-
公开(公告)号:US10756927B2
公开(公告)日:2020-08-25
申请号:US14429795
申请日:2013-09-27
Applicant: Gemalto SA
Inventor: Marc Gemeto , Jean-Yves Fine
Abstract: The invention specifically relates to a method for virtually connecting two persons, with the first person having a first NFC device and the second person having a second NEC device. One of the NFC devices is a telecommunications terminal comprising an application, and both NFC devices comprise the identity of the person to which they belong. According to the invention, the method includes transmitting the identity of the first person from the first NFC device to the second NFC device; transmitting the identity of the second person from the second NFC device to the first NFC device; generating a secret shared by the persons using the application, with the shared secret giving access to an Internet space shared by the persons; and storing the shared secret in the NFC devices, with a reference relating to the virtual connection thereof.
-
92.
公开(公告)号:US10693842B2
公开(公告)日:2020-06-23
申请号:US15567346
申请日:2016-04-13
Applicant: GEMALTO SA
Inventor: Alain Rhelimi
IPC: G06F12/14 , H04L9/00 , H04L9/08 , H04L29/06 , G06F21/79 , G09C1/00 , H04L9/06 , G06F21/74 , G06F21/85
Abstract: A device for managing multiple accesses to a secure module of a system on chip of an apparatus, and comprises a stream ciphering means arranged for computing on the fly and in a single pass an integrity check for data to be transferred between secure and non secure modules of the system on chip with a seed and an encryption key, and for encrypting/decrypting on the fly and in this single pass these data with the encryption key, and a control means for providing the encryption key and seed to the stream ciphering means and for requesting data transfer and retrieving status to the secure and non secure modules for allowing the transfer of encrypted/decrypted data between the secure and non secure modules.
-
公开(公告)号:US10673632B2
公开(公告)日:2020-06-02
申请号:US16108578
申请日:2018-08-22
Applicant: GEMALTO SA
Inventor: HongQian Karen Lu
Abstract: The invention is a method for deploying a trusted identity for a user issued by an issuer. The user has a user device configured to send a request for signature to an issuer device handled by the issuer. The request comprises a user public key allocated to the user. The issuer device is configured to compute an issuer signature by signing both the user's trusted identity and the user public key using an issuer private key allocated to the issuer. A block chain transaction containing the issuer signature is created and submitted to a Block Chain for transaction verification and storage.
-
公开(公告)号:US10673610B2
公开(公告)日:2020-06-02
申请号:US15578033
申请日:2016-05-27
Applicant: GEMALTO SA
Inventor: David Vigilant , Sabine Azzi
Abstract: A system, method and computer-readable storage medium with instructions for protecting an electronic device against fault attack. Given a data represented as an input codeword of a systematic linear error correcting code, the technology provides the secure computation of the output codeword corresponding to the result of the non-linear function applied to this data. Other systems and methods are disclosed.
-
公开(公告)号:US10592906B2
公开(公告)日:2020-03-17
申请号:US14594842
申请日:2015-01-12
Applicant: GEMALTO SA
Inventor: Dominique Quesselaire , Jean-Paul Mengus , Michel Leger
Abstract: A system for performing electronic transaction includes: a payment terminal including a human interface module, a first processor, and an internal bus for connecting these elements; a host terminal connectable to the human interface module through a connection; and a security module. The human interface module includes a keyboard, a display, a card reader for reading and authenticating a bank card or credit card. The host terminal includes a second processor, a memory, and a power supply. A transaction terminal task manager is included in the first security module, the first security module being hosted in the host terminal. The human interface module executes transaction phases under control of the security module, and executes security treatments, totally autonomously from the host terminal. The security treatments include presentation of a PIN code to the bank card or credit card.
-
公开(公告)号:US10409588B2
公开(公告)日:2019-09-10
申请号:US16074840
申请日:2017-01-27
Applicant: GEMALTO SA
Inventor: Christophe Franchi , François-Xavier Marseille
Abstract: The invention is a method of managing an object which is represented by a first instance of a class. The first instance is stored in a secure element comprising an initial operating system. The method comprises a step of updating the initial operating system to generate an updated operating system, a step of creating a metadata uniquely associated with the object, said metadata being permanently stored in the secure element and comprising a value of a parameter of said class which has been used to create said first instance. The method comprises a step of re-instantiating the object by generating an updated instance of the class in the updated operating system by using said value to set said parameter of the class, said updated instance representing the object. The re-instantiating step is automatically triggered by the step of updating the initial operating system.
-
公开(公告)号:US20190272781A1
公开(公告)日:2019-09-05
申请号:US16343647
申请日:2017-10-20
Applicant: GEMALTO SA
Inventor: Stéphane TOUVET
IPC: G09G3/16
Abstract: Method for producing an electrophoretic display device comprising a low-voltage microcontroller. The invention relates to a method for producing a segmented electrophoretic display device comprising a bistable display operating at predetermined opposing voltages and an electronic circuit with microcontroller for controlling the display according to a control program. The method includes the following steps: supplying the controller, which is different from a specific display controller for a bistable display and configured to deliver voltages, lower in absolute value to the predetermined voltages, and compensating the voltages with at least one compensation voltage to at least reach the predetermined opposing voltages. The invention also relates to the corresponding device.
-
公开(公告)号:US20190266603A1
公开(公告)日:2019-08-29
申请号:US16062812
申请日:2016-10-20
Applicant: GEMALTO SA
Inventor: Jean-Michel Desjardins , Marie Lathiere
Abstract: In a method for authenticating a user, a device accesses a key and an initial vector. The vector is generated by using a first algorithm, a reference vector and reference user authentication data. The device accesses data and provided user authentication data. The device generates an intermediary vector by using a second algorithm, the initial vector and the user authentication data. The device generates a cryptogram by using a third algorithm, the key, the intermediary vector and the data. A server receives a request for authenticating a user accompanied with the cryptogram and the data. The server accesses the key and the reference vector. The server generates a reference cryptogram by using the third algorithm, the key, the reference vector and the data. The server verifies whether the reference cryptogram matches the cryptogram. If the reference cryptogram matches the cryptogram, the server authenticates the user.
-
公开(公告)号:US20190229886A1
公开(公告)日:2019-07-25
申请号:US16337197
申请日:2017-09-22
Applicant: GEMALTO SA
Inventor: Aline GOUGET
Abstract: The present invention relates to a method to counter DCA attacks of order 2 and higher order applied on an encoded table-based (TCabi,j) implementation of block-cipher of a cryptographic algorithm to be applied to a message (m), said method comprising the steps of: —translating a cryptographic algorithm block-cipher to be applied on a message (m) into a series of look-up tables (Tabi,j),—applying secret invertible encodings to get a series of look-up tables (TCi,j),—computing message-dependent masking values, comprising the computation of at least two shares of masking value (mmask1, mmask2) for the input of the table network based on at least two different message derivation functions (F1, F2),—re-randomizing the tables (TCi,j) using the computed message-dependent masking values (mmask1, mmask2),—computing rounds to be applied on the message (m) based on the randomized network of tables (TCi,j).
-
公开(公告)号:US20190213042A1
公开(公告)日:2019-07-11
申请号:US16327271
申请日:2017-09-04
Applicant: GEMALTO SA
Inventor: Sylvain CHAFER , Valentin FAVREAU , Chandra GONDOWASITO , Guillaume PHAN
CPC classification number: G06F9/5016 , G06F9/44505 , G06F9/468 , G06Q20/355 , G06Q20/3563
Abstract: There is described a method for Java Card application memory footprint optimization which relies on the separation in advance of the code related to the personalization from the rest of the code. It allows this code to perform the personalization of an application installed from a main package while being itself included and installed from a separated package dedicated to the personalization, namely the Card Personalization Specifications (CPS) package. This way, the CPS package and all the code inherent to the personalization can be removed once all the personalization steps have been completed.
-
-
-
-
-
-
-
-
-