GEMALTO SA Patent applications |
Patent application number | Title | Published |
20160143083 | METHOD FOR MANAGING A WIRELESS LINK BETWEEN A FIRST DEVICE AND A SECONG DEVICE - The invention relates to a method for managing a wireless link between a first device and a second device. The method includes the steps of polling an activity of a first wireless interface of the first device during a first predetermined lapse of time, suspending the wireless link and polling an activity of a first body-coupled communication interface of the first device during a second predetermined lapse of time when no activity is detected on the first wireless interface of the first device during the first predetermined lapse of time, and resuming the wireless link when at least one polling packet comprising a resume request is detected by the first body-coupled communication interface of the first device during the second predetermined lapse of time. | 05-19-2016 |
20160140431 | METHOD FOR PRODUCING A RADIO-FREQUENCY DEVICE MAINTAINING ANISOTROPIC CONNECTION - The invention relates to a method for producing an intermediate device comprising an electronic module, said intermediate device being used to receive at least one film or portion of a film or covering layer, said device comprising: a supporting body; at least one area for the interconnection of an electric circuit, borne by the supporting body; and an electronic module connected to said interconnection area by an anisotropic connection material, said material being compressed between said area and the module. The method comprises the implementation of a means for maintaining the compressed state of said anisotropic material and/or a means for isolating said material from the outside of the supporting body. | 05-19-2016 |
20160135037 | METHOD AND DEVICE FOR MANAGING A SUBSCRIBER DEVICE - A method for managing a subscriber device includes a first detection step in which a first device detects a first status relating to a presence of a subscriber device under a radio coverage of a home mobile network. In the first detection step, the first device intercepts a message for requesting whether the subscriber device has or has not been stolen, as request message, the request message originating from a Mobile Switching Center relating to the home mobile network and being addressed to an Equipment Identity Register relating to the home mobile network. A corresponding first device is also disclosed. | 05-12-2016 |
20160127050 | PAIRING DEVICE - A pairing device for establishing a secure wireless communication path between a first device having a first body-coupling communication interface and a second device having a screen. The pairing device includes a screen communication interface having a light sensor, which, in conjunction with the screen of the second device, allows definition of a light-based communication path for the transmission of a first pairing information from the second device to the pairing device, a calculator for generating a second pairing information once the first pairing information has been received by the pairing device, a second body-coupling communication interface, which in conjunction with the first body-coupling communication interface allows the definition of a body-coupling communication path for the transmission of the second pairing information from the pairing device to the first device, the second pairing information allowing the establishment of a secure wireless communication path between the first device and the second device. | 05-05-2016 |
20160125284 | METHOD FOR MAKING AN ANTI-CRACK ELECTRONIC DEVICE - A method for making an intermediate electronic device, wherein said device is coated or is to be coated with a cover sheet or layer, the method comprising the step of forming a carrier-body comprising: a cavity provided in the carrier-body; an electric circuit comprising at least one electric interconnection area inside the cavity; an electronic module comprising at least one connection pad connecting said interconnection area and arranged in the cavity; a space or gap provided at the interface between the module and the carrier-body, substantially perpendicular to a main surface of the carrier-body, in communication with the surface of the carrier-body, and intended to be covered with a cover sheet or layer; the method is characterized in that a flexible or elastic material is arranged in the device so as to fill the space or gap between the module and the body-carrier or at least partially cover same. | 05-05-2016 |
20160088096 | METHOD FOR ACCESSING A SERVICE, CORRESPONDING DEVICE AND SYSTEM - A device comprises a memory. The memory stores data relating to at least one service profile template. The service profile template includes executable data. A server sends to the device a first message including a request for creating or modifying at least one service profile based upon a service profile template. The device executes the executable data. The device creates or modifies a memory area. The memory area is associated with a service profile by using the service profile template. The device sends to the server at least one second message including a request for loading into the device data relating to at least one service profile. The server sends to the device at least one third message including data relating to at least one service profile. And the device stores within the created or modified memory area the data relating to at least one service profile. | 03-24-2016 |
20160078441 | PORTABLE OBJECT INCLUDING A DISPLAY AND APPLICATION FOR CARRYING OUT ELECTRONIC TRANSACTIONS - The invention relates to a smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The invention also relates to the use of a portable object for implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via said interactive display. | 03-17-2016 |
20160077806 | METHOD TO SECURELY EXECUTE A MODULAR EXPONENTIATION - The present invention relates to a method to execute a modular exponentiation R=X | 03-17-2016 |
20160070909 | SECURE PLATFORM IMPLEMENTING DYNAMIC COUNTERMEASURES - The present invention relates to a secure platform implementing dynamic countermeasures in relation with the execution of a code, said secure platform having at least a security sensor, a countermeasure controller and countermeasure means. According to the invention, said countermeasure controller includes at least one security sensor flag able to take at least two sensor flag values depending on the output of the security sensor, a table storing N possible security configuration for the countermeasures, a random generator to generate a random configuration value, a decision function using the sensor flag value and the random configuration value to determine a security configuration in the table to be executed by countermeasure means. | 03-10-2016 |
20160044505 | METHOD TO ESTABLISH A SECURE VOICE COMMUNICATION USING GENERIC BOOTSTRAPPING ARCHITECTURE - The present invention relates to a method to establish a secure voice communication session between two user equipments with the help of a dedicated Network Application Function (NAF) and at least one Bootstrapping Server Function. A session key is calculated from bootstrapping service derived external or internal NAF keys of the first and the second user equipments. A secured voice communication is established using the calculated session key. | 02-11-2016 |
20160026296 | DEVICE ADAPTED FOR EMULATING TACTILE CONTACTS ON A CAPACITIVE SCREEN - The invention relates to a device (CD) comprising a capacitive key-board (KB) constituted of a plurality of keys (KY), each key comprising an active electrode (AEL) and an active ground plane (AGP), a microcontroller (MC) connected to said keyboard (KB) through active electrode (AEL) and active ground plane (AGP). Said microcontroller (MC) is adapted for managing said keyboard (KB) in a reverse manner for emulating a sequence of tactile contacts on a capacitive screen. | 01-28-2016 |
20160006506 | METHOD AND SYSTEM FOR NEGOTIATION OF A PARAMETER OF AN OPTICAL COMMUNICATION PROTOCOL BETWEEN TWO DEVICES - The invention is a method for negotiating a parameter of an optical communication protocol between two devices. One device displays a first calibration image comprising a series of pixel patterns having a predetermined position and different sizes. The other device takes a first calibration picture of the first calibration image, identifies a set comprising at least one detectable pixel pattern in the first calibration picture and selects a setting data based on the set. Then it displays a second calibration image comprising this setting data which is read by the first device via another calibration picture. The first device retrieves the setting data from the calibration picture, selects a value based on the setting data and updates the parameter with the selected value. | 01-07-2016 |
20150373226 | METHOD FOR PRINTING A COLOUR PIXEL MATRIX ON A PHYSICAL MEDIUM BY PRINTING OBLIQUE LINES AND ASSOCIATED CONTROL DEVICE - A method designed to allow the printing of a matrix (MPC) of pixels, in N colours defining a colour coding system, on a selected part of a physical medium (MP). That method comprises a stage in which colour pixels are printed in at least one pass along oblique lines in relation to the physical medium (MP), wherein the pixels of an oblique line are all in the same colour selected from the N colours and different from that used for the previous oblique line, in order to generate a matrix (MPC) of M horizontal lines comprising P pixels each in the N colours successively in a selected order, and wherein each horizontal line other than the first one comprises a first pixel that is identical to the second pixel of the previous horizontal line. | 12-24-2015 |
20150341340 | A SYSTEM AND METHOD OF DYNAMIC ISSUANCE OF PRIVACY PRESERVING CREDENTIALS - Method and System for enhanced privacy in privacy-preserving identity solutions. The technology provides for a redirect of a request to generate a proof of an attribute from a service provider to a separator. The separator removes source identification from the attribute-proof request and redirects the attribute-proof request, free of original source identification, to a credential issuer which issues the credential. A security device of the user generates a presentation token from the privacy-preserving credential and presents the presentation token to the service provider as proof of the attribute. Other systems and methods are disclosed. | 11-26-2015 |
20150334568 | METHOD FOR CONTROLLING A CONTACTLESS TRANSACTION - The invention relates to a method for controlling contactless transactions of contactless applications stored on a first secure element, said contactless transactions being operated with a portable device, said portable device comprising said first secure element. The method is characterised in that it comprises a step of pairing said first secure element with a second secure element, a step of requesting to the second secure element an authorization to execute a predetermined number of contactless transactions, a step of requesting to the second secure element another authorization to execute a new predetermined number of contactless transactions when a predetermined contactless transaction's threshold is reached. | 11-19-2015 |
20150333796 | DATA MEDIUM FOR CONFIGURING A CONFIGURABLE ELECTRONIC DEVICE BY NEAR FIELD COMMUNICATION, AND ASSOCIATED METHOD - A data medium (DM) stores a group of data and comprises i) at least a first element (E | 11-19-2015 |
20150328869 | DEVICE FOR LAMINATING SMART CARDS AND ASSOCIATED LAMINATION METHOD - This invention relates to laminating device for laminating smart cards, where the said smart cards are incorporated in a blank. Said device comprises a unit for depositing and pre-gluing a protective layer on at least one blank, a laminating unit comprising means for pressing, heating and cooling at least one blank, a unit for cutting the blank into a smart card with the standard marketing format. The pressing, heating and cooling means comprise two supports placed opposite each other and displaceable towards each other in order to apply pressure on the said blank. Each support comprises at least one ceramic heating and cooling device comprising a stack made up of a ceramic block and a metal laminating plate. | 11-19-2015 |
20150326999 | METHOD OF CONFIGURING TWO WIRELESS DEVICES - The invention is a method of configuring a device and a wireless unit. The device is able to operate in tag mode and in wireless reader mode. The wireless unit is able to operate in wireless reader mode and in a card emulation mode. The method comprises the steps of:
| 11-12-2015 |
20150326394 | METHOD FOR CERTIFYING A DISPLAYED PICTURE - The present invention relates to a method for certifying a displayed picture, using a user device Near Field Communication compatible, comprising a secure element, a control device Near Field Communication compatible, said method comprising the steps of: opening a Near Field Communication channel between the user device and the controller device, transmitting an information from the secure element to the control device via said Near Field Communication channel, and displaying an element determined from said information, on the control device. | 11-12-2015 |
20150324682 | PROCESS FOR THE CONFIGURATION OF A SMART CARD FOR A SINGLE SELECTED APPLICATION - A process is designed to configure a smart card (CP) comprising a microchip (PE) capable of participating in at least two applications, a magnetic stripe (PM) capable of storing information, action means (MA) capable of acting on the magnetic stripe (PM) to modify certain stored information, a control circuit (MC) capable of controlling the microchip (PE) and the action means (MA), and selection means (MS) capable of allowing the selection of an application. This process comprises a step wherein, if one of the applications is selected, a dedicated piece of information that is representative of that selected application is stored in a location accessible to the control circuit (MC), so that if the microchip (PE) is woken up, the microchip (PE) automatically retrieves the dedicated information in order to activate the selected application represented by it. | 11-12-2015 |
20150319180 | METHOD, DEVICE AND SYSTEM FOR ACCESSING A SERVER - A method for accessing a first server, wherein a first device is coupled or connected to a first server. The first device captures, at at least one predetermined time and/or during at least one predetermined time period, at least one signal, the at least one signal being emitted at a place where the first device is located. The first device, the first server or a second server compares each of the at least one captured signal to each of at least one predetermined signal respectively. And if each of the at least one captured signal does or does not match each of the at least one predetermined signal respectively, then the first device, the first server or the second server authorizes or forbids to access the first server respectively. | 11-05-2015 |
20150318992 | METHOD FOR SERVER ASSISTED KEYSTORE PROTECTION - The present invention relates to a method to access a data store previously locked using a passphrase from a device. The method includes the following steps, when the user requests access to the data store: requesting the user to enter the personal code; generating an access code by applying a first function to at least the entered personal code; sending out, to the server, at least an identifier of the device and the access code; for the server, comparing the access code with the preliminary received first function; for the server, if the access code is correct, returning the passphrase to the device; and for the device, unlocking the data store using the received passphrase in combination with the entered personal code. | 11-05-2015 |
20150312252 | METHOD OF ALLOWING ESTABLISHMENT OF A SECURE SESSION BETWEEN A DEVICE AND A SERVER - The invention is a method for allowing a user to establish a secure session between a device and a server by using a username/password associated with the user. The user provides the username for the device. In response to a message comprising the username, the server opens a session and generates an identifier of the session and sends the identifier to the device. The identifier is transmitted to a machine distinct from the device. The user provides the password for the machine. The machine sends an authenticating message to the server, the authenticating message comprises the identifier and an authenticating data generated from the password. The server sends a result message reflecting the result of the authenticating data checking to the device. | 10-29-2015 |
20150312033 | NON ALTERABLE STRUCTURE INCLUDING CRYPTOGRAPHIC MATERIAL - The present invention relates to a method to build a non-alterable structure and to such a non-alterable structure including data relative to a set of cryptographic material generated randomly or derived from a secret key linked to a business use, the non-alterable structure being intended to be transferred from a first entity to a second entity, the entities sharing at least an encryption/decryption key and a signature key, the structure comprising at least business data relative to the intended use of cryptographic material, an encrypted protection key encrypted with the encryption key, an encrypted set of cryptographic material encrypted with the protection key, a signature of the set of cryptographic material, the protection key and the data relative to the intended use of cryptographic material signed with the signature key. | 10-29-2015 |
20150304318 | METHOD AND SYSTEM FOR ACCESSING A SERVICE - To access a service, each user device stores one first key. The user device is connected to a first server. A terminal sends to a second server a connection request. The second server responds with first data relating to a transaction identifier and an associated challenge. The terminal determines a first result depending upon the first data and the first key. The terminal sends to the first server the first result and user device data. The first server identifies a user device based upon the user device data and sends to the device the first result. The device determines the challenge and the transaction identifier based upon the first result and the first key and sends to the second server the challenge and the transaction identifier. The second server verifies whether the data received from the device matches the first data and, if so, authorizes the terminal to connect. | 10-22-2015 |
20150289135 | METHOD FOR MUTUAL AUTHENTICATION BETWEEN A TERMINAL AND A REMOTE SERVER BY MEANS OF A THIRD-PARTY PORTAL - Mutual authentication between: (i) a user terminal cooperating with a security element and an application for registering with a service, and (ii) a remote server that provides the service, by means of a third-party portal, includes: i) transmitting, to the remote server by means of the portal, signed information R enabling the security element to be authenticated in the remote server; ii) authenticating the security element in the remote server; iii) transmitting a value R′ signed by the remote server to the application by means of the portal; iv) transmitting a request for verification of the signed value R′ from the application to the security element; v) verifying, in the security element, the signature of the remote server and whether the requested service has been granted by the remote server; vi) establishing a secure connection with the remote server using the security element, and requesting that the service be executed. | 10-08-2015 |
20150286811 | METHOD FOR AUTHENTICATING A USER - The invention relates to a method for authenticating a user when accessing to an application securely stored on a secure element of a portable device, said method comprising a step of authenticating the user via two authentication factors. The method comprises requesting a further authentication factor to said user, in a form of challenge-response based on a randomised request associated to a biometric data of said user. | 10-08-2015 |
20150269473 | ELECTRONIC MODULE WITH THREE-DIMENSIONAL COMMUNICATION INTERFACE - The invention relates to a method for making an electronic module having an integrated circuit chip connected to an antenna. The method includes the steps of producing a module having electrical interconnection areas, a chip connected to the interconnection areas and a protection element covering at least the chip and part of the interconnection areas, and a radio antenna connected to the chip and arranged above the chip. The method includes a step of producing the entirety or part of the antenna, or the tracks thereof for coupling same with the interconnection areas, in three dimensions directly on the protection element. | 09-24-2015 |
20150254669 | SYSTEM AND METHOD FOR SECURELY STORE AND TRANSFER ELECTRONIC MONEY - The invention relates to a system ( | 09-10-2015 |
20150249902 | METHOD FOR VIRTUALLY CONNECTING TWO PERSONS, CORRESPONDING MEDIA AND SYSTEM - The invention specifically relates to a method for virtually connecting two persons, with the first person having a first NFC device and the second person having a second NEC device. One of the NFC devices is a telecommunications terminal comprising an application, and both NFC devices comprise the identity of the person to which they belong. According to the invention, the method includes transmitting the identity of the first person from the first NFC device to the second NFC device; transmitting the identity of the second person from the second NFC device to the first NFC device; generating a secret shared by the persons using the application, with the shared secret giving access to an Internet space shared by the persons; and storing the shared secret in the NFC devices, with a reference relating to the virtual connection thereof. | 09-03-2015 |
20150239202 | SECURE DATA CARRIER AND METHOD OF PRODUCTION OF SAID SECURE DATA CARRIER - The present invention concerns a data carrier having—a central portion covered by at least one translucent protective layer on at least one of its sides,—at least one see-through portion with an orifice filled with a translucent plug, going at least partially through of the central portion. The central portion has a colored core and at least one opaque layer colored in a color different from the colored core in order to show a layered structure of different colors on the edge of the data carrier. The invention also concerns the method of production of such a data carrier. | 08-27-2015 |
20150237148 | METHOD FOR REGISTERING AT LEAST ONE PUBLIC ADDRESS IN AN IMS NETWORK, AND CORRESPONDING APPLICATION - The invention relates, in particular, to a method for registering at least one public address in an IMS network including a terminal that interacts with a security element. According to the invention, the security element includes an application that invites the user of the terminal, upon the occurrence of an event, to enter a public address, selected by the user, via the man/machine interface of the terminal, the application transmitting the public address, accompanied by at least one identifier of the security element, to a remote network via the terminal such that the remote network associates the public address with the identifier. | 08-20-2015 |
20150228505 | MOULDING METHOD FOR PRODUCING AN ELECTRONIC HOUSING - The invention concerns a method for producing a smart card or telecommunication module electronic housing, comprising an electronic chip in the housing, a face comprising at least one set of conductive metal platings, said method comprising the following steps: providing or producing at least one set of metal platings comprising conductive circuit pads or tracks, on one side of a substrate, transferring and connecting a chip to each set of platings, overmoulding each chip with the set of metal platings of same on the substrate with a moulding material in order to produce at least one housing, separating the housing from the substrate thereof, wherein the side of the substrate in contact with the metal platings comprises an adhesive or has low adhesiveness and in that the overmoulding is carried out at the final dimensions of the housing. The invention also concerns a moulding apparatus and the housing obtained. | 08-13-2015 |
20150223061 | METHOD FOR INITIATING AN OTA SESSION - The invention relates to a method for initiating an OTA session in a mobile radio communication network at the request of a user of a mobile terminal. The OTA session is established between the mobile terminal and a remote OTA server, the mobile terminal including a security element such as a UICC card. According to the invention, the method comprises: i) entering a special code using the man/machine interface of said mobile terminal; ii) said security element intercepting said special code; and iii) opening said OTA session between said mobile terminal and said remote server in a secure mode. | 08-06-2015 |
20150215311 | METHOD FOR CLONING A SECURE ELEMENT - The invention proposes a method for cloning a first secure element from a backup secure element of a user, said backup secure element comprising at least credentials of said user. The method comprises a preliminary phase of checking the authenticity of the first secure element using a second secure element, said second secure element being able to be paired with a third secure element. | 07-30-2015 |
20150210105 | CARD WITH MARBLED VISUAL EFFECT AND ASSOCIATED MANUFACTURING PROCESS - This invention concerns a card with a marbled visual effect, said card comprising at least one substrate layer comprising a first and a second side, wherein said substrate layer is covered with a translucent protective layer, wherein a pattern cracked by lamination is printed on at least one of the sides of the substrate layer so that the colour located underneath said pattern can be seen through the cracks. | 07-30-2015 |
20150163220 | METHOD FOR AUTHENTICATING A USER OF A CONTACTLESS CHIP CARD - A method is intended for authenticating a user of a contactless chip card by means of a contactless card reader. This method comprises the steps of: (i) using this contactless card reader for acquiring a first image of at least a part of the user hand that holds the card when it is presented to this contactless card reader, (ii) comparing this first image with a second image stored into this contactless chip card, this second image defining a reference image of at least this part of the user hand when it holds the contactless chip card, to determine if this first image is similar to this second image, and (iii) authenticating this user if this first image is effectively similar to this second image. | 06-11-2015 |
20150149765 | METHOD OF ANONYMIZATION - This invention is aimed at a method for the anonymisation of data that could help identify the user while a profile of said user is collected by a targeting data collection server. To implement such anonymisation, an anonymisation server is placed between a user terminal and the collections server. The profile data collected are encrypted by the terminal using a secret key shared with the data collection server. Those profile data supplemented with data that could help identify the user are then sent to the anonymisation server. The anonymisation server encrypts the data that could help identify the user with an anonymisation key of said anonymisation server before sending on the encrypted collected data and the anonymised identification data to said collection server. | 05-28-2015 |
20150134958 | UICCS EMBEDDED IN TERMINALS OR REMOVABLE THEREFROM - The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. | 05-14-2015 |
20150129661 | SMART CARD AND METHOD OF PRODUCTION - The present invention relates to a smart card comprising a card body and an electronic module placed within a recess of the card body and further comprising at least one coloured layer placed between the electronic module and the bottom of the recess of the card body. | 05-14-2015 |
20150121510 | METHOD, DEVICE AND SYSTEM FOR ENTERING DATA - The invention relates to a method for entering data, data to be entered comprising at least one digit. A first device comprises at least one touch sensitive interface. The touch sensitive interface is sensitive to at least one touch. According to the invention, at least one digit being associated with no touch or a count of at least one touch, the method comprises the following steps. The first device detects, in a predetermined time period, a count of at least one touch that is or is not present at once or several times. The first or a second device determines the digit associated with no detected touch or a detected count of at least one touch, the second device being connected to the first device. The invention also relates to corresponding device and system. | 04-30-2015 |
20150110266 | COUNTERMEASURE METHOD AGAINST SIDE CHANNEL ANALYSIS FOR CRYPTOGRAPHIC ALGORITHMS USING BOOLEAN OPERATIONS AND ARITHMETIC OPERATIONS - The present invention relates to a countermeasure method against side channel analysis for cryptographic algorithm using Boolean operations and arithmetic operation. To protect a cryptographic algorithm combining Boolean and arithmetic instructions against first order side channel analysis, it is necessary to perform conversions between Boolean masking and arithmetic masking. The present invention proposes a new conversion method from arithmetic masking to Boolean masking, using only one precomputed table T. Said table T being configured so that to convert from arithmetic to Boolean masking k-bit nibble by k-bit nibble for integers having a size greater than k bits while adding a masked carry from the modular addition to the nibble. | 04-23-2015 |
20150098365 | BIDIRECTIONAL COMMUNICATION - A two-way communication device has a master transmitter connected to at least one slave transmitter by an active connection wire. The master transmitter and the slave transmitter have a common reference. The master transmitter can transmit a master signal to the slave transmitter and the slave transmitter can transmit a slave signal to the master transmitter. The master signal is a digital modulation in voltage. The slave signal is a digital modulation in current. | 04-09-2015 |
20150097698 | METHOD, DEVICE AND SYSTEM FOR MANAGING A PROVISION OF ENERGY - A remote server is connected to at least one energy box, each energy box being connected to at least one energy consuming device, and each energy box being connected to a metering device. The remote server sends to the energy box a transaction demand. The energy box sends to at least one energy consuming device an energy consumption reduction request. The metering device measures energy consumption of the energy consuming device. The metering device sends to the energy box the measured energy consumption. The energy box verifies whether the demanded transaction has been carried out based upon at least one test, the test depending on at least one measured energy consumption. If the demanded transaction has been carried out, the energy box sends to a remote server a transaction response. | 04-09-2015 |
20150056954 | CALL REDIRECTION METHOD IMPLEMENTED IN A TELECOMMUNICATION SYSTEM AND CORRESPONDING SYSTEM - In a call redirection method, an application of a second telecommunications terminal requests one of the active numbers in the security element of a first terminal. The application transmits a request for an active telephone number in the security element to its operator, and the latter retransmits it to a manager of the security element having knowledge of the active subscription in the security element. At least one subscription is inactive and at least one subscription is active. Each subscription has a corresponding call number. A call number is called an active call number if the corresponding subscription is active, and a call number is called an inactive call number if the corresponding subscription is inactive. The method includes composing the telephone number corresponding to one of the active subscriptions or prompting the user of the second terminal to validate the call to one of these active numbers. | 02-26-2015 |
20150038193 | METHOD FOR EXPORTING DATA OF A JAVACARD APPLICATION STORED IN A UICC TO A HOST - The invention proposes a method for exporting data of a Javacard application stored in a UICC to a host, the method consisting in:
| 02-05-2015 |
20150034716 | METHOD FOR VERIFYING DOCUMENTS AND DEVICE IMPLEMENTING SUCH A METHOD - This invention relates to a method used by an authorised user for the verification of a document having electronic verification means, The method comprises the various steps consisting in:—reading, with electronic reading equipment with which the authorised user is equipped, of information stored in the electronic verification means of the verified document;—transferring verification information, established on the basis of the information saved in the electronic verification means, from the electronic reading equipment to a viewing device of the authorised user, which viewing device is positioned, in normal conditions of use, in front of the eyes of the authorised user, the said viewing device being transparent to allow the said authorised user to see through it. | 02-05-2015 |
20150017949 | METHOD AND TERMINAL FOR COMMUNICATING DATA WITH A WIRELESS DEVICE - A wireless device presents a predetermined identifier and at least one code comprising connection data. A terminal communicates over a short range radio-frequency link, with a wireless device. The terminal has a camera and a display screen. The terminal detects, through the camera, an identifier relating to a wireless device in a vicinity of the terminal. The terminal presents, through the display screen, at least one object for each detected identifier, the object being associated with a wireless device. A terminal user selects, through the display screen, one object amongst the presented objects. The terminal reads or extracts the connection data comprised within the selected code associated with the corresponding selected wireless device. And the terminal establishes, a connection, over the short range radio-frequency link, to the corresponding selected wireless device. | 01-15-2015 |
20140375136 | Contactless Electronic Communication Device with Optional Auxiliary Power Source - A device having a card ( | 12-25-2014 |
20140367473 | METHOD FOR MANUFACTURING SMART CARDS - This invention relates to a smart card ( | 12-18-2014 |
20140365364 | METHOD OF PAYMENT FOR A PRODUCT OR A SERVICE ON A COMMERCIAL SITE THROUGH AN INTERNET CONNECTION AND A CORRESPONDING TERMINAL - The invention relates to a method of payment for a product or a service on a commercial website through an Internet connection and a terminal that is connected to the commercial website via the Internet connection, with the payment being made using at least one identifier contained in a payment card. According to the invention, the terminal comprises an interface of the NFC type that reads the aforementioned banking identifier contained in the payment card, with the payment card being of the NFC type, and the terminal having an application able to transmit the identifier to a dedicated server on a secure link which the commercial website is connected to after the identifier has been read by the terminal, with the dedicated server concatenating the payment characteristics before transmitting same to the bank site. | 12-11-2014 |
20140351569 | SOFTWARE UPDATING PROCESS FOR AN EMBEDDED DEVICE - The invention relates to a method for updating software in an embedded device ( | 11-27-2014 |
20140350778 | VEHICLE PROVIDING A SECURED ACCESS TO SECURITY DATA - The invention relates to a vehicle ( | 11-27-2014 |
20140334097 | ELECTRONIC DEVICE COMPRISING ELEMENTS MANAGED BY DIFFERENT STANDARDISED PROTOCOLS AND METHOD FOR MANAGING COMMUNICATION BETWEEN THOSE ELEMENTS - The embodiments of this invention relate to an electronic device ( | 11-13-2014 |
20140331302 | METHOD FOR SECURING AN ELECTRONIC DOCUMENT - The object of this invention is a method for securing an electronic document. In particular, this invention relates to a method that prevents the forging of documents in which an electronic chip is incorporated. To that end, the invention proposes a method in which the data on the document medium are associated with a fingerprint of the document, so as to make them inseparable. That fingerprint is determined on the basis of measurable physical units of the electronic chip or the medium. Thus, the invention allows the combination of the physical protection of the document and the protection of the chip so as to reinforce the security of said documents. | 11-06-2014 |
20140331182 | METHOD FOR ENTERING A PERSONAL IDENTIFICATION CODE IN A DEVICE - The present invention relates to method (M) for entering a personal identification code composed of characters in a device comprising a user graphical interface. Said method is characterized in that it comprises the steps of: —displaying a plurality of reference elements on the device's user graphical interface; —displaying a plurality of characters on the device's user graphical interface; —indicating, by means of an audio canal of the device, a reference element to be used for setting a personal identification code's character in correspondence with said reference element; and —capturing said personal identification code's character which has been positioned by means of said user graphical interface to correspond with said reference element. | 11-06-2014 |
20140324654 | METHOD FOR ENROLLING AND AUTHENTICATING A CARDHOLDER - The invention relates to a method for enrolling and authenticating a bank's cardholder to a service provided by a service provider, characterised in that it comprises: a. receiving an identification cardholder data (ID) by a first channel; b. double-checking the identity of said cardholder by a second channel. | 10-30-2014 |
20140319817 | SECURITY DOCUMENT AND METHOD OF MANUFACTURING SECURITY DOCUMENT - A security document having a first side ( | 10-30-2014 |
20140308990 | SCORED SMART CARD - The invention relates to a SIM ( | 10-16-2014 |
20140301553 | CRYPTOGRAPHIC METHOD FOR PROTECTING A KEY HARDWARE REGISTER AGAINST FAULT ATTACKS - The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs. | 10-09-2014 |
20140250501 | SECURE ELEMENT COMPRISING SEPARATED CONTAINERS AND CORRESPONDING METHOD - The invention is a secure element comprising a virtual machine able to work in admin mode and in runtime mode. The secure element comprises two enhanced containers. Each of said enhanced containers can be either in an activated state or in a disabled state. Only one of the enhanced containers can be in activated state at any given time. The virtual machine is adapted to access each of the enhanced containers when working in admin mode. The virtual machine cannot access an enhanced container which is in disabled state when working in runtime mode. | 09-04-2014 |
20140245272 | COMPUTER PROGRAM PRODUCT CONTAINING INSTRUCTIONS FOR PROVIDING A PROCESSOR THE CAPABILITY OF EXECUTING AN APPLICATION DERIVED FROM A COMPILED FORM - An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal. | 08-28-2014 |
20140223526 | SYSTEM AND METHOD FOR PROVIDING PRIVACY IN SMART METER DEPLOYMENT - Privacy-preserving smart metering for a smart grid. Issuing a privacy-enhanced credential to a consumer node having smart meter. Operating the consumer node to associate an id with the credential and to use the id to report usage. Other systems and methods are disclosed. | 08-07-2014 |
20140219522 | METHOD FOR IDENTIFYING AN INDIVIDUAL AND CORRESPONDING DEVICE - A method for identifying an individual having at least one physical print that includes at least one fingerprint. The method includes a print marking step by which at least one physical print is marked at at least one minutia. The print marking step comprises either affixing at least one material particle onto a surface of the at least one physical print and/or below the surface of the at least one physical print, or modifying a surface of the at least one physical print by means of electromagnetic radiation. Also disclosed is a corresponding device for identifying an individual. | 08-07-2014 |
20140206338 | METHOD FOR SWITCHING A SUBSCRIPTION FROM A FIRST MNO TO A SECOND MNO - The invention relates to a method for switching a subscription of a user from a first MNO ( | 07-24-2014 |
20140194061 | DEVICE FOR COMMUNICATING THROUGH THE BODY, CUSTOMISABLE WITH AN ACCESSORY - The invention concerns a portable electronic device having a module for communicating through the body, the module including a contact surface for electrical contact with the skin of a wearer, a base containing the module, a mechanism for securing the device to a part of the body of the wearer, in contact with the skin, and structure for attaching a personal accessory or a watch case to the device. The device differs in that it comprises structure for attaching a personal accessory or a watch case arranged on the base or on the securing mechanism. | 07-10-2014 |
20140191046 | SECURED DOCUMENT INCLUDING A RADIOFREQUENCY IDENTIFICATION DEVICE - This invention relates to a secure document ( | 07-10-2014 |
20140189799 | MULTI-FACTOR AUTHORIZATION FOR AUTHORIZING A THIRD-PARTY APPLICATION TO USE A RESOURCE - Enhanced security for limited access through multi-factor authorization to cloud computing resources. The enhanced security is obtained by utilizing a personal security device to perform certain security operations as part of an authorization protocol such that an authorization grant is confirmed using two independent factors such as evidence of knowledge of a secret plus possession of a personal security device. The personal security device may also store an access token and perform cryptographic operations evidencing possession of the access token. Other systems and methods are disclosed. | 07-03-2014 |
20140189373 | METHOD FOR HARD PARTITIONING THE RESOURCES OF A SECURE COMPUTER SYSTEM - This invention relates to a method for hard partitioning the resources of a secure computer system. The system hardware comprises a hardware mechanism designed to: generate an encryption key with each new program detected by the system, the key being specific to each program, store the said key associated with a program identifier in the system resources, encrypt and store all the data created by the program in the system resources with the key that is specific to it, decrypt the data of the program with the key specific to it in response to a manipulation, call, read and/or write request from a requesting program. | 07-03-2014 |
20140159870 | CONTACTLESS COMMUNICATION METHOD WITH NEGATIVE MODULATION - The present invention concerns a method of radio-frequency communication between a contactless transponder and a reader, in which at least one sideband of the carrier frequency is used for communicating a response from the transponder by modulation of the amplitude of this carrier frequency. The method is distinguished in that the modulation at least partly applies a modulation level greater than 100%, which causes a negative modulation. The invention also concerns a corresponding communication circuit. | 06-12-2014 |
20140155125 | RADIO-FREQUENCY COMMUNICATION DEVICE COMPRISING A POWER SUPPLY OF ASSISTED RADIO-FREQUENCY ORIGIN - A radio-frequency communication device includes connection means electrically connecting an integrated circuit component, or intended for this purpose; and selection means for selecting an electromagnetic current power supply for the component. The device includes an alternative power supply source for powering the component during the reception of an electromagnetic field as soon as the electromagnetic power supply current received by the component is insufficient. | 06-05-2014 |
20140152519 | WIRE CAPACITOR, IN PARTICULAR FOR A RADIO FREQUENCY CIRCUIT, AND DEVICE COMPRISING SAID WIRE CAPACITOR - The invention relates to a radio frequency device including an antenna connected to a capacitor. Said capacitor includes first and second conductive plates that are opposite each other and separated by an insulator. At least one of said first and second plates is formed of a plurality of wire capacitor portions. Said radio frequency device is different in that the antenna and at least one capacitor plate are formed with wire portions placed on a substrate in a guided manner. | 06-05-2014 |
20140152511 | PORTABLE DEVICE WITH APERTURED ELECTRICAL CONTACTS - The invention relates to a portable electronic device comprising a supporting member receiving on one side conductive contact lands or tracks extending substantially as far as the edge of the side and connecting an electronic microcircuit, the conductive contact lands or tracks comprising a plurality of perforations. The device is noteworthy in that the interior of the perforations is free, or intended to be kept free, of metal. | 06-05-2014 |
20140149738 | METHOD FOR ACCESSING A SERVICE OF A SERVICE PROVIDER BY PROVIDING ANONYMOUSLY AN ATTRIBUTE OR A SET OF ATTRIBUTES OF A USER - (EN)The invention relates to a method Method for accessing a service (S) of a service provider (SP | 05-29-2014 |
20140141747 | METHOD FOR TRANSMITTING A SIM APPLICATION OF A FIRST TERMINAL TO A SECOND TERMINAL - A method for transmitting a SIM application of a first terminal to a second terminal, the SIM application being stored in a secure element included in the first terminal, with access to the SIM application being locked by a PIN code. The method includes exporting the SIM application from the first terminal to a distant site, by including the PIN code as well as a remote loading code. A user of the second terminal is asked to enter the remote loading code in the second terminal. In the event the remote loading code entered by the user matches the remote loading code that has been exported, the installation of the SIM application in a secure element of the second terminal is authorized. Otherwise, the SIM application is not installed in the secure element of the second terminal. | 05-22-2014 |
20140131989 | SECURITY DOCUMENT AND A MANUFACTURING METHOD THEREOF - A security document ( | 05-15-2014 |
20140131453 | RADIOFREQUENCY TRANSPONDER DEVICE WITH OPTIMIZED PASSIVE RESONANT CIRCUIT - The invention relates to a radiofrequency device comprising a passive antenna tuned or intended to be tuned in frequency with at least one transponder, said transponder comprising an integrated circuit chip linked to an antenna interface defining an electromagnetic coupling surface periphery, said passive antenna comprising a main loop formed of turns comprising at least one portion of surface (B) inside the loop, at least one recess of the main loop, oriented from the interior to the exterior of the main loop, said portion of surface (B) being located in said recess so as to effect an electromagnetic coupling with a transponder circuit; the device is distinguished in that it comprises two recesses receiving or intended to receive a transponder each. | 05-15-2014 |
20140122872 | METHOD FOR EXPORTING ON A SECURE SERVER DATA COMPRISED ON A UICC COMPRISED IN A TERMINAL - A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC. | 05-01-2014 |
20140119355 | METHOD FOR ESTABLISHING A TWO-WAY IP COMMUNICATION CHANNEL IN A TELECOMMUNICATIONS NETWORK - A method for establishing a communication channel between a local server and a remote server includes: i) transmitting, from the local server to a terminal, the IP address of the remote server and a communication port of the local server; ii) transmitting the IP address of the terminal from the terminal to the local server; iii) transmitting, from the local server to the terminal, a request to connect to the remote server, including the IP addresses of the remote server and the terminal, an identifier of the local server; and the communication port; iv) transmitting, from the local server to the remote server, the IP address of the terminal, an identifier of the local server, and the communication port; and v) combining, at the remote server, the identifier of the local server and the IP address of the terminal to ascertain an IP address of the local server. | 05-01-2014 |
20140110930 | INFORMATION MEDIUM WITH PRINTED IDENTIFICAITON INFORMATION AND ANTI-FORGERY MEANS - The invention relates to the securing of information media so as to prevent any alteration or modification of the identification information and the fraudulent reuse of the media. The identification document according to the invention comprises personalisation information placed on at least one of its main sides, and invisible anti-forgery means placed on at least part of the said side and designed to undergo a change in appearance in the event of an attempt to do additional personalisation. The anti-forgery means are formed by subdividing each pixel into a matrix of N dots, the said N dots having each a different colour density in order to obtain an average colour density of the said matrix that is equivalent to the colour density predetermined for the corresponding pixel, at least some of the said N dots of the matrix being pre-sensitised so that their colour darkens at a variable speed in the event of additional personalisation, as compared to the other non pre-sensitised dots | 04-24-2014 |
20140108711 | PORTABLE SECURE DEVICE PROVIDING STORAGE SERVICE - A secure device includes a non volatile memory and a secure storage unit for a contactless reader. The storage unit manages logical sectors comprising a preset number of 16-byte data blocks and provides secured access to these data blocks. The unit is a software agent. The secure device comprises a microprocessor able to run the secure storage unit. The unit is adapted to ensure consistency of the data blocks and to ensure a preset number of writing into the data blocks without erasing operations. | 04-17-2014 |
20140087696 | SECURED ELEMENT FOR PERFORMING A USER AUTHENTICATION AND USER AUTHENTICATION METHOD - The invention relates to a secured element ( | 03-27-2014 |
20140080444 | METHOD FOR UPDATING SECURE ELEMENTS INCLUDED IN TERMINALS OF A TELECOMMUNICATION NETWORK AND CORRESPONDING UPDATE SERVER - The invention relates, in particular, to a method for updating secure elements included in terminals of a telecommunication network. The terminals connect, for recurring updates and according to a first order, to a server of the network such that said server can transmit data thereto. In the context of a process for updating the secure elements, the method comprises transmitting messages requesting connection to the secure elements such that the latter connect to the server. According to the invention, the method comprises the prioritized transmission of the messages requesting connection to the secure elements in an order that is the reverse of the first order, in order to update, on a prioritized basis, the last secure elements that were updated by the recurrent updates from the start of the update process. | 03-20-2014 |
20140066011 | METHOD FOR TRANSFERRING SECURELY THE SUBSCRIPTION INFORMATION AND USER DATA FROM A FIRST TERMINAL TO A SECOND TERMINAL - The present invention concerns a method for transferring securely the subscription information and user data from a first terminal to a second terminal, the terminals respectively containing a first and a second UICC. According to the invention, the method consists in: | 03-06-2014 |
20140063086 | Graphic Printing Machine for a Card-Type Storage Medium, Method for Printing Said Storage Media and Storage Media - A graphic printing machine and method for a card-type storage medium employs a jet printing head and a controller to perform ink jet printing on the medium. The invention is useful for printing plastic or cardboard or paper cards. | 03-06-2014 |
20140057680 | SYSTEM FOR MANAGING MULTIPLE SUBSCRIPTIONS IN A UICC - The invention relates to a system for managing multiple subscriptions in a UICC, this system comprising a central server able to manage subscriptions stored on a UICC comprised in a mobile terminal in the field, at the request of a subscriber of one of these subscriptions. | 02-27-2014 |
20140050316 | METHOD AND APPARATUS FOR NONLINEAR IV SETUP IN KEYSTREAM GENERATORS - The invention concerns the contact-less technology MIFARE, and describes a method to update a state by injecting an IV using a non-linear feedback shift register that makes use of only look-up tables and basic operations on 8-bit words. | 02-20-2014 |
20140045442 | ELECTROMAGNETIC FIELD TRANSMITTING AND RECEIVING ANTENNAE ARRANGEMENT - A method for minimizing an interfering current induced in an antenna receiving an electromagnetic field, where the field is generated by a transmitting antenna located near the receiving antenna. The receiving antenna is arranged relative to the transmitting antenna such that the induced current is at least partially cancelled out in the receiving antenna. The invention also relates to an antenna arrangement and to a device comprising the same. | 02-13-2014 |
20140031083 | METHOD FOR SWITCHING BETWEEN A FIRST AND A SECOND LOGICAL UICCS COMPRISED IN A SAME PHYSICAL UICC - A method for switching between first and second logical U ICCs in the same physical U ICC. Each logical UICC has an area for storing overlapped volatile data and an area for storing overlapped persistent data. The physical UICC also has an OS area. When a switch order is received to switch from the first logical UICC to the second logical U ICC. Overlapped volatile data from the OS area is backed up to the area for storing overlapped volatile data of the first logical U ICC. Overlapped persistent data from the OS area is backed up to the area for storing overlapped persistent data of the first logical U ICC. Volatile data from the area for storing overlapped volatile data from the second logical UICC is restored to the OS area. Persistent data from the area for storing overlapped persistent data from the second logical UICC is restored to the OS area. | 01-30-2014 |
20140030986 | METHOD, CIRCUIT AND CONTACTLESS COMMUNICATION DEVICE WITH ACTIVATED EMITTING - An activated contactless communication circuit includes a device for receiving and transmitting a data-carrying electromagnetic field; a first circuit resonating with a first antenna for receiving data; and a second circuit resonating with a second antenna for transmitting data, the first and second resonating circuits being separate from each other. The transmission is carried out at a frequency phase-synchronized with the frequency of the electromagnetic field for reception. | 01-30-2014 |
20140024343 | Method for Downloading a Subscription in an UICC Embedded in a Terminal - The invention proposes a method for downloading a subscription in an UICC embedded in a terminal, this method consisting in:
| 01-23-2014 |
20140020051 | USER TO USER DELEGATION SERVICE IN A FEDERATED IDENTITY MANAGEMENT ENVIRONMENT - Method for providing user-to-user delegation service in federated identity environment, characterized in that it comprises a delegation or assignment step wherein a delegator specifies said delegation at an identity provider for delegating a privilege or task to a delegatee to be performed at a service provider. | 01-16-2014 |
20140019760 | METHOD FOR PERSONALIZING A SECURE ELEMENT COMPRISED IN A TERMINAL - The invention proposes a method for personalizing a first secure element comprised in a first terminal, said method consisting in:
| 01-16-2014 |
20140015639 | SMARTCARD RECEIVING DEVICE FOR PROVIDING A REMOTE COMMUNICATION WITH SWITCHING MEANS - The invention relates to a smartcard receiving device, comprising a contact interface ( | 01-16-2014 |
20140004854 | METHOD FOR STEERING A HANDSET'S USER ON PREFERRED NETWORKS WHILE ROAMING | 01-02-2014 |
20130337742 | METHOD FOR SELECTING ONE OF N CONTACTLESS ELECTRONIC DEVICES - The invention relates to a method for selecting one of a plurality of contactless electronic devices by means of a voluntary action of the user in accordance with a display of visual information, said visual information being from each of the contactless electronic devices. The invention also relates to a contactless terminal capable of implementing said method. | 12-19-2013 |
20130334320 | SMARTCARD PROVIDING AN IMPROVED STANDBY MODE - The invention relates to a smartcard ( | 12-19-2013 |
20130329683 | METHOD FOR REMOTELY DELIVERING A FULL SUBSCRIPTION PROFILE TO A UICC OVER IP - The invention proposes a method consisting in: | 12-12-2013 |
20130324091 | METHOD FOR DOWNLOADING A SUBSCRIPTION FROM AN OPERATOR TO A UICC EMBEDDED IN A TERMINAL - The present invention relates to a method for downloading a subscription from an operator to a UICC embedded in a terminal. The method includes transmitting from the terminal, to a platform, an identifier and a request for downloading the subscription; verifying in the platform that the terminal is authorized to download the subscription by verifying the rights of the terminal in accordance with its identifier; and downloading the subscription to the UICC if the rights are confirmed and, otherwise, refusing to download the subscription. | 12-05-2013 |
20130318355 | METHOD FOR MANAGING CONTENT ON A SECURE ELEMENT CONNECTED TO AN EQUIPMENT - The invention concerns a method for managing content on a secure element connected to an equipment, this content being managed on the secure element from a distant administrative platform. According to the invention, the method consists in: establishing, at the level of the administrative platform a secure channel between the equipment and the administrative platform, thanks to session keys generated by the secure element and transmitted to the equipment; transmitting to the administrative platform a request to manage content of the secure element; and verifying at the level of the administrative platform that this request originates from the same secure element that has generated the session keys and, if positive, authorizing the management and, if negative, forbid this management. | 11-28-2013 |
20130303086 | SYSTEM FOR COMMUNICATING IN A CONTACT-LESS MANNER, AND CORRESPONDING REMOVABLE CHIP CARD, TERMINAL AND METHOD - A system for communicating via contact-less chip with an external contact-less communicating device comprises a removable chip card, a contact-less communicating chip and a terminal. The contact-less chip is carried by a flexible medium. A chip of the card is coupled, via a card connector, to the contact-less communicating chip, and a microprocessor of the terminal. The card chip is configured to act as an intermediary entity between the contact-less communicating chip and the terminal microprocessor. A card chip microprocessor exchanges data with the contact-less chip by using a first data communication protocol. The card chip microprocessor exchanges data with the terminal microprocessor by using a second data communication protocol. The terminal microprocessor is configured to send, through the card chip, to the contact-less communicating chip, data that is previously encapsulated within first communication protocol data that is itself encapsulated within second communication protocol data. | 11-14-2013 |
20130301828 | METHOD FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL - The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (sk | 11-14-2013 |
20130299595 | METHOD FOR INTERCONNECTING A CONDUCTIVE PAD AND AN ELECTRICAL CONTACT VIA A SPRING, AND CORRESPONDING DEVICE - A device having an integrated-circuit chip includes an insulating body containing at least one conductive pad, at least one electrical contact opposite the electrically conductive pad, and at least one recess in the body, including a bottom and one aperture. The recess is connected, at the bottom thereof, to the conductive pad and, at the aperture thereof, to the electrical contact. At least one coil spring is arranged in the recess and connecting the conductive pad to the electrical contact. The installation of the spring in the recess is facilitated by means of the friction of the central portion of the spring relative to the walls of the recess. The invention also relates to a method for producing an electrical connection between at least one conductive pad arranged in an insulating body and at least one electrical contact arranged opposite the electrically conductive pad. | 11-14-2013 |
20130291084 | METHOD FOR ACCESSING A SECURE ELEMENT AND CORRESPONDING SECURE ELEMENT AND SYSTEM - The invention relates to a method for communicating information. A first device is coupled to a secure element. The secure element sends, at an initiative of the secure element, to the first device a secure element identifier. The first device sends to a second device at least one first message comprising the secure element identifier. The second device sends to a third device at least one second message comprising the secure element identifier and two communication network subscription identifiers, as associated data, the second device adding the two communication network subscription identifiers. The third device stores the associated data. The invention also relates to a corresponding system. | 10-31-2013 |
20130290479 | METHOD FOR CONNECTING TO A REMOTE SERVER FROM A BROWSER ENABLED WITH A BROWSER'S EXTENSION ON A HOST DEVICE - A method for connecting to a remote server from a browser enabled with a browser's extension on a host device, wherein upon connection of a data processing device with a data processing device reader linked to the host device, the browser's extension receives data contained in a targeted file stored in said data processing device, said data being able to be interpreted by the browser so as to trigger a connection to the remote server and to display a subscribed service portal, said data being sent by the data processing device upon execution of a command transmitted by the browser's extension. | 10-31-2013 |
20130290273 | METHOD FOR UPDATING AN ENCODED FILE - The invention relates to method for updating data of an encoded file from a remote server, said encoded file being stored in a secure device, characterized in that it comprises step a): sending a message to said secure device, step b): decoding the encoded file to update, step c): locating a target data and performing an operation upon said target data, said message comprising configuration data and data block. | 10-31-2013 |
20130287211 | SYSTEM FOR ACCESSING A SERVICE AND CORRESPONDING PORTABLE DEVICE AND METHOD - A system for accessing a service comprises two contact-less readers and one portable device. A first contact-less reader is configured to send to the portable device, through a first range radiofrequency link, a first message comprising first data. The first data includes an identifier allocated to the portable device and an associated key for encrypting data. The portable device is configured to send to a second contact-less reader, through a second range radiofrequency link, a second message comprising second data. The second data includes the identifier received from the first message. The second data is encrypted by using the data encryption key received from the first message. The second range radio frequency is higher than the first range radio frequency. | 10-31-2013 |
20130283047 | SYSTEM AND METHOD FOR SECURELY USING MULTIPLE SUBSCRIBER PROFILES WITH A SECURITY COMPONENT AND A MOBILE TELECOMMUNICATIONS DEVICE - System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile. | 10-24-2013 |
20130275748 | SECURE PASSWORD-BASED AUTHENTICATION FOR CLOUD COMPUTING SERVICES - Secure password-based authentication for cloud service computing. A request for cloud computing resource access includes a derivative password that contains a parameter that the recipient may extract in order to independently calculate the derivative password based on the parameter and a stored password which may then be verified against a known-to-be-correct password. Other systems and methods are disclosed. | 10-17-2013 |
20130273999 | METHOD FOR SAVING THE STATE OF A PART OF A GAME AND METHOD FOR RESTORING THE CORRESPONDING GAME - The invention relates in particular to a method for saving the state of a session of a game played by at least two players, the game including game elements having chips that are capable of contactless communication with a terminal via an interface. The terminal includes a screen, the game consisting of presenting game elements to the interface, each player being identified by the terminal by a game element referred to as the master element. According to the invention, the saving method involves: recording the history of the game session, recording the game elements which have not been in play, if applicable, and recording the game elements in the possession of the players at the time that the game was interrupted, by means of master elements, so as to be able subsequently to resume the game session in the same state in which the game was when interrupted. | 10-17-2013 |
20130273846 | COMMUNICATION SYSTEM - The invention relates to a communication system comprising a terminal ( | 10-17-2013 |
20130268934 | DYNAMIC METHOD FOR CONTROLLING THE INTEGRITY OF THE EXECUTION OF AN EXECUTABLE CODE - The present invention describes a method for securing the execution of a computer program in a multitask device. This method is based on the execution, in parallel with the program to be made secure, of a security thread, able to modify the parameters of the scheduler. | 10-10-2013 |
20130247163 | METHOD FOR PROVIDING A USER WITH AN AUTHENTICATED REMOTE ACCESS TO A REMOTE SECURE DEVICE - The invention relates to a method for providing a user with an authenticated remote access to a remote secure device ( | 09-19-2013 |
20130238904 | PROTECTION AGAINST SIDE CHANNEL ATTACKS WITH AN INTEGRITY CHECK - The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention. | 09-12-2013 |
20130227679 | METHOD FOR ACCESSING AN APPLICATION AND A CORRESPONDING DEVICE - The invention relates to a method for accessing an application. A token includes at least one application that is executable by a device. The token is coupled to the device. The method comprises the following steps. The token sends to the device data for identifying the token and data for authenticating the token. The device analyses whether the token identification data is included within a list of at least one authorized token. Only if the token identification data is included within a list of at least one authorized token, then the device analyses whether the token is authenticated. And only if the device authenticates the token, then the device authorizes to execute the application. The invention also relates to a corresponding device. | 08-29-2013 |
20130219494 | METHOD OF ANALYZING THE BEHAVIOR OF A SECURE ELECTRONIC TOKEN - The invention is a method of analyzing the behavior of a secure electronic token which comprises an interface for exchanging data with an external entity. The token has a lifecycle wherein the token is intended to be created then issued. The method comprises the steps of:
| 08-22-2013 |
20130173759 | PORTABLE DEVICE FOR ACCESSING A SERVER, CORRESPONDING SYSTEM, SERVER AND METHOD - The invention relates to a portable device for accessing a server. According to the invention, the device is adapted to send to a server or data relating to rights for accessing a server. The invention also relates to corresponding system, server and method. | 07-04-2013 |
20130166902 | SIMPLIFIED SMARTCARD PERSONALIZATION METHOD, AND CORRESPONDING DEVICE - The invention relates to a method for personalizing an electronic device using an encryption device adaptable to standard certified apparatuses. The encryption device makes it possible to ensure the confidentiality of the transfer of a secret code from the user to a possible personalization server. | 06-27-2013 |
20130153667 | METHOD FOR MAKING A DEVICE COMPRISING A TRANSPONDER ANTENNA ON A THIN WEB AND RESULTING DEVICE - The invention relates to a method for making a device comprising a transponder antenna, wherein the method comprises the steps of: making an assembly including a thin substrate carrying at least one antenna, the antenna having connection end portions bearing on the substrate at substrates locations. The substrate forms or includes a sheet- or strip-like adhesive body in contact with the antenna. The invention also relates to the resulting device. | 06-20-2013 |
20130148309 | METHOD FOR CREATING A MULTIFUNCTIONAL MODULE AND DEVICE INCLUDING SAME - The invention relates to a method for creating a multi-component device, including the following steps, creating a module having a multilayer structure comprising electrical/electronic components arranged on at least one substrate in stacked layers, the components each having a main surface exposed to the outside, wherein the components are arranged such that the respective main surfaces thereof are oriented in mutually opposite directions. The invention also relates to the corresponding device. | 06-13-2013 |
20130135100 | METHOD OF DETECTING AN ABNORMAL ENVIRONMENTAL OPERATING CONDITION OF AN ELEMENT EMBEDDED IN AN APPARATUS AND CORRESPONDING ELEMENT - A method of detecting an abnormal environmental operating condition of an element embedded in an apparatus. The element is able to communicate with a telecommunications network. The method includes cyclically measuring at least one environmental operating parameter of the element, detecting that the element is operating for an excessive duration in at least one reference operating span, and transmitting an alert message to the telecommunications network if the element has operated for an excessive duration in the reference operating span. | 05-30-2013 |
20130122870 | METHOD FOR MANAGEMENT OF A VOICE MAILBOX PHONE - The invention relates to a method for managing a voice mailbox on a voice mailbox server comprising the steps of getting (S_GET_VOICE_MSG) voice mail data (VOICE_MSG), getting (S_GET_SNDR_ID) a Sender Identification (SNDR_ID), and getting (S_GET_INFO_CALL) at least one characterizing information about the call (INFO_CALL). | 05-16-2013 |
20130117861 | SYSTEM ALLOWING THE DISPLAY OF A PRIVATE COMPUTER FILE ON A SCREEN OF A TELECOMMUNICATIONS TERMINAL AND CORRESPONDING METHOD - A system allows the display of a private file on a screen of a telecommunications terminal. This system includes a first and a second Internet site. In the first Internet site, a first image contains a coded link to an address of a file of the second Internet site. The private file is stored in encrypted form in the meta data of the file in the second Internet site. A program recognizes the coded link and searches the meta data of the file whose Internet address corresponds to the coded link for authorization of a person connected to the first Internet site to view the private file. The program downloads the private file of the second Internet site via a remote protocol from the telecommunications terminal if viewing is authorized, to display the private file on the screen. | 05-09-2013 |
20130115942 | METHOD FOR LOADING A LIST OF PREFERRED NETWORKS INTO A SECURE ELEMENT CONTAINED IN A MOBILE TERMINAL - The invention relates to a method for loading a list of preferred networks into a secure element contained in a mobile terminal. The loading is accomplished when the secure element detects that it is in a roaming condition within a telecommunication network. The method consists of: i) asking ( | 05-09-2013 |
20130102306 | AUTO IMSI SWITCH FOR INTERNATIONAL ROAMING - The invention concerns a method for automatically switching from a Home IMSI to a Roaming IMSI and vice versa, said Home IMSI and Roaming IMSI being contained in a SIM card adapted to be used in a mobile station and adapted to comprise elementary files, wherein it comprises the step of triggering the switch from one IMSI to another when detecting an update of the elementary file comprising forbidden public land mobile networks (EF | 04-25-2013 |
20130094600 | METHOD OF MANAGING TRANSFERS OF DATA BY AN INTERFACE OF BLUETOOTH TYPE - The embodiments of this invention describe a method for managing the transfer of data between a peripheral comprising a Bluetooth type interface and a computer device comprising a Bluetooth type interface configured to manage Bluetooth profiles allowing the transfer of audio type data characterised in that the exchange of digital non-audio type data between the peripheral and the computer device is achieved by encoding the digital data in audio format and by transmitting those digital data by means of the audio channel of the Bluetooth interface. | 04-18-2013 |
20130090066 | METHOD AND SYSTEM FOR THE PROCESSING CONTROL OF MULTIPLE RADIO FREQUENCY COMMUNICATION STREAMS BY AN INTEGRATED CIRCUIT CARD - The present invention relates to a method for processing a plurality of radiofrequency communication streams by way of an integrated circuit card, the streams originating from at least two terminals, and the card being connected to a device equipped with a radiofrequency communication interface which is suitable for the connection of a plurality of host terminals. The method includes monitoring the reception and/or transmission at and/or to the card of a first and second stream of data originating respectively from a first and second host terminal. The monitoring step includes a step of checking the availability of the card before the second stream of data is transmitted to the card. The invention also relates to the corresponding monitoring system and device. | 04-11-2013 |
20130087627 | BANK CARD WITH DISPLAY SCREEN - In order to allow a display of the latest transactions, a smart card | 04-11-2013 |
20130070510 | METHOD FOR READING A HOLOGRAPHIC MEMORY ON A DATA MEDIUM - The embodiments of this invention also describe to a data medium comprising
| 03-21-2013 |
20130068845 | BANK CARD WITH DISPLAY SCREEN - To allow the display of the latest transactions performed, a chip card | 03-21-2013 |
20130061312 | SECURITY TOKEN FOR SECURELY EXECUTING AN APPLICATION ON A HOST COMPUTER - The invention relates to a security token comprising a communication interface adapted to communicate with a host computer; a security module, comprising encryption based security features; a non volatile memory storing at least an application to be uploaded and executed in a host computer. The application makes use of the security features when executed in a host computer in communication with the communication interface. The security token is adapted to modify the content of the application as uploaded or its execution parameters at successive connexions of the security token to a host computer. | 03-07-2013 |
20130046991 | SYSTEM AND METHOD FOR USING A PORTABLE SECURITY DEVICE TO CRYPTOGRAHICALLY SIGN A DOCUMENT IN RESPONSE TO SIGNATURE REQUESTS FROM A RELYING PARY TO A DIGITAL SIGNATURE - A system, method and computer-readable storage medium with instructions for operating a digital signature server and a portable security device to cooperate to provide digital signature services using a private key stored on the portable security device by delegating to a user's smart card the actual task of digitally signing documents. Other systems and methods are disclosed. | 02-21-2013 |
20130042025 | TOKEN FOR COMMUNICATING WITH A HOST DEVICE, CORRESPONDING COMMUNICATION SYSTEM AND METHOD - The invention relates to a token for communicating with a host device. The token includes an interface for communicating through at least one USB communication channel. The token is adapted to receive, through at least one USB communication channel, a command for requesting the token to specify at least one capability of the token, and send, through at least one USB communication channel, as a reply to the received command, a response for specifying that the token supports a USB device class for HID. The invention also relates to corresponding communication system and method. | 02-14-2013 |
20130014256 | JCVM BYTECODE EXECUTION PROTECTION AGAINST FAULT ATTACKS - The invention relates to a computing device comprising means to store and execute bytecodes, the computing device storing bytecodes which comprise a bytecode for calling a method. An attack detection bytecode is present after the bytecode for calling the method, and when executing bytecode, the computing device is set, upon return from the method, to continue bytecode execution after the attack detection bytecode. The invention also relates to a procedure for generating secure bytecode and to an applet development tool. | 01-10-2013 |
20130010666 | MOBILE DEVICE WITH INDEPENDENT BATTERY AND RADIOFREQUENCY COMMUNICATION INTERFACE - The invention is aimed at optimising the life of the power supply of mobile equipment with a radiofrequency communication interface by switching off the power to it when it reaches a given state. A mobile device ( | 01-10-2013 |
20130005402 | METHOD FOR ACCESSING AT LEAST ONE SERVICE AND CORRESPONDING SYSTEM - The invention relates to a method | 01-03-2013 |
20130004015 | PROCESS TO SECURE A PERSONAL PORTABLE OBJECT - The invention relates to a process to make secure a personal portable object comprising a body of the personal portable object, a microchip, a printed image and a device to enable said personal portable object to communicate with an entity external to the device. The process includes using an image file and an insertion algorithm to generate an image feature vector Vsi(num), storing the image feature vector Vsi(num) in the microchip, using the printed image obtained by a scanning device to generate an image feature vector Vsi(dig), and using a read-back algorithm to match the image feature vector Vsi(num) and the image feature vector Vsi(dig). | 01-03-2013 |
20120317318 | METHOD OF ANALYZING THE WEAR OF A NON VOLATILE MEMORY EMBEDDED IN A SECURE ELECTRONIC TOKEN - The invention is a method of analyzing the wear of a non volatile memory embedded in a secure electronic token. A set of events are intended to generate writing and/or erasing operations in said memory. The token comprises a buffer. The method comprises the following steps: each time an event belonging to said set occurs, generating a data which reflects the event and storing said data in the buffer, sending the buffer to a remote machine, analyzing the buffer to determine the wear of the memory. | 12-13-2012 |
20120317250 | METHOD FOR GENERATING A PUBLIC SIP ADDRESS ASSOCIATED WITH A PRIVATE IDENTITY ON AN IMS NETWORK - The invention relates to a method for generating a permanent public SIP address associated with a private identity on an IMS network. According to the invention, the method consists of applying, to the private identity, a one-to-one, non-reversible and collision-free function in order to obtain the permanent public SIP address. The invention enables the ISIM of an end point to be directly addressed. | 12-13-2012 |
20120289161 | METHOD OF POWER NEGOTIATION BETWEEN TWO CONTACTLESS DEVICES - The invention is a method of power negotiation between a first contactless device and a second contactless device which provides an electromagnetic field set to a first power level. The method comprises the steps of: a) sending a request from the first device to the second device. The request targets a second power level and an associated duration. The next step is: b) sending a response to the first device. The response reflects a decision of the second device corresponding to the request. The final step is: c) switching the electromagnetic field to the second power level if the decision is positive. | 11-15-2012 |
20120286050 | MOLDED CHIP CARD AND METHOD FOR MANUFACTURING SAME - The invention relates to a chip card comprising, a molded card body made by means of injection molding and, an integrated circuit chip, as well as to a method for manufacturing such a card. The invention is characterized in that the card body includes polyacrylic acid. The invention applies to SIM cards in particular. | 11-15-2012 |
20120278879 | AUTHENTICATING HUMAN INTERFACE DEVICE - (EN)The invention relates to an authentication device (TK) set to identify itself to a computer (PC) as a native human interface device. It also relates to a system comprising an authentication device (TK) and a computer (PC), as well as to a method to have a computer (PC) recognize an authentication device (TK). | 11-01-2012 |
20120278861 | METHOD FOR SECURELY CREATING A NEW USER IDENTITY WITHIN AN EXISTING CLOUD ACCOUNT IN A CLOUD COMPUTING SYSTEM - The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device. | 11-01-2012 |
20120278857 | METHOD FOR UNLOCKING A SECURE DEVICE - The present invention provides a method for unlocking a secure device ( | 11-01-2012 |
20120254844 | COMPUTER PROGRAM PRODUCT CONTAINING INSTRUCTIONS FOR PROVIDING A PROCESSOR THE CAPABILITY OF EXECUTING AN APPLICATION DERIVED FROM A COMPILED FORM - An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal. | 10-04-2012 |
20120254843 | COMPUTER PROGRAM PRODUCT CONTAINING INSTRUCTIONS FOR PROVIDING A PROCESSOR THE CAPABILITY OF EXECUTING AN APPLICATION DERIVED FROM A COMPILED FORM - An integrated circuit card is used with a terminal. The integrated circuit card includes a memory that stores an interpreter and an application that has a high level programming language format. A processor of the card is configured to use the interpreter to interpret the application for execution and to use a communicator of the card to communicate with the terminal. | 10-04-2012 |
20120254394 | METHOD OF PERSONALIZING AN APPLICATION EMBEDDED IN A SECURED ELECTRONIC TOKEN - The invention is a method of personalizing an application embedded in a secured electronic token which is able to manage first and second channels that allow to convey personalization data exchanged with a distant machine. Said first and second channels are of different types. The application is of Javacard™ type and comprises at least a function which is invoked when personalization data is received from the distant machine regardless of the channel used for conveying the personalization data. | 10-04-2012 |
20120238244 | PROACTIVE COMMANDS OVER SECURE CHANNEL BETWEEN A MOBILE EQUIPMENT AND A UICC - (EN)The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC. | 09-20-2012 |
20120231736 | METHOD OF PROTECTING THE EXECUTION OF AN NFC APPLICATION LOADED IN A SECURE ELEMENT FORMING AN INTEGRAL PART OF A MOBILE TERMINAL - The invention relates to a method for securing the execution of an onboard NFC application in a secure element which does not include a native OTA application. The secure element interacts with a mobile terminal including a removable card. According to the invention, the method includes recording an identifier of the removable card in the secure element no later than when the NFC application is loaded onto the secure element. When an event occurs, a verification is made, in the secure element, whether or not the identifier of the removable card present in the mobile terminal corresponds to the identifier previously stored in the secure element, in order to detect a possible change of the removable card. | 09-13-2012 |
20120229255 | IDENTIFICATION DOCUMENT AND A METHOD OF PRODUCING - (EN)The invention relates to an identification document ( | 09-13-2012 |
20120225648 | SYSTEM ENABLING THE CONTACTLESS TRANSFER OF PERSONAL DATA - The invention relates to a system enabling the contactless transfer of personal data from a mobile terminal including a first antenna coupled to a first chip cooperating with a first memory to a second memory cooperating with a second chip, with said second chip being coupled to a second antenna. According to the invention, the second memory is included in a passive radiofrequency transponder supplied by the electromagnetic field emitted by said first antenna during said transfer of personal data. | 09-06-2012 |
20120222131 | RADIO-FREQUENCY COMMUNICATION CONTROLLED BY A MICROCIRCUIT - The invention relates to a method for the radio-frequency communication of data, in which the receiving of and/or access to said data is controlled by control means, including an electronic microcircuit, on the basis of access rights. The transmitted data includes time information, and the access rights are controlled on the basis of said time information. The invention also relates to a device for controlling access rights as well as to a radio-frequency receiving device including same. | 08-30-2012 |
20120204240 | MULTI-APPLICATION MOBILE AUTHENTICATION DEVICE - (EN) The invention makes it possible to allow several applications to coexist in the same card; the implementation of the applications uses reading and writing of data by the reader in the same memory location. The invention is a method for exchanging data between a mobile authentication device | 08-09-2012 |
20120198238 | METHOD FOR ESTABLISHING AN ELECTRONIC AUTHORIZATION FOR A USER BEARING AN ELECTRONIC IDENTITY DOCUMENT, AND METHOD FOR SUPERVISING SAID AUTHORIZATION - The invention relates to a method for generating and validating a digital authorization request, as well as to the method for supervising said authorization. The method of invention enables the guarantee, due to a combination of a series of signatures, at any time, of the identity of the bearer of the document and of the validating body. | 08-02-2012 |
20120190340 | METHOD FOR BINDING SECURE DEVICE TO A WIRELESS PHONE - The present invention provides a method for binding a (smart) secure device ( | 07-26-2012 |
20120185622 | MATCHING METHOD, SYSTEM AND DEVICE FOR DATA EXCHANGE BETWEEN A COMMUNICATION OBJECT AND A PROCESSING UNIT - A matching device carries out data exchange between a processing unit and a wireless peripheral device and/or a communication object associated with the peripheral device. The matching device includes a communication interface with the processing unit; a wireless communication interface with the wireless peripheral device; information stating means for stating technical capacity information to the processing unit, enabling the latter to select an appropriate driver/communication means; and data-processing means. The data-processing means is capable of carrying out a matching of an exchange protocol and/or formats of data to be exchanged between the processing unit and the communication object. The technical capacities stated by the stating means pertains to the wireless peripheral device and/or to the communication object associated therewith, the technical capacities being considered to pertain to the matching device by the processing unit. The invention also pertains to a system and method for implementing the matching device. | 07-19-2012 |
20120178422 | MECHANISM TO BACKUP AND RESTORE THE CONFIGURATION OF A COMMUNICATION DEVICE USING A PORTABLE SECURITY DEVICE - (EN)The invention relates to a portable security device (SIM) for authenticating a user (USR) of a communication device (MP | 07-12-2012 |
20120173482 | METHOD FOR ENRICHMENT AN ELECTRONIC PHONE BOOK PROVOKED BY A CHANGE IN THE ASSOCIATED TERMINAL, AND ASSOCIATED DEVICE - The invention relates to a method for the enrichment of an electronic directory stored in a first electronic communication device, based on the changes in a second electronic communication device and by the application of decisional rules. The changes can also be related to a change in the hardware or software functionalities or to a modification of data contained in said second device. | 07-05-2012 |
20120164981 | METHOD FOR COMMUNICATING DATA BETWEEN A SECURE ELEMENT AND A NETWORK ACCESS POINT AND A CORRESPONDING SECURE ELEMENT - The invention relates to a method for communicating data between a first secure element and a network access point. The first secure element is coupled with a network access point. The network access point is comprised within a communication network. According to the invention, at least one of the first secure element and the network access point sends, to the other of the network access point and the first secure element respectively, data relating to an identity of a communication link, as logical link, between the first secure element and the network access point. The invention also relates to a corresponding secure element. | 06-28-2012 |
20120158940 | METHOD FOR A SECURE DEVICE TO RESOLVE AN IP ADDRESS OF A TARGET SERVER - The present invention relates to a method for a secure device to resolve an IP address of a target server to which the secure device is willing to access, said secure device being suitable to be inserted in a wireless device, wherein the secure device sends a request to a DNS client that resides on said wireless device to resolve the IP address of the target server, said target server being identified by its FQDN. | 06-21-2012 |
20120151519 | MOBILE ELECTRONIC DEVICE CONFIGURED TO ESTABLISH SECURE WIRELESS COMMUNICATION - The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point. | 06-14-2012 |
20120144474 | METHOD OF PROTECTING ACCESS TO DATA ON A NETWORK - The invention is a method of managing access to a plurality of data from a server by a client through a point-to-point link. Each of the data is reachable through a set of URIs that belongs to an index list. The method comprises the step of inserting a request to a control message in the index list. The control message applies to a data reachable through one URI belonging to the index list. | 06-07-2012 |
20120131634 | METHOD OF EXECUTING AN APPLICATION EMBEDDED IN A PORTABLE ELECTRONIC DEVICE - The invention is a method of executing an application embedded in a portable electronic device. The application comprises one instruction handling an object. The electronic device comprises a firewall which is intended to check the compliance of the object with preset security rules. The portable electronic device comprises a volatile memory area intended to store a data set uniquely associated to the object. The data set comprises an indicator reflecting the result of the checking of the compliance of the object with the preset security rules. The method comprises the following steps before execution of the instruction, checking the presence in the volatile memory area of a data set associated to the object and comprising an indicator reflecting a successful checking of security rules, and if successful in the checking of the data set, authorizing the execution of the instruction without further security rules checking done by the firewall. | 05-24-2012 |
20120124605 | METHOD FOR MONITORING AN AUDIENCE MEASUREMENT RELATING TO DATA BROADCAST TO A TERMINAL, AND CORRESPONDING TERMINAL TOKEN AND SYSTEM - The invention relates to a method for monitoring an audience measurement relating to data. The data is broadcast, through a broadcast channel, from a broadcast device and to be received by at least one terminal. According to the invention, the method comprises steps in which the broadcast device broadcasts, through the broadcast channel, at least one piece of information relating to a request for measuring an audience of at least one content of the data, said audience report request; and at least one terminal sends back, through a return channel, to an audience report collecting device, as a response to the audience report request, an audience report relating to the at least one content of the broadcast data processed by the at least one terminal, said audience report response. The invention relates also to corresponding terminal and system comprising the broadcast device and the terminal, and a corresponding token likely to cooperate with a terminal. | 05-17-2012 |
20120117219 | METHOD OF MANAGING AN APPLICATION EMBEDDED IN A SECURED ELECTRONIC TOKEN - The invention is a method of managing an application embedded in a secured electronic token. The token is intended to receive a message from a server machine. The message has a header and a body. The token comprises an agent able to manage the message. The method comprises the steps of:
| 05-10-2012 |
20120115443 | METHOD FOR CALCULATING A FIRST IDENTIFIER OF A SECURE ELEMENT OF A MOBILE TERMINAL ACCORDING TO A SECOND IDENTIFIER OF SAID SECURE ELEMENT - The invention relates to a method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element. The first identifier is a temporary identifier and the second identifier is a final identifier of the secure element in a telecommunications network. According to the invention, the method comprises the steps of: a—during the first attempt to connect the mobile terminal to the telecommunications network, calculating the first identifier according to the second identifier; b—transmitting the first identifier to the telecommunications network; c—in response to a message of acceptance of the first identifier from the telecommunications network, inhibiting the use of the first identifier by the secure element and, for every subsequent attempt to connect to the telecommunications network, using the second identifier to authenticate the secure element. | 05-10-2012 |
20120110265 | SECURISATION OF A REMOTE EXECUTABLE CODE USING A FOOTPRINT OF THE COMPUTER RECIPIENT - Method of securing exchanges between two electronic devices, by using an imprint of at least one of the two devices. This imprint is obtained on the basis of all or part of the electronic components of which this device is composed. This imprint will serve, either to protect the confidentiality of the data exchanged, or to attest to the identity of the device issuing the data. | 05-03-2012 |
20120102513 | METHOD FOR MEASURING AUDIENCE DATA, CORRESPONDING TOKEN AND TERMINAL - The invention relates to a method for measuring audience data. The data is broadcast and received by at least one terminal. The data is relative to at least one channel included within the broadcast data. According to the invention, the terminal determines at least one piece of configuration data relating to at least one channel consumed by a terminal user, the at least one piece of configuration data comprising a first time difference between two time references, a first time reference relating to an exit from a channel and a second time reference relating to an access to the channel. The invention relates also to corresponding terminal and token. | 04-26-2012 |
20120102278 | METHOD FOR PERSONALISING AN ELECTRONIC DEVICE, ASSOCIATED DATA PROCESSING METHOD AND DEVICE - The invention relates to any electronic device such as a chip card, a passport, a dongle or any other object requiring personalization of the content of a memory. More precisely, the invention provides for a method for processing a data item of a container stored in a memory, said method being implemented by the electronic device by utilizing in particular a table of identifiers. The invention furthermore provides for a prior step for associating a data identifier with a data item of a container and creating said table of identifiers. | 04-26-2012 |
20120102237 | DEVICE WITH TIME LIMITED USE AUTO START APPLICATION - (EN) The invention relates to a portable electronic device (SC, TK) comprising electric input means (VCC, GND, ANT) for receiving electric power from an external power supply. The portable electronic device (SC, TK) comprises an application, the application being set to be triggered when power is supplied to said electric input means (VCC, GND, ANT), and to not communicate with entities external to the portable electronic device (SC, TK), or to only notify such entities of an event. The application is further set to configure the portable electronic device (SC, TK), and to be successfully executable at most once. The invention also relate to a manufacturing equipment (M) for configuring a portable electronic device (SC, TK) and to a method for configuring a portable electronic device (SC, TK). | 04-26-2012 |
20120072643 | METHOD OF MANAGING DATA IN A PORTABLE ELECTRONIC DEVICE HAVING A PLURALITY OF CONTROLLERS - The invention is a method of managing data in a portable electronic device comprising first and second controllers. The first controller comprises a first microprocessor and a first non volatile memory. The first microprocessor comprises a first piece of code. The second controller comprises a second microprocessor and a second non volatile memory. The second non volatile memory comprises a first executable data. The method comprises the following steps of: a) loading and activating the first piece of code in the first microprocessor, b) sending by the first controller a first request for retrieving the first executable data from the second non volatile memory, c) loading the first executable data into the first controller, and d) executing the first executable data by the first microprocessor. | 03-22-2012 |
20120034868 | METHOD OF PRESELECTING AT LEAST ONE APPLICATION IN A MOBILE COMMUNICATION DEVICE COMPRISING AN NFC SYSTEM - The invention relates to a method for the preselection of at least one application hosted in a secure or non-embedded element in a mobile communication device comprising an NFC system, the said device being capable of accessing and reading data stored in a target NFC system, of the contactless tag or card type, the said NFC system being capable of operating in at least two communication modes including a reader mode, and a card emulation mode, or a Peer-to-Peer mode. When the NFC system is in the reader mode, an application is preselected during a stage wherein data stored in the said target NFC system are read. | 02-09-2012 |
20120030121 | SECURE ACTIVATION BEFORE CONTACTLESS BANKING SMART CARD TRANSACTION - The invention relates to a portable token equipped with non-volatile memory, the token comprising authentication means to authenticate a holder of the token, authorization means to define the rights of the holder, and payment means to trigger a payment transaction. The authorization means are set to store the rights in non-volatile memory after the authentication means are invoked, and the payment means have the capacity to retrieve the rights from non-volatile memory, and to subject the execution of the payment transaction to the verification of the rights. The invention also relates to a related portable device, to a system comprising a portable token and a portable token, and to a method for carrying out a payment transaction with a portable token. | 02-02-2012 |
20120028579 | METHOD OF DETECTING A NFC DEVICE EMULATING SEVERAL CONTACTLESS CARDS WHICH MAY USE A PLURALITY OF PROTOCOLS - The invention is a method of managing a NFC transaction between two hosts and a reader device. The two hosts are embedded in NFC devices and are intended to be identified by the reader device during an anti-collision phase through a first identifier and a second identifier respectively. The first identifier comprises a variable part. The method includes the steps of generating the first identifier, the variable part of the first identifier and the second identifier comprising a common pattern, looking for a common pattern into the first and second identifiers on the reader device side, and if a common pattern is found and if the variable part of the first identifier comprises said common pattern, concluding that the first and second hosts are embedded in a unique NFC device. | 02-02-2012 |
20120023422 | INTELLIGENT PORTABLE OBJECT COMPRISING GRAPHICAL PERSONALIZATION DATA - The invention relates to an intelligent portable personal security object including graphical personalization data visible from a face of the object, wherein the graphical personalization data are presented by electronic display. The invention also relates to a use of the portable object in the carrying out of secure electronic transaction; and/or in the authentication and visual monitoring of at least one person; and/or in logical access control for at least one user; and/or in the displaying of data other than graphical personalization data. | 01-26-2012 |
20120009979 | METHOD FOR PREVENTING THE MALICIOUS USE OF A SIM CARD INSERTED IN AN M2M DEVICE AND M2M DEVICE - The invention relates to an M2M device comprising a communication unit and a SIM card, the said SIM card comprising a controller or microcontroller (A), characterised in that the SIM card comprises at least one sensor (B; C), the said at least one sensor being a sensor selected from the group consisting of a temperature sensor, a strain sensor, a movement sensor, a displacement sensor, an inertia or acceleration sensor, a sound sensor, a pressure sensor, an impact sensor and a vibration sensor, the said controller or microcontroller (A) comprising an element for deactivating at least some of its functions following the receipt from the said at least one sensor (B,C) of at least one signal indicating that an environment status value is outside a predetermined range, thus preventing the malicious use of the said SIM card. | 01-12-2012 |
20110320818 | SYSTEM AND METHOD FOR PROVIDING SECURITY IN BROWSER-BASED ACCESS TO SMART CARDS - A method of operating a host computer having a web-browser with the capability of executing at least one web-browser add-on to provide a web application access to a smart card to protect the smart card from security threats associated with being connected to the Internet. Prior to establishing a connection between a web application executing in the web browser, verifying that the web application has been authorized to connect to a smart care using the web-browser add-on to provide a web application access to a smart card. | 12-29-2011 |
20110319134 | ASSEMBLY CONSISTING OF A MICRO-MODULE AND A REPRODUCING DEVICE WHICH IS EQUIPPED WITH CONTACT-FREE NEAR-COMMUNICATION MEANS - Portable communication device for at least mono-directional communication with a terminal, comprising a micro-module including a chip that comprises an antenna allowing the micro-module to communicate with a terminal when the antenna is placed in the immediate vicinity of the terminal, the device being characterized in that it comprises a reader receiving the removable micro-module, said antenna being held by said reader such that the micro-module is removable relative to the antenna. | 12-29-2011 |
20110314249 | METHOD OF SELECTION OF AN AVAILABLE MEMORY SIZE OF A CIRCUIT INCLUDING AT LEAST PROCESSOR AND A MEMORY AND CORRESPONDING PROGRAM AND SMART CARD - The invention relates to a method for selecting an available memory size of a circuit including at least a CPU and a total memory, the method including a stage for the selection of an available memory size that is smaller than or equal to that of the total memory. | 12-22-2011 |
20110307650 | Method for Securing Electronic Device Data Processing - A method for securing electronic device processes against attacks (e.g. side channel attacks) during the processing of sensitive and/or confidential data by a Central Processing Unit (CPU) to the volatile memory (e.g. RAM) of an electronic device such as, for example, a smart card, a PDA or a cellular phone is described herein. The method involves the storage of the confidential data to a dynamically and randomly assigned memory location, thereby rendering more difficult the analysis and subsequently the attacks (e.g. side channel attacks). | 12-15-2011 |
20110296191 | METHOD FOR SECURELY DRAWING UP A VIRTUAL MULTIPARTY CONTRACT CAPABLE OF BEING PHYSICALLY REPRESENTED - The invention relates to a method for securely drawing up a multiparty contract using digital certificates and electronic devices. Said method includes at least three steps: signing, countersigning, and formatting. The formatted document has the specific feature of being capable of being physically represented. | 12-01-2011 |
20110294475 | METHOD OF MANAGING AN APPLICATION EMBEDDED IN A TELECOM DEVICE - The invention is a method of managing an application embedded in a telecom device. The telecom device comprises a SIM card and a Push Registry as defined by the Mobile Information Device Profile® specifications. The application is intended to be registered in the Push Registry by defining a specific inbound connection associated to the application. The SIM card requires a local connection on the specific inbound connection for activating the application and for establishing a local communication channel between the SIM card and the application. | 12-01-2011 |
20110284633 | PORTABLE OBJECT INCLUDING A DISPLAY AND APPLICATION FOR CARRYING OUT ELECTRONIC TRANSACTIONS - The invention relates to a smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The invention also relates to the use of a portable object for implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via said interactive display. | 11-24-2011 |
20110283107 | METHOD FOR ESTABLISHING A SECURED COMMUNICATION WITHOUT PRELIMINARY INFORMATION SHARE - The invention relates to a method for generating a session key between two communicating electronic devices not requiring any prerecorded information in one of the two devices and enabling the authentication of one of said devices. The method uses a close collaboration between a symmetrical algorithm and an asymmetrical algorithm. | 11-17-2011 |
20110281466 | METHOD FOR PRODUCING AN ELECTRONIC OBJECT COMPRISING A DATA TRANSFER STAGE AND THE OBTAINED OBJECT - A method for producing a portable electronic object having contact pads arranged on a plane with a thickness which differs from the thickness of a standard smartcard. The object is electrically connected to data transfer station connectors, by delivering a data transfer station having an electric probe connector and submitting the object to the data transfer station in such a way that the contact pads thereof are accessible to the electric probes in a direction perpendicular to the plane. Objects obtainable include UBS keys or PCMCIA cards or readers. | 11-17-2011 |
20110274268 | CRYPTOGRAPHIC ALGORITHM FAULT PROTECTIONS - The invention relates to a method for securing the execution of a cryptographic algorithm A against fault attacks. Given a cryptographic key K | 11-10-2011 |
20110270999 | DEVICE OF SD TYPE USING A SINGLE WIRE PROTOCOL - The invention is a portable electronic device comprising a non volatile memory and a memory controller. The portable electronic device comprises a connector having eight pads able to communicate using a protocol of Secure Digital® type. The connector comprises at least one additional pad intended to be linked to an antenna. The additional pad is able to communicate using a protocol of SWP type. | 11-03-2011 |
20110265156 | PORTABLE SECURITY DEVICE PROTECTION AGAINST KEYSTROKE LOGGERS - The invention relates to a portable security device (SC, TK) comprising host connection means (PAD_H, USB_M) for connecting to a computer (PC), client connection means (PAD_C, USB_F) for connecting to an input device (KBD), filtering means for intercepting sensitive data transmitted from the client connection means (PAD_C, USB_F) to the host connection means (PAD_H, USB_M), and protection means for protecting said sensitive data. The invention also relates to an input device comprising a portable security device, to a server, to a system comprising a portable security device, a computer and an input device, and to a method for securing data entered into a computer (PC) with an input device (KBD), the method comprising installing a portable security device (TK) between the computer (PC) and the input device (KBD). | 10-27-2011 |
20110261000 | METHOD FOR ACCESSING ONE APPLICATION OR A SET OF APPLICATIONS FROM OR THROUGH A TOKEN, CORRESPONDING TOKEN AND SYSTEM - The invention relates to a method for accessing an application or a set of applications from or through a token. The token is coupled to a terminal that comprises at least one touch surface. According to the invention, the method comprises steps in which the terminal compares an input touch pattern with at least one predetermined input touch pattern relating to one application or a set of applications accessible from the token, and, according to a comparison result, the terminal sends or not to the token either a command for requesting a display of a set of at least one application accessible from the token or a command for triggering an execution of an application accessible from the token, the command being associated with a matching predetermined input touch pattern. The invention relates also to a corresponding token and a corresponding system comprising the token. | 10-27-2011 |
20110258397 | METHOD OF PROTECTION OF DATA DURING THE EXECUTION OF A SOFTWARE CODE IN AN ELECTRONIC DEVICE - The invention is a method of protecting a data intended to be accessed by an operating system embedded in an electronic device. The operating system is intended to manage an object comprising a header and a body. The data is stored in the body. The object is recorded in a memory of the electronic device. The electronic device comprises a memory manager able to provide access to the memory. The memory manager forbids the operating system to access the body as long as a preset action has not been successfully performed. | 10-20-2011 |
20110252140 | METHOD FOR ESTABLISHING A LINK BETWEEN THE APPLICATIONS OF AN AUTHENTICATION CARD OF A SUBSCRIBER AND AN IMS NETWORK - The invention relates to a method for establishing a secured link between an authentication card of a subscriber and a telecommunication network, the card being connected to a mobile terminal, wherein the method includes the steps of establishing a secure link between the terminal and an IMS network; and sharing the resources of the secure link between the terminal and the card. | 10-13-2011 |
20110243328 | DATA PROVIDING PROCESS BASED ON AN IBPE SCHEME - The present invention is a method to ensure a secure exchange of crypted numeric data between two entities, where their decryption depends to the approval of a third entity. The solution uses a combination of Identity Based Encryption scheme, and transcription trap use. | 10-06-2011 |
20110239307 | METHOD FOR SECURING JAVA BYTECODE - The invention relates to a virtual machine. The virtual machine is set to recognize, in addition to a set of conventional bytecodes, at least one secure bytecode functionally equivalent to one of the conventional bytecodes. It is set to process secure bytecodes with increased security, while it is set to process conventional bytecodes with increased speed. The invention also relates to a computing device comprising such a virtual machine, to a procedure for generating bytecode executable by such a virtual machine, and to an applet development tool comprising such procedure. | 09-29-2011 |
20110230147 | RADIOFREQUENCY COMMUNICATION DEVICE WITH AN OFFSET ANTENNA - The invention relates to a radiofrequency communication device that comprises a gripping beating body having a surface; an electronic and/or electric circuit extending in the gripping beating body; at least one antenna provided in the vicinity of the electronic circuit. The device includes a connection circuit for connection to the antenna, that is provided at least partially in the gripping beating body and extends from the electronic circuit up to connection points of the antenna, said antenna connection points being accessible from the outside of the beating body. | 09-22-2011 |
20110226855 | ELECTRONIC PAYMENT TERMINAL - A card reader payment terminal including an electronic circuit including at least one printed circuit board, to which are connected electronic components, including a microcontroller designed to control different peripherals, where the microcontroller is connected to an associated microprocessor, where the card reader payment terminal is configured to receive a smart card comprising the associated microprocessor, where the associated microprocessor comprises a connector compatible with the standardized connector of smart cards for connection with the microcontroller, where the microcontroller and the associated microprocessor operate in parallel for executing a task, and where the associated microprocessor is adapted to calculate a security operation. | 09-22-2011 |
20110225404 | METHOD FOR BOOTING PORTABLE OBJECTS WITH MULTIPLE COMMUNICATION INTERFACES - A boot sequence method comprises a determination step | 09-15-2011 |
20110212707 | REMOTE USER AUTHENTICATION USING NFC - The invention relates to a system (S) comprising a first authenticating entity (MOB_OP_SRV) and a portable communication device (MP) equipped with an NFC antenna (MP_A), and comprising means (SIM) to authenticate the user of the portable communication device (MP) to the first authenticating entity (MOB_OP_SRV), The system (S) further comprises a second authenticating entity ( | 09-01-2011 |
20110201233 | MEMORY CARD ADAPTER - An adapter allows to connect two electronic devices at the same port, at the same time. The device allows to actuate two devices at one single port which originally allows the connection of one single device. The adapter device includes a primary connector | 08-18-2011 |
20110190033 | METHOD FOR MASKING MOBILE PHONE MESSAGES FROM THE SIGHT OF OTHER PEOPLE - The invention relates to a mobile terminal assembly ( | 08-04-2011 |
20110185438 | REGULATOR OF COMMANDS WHICH ARE DESTINED FOR A SENSITIVE APPLICATION - The present invention describes a method and a software module making it possible to secure communications with a sensitive application, for which exchanges with the outside have been delegated to a so-called interfacing application. Accordingly, the present invention describes the application of security rules to all or some of the commands destined for this sensitive application. | 07-28-2011 |