Morpho Patent applications |
Patent application number | Title | Published |
20160094833 | DEVICE FOR USE IN IDENTIFYING OR AUTHENTICATING A SUBJECT - A device for use in identifying or authenticating a subject positioned in an acquisition volume on the basis of at least one biometric characteristic of the subject, the device including in succession, in offset manner along a camera placement axis: a first camera; a second camera; and a third camera; the optical axes of the first and second cameras forming between them an angle strictly less than 10°, and the optical axis of the third camera intersecting the optical axes of the first and second cameras, the optical axes of the first and second cameras each forming an angle less than or equal to 5° relative to a normal axis perpendicular to the camera placement axis. | 03-31-2016 |
20160094533 | AUTHENTICATION OF A SECURE ELECTRONIC DEVICE FROM A NON-SECURE ELECTRONIC DEVICE - The application relates in particular to a method for authentication of a secure electronic device (BNK_SRV) from a non-secured electronic device (PC, SP) comprising an input peripheral (KBD, MS, TS, CAM), an output peripheral (SCR, SPK, PRN) and a secure electronic circuit (TPM). | 03-31-2016 |
20150365229 | METHOD OF XOR HOMOMORPHIC ENCRYPTION AND SECURE CALCULATION OF A HAMMING DISTANCE - The invention concerns a method for encrypting a binary data item characterised in that it comprises the steps consisting of: —generating a public key and a private key, the public key being a sparse matrix comprising m rows and n columns, m being greater than the number I of bits of the binary data item, I being an integer strictly greater than 1, and the private key being a set of I indexed sets of integers between 1 and m such that for each set, the sum of the elements of the rows of the sparse matrix indexed by the elements of a set is zero, and—generating a binary sequence b comprising m bits, such that b=Mx+e+y in which o x is a random binary vector, o e is a random binary noise vector, and o y is a linear encoding of data item c. The invention also concerns a method for calculating a Hamming distance on data encrypted by the method of encryption. | 12-17-2015 |
20150312251 | ENSURING THE SECURITY OF A DATA TRANSMISSION - Ensuring the security of a data transmission by verifying an identity of a user, comprising: a prior step of enrolling a terminal of the user, comprising: an association of a authentic identity data item of the user and a data item of a terminal available to the user and communicating via a network, the association being stored with data for contacting the terminal via the network, and a determination of an identity derived from at least said information, stored in the memory of the terminal, in correspondence with a data item specific to the user, for the purposes of a later strong authentication based on both the data item specific to the user and on the derived identity, as well as a current step of verifying the user identity. | 10-29-2015 |
20150302060 | METHOD OF IDENTIFICATION - The invention relates to a method of identifying a subject person | 10-22-2015 |
20150295925 | SECURE METHOD OF PROCESSING DATA - The invention relates to a secure method of processing data in which method is implemented the evaluation of a function that may be written as a linear combination of sub-functions with two binary inputs, in which a client and a server each possess a binary code, comprising n indexed bits, the method comprising the evaluation of the function with the binary codes of the client and of the server as inputs, without one of the client or the server obtaining information about the code of the other, the method being characterized in that it comprises the following steps: —the server randomly generates n indexed values and calculates the linear combination of these values with the same linear combination as that applied to the sub-functions to obtain the function, —the client implements, for each bit of his binary code, a technique of unconscious transfer to obtain from the server an intermediate data item comprising the randomly generated value of same index as the bit of the code of the client, increased by the value of the corresponding sub-function evaluated at the bit of same index of the code of the server and at said bit of his binary code, and —the client performs a linear combination of the intermediate data for all the bits of his binary code, with the same linear combination as that applied to the sub-functions to obtain the function, in such a way as to obtain a final result comprising the linear combination of the randomly generated values, increased by the evaluation of the function at the two binary codes. | 10-15-2015 |
20150281673 | METHOD FOR AUTHENTICATING AN IMAGE CAPTURE OF A THREE-DIMENSIONAL ENTITY - A method of authenticating the capture of an image of a three-dimensional entity is provided, including the steps of generating a series of images of the entity with the help of an optical sensor, associating each image with information representative of the position of the sensor at the moment at which it generated the image, and determining whether there is consistency between two images of the series by verifying whether there is consistency between an apparent movement of the optical sensor as determined by comparing characteristic points visible in the two images and an estimated real movement of the optical sensor as determined by comparing information representative of three-dimensional positions of the optical sensor at the moments when it generated the two images. | 10-01-2015 |
20150264046 | METHOD FOR IDENTIFYING/AUTHENTICATING A PERSON USING THE VENOUS NETWORK THEREOF - A person may be identified by at least an identification system including a device for capturing an image of a venous network of a finger and a database containing reference venous network images partitioned by class according to topological characteristics and for each class reference topological characteristics. In one embodiment, an image of the venous network is captured, transmitted to the processing unit, centred relative to a display window, and cut into at least two bands parallel to the finger's axis. A set of each band's topological characteristics is extracted. A distance between the extracted set and all reference topological characteristics of the class is calculated, for each class. The venous network image is classified in the class corresponding to the smallest distance and is compared with each reference venous network image in the class. The authenticity of the person from the result of the comparison step is decided. | 09-17-2015 |
20150222423 | PROTECTION AGAINST SIDE CHANNELS - The description pertains in particular to a method of protecting an electronic device (SCARD), when the electronic device implements a cryptographic algorithm (AES), against side channel attacks. The cryptographic algorithm (AES) operating on an array of states which forms the subject of a secure processing. The description relates also to an electronic device (SCARD), a computer program and a storage medium for the implementation of such a method. | 08-06-2015 |
20150180882 | METHOD FOR PROTECTING A CHIP CARD AGAINST A PHYSICAL ATTACK INTENDED TO MODIFY THE LOGICAL BEHAVIOUR OF A FUNCTIONAL PROGRAM - A functional program stored in a memory area of an electronic card may be protected against an attack by disturbance of electrical origin intended to modify at least one logic state of at least one code of this program. The method may include: a storage step during which codes of the functional program and codes of a check program intended to check the logical behaviour of the functional program are stored in the memory of the card; and a step of executing at least one code of the functional program followed by a step of checking the logic states of the functional program by executing the check program. During the storage step, the codes of the check program are stored in a memory area formed by addresses that are defined so that the attack by disturbance of electrical origin has no influence on the logic states of this program. | 06-25-2015 |
20150180667 | SECONDARY ELEMENTS IN A FUZZY VAULT ENCODING SCHEME - The description relates in particular to a method for encoding information represented in the form of a function P, and to a corresponding method for decoding information. The encoding comprises the encoding of secondary information. These methods may be implemented within a context of biometric enrollment and (respectively) biometric authentication. The description also relates to an electronic device, a computer program, and a storage medium for the implementation of such methods. | 06-25-2015 |
20150161846 | METHOD AND DEVICE FOR RECOGNIZING A GRAPHIC ELEMENT PRINTED ON A PLAY SLIP - A method for recognizing a graphic element of technical function which is printed on a play slip ( | 06-11-2015 |
20150143096 | METHOD AND CHIP CARD FOR TRANSMITTING INFORMATION - A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card. | 05-21-2015 |
20150130918 | PERSONAL AUTHENTICATION DEVICE AND METHOD OF MANUFACTURING SUCH A DEVICE - The invention relates to an authentication device ( | 05-14-2015 |
20150098519 | METHOD AND DEVICE FOR TRANSMITTING A MESSAGE - An embedded system and, in particular, a communication protocol suitable for a data transmission using auxiliary physical channels of such an embedded system. A transmission method suitable for such a channel includes the transmission of a data signal based on the encoding of three symbols. The message consists of a preamble allowing recognition of the symbols used, followed by the significant part of the message. The decoding of the message comprises a first step of learning the symbols used, prior to the decoding of the significant part of the message. | 04-09-2015 |
20150081946 | METHOD OF IN-MEMORY MODIFICATION OF A DATA SET - The present invention relates to the field of the management of memory writes to an information processing device and more precisely to a method of writing a set of data in a unitary and coherent manner. The invention, although of more general scope, applies more particularly in the field of chip cards. | 03-19-2015 |
20150046699 | METHOD FOR GENERATING PUBLIC IDENTITY FOR AUTHENTICATING AN INDIVIDUAL CARRYING AN IDENTIFICATION OBJECT - A method for generating a public identity for authenticating an individual carrying an identification object, the method including: entering an initial biometric datum of the individual; generating a first key from the biometric datum; generating a second key derived from a datum generated by a security component of the object; generating an initial encryption key combining the first key and the second key; communicating with a server a first identity of the individual in connection with the initial encryption key; generating by the server a public identity by encrypting the first identity using the initial encryption key, the public identity being stored by the server in connection with the initial encryption key. The public identity is not significant, but is secured by a strong connection between the object and biometry of the individual. | 02-12-2015 |
20150039899 | METHOD FOR ENCRYPTING A PLURALITY OF DATA IN A SECURE SET - A server-implemented method encrypting at least two pieces of indexed data as lists of elements, each element belonging to a finite set of indexed symbols on an alphabet. The data is encrypted to form a protected set, including: the server randomly generates, for each datum, a corresponding encoding function; if at least one element that constitutes a datum is the symbol of the alphabet, the server determines the image of the symbol of the alphabet via the encoding function corresponding to the datum to obtain a codeword coordinate and adds the codeword coordinate to an indexed set corresponding to the element of the alphabet; then the server completes the indexed set with error-inducing points; the server randomly reindexes the elements of the indexed set corresponding to the symbol of the alphabet; and the server adds the indexed set to the protected set. The method can identify an individual. | 02-05-2015 |
20150038118 | METHOD FOR VERIFYING THE IDENTITY OF A USER OF A COMMUNICATING TERMINAL AND ASSOCIATED SYSTEM - A method for verifying identity of a user of a communicating terminal, including: a preliminary operation including: communicating a first piece of identity data of a user to at least one server, generating a second piece of identity data of the user from the server, the second piece of data defining a derived identity of the user, and storing the second piece of identity data in a secure memory of the terminal; an operation for identity verification, including: transmitting a token for encryption from the server to the terminal, using the second piece of data at the terminal at least to generate an encryption of the token, the encrypted token being transmitted to the server and verified by the server, and in a case of positive verification of the encrypted token by the server, the server validates the identity verification of the user of the terminal. | 02-05-2015 |
20150035949 | METHOD FOR SYNCHRONISING SEVERAL CAMERAS WITH EACH OTHER IN A PHOTOGRAPHIC SYSTEM, IN PARTICULAR A STEREOSCOPIC PHOTOGRAPHIC SYSTEM, AND PHOTOGRAPHIC SYSTEM FOR IMPLEMENTING SAID METHOD - The present invention concerns a method for synchronising several cameras with each other in a photographic system designed to take a multiple view of a scene, said cameras being of the CCD or CMOS digital type. | 02-05-2015 |
20140355832 | Method and Device for Following an Object in a Sequence of at Least Two Images - The present invention relates to a method for following an object in a sequence of at least two images termed previous and current. The said method comprises a step for forming a first set E | 12-04-2014 |
20140351494 | Writing Data in a Non-Volatile Memory of a Smart Card - The invention relates in particular to a method for writing data in a non-volatile memory of a smart card. The invention also relates to a smart card and a computer program capable of implementing such a method, to a storage medium including such a computer program, and to a system including a smart card and a device making it possible to write in the card. | 11-27-2014 |
20140314230 | CRYPTOGRAPHY ON AN ELLIPTICAL CURVE - A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y | 10-23-2014 |
20140314229 | CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE - A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y | 10-23-2014 |
20140095885 | METHODS FOR BIOMETRIC REGISTRATION AND VERIFICATION, AND RELATED SYSTEMS AND DEVICES - The invention relates to a registration method for future biometric verification purposes, including the following steps for one person (I): obtaining first biometric data ( | 04-03-2014 |
20140013042 | METHOD FOR MASKING THE END-OF-LIFE TRANSITION OF AN ELECTRONIC DEVICE AND DEVICE COMPRISING A CORRESPONDING CONTROL MODULE - The invention relates to a method for masking the end-of-life transition of an electronic microprocessor device comprising a reprogrammable non-volatile memory containing an end-of-life state variable (FdVE). The value of the variable (FdVE) is loaded (A) into random access memory. Prior to the execution of any current command (COM), the value of the variable (FdVR) in random access memory is checked (B). The end-of-life transition is executed (C) in the event of an empty value. Otherwise, the initialization or the execution of the command (COM) is continued (D). Upon detection (E) of an intrusive attack, the end-of-life state variable (FdVR) is written (F) in the single random-access memory, and the end-of-life state variable (FdVE) is deleted (G) from the non-volatile memory in a delayed manner. The invention is suitable for all electronic devices, microprocessor cards or the like. | 01-09-2014 |
20130314908 | AIRLOCK COMPRISING A LIGHTING DEVICE - A security gate has two walls defining between them a passage through which an individual passes, for each wall, a transparent lighting window extending over at least part of the wall, for at least one of the edges of the lighting window, a light source intended to light the edge and to generate light beams that propagate through the thickness of the lighting window, and for each lighting window, at least one extraction zone provided on the lighting window and intended to transmit the light beams towards the face of the individual passing through the passage, the light beams thus transmitted forming, with respect to the plane of the lighting window from which they emanate, an angle adapted to the geometry of the security gate so as to optimize the lighting of the individual. | 11-28-2013 |
20130312110 | PROTECTION OF APPLETS AGAINST HIDDEN-CHANNEL ANALYSES - The invention relates in particular to an electronic device equipped with a virtual machine for executing an applet. The virtual machine is arranged so as to recognize the instructions of the applet and to execute a code corresponding to each instruction. The virtual machine comprises an association module arranged so as to associate several distinct but operationally identical codes with one and the same instruction, and a selection module arranged so as to select the code to be executed for said instruction in a random manner. The invention also relates to a method of securing a counter-electronic device against hidden-channel attacks. | 11-21-2013 |
20130279765 | Method for Enabling Authentication or Identification, and Related Verification System - The invention relates to a method for enabling the authentication or identification of a person ( | 10-24-2013 |
20130230170 | PROTECTION AGAINST PASSIVE SNIFFING - The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x′=x.L+c, in which x is the data to be masked, x′ is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method. | 09-05-2013 |
20130129248 | Method and Device for Obtaining an Image of a Crumpled Document From an Image of Said Document When Same is Crumpled - The present invention relates to a method and device for obtaining an image of a crumpled document from an image of this document when it is crumpled. The method comprises a step of determining a three-dimensional geometric model of the surface of the crumpled document by triangulation of three-dimensional points defined from the pattern of a target extracted from the image of this document when it is crumpled; the method is characterised in that it comprises a step of determining a projection of the three-dimensional geometric model onto a so-called acquisition plane, by means of error minimisation of this projection under constraints of preserving defined geometric characteristics in the vicinity of the three-dimensional points, and in that it comprises a step of superimposing the textures associated with the three-dimensional model onto the projection of this model thus determined. The present invention likewise relates to target patterns that make it possible to improve the quality of the image resulting from the method to be improved and/or to reduce the cost for computing said image. | 05-23-2013 |
20130000385 | DETECTION GATE - A detection gate for detecting substances carried by an individual or an object, has two lateral uprights facing one another and defining a passage there between for the individual or the object, a blowing device installed in a blowing chamber in one of the uprights which are adapted to exhaust the air contained in the blowing chamber towards the other upright, an exhaust device installed in an exhaust chamber in the other upright, which are suitable for exhausting the air thus blown, a detection device arranged upstream from the passage and adapted to detect the presence of the substances in the air thus blown, and a transfer line which, via one of the ends thereof, leads into the blowing chamber and, via the other end thereof, into the exhaust chamber, the blowing device and the exhaust device being such that a single volume of air has time to pass through the passage at least twice during the time that individual or the object is present in the passage. | 01-03-2013 |
20120284284 | BIOMETRIC CODING - A database stores a number N of biometric data representatives which correspond to a set of characteristics of said biometric data. Acquired biometric data is obtained. Then, transformed biometric data is obtained by transforming the acquired biometric data according to said set of characteristics. Next, N deviation values are obtained by applying a comparison between the transformed biometric data and the N representatives in the database. Finally, a vector representing the acquired biometric data is obtained, the representation vector having a number of components less than or equal to N, said components being determined in relation to said N deviation values. | 11-08-2012 |
20120210401 | Device and Method for Managing Access Rights to a Wireless Network - A device and a method for managing access rights to a wireless network uses wireless connection devices advantageously based on a smart card, which enable the wireless connection to the network once connected to a terminal. These devices include devices for time and/or geographical management of access to the network and authentication device. These devices can be easily preprogrammed by the entity managing the service and then distributed to the users. | 08-16-2012 |
20120134493 | CRYPTOGRAPHY BY PARAMETERIZING ON ELLIPTIC CURVE - A device is controlled by a controller on the basis of a password. A determination is made at the device or at the controller, on the basis of a random value r | 05-31-2012 |
20120131051 | METHOD FOR SEARCHING FOR AN ENTITY USING A VERIFIER DEVICE, AND RELATED DEVICES - In a method for searching for an entity belonging to a set of entities, a verifier device and the entities are arranged so as to exchange information via at least one communication channel. Each entity has a first respective identifier from which a plurality of representatives can be obtained. According to the method, a first identification word (m | 05-24-2012 |
20120093309 | CRYPTOGRAPHY ON A SIMPLIFIED ELLIPTICAL CURVE - A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y | 04-19-2012 |
20120087555 | IMAGING DEVICE HAVING A PRISMATIC ELEMENT - An imaging device includes a transparent prismatic element having two contiguous inlet surfaces separated by a ridge. A lens and an image sensor make it possible to acquire images, each including a reproduction of a first pattern located against one of the inlet surfaces, and a reproduction of a second imaged pattern through the other inlet surface. Such a device can be used in a biometric detection apparatus for detecting both a skin print and the vein distribution of a user. The device can also be used in a reading terminal capable of detecting a skin print and a machine-readable tape. | 04-12-2012 |
20120084849 | DEVICE AND METHOD FOR SECURE ACCESS TO A REMOTE SERVER - The device and method described herein relates to the field of computer security and, specifically, to the field of protecting confidential personal information which enables encrypted access to the remote server. A device and a method for securing confidential user information and secure exchanges of such information with the servers that host the services is provided. The device and method are based on personalising a smartcard containing the information. The chip card, connected to the user terminal, has a connection enabling the terminal to appear as a standalone host of the user's local network. An encrypted connection is then established directly between the chip card and the server hosting the service for the transmission of confidential data. The data, stored on the chip card, are then exchanged with the server via the encrypted connection. The data are never accessible in plain text on the user terminal. | 04-05-2012 |
20120082307 | CRYPTOGRAPHY ON A ELLIPTICAL CURVE - A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y | 04-05-2012 |
20110274269 | ENCODING POINTS OF AN ELLIPTIC CURVE - The method comprises, in an electronic component, carrying out a cryptographic calculation that includes the step of obtaining points P on an elliptic curve following the equation Y | 11-10-2011 |
20110231667 | Method of Identification or Authorization, and Associated System and Secure Module - Method of identification or of authorization using a system comprising at least one sensor for acquiring biometric data and one secure module storing a set of digital data obtained starting from a set of respective biometric data by means of a digitization algorithm. According to this method, a biometric data value is obtained, acquired by the sensor; a digital value is obtained by application of the digitization algorithm to the acquired biometric data value; within the secure module, at least some of the digital data from said set of digital data are ranked according to their proximity to the digital value obtained; and a biometric data value is obtained from said set of biometric data by taking into account a position of the corresponding digital data within the ranking. | 09-22-2011 |
20100310070 | Generation and Use of a Biometric Key - In a control system comprising control device adapted for, on the one hand, receiving signal indicating a first biometric datum (W), and, on the other hand, obtaining a second biometric datum captured (w′), at the level of the control device, the first and second biometric date are compared. Next, it is decided whether the first and second biometric data correspond on the basis of the comparison. Thereafter, at least a secret cryptographic key part (H(w)) is generated by applying cryptographic function to the first biometric datum. | 12-09-2010 |
20100284538 | Control of an Entity to be Controlled by a Control Entity - A control entity communicates with an entity to be controlled so as to effect a control, a secret key being associated with the control entity. These entities share public parameters, a second public parameter being a combination of a first public parameter of the said plurality with the secret key. At the level of the entity to be controlled, a random value is generated, a first message is transmitted to the control entity, this first message comprising at least one value obtained by combining the first public parameter with the random value; and a second message is transmitted to the control entity, this second message comprising at least one value obtained by combining the first random value, a secret key of the entity to be controlled and a value received from the control entity. One of the values included in the first or the second message is based on the second public parameter. | 11-11-2010 |
20100281269 | Identification Based on Encrypted Biometric Data - A database comprising biometric data stored in encrypted form is managed by a management unit. It comprises a set of filters respectively associated with filter identifiers. A biometric data item is received at a management unit; next, said biometric data item is stored in an encrypted form at a given address in the database. Then keywords are obtained on the basis of a first set of hash functions and of the biometric data item. A subset of indexing filters is associated with each keyword by selecting, for each keyword, filters as a function of the respectively associated filter identifiers, of said keywords, and of a second set of hash functions; and the given address is associated with each of the filters of the subset of filters. | 11-04-2010 |