OBERTHUR TECHNOLOGIES Patent applications |
Patent application number | Title | Published |
20150317554 | METHOD FOR PRODUCING A SMART CARD HAVING A PLURALITY OF COMPONENTS AND CARD OBTAINED IN THIS WAY - A method for producing a smart card including at least one chip and at least one other electronic component having a face that must be accessible from the outside, includes: forming a card body having two opposing faces and in which at least two recesses are formed, one of which is a through-recess extending from one of the faces to the other, forming a first module including the chip and forming a second module separate from the first module and including the other electronic component, the second module including a support to which the component is secured opposite the face that must be accessible, securing the second module in the through-recess from the face of the body that is opposite the face through which the face of the component must be accessible from the outside, via a shoulder in the through-recess, and securing the first module in the other recess. | 11-05-2015 |
20150143474 | PROCEDE ET DISPOSITIFS D'AUTHENTIFICATION POUR ACCEDER A UN COMPTE UTILISATEUR D'UN SERVICE SUR UN RESEAU DE DONNEES - An authentication method for accessing a user account of a service ( | 05-21-2015 |
20150143464 | Method and device for the connection to a remote service - The present invention relates to the field of the connection to a secure remote service from a terminal and notably of the establishment of a connection between the secure remote service and a security device connected to the terminal. A security device including a security element is connected to the terminal via a physical or virtual local network. When trying to access a secure remote service, a software module is automatically downloaded onto the terminal, without requiring particular rights, from the secure remote service for the discovery and the interaction with the security device. In this way, it is not necessary to install drivers or other specific software in order to enable the use of the secure element when trying to access a secure remote service. | 05-21-2015 |
20150098564 | MASKING AND UNMASKING METHODS AND DEVICES - Devices and methods for masking and unmasking sensitive data, based on a standard cryptographic algorithm defining a ciphering algorithm, and a deciphering algorithm using more resources than the ciphering algorithm are described. The masking of sensitive data is done by applying the deciphering algorithm to the sensitive data to obtain masked sensitive data. The unmasking of the masked sensitive data is done by applying the ciphering algorithm to the masked sensitive data to obtain sensitive data in plain form. | 04-09-2015 |
20140315399 | ASSEMBLY COMPRISING AN ADAPTER AND A SMART CARD - In an assembly including an adapter and a smart card, the outer dimensions of the adapter are compliant with the 3FF microcircuit card format, the format further defining the positioning and minimum dimensions of contact areas; the smart card includes a plurality of contact surfaces, the dimensions of which are greater than those defined by the 3FF format for the contact areas, the outer dimensions of the card being smaller than those of the 3FF format; and the adapter includes a recess, the outline of which is defined by a plurality of arms that surround the recess, the recess being shaped so as to receive the smart card so the contact areas of the adapter fit inside the contact surfaces of the smart card, each of the contact areas being off-center relative to each of the contact surfaces, so each arm has a width of 700 micrometers, ensuring mechanical stability. | 10-23-2014 |
20140245005 | Cryptographic processing method and system using a sensitive data item - A cryptographic processing method using a sensitive data item in a cryptographic processing system including in memory a test making it possible to tell a human and a computer apart and a reference value obtained by applying a cryptographic function to a pair of values P and R, where P is the sensitive data item and R is a solution to the memorized test, the method including the steps of: configuring the cryptographic processing system, including obtaining and memorizing the reference value in the cryptographic system; transmitting the memorized test to a user; obtaining the user's response to the transmitted test; a cryptographic processing step based on the sensitive data item, using the obtained response, the reference value and the cryptographic function. The reference value and memorized test are in the memory of the system and the solution is not in the memory of the system, during the transmission step. | 08-28-2014 |
20140164771 | METHOD AND SYSTEM FOR MANAGING AN EMBEDDED SECURE ELEMENT eSE - A method and system for managing an embedded secure element ( | 06-12-2014 |
20140158764 | SMART CARD READER - A smart card reader ( | 06-12-2014 |
20140150110 | METHOD FOR ROUTING A MESSAGE - A method for routing at least one message, this method being implementation-dependent on a trusted operating system of an electronic device comprising an electronic assembly on which the trusted operating system and a Rich-OS operating system are executed. The method may include operations for consulting a trusted memory of a terminal, which may be called a first memory, and when the first memory contains a message, determining the operating system targeted by the message from among at least the Rich-OS operating system and the trusted operating system. And when the message targets the Rich-OS system, transferring the message from the first memory to a memory accessible to the Rich-OS system, which may be called a second memory. | 05-29-2014 |
20140150093 | ELECTRONIC MODULE FOR MAKING A MESSAGE ACCESSIBLE TO A TARGETED OPERATING SYSTEM - An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device, from among at least a Rich-OS operating system and a trusted operating system executed on a chipset of the electronic device, so that the message becomes accessible to the targeted operating system. The determining means may be set in operation in response to receipt of the message by the transmitter-receiver. | 05-29-2014 |
20140146747 | METHOD OF ESTABLISHING AN IP CONNECTION IN A MOBILE NETWORK AND VARIOUS CORRESPONDING EQUIPMENT ITEMS - The disclosure relates to the field of wireless communications, and more particularly a method of establishing an IP connection through a 3GPP mobile network, at least partially of IP type, a network equipment item, MME or PDN-GW, of that mobile network, a mobile network infrastructure, a mobile terminal and a corresponding system. The method includes the following steps, on a first equipment item, MME or PDN-GW, of the mobile network other than a mobile equipment item UE of the mobile network: receiving a fully qualified domain name, FQDN, sent by a mobile equipment item, UE, of the mobile network, the FQDN identifying a target data server; and on reception of the FQDN, triggering the resolution of the FQDN into an IP address of the target data server. Thus, a mobile user equipment item provided with a UICC card may be produced at low cost without incorporating DNS resolution mechanisms. | 05-29-2014 |
20140119617 | BIOMETRIC IDENTIFICATION - A system for biometrically authenticating a user includes:
| 05-01-2014 |
20140117097 | MICROCIRCUIT MODULE AND SMART CARD COMPRISING SAME - A microcircuit module for a smart card includes a generally rectangular carrier film ( | 05-01-2014 |
20140075203 | METHOD FOR TESTING THE SECURITY OF AN ELECTRONIC DEVICE AGAINST AN ATTACK, AND ELECTRONIC DEVICE IMPLEMENTING COUNTERMEASURES - A method of testing security of an electronic device against a combination of a side-channel attack and a fault-injection attack implemented during a method of cryptographic processing that includes: delivering a message signature based on a secret parameter and implementing a recombination of at least two intermediate values according to the Chinese remainder theorem; and verifying the signature on the basis of at least one public exponent. The method of testing includes: transmitting a plurality of messages to be signed by said electronic device; disturbing each message, including modifying the message by inserting an identical error for each message, before executing a step of determining one of the intermediate values; and analyzing physical measurements, obtained during the step of verifying the signature as a function of the message to be signed, the identical error for each message, and an assumption of a value of part of the secret parameter. | 03-13-2014 |
20140057612 | PROCESS OF INITIATION OF A CONVERSATION - The invention relates to a method of initiating a conversation, the method comprising the following steps:
| 02-27-2014 |
20140026229 | DELEGATION OF ACCESS RIGHTS TO AN ACCOUNT AFTER THE DISAPPEARANCE OF THE USER - A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user. | 01-23-2014 |
20140025940 | UPDATING AN OPERATING SYSTEM FOR SECURE ELEMENT - A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active operating system, and, in the affirmative, to launch execution of the operating system, an authentication step of a updater device, as a function of first authentication data determined by a secure element and second authentication data received from the updater device, and, in response to the authentication step, a storage step of a new operating system received from the update, device in the non-volatile memory and an activation step of the new operating system, when said instructions are executed by a microprocessor. | 01-23-2014 |
20130290191 | METHOD OF TRANSFERRING ACCESS RIGHTS TO A SERVICE FROM ONE DEVICE TO ANOTHER - A method of transfer transferring a right to access a service from a device ( | 10-31-2013 |
20130218775 | METHOD AND SECURE DEVICE FOR PERFORMING A TRANSACTION - A method for determining the presence of a human being, comprising:
| 08-22-2013 |
20130173405 | BANK CARD AND RESPONSE PROCESS TO A TRANSACTION REQUEST - The invention relates to a bank card ( | 07-04-2013 |
20130163751 | Method for Determining the Cofactor of an Elliptic Curve, Corresponding Electronic Component and Computer Program Product - A method and apparatus are proposed for cryptographic computations implemented in an electronic component. The method includes determining the cofactor of an elliptic curve E defined over a finite field F | 06-27-2013 |
20130152192 | RESTRICTING ACCESS TO THE RESOURCES OF A TERMINAL - A portable computer terminal having an operating system configured to switch from a first state to a second state in response to a first command from a user and to switch from the second state to the first state in response to a second command from the user, the second command including inputting an identification code of the user, the operating system being capable, in the first state, of causing execution in interactive manner of an application selected from a set of applications, the operating system being capable, in a second state, of causing execution in interactive manner of an application of said set of applications in compliance with an access condition, wherein the access condition is determined as a function of said first command. | 06-13-2013 |
20130130713 | SELECTION PROCESS FOR AN APPLICATION IN A TERMINAL AND TERMINAL EXECUTING THIS PROCESS - The process according to various aspects can be executed by a terminal for selecting an application executable at least in part by a secure module incorporated into the terminal, and may include a step for obtaining location information of the terminal, from a memory of the secure module, and a selection step of an application from the obtained location information. | 05-23-2013 |
20130117844 | MICROCIRCUIT CARD PROTECTED BY A FUSE - A microcircuit card ( | 05-09-2013 |
20130074320 | A METHOD OF INCORPORATING AN ELEMENT IN A DATA CARRIER - A method of placing an element onto a data carrier, where there is a placement actuator arranged to be able to secure the element. A transport layer is advanced until the element is located between the placement actuator and the data carrier in a desired position. The actuator is moved towards the data carrier so that it secures the element. The transport layer is then retracted to detach the element from it and then the placement element is moved towards the data carrier to bring the element into contact with the data carrier at the desired position. | 03-28-2013 |
20130070924 | METHOD OF COMMUNICATION AND ASSOCIATED SYSTEM OF GLASSES TYPE FOR A USER USING A VIEWING STATION - A method for communicating between a user using a viewing device ( | 03-21-2013 |
20130068844 | MICROCIRCUIT CARD AND A TOOL AND METHOD FOR MAKING THEREOF - A microcircuit card ( | 03-21-2013 |
20130066787 | SYSTEM AND TREATMENT PROCESS OF A FINANCIAL TRANSACTION - The invention relates to a system and treatment process of a bank reimbursement transaction of a user of the system having made a first bank expense transaction for a company ( | 03-14-2013 |
20130041812 | METHOD AND SECURE DEVICE FOR PERFORMING A SECURE TRANSACTION WITH A TERMINAL - A method for performing a secure transaction between a secure device ( | 02-14-2013 |
20130008968 | DATA CARRIER HAVING A CONTACT PLATE WITH PRINTING THEREON - A data carrier ( | 01-10-2013 |
20120160922 | Configuration Method for an Electronic Entity - A method implemented by an electronic entity including a nonvolatile rewritable memory and a read-only memory, the method comprising: reception of at least one write command for writing to the nonvolatile memory, and en response to the command, writing configuration data to the nonvolatile memory, wherein the configuration data are obtained based on so-called prerecorded data read in the read-only memory. | 06-28-2012 |
20120159447 | Hardware security module and debugging method of such a module - The present invention relates to the field of debugging of compiled programs in a hardware security module such as a microprocessor card. A module according to the invention includes a microprocessor and a compiled program to be executed by the microprocessor in order to carry out an operation. The compiled program includes at least one debugging instruction which whether or not it is executed does not modify the execution of the operation. And, the hardware security module includes an element of inhibiting or activating the debugging instruction during the execution of the compiled program. | 06-21-2012 |
20120159253 | Hardware security module and processing method in such a module - The present invention relates to the field of processing within hardware security modules, such as for example debugging of compiled programs. A debugging module includes a microprocessor and a compiled program to be executed by the microprocessor in order to carry out an operation, and is configured to exchange with an external entity, in a master/slave mode, messages relating to the operation. The compiled program includes at least one debugging instruction which whether or not it is executed does not modify the execution of the operation. The hardware security module is moreover configured to transmit, during the execution of the compiled program, data generated, for example by the debugging instruction, over a communication channel initiated by the hardware security module, to an entity external to the hardware security module. | 06-21-2012 |
20120158847 | ELECTRONIC DEVICE AND COMMUNICATION METHOD - An electronic device ( | 06-21-2012 |
20120151608 | SYSTEMS AND METHODS FOR SECURING THE POWER SUPPLY OF COMMAND MEANS OF A MICROCIRCUIT CARD IN CASE OF ATTACK - This microcircuit card includes means for detecting an attack on the card, command means ( | 06-14-2012 |
20120149327 | METHOD AND DEVICE FOR EXECUTION CONTROL FOR PROTECTED INTERNAL FUNCTIONS AND APPLICATIONS EMBEDDED IN MICROCIRCUIT CARDS FOR MOBILE TERMINALS - The invention in particular relates to the execution control of protected internal functions and applications embedded in a mobile terminal microcircuit card. The control of a protected internal function is directly carried out in the microcircuit card. After having detected ( | 06-14-2012 |
20120145795 | Security Document Comprising a Near-Field Communication Device such as a Passport - A document ( | 06-14-2012 |
20120143937 | Method of Communication Between an Embedded Server and a Remote Server - A communications method implemented by a programmable appliance for exchanging data between a first server hosted in an electronic entity connected to said programmable appliance and a remote second server, via a browser executed by said programmable appliance, the communications method comprising:
| 06-07-2012 |
20120138691 | METHOD OF RECEIVING A MODULE IN A SMART CARD BODY - The smart card comprises a module having a microcircuit and a body including a cavity for receiving the module, wherein the cavity defines at least one surface area for fastening the module in the cavity, the body being formed by a stack of at least first and second layers respectively presenting weak adhesion and strong adhesion with the module. The area extends in the weak adhesion layer and includes at least one hole leading to the strong adhesion layer so as to form an anchor point for the module directly with said layer. | 06-07-2012 |
20120138690 | METHOD OF FABRICATING A MICROCIRCUIT DEVICE - A fabrication method for a device having a body having a cavity of dimensions suitable for receiving a module having a microcircuit, the cavity having a bottom and a peripheral wall surrounding the bottom, the method including a step of putting the module into place in the cavity. More precisely, the method comprises, prior to the step of putting the module into place, a step of depositing an adhesive strip at least on a surface of the module that is designed to face the bottom of the cavity, the adhesive strip being suitable for enabling the module to adhere at least to the bottom of the cavity and for limiting a deformation stroke of the module that could occur under the effect of a mechanical compression force urging the module against the bottom of the cavity. | 06-07-2012 |
20120117550 | Method, computer program and device for providing security for intermediate programming code for its execution by a virtual machine - The invention in particular relates to provide security for intermediate programming code for its execution by a virtual machine. After having received ( | 05-10-2012 |
20120102565 | METHOD AND SYSTEM FOR CONTROLLING THE EXECUTION OF A FUNCTION PROTECTED BY AUTHENTIFICATION OF A USER, IN PARTICULAR FOR THE ACCESS TO A RESOURCE - A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a resource The method includes inputting, by the user, of personal data using an input device, authenticating the user with the input personal data for authorizing or not authorizing the execution of the function; in a secure card connected to the input device, storing limited validity authentication data dependant on the input data; when the card is connected to a processing device by which the user generates a message whose processing implements the function, using the stored data, taking into account the limited validity, to authorize or not authorize the execution of that function. | 04-26-2012 |
20120061476 | Microcircuit Card Including a Luminous Means - The microcircuit card ( | 03-15-2012 |
20120055999 | Luminous Module for Microcircuit Device - The electronic module ( | 03-08-2012 |
20120037710 | Microcircuit Device including a Near-Field Communication Antenna Circuit - This circuit ( | 02-16-2012 |
20120024960 | Transponder Inlay and Device including such an Inlay - The inlay ( | 02-02-2012 |
20120018523 | Contactless Electronic Tag - The contactless electronic device ( | 01-26-2012 |
20120018522 | Microcircuit Device including Means for Amplifying the Gain of an Antenna - The electronic device ( | 01-26-2012 |
20110303743 | MICROCIRCUIT CARD WITH AN INDICATOR AND METHOD IMPLEMENTED IN SUCH A CARD - A microcircuit card, includes an indicator ( | 12-15-2011 |
20110303112 | Method for Making an Imprint on an Article - An imprint ( | 12-15-2011 |
20110295918 | Method of evaluating a function and associated device - A method for evaluating a function of a finite field of characteristic p into itself, for an element x of the field, uses an evaluation, for the element x, of a polynomial formed by a plurality of monomials. The evaluation of the polynomial includes the following steps: determining monomials the degree of which is an integer power of the characteristic p by successive raisings of the element x to the power p; and determining monomials the degree of which is different from an integer power of the characteristic p on the basis of the determined monomials, the degree of which is an integer power of the characteristic p, and by at least one multiplication. An evaluating device is also provided. | 12-01-2011 |
20110293088 | METHOD OF DETERMINING A REPRESENTATION OF A PRODUCT, METHOD OF EVALUATING A FUNCTION AND ASSOCIATED DEVICES - A representation is determined of the product of first and second elements of a finite set with cardinality strictly greater than two and in which are defined an addition and a multiplication that is commutative and distributive with respect to that addition. For each pair formed by a first integer included between 1 and d and a second integer strictly greater than the first integer, obtaining a value by element of the sub-steps: picking a random value associated with the pair, performing a first addition of the random value and of the product of the first value associated with the first integer and of the second value associated with the second integer, performing a second addition of the result of the first addition and of the product of the first value associated with the second integer and of the second value associated with the first integer; and for each integer included between 1 and d, determining the value associated with the integer concerned in the representation by summing the product of the first and second values associated with the integer concerned, the random values associated with the pairs of which the first integer is the integer concerned and the values obtained for the pairs of which the second integer is the integer concerned. | 12-01-2011 |
20110251958 | Method of Controlling a Device Able to Function in a Mode With or Without Code Verification to Effect a Transaction - The invention relates to a method of controlling a device able to function in a mode with code verification or in a mode without code verification to effect a transaction, the method including a step of authenticating the device, an optional step of verifying a code, and a stage of continuing the transaction, wherein the method further includes a first verification step of verifying whether the device is functioning in the mode without code verification; and
| 10-13-2011 |
20110240825 | Support that Includes a Detachable Element, a Method for the Detachment of such a Detachable Element, and Method for the Manufacture of such a Support - A support that includes a detachable element which has one border, of which at least a portion is attached to the support, with the border portions attached to the support all being so attached by weakened attachment seams, where the support also includes at least two lines of weakness that allow the support to be separated into at least two portions connected by a weakened attachment seam to the detachable element, with each of the lines of weakness being such that, when the support is bent along this line of weakness until it breaks, none of the weakened attachment seams breaks totally. Also disclosed is a method for the detachment of such a detachable element as well as a method for the manufacture of such a support. | 10-06-2011 |
20110199722 | DUAL COMMUNICATION FOB ASSEMBLY COMPRISING AN INSERT WITHIN A BASE - A dual communication fob assembly provided with an attachment area for a ring or a chain and including in combination: an insert including a first contactless communication device; and a base with a pocket in the base for holding at least a part of the insert when inserted therein, and being provided with a second contactless communication device which is electrically separate from the first contactless communication device. | 08-18-2011 |
20110150222 | PORTABLE ELECTRONIC DEVICE AND ASSOCIATED METHOD FOR MAKING INFORMATION AVAILABLE - A portable electronic device includes at least one near-field or medium-field wireless communication interface ( | 06-23-2011 |
20110139879 | Electronic Component Suitable for Detecting Attacks by Delivering Energy - The electronic component comprises: reference-obtaining means for obtaining a physical magnitude referred to as a reference magnitude, which magnitude is dynamically adjustable and representative of the expected activity of said component; comparator means suitable for comparing said reference magnitude with a magnitude of the same type representative of the real activity of said component; and detector means suitable for detecting an attack as a function of the result of said comparison. | 06-16-2011 |
20110129084 | METHOD OF EXECUTING AN ALGORITHM FOR PROTECTING AN ELECTRONIC DEVICE BY AFFINE MASKING AND ASSOCIATED DEVICE - A method of executing an algorithm includes protecting an electronic device by affine masking. The electronic device executes operations on secret variables x, the secret variables x being binary vectors of a given size N other than zero. The method further includes replacing the secret variables x using an affine masking operation, by the following affine function: m(x)=R.x+r, where R is a random invertible binary matrix with N rows and N columns and r is a random binary vector of size N. | 06-02-2011 |
20110121084 | Microcircuit Card Body Forming a Medium for Two Electronic Labels - First and second electronic labels, the labels having respective first and second near-field electronic communications means suitable for being activated by applying a magnetic field. The first and second labels further comprise respective first and second magnetic shielding means placed respectively between a first face of the body and the first communications means and between a second face of the body and the second communications means in such a manner that applying the magnetic field to one of the faces of the body activates only one of the first and second communications means. | 05-26-2011 |
20110117838 | Contactless Electronic Device, Process for Manufacturing the device and Contactless Electronic Tag - The device ( | 05-19-2011 |
20110068165 | Method of Verifying the Validity of an Electronic Parking Ticket - The method serves to verify the validity of an electronic parking ticket stored in an electronic entity. The method includes a step of securely obtaining from the electronic ticket specific data that is specific to said electronic entity or to the vehicle in which it is installed, and a step of making available at least a portion of said specific data on an inspection device. The method enables a dishonest attack of the “man-the-middle” type to be detected. | 03-24-2011 |
20110055591 | METHOD FOR CRYPTOGRAPHIC DATA PROCESSING, PARTICULARLY USING AN S BOX, AND RELATED DEVICE AND SOFTWARE - A method for data cryptographic processing, that is implemented by an electronic entity and includes the conversion of input data (M′i−1), masked by an input mask (X), into output data, the conversion using a conversion table (S), and the method including the following steps: for at least one plurality of possible values (A) for the input mask (X), transferring the output value of the conversion table (S) corresponding to the masked input data (M′i−1) converted by the application of an unmasking operation using the possible value (A), into a table (T) at a position corresponding to a determined value (0) masked by the input mask (X) and converted by the application of an unmasking operation using the possible value (A); determining the output data using the value located in the table (T) at the position corresponding to the determined value (0). | 03-03-2011 |
20110049248 | Electronic Device Comprising a Microcircuit Card | 03-03-2011 |
20110037607 | Microcircuit Card Comprising a Light-Emitting Diode - The light-emitting diode is provided with a lid and is capable of emitting a first predefined color. The card further comprises a near field communications antenna circuit, the circuit and the diode being configured so that the diode emits light when a current of predefined intensity flows in the circuit. More particularly, the lid of the diode is coated with a mass of material forming means for selecting a set of wavelengths from those making up the first color so that the light transmitted through the mass has a second predefined color different from the first color. | 02-17-2011 |
20110029784 | METHOD OF PROCESSING DATA PROTECTED AGAINST FAULT INJECTION ATTACKS AND ASSOCIATED DEVICE - A method of cryptographic processing of data (X), in particular a method protected against fault injection attacks, and an associated device. The processing includes at least one transformation ( | 02-03-2011 |
20100328189 | Process for Electrically Interconnecting Two Components - One component is provided with an electrical connection wire and the other component is provided with an electrical connection pad. The process includes a wire routing step along at least one out-and-back path so as to form at least first and second rectilinear portions on the outward and return paths while running through at least one loop connecting the two portions. In addition, the process includes a step for attaching the wire to the pad at at least one electrical conduction point in such a way that each of the rectilinear portions is connected to the pad. | 12-30-2010 |
20100322421 | METHOD FOR MAKING SECURE AN ELECTRONIC ENTITY WITH ENCRYPTED ACCESS - A method for protecting an electronic entity with encrypted access, against DFA (Differential Fault Analysis) attacks which includes: storing the result of a selected step (Rm, Kn) of an iterative process forming part of the cryptographic algorithm and in performing once more at least part of the steps of the iterative process up to a new computation of a result corresponding to the one which has been stored, comparing the two results and denying distribution of an encrypted message (MC) if they are different. | 12-23-2010 |
20100317369 | ELECTRONIC ENTITY AND MICROCIRCUIT CARD FOR ELECTRONIC ENTITY - An electronic entity and a microcircuit card ( | 12-16-2010 |
20100251261 | Method and Device for Automatically Selecting an Application That Can Be Implemented by Said Device - The electronic device comprises:
| 09-30-2010 |
20100207726 | Electronic Entity Capable of Communicating With a Reader and Method Used Within Such an Electronic Entity - An electronic entity includes a processing circuit ( | 08-19-2010 |
20100193583 | CASING FOR ELECTRONIC KEY AND SYSTEM COMPRISING SUCH A CASING - This USB memory key casing exhibits an accessory accommodation housing ( | 08-05-2010 |
20100176203 | METHOD FOR GENERATING A PROFILE FOR THE PERSONALISATION OF AN ELECTRONIC ENTITY AND ASSOCIATED SYSTEM - A method for generating a profile for the personalization of an electronic entity, includes the following steps: selection (E | 07-15-2010 |
20100153737 | Method of Projecting a Secure USB Key - A method of protecting a secure USB key comprising: a step of obtaining at least one parameter concerning the use of a function that can be executed on said key; a step of detecting at least one blocking condition that depends on said parameter, and where appropriate, a first check step suitable for preventing the execution of said function; a step of detecting at least one determined event independent of said function; and a second check step suitable for authorizing the execution of said first check step only in the event of said determined event being detected, said second check step being active even when said blocking condition is not satisfied. | 06-17-2010 |
20100142161 | Portable Electronic Device with USB Connector - A portable electronic device with a USB connector comprises a card body obtained according to the chip card technology, with at least one slender hinge ( | 06-10-2010 |
20100141465 | Electronic Device Enabling Near-Field Contactless Communications - A portable electronic device comprises an antenna ANT connected to an integrated circuit CI, allowing the establishment by the integrated circuit of near-field contactless communications with an external system. The antenna comprises several windings E1, E2 linked together by current-conducting means. Each winding has its ends connected to connection terminals of a circuit. The antenna then comprises, at the minimum, a winding E1 connected to the terminals for connection to the integrated circuit CI able to establish contactless communications with an external system, and a winding E2 connected to the terminals for connection to a peripheral component CP1, which can comprise one or more circuits connected in series, and which is powered remotely by the antenna. | 06-10-2010 |
20100113094 | TELEPHONE NETWORK SUBSCRIBER IDENTIFICATION CARD AND METHOD OF CONTROLLING AN ELECTRONIC DEVICE ADAPTED TO INTERACT WITH SUCH A CARD - A method of controlling an electronic device adapted to interact with a telephone network subscriber identification card includes the following steps:
| 05-06-2010 |
20100108756 | MICROCIRCUIT CARD, ELECTRONIC DEVICE ASSOCIATED WITH SUCH A CARD, AND METHOD OF CONTROLLING SUCH AN ELECTRONIC DEVICE - A microcircuit card includes elements for interacting with an electronic device, a movement or orientation sensor generating signals representing movements or an orientation of the card, elements for identifying at least one type of movement or position on the basis of the signals, and elements for sending a command executable by the electronic device and associated with the identified type. | 05-06-2010 |
20100105322 | METHOD AND DEVICE FOR CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION IN A SHORT RANGE WIRELESS COMMUNICATION MODULE OF A MOBILE PHONE - A method and device for controlling the execution of at least one function in a short-range wireless communication module of a mobile apparatus adapted for receiving at least one identification card. After transmitting an information request to the identification card, to obtain at least one piece of information characteristic of the identification card, an answer including at least one piece of information characteristic of the identification card is received therefrom. When the answer is identified and in response to the at least one piece of information, the at least one function is executed. An authentication request is received by the short-range wireless communication module. If the answer is authenticated, the short-range wireless communication module sends an authorization to the authentication request in response to the at least one piece of information characteristic of the identification card before the execution of the at least one function. | 04-29-2010 |
20100090805 | ELECTRONIC DEVICE AND MANAGEMENT OF COMPETING CONTACTLESS COMMUNICATION OF SUCH A DEVICE AND A HOST EQUIPMENT - An electronic device provided with RFID or NFC type short range contactless communication element, and a method of managing such element. The electronic device includes in particular a processing unit and first contactless communication element enabling the processing unit to communicate with a first external equipment, and includes in particular:
| 04-15-2010 |
20100088518 | Method of exchanging data such as cryptographic keys between a data processing system and an electronic entity such as a microcircuit card - A method of exchanging data between a data processing system and an electronic entity, characterized by the following steps:
| 04-08-2010 |
20100070655 | METHOD OF PASSING INSTRUCTIONS BETWEEN A HOST STATION AND A PORTABLE ELECTRONIC DEVICE, AND DEVICE FOR IMPLEMENTATION - The method includes in placing an instruction presence parameter in the “argument” field of a binary word defining a read/write command generated by generic management programs (drivers) for removable data storage units. This makes it possible to circumvent the limitation of the set of the commands authorized by a generic program for managing a removable data storage unit, without running the risk of data being interpreted wrongly as instructions. | 03-18-2010 |
20100064370 | METHOD AND DEVICE FOR PROTECTION OF A MICROCIRCUIT AGAINST ATTACKS - The method of protection of a microcircuit against an attack includes:
| 03-11-2010 |
20100058463 | METHOD OF EXCHANGING DATA BETWEEN TWO ELECTRONIC ENTITIES - A method of exchanging data between a first electronic entity and a second electronic entity includes the following steps:
| 03-04-2010 |
20100056047 | METHOD OF EXCHANGING DATA BETWEEN TWO ELECTRONIC ENTITIES - A method of exchanging data between a first electronic entity and a second electronic entity includes the following steps:
| 03-04-2010 |
20100038820 | METHOD OF FABRICATING AN ENTITY AND CORRESPONDING DEVICE - A method of fabricating an electronic entity includes the steps of: forming at least part of the entity by hardening a material ( | 02-18-2010 |
20100017881 | Portable Electronic Device and Method for Securing Such Device - The device of the invention includes: a first interface ( | 01-21-2010 |
20100005476 | MOBILE ELECTRONIC DEVICE INCLUDING A PORTABLE APPLICATION AND A SECURED MODULE ABLE TO COMMUNICATE WITH EACH OTHER, AND ASSOCIATED COMMUNICATION METHOD - An electronic device ( | 01-07-2010 |
20090187898 | METHOD FOR SECURELY UPDATING AN AUTORUN PROGRAM AND PORTABLE ELECTRONIC ENTITY EXECUTING IT - The method for updating an autorun program of a portable electronic entity includes:
| 07-23-2009 |
20090177716 | REMOVABLE STORAGE DEVICE AND ELECTRONIC APPARATUS THAT CAN BE CONNECTED TOGETHER AND METHOD FOR SAVING ENVIRONMENTAL DATA - A removable electronic storage device ( | 07-09-2009 |
20090134212 | SMART, TELEPHONE COMPRISING SUCH A CARD AND METHOD FOR EXECUTING A COMMAND IN SUCH A CARD - A smartcard ( | 05-28-2009 |
20090127345 | SMART CARD, TELEPHONE COMPRISING SUCH A CARD AND METHOD FOR EXECUTING A COMMAND IN SUCH A CARD - The present invention relates to a smart card ( | 05-21-2009 |
20090127333 | SMARTCARD, TELEPHONE COMPRISING SUCH A CARD AND METHOD FOR EXECUTING A COMMAND IN SUCH A CARD - A smartcard ( | 05-21-2009 |
20090125727 | METHOD FOR CRYPTOGRAPHIC PROCESSING OF A MESSAGE - A method for cryptographic processing of a message by a secret key includes the following steps:
| 05-14-2009 |
20090119364 | METHOD AND SYSTEM FOR EXCHANGE OF DATA BETWEEN REMOTE SERVERS - A method and a system for exchanging data between a first server ( | 05-07-2009 |
20090119214 | METHOD AND DEVICE FOR EXCHANGING VALUES BETWEEN PERSONAL PROTABLE ELECTRONIC ENTITIES - A method and a portable electronic device enables a debitor to transfer a monetary or other amount to a creditor, in particular via a near-field wireless communication module. After receiving information for authenticating the debitor via the communication module and after receiving data linked to the monetary or other amount, a transaction request including the data is created and sent. The transaction request is advantageously sent via a mobile telephone network or via a data communication network. | 05-07-2009 |
20090115614 | AUTHENTICATION OF AN ELECTRONIC TAG DURING ACCESS TO A SERVICE, ASSOCIATED METHODS AND SYSTEM - A method of authentication during access to a service for providing intangible goods, includes:
| 05-07-2009 |
20090106159 | PORTABLE ELECTRONIC DEVICE FOR EXCHANGING VALUES AND METHOD OF USING SUCH A DEVICE - The invention concerns a portable electronic transfer device using a near-field wireless communication module and a method of using it. The device includes an element for entering an amount and an acceptance command so that a debitor can enter their personal identification number on their portable device and not on that of a third party. If the acceptance command is authenticated, a secure message containing the amount is sent via the near-field wireless communication module to a creditor. The creditor can then add their references to the message and send it to effect the transaction. Alternatively, the creditor sends their references to the debitor via the near-field wireless communication module and the debitor can formulate a transaction request including the amount and the references of the creditor. | 04-23-2009 |
20090089858 | METHOD OF MANUFACTURING AN ELECTRONIC KEY WITH USB CONNECTOR - A method of manufacturing an electronic key with USB connector comprises the making of a key body | 04-02-2009 |
20090034717 | METHOD OF PROCESSING DATA PROTECTED AGAINST ATTACKS BY GENERATING ERRORS AND ASSOCIATED DEVICE - A data processing method comprises the following steps:
| 02-05-2009 |
20080301764 | PORTABLE ELECTRONIC ENTITY, HOST STATION AND ASSOCIATED METHOD - A host station includes:
| 12-04-2008 |
20080290160 | Contactless Electronic Microcircuit Document and Proximity Sensor - The document includes a support ( | 11-27-2008 |
20080289003 | Security Between Electronic Components of a Portable Secured Electronic Unit - A portable secured electronic unit includes at least two electronic components, one of which is embodied in the form of a primary electronic component and the second in the form of an interface electronic component, wherein the two electronic components are interconnected by communication elements and at least one electronic component includes security elements for securing the communication thereof the other electronic component. | 11-20-2008 |
20080277484 | Smart Card Producing Method and a Smart Card in Particular Provided with a Magnetic Antenna - A smart card comprises a magnetic antenna consisting of first ( | 11-13-2008 |
20080276456 | Method for Producing a Number of Chip Cards - A method for producing a number of chip cards includes a step for preparing a supporting film comprising a number of locations each of which constituting a card support and being provided with a cavity capable of receiving an integrated circuit, a step for processing this supporting film carried out, in part, by a multi-head tool, one of the heads of this tool being provided for carrying out an operation on a location of the film essentially at the same time as another head of this tool carries out the same operation on another location of this film, and a step for separating the locations after the processing step. | 11-13-2008 |
20080272519 | Method for Producing a Microcircuit Card - The invention relates to a method for producing a microcircuit card, comprising the following steps: a step for positioning a microcircuit in an open-cavity mould, and a step for depositing a material in the open cavity of the mould, the material being sufficiently poorly viscous for coating at least indirectly at least part of the microcircuit. | 11-06-2008 |
20080237357 | MICROPROCESSOR CARD - The microprocessor card includes a first microprocessor and a second microprocessor, the first microprocessor including elements for commanding the second microprocessor. In embodiments, the card includes electrical contacts adapted to carry command signals, these electrical contacts being connected exclusively to the first microprocessor. In embodiments, the first microprocessor includes elements for commanding the second microprocessor via commands conforming to the ISO 7816 standard. The first microprocessor uses a lower level of security than the second microprocessor. | 10-02-2008 |