GEMPLUS Patent applications |
Patent application number | Title | Published |
20100273521 | METHOD FOR MANAGING THE TRIGGERING OF AN APPLICATION IN A SERVICE TERMINAL, PARTICULARLY IN A TELECOMMUNICATION TERMINAL - The disclosure relates to a method for managing the triggering of an application in a terminal place in an environment consisting of-several access technologies. The disclosure also relates to a mobile telephone type terminal that implements the method. A test mechanism is implemented for at least one application on the basis of information contained in the tested application when a triggering event occurs for an application, thereby making it possible to recognize or deduce the network access technologies supported by the application. | 10-28-2010 |
20100042851 | Method for Securely Handling Data During the Running of Cryptographic Algorithms on Embedded Systems - The invention relates to a method for handling data between two memory areas of an electronic component having at least one working memory area for carrying out operations on the component, which bring into play at least some of the data. The same memory areas are used for executing an operation, whatever the operation to be executed is, in such a manner that each operation has a hidden signal trace that is identical in terms of location leakage outside the component. | 02-18-2010 |
20100038978 | FLUX-SWITCHING DUAL EXCITATION ELECTRICAL MACHINE - Flux-switching electrical machines. In particular, a flux-switching electrical machine having a stator and a rotor. The stator has permanent magnets, armature windings and excitation windings, and the rotor has no winding or permanent magnet but includes a plurality of flux-switching teeth. The stator is generally formed by a succession of elementary cells, each cell being intended to interact with only a single tooth of the rotor at a time. Each cell includes one of the permanent magnets; a first slot for at least partly housing one of the excitation windings at least; and second slots for housing one of the armature windings. | 02-18-2010 |
20100014656 | Cryptographic Method Comprising Secure Modular Exponentiation Against Hidden-Channel Attacks, Cryptoprocessor for Implementing the Method and Associated Chip Card - A cryptographic method carries out a modular exponentiation of the type C=A mod N, where A is an operand, B1 is a first exponent, N is a modulus and C is a result. The method includes the steps of masking the operand A by a number s, carrying out a modular exponentiation of the masked operand by the exponent B1, and de masking the result of the exponentiation, by removing a contribution from the random number s from the result of the exponentiation. During the step of masking the operand A, the operand A is multiplied by a parameter of the form K, where K is a constant and B2 is a second exponent such that B1.B2=1 mod N. The method is implemented preferably by using a Montgomery multiplier. The preferred choice for the constant K is K=2 | 01-21-2010 |
20090299115 | DUAL ZEOLITE CATALYST COMPRISING A GROUP VIII METAL AND A GROUP IIIA METAL, AND ITS USE IN ISOMERIZATION OF AROMATIC C8 COMPOUNDS - A catalyst is described which comprises at least one zeolite with structure type EUO, at least one zeolite selected from IM-5 zeolite and zeolites with structure type MFI, MOR, BEA and MTW, at least one group VIII metal, at least one group IIIA metal and at least one porous mineral matrix. The catalyst of the invention is used in a process for isomerizing a feed comprising aromatic compounds containing 8 carbon atoms per molecule. | 12-03-2009 |
20090271972 | Method for Producing a Contactless Transponder by Stitching a Contactless Module to an Antenna, and Transponder Obtained - A contactless transponder includes an antenna and an electronic module placed on a substrate and connected to the antenna by a conducting wire passing through the contact pads in the form of at least one stitch. The module is produced as a single block, having at least one integrated circuit and contact pads. The module is transferred to the substrate before connection to the antenna. | 11-05-2009 |
20090254777 | Detector of Abnormal Destruction of Memory Sectors - The invention relates to an integrated circuit comprising at least one microprocessor [ | 10-08-2009 |
20090222655 | REMOTE ACCESS TO A MASS MEMORY AND A SECURITY MEMORY IN A PORTABLE COMMUNICATING OBJECT - The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the invention, a terminal, such as a mobile device, which is associated with a portable communicating object, such as a multimedia smart card, includes an agent for facilitating access from a server to a mass storage unit capable of storing multimedia data and a security storage unit in the portable communicating object via a communication network. The agent establishes a single communication channel between the remote server and the terminal and processes data transmitted from one of the two elements including the server and one of the storage units of the portable communicating object to the agent so that the agent can transmit the data to the other of the two elements. | 09-03-2009 |
20090203262 | Method For Producing an Electronic Object Comprising a Data Transfer Stage and the Obtained Object - A method for producing a portable electronic object having contact pads arranged on a plane with a thickness which differs from the thickness of a standard smartcard. The object is electrically connected to data transfer station connectors, by delivering a data transfer station having an electric probe connector and submitting the object to the data transfer station in such a way that the contact pads thereof are accessible to the electric probes in a direction perpendicular to the plane. Objects obtainable include UBS keys or PCMCIA cards or readers. | 08-13-2009 |
20090175455 | METHOD OF SECURING A CALCULATION OF AN EXPONENTIATION OR A MULTIPLICATION BY A SCALAR IN AN ELECTRONIC DEVICE - A cryptographic operation includes calculating a multiplication of an element of an additively denoted group by a scalar. After two registers R | 07-09-2009 |
20090165149 | Method for Making Secure the Execution of an Intermediate Language Software Code in a Portable Device - A method for executing an application compiled in intermediate code on a portable digital appliance equipped with a virtual executing machine for interpreting the intermediate code. The method includes a step of applying a secure execution mode wherein the interpretation of the intermediate code by the virtual machine includes the following steps: for each item of data the code handled for execution of an arithmetic and/or logical operation defined by the code, generating control data, related to the data of the code via a predetermined function; in parallel with the execution of the operation, executing a control operation related to the operation defined by the code via the predetermined function, and acting on the control data. | 06-25-2009 |
20090159692 | Method of unblocking a locked application using a personal identification number - The invention relates to a method of securing applications on a chip card which is disposed in a digital appliance. A count is made of the number of times a personal identification number of a chip card application is input erroneously. When this number reaches a threshold, the application or the chip card is blocked. The erroneous input count and unblocking the chip card or the application is restarted when the personal identification number of the chip card is input. In this way, PIN-secured applications offer a high level of security without requiring the storing of additional unblocking data. | 06-25-2009 |
20090154710 | Method for the Secure Deposition of Digital Data, Associated Method for Recovering Digital Data, Associated Devices for Implementing Methods, and System Comprising Said Devices - The invention relates to a method for the secure deposition of data, according to which a depositor encrypts the data with a transfer key and encrypts the transfer key with a key of a third party, then deposits the encrypted data and the encrypted transfer key on a storage support. The invention also relates to a method for recovering data, during which an addressee of the data recovers the content of the storage support, authenticates him/herself to the third party, and transmits the encrypted transfer key thereto. After having authenticated the addressee, the third party returns the decrypted transfer key. The addressee can then recover the data. The invention further relates to devices for implementing the foregoing methods. | 06-18-2009 |
20090146409 | METHOD FOR CREATING A FORGERY-PROOF CUSTOMISED AND/OR PRINTED GRAPHIC ELEMENT ON A SUPPORT AND SUPPORT THUS OBTAINED - The invention relates to a method of creating a forgery-proof customised and/or printed graphic element on a support using an electromagnetic beam. At least one official marking seal is used which can divert and/or deform an electromagnetic beam. The support is printed or customised using the electromagnetic beam, which is diverted and/or deformed by the official marking seal. The invention also relates to the support thus obtained and to the official marking seal. | 06-11-2009 |
20090144556 | GENERIC ELECTRONIC KEY PROVIDED WITH A CUSTOMIZED SMART CARD - A portable electronic device has a case including: a smart chip, an application which is stored in the smart chip, at least one interface for a user, and a microcontroller which controls the smart chip and the interface. The aforementioned microcontroller is configured to execute the primitive functions of the electronic key in order for the interface to be used, while the smart chip is configured to execute the application. The application is configured to generate calls to the primitive functions in order to communicate with the user by means of the interface. | 06-04-2009 |
20090138718 | Method of generating a signature with "tight" security proof, associated verification method and signature scheme based on the diffie-hellman model - The invention relates to a method of electronically signing a message m, characterized in that it uses: p a prime integer, q a prime integer divider of (p−1), g, an element of order q of the set Z | 05-28-2009 |
20090130394 | Laser marking of a card - The invention relates to a method for the laser marking of a support having a body and a cover sheet. A laser beam is used to etch the body of the support through the thickness of the cover sheet. The support is laminated either during or after the laser marking in order to reduce or prevent deformations in the cover sheet resulting from etching. | 05-21-2009 |
20090124251 | Method of Assessing Compatibility Between Applications and Processor Devices - A method of assessing compatibility between at least one application and at least one processing device that host and/or executes and/or interacts with the application. A comparison is carried out between: (i) at least one profile from among the profiles associated with the devices, that respectively describe the functions supported by each device, and (ii) at least one profile from among the profiles associated with the applications that respectively describe the functions used by each application, in order to sutomatically establish an analysis of the functional compatibility between one or more applications and one or more devices. | 05-14-2009 |
20090122980 | Cryptographic Method for Securely Implementing an Exponentiation, and an Associated Component - An asymmetrical cryptographic method applied to a message M includes a private operation of signing or decrypting the message M to obtain a signed or decrypted message s. The private operation is based on at least one modular exponentiation EM in the form EM=M | 05-14-2009 |
20090119646 | Detection of a Fault by Long Disturbance - A method for detecting faults by perturbations during execution of a computerized code in an electronic device. The computer code includes a sensitive process. The method includes a step of executing a redundant procedure of the sensitive process and a step of inserting a delay between the sensitive process and the redundant procedure. A trapping procedure is executed during the delay. The trapping procedure is sensitive to perturbations and supplies, in the absence of perturbation, a predictable result. | 05-07-2009 |
20090093271 | Access To Contact Connectors Of A Mobile Terminal From Another Mobile Terminal - A smart card is initially connected to a first mobile terminal and includes a first directory file adapted to store first contact cards. To access the first contact cards, initially stored in a directory of the first terminal, from a second mobile terminal an application in the first terminal copies each of the first cards of the directory in the first directory file, if the latter does not include the first card. In the second terminal connected to the card withdrawn from the first terminal, the application copies each of the first cards of the first directory file in the file of the second terminal, if the latter does not include the first card and if the first directory file is inaccessible by the second terminal. | 04-09-2009 |
20090065325 | Smart Card Customization - The invention concerns a method for reducing factory customizing time in a smart card (CP | 03-12-2009 |
20090049258 | Method of verifying pseudo-code loaded in an embedded system, in particular a smart card - The invention relates to a verification of applications in interpreted language of the byte-code type (pseudo-code) loaded on portable electronic devices, in particular a chipcard and a method for verification of an application ( | 02-19-2009 |
20090037586 | Campaign for downloading data into portable communicating objects - The downloading of data from a server into one (Cn) of the portable communicating objects (C | 02-05-2009 |
20090034333 | Method for Managing a Non-Volatile Memory In a Smart Card - The invention concerns a method for managing access to a non-volatile memory (VNVM), characterized in that said non-volatile memory (VNVM) results from the association of a non-volatile memory of a first type (NVMA) comprising first characteristics of capacity and granularity, with a non-volatile memory of a second type (NVMB) comprising second characteristics of capacity and granularity, such that said non-volatile memory (VNVM) resulting from said association has the characteristics of capacity of said non-volatile memory of the first type and the characteristics of granularity of said non-volatile memory of the second type. | 02-05-2009 |
20090020603 | Method, a System and a Microcontroller Card for Communicating Application Services from a Microcontroller Card to a Terminal - A method wherein at least one service of an application stored in a microcontroller card is communicated to a terminal. The terminal transmits a command identifying the selected application to the card immediately after selecting the application. In order to reduce in the card the time for accessing the application service data by the terminal, a reply generator in the card selects the active services related to the application in the card in response to the command, and dynamically establishes a list of data identifying these services, to transmit a reply message including the identification data from the card to the terminal. A reply analyzer in the terminal analyzes the identification data of the reply message to communicate the at least one service of the application identified by the identification data. | 01-22-2009 |
20090010436 | DECIPHERABLE SEARCHABLE ENCRYPTION METHOD, SYSTEM FOR SUCH AN ENCRYPTION - A method for encrypting/decrypting a message includes the initial step of generating keys by the sub-steps of generating a public key; generating a decryption key; and generating a derivation key. For a first entity, the message is encrypted using the public key and a cipher. For a second entity, the cipher is decrypted to find the message. A trapdoor associated with said message is generated. The trapdoor corresponds to a derivative of the derivation key specific to the message. A test cipher is tested, using the trapdoor associated with the message, to determine if the test cipher is an encryption of the message using the public key. | 01-08-2009 |
20090006845 | Management of Secure Access to a Secure Digital Content in a Portable Communicating Object - The invention concerns a terminal (T) comprising an agent (AS) for processing a secure content encrypted with a key (KCN) and transmitted by a first server (SCN). In order to manage a secure access to the secure content, an application (AG) of a portable communicating object, such as a chip card, associated with a terminal stores one type of related digital right (TDN) and a certificate and transmitted by the agent and stores an access right (DA) and the key (KCN) related to the secure content transmitted from a second server (SAD). The application adapts the access right and the key and modifies the secure content, based on the type of right, and produces a secure access file based on the adapted access right and the key and on the certificate, the produced file being accessible by the terminal so that the agent may process the modified content. | 01-01-2009 |
20090006584 | Service Personalization in a Terminal Device - Two service signals are transmitted from a service server through a first network in such a way that users' terminal devices display personalized service data items. When service signals are filtered, a terminal device extracts common data items accessible for several terminal devices and a parameter type from a service signal identified by a stored identifier. An end address is determined by applying a stored parameter, related to the parameter type, to a pre-recorded or transmitted algorithm. The end address is transmitted, through a second network, to a server which transmits a first personalized file associated with the end address and bearing personalized data items displayed with the common data items in the device. | 01-01-2009 |
20080308642 | Personalised Support Such as an Identity Card Comprising Anti-Falsification Means - The invention concerns a support having a surface provided with personalizing data, wherein it includes anti-counterfeit measures, arranged on at least part of the surface. The anti-counterfeit measures are being configured to be modified in appearance under the effect of an additional personalization of the surface part and appear as defects visible at the surface of the card. | 12-18-2008 |
20080297315 | Inductive Coupling Exchange in a Portable Intelligent Object With Central and Peripheral Circuits - A portable intelligent object has first and second communication interfaces with a station. The first communication interface can send and/or receive data by means of inductive coupling with the station. The object also has an integrated peripheral circuit. All of the data exchanged between the peripheral circuit and the central circuit passes through the station. | 12-04-2008 |
20080294752 | Downloading of Data in Portable Communicating Objects Present in a Radio Communication Network During a Campaign - A system downloads data made available in a campaign server to portable communicating objects across a radiocommunications network during a data downloading campaign. A campaign manager in the campaign server transmits campaign rules to a presence server connected to the radiocommunications network. A presence manager notifies the campaign server that an event relating to the presence of at least one communicating object in the radiocommunications network satisfies a campaign rule, in order to initiate a downloading of data from a campaign server to the available communicating object. | 11-27-2008 |
20080293377 | Reuse of Identity Data from a User Equipment Identity Module by a Peripheral Device - The invention relates to the reuse of identity data from an identity module in a user equipment by a peripheral device. In order to enable the reuse of identity data from an identity module, such as a SIM or UICC card, in a user equipment by a peripheral device, the identifier of the peripheral device is transmitted to the module upon establishment of communication and authentication between the module and the peripheral device. Subsequently, identity data are transmitted, preferably selectively, by the identity module to the peripheral device when the transmitted identifier is recognized as one of the identifiers of the peripheral devices that were previously stored in the identity module. The identity data are reused by the peripheral device in order to establish a communication with the home network of the user equipment or with a local wireless network. | 11-27-2008 |
20080287162 | RADIOTELEPHONE TERMINAL WITH CHIP CARD PROVIDED WITH BROWSER - This invention improves the intelligence of chip cards (SIM) in mobile radiotelephone terminals, so that a subscriber may, through the terminal, easily access databases (DB), attached to a server of services (SV). It facilitates the dialog between a subscriber who owns a mobile radiotelephone terminal and a server of services through the medium of an exchange of request and response messages. The card comprises a browser (NV) which interacts with the server and which can be triggered by selection in the mobile terminal or remotely by the server. The card and the server exchange short messages. Libraries of supplementary functions (BI), stored in the card, can be triggered by the server through the browser. The invention also relates to communications between the card that is equipped with the browser and the server. | 11-20-2008 |
20080276090 | System for Allocating a Chip Card to a Network Operator - A chip card needs to be allocated in a secured manner to a network operator via a personalization center in order to determine a final authentication key which is attributed to a subscriber of the operator without its being transmitted via a network. The following is loaded into a card by a module: an algorithm and an allocation key; an algorithm for determination of the authentication key and at least one intermediate authentication key. A module transmits an allocation message which includes a final identity number, a random number and an allocation signature from the center to the card. The card authenticates the message by means of the allocation algorithm as a function of the allocation key and the allocation signature, and determines the final authentication key as a function of the intermediate key and the random number. | 11-06-2008 |
20080271103 | Controlling Access to Broadcast Services in a Terminal Device - Services are distributed via a distribution network to terminal devices. One of the services is an electronic service guide stored in the terminal devices and providing descriptive data on the distributed services. To control access to the services distributed to a terminal device, the device includes a module for filtering descriptive data on the distributed services in accordance with at least one filtering criterion, and a graphics module for displaying the filtered descriptive data that meets the filtering criterion so as to enable services associated with the displayed filtered descriptive data to be selected. | 10-30-2008 |
20080251587 | Method of Manufacturing a Substrate for a Mini-Uicc Smart Card with an Associated Plug-In Uicc Adapter, and a Resulting Substrate - A method of producing a smart card having a reduced format in relation to a second standard format and an adapter with the second format, which is associated with the smart card. A card body has a zone for the extraction of the smart card and a zone for the extraction of the adapter. At least the smart card is extracted from the support. The smart card is extracted from a zone located outside the peripheral outline of the adapter extraction zone. The invention also relates to the support thus obtained. | 10-16-2008 |
20080232582 | Method for Dynamically Authenticating Programmes with an Electronic Portable Object - A method for dynamically authenticating an executable program, that is the continuation of the instructions defined thereby, is performed repeatedly during the very execution of the program. The method for making secure an electronic portable object through execution of a program supplied by another insecure electronic object uses, inter alia, a secret key protocol. | 09-25-2008 |
20080227432 | Activating the Unlocking of a Mobile Terminal - The invention concerns a method for activating unlocking of a mobile terminal (TM) to be connected to a radio communication network (RR) and co-operating with a smart card (CP), wherein an unlocking activating indicator stored in a first state in the card is periodically read by an application of the terminal to maintain the terminal locked if the indicator is in the first state. A server (SO) transmits an updating message including a state-changing command to the card via the terminal after a predetermined usage time interval so that an application in the card shifts the unlocking activating indicator into a second state. If the unlocking activating indicator is read in the second state by the terminal application, the latter commands the unlocking of the mobile terminal. The interaction between the terminal as well as providing sufficient revenue to the operator who has sold the terminal | 09-18-2008 |
20080212558 | Communication Set Up Between Wireless Devices - The invention relates to a slave wireless device (Picc) comprising:
| 09-04-2008 |
20080198078 | Adjusting Resonance Frequency by Adjusting Distributed Inter-Turn Capacity - The invention concerns a method for adjusting frequency tuning of a resonant circuit with turns having a regular spacing generating stray inter-turn capacity. The adjusting of the frequency tuning of the resonant circuit is performed, at the level of the stray inter-turn capacity, by varying the regular spacing of adjacent turns on at least one zone of the antenna. The invention uses this adjusting method for producing an adjusted antenna for a resonant circuit, the resonant circuit and a non-contact product. The invention concerns a device programmed for antenna production and/or definition. | 08-21-2008 |