Colnot
Cedric Colnot, Leuven BE
Patent application number | Description | Published |
---|---|---|
20140095387 | VALIDATING A TRANSACTION WITH A SECURE INPUT AND A NON-SECURE OUTPUT - In accordance with the invention, in order to validate a transaction on a mobile handset, PC, tablet or similar device, a user closes the loop between a non-secure display controlled by a host processor and a secure keypad controlled by a secure processor such as a master secure element or trusted execution environment. The user validates the transaction by entering on the secure keypad the data shown on the non-secure display. The transaction is validated because the user only enters the data that the user agrees to and only the user is able to enter the data. | 04-03-2014 |
20140095388 | VALIDATING A TRANSACTION WITH A SECURE INPUT WITHOUT REQUIRING PIN CODE ENTRY - A method for secure transactions on a mobile handset or tablet equipped with a touch screen controlled by a secure processor such as a master secure element or Trusted Execution Environment having gesture recognition capabilities. Since the touch screen is fully controlled by the secure processor, the user can securely enter the transaction amount using gestures to validate the transaction. | 04-03-2014 |
20140096222 | SECURE USER AUTHENTICATION USING A MASTER SECURE ELEMENT - The master secure element comprises a processor, a memory and a logic unit and at least controls the user input of the handset in order to secure the user authentication based on PIN entry. The PIN code is entered directly into the secure element with no possibility for the host processor to intercept the code or for a malware program to inject the code into the master secure element. | 04-03-2014 |
20140172700 | DIGITAL WALLET DEVICE FOR VIRTUAL WALLET - A reconfigurable digital wallet device such as a smart card containing a secure element and acting as an instantiation of a subset of a virtual wallet stored in the cloud. The digital wallet device is managed and synchronized with the virtual wallet in the cloud using a mobile device such as a smartphone. | 06-19-2014 |
Cedric Colnot, Uccle BE
Patent application number | Description | Published |
---|---|---|
20140291392 | DIGITAL WALLET BRIDGE - A smartcard communicating simultaneously with a smart phone and a point of sale, thereby allowing the smartcard to act as a bridge between the point of sale and the smart phone. The smart card is typically powered by the point of sale and typically communicates with the smart phone using BLUETOOTH Low Energy (BLE). | 10-02-2014 |
Vincent Cedric Colnot, Ivry Sur Seine FR
Patent application number | Description | Published |
---|---|---|
20090222910 | MEMORY DEVICE AND CHIP SET PROCESSOR PAIRING - Systems, devices and/or methods that facilitate mutual authentication for processor and memory pairing are presented. A processor and a suitably equipped memory can be provided with a shared secret to facilitate mutual authentication. In addition, the memory can be configured to verify that the system operating instructions have not been subjected to unauthorized alterations. System integrity can be ensured according to the disclosed subject matter by mutual authentication of the processor and memory and verification of the authenticity of system operating instructions at or near each system power up. As a result, the disclosed subject matter can facilitate relatively low complexity assurance of system integrity as a replacement or supplement to conventional techniques. | 09-03-2009 |
Vincent Cedric Colnot, Uccle BE
Patent application number | Description | Published |
---|---|---|
20140082373 | METHOD AND SYSTEM FOR SECURELY UPDATING FIRMWARE IN A COMPUTING DEVICE - Embodiments of a method are disclosed. One embodiment is a method for securely updating firmware in a computing device, in which the computing device includes a host processor and a non-volatile memory. The method involves receiving a double-encrypted firmware image from an external firmware source, wherein the double-encrypted firmware image is generated from firmware that is encrypted a first time using a first crypto-key and then encrypted a second time using a second crypto-key. The method also involves receiving the second crypto-key from an external key source, decrypting the double-encrypted firmware image using the second crypto-key to produce an encrypted firmware image, storing the encrypted firmware image in the non-volatile memory of the computing device, reading the encrypted firmware image from the non-volatile memory of the computing device, decrypting the encrypted firmware image using the first crypto-key, and executing the firmware on the computing device. | 03-20-2014 |
Vincent Cedric Colnot, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20150047007 | Methods and Apparatus for Enabling Secure Network-Based Transactions - A security process involves log-in and data exchange between a server and a user operating a computerized appliance. The process requires a user-specific token, independent verification of the server execution within a programmed time window. A hash created at the client side is reproduced at the server side from separate data and compared to the client hash. Too much time or incorrect hash denies access. | 02-12-2015 |
Vincent Cedric Colnot, Leuven BE
Patent application number | Description | Published |
---|---|---|
20150143533 | METHOD OF GENERATING A STRUCTURE AND CORRESPONDING STRUCTURE - Disclosed is a method of generating a structure comprising at least one virtual machine, the method comprising: obfuscating a first virtual machine source code, thereby yielding a first obfuscated virtual machine (OVM) source code; associating a processor identifier with the first OVM source code, thereby yielding a processor-specific first OVM source code; compiling the processor-specific first OVM source code, thereby yielding a processor-specific first OVM. Furthermore, a structure generated by said method is disclosed. | 05-21-2015 |