to be applied on the message (m) based on the randomized network of tables (TCi,j).

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

5.

AUTHENTICATION METHOD, DEVICE AND SYSTEM

      
Application Number EP2018081759
Publication Number 2019/129422
Status In Force
Filing Date 2018-11-19
Publication Date 2019-07-04
Owner GEMALTO SA (France)
Inventor
  • Delhoste, Fabrice
  • Paillart, Frédéric
  • Petit, Sébastien

Abstract

The invention relates to an authentication method. The method comprises: - collecting (24), based on a predetermined authentication policy, at least one context data element; - constituting (28), based on the at least one collected context data element, a data packet; - generating (216), by using a predetermined hash type algorithm and the data packet, as input to the predetermined hash type algorithm, a hash; - sending the generated hash; - generating (220), as a hash distance generation step, a hash distance between the generated hash and a predetermined reference hash; and - authenticating (224) successfully or not (223) based on the generated hash distance, as an authentication step. The invention also relates to corresponding device and system.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

6.

A METHOD FOR UPDATING A ONE-TIME SECRET KEY

      
Application Number EP2018084212
Publication Number 2019/129481
Status In Force
Filing Date 2018-12-10
Publication Date 2019-07-04
Owner GEMALTO SA (France)
Inventor
  • Anslot, Michel
  • D'Souza, Francis

Abstract

This invention relates to a method for updating a one-time secret key Kn maintained in a subscription module implemented in a communication apparatus, a wireless communication network maintaining an identical version of said one-time secret key Kn and configured to determine a result XRES expected from the communication apparatus when an authentication function is applied by the subscription module using a random challenge and said one-time secret key Kn as an input, the method comprising the following steps: receiving from the communication network an authentication request message containing at least a random challenge RANDn; determining by the subscription module a result RES by applying the authentication function using the random number RANDn and the one- time secret key Kn as inputs; transmitting said result RES to the communication network for it to be compared with the expected result XRES determined by the communication network using the random number RANDn and the corresponding version of the one-time secret key Kn, the subscriber being authenticated if said first and second results are matching; updating the one-time secret key Kn by replacing its current version with a new version obtained by applying a first key derivation function using the random challenge RANDn as an input, the updated version of the one-time secret key Kn being used by the subscription module for processing a subsequent authentication request, the same update being carried out by a server accessible or part of the wireless communication network in order to maintain an identical version of the one-time secret key Kn.

IPC Classes  ?

  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/06 - Authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/12 - Detection or prevention of fraud

7.

COLOR LASER MARKING OF SECURITY DOCUMENT AND A METHOD FOR PRODUCING SUCH SECURITY DOCUMENT

      
Application Number EP2018085258
Publication Number 2019/129527
Status In Force
Filing Date 2018-12-17
Publication Date 2019-07-04
Owner GEMALTO SA (France)
Inventor
  • Lesur, Jean-Luc
  • Larina, Nina
  • Nikkila, Jarmo

Abstract

The present invention relates generally to a data carrier and a method for making the data carrier. More particularly, this invention relates to color laser marking of article, especially security documents. The present invention proposes a security document comprising a multilayers assembly instead of a single color component mixture in a layer. The multilayer assembly comprises at least two laser sensitive layer. Each layer comprises at least one coloring agent component. The order arrangement of the multilayers of bleachable coloring agent component is made so that each layer behaves as a wavelength filter configured to selectively transmit longer wavelengths and block or attenuate shorter wavelengths while protecting the underneath coloring agent component from bleaching interference.

IPC Classes  ?

8.

METHOD, FIRST DEVICE, SECOND DEVICE AND SYSTEM FOR MANAGING ACCESS TO DATA

      
Application Number EP2018085298
Publication Number 2019/129530
Status In Force
Filing Date 2018-12-17
Publication Date 2019-07-04
Owner
  • GEMALTO SA (France)
  • SAFENET INC (USA)
Inventor
  • Hugot, Didier
  • Ali, Asad Mahbaab
  • Arora, Gorav

Abstract

The invention relates to a method (20) for managing data access. The method comprises: - receiving (22) at least one request for accessing data; - capturing (26) data relating to at least one current context signal during each data access request; - comparing (210), as a current authorization step, the data relating to at least one captured current context signal to predetermined reference data relating to at least one corresponding context signal according to at least one corresponding predetermined authorization policy; - determining (212) and (214), based upon the current authorization result and at least one predetermined dynamic data access policy, whether the data access is or is not authorized, as a data access decision; and - issuing the data access decision (216). The invention also relates to corresponding first device (14), second device (16) and system (10).

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/44 - Program or device authentication
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

9.

METHOD, FIRST DEVICE, SECOND DEVICE AND SYSTEM FOR AUTHENTICATING A FIRST DEVICE TO A SECOND DEVICE

      
Application Number EP2018085268
Publication Number 2019/129528
Status In Force
Filing Date 2018-12-17
Publication Date 2019-07-04
Owner GEMALTO SA (France)
Inventor
  • Tabak, Danny
  • Josefsson, Johan
  • Vigroux, Gregory

Abstract

The invention relates to a method (20) for authenticating a first device (12) to a second device (16). The method comprises: - generating, by the first device, by using a predetermined key generation algorithm, a secret key; - sharing (22) and (24), by the first device with the second device, a secret key and a predetermined permanent authentication data generation algorithm; - generating (26), by the first device, first authentication data by using the permanent authentication data generation algorithm and at least the secret key, as input to the permanent authentication data generation algorithm; - broadcasting (28), by the first device, the first authentication data; - scanning (210), by the second device, broadcast data; - generating, by the second device, second authentication data by using the permanent authentication data generation algorithm and at least the secret key, as input to the permanent authentication data generation algorithm; - comparing (216), by the second device, the second authentication data to the broadcast first authentication data; and - authenticating (220), by the second device, the first device only if the second authentication data matches the broadcast first authentication data. The invention also pertains to corresponding first device, second device and system for authenticating a first device to a second device.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/10 - Integrity
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]

10.

IDENTIFICATION DOCUMENT WITH SEVERAL VISUAL MARKINGS AND METHOD FOR MANUFACTURING THEREOF

      
Application Number EP2018085278
Publication Number 2019/129529
Status In Force
Filing Date 2018-12-17
Publication Date 2019-07-04
Owner GEMALTO SA (France)
Inventor
  • Syrjanen, Taru
  • Lankinen, Mikko

Abstract

The invention concerns a method for manufacturing an identification document (100) comprising a body (150) with a first visual marking (140) and a second visual marking (130), the first and the second visual markings depicting same identification data. The method comprises the following steps of: - engraving a first area of the identification document (100) with a first laser beam for obtaining the first visual marking (140); - providing at least one see-through portion (120) in a second area of the identification document; - providing an optically variable printing ink patch (131), laminated to at least one first transparent layer (101) located in the see-through portion; and - engraving the surface of the laminated optically variable printing ink patch (132) with a second laser beam for obtaining the second visual marking (130), said second laser beam having a lower power than the first laser beam. The invention concerns also the identification document (100) obtained by this method.

IPC Classes  ?

  • B42D 25/435 - Marking by removal of material using electromagnetic radiation, e.g. laser
  • B42D 25/378 - Special inks

11.

A METHOD FOR CONTROLLING BY A SERVER THE USE OF AT LEAST ONE DATA ELEMENT OF A DATA OWNER

      
Application Number EP2018084056
Publication Number 2019/121075
Status In Force
Filing Date 2018-12-07
Publication Date 2019-06-27
Owner GEMALTO SA (France)
Inventor
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frederic

Abstract

The invention relates to a method for controlling by a server (201) called secure server the use of a first set of at least one data element of a data owner and provided by a communication device (200), the method comprising the steps of: receiving (204) at least one digital signature representative of a process authorized by the data owner and adapted to carry out a series of at least one instructions using the first set of at least one data element; receiving (209) from a process entity (202) the series of at least one instruction, and a ciphered version of the first set of at least one data element which is communicated to the process entity (202) by the communication device (200); verifying that the series of at least one instruction correspond to a process authorized by the data owner of the communication device by comparing the at least one digital signature received (204) by the secure server (201) with a digital signature obtained by the secure server (201) using as an input the series of at least one instruction received by the secure server (201); and if the series of at least one instruction correspond to an authorized process: deciphering the first set of at least one data element; generating a result data by executing the series of at least one instruction using the first set of at least one data element as an input; transmitting the result data to the process entity (202).

IPC Classes  ?

  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]

12.

METHOD OF ACTIVATING A FEATURE OF A CHIP

      
Application Number EP2018083521
Publication Number 2019/120991
Status In Force
Filing Date 2018-12-04
Publication Date 2019-06-27
Owner GEMALTO SA (France)
Inventor
  • Berzati, Alexandre
  • Bonizec, Loïc
  • Dou Nassre, Alaa

Abstract

Method for activating a feature of a chip(10) having an interface (20) comprising at least two power pins (GND, VCC). The method comprises the following steps: -the chip measures a series of voltage values between said power pins, -the chip detects a series of sync signals different from clock signals, said sync signals being interleaved with said voltage values, -the chip identifies a data sequence from said series of voltage values, and the chip activates the feature only if the data sequence matches a predefined pattern

IPC Classes  ?

  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G11C 7/00 - Arrangements for writing information into, or reading information out from, a digital store
  • H03K 3/037 - Bistable circuits
  • H03K 5/19 - Monitoring patterns of pulse trains

13.

METHOD OF MANAGING A TAMPER-PROOF DEVICE COMPRISING A PLURALITY OF SOFTWARE CONTAINERS

      
Application Number EP2018083513
Publication Number 2019/115294
Status In Force
Filing Date 2018-12-04
Publication Date 2019-06-20
Owner
  • GEMALTO SA (France)
  • GEMALTO HOLDING PTE LTD. BRANCH IN KOREA (Republic of Korea)
Inventor
  • Bogusz, François
  • Courtiade, Fabien

Abstract

The invention is a method for managing a tamper-proof device (30) comprising first and second software containers (32, 34),said tamper-proof device (30) being included in a host device (80) comprising a baseband unit (10). Said first software container (32) is designed to emulate a eUICC and is in a deactivated state. The second software container comprises a set (36) of rules. The baseband unit comprises an activator agent (12)which retrieves both a location data broadcasted by a telecom network and the set of rules from the second software container. The activator agent checks if activation of the first software container is authorized by one of said rules for the location data and requests activation of the first software container only in case of successful checking.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 36/14 - Reselecting a network or an air interface
  • H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed

14.

METHOD FOR CUSTOMISING/MARKING A SMART CARD

      
Application Number EP2018083543
Publication Number 2019/115299
Status In Force
Filing Date 2018-12-04
Publication Date 2019-06-20
Owner GEMALTO SA (France)
Inventor
  • Byrne, David
  • Bertolotti, Jean-Marie
  • Dhers, Gilles

Abstract

The invention concerns a method for customising/marking a smart card (1) using visible patterns (5-8) on the surface of the card, said method comprising a step of embossing the patterns on the card body (2), said patterns having raised areas (16) extending over a main surface (3) of the smart card body (2). The method is characterised in that the method comprises a step of at least partially levelling (17) said raised areas (16). The invention also concerns the obtained card.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

15.

METHOD FOR AUTHENTICATING A USER BASED ON AN IMAGE RELATION RULE AND CORRESPONDING FIRST USER DEVICE, SERVER AND SYSTEM

      
Application Number EP2018083997
Publication Number 2019/115393
Status In Force
Filing Date 2018-12-07
Publication Date 2019-06-20
Owner GEMALTO SA (France)
Inventor
  • Famechon, Benoit
  • Siddiqui, Najam
  • Lu, Hongqian Karen
  • Ali, Asad Mahboob

Abstract

A server (16) accesses a user identifier associated with a first user device (12) and a reference image, as a first image set, to be displayed. The server sends to a second user device (14) an image (24), as a second image set, to be displayed, and a user request to select an image within the first image set. The second user device displays (210) the second image set and the user request. The user of the first user device selects at least one displayed (214) first image, the selected first image matching an image visually selected within the displayed second image set, according to a rule known to the user and the server. The first user device sends to the server the first user device identifier accompanied with data relating to the selected first image (222). If the data relating to the selected first image matches the data relating to the first reference image, the server authenticates the user.

IPC Classes  ?

  • G06F 21/36 - User authentication by graphic or iconic representation
  • G06F 21/42 - User authentication using separate channels for security data
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • H04L 9/08 - Key distribution

16.

METHOD FOR PRODUCING A CHIP CARD COMPRISING WOOD

      
Application Number EP2018084835
Publication Number 2019/115727
Status In Force
Filing Date 2018-12-13
Publication Date 2019-06-20
Owner GEMALTO SA (France)
Inventor
  • Kodjagueuzian, Gilles
  • Karafotis, Stéphane

Abstract

The invention relates to a method for producing a chip card (10A, 11A) comprising a card body (17) comprising wooden sheets (5B, 6B), said method comprising the steps of: providing two wooden sheets (5B, 6B); providing an insert (1) comprising at least one sheet or leaf of metal (3); and inserting the insert (1) between said sheets (5B, 6B) before assembly of all of the elements, the outer faces of the wooden sheets being outwardly oriented and predominantly covering the two main surfaces of the card body (17), said method being characterised in that it comprises a step of printing (15) or fixing a layer of material (14) onto the edge (T) of the card body (17), which is designed to interconnect layers in the region of the edge. The invention also relates to a corresponding card produced by the method.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

17.

PROCESS FOR PRODUCING A PORTABLE ELECTRONIC DEVICE WITH INTERFACE SWITCHING AND CORRESPONDING DEVICE

      
Application Number EP2018082858
Publication Number 2019/110390
Status In Force
Filing Date 2018-11-28
Publication Date 2019-06-13
Owner GEMALTO SA (France)
Inventor
  • Printemps, Morgan
  • Zeamari, Ali

Abstract

The invention relates to a process for producing a portable electronic device (2) including: - an electronic chip-based microcontroller (SE, 4); - a first communication interface (9-11) connecting, or configured to connect, said microcontroller (SE, 4); - at least one second communication interface (12-13) connecting, or configured to connect, said microcontroller (SE, 4) to a peripheral electronic component, characterized in that it includes the following steps: - providing a switch (7, 8) that is configured to switch communications from the microcontroller (SE, 4) either to said first communication interface (9, 10, 11) or to said second interface (12, 13); - configuring (P1) the microcontroller (SE, 4) to drive said switch (7, 8) so as to select said first or second interface. The invention also relates to the corresponding device and to a communication system using said device.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips

18.

METHOD FOR PRODUCING A RADIOFREQUENCY CHIP SUPPORT

      
Application Number EP2018083114
Publication Number 2019/110437
Status In Force
Filing Date 2018-11-30
Publication Date 2019-06-13
Owner GEMALTO SA (France)
Inventor
  • Seban, Frederick
  • Buyukkalender, Arek
  • Poitrasson, Eric
  • Torrado, Antonio
  • Durano, Frédéric

Abstract

The invention concerns a method for producing a radiofrequency chip support, said method comprising the step of forming a first spiral (2) with electrical interconnection zones (3, 4) on a support. The method is characterised in that it comprises the step of forming a second spiral (5) connected to one of the interconnection zones (3, 4) by a link (6), the configuration of the first and second spiral forming a passive antenna (2-5). The invention also concerns the corresponding chip support.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

19.

METHOD FOR PROTECTING A SOURCE OF ENTROPY USED IN COUNTERMEASURES SECURING A WHITEBOX CRYPTOGRAPHIC ALGORITHM

      
Application Number EP2018082850
Publication Number 2019/106016
Status In Force
Filing Date 2018-11-28
Publication Date 2019-06-06
Owner GEMALTO SA (France)
Inventor
  • Gouget, Aline
  • Vacek, Jan

Abstract

The present invention relates to a method for a secure execution of a whitebox cryptographic algorithm applied to a message (m) and protected by countermeasures based on pseudo-random values, comprising the steps of : - executing a pseudo-random function (PRP) generating pseudo-random output values and an encrypted main output value based on an encrypted input value (*Xi*) derived from said message, - securing said cryptographic algorithm by applying to the cryptographic algorithm said countermeasures based on said generated pseudo-random output values - retrieving, from said generated encrypted main output value, the input value or part of the input value, under an encrypted form (*Xi*), - executing said secured cryptographic algorithm on said encrypted retrieved value.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

20.

CRYPTOGRAPHY DEVICE HAVING IMPROVED SECURITY AGAINST SIDE-CHANNEL ATTACKS

      
Application Number EP2018083115
Publication Number 2019/106139
Status In Force
Filing Date 2018-11-30
Publication Date 2019-06-06
Owner GEMALTO SA (France)
Inventor
  • Georgieva, Mariya
  • Gouget, Aline

Abstract

Secure cryptography operations on a white-box cryptography device. Receiving a first message. Receiving a cryptographic key encrypted using a homomorphic encryption scheme. Performing a cryptographic operation, e.g., decryption or digital signature, using the encrypted cryptographic key. Performing a homorphically encrypted tracer calculation that traces the performance of the cryptography operations on the white-box cryptography device thereby allowing verification that all steps of the cryptography operation has been performed without external manipulation. Performing a key-exchange operation. Decrypting the key-exchange output using an alternate cryptographic key stored on the cryptographic device.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

21.

CRYPTOGRAPHY DEVICE HAVING SECURE PROVISION OF RANDOM NUMBER SEQUENCES

      
Application Number EP2018083184
Publication Number 2019/106166
Status In Force
Filing Date 2018-11-30
Publication Date 2019-06-06
Owner GEMALTO SA (France)
Inventor
  • Georgieva, Mariya
  • Gouget, Aline

Abstract

Secure computation of a random number sequence in a cryptographic device. The computation is secured by receiving a homomorphic ciphertext seed vector, selecting an initial internal state from the seed vector, the initial internal state composed of a subset of elements of the seed vector, updating an internal state from a previous internal state using multivariate functions accepting elements of the previous internal state as inputs to produce a homomorphic ciphertext from homomorphic ciphertext input values, generating an intermediate result vector of homomorphic ciphertexts from the homomorphic ciphertext internal state multivariate functions accepting the elements of the internal state as inputs to produce a homomorphic ciphertext from homomorphic ciphertext input values, and decrypting the intermediate result vector elements into plaintext vector elements, thereby producing a plaintext deterministic random sequence vector corresponding to plaintext seed elements used to produce the seed vector. Other systems and methods are disclosed.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

22.

METHOD OF MANAGING PRIVILEGES IN A TAMPER-PROOF DEVICE COMPRISING SEVERAL SOFTWARE CONTAINERS

      
Application Number EP2018080318
Publication Number 2019/101507
Status In Force
Filing Date 2018-11-06
Publication Date 2019-05-31
Owner GEMALTO SA (France)
Inventor
  • Courtiade, Fabien
  • Labourie, Florent
  • Dubois, Denis
  • Ahmad, Syarif
  • Yang, Jianrong
  • Pahala, Nopiga
  • Yong, Shier Loon Sharon

Abstract

The invention is a method for managing a tamper-proof device (10) comprising a processor (40) and an operating system (12) able to handle a set of communication protocols with external entities. The operating system accesses a ruling data (14) specifying for each communication protocol of the set whether Card Lock, Card Terminate and Final Application privileges as defined by GlobalPlatform Card Specification (V2.3) are authorized or forbidden. Upon receipt of a command from one of said external entities, the operating system uses the ruling data to deny or to authorize execution of the command based on the communication protocol used to convey the command.

IPC Classes  ?

  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/08 - Access security
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

23.

METHOD OF MANAGING A TAMPER-PROOF DEVICE COMPRISING SEVERAL SOFTWARE CONTAINERS

      
Application Number EP2018080329
Publication Number 2019/101508
Status In Force
Filing Date 2018-11-06
Publication Date 2019-05-31
Owner GEMALTO SA (France)
Inventor
  • Courtiade, Fabien
  • Labourie, Florent
  • Dubois, Denis
  • Ahmad, Syarif
  • Yang, Jianrong
  • Pahala, Nopiga
  • Yong, Shier Loon Sharon

Abstract

The invention is a method for managing a tamper-proof device (10) comprising a plurality of software containers (20, 30) and an operating system (12). The operating system is able to handle a set of communication protocols with external entities. The operating system accesses a pairing data (14) in which each communication protocol of said set has been associated with a single software container and upon receipt of a message from one of the external entities, the operating system uses the pairing data to route the message to the software container associated with the communication protocol used to convey the message.

IPC Classes  ?

  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/08 - Access security
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

24.

METHOD FOR MANAGING LIFECYCLE OF CREDENTIALS

      
Application Number EP2018080344
Publication Number 2019/101509
Status In Force
Filing Date 2018-11-06
Publication Date 2019-05-31
Owner GEMALTO SA (France)
Inventor
  • Mosse, Franck
  • Sahli, Chaouki

Abstract

The invention is a method for managing lifecycle of credentials of an application (40) installed on an application server (10). The method comprises the steps of: - monitoring execution of the application by a credential agent (50) separate from the application and installed on the application server, said credential agent having an access token previously provided by a security server (30), - upon detection of a predefined event by the credential agent, sending to the security server a polling message comprising the access token, - checking the access token is genuine by the security server and in case of successful checking sending a security data to the credential agent in response to the polling message (M7), the security data being a secret value and/or an associated metadata, - updating a security configuration of the application using said security data, then making the security configuration effective.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/45 - Structures or tools for the administration of authentication

25.

A METHOD FOR IMPROVING USER AUTHENTICATION PERFORMED BY A COMMUNICATION DEVICE

      
Application Number EP2018078300
Publication Number 2019/096521
Status In Force
Filing Date 2018-10-16
Publication Date 2019-05-23
Owner GEMALTO SA (France)
Inventor Faure, Frédéric

Abstract

NΑΝΝ1 ί N NS(i)NSiN ANN iNLH(i) NLH(i)S(jc,i,c,i, Sj NU_CSjU_CSjj) as an input signal that is not associated to the requesting user.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • G06N 3/08 - Learning methods

26.

A METHOD FOR A SERVICE PROVIDER TO LAUNCH A TARGETED SERVICE IMPLEMENTED BY AN APPLICATION BELONGING TO A SECURITY DOMAIN OF AN EUICC

      
Application Number EP2018078299
Publication Number 2019/091723
Status In Force
Filing Date 2018-10-16
Publication Date 2019-05-16
Owner GEMALTO SA (France)
Inventor
  • Glinka-Hecquet, Gerald
  • Dubois,, Denis

Abstract

This invention related to a method for a service provider to launch a targeted service implemented by an application belonging to a security domain of an e UICC (504) embedded into a communication device, said security domain and application being respectively called transversal security domain and transversal application, the e UICC (504) comprising a set of at least one profile allowing the communication device to access to a specific mobile network infrastructure, one profile being activated at a time, the method comprising the following steps: receiving by the e UICC (504) from an SM-SR server (502) on a communication interface (E5) a command (512) for enabling a profile, said command comprising an identifier of the transversal security domain; interpreting by the e UICC (504) the command for enabling a profile as a command for transmitting a subscription address associated to the profile which is activated in the e UICC; sending (514) an SMS message comprising a subscription address associated to the profile which is currently active; establishing between the server operated by the service provider (503) and the e UICC (515) a communication channel, this establishment being initiated by the server operated by the service provider (504) using the subscription address transmitted by SMS; receiving (515) by the e UICC (504) on said communication channel a command for launching the targeted service; launching by the e UICC (504) the targeted service.

IPC Classes  ?

  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 4/50 - Service provisioning or reconfiguring
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]

27.

METHOD FOR SECURING THE CUSTOMIZED AREA OF A SECURITY DOCUMENT AND SECURITY DEVICE COMPRISING SUCH A CUSTOMIZED AREA

      
Application Number EP2018079577
Publication Number 2019/086380
Status In Force
Filing Date 2018-10-29
Publication Date 2019-05-09
Owner GEMALTO SA (France)
Inventor Lesur, Jean-Luc

Abstract

The invention relates to a method for securing a customized area (120) of a security document (100), comprising the following steps: - inserting, by a first insertion method, a customized color image (122) on a first surface (121, 123) of the security document; - inserting, by a second insertion method, guilloche patterns (124, 126) in color on a second surface (121, 123, 125) of the security document, wherein the first and second surfaces are stacked on top of each other such that the guilloche patterns and the customized image at least partially overlap; and - inserting a colored marking (160) on the customized image and the guilloche patterns by at least two laser beams of different wavelengths, wherein the colored marking passes at least partially through the customized image and the guilloche patterns, and wherein, for the purpose of the colored marking, said wavelengths allow to generate colors obtained by chemical reaction with the pigments of the customized image and the guilloches such that the colors of the colored marking directly depend on the pigments used in the guilloches and the customized image.

IPC Classes  ?

28.

METHOD FOR SECURING A DISPLAY OF SENSITIVE DATA BY A GRAPHICS PROCESSING UNIT OF AN ELECTRONIC DEVICE

      
Application Number EP2018079769
Publication Number 2019/086493
Status In Force
Filing Date 2018-10-30
Publication Date 2019-05-09
Owner GEMALTO SA (France)
Inventor
  • Fokle Kokou, Milas
  • Loubet Moundi, Philippe

Abstract

The present invention relates to a method for securing a display of sensitive data on a display device by a graphics processing unit (GPU) (2) of an electronic device, said display being triggered by a user application (9) executed by a central processing unit (CPU) (4) of said electronic device and calling a display function of a graphics library (10), said electronic device comprising a tamper resistant secure element (SE) (5), an unprotected GPU memory (7) accessible by the graphics processing unit (GPU), the secure element and the central processing unit (CPU) and a protected GPU memory (8) only accessible by the graphics processing unit (GPU) and by said secure element, said secure element (SE) being integrated in the graphics processing unit (GPU), said method comprising, performed by said secure element (5), the steps of : - in response to the triggering of the display of said sensitive data by the user application (9), providing (S2) said user application with an encryption function specified as an encryption algorithm and a cryptographic key to be used with said encryption algorithm enabling said user application to encrypt said sensitive data, - reading (S6), in the unprotected GPU memory (7), encrypted display data generated by said display function of the graphics library from said encrypted sensitive data, - decrypting (S7) said encrypted display data to generate decrypted display data, - writing (S8) the decrypted display data in the protected GPU memory (8), such that the graphics processing unit (GPU) (2) accesses said decrypted display data in the protected GPU memory (8) and displays it on the display device.

IPC Classes  ?

  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 21/60 - Protecting data
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

29.

METHOD OF IMPLEMENTING A PHYSICAL UNCLONABLE FUNCTION

      
Application Number EP2018075580
Publication Number 2019/081138
Status In Force
Filing Date 2018-09-21
Publication Date 2019-05-02
Owner GEMALTO SA (France)
Inventor
  • Duval, Benjamin
  • Berzati, Alexandre
  • Fourquin, Olivier

Abstract

Method generating and selecting primitives for implementing a Physical Unclonable Function providing a response representative of a device comprising a plurality of primitives coupled in pairs (P1,…,P6). The method comprises the following steps: - selecting a subset (20) of the pairs, - assessing difference between electrical characteristics values provided by primitives belonging to each pair of said subset (20), and - qualifying all pairs of primitives for which the assessed difference is higher than a reference threshold.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

30.

METHODS FOR RECORDING AND SHARING A DIGITAL IDENTITY OF A USER USING DISTRIBUTED LEDGERS

      
Application Number EP2018079064
Publication Number 2019/081530
Status In Force
Filing Date 2018-10-23
Publication Date 2019-05-02
Owner GEMALTO SA (France)
Inventor
  • Castillo, Laurent
  • Wang, Yesong
  • Aung, Khaing Phyo
  • Lao, Vincent

Abstract

The present invention relates to a method for recording a digital identity of a first user (102) comprising, performed by a computing device (301) of a first verification entity (101) identified by a first verification entity identifier : - receiving from the first user at least one first user identity document (302) and extracting user personal identifiable information data elements from said user identity document, - after verification, encrypting using a public key of the first verification entity and recording said encrypted user personal identifiable information data elements (304) in a first distributed ledger (103) whose access is authorized to a first set of computing devices only, - generating a user identifier (KYC ID) to be sent to said user and recording a hash of said user identifier in a second distributed ledger and, for each verified user personal identifiable information data element, an attestation (303) including the first verification entity identifier and a hash of said user personal identifiable information data element, and recording each generated attestation in said second distributed ledger, - for each generated attestation, recording in said second distributed ledger a relationship between the generated user identifier and said generated attestation, wherein said first and second distributed ledgers are configured such that access to the first distributed ledger is more restricted than access to the second distributed ledger and wherein all data stored in the second distributed ledger form a graph data model in which each node represents an attestation of a user personal identifiable information data element or a user identifier, and wherein the links between the nodes of the model represent the relationships recorded in the second distributed ledger between user identifiers and said recorded attestations, such that any entity having access to the second distributed ledger is able to perform verifications on the relationship between users whose identities have been recorded in the ledgers without having access to said recorded identities.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

31.

A METHOD FOR A COMMUNICATION DEVICE TO RETRIEVE A PLAINTEXT FROM A CIPHERTEXT MEMORIZED IN A REMOTE DATABASE

      
Application Number EP2018076927
Publication Number 2019/072666
Status In Force
Filing Date 2018-10-03
Publication Date 2019-04-18
Owner GEMALTO SA (France)
Inventor
  • Jemli, Nejib
  • Wies, Thomas
  • Gouget, Aline

Abstract

This invention relates to a method for a first communication device (100) to retrieve a plaintext P from a first ciphertext C memorized in a first server called remote database (102), the first ciphertext C being generated by a second communication device (101) by applying a first encryption function E() in order to perform an homomorphic encryption of plaintext P by combining it with a first encryption key eHE provisioned in said second communication device. The method comprises the following steps carried out by the first communication device (100): receiving (200) from the remote database (102) the first ciphertext C; generating (201) a second ciphertext C' by applying a second encryption function F() that combines a single-use encryption key K generated by a random number generator with the first ciphertext C; transmitting (202) the second ciphertext C' to a second remote server (103) provisioned with a first decryption key dHE corresponding to the first encryption key eHE; receiving (203) from the second remote server (103) a third ciphertext M generated by applying a first decryption function D() corresponding to the first encryption function E() in order to combine the second ciphertext C' with the first decryption key dHE; retrieving (204) the plaintext P by applying a second decryption function G() corresponding to the second encryption function F() in order to combine the single-use encryption key K with the third ciphertext M.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

32.

SMART CARD WITH SECURED ELECTRONIC MODULE AND MANUFACTURING METHOD TECHNICAL FIELD

      
Application Number EP2018077387
Publication Number 2019/072791
Status In Force
Filing Date 2018-10-09
Publication Date 2019-04-18
Owner GEMALTO SA (France)
Inventor
  • Degeilh, Line
  • Janvrin, Rémy
  • Dossetto, Lucile
  • Ottobon, Stéphane

Abstract

The invention relates to a smart card (100) comprising: - a card body (120) comprising a cavity and a front side provided with a first printed pattern (123), and - an electronic module (110) accommodated in the cavity of the card body and comprising a dielectric support (116) equipped, on a first side, with an electronic chip and, on a second side, with an area of electrical contacts (117), wherein the dielectric support (116) is formed from an at least partially transparent material and partially covers the first printed pattern (123) of the card body, so that a portion of said first printed pattern is visible, due to transparency, through the dielectric support.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory

33.

A METHOD FOR TRANSMITTING TO A PHYSICAL OR VIRTUAL ELEMENT OF A TELECOMMUNICATIONS NETWORK AN ENCRYPTED SUBSCRIPTION IDENTIFIER STORED IN A SECURITY ELEMENT, CORRESPONDING SECURITY ELEMENT, PHYSICAL OR VIRTUAL ELEMENT AND TERMINAL COOPERATING WITH THIS SECURITY ELEMENT

      
Application Number EP2018076850
Publication Number 2019/068731
Status In Force
Filing Date 2018-10-02
Publication Date 2019-04-11
Owner GEMALTO SA (France)
Inventor
  • Bradley, Paul
  • Pauliac, Mireille

Abstract

The invention concerns a method for transmitting to a physical or virtual element (11) of a telecommunications network an encrypted subscription identifier stored in a security element (13 - SUCI), or an encrypted identifier of the security element (13) or an encrypted identifier of a terminal (12) cooperating with the security element (13), characterized in that it consists in pre-calculating proactively at the occurrence of an event the encrypted identifier using a key and storing it in a file or memory of the security element (13) with a parameter enabling the key to be calculated by the element (11) of the telecommunications network in order to be able to transmit to the element (11) of the telecommunications network the encrypted identifier and the parameter, without having to compute the encrypted identifier when the terminal (12) is asking for it.

IPC Classes  ?

34.

METHOD AND SYSTEM FOR CARRYING OUT A PAYMENT TRANSACTION ON A BANK TERMINAL USING AN ELECTRONIC DEVICE

      
Application Number EP2018076876
Publication Number 2019/068742
Status In Force
Filing Date 2018-10-02
Publication Date 2019-04-11
Owner GEMALTO SA (France)
Inventor
  • Lemaire, François
  • Lambert, Jean

Abstract

The invention relates to a method for carrying out a payment transaction on a bank terminal (2, POS) using an electronic payment device (1), said device comprising at least two payment applications (1-4), said method comprising: - a step of data communication (STATUS) from the device to the terminal during a transaction, said data comprising at least information of a first type (ADF) identifying each payment application of the device; - a step of configuring the device so that said data comprise information of a first type (ADF) relative to at least one disabled payment application (1, 3). The invention likewise relates to the corresponding system.

IPC Classes  ?

  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards

35.

METHOD FOR THE INSERTION OF GUILLOCHE PATTERNS, METHOD FOR THE EXTRACTION OF GUILLOCHE PATTERNS, METHOD FOR THE AUTHENTICATION OF THESE GUILLOCHE PATTERNS AND DEVICES FOR IMPLEMENTATION

      
Application Number EP2018075980
Publication Number 2019/063556
Status In Force
Filing Date 2018-09-25
Publication Date 2019-04-04
Owner GEMALTO SA (France)
Inventor
  • Leibenguth, Joseph
  • Jourlin, Michel
  • Carré, Maxime
  • Bouabdellah, Mohamed

Abstract

The invention concerns a method of inserting guilloche patterns in a document, each guilloche pattern being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure, the method comprising an operation (300-600) of determining an insertion intensity of each guilloche pattern previously generated (100) on the basis of a mid-gray level of the document near said guilloche pattern. The invention also concerns a device for implementing this insertion method. The invention also concerns a method for extracting guilloche patterns (601 -608) from a secure document (600) likely to be degraded, the method comprising the following operations: - determining (710) a contrast card (c) of at least one portion of the secure document that includes the guilloche patterns; - identifying (720), on this contrast card an optimal percolation trajectory; and - extracting (730) the optimal percolation trajectory, said trajectory corresponding to the guilloche pattern. The invention also concerns a method of authentication of the guilloche patterns of a secure document likely to be degraded, involving: - the preceding extraction operations, and - an operation (740) of comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.

IPC Classes  ?

36.

METHOD FOR GENERATING VARIABLE GUILLOCHE PATTERNS, IMPLEMENTING DEVICE AND IDENTIFICATION DOCUMENT COMPRISING SUCH PATTERNS

      
Application Number IB2018057608
Publication Number 2019/064286
Status In Force
Filing Date 2018-10-01
Publication Date 2019-04-04
Owner
  • GEMALTO SA (France)
  • CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
  • UNIVERSITE JEAN MONNET SAINT ETTIENNE (France)
Inventor
  • Leibenguth, Joseph
  • Fournel, Thierry
  • Coltuc, Dinu

Abstract

The invention relates to a method for generating 1 D guilloche patterns able to be affixed on a document, each guilloche pattern (201 -228) being able to encode variable alphanumeric data providing a different appearance to each guilloche pattern, the method comprising the following operations: formatting (420) alphanumeric data (410) to be encoded in the form of a predefined number of data blocks with a predefined size; generating a carrier function (430) comprising a plurality of parameters, the formatted data blocks forming at least one of the parameters; and modulating (450) the carrier function by the formatted data blocks so as to encode the alphanumeric data (410) graphically, each data block defining a guilloche pattern (201 -228), the number of data blocks (n) defining the number of guilloche patterns, the carrier function associated with a formatted data block is modulated locally, each datum of the block being encoded locally in the guilloche pattern, by interpolation of a predefined point associated with the carrier function.

IPC Classes  ?

  • B42D 25/337 - Guilloche patterns
  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
  • H04N 1/32 - Circuits or arrangements for control or supervision between transmitter and receiver

37.

METHOD OF MANAGING A NFC TRANSACTION

      
Application Number EP2018074040
Publication Number 2019/063262
Status In Force
Filing Date 2018-09-06
Publication Date 2019-04-04
Owner GEMALTO SA (France)
Inventor
  • Courtiade, Fabien
  • Zaiti, Reda
  • Boulard, Laurent

Abstract

Method for managing a NFC transaction between a NFC reader and a device including an application and a NFC controller having an ability to communicate in contactless mode which is deactivated. The device includes an indicator uniquely associated with the application. This indicator is set to either a first or a second value. When the NFC controller is awakened by the electromagnetic field generated by the NFC reader, it sends a first message to the application. On receipt of the first message, the application checks the indicator and activates the NFC controller ability to communicate in contactless mode only if the indicator is set to the first value. The NFC transaction is performed through the NFC controller and when the NFC transaction is ended the NFC controller sends a second message to request the application to deactivate the NFC controller ability to communicate in contactless mode.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06F 1/32 - Means for saving power

38.

METHOD FOR AMENDING THE FIRMWARE OF A RESOURCE CONSTRAINED DEVICE

      
Application Number EP2018074307
Publication Number 2019/052944
Status In Force
Filing Date 2018-09-10
Publication Date 2019-03-21
Owner GEMALTO SA (France)
Inventor
  • Lepavec, Emmanuel
  • Bouveron, Dominique
  • Minette De Saint Martin, Xavier
  • Vienne, Nicolas
  • Phan, Guillaume Chi-Dan

Abstract

1. Method for amending the firmware (3) of a device (1), the device comprises a memory unit (2) and a firmware amending software (4), and the firmware comprises: at least two functional components (9.1, 9.2), wherein the first functional component comprises at least one public function (11.1, 11.2), configured to be called by at least one second functional component different from the first functional component, a call dispatch unit (5), where each call addressing one of the public functions is dispatched, further the device comprises in the memory unit (2) a functional component table (10), wherein at least one of the functional components is registered, and the device comprises a set of access rights (17) governing access to said at least one public function (11.1), wherein the firmware amendment comprises the steps for the firmware amending software (4) of: storing a new functional component (9.3) at a memory location (14) of the memory unit (2), updating the functional component table (10) with the memory location of said new functional component, and handing over control to the firmware (3), wherein a call of the at least one public function (11.1) of the first functional component (9.1) comprises for the second functional component (9.2) executing a call of the call dispatch unit (5), wherein the call to the call dispatch unit includes a target indication relative to the first functional component and the public function to be called, and wherein the calling of the at least one public function comprises for the call dispatch unit the step of calling the public function indicated by the target indication by retrieving the memory location (14) of the first functional component from the functional component table (10), and wherein the calling of the at least one public function comprises for the call dispatch unit (5) the step of checking the set of access rights for the second functional component (9.2) before calling the indicated public function of the first functional component (9.1).

IPC Classes  ?

  • G06F 8/654 - Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories

39.

DATA CARRIER AND A METHOD FOR PRODUCING SUCH DATA CARRIER

      
Application Number EP2018075160
Publication Number 2019/053281
Status In Force
Filing Date 2018-09-18
Publication Date 2019-03-21
Owner GEMALTO SA (France)
Inventor Pohjola, Teemu

Abstract

The present invention relates generally a method to authenticate a data carrier, such as passports, licenses, identification card…by hiding at least two optically encoded image within a data carrier so that the data carrier is authenticated through at least two factor authentication process. In the methods of the present invention, at least two reliable, readable optically encoded image are hidden within the data carrier wherein each of the encoded image is visible through a same decoder device but under different specific lighting conditions without the former having influence on the quality of the latter. The authentication methodology of the present invention provides an improved security, being even more difficult to reproduce by infringers, even more difficult to remove, replace or exchange and easy to check.

IPC Classes  ?

  • G06K 9/18 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints using printed characters having additional code marks or containing code marks, e.g. the character being composed of individual strokes of different shape, each representing a different code value
  • G06K 9/26 - Image acquisition using a slot moved over the image
  • B42D 25/30 - Identification or security features, e.g. for preventing forgery

40.

A FIRST COMMUNICATION DEVICE CONFIGURED TO COMMUNICATE USING A SHORT RANGE WIRELESS INTERFACE WITH A SECOND COMMUNICATION DEVICE FOR UNLOCKING A BOOT SEQUENCE

      
Application Number EP2018074469
Publication Number 2019/053008
Status In Force
Filing Date 2018-09-11
Publication Date 2019-03-21
Owner GEMALTO SA (France)
Inventor Bernabeu, Gil

Abstract

This invention relates to a first communication device (201) configured to communicate using a short range wireless interface (216) with a secure enclave (211) embedded in a second communication device (200), the second communication device (200) further comprising a main processor (210) adapted to execute at least one portion of a boot sequence (214), said secure enclave (211) implementing a boot application (215) configured to lock the at least one portion of the boot sequence (214) of the second communication device (200) such that it cannot be executed when an electronic signature derived from the at least one portion is not matching with a reference electronic signature memorised by the secure enclave (211) and associated to said at least one portion, wherein the first communication device is further configured to establish (302) with the secure enclave (211) a secure communication channel, receive audit data from the secure enclave (211) in order to verify if at least one portion of the boot sequence is locked; transmit to the secure enclave (211) a message for unlocking the at least one locked portion of the boot sequence.

IPC Classes  ?

  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 9/4401 - Bootstrapping
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

41.

A METHOD FOR ALLOCATING TEMPORARILY A SUBSCRIPTION TO A CREDENTIAL CONTAINER

      
Application Number EP2018074470
Publication Number 2019/053009
Status In Force
Filing Date 2018-09-11
Publication Date 2019-03-21
Owner GEMALTO SA (France)
Inventor
  • Anslot, Michel
  • Lamberton, Marc

Abstract

This invention relates to a method for a credential container embedded into a wireless communication device (300) to obtain a temporary wireless connectivity through a first wireless network (MNO1), the credential container being provisioned with an identifier ID identifying the wireless communication device or the credential container and a pre-loaded subscription profile comprising a range of International Mobile Subscription Identifiers (IMSI) associated to a second network operator (MNO2).

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data

42.

METHOD TO PREVENT UNAUTHORIZED ACCESS TO A CONTACTLESS DEVICE

      
Application Number EP2018075187
Publication Number 2019/053283
Status In Force
Filing Date 2018-09-18
Publication Date 2019-03-21
Owner GEMALTO SA (France)
Inventor
  • Rantala, Janne
  • Massbacka, Janne

Abstract

This invention relates generally to a method of preventing unauthorized access to a contactless device. The invention relates more particularly to the field of methods implemented so that an owner consent is provided to a reader before any access to its contactless device. The invention proposes to introduce slight modification on the behavior of the contactless device and an adaptation from the reader. With the present invention, the reader need to know in advance the UID of the contactless device he would like to establish a communication. The UID is generated by the reader from identity information provided by a positive action corresponding to a user consent. The present invention proposes to send a SELECT command directly to the corresponding contactless device with the complete UID, without using the ANTICOLLISION loop compliant with the standard 14443 type A. The contactless device will grant access to only reader sending a SELECT command with the complete UID.

IPC Classes  ?

  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

43.

METHOD FOR SECURING A MACHINE LEARNING BASED DECISION SYSTEM

      
Application Number EP2018070743
Publication Number 2019/038036
Status In Force
Filing Date 2018-07-31
Publication Date 2019-02-28
Owner GEMALTO SA (France)
Inventor
  • Dao, Frédéric
  • Dandelot, Thomas
  • Paillart, Frédéric
  • Faure, Frédéric
  • Delhoste, Fabrice

Abstract

The present invention relates to a method for securing a system being configured to perform decision tasks carried out by a machine learning engine, equipped for operating with at least one machine learning model, the system comprising at least one training component for improving the at least one machine learning model, a device for carrying out decisions based on said machine learning model and a set of input data, and an interaction interface for exchanging said at least one machine learning model between training component and device, wherein the device comprises a model attestation checker, the method comprising the steps of: for the device: -acquiring input data, -ascertaining at least one machine learning model over the interaction interface, for the model attestation checker: -checking if said at least one machine learning model is trusted by a model attestation, -considering by the machine learning engine for said decision making only those machine learning models that are trusted, for the machine learning engine: -carrying out the decision task for acquired input data by using said at least one trusted machine learning model, -providing a result attestation for the decision output.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • G06F 19/24 - for machine learning, data mining or biostatistics, e.g. pattern finding, knowledge discovery, rule extraction, correlation, clustering or classification
  • G06N 5/00 - Computing arrangements using knowledge-based models
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass

44.

METHOD FOR AUTHENTICATING A USER AND CORRESPONDING USER DEVICES, SERVER AND SYSTEM

      
Application Number EP2018071941
Publication Number 2019/034619
Status In Force
Filing Date 2018-08-13
Publication Date 2019-02-21
Owner GEMALTO SA (France)
Inventor Hutchinson, Michael

Abstract

The invention relates to a method (20) for authenticating a user. A server (14) accesses a user identifier associated with a second user device (16) identifier. The server accesses, for the user, a predetermined reference location(s) within a reference table. The method comprises: Sending from a first user device (12) to the server, through a first communication channel, a message (24) including the user identifier and a request to get a challenge table. Generating (26), by the server, a first challenge table including a valid first set of characters. Sending, thanks to the second user device identifier, from the server to the second user device, through a second communication channel, a message (210) including the first challenge table and a first request to display the first challenge table. Displaying (212), by or through the second user device, the first challenge table. Selecting (216), by a user, through a first user device man machine interface, a a selected character(s). Sending, from the first user device to the server, through the first communication channel, a message (220) including the selected character(s), as submitted user authentication data. Determining (224), by the server, based upon the predetermined reference location(s) within the first challenge table a corresponding reference character(s), as reference user authentication data. Verifying (226), by the server, for the user, whether the submitted user authentication data does or does not match the reference user authentication data. And, only if yes, succeeding, by the server, in authenticating the user. The invention also relates to corresponding user devices (12) and (16), server (14) and system (10).

IPC Classes  ?

  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/36 - User authentication by graphic or iconic representation
  • G06F 21/42 - User authentication using separate channels for security data
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

45.

METHOD TO SECURE A SOFTWARE CODE PERFORMING ACCESSES TO LOOK-UP TABLES

      
Application Number EP2018069409
Publication Number 2019/025181
Status In Force
Filing Date 2018-07-17
Publication Date 2019-02-07
Owner GEMALTO SA (France)
Inventor
  • Adjedj, Michael
  • Leveque, Sylvain

Abstract

0 1n0 1nPPPP).

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

46.

CONSENSUS PROTOCOL FOR PERMISSIONED LEDGERS

      
Application Number EP2018069347
Publication Number 2019/020428
Status In Force
Filing Date 2018-07-17
Publication Date 2019-01-31
Owner GEMALTO SA (France)
Inventor Gouget, Aline

Abstract

The present invention relates to a method for reaching a consensus for appending, at a current round (j), a new block of data to a permissioned ledger distributed through a network comprising network connected devices authorized by the ledger, called nodes, said method being performed by a tamper-proof computing device configured for managing securely digital keys and comprising a random number generator and a cryptoprocessor for generating signatures with said keys, and comprising, for a set of transactions to be validated, the steps of : - receiving (S2), from at least a first node (Nk), a candidate block (Bj,Nk) computed by said first node on transactions among said set of transactions, - for each received candidate block, generating a random value (RAND) (S3) by the random number generator, and generating (S4) a signed selection message comprising: an identifier of the current round (j), said received candidate block (B j,Nk ) and said generated random value (RAND) by said cryptoprocessor, - broadcasting (S5) said signed selection messages to the nodes of said network, enabling them to select the new block (Bj) to be appended to the ledger for the current round based on said random values comprised in said signed selection messages.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

47.

METHOD FOR AUTHENTICATING A USER AND CORRESPONDING USER DEVICE, SERVER AND SYSTEM

      
Application Number EP2018068410
Publication Number 2019/016000
Status In Force
Filing Date 2018-07-06
Publication Date 2019-01-24
Owner GEMALTO SA (France)
Inventor
  • Suwirya, Darmawan
  • Ali, Asad Mahboob

Abstract

The invention relates to a method for authenticating a user. A server registers at least one user identifier associated with at least one identifier relating to at least one reference short range communication device to be detected in a vicinity of at least one user device. The method comprises the following steps:connecting to the server from a user device, loading from the server to the user device data including executable data, detecting by the user device, while executing the executable data, whether at least one identifier relating to at least one short range communication device does or does not exist in a vicinity of the user device, sending from the user device to the server at least one user identifier accompanied with the at least one detected short range communication device identifier only if the at least one identifier relating to at least one detected short range communication device exists in the vicinity of the user device, verifying by the server for the identified user whether the at least one detected short range communication device identifier or no detected short range communication device identifier does or does not match at least a predetermined part of the at least one reference short range communication device identifier. The method further comprises: granting access from the server only if the at least one detected short range communication device identifier matches the at least predetermined part of the at least one reference short range communication device identifier, or denying access while requesting user authentication data by sending from the server to the user device a corresponding message only if the at least one detected short range communication device identifier or no detected short range communication device identifier does not match the at least predetermined part of the at least one reference short range communication device identifier. The invention also relates to corresponding user device, server and system.

IPC Classes  ?

  • H04W 12/06 - Authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 8/00 - Network data management
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 48/02 - Access restriction performed under specific conditions
  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

48.

A METHOD FOR GRANTING ACCESS TO A SERVICE PROVIDED BY A CONNECTED DEVICE

      
Application Number EP2018067650
Publication Number 2019/007849
Status In Force
Filing Date 2018-06-29
Publication Date 2019-01-10
Owner GEMALTO SA (France)
Inventor
  • Schmitt, Sébastien
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frederic

Abstract

The invention relates to a method for granting access to a service provided by a connected device (202) for a user having a user's device (201) and requesting said access, the method comprising the steps of: receiving (211) by the user's device (201) from the connected device (202) a request to validate a user profile, a user profile corresponding to a list of at least one data item representing the user's capabilities to use a service provided by the given connected device; requesting by the user's device (201) to a verification server (203) associated to the at least one data item to validate said data item, and receiving (213) a digital signature of said data item generated by the verification server (203) as a proof of the validation; transmitting (214) the data item of the user profile and its digital signature to a device (200) belonging to the owner of the connected device (202) for it to be informed that said data item is validated, the user profile being considered as validated when the digital signatures of all the data items listed in the user profile are correctly verified by the owner's device; granting (230, 231) for the user access to the service provided by the connected device (202) when the user profile is validated.

IPC Classes  ?

  • H04W 12/08 - Access security
  • G07F 7/00 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
  • G06Q 30/06 - Buying, selling or leasing transactions
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles

49.

ELECTRONIC DEVICE WITH BIOMETRIC FINGERPRINT SENSOR FOR ASSISTANCE IN THE CAPTURE OR READING OF A DIGITAL FINGERPRINT

      
Application Number EP2018067662
Publication Number 2019/007853
Status In Force
Filing Date 2018-06-29
Publication Date 2019-01-10
Owner GEMALTO SA (France)
Inventor Martinez, Frédéric

Abstract

The invention relates to an electronic monitoring device comprising a card body (2) or accessory to be carried, a fingerprint sensor (5) opening out at the surface (3) of the body, a first mark on the body for assisting in an initial positioning (24) of a finger (6s, 6g) of a user at a first predetermined location, in order to capture said digital fingerprint information. The device is characterized in that it is configured to present at least one second visible and/or tactile positioning mark (21-23) near the fingerprint sensor, said second mark forming a guide for (or leading to) a second positioning of the finger at a second location distinct from the first predetermined location. The invention also relates to a method and system for assistance in the capture or reading of a digital fingerprint using the electronic device.

IPC Classes  ?

  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards

50.

METHOD FOR SECURING A CRYPTOGRAPHIC PROCESS WITH SBOX AGAINST HIGH-ORDER SIDE-CHANNEL ATTACKS

      
Application Number EP2018067421
Publication Number 2019/002470
Status In Force
Filing Date 2018-06-28
Publication Date 2019-01-03
Owner GEMALTO SA (France)
Inventor Vigilant, David

Abstract

010110212011,11,1111,121,11,i1,i-11,i-11,i-11,i1,i-11,i00 in at least said first round of the cryptographic process.

IPC Classes  ?

  • G06F 7/76 - Arrangements for rearranging, permuting or selecting data according to predetermined rules, independently of the content of the data
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering

51.

DATA CARRIER WITH TACTILE PRINTED AREA FOR INK WRITING DATA

      
Application Number EP2018067644
Publication Number 2019/002577
Status In Force
Filing Date 2018-06-29
Publication Date 2019-01-03
Owner GEMALTO SA (France)
Inventor Kaskiala, Toni

Abstract

The present invention relates generally to a data carrier comprising a data sheet. Said data sheet comprises a substrate material wherein at least one printed area is printed. Said printed area is configured for ink written signature. Said printed area is produced by imprinting via intaglio printing and comprises tactile perceptibility structured embossed pattern produced by the imprinting. Said tactile structured embossed pattern is configured to hold the ink of the ink written. The present invention prevents unwanted smudging or spreading when writing on the printed area. Moreover, the present invention addresses also the forgery and manipulation drawbacks on ink written data on data carrier.

IPC Classes  ?

52.

COMPUTING DEVICE PROCESSING EXPANDED DATA

      
Application Number EP2018066487
Publication Number 2018/234415
Status In Force
Filing Date 2018-06-20
Publication Date 2018-12-27
Owner GEMALTO SA (France)
Inventor
  • Madec, Steven
  • Vigilant, David

Abstract

The present invention relates to a computing device (101) for executing a first cryptographic operation of a cryptographic process on useful input data (d1), said computing device comprising a first processor (2011), a second processor (2012) and a selection circuit (207) wherein : - said selection circuit (207) is configured : - for receiving, from an input bus (208), expanded input data (d1') obtained by interleaving dummy input data (r1) with said useful input data (d1), - for determining positions of the dummy input data (r1) in said expanded input data (d1'), - and for extracting said dummy input data (r1) and said useful input data (d1) from the expanded input data (d1') based on said determined positions, - said first processor (2011) is configured for executing said first cryptographic operation of said cryptographic process on said extracted useful input data (d1) to obtain useful output data (d2), - said second processor (2012) is configured for executing a second operation on said extracted dummy input data (r1) to obtain dummy output data (r2), said computing device being configured for having said operations executed such that leakage generated by said first cryptographic operation is jammed by leakage generated by the second operation.

IPC Classes  ?

  • G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

53.

METHOD FOR MUTUAL SYMMETRIC AUTHENTICATION BETWEEN A FIRST APPLICATION AND A SECOND APPLICATION

      
Application Number EP2018058641
Publication Number 2018/228732
Status In Force
Filing Date 2018-04-04
Publication Date 2018-12-20
Owner
  • GEMALTO SA (France)
  • SAFENET CANADA INC. (Canada)
Inventor
  • Huapaya, Luis Miguel
  • Praden, Anne Marie

Abstract

A first server exchanges with a second server a master (symmetric) key(s). The first server sends to the first application the master key(s). The second server generates dynamically a first derived key by using a generation parameter(s) and a first master key. The second server sends to the second application the first derived key and the generation parameter(s). The second application generates and sends to the first application a first (key possession) proof and the generation parameter(s). The first application verifies successfully by using the generation parameter(s), the first master key and the first proof, that the first proof has been generated by using the first derived key, generates and sends to the second application a second (key possession) proof. The second application verifies successfully that the second proof has been generated by using the first derived key, as a dynamically generated and proven shared key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

54.

METHOD FOR MANAGING A LINK BETWEEN TWO USERS

      
Application Number EP2018063292
Publication Number 2018/228781
Status In Force
Filing Date 2018-05-22
Publication Date 2018-12-20
Owner GEMALTO SA (France)
Inventor
  • Alicki, Artur
  • Ohanian, Henri
  • Martin, Pierre
  • Sieprawski, Nicolas

Abstract

Method for managing a link between two users The invention is a method for managing a link between first and second users (UA, UB). The first user owns a first private reference(PA) and has a first terminal (TA). The second user owns a second private reference(PB) and has a second terminal(TB). The first terminal shares with the second terminal a first identifier (H[0,1]). The second terminal shares with the first terminal a second identifier (H[0,2]). Both terminals separately compute from said first and second identifiers a common agreement token (HRoot[1,0]) which reflects thelink. The first terminal provides a first set comprising theagreement token (HRoot[1,0]), the first identifier (H[0,1]) and the first private reference to a trusted entity (TE) which records said first set. Similarly, the second terminal provides a second set comprising theagreement token (HRoot[1,0]), the second identifier (H[0,2]) and the second private reference(PB) to the trusted entity which records thesecond set.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

55.

METHOD FOR MANAGING AN INSTANCE OF A CLASS

      
Application Number EP2018062414
Publication Number 2018/228763
Status In Force
Filing Date 2018-05-14
Publication Date 2018-12-20
Owner GEMALTO SA (France)
Inventor
  • Phan, Guillaume Chi-Dan
  • Minette De Saint Martin, Xavier
  • Vienne, Nicolas

Abstract

The invention is a method for managing an instance (15) of a class in a secure element (10) embedded in a hosting machine (20) and including a Central Processing Unit (12), a storage area (13) and a virtual machine (141). The method comprises a step of receiving by the secure element aload file (30) containing a binary representation of a package of the class and a step of instantiating the instance from the package and storing the instance in the storage area. The load file includes a specific component (40) which is a custom component withinthe meaning of Java Card™ specifications and which contains executable data (41). The instance requests the execution of a subset of said executable data by directly invoking said subset of executable data through an Application Programming Interface.

IPC Classes  ?

  • G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

56.

METHOD OF CONTROLLING COMPLIANCE BETWEEN A PAYMENT KEY AND A CARDHOLDER VERIFICATION METHOD

      
Application Number EP2018062613
Publication Number 2018/228767
Status In Force
Filing Date 2018-05-15
Publication Date 2018-12-20
Owner GEMALTO SA (France)
Inventor
  • Bellet, François
  • Bourachot, Pascal
  • Affouard, Baptiste

Abstract

The invention is a method for controlling that a payment key(41) used in a payment transaction is compliant with a cardholder verification method (71). The method comprises the steps of: -receiving at a server (30) transaction data (80) reflecting the payment transaction, said transaction data including an amount (81), a cryptogram (82) computed using said payment key and a seed (51)used to derive said payment key, -identifying a key index (61) from a risk parameter extracted fromsaid transaction data or specific to previous payment transactions, said key index reflecting said cardholder verification method, and -checking that said key index and said seed are linked bya predefined mathematical function.

IPC Classes  ?

  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/38 - Payment protocolsDetails thereof

57.

METHOD FOR CONTROLLING PHYSICAL ACCESS TO A RESTRICTED SPACE

      
Application Number EP2018062975
Publication Number 2018/224287
Status In Force
Filing Date 2018-05-17
Publication Date 2018-12-13
Owner IGEMALTO SA (France)
Inventor
  • Martinez, Frédéric
  • Caruana, Jean-Paul

Abstract

The invention is a method for controlling physical access to a restricted space. A gateless control area is located at an entrance of the restricted space and is equipped with both an image sensor (40) and an Ultra- Wideband reader (30). The method comprises the steps of: -selecting a user (80) from a crowd (60) located in the gateless control area and capturing both a digital picture and coordinates of the user, -extracting from the digital picturea measured biometric pattern, -securely reading a secure data memorized in a wearable identity device (50) whose distance with said coordinates is less than a predetermined thresholdand getting a reference biometric pattern(52) using said secure data, -checking that said measured biometric pattern matches said reference biometric pattern, the user being identified as authorized only in case of successful checking.

IPC Classes  ?

  • G07C 9/00 - Individual registration on entry or exit
  • G08B 13/00 - Burglar, theft or intruder alarms

58.

METHOD FOR AUTHENTICATING A FIRST USER AND CORRESPONDING FIRST DEVICE AND SYSTEM

      
Application Number EP2018064606
Publication Number 2018/224433
Status In Force
Filing Date 2018-06-04
Publication Date 2018-12-13
Owner GEMALTO SA (France)
Inventor
  • Le Cardinal, Daniel
  • Pin, Yannick
  • Aillaud, Christophe

Abstract

The invention relates to a method (20) for authenticating a first user. A device (12) accesses a sequence (20) of at least one reference graphical item, as a reference graphical item sequence. The reference graphical item sequence is known only to the first user. The method comprises the following steps. The (or another cooperating) device requests a user to point consecutively at at least one area in which at least one graphical item is included. The (or another cooperating) device (presents (410) a sequence of at least one graphical item. The (or another cooperating) device captures (414) a sequence of at least one area pointed by the userby detecting at least one predetermined change relating to at least one physical user feature to validate each or at least one user pointed area. The (or another cooperating) device verifies (418) whether the sequence of the at least one user pointed area does or does not include the reference graphical item sequence. And the (or another cooperating) device authenticates (420) the first user only if the sequence of the at least one user pointed area includes the reference graphical item sequence. The invention also relates to corresponding device and system.

IPC Classes  ?

  • G06F 21/36 - User authentication by graphic or iconic representation
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • H04W 12/06 - Authentication
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards

59.

A METHOD FOR PERSONALIZING A SECURE ELEMENT, CORRESPONDING APPLICATION AND SECURE ELEMENT

      
Application Number EP2018064638
Publication Number 2018/224445
Status In Force
Filing Date 2018-06-04
Publication Date 2018-12-13
Owner GEMALTO SA (France)
Inventor
  • El Marouani, Abdellah
  • Le Saux, Nicolas
  • Rade, Daniel

Abstract

The invention concerns a secure element comprising: - pre-issuance data installed in said secure element in a first physical personalization site; - an application triggered at each reset of said secure element before all data allowing said secure element to be operational are installed in said secure element, said application constituting a firewall for the installation on said secure element of post-issuance data through a secure channel in a second physical personalization site.

IPC Classes  ?

60.

A METHOD FOR PROVISIONING A DEVICE WITH AN INFORMATION ELEMENT ALLOWING TO IDENTIFY UNAUTHORIZED USERS IN A RESTRICTED AREA

      
Application Number EP2018064971
Publication Number 2018/224579
Status In Force
Filing Date 2018-06-07
Publication Date 2018-12-13
Owner GEMALTO SA (France)
Inventor
  • Caruana, Jean-Paul
  • Leroy, Pascal
  • Martinez, Frédéric

Abstract

This invention relates to a method for provisioning a wireless control device (115) with an information element allowing to identify visually at least one unauthorized user in a restricted area, the restricted area comprising a gateless control area being equipped with at least an image sensor (112) and an electronic reader (113) supporting a short range radio technology allowing to read data memorized into a wearable device (111) carried by a user (110). The method comprises the steps of: providing (120, 121) by the image sensor a digital image of at least one user that is detected as passing through the gateless control area; extracting from the provided digital image of the detected user a first face detection dataset; providing (122, 123) by the electronic reader a second face detection dataset memorized in a wearable device carried by said detected user; applying (130) facial recognition over the first and second face detection datasets in order to determine if the user associated to the first face detection dataset is the same as the one associated to the second face detection dataset, the detected user being identified as authorized in that case and identified as unauthorized otherwise; sending (126) to a wireless control device a message comprising an information item adapted to ease the visual identification of an unauthorized user.

IPC Classes  ?

61.

METHOD FOR MANAGING EXECUTION OF AN OPERATING SYSTEM IN A DEVICE

      
Application Number EP2018058640
Publication Number 2018/197171
Status In Force
Filing Date 2018-04-04
Publication Date 2018-11-01
Owner GEMALTO SA (France)
Inventor
  • Guichard, Olivier
  • Fabre, Thierry
  • Chene, Gilles

Abstract

The invention is a method for managing execution of a normal operating system (30) in a device (10) comprising a hardware platform (20) and a bare metal hypervisor (32) controlling all requests for access to the hardware platform. The hypervisor handles two separate environments: a normal execution environment, NEE, and a secure execution environment, SEE. The NEE comprises a normal operating system and the SEE comprises a secure operating system (50). The SEE comprises a DRM agent (40) run by the secure operating system. The hypervisor schedules execution of normal and secure operating systems in parallel. The DRM agent assesses a validity of a right to use the device by checking a parameter and sends a message reflecting said validity to the hypervisor. The hypervisor denies execution of the normal operating system if the right to use the device is invalid.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G06F 21/44 - Program or device authentication

62.

A METHOD FOR MANAGING THE REPUTATION LEVEL OF A COMMUNICATION DEVICE

      
Application Number EP2018059266
Publication Number 2018/192818
Status In Force
Filing Date 2018-04-11
Publication Date 2018-10-25
Owner GEMALTO SA (France)
Inventor
  • Ferreira, Marcio
  • Schmitt, Sébastien
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frédéric
  • Boutie, Cédric
  • Huguenin, David

Abstract

The invention relates to a method for managing the reputation level of a first communication device (100), said reputation level (103) being stored into a first secure enclave (102) embedded in said first communication device (100). The method comprises the steps of: receiving from the first communication device (100) by a second communication device (110) an information message; verifying that the information message is consistent with data obtained from a sensor embedded in the second communication device (110); generating a feedback message by the second communication device (110) to be transmitted to the first communication device (100) indicating if the information message is consistent for the secure enclave (102) of the first communication device (100) to update its reputation level.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/10 - Integrity
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04W 12/12 - Detection or prevention of fraud

63.

ENCRYPTED MEMORY CARD

      
Application Number EP2018056994
Publication Number 2018/188911
Status In Force
Filing Date 2018-03-20
Publication Date 2018-10-18
Owner GEMALTO SA (France)
Inventor
  • Lacouture, Dominique
  • Lambert, Patrick
  • Rocha Furtado, Daniel

Abstract

The present invention relates to a memory card comprising a memory, a processor, an interface and a positioning system, said memory card being configured for being inserted in a user apparatus, for storing a first encryption key generated depending on intended geo-parameter values and for, - when a command for writing first data in said memory is received from said user apparatus on the interface, encrypting said first data with said first encryption key by the processor and storing said encrypted first data in said memory, - when a user command for reading said first data stored in said memory is received from said user apparatus on the interface, ○ obtaining current geo-parameter values from said positioning system, ○ generating by said processor from the obtained current geo-parameter values a second encryption key and an associated decryption key, ○ verifying if said first and second encryption keys match and when the keys match, decrypting said encrypted first data stored in said memory by the processor with said decryption key and outputting said decrypted encrypted first data to said user apparatus (2) on said interface.

IPC Classes  ?

  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

64.

METHOD FOR RENEWING A CERTIFICATE IN A SECURE ELEMENT

      
Application Number EP2018057124
Publication Number 2018/184841
Status In Force
Filing Date 2018-03-21
Publication Date 2018-10-11
Owner GEMALTO SA (France)
Inventor
  • Dubois, Denis
  • Duprez, Jérôme
  • Dao, Frédéric

Abstract

The invention proposes a secure element (10) cooperating with a telecommunication terminal, the secure element (10) being provisioned with: - A secret key of a proxy server (31); - A secret key shared with a certificate delivery server (30) of the manufacturer of the secure element (10); - A first certificate of the manufacturer of the secure element (10); the secure element (10) comprising a certificate renewal application (51) for: - Generating (35), at an triggering event (34): e- a new key pair composed by a new private key and a new public key; f- a Certificate Signing Request ciphered by the secret key shared with the delivery server (30) of the manufacturer of the secure element (10), and for sending the ciphered Certificate Signing Request also ciphered by the secret key of the proxy server (31) to the certificate delivery server (30) through the proxy server (31); the certificate renewal application (51) receiving from the certificate delivery server (30) through the proxy server (31) a second certificate generated by the certificate delivery server (30).

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

65.

PERMUTATION GENERATION

      
Application Number EP2018056997
Publication Number 2018/172342
Status In Force
Filing Date 2018-03-20
Publication Date 2018-09-27
Owner GEMALTO SA (France)
Inventor
  • Adjedj, Michael
  • Minette De Saint Martin, Xavier
  • Vienne, Nicolas

Abstract

The present invention relates to a permutation generator circuit comprising: - a first memory storing an input vector of N input numbers, N being a first integer value, and a second integer value STEP coprime with a third integer value M; - a first processor and an output circuit configured to output input numbers one by one, and wherein: - said first processor is configured to select at least one of the input numbers located at the input vector indexes START + i * STEP modulo M, with i an integer in {0, 1,..., K-1}, START a first random integer value between 0 and N-1 and K a fourth integer value, - and said permutation generator circuit is configured to iteratively, until each input number has been output once: - either make the output circuit output the input number located at a current input vector index START + i * STEP modulo M, with i>=K, - or make the output circuit output one of the selected input numbers, and select the input number located at the current input vector index as selected input number for the next iterations, - and when the number of outputted input numbers is equal to (N – K), make the output circuit output one by one all selected input numbers.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 7/58 - Random or pseudo-random number generators

66.

METHOD OF RSA SIGNATURE OR DECRYPTION PROTECTED USING ASSYMETRIC MULTIPLICATIVE SPLITTING

      
Application Number EP2018056993
Publication Number 2018/172339
Status In Force
Filing Date 2018-03-20
Publication Date 2018-09-27
Owner GEMALTO SA (France)
Inventor Gouget, Aline

Abstract

The present invention relates to a method of secure generation of an RSA signature of a message to be signed with a private exponent component d of an RSA key (p, q, N, d, e), where e is a public exponent component, N is a RSA modulus, p and q are primes such that N = p.q and e.d = 1 modulo φ(Ν) with φ(.) Euler's function, wherein said private exponent component of the RSA key is split into at least a first private exponent component share and a second private exponent component share such that : - the product of said private exponent component shares is equal to said private exponent component d modulo φ(N) and, - one private exponent component share among said private exponent component shares, called server private exponent component share, is superior or equal to φ(N) and, - other private exponent component shares among said private exponent component shares, called client private exponent component shares, are inferior to φ(Ν), the smaller private exponent component share among the first and second private exponent component shares being a client private exponent component share called primal client private exponent component share and the bigger private exponent component share being the server private exponent component share said method comprising the following steps performed by a standalone client device comprising a memory, an interface and a processor: - obtaining a hashed message, said hashed message being computed by hashing said message with a public hash function H :{0,1}*-> Z*N; - generating a first part of the RSA signature from said hashed message and said first private exponent component share, - generating a second part of the RSA signature from said first part of the RSA signature and said second private exponent component share, - determining the RSA signature from said second part of the RSA signature, and wherein the step of generation of a part of the RSA signature from the primal client private exponent component share is performed using a whitebox protection method and the step of generation of a part of the RSA signature from the server private exponent component share is performed using lower security requirements.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/08 - Key distribution
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

67.

METHOD FOR OPTIMIZING A COLOUR LASER IMAGE AND DOCUMENT ON WHICH A COLOUR LASER IMAGE IS PRODUCED IN THIS WAY

      
Application Number EP2018055358
Publication Number 2018/166832
Status In Force
Filing Date 2018-03-05
Publication Date 2018-09-20
Owner GEMALTO SA (France)
Inventor Lesur, Jean-Luc

Abstract

The present invention generally relates to a method of forming a color laser image with a white or light color background, and a document having a final color laser personalized image made thereon in this way. The invention provides an assembly comprising a transparent protection layer over color subpixels printed on a laser markable layer. A first laser beam passes through the protection layer, through the subpixels and forms the gray levels of the final personalized image in the laser markable layer. A second laser with a single wavelength, preferably with a high-energy wavelength in the blue or ultraviolet spectrum, penetrates into the subpixels forming the light color of the background image and is absorbed by the color pigments which lose their absorption property, at least partially resulting in light color image representing the background of the final personalized image.

IPC Classes  ?

  • B41M 5/26 - Thermography
  • B41M 5/28 - Thermography using thermo-chromic compounds or layers containing liquid crystals, microcapsules, bleachable dyes or heat decomposable compounds, e.g. gas liberating

68.

METHOD FOR AUTHENTICATING A USER AND CORRESPONDING DEVICE, FIRST AND SECOND SERVERS AND SYSTEM

      
Application Number EP2018056739
Publication Number 2018/167298
Status In Force
Filing Date 2018-03-16
Publication Date 2018-09-20
Owner GEMALTO SA (France)
Inventor Hugot, Didier

Abstract

A first server 162 receives from a device(s) an identifier (22), retrieves (24) a reference credential(s) associated with the identifier(s), generates (28) a reference token(s) using the reference credential(s) and a predetermined key(s) and sends to a second server the reference token(s) and a script(s) for requesting the user to provide a credential(s) (210 and 212). The second server gets a device identifier(s) and sends to the device a request(s) (216) by executing (214) the script(s). The device gets (218) a submitted credential(s), generates (222) and sends to the second server a submitted token 224 generated by using the submitted credential(s) and the predetermined key(s) stored by the device. The second server compares (226) each of the submitted token(s) to the received reference token(s) and generates and sends to the first server a comparison and/or an authentication result(s) (236 and 238). The invention also relates to corresponding device, first and second server and system.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

69.

A METHOD FOR OPTIMIZING DATA EXCHANGES BETWEEN A FIRST AND AT LEAST ONE SECOND WIRELESS COMMUNICATION DEVICE

      
Application Number EP2018055832
Publication Number 2018/162678
Status In Force
Filing Date 2018-03-08
Publication Date 2018-09-13
Owner GEMALTO SA (France)
Inventor
  • Maunier, Gérald
  • Tressol, Ludovic
  • Dao, Frederic
  • Schmitt, Sébastien

Abstract

This invention relates to a method for anticipating the setup of a relation of trust between a first vehicle (100) called central vehicle and at least a second vehicle, wherein two interaction areas (130, 140) are defined relatively to the position of the central vehicle (100), the first interaction area (130) called exchange area comprising the central vehicle (100) and the second interaction area (140) called pre-authentication area being defined in a way that it has to be crossed by said second vehicle for it to enter into the exchange area (130), the method comprising the steps of: detecting if the second vehicle is localized in the pre-authentication area (140) associated with the central vehicle (100); authenticating the central vehicle (100) and the second vehicle if not already authenticated; upon successful authentication, providing the central vehicle (100) and the second vehicle with at least one credential to set up the relation of trust for it to be already established when the second vehicle is present in the exchange area associated with the central vehicle (100).

IPC Classes  ?

  • H04W 12/06 - Authentication
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor

70.

METHOD FOR GENERATING A PRIME NUMBER FOR A CRYPTOGRAPHIC APPLICATION

      
Application Number EP2018053247
Publication Number 2018/153684
Status In Force
Filing Date 2018-02-09
Publication Date 2018-08-30
Owner GEMALTO SA (France)
Inventor
  • Berzati, Alexandre
  • Roussellet, Mylène

Abstract

The present invention relates to a method for generating a prime number and using it in a cryptographic application, comprising the steps of: a) determining at least one binary base B with a small size b = log2(B) bits and for each determined base B at least one small prime pi such that B mod pi = 1, with i an integer, b) selecting a prime candidate YP, c) decomposing the selected prime candidate YP in a base B selected among said determined binary bases : YP = ∑yjBi d) computing a residue yPB from the candidate YP for said selected base such that yPB = ∑yj e) testing if said computed residue yPB is divisible by one small prime pi selected among said determined small primes for said selected base B, f) while said computed residue yPB is not divisible by said selected small prime, iteratively repeating above step e) until tests performed at step e) prove that said computed residue yPB is not divisible by any of said determined small primes for said selected base B, g) when said computed residue yPB is not divisible by any of said determined small primes for said selected base B, iteratively repeating steps c) to f) for each base B among said determined binary bases, h) when, for all determined bases B, said residue yPB computed for a determined base is not divisible by any of said determined small primes for said determined base B, executing a known rigorous probable primality test on said candidate YP, and when the known rigorous probable primality test is a success, storing said prime candidate YP and using said stored prime candidate YP in said cryptographic application.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G06F 7/72 - Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radixComputing devices using combinations of denominational and non-denominational quantity representations using residue arithmetic

71.

METHOD FOR MANAGING COMMUNICATION BETWEEN A SERVER AND A USER EQUIPMENT

      
Application Number EP2018052605
Publication Number 2018/141889
Status In Force
Filing Date 2018-02-02
Publication Date 2018-08-09
Owner GEMALTO SA (France)
Inventor
  • Rhelimi, Alain
  • Anslot, Michel

Abstract

The invention is a method for communication between a server (30) and a user equipment (20) through a set of command/response pairs. The the user equipment (20) uses an IMSI field of an Attach Request frame as defined by ETSI TS 124.008 to convey a command to the server (30). The server (30) uses an Authentication parameter RAND field or an Authentication parameter AUTN field of an Authentication Request frame as defined by ETSI TS 124.008 to convey a response corresponding to the received command. The server (30) sends the Authentication Request frame in response to the Attach Request frame.

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 8/26 - Network addressing or numbering for mobility support

72.

METHOD FOR ESTABLISHING A BIDIRECTIONAL COMMUNICATION CHANNEL BETWEEN A SERVER AND A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT.

      
Application Number EP2018052629
Publication Number 2018/141895
Status In Force
Filing Date 2018-02-02
Publication Date 2018-08-09
Owner GEMALTO SA (France)
Inventor
  • Anslot, Michel
  • Lamberton, Marc

Abstract

The invention concerns a method for establishing a bidirectional communication channel between a server and a secure element cooperating with a terminal in a cellular telecommunication network for exchanging data and commands, the method comprising: a- Sending a first attachment request signaling message from the terminal to the server, the first message comprising a MCC and a MNC of the server, and at least a part of a unique identifier of the secure element, the server being provisioned with the unique identifier; b- Sending from the server to the secure element, in at least a first signaling message: - At least a command; - A correlation identifier if further messages have to be sent from the secure element to the server; - A first payload comprising data; c- Executing at the secure element the command.

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 8/26 - Network addressing or numbering for mobility support
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data

73.

A METHOD FOR TRANSMITTING AN EXISTING SUBSCRIPTION PROFILE FROM A MOBILE NETWORK OPERATOR TO A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT

      
Application Number EP2018052631
Publication Number 2018/141896
Status In Force
Filing Date 2018-02-02
Publication Date 2018-08-09
Owner GEMALTO SA (France)
Inventor
  • Anslot, Michel
  • Lamberton, Marc

Abstract

The invention concerns a method for transmitting a subscription profile from a MNO to a secure element cooperating with a terminal (10), the secure element being pre-provisioned with a temporary profile comprising a unique identifier, a first MCC and a first MNC, the method comprising: - Transmitting from a POS (BSS/OSS) of the MNO the unique identifier of the secure element to a SM-DP (403); - Creating or reserving the subscription profile at the SM-DP (403); - Provisioning in a D-HSS server (401) having the first MCC/MNC the unique identifier and a temporary IMSI (t-IMSI) comprising a second MCC, a second MNC; - Provisioning in the HSS (404) of the MNO the temporary IMSI (t-IMSI) and an ephemeral Ki (e-Ki); - At the first attempt of the secure element to connect to the D-HSS server (401) with its temporary profile, exchanging data in signaling messages between the secure element and the D-HSS (401) for provisioning the secure element with the temporary IMSI (t-IMSI); - At the next attempt of the secure element to connect to the MNO network with the temporary IMSI (t-IMSI), open an APN and send from the SM-DP (403) to the secure element the subscription profile.

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 8/26 - Network addressing or numbering for mobility support

74.

A METHOD FOR ALLOWING A USER OF A TERMINAL TO CHOOSE AN OPERATOR FOR DOWNLOADING A SUBSCRIPTION PROFILE, CORRESPONDING SERVERS AND SECURE ELEMENT

      
Application Number EP2018052632
Publication Number 2018/141897
Status In Force
Filing Date 2018-02-02
Publication Date 2018-08-09
Owner GEMALTO SA (France)
Inventor
  • Anslot, Michel
  • Lamberton, Marc

Abstract

The invention concerns a method for allowing a user of a terminal (10) to choose an operator, the terminal (10) comprising a secure element containing an unique identifier and an ephemeral Ki, the method comprising: a- establishing a bidirectional communication channel between a server (131) and the secure element (11) for exchanging data and commands by: a1- Sending a first attachment request signaling message from the secure element to the server (131), the first attachment request signaling message comprising a MCC and a MNC of the server (131), and at least a part of a unique identifier of the secure element, the server (131) being provisioned with the unique identifier; a2- Sending from the server (131) to the secure element, in at least a first signaling message: - At least a command requesting the secure element to send the remaining part of its unique identifier if necessary; - A correlation identifier if further messages have to be sent from the secure element to the server (131); - A first payload comprising data; a3- Executing at the secure element the command; b- repeating steps -a1- to -a3- until the server (131) has received the unique identifier; c- Sending from the server (131) to the secure element in a signaling message a command prompting the user to select an operator; d- Sending from the secure element to the server (131) an identifier identifying the operator chosen by the user in another signaling message; e- Allocating by the server (131) a temporary IMSI (t-IMSI) from the selected operator to the secure element; f- Sending the temporary IMSI to the secure element with a command to replace its current IMSI by the temporary IMSI (t-IMSI) and provisioning the temporary IMSI (t-IMSI) and the ephemeral Ki (e-Ki) in another server (133) able to order a subscription profile to be downloaded to the secure element (11) from a provisioning server (134).

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 8/26 - Network addressing or numbering for mobility support

75.

A METHOD FOR AN EUICC EMBEDDED INTO A MACHINE TYPE COMMUNICATION DEVICE TO TRIGGER THE DOWNLOAD OF A SUBSCRIPTION PROFILE

      
Application Number EP2018052045
Publication Number 2018/141665
Status In Force
Filing Date 2018-01-29
Publication Date 2018-08-09
Owner GEMALTO SA (France)
Inventor
  • Anslot, Michel
  • Lamberton, Marc
  • Berard, Xavier
  • Rhelimi, Alain

Abstract

The invention related to a method for an eUICC embedded into a machine type communication device (300) to trigger the download of a subscription profile from a first network operator (MNO1), the eUICC being provisioned with an eUICC identifier (EID) and a pre-loaded data set memorizing a range of International Mobile Subscription Identifiers (IMSI) associated to a second network operator (MNO2), the method comprising the steps of: selecting randomly by the eUICC an IMSI number in the range memorized in the pre- loaded data set; sending an attachment request (310) comprising the randomly selected IMSI (R-IMSI); receiving in an authentication request message (313) the request for getting the eUICC identifier (EID); as a response, sending to the discovery server (302) a authentication failure message (314); receiving in an authentication request message (317) a temporary IMSI (t-IMSI) from the discovery server (302) so that the machine type communication device is able to attach to the first network operator (MNO1) and download the pending subscription profile.

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data

76.

METHOD TO SECURE A SOFTWARE CODE

      
Application Number EP2018051866
Publication Number 2018/138212
Status In Force
Filing Date 2018-01-25
Publication Date 2018-08-02
Owner
  • GEMALTO SA (France)
  • SFNT GERMANY GMBH (Germany)
Inventor
  • Garreau, Eric
  • Volpe, Sébastien
  • Garba, Peter

Abstract

The present invention relates to a method of securing a compiled software code (SC) comprising computer code instructions organized in a plurality of basic blocks, said method generating a secure software code (SSC) and comprising the steps of : • determining (S1) by a processor a portion of the software code to be protected, • inserting (S2) by the processor in a selected basic block of the software code a first sequence of instructions which when executed at runtime: computes an integrity check value on said portion of the software code to be protected and computes an index value based on said computed integrity check value, • inserting (S3) by the processor in the selected basic block of the software code an indexed array of memory addresses in which the address, when executing the secure software code, of a following basic block to be executed after the selected basic block is indexed by said index value, • inserting (S4) by the processor at the end of the selected basic block of the software code a jump instruction to the address indexed in the array by said index value computed at runtime.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

77.

METHOD TO SECURE A SOFTWARE CODE

      
Application Number EP2018051865
Publication Number 2018/138211
Status In Force
Filing Date 2018-01-25
Publication Date 2018-08-02
Owner
  • GEMALTO SA (France)
  • SFNT GERMANY GMBH (Germany)
Inventor
  • Garreau, Eric
  • Volpe, Sébastien
  • Garba, Peter

Abstract

The present invention relates to method of securing a software code comprising at least one constant value, said method generating a secure software code and comprising the steps of: − determining (S1) by a processor in the software code a constant value to be protected, − inserting (S2) by the processor in the software code an indexed array of values such that the constant value to be protected can be determined from one value of the array, − replacing (S3) by the processor in the software code the constant value to be protected by a replacement variable, − inserting (S4) by the processor in the software code a first sequence of instructions which, when executed at runtime: • computes the index in the array of the value from which the constant value to be protected can be determined, • extracts from said array the value located at said computed index in said array, • from said extracted value, determines the constant value to be protected, • sets the value of said replacement variable equal to the determined constant value.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

78.

METHOD FOR SECURE MANAGEMENT OF SECRETS IN A HIERARCHICAL MULTI-TENANT ENVIRONMENT

      
Application Number EP2017082779
Publication Number 2018/114574
Status In Force
Filing Date 2017-12-14
Publication Date 2018-06-28
Owner GEMALTO SA (France)
Inventor
  • Lacouture, Dominique
  • Lambert, Patrick
  • Rocha Furtado, Daniel

Abstract

The present invention relates to a method of securely using a first tenant secret key stored under an encrypted form in a first token (TKA) of a first tenant (A) identified by a first tenant identifier (UIDA) and having said first tenant secret key, wherein : each tenant identifier (UIDT) for a tenant (T) comprises a first value and, when said tenant (T) is allowed to use a secret key of a parent tenant (Tp) identified by a parent tenant identifier (UIDTP), said parent tenant identifier, appended before said first value, and said first token (TKA) has been generated from said first tenant identifier (UIDA) and a first tenant secret key encrypted with said first tenant identifier (UIDA) and with a first tenant customer master key (CMKA), said first tenant customer master key (CMKA) having been derived from said first tenant identifier (UIDA) and a secure domain master key (SDMK), said method comprising the following steps performed by a secure device storing said secure domain master key (SDMK), on request of a second tenant (B) identified by a second tenant identifier (UIDB) : - getting a first tenant identifier (UIDA) of said first tenant (A) from said first token (TKA), - checking if the first tenant identifier (UIDA) is a prefix of or is equal to said second tenant identifier (UIDB), - when said first tenant identifier (UIDA) is a prefix of or is equal to said second tenant identifier (UIDB), recovering said first tenant secret key stored in said first token (TKA) and using it for the second tenant (B).

IPC Classes  ?

79.

METHOD AND SYSTEM FOR PERFORMING SECURE TRANSACTIONS ESPECIALLY IN THE INTERNET OF THINGS

      
Application Number EP2017081063
Publication Number 2018/108558
Status In Force
Filing Date 2017-11-30
Publication Date 2018-06-21
Owner GEMALTO SA (France)
Inventor
  • Delsuc, Julien
  • Cogniaux, Geoffroy

Abstract

The invention relates to a method for securing electronic transactions between communicating devices (5-7) and merchant Web sites (SM) through a communication gateway (2) and/or server (200); the method is characterized in that it comprises the following steps consisting in: -equipping said gateway (2) and/or server (200) with at least one secure element (SE), said element (SE) comprising in memory (17) a transaction and/or identification information item to perform a transaction and/or an identification on the Web sites and/or all or part of a control program to govern/control said electronic transactions, -and then in carrying out said transactions (4) automatically by using all or part of the control program (11, 13) and/or said payment information item (9, 10) and/or identification information item. The invention also relates to the system corresponding to the method.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06Q 20/30 - Payment architectures, schemes or protocols characterised by the use of specific devices
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

80.

METHOD FOR GENERATING A CRYPTOGRAM IN A USER DEVICE AND VERIFYING THIS CRYPTOGRAM IN A PAYMENT SERVER, CORRESPONDING USER DEVICE AND PAYMENT SERVER

      
Application Number EP2017082031
Publication Number 2018/108737
Status In Force
Filing Date 2017-12-08
Publication Date 2018-06-21
Owner GEMALTO SA (France)
Inventor Martin, Alain

Abstract

The invention concerns a method for generating a cryptogram in a user device (32) and verifying the cryptogram in a payment server (33), the cryptogram being in the form of a dynamic Card Verification Value (dCW) generated in the user device (32) by a generation algorithm from an authentication key and a diversification value, the diversification value having been synchronized previously between the user device (32) and the payment server (33) through a telecommunication network distinct from a payment network, so that the user device (32) and the payment server (33) store in their respective memories the same diversification value, the method comprising: a- Displaying the dCW generated in the user device(16) on the screen of the user device (32); b- Copying the dCW, together with payment credentials into a payment form of a merchant server (38); c- Sending from the merchant server (38) through the payment network an authorisation request to the payment server (33), the authorisation request comprising the payment credentials and the dCW; d- Verifying at the payment server (33), by a verification algorithm, that the received dynamic CW (dCW) corresponds to a dynamic CW generated from the diversification value stored in its memory, and: - if the verification is positive, sending a positive authorization message to a bank server (39); - if the verification is negative, sending a negative authorization message to the bank server (39).

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

81.

METHOD FOR SYNCHRONIZED SIGNATURE WITH ADDITIVE RSA KEY SPLITTING USING A SLIDING WINDOW

      
Application Number EP2017082421
Publication Number 2018/108907
Status In Force
Filing Date 2017-12-12
Publication Date 2018-06-21
Owner GEMALTO SA (France)
Inventor
  • Atmopawiro, Alsasian
  • Dang, Thi Tra Giang

Abstract

The present invention relates to a method of secure generation by a client device and a server device of an RSA signature of a message to be signed with a private exponent component d of an RSA key (p, q, N, d, e), wherein said client device stores a client device private exponent component dA, a client value, and a client dynamic offset, and said server device stores a server device private exponent component dB, where dB = d - dA modulo phi(N), a server value, a server dynamic offset and a failure counter, comprising: a. receiving from the client device a client part of said RSA signature (HS1 ) of said message to be signed, after incrementing its client value (pvA) by a first predetermined step E, from the client device private exponent component and from an updated client dynamic offset function of said client dynamic offset and of said client value, b. setting said failure counter to a first default value, c. incrementing said server value (pvB) by a second predetermined step (Ε'), d. generating a server part of said RSA signature (HS2) of said message to be signed, from the server device private exponent component and from an updated server dynamic offset function of said server dynamic offset and of said server value, e. generating said RSA signature by combining said client part of said RSA signature (HS1 ) and said server part of said RSA signature (HS2), f. checking if the generation of the RSA signature was a failure and when it was a failure, incrementing said failure counter and g\ iteratively repeating above steps c\ to f\, until said RSA signature is successfully generated or said failure counter reaches a first predetermined threshold S.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

82.

USE OF PERSONAL DEVICE FOR CONVENIENT AND SECURE AUTHENTICATION

      
Application Number EP2017079719
Publication Number 2018/108456
Status In Force
Filing Date 2017-11-20
Publication Date 2018-06-21
Owner GEMALTO SA (France)
Inventor
  • Hutchinson, Michael
  • Lu, Hongqian Karen

Abstract

The present invention relates to a method to authenticate a user (US) using an authenticator (PIN) at an access device (AD) using another registered device named personal device (PD), said authenticator (PIN) being stored by the access device (AD) after registration (steps Si) of the personal device (PD) comprising a double encryption using an access device's secret key (SK(AD)) and a personal device's public key (PK(PD)) to be retrieved (T10) at each request of authentication (T4) received from the personal device (PD), encrypted (T12) using a session key (Ks) and sent (T14) with the session key (Ks) encrypted (T13) using the personal device's public key (PK(PD)) to the personal device (PD) for partial decryption (T18,T20) using the decrypted (T17) session key (Ks) and the personal device's private key (SK(PD)), re- encryption (T21 ) using the session key (Ks) and sending back (T23) to the access device (AD) for total decryption (T25,T26) of the authenticator (PIN), using the session key (Ks) and the access device's secret key (SK(AD)), and use of the thus decrypted authenticator (PIN) to authenticate at the access device (AD).

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security

83.

METHOD FOR MANUFACTURING ELECTRONIC OBJECT COMPRISING A BODY AND A POROUS-MEMBRANE-COMPRISING BATTERY

      
Application Number EP2017080718
Publication Number 2018/108521
Status In Force
Filing Date 2017-11-28
Publication Date 2018-06-21
Owner GEMALTO SA (France)
Inventor
  • Fidalgo, Jean-Christophe
  • Dubois, Béatrice
  • Robles, Laurence

Abstract

The invention relates to a method for manufacturing a portable electronic-chip-comprising object (8) including a body (1) and a metal-air battery that is integrated into the body, said battery comprising an electrolyte layer (2e) and a protective air-porous membrane (3m) covering the electrolyte. The method comprises a step of forming at least one air-supply duct (3) extending from the protective membrane (3m) to an air source; the process is characterised in that an air-porous material (3a, 3c, 3f) is contained in said duct and completely blocks said duct on its course at least in one place on its course. The invention also relates to the object corresponding to this method.

IPC Classes  ?

  • H01M 12/06 - Hybrid cellsManufacture thereof composed of a half-cell of the fuel-cell type and of a half-cell of the primary-cell type with one metallic and one gaseous electrode
  • H01M 8/04089 - Arrangements for control of reactant parameters, e.g. pressure or concentration of gaseous reactants
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • H01M 10/42 - Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
  • H01M 12/08 - Hybrid cellsManufacture thereof composed of a half-cell of a fuel-cell type and a half-cell of the secondary-cell type

84.

METHOD FOR SYNCHRONIZED SIGNATURE WITH ADDITIVE RSA KEY SPLITTING USING EARLY FLOATING EXPONENT NEGOTIATION

      
Application Number EP2017082430
Publication Number 2018/108915
Status In Force
Filing Date 2017-12-12
Publication Date 2018-06-21
Owner GEMALTO SA (France)
Inventor
  • Atmopawiro, Alsasian
  • Dang, Thi Tra Giang

Abstract

The present invention relates to a method of secure generation by a client device A and a server device B of at least a RSA current signature and a RSA next signature with a private exponent component d of an RSA key, comprising : • a handshake phase (P1) comprising: a. receiving (S1) a handshake request comprising a hash of the next client value (pvA_next), b. checking (S2) the value of the next client value (pvA_next) and: - when the next client value (pvA_next) equals a first default value (DUMMY): generating (S3) a new value (x) and updating the next server value (pvB_next) with the generated new value, and sending (S4) to the client device (A) the generated new value (x), to be used by the client device as next client value (pvA_next), - when the next client value (pvA_next) is not equal to said first default value (DUMMY): checking the value of the next server value (pvB_next) and when the next server value (pvB_next) is equal to a second default value (NULL) and the next client value (pvA_next) equals the current server value (pvB): sending to the client device (A) a fix request; and when the next server value (pvB_next) is equal to said second default value (NULL) and the next client value (pvA_next) is not equal to the current server value (pvB), suspending performing said method. • a signing phase (P2) performed by the server device (B) after the handshake phase and generating the current signature; said signing phase comprising : a. generating (S5) a server part of the current RSA signature (HS2) from the server device private exponent component (dB) and from an updated server dynamic offset (hB') function of the current server dynamic offset (hB) and of a server shift value (cB), said server shift value (cB) being function of the current server value (pvB), such that the current RSA signature can be generated by combining said server part of the current RSA signature (HS2) and a client part of the current RSA signature (HS1) generated by the client device (A), b. setting (S8) the current server dynamic offset (hB) to the updated server dynamic offset (hB') value, the current server value (pvB) to the value of the next server value (pvB_next) and the next server value (pvB_next) to a second default value (NULL), • performing the handshake phase and the signing phase with the next signature as current signature, for generating the next signature.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

85.

SECURE DOCUMENT OR SUPPORT ASSEMBLY

      
Application Number EP2017081907
Publication Number 2018/104482
Status In Force
Filing Date 2017-12-07
Publication Date 2018-06-14
Owner GEMALTO SA (France)
Inventor
  • Gaspari, Sébastien
  • Alleysson, Blandine
  • Bousquet, Christophe

Abstract

The invention relates to a method for producing a security document (1), wherein a body (8, 11) is created that comprises two superimposed layers (12, 15), a circuit (13) which is electric and/or has an electronic chip (3) arranged on the interface between said two layers, and a first adhesive (4) between the two layers, which adheres to the two layers and/or the circuit. The method is characterised in that it comprises a step of depositing a second adhesive (5) which is different from, or has a different behaviour from the first adhesive in relation to the solvents or the temperature and partially adheres to at least one of the two layers (12, 15) and/or the circuit (13).

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory

86.

METHOD OF RSA SIGNATURE OR DECRYPTION PROTECTED USING A HOMOMORPHIC ENCRYPTION

      
Application Number EP2017081756
Publication Number 2018/104412
Status In Force
Filing Date 2017-12-06
Publication Date 2018-06-14
Owner GEMALTO SA (France)
Inventor
  • Georgieva, Mariya
  • Gouget, Aline

Abstract

The present invention relates to a method of generating a secure RSA key by a server comprising the steps of : · generating (S1) a private RSA key d and a RSA modulus integer N; • splitting (S2) the secret key integer d in j key shares dJ of length n, with j in [1, J], J being an integer, and such that d = d1+ d2 +...+ dJ mod phi(N), with each key share dj being equal to (dj(0)... dj(i)... dj(n/b -1) ) with each key share component dj(i) in {0..2∧b-1} and i in [0, n/b-1], b being an integer inferior to n and phi the Euler's totient function; • encrypting (S3) with a fully homomorphic encryption (FHE) algorithm each key share component dj(i) of the private RSA key d by using a Fully Homomorphic Encryption secret key ps of a set Ss comprising the index couple (i,j), to generate an encrypted key share component edj(i) of said secure RSA key, said set Ss being a set of integer couples, among a predetermined integer number u of disjoint sets {S1, S2 Ss, Ss+1,...Su} generated such that : U{Ss} = { (i,j) such that i in [0, n/b-1], j in [1, J]} and each said set among {S1,.. Su} being associated with a Fully Homomorphic Encryption (FHE) secret key.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

87.

METHOD FOR OPTIMIZING THE POLLING EVENT OF A SECURE ELEMENT AND CORRESPONDING GATEWAY, SECURE ELEMENT, BASEBAND DEVICE AND OTA PLATFORM

      
Application Number EP2017081759
Publication Number 2018/104415
Status In Force
Filing Date 2017-12-06
Publication Date 2018-06-14
Owner GEMALTO SA (France)
Inventor
  • Rozak-Draicchio, Lionel
  • Gravallon, Sébastien

Abstract

The invention concerns among others a method for optimizing the polling event of a secure element (30) cooperating with a terminal, the terminal comprising a baseband device (31), the method consisting in: Sending from a OTA platform (32) to a gateway (33) of a telecommunication network of an operator a polling date for the secure element (30); Sending from the gateway (33) to the baseband device (31), in a container of a PCO, the polling date; Sending from the baseband device (31) to the secure element (30) the polling date, in order that the secure element (30) polls the OTA platform (32) at the polling date.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 8/24 - Transfer of terminal data

88.

METHOD AND SYSTEM FOR SECURING SENSITIVE OPERATIONS PERFORMED IN AN UNSECURED COMMUNICATION ENVIRONMENT

      
Application Number EP2017080565
Publication Number 2018/099874
Status In Force
Filing Date 2017-11-27
Publication Date 2018-06-07
Owner GEMALTO SA (France)
Inventor
  • Hugot, Didier
  • Der-Krikorian, Anthony

Abstract

The invention relates to a method for securing a sensitive operation between one processing unit comprising a computer browser and a service server of a communication network (5), a request (RT1) for or initiating said sensitive operation being sent to the service server (3). The method is characterized in that it comprises the following steps: - installation of a trusted server (TS) and storing of a client-type trusted program (P1) in the browser (P0) or in the processing unit (2) or in the communication network (5), - redirection (RT2) of said sensitive operation request (RT1) to the trusted server (TS), - performance of all or part of the sensitive operation between the trusted server (TS) and the trusted program (P1) following the redirection. The invention also relates to a system corresponding to the method.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • H04W 12/06 - Authentication

89.

METHOD, FIRST DEVICE AND SYSTEM FOR AUTHENTICATING TO A SECOND DEVICE

      
Application Number EP2017080274
Publication Number 2018/099808
Status In Force
Filing Date 2017-11-23
Publication Date 2018-06-07
Owner GEMALTO SA (France)
Inventor
  • Tabak, Danny
  • Josefsson, Johan

Abstract

A first device (16) shares with the second device at least one session key. The first device sends to at least one third device (18) at least one first session key (28). The at least one third device connects (210) directly to the second device by using the at least one first session key. According to the invention, the method further comprises the following steps. The first device sends to the at least one third device a command (216) for disconnecting from or switching to a non-connected mode with the second device. And the at least one third device disconnects (218) from or switches to a non- connected mode with the second device based upon the received command. The invention also pertains to corresponding first device and system for authenticating to a second device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals

90.

DEVICE AND METHOD FOR MANAGING A CELLULAR NETWORK IN RELATION WITH CELLULAR TERMINALS ACCEPTING A PLURALITY OF SUBSCRIBER MODULES

      
Application Number EP2017081083
Publication Number 2018/100118
Status In Force
Filing Date 2017-11-30
Publication Date 2018-06-07
Owner GEMALTO SA (France)
Inventor
  • Saffache, Philippe
  • Anslot, Michel
  • Bouckaert, Philippe

Abstract

A method, wherein a cellular terminal (CT) is configured so that several subscriber modules (SIM A,SIM B) can simultaneously be attached respectively to their corresponding voice cellular communication network (NV A,NV B), and only one among the subscriber modules (SIM A,SIM B) can be attached to its data cellular communication network (ND A,ND B), for detecting if the first subscriber module (SIM A) is selected or not for data cellular communication network access, comprising the steps of: checking for the reception of a first message emanating from a subscriber module (SIM A), from the first voice cellular communication network (NV A), checking for the reception of a second message emanating from the same subscriber module (SIM A), from the corresponding first data cellular communication network (ND A), and being similar to said first message, wherein said first subscriber module (SIM A) is considered being selected for data cellular communication network access if a second message is received either before the reception of said first message or after the reception of said first message but not later than a predetermined time duration after the reception of said first message and is considered not being selected if no second message is received before the expiration of said predetermined time duration.

IPC Classes  ?

  • H04W 48/18 - Selecting a network or a communication service
  • H04W 24/02 - Arrangements for optimising operational condition
  • H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
  • H04W 8/04 - Registration at HLR or HSS [Home Subscriber Server]
  • H04W 8/06 - Registration at serving network Location Register, VLR or user mobility server
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities
  • H04W 88/18 - Service support devicesNetwork management devices
  • H04W 60/00 - Affiliation to network, e.g. registrationTerminating affiliation with the network, e.g. de-registration

91.

METHOD AND SYSTEM FOR CARRYING OUT A SENSITIVE OPERATION IN THE COURSE OF A COMMUNICATION SESSION

      
Application Number EP2017081168
Publication Number 2018/100145
Status In Force
Filing Date 2017-12-01
Publication Date 2018-06-07
Owner GEMALTO SA (France)
Inventor Hugot, Didier

Abstract

The invention relates to a method for carrying out a sensitive operation in the course of a communication between a processing unit (2) and a first service server (3), said first server (3) being accessible via a first domain name (ND1) and/or first electronic address (IP1); Said method is characterized in that it comprises the step of using at least one second domain name (ND2) different from the first (ND1) and/or a second electronic address (IP2) different from said first (IP1) to carry out all or part of said sensitive operation. The invention also relates to a system corresponding to the method and comprising the server 3 and/or the processing unit.

IPC Classes  ?

  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

92.

METHOD OF ISSUING AN IDENTITY DOCUMENT

      
Application Number EP2017078223
Publication Number 2018/091289
Status In Force
Filing Date 2017-11-03
Publication Date 2018-05-24
Owner GEMALTO SA (France)
Inventor Viljanen, Petri

Abstract

The invention is a method for issuing an identity document uniquely allocated to a user. The method comprises the steps of: - extracting a biometric reference from a face of the user during an enrollment phase, - generating a biometric pattern from the biometric reference using a secret key of an asymmetric key pair, - writing a visual pattern on a surface of said identity document, said visual pattern including the biometric pattern.

IPC Classes  ?

  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G07C 9/00 - Individual registration on entry or exit
  • H04N 1/32 - Circuits or arrangements for control or supervision between transmitter and receiver
  • B42D 25/333 - Watermarks

93.

METHOD FOR MANAGING A PATCH OF A PACKAGE

      
Application Number EP2017077582
Publication Number 2018/091254
Status In Force
Filing Date 2017-10-27
Publication Date 2018-05-24
Owner GEMALTO SA (France)
Inventor
  • Labourie, Florent
  • Yanto, Rudy

Abstract

The invention is a method for managing a patch of a software package in a secure element comprising several subscription profiles. The patch is installed on the secure element and no more than one of said subscription profiles is enabled at a time. The method comprises the steps of: -on receipt of an activation command, recording a description of a link that attaches the patch only to a target subscription profile, -enabling the patch for the software package either as soon as the target subscription profile becomes enabled or as soon as the description is recorded if the target subscription profile is already enabled.

IPC Classes  ?

  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
  • H04W 12/06 - Authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • G06F 9/445 - Program loading or initiating

94.

METHOD FOR PRODUCING A DATA CARRIER AND DATA CARRIER PRODUCED THEREFROM

      
Application Number EP2017077142
Publication Number 2018/086874
Status In Force
Filing Date 2017-10-24
Publication Date 2018-05-17
Owner GEMALTO SA (France)
Inventor
  • Pohjola, Teemu
  • Lappalainen, Kristian

Abstract

The present invention relates generally to a data carrier comprising an opaque layer and a method for making the data carrier. During personalization phase, the ablation of the opaque layer by laser through the data carrier allows to define a see- through portion of the data carrier carrying opaque security, said see-through portion having an improved security corresponding to opaque embossing pattern overlapping at least partially the opaque security partially destroyed. Said defined see-through portion carrying opaque security partially destroyed with opaque embossing pattern on its surface is even more difficult to reproduce by forger, even more difficult to remove, replace or exchange and easy to check.

IPC Classes  ?

95.

A PHYSICAL KEY FOR PROVISIONING A COMMUNICATION DEVICE WITH DATA ALLOWING IT TO ACCESS A VEHICLE RESOURCE

      
Application Number EP2017078876
Publication Number 2018/087284
Status In Force
Filing Date 2017-11-10
Publication Date 2018-05-17
Owner GEMALTO SA (France)
Inventor Castillo, Laurent

Abstract

This invention relates to a physical key (100) for provisioning a communication device (101) with data allowing said communication device (101) to access a vehicle resource by operating remotely a vehicle lock system (130) in which a first cryptographic key called master key is stored, comprising a secure enclave also storing the master key, the physical key being configured to: establish a communication link (110) with the communication device (101); derive by the secure enclave a second cryptographic key called derived key from the master key; transmit to the communication device (101) via the secure communication link (110) the derived key for enabling the communication device (101) to answer a security challenge from the vehicle lock system (130) and the vehicle lock system (130) to verify said answer, the access to the vehicle resource being allowed if the answer is successfully verified.

IPC Classes  ?

  • G07C 9/00 - Individual registration on entry or exit
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

96.

METHOD AND SYSTEM FOR AUTOMATICALLY RECEIVING AND/OR TRANSMITTING INFORMATION RELATING TO TRANSACTIONS

      
Application Number EP2017076819
Publication Number 2018/077736
Status In Force
Filing Date 2017-10-20
Publication Date 2018-05-03
Owner GEMALTO SA (France)
Inventor
  • Muller, Marc
  • Gibert, Sylvie
  • Barbe, Serge

Abstract

The invention relates to a method for automatically receiving and/or transmitting information (1) intended for or relating to a holder of an alphanumeric account identifier (PAN, UID), said method comprising a step of creating an electronic address (Email, URL) comprising an identifier (IDT), characterised in that the identifier (IDT) is obtained or derived from at least a portion of the alphanumeric identifier (PAN) of the account or associated with an account (UID). The invention also concerns the corresponding electronic system.

IPC Classes  ?

97.

METHOD FOR PRODUCING A BISTABLE DISPLAY DEVICE WITH LOW-VOLTAGE MICROCONTROLLER

      
Application Number EP2017076853
Publication Number 2018/073415
Status In Force
Filing Date 2017-10-20
Publication Date 2018-04-26
Owner GEMALTO SA (France)
Inventor Touvet, Stéphane

Abstract

Method for producing an electrophoretic display device comprising a low-voltage microcontroller. The invention relates to a method for producing a segmented electrophoretic display device (1A) comprising a bistable display (2) operating at predetermined opposing voltages (+dV; -dV) and an electronic circuit (10A, 25) with microcontroller (10, 24) for controlling the display according to a control programme (P). The method is characterised in that it comprises the following steps: - supplying the controller (24), which is different from a specific display controller for a bistable display and configured to deliver voltages (Vsegment), lower in absolute value to the predetermined voltages (+dV; -dV), - compensating said voltages (Vsegment) with at least one compensation voltage (Vcom) to at least reach the predetermined opposing voltages (+dV; -dV). The invention also relates to the corresponding device.

IPC Classes  ?

  • G09G 3/34 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix by control of light from an independent source

98.

A PROCESSING DEVICE ADAPTED TO COOPERATE WITH A SECURE ENCLAVE FOR EXECUTING A PROGRAM

      
Application Number EP2017075919
Publication Number 2018/069386
Status In Force
Filing Date 2017-10-11
Publication Date 2018-04-19
Owner GEMALTO SA (France)
Inventor
  • Delsuc, Julien
  • Cogniaux, Geoffroy

Abstract

This invention related to a processing device (100) adapted to cooperate with a secure enclave (101) for executing a program, the processing device (100) being configured to: receive (110) a message comprising input data; generate from these input data a first execution context (103), an execution context corresponding to a data structure (103) comprising at least data required for executing a task corresponding to a portion of the program, the first execution context (103) being memorized into a memory managed by the processing device (100); send a notification message (120) to the secure enclave (101) indicating that the first execution context (103) is available so that the secure enclave (101) is triggered to read the first execution context (103), to download (130) in its internal memory data of the first execution context (103) that is required for executing the associated task and to execute (131) said task.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

99.

METHOD, DEVICE AND SYSTEM FOR SECURING AN ACCESS TO AT LEAST ONE SERVICE

      
Application Number EP2017075132
Publication Number 2018/065439
Status In Force
Filing Date 2017-10-04
Publication Date 2018-04-12
Owner GEMALTO SA (France)
Inventor
  • Bradley, Paul
  • Chalvin, Nicolas
  • Payraud, Emmanuel

Abstract

The invention relates to a method (20) for securing an access to at least one service. According to the invention, a device (14) is set in a restricted operation mode. The restricted operation mode allows addressing only a first server (182). The restricted operation mode is associated with a first identifier relating to a first connectivity gateway (162). The first connectivity gateway allows accessing the first server. The device accesses the first identifier relating to the first connectivity gateway. The device accesses a subscription profile. The subscription profile is active during the restricted operation mode. The first server receives from the device or a chip (12) a request (26) for enrolling a device or chip user. The request for enrolling the device or chip user comprises or is accompanied with at least one feature relating to a user identity, as a user identity feature. The chip is embedded within or coupled to the device. The first server or another server connected to the first server verifies (28) whether the at least one user identity feature is or is not valid. Only if the at least one user identity feature is valid, the first server or another server connected to the first server sends to the device or, through the device, to the chip a command message (214) including a command for deactivating the restricted operation mode. The device or the chip deactivates (216) the restricted operation mode while storing or letting store, instead of the first identifier relating to the first connectivity gateway, a second identifier relating to a second connectivity gateway (164). The second identifier relating to the second connectivity gateway allows accessing a second server (184). The subscription profile is still active after the restricted operation mode deactivation. The second server manages the at least one service. The invention also relates to corresponding device and system.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 48/00 - Access restrictionNetwork selectionAccess point selection

100.

METHOD, DATA SENDING CONTROL SERVER, STORAGE SERVER, PROCESSING SERVER AND SYSTEM FOR SENDING DATA TO AT LEAST ONE DEVICE

      
Application Number EP2017074997
Publication Number 2018/065371
Status In Force
Filing Date 2017-10-02
Publication Date 2018-04-12
Owner GEMALTO SA (France)
Inventor
  • Dao, Frédéric
  • Clement-Gonzales, Frédéric
  • Halle, David
  • Duprez, Jérôme
  • Huguenin, David
  • Schmitt, Sébastien
  • Nersessian, Christine
  • Allouche, Philippe
  • Dandelot, Thomas

Abstract

The invention relates to a method (20) for sending data to at least one device. According to the invention, the method comprises the following steps. A data sending control server (12) sends to at least one data storage server (142) at least one predetermined rule or a first request (22) for sending data to at least one data processing server. The at least one data storage server sends, based upon the at least one predetermined rule or the first request for sending data, to the at least one data processing server data (26). The data sending control server sends to the at least one data processing server (16) a second request (28) for sending to the at least one device the data received or to be received by the at least one data processing server. The at least one data processing server sends, based upon the second request for sending the data, to the at least one device the received data (212). The invention also pertains to corresponding data sending control server, data storage server, data processing server and system for sending data to at least one device.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 12/08 - Access security
  1     2     3     ...     10        Next Page