Compagnie Industrielle et Financiere D'Ingenierie Ingenico Patent applications |
Patent application number | Title | Published |
20140351904 | METHOD FOR PAIRING ELECTRONIC APPARATUSES - A method of pairing a first item of equipment, termed an initiating equipment desiring to transmit and receive data with a second item of equipment, termed an accepting equipment. The method includes: generating a pairing code; restoring, in the form of a first symbol, the paring code by the accepting equipment; acquiring the first symbol by the initiating equipment; and decoding the first symbol acquired delivering the pairing code. | 11-27-2014 |
20140321047 | POWER SUPPLY BASE FOR ELECTRONIC PAYMENT TERMINAL AND ELECTRONIC PAYMENT TERMINAL - A power supply base for a payment terminal is provided with a housing having an opening for receiving a memory card. The power supply base includes a guide for guiding the payment terminal towards a position wherein it can receive the power supply, the guide including at least one guiding part shaped in such a way as to enable the insertion thereof into the opening of the payment terminal. | 10-30-2014 |
20140108255 | Message Multiplexing Method, Device and Corresponding Program - A method is provided for multiplexing messages exchanged between a payment terminal and a communication terminal via a connection between the payment terminal and the communication terminal using the iPod Accessory Protocol, iAP. The method includes: an initialization step of initializing an external communication interface with the communication terminal, a first transmission step of transmitting, to the communication terminal, a request for creation of remote virtual channels via the external communication interface; a creation step of creating, within the payment terminal, local virtual channels corresponding to the remote virtual channels; and a second transmission step of transmitting data frames associated with the local virtual channels via the external communication interface. | 04-17-2014 |
20140105384 | CRYPTOGRAPHIC METHOD USING A NON-SUPERSINGULAR ELLIPTIC CURVE E IN CHARACTERISTIC 3 - A cryptographic method is provided of a type with public key over a non-supersingular elliptic curve E, determined by the simplified Weirstrass equation y | 04-17-2014 |
20140025849 | DYNAMIC PAIRING DEVICE - A system for dynamic pairing between a first peripheral, which can dialogue with a memory card, and a second peripheral, which is connected to a computer. The first peripheral is configured to read the data contained in the memory card, to receive via a first communication channel a first item of information emitted by the second peripheral, and to emit via a second communication channel a second item of information. The second peripheral is configured to emit via the first communication channel the first item of information and to receive via the second communication channel the second item of information. The value of this second item of information conditions the authorization to open a bidirectional communication channel between the first and the second peripherals. | 01-23-2014 |
20140021307 | In-Line Cable Strain Relief Device - A cable strain relief device is provided, which includes a plate having at least two lateral notches. The lateral notches provide a gripping area for a cable to connect. | 01-23-2014 |
20130327833 | DEVICE FOR HOLDING A MAGNETIC READING HEAD - A device is provided for supporting a magnetic reading head. The device includes a guide for guiding and cushioning the reading head. The guide is mounted between a base of the reading head and a bearing surface parallel to the base, and includes at least one part made of a material, the Young's modulus of which is greater than 200 N/mm2. | 12-12-2013 |
20130327832 | ELECTRONIC PAYMENT DEVICE - A payment device is provided, which is to be paired with a communication device in order to form an electronic payment terminal. The payment device includes an upper half-shell and a lower half-shell, which includes a surface for attaching a modular interface for pairing the communication device and which includes a longitudinally extending slot. The lower half-shell further includes, within the slot, an opening which enables a magnetic reading head to pass therethrough. Beneath the attachment surface, an electronic circuit card is arranged laterally relative to the magnetic reading head such that the electronic circuit card prevents the insertion of a fraudulent device into the payment device. | 12-12-2013 |
20130321302 | DEVICE FOR KEYING IN DATA IN BRAILLE, CORRESPONDING METHOD AND COMPUTER PROGRAM PRODUCT - A device is provided for logging data in Braille. The device includes a touch-sensitive surface and is configured to detect a plurality of pressures on the touch-sensitive surface, wherein the plurality of pressures form a Braille character, construct an image formed from the points associated with the plurality of pressures; and recognize the Braille character based on an analysis of the image. | 12-05-2013 |
20130270345 | PROTECTION DEVICE, ELECTRONIC PAYMENT TERMINAL AND MAGNETIC READING HEAD CORRESPONDING THERETO - A protection device is provided, which includes a detection circuit for detecting a short-circuit between at least two output branches of a magnetic reading head. Each of the output branches is able to convey a signal read by the reading head on a track of a magnetic card and the detection circuit is able to detect a short-circuit during the reading of at least one track of a magnetic card. | 10-17-2013 |
20130262299 | ELECTRONIC PAYMENT DEVICE ABLE TO RECEIVE AND HOLD A PORTABLE TELEPHONE - An electronic payment device is provided, which includes a chip card reader. The device has a housing able to receive and hold a portable telephone, a connector for connection with the portable telephone, and a data processor able to receive information relating to a payment and to exchange data with a remote server via a telephone communication implemented by said portable telephone. | 10-03-2013 |
20130201106 | METHOD FOR CONTROLLING ACTIONS BY USE OF A TOUCH SCREEN - A method for controlling a pointer having a position determined by the position of at least one end of a member on a touch screen. An offset is inserted between the position of the pointer and that of the end of the member for driving movements of the pointer such that the end does not have to cover an object displayed on the screen in order to effectively select the object. | 08-08-2013 |
20130161086 | Device for Protecting an Electronic Printed Circuit Board - A device is provided for protecting an electronic printed circuit board. The device includes at least one zone of conductive contact between the printed circuit board and an element for securing the printed circuit board. The device also includes at least one elevating pad for elevating the at least one zone of conductive contact. The element for securing comes into contact with the zone of conductive contact of the printed circuit board by means of a zone of conductive contact of the elevating pad. | 06-27-2013 |
20130135238 | PORTABLE DEVICE COMPRISING A TOUCH SCREEN AND CORRESPONDING METHOD OF USE - A portable device is provided, which includes a touch screen and at least one area bearing reference information, referred to as a reference area, which can be identified by detecting a variation in the surface state on the device. | 05-30-2013 |
20130040606 | METHOD OF BIOMETRIC AUTHENTICATION, CORRESPONDING AUTHENTICATION SYSTEM AND PROGRAM - A method and apparatus are provided for biometric authentication of a user to be authenticated, from among a plurality of users, with an authentication system storing a set of pieces of reference biometric data, each associated with one of the users. The method includes providing, by the user to be authenticated, a piece of biometric authentication data by a device for obtaining biometric data from a transactional terminal. A subset of the set of pieces of reference biometric data stored by the authentication system is searched for a piece of reference biometric data corresponding to the user to be authenticated as a function of the piece of biometric authentication data. The step of searching includes filtering the pieces of reference biometric data as a function of: a base station of a mobile communications network; and a set of mobile devices for which a connection indicator is activated for the base station. The transactional terminal is substantially near a zone of coverage of the base station. | 02-14-2013 |
20120207393 | METHOD FOR THE ELECTRONIC AUTHENTICATING OF A HANDWRITTEN SIGNATURE, CORRESPONDING MODULE AND COMPUTER PROGRAM - A method and apparatus are provided for electronically authenticating a handwritten signature of a user, entered on a writing surface via a writing instrument. The method includes acquiring, by the writing surface, at least one instant during the entering of the signature, of at least one piece of data representing the altitude z of the writing instrument relative to the writing surface, in an area of proximity to the writing surface; and authenticating the entered handwritten signature by taking account of at least the altitude z. | 08-16-2012 |
20120065908 | PROTECTION DEVICE, CORRESPONDING METHOD AND COMPUTER SOFTWARE PROGRAM - A device is provided for protecting an electronic payment terminal. The device includes at least one capacitive detector placed between a lower mechanical supporting element of a keypad of the terminal and an upper mechanical supporting element of the keypad of the terminal. The at least one detector is configured to deliver a reference capacitance. A capacitive measurement microprocessor is electrically connected to the at least one capacitive detector and configured to detect a variation of capacitance of the at least one capacitive measurement support. A transmitter is configured for transmitting a piece of information representing the capacitive variation, when an absolute value of a difference between the measured capacitance and the reference capacitance exceeds a predetermined threshold. The capacitive detector is conformed so that it extends between holes of the lower mechanical supporting element. | 03-15-2012 |
20120063046 | DEVICE FOR PROTECTING AN ELECTRONIC PRINTED CIRCUIT BOARD - A device is provided for protecting an electronic printed circuit board, which includes at least two layers. The device includes on a layer, at least one conductive part uniformly spread on an insulator layer, the entirety comprising the conductive part and the insulator layer forming a capacitive support presenting a uniform electrical field. The capacitive support is placed roughly on the whole surface of one of the layers of the multi-layered electronic printed circuit board. The capacitive support is configured to deliver a reference capacitance. A capacitive measurement microprocessor detects a variation in capacitance. A transmitter is configured for transmitting a piece of information representing the variation in capacitance when an absolute value of a difference between the measured capacitance and the reference capacitance exceeds a predetermined threshold. | 03-15-2012 |
20120062252 | PROTECTION DEVICE, CORRESPONDING METHOD AND COMPUTER SOFTWARE PRODUCT - A device is provided for protecting an electronic payment terminal, which includes at least one printed circuit and one casing. The device includes at least one capacitive detector having a first part electrically connected to the printed circuit and a second part mounted within the casing of the electronic payment terminal without being electrically connected to the first part. The at least one capacitive detector is configured to deliver a reference capacitance when it is mounted in the electronic payment terminal. The device also includes a capacitive measurement microprocessor electrically connected to the at least one capacitive detector and configured to detect a variation in capacitance of the at least one capacitive detector. The device includes a transmitter for transmitting a piece of information representing the variation in capacitance when an absolute value of a difference between the measured capacitance and the reference capacitance exceeds a predetermined threshold. | 03-15-2012 |
20120062241 | DEVICE FOR PROTECTING A CONNECTOR AND A COMMUNICATIONS WIRE OF A MEMORY CARD READER - A device is provided for protecting an electronic payment terminal that includes an electronic printed circuit board and a casing. The device includes at least one capacitive detector in a volume formed by a first ground plane of the printed circuit and a second ground plane positioned on an internal surface of the casing, the at least one capacitive detector being configured to deliver a reference capacitance. A capacitive measurement microprocessor detects a variation of capacitance of the at least one capacitive detector. A transmitter transmits the variation when an absolute value of a difference between the reference capacitance and the measured capacitance exceeds a predetermined threshold. | 03-15-2012 |
20110238513 | METHOD AND SYSTEM FOR VALIDATING A TRANSACTION, CORRESPONDING TRANSACTIONAL TERMINAL AND PROGRAM - A method and apparatus are provided for validating a transaction on a transactional terminal, the transaction being associated with a user. The method includes a step of decoding a validation code preliminarily generated and displayed by the transactional terminal, entered by the user in a validation message, and transmitted by a mobile device of the user to an entity of a telecommunications network to which the mobile device and said transactional terminal are connected. | 09-29-2011 |
20110214000 | METHOD FOR REDUCING THE ENERGY CONSUMPTION OF AN ELECTRONIC TERMINAL, CORRESPONDING TERMINAL AND COMPUTER PROGRAM - A method and apparatus are provided for reducing the energy consumption of an electronic terminal. The method implements a step of modifying the timeout-before-standby duration for said terminal after an action performed by and/or on said terminal at a current instant, depending on the membership of the current instant in a given temporal category, from among at least two predefined temporal categories. | 09-01-2011 |
20110192903 | MAGNETIC READ DEVICE - A magnetic read device including: a magnetic read head including a first conductive winding; and a second conductive winding connected in phase opposition to the first winding. | 08-11-2011 |
20110064216 | CRYPTOGRAPHIC MESSAGE SIGNATURE METHOD HAVING STRENGTHENED SECURITY, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING DEVICES AND COMPUTER PROGRAM PRODUCTS - A cryptographic message signature method are provided, which have strengthened security. The method implements two sets of signature algorithms SA | 03-17-2011 |
20100265681 | Memory Card Reader - A memory card reader is provided, which includes a printed circuit on which a memory card connector is mounted. The memory card connector has a slot intended for inserting a memory card and a set of contact points enabling data exchange between the memory card and a processor mounted on the printed circuit. The printed circuit is further equipped with an anti-intrusion device formed and positioned such that the anti-intrusion device prevents access, from the exterior of the reader, to at least one connection portion between at least one of the contact points of the set of contact points and the printed circuit. | 10-21-2010 |
20100211929 | DISPLAY METHOD, CORRESPONDING COMPUTER PROGRAM AND DEVICE - A method is provided for displaying the properties of a source code element of a computer program being edited. The includes selecting, within the source code, the source code element; searching, within the source code, a set of related code elements of the selected source code element, the elements of the set comprising typified properties; creating a data structure comprising the properties of the code elements of the set of code elements; grouping, within the data structure, the properties in function of their types; displaying the properties grouped within a portion of a display displaying the source code. | 08-19-2010 |
20100198725 | METHOD FOR SECURING TRANSACTIONS, TRANSACTION DEVICE, BANK SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAMS - A method for securing a transaction by an electronic card paired with at least one mobile terminal, wherein a banking organization in charge of managing transactions involving the card has previously recorded an identifier of the mobile terminal among data relating to the owner of the card. The securing method includes: transmission, by the mobile terminal, of at least one first signal including a message containing the identifier; receipt, by at least one transaction device near the mobile terminal, of the first signal; transmission, by the transaction device, of a second signal including at least the message to at least one remote banking organization; assignment, by a control server of the banking organization, to a transaction involving the electronic card, by a control server of the banking organization, of information representing proximity between the electronic card and the mobile terminal, according to the second signal received by the banking organization. | 08-05-2010 |
20100185953 | METHOD FOR SECURING AN INTERFACE BETWEEN A USER AND AN APPLICATION, CORRESPONDING SYSTEM, TERMINAL AND COMPUTER PROGRAM PRODUCT - An interface securing method between a user and a non certified application running on an electronic device and providing at least one view to be rendered on a screen, and a view comprising or associated to at least one interface control component. The method implements, prior to rendering a view: analysis of the interface control components of the view, so as to detect at least one interface control component that could pose a security problem, called a suspicious component; and if at least one suspicious component is detected, restriction or invalidation of the functions of at least one input control component, distinct from the at least one suspicious component and able to allow the information to be provided by the user to the application. | 07-22-2010 |
20100185535 | METHOD FOR ASSISTING IN THE CHECKING OF TRANSACTION RECORDS, TRANSACTION DEVICE, SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAMS - A method and apparatus are provided for assisting in checking accuracy of bank transaction records edited in a bank statement and performed by at least one transaction device. The method includes, for at least one of the transactions: emission, by the transaction device, of at least one first signal including a message relating to the transaction; receipt, by at least one mobile terminal, of the at least one first signal; transmission, by the mobile terminal, of a second signal including at least the message, to at least one banking organization; association, by a server of the banking organization in charge of the transaction, of the message with at least one datum relating to the transaction, and marking of the transaction as a pre-checked transaction. | 07-22-2010 |
20090230180 | TERMINAL, METHOD OF CHECKING CONFORMITY OF AT LEAST ONE REMOVABLE BATTERY OF AN ELECTRONIC PAYMENT TERMINAL, AND THE CORRESPONDING REMOVABLE BATTERY AND COMPUTER PROGRAM PRODUCT - A portable electronic payment terminal is provided, which includes at least one removable battery. The removable battery carries an electronic chip containing at least one item of identification information and is able to communicate with a contactless reading device present in the terminal. The terminal further includes: a transmitter for transmitting the identification information to a distant control server of the terminal manufacturer; and a receiver for receiving from the server conformity or non-conformity information according to whether the identification information belongs to a list approved by the manufacturer. | 09-17-2009 |
20090207021 | TRACEABILITY METHOD FOR AN ELECTRONIC PAYMENT TERMINAL IN THE EVENT OF A THEFT THEREOF, AND CORRESPONDING COMPUTER PROGRAM - A traceability method is provided for an electronic payment terminal, in the event of a theft thereof. The method includes the following steps: detection of a lack of contact with a base and/or another terminal associated with the terminal, for a predetermined time span, generating a passage of the terminal into a stolen state; and in the stolen state, storage, in a secure memory area of the terminal, of a series of successive tracking data each associated with time stamp information, so as to enable reconstruction of a route followed by the terminal. | 08-20-2009 |
20090204952 | METHOD OF SECURING A COMPUTER PROGRAM. AND CORRESPONDING DEVICE, METHOD OF UPDATING AND UPDATE SERVER - A method for securing use of a primary computer program driving at least one data receiving and delivery device. The method implements a secondary computer checking program, different from the primary program and capable of delivering the same output data as at least a portion of the primary program, referred to as the critical portion, in the presence of identical input data. The following steps are performed when at least one of the critical portions of the primary program is activated: executing the critical portion, delivering first output data based on input data; executing the checking program, delivering second output data based on the input data; comparing the first and second output data and generating anomaly information, if the first and second output data are different; transmitting the anomaly information to a remote server; and continuing the primary program, based on the first and second output data. | 08-13-2009 |
20090200372 | METHOD FOR AUTHENTICATING MICRO-PROCESSOR CARDS, CORRESPONDING MICRO-PROCESSOR CARD, CARD READER TERMINAL AND PROGRAMS - A method is provided for authenticating micro-processor cards to determine whether a card is a genuine card or a fake card. Authentication is performed by a checking program of at least one card reader terminal. The program sends to each card commands belonging to a standard and public set of commands. The method includes: modifying the checking program in the terminal or terminals, in such a way that the program additionally sends, to each card to be authenticated, at least one additional command, called a secret command, from a set of at least one additional command, pre-inserted into each genuine card, and different from the standard and public set of commands; and a step of detecting authenticity of the card, if the secret command is recognised and/or processed correctly, or the presence of a clone, if the secret command is not recognised and/or is processed wrongly. | 08-13-2009 |
20090172268 | METHOD FOR SECURING A MICROPROCESSOR, CORRESPONDING COMPUTER PROGRAM AND DEVICE - A method is provided for securing a microprocessor containing at least one main program, which operates with at least one memory. The method includes implementing counter-measures, during which additional operations, that are not required for the main program, are implemented so as to modify the consumption of current and/or the processing time of the microprocessor. The method also includes: identification of at least one address or one memory zone of the memory(ies), called critical addresses, and which contain, or which may contain, critical data for said main program; monitoring the addressing ports of the memory(ies), so as to detect the access to the critical address(es); and activation of the step of implementing counter-measures, when an access to the critical address(es) is detected. | 07-02-2009 |
20090151010 | TERMINAL THEFT PROTECTION PROCESS, AND CORRESPONDING SYSTEM, TERMINAL AND COMPUTER PROGRAM - A process is provided for protection against theft of electronic payment terminals utilized in a group including at least two electronic payment terminals organized as a network. The process includes the following steps: mutual detection of the presence of each of the terminals of the group; and transmission of absence information if at least one of the terminals is not detected. | 06-11-2009 |
20090100269 | BIOMETRIC AUTHENTICATION METHOD, COMPUTER PROGRAM, AUTHENTICATION SERVER, CORRESPONDING TERMINAL AND PORTABLE OBJECT - A biometric authentication method and apparatus are provided. A user to be authenticated uses a portable object including at least one biometric sensor. The portable object is adapted to cooperate with a terminal. The method includes: capturing, by the portable object, a biometric sample to be compared coming from the user to be authenticated; transmitting, by the portable object, the biometric sample, in a secure form to an authentication server; and determining, by the authentication server, a signature to be authenticated using said biometric sample, then comparing the signature with a reference signature. | 04-16-2009 |
20090100240 | AUTHENTICATION METHOD, CORRESPONDING PORTABLE OBJECT AND COMPUTER SOFTWARE PROGRAM - A method is provided for authenticating a carrier of a portable object having a memory for memorising at least one item of secret information. The method includes: authentication processing of a signature provided by said carrier, taking account of said secret information; supplying an item of information for the authentication decision, positive or negative, implementing, in a non volatile memory of said portable object, an incorrect signature indicator which may adopt a value indicating a normal situation and at least one value indicating an abnormal situation. The step of implementing including: after said information supplying step, writing, in said incorrect signature indicator, a value indicating an abnormal situation, if said authentication decision is negative; and before said authentication step, and if said incorrect signature indicator contains a value indicating an abnormal situation, a step generating a delay. The writing step also includes memorising at least one item of context-related information. | 04-16-2009 |
20090097714 | BIOMETRIC AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, CORRESPONDING PROGRAM AND TERMINAL - A biometric authentication method if provided for an individual to be authenticated amongst a very large quantity of individuals with an authentication system storing a set of reference information each associated to one of the individuals. The reference information is distributed across a plurality of sub-databases. The method includes a phase of adding reference information representative of a new individual, including selecting the sub-database that is best adapted to store the reference information to be added. A phase of authentication includes: provision by the individual of authentication biometric information and of an identifier forming addressing information, designating at least one of said sub-databases likely to contain the reference information representative of said individual; and searching amongst the reference information stored by the authentication system, of reference information corresponding to the individual, the searching being carried out on a subset of said set of reference information, identified by the addressing information. | 04-16-2009 |
20090095809 | METHOD OF TRANSMITTING A SECRET CODE, CARD READING TERMINAL, MANAGEMENT SERVER AND CORRESPONDING COMPUTER SOFTWARE PROGRAMMES - A method and apparatus are provided for transmitting a secret code of a new microprocessor card held by a user. The method includes: insertion by the user of the new card into a card reading terminal; sending a request to obtain the secret code by the card reading terminal to a management server; and transmission by the management server, via a communication network, of the secret code or of an item of information permitting the secret code to be obtained, to a communication terminal of the user. | 04-16-2009 |
20090049527 | METHOD AND SYSTEM FOR EXCHANGING DATA RESERVED FOR A USER - A method is provided to exchange data reserved for a user or a group of users with personal equipment. The method includes a step of short-distance communication of the data, for example of the NFC type, between the personal equipment and a secure terminal determined by an identification of the user and by a detection of the personal equipment in the vicinity of the secure terminal. The secure terminal preferably obtains the data from an integrated source by a secure end-to-end connection. | 02-19-2009 |
20080316357 | SECURE DISPLAY METHOD AND DEVICE - A secure display device is designed to display on a screen a first set of information edited by an open operating system. A secure operating system resident in a dedicated circuit edits a second set of information. A filter allocates, independently of the open operating system, a first zone of the screen to the first set of information and a second zone of the screen to the second set of information. The zones and can have a non-zero intersection and any value. A real video memory is used for transferring the two sets of information to the screen under the sole control of the secure operating system so as to produce a secure display of the second set of information. | 12-25-2008 |
20080257954 | PAYMENT TERMINAL, AND ASSOCIATED METHOD AND PROGRAM - An electronic payment terminal includes a data entry device, a processor and a memory. The memory contains a structure arranged to list at least one customer identifier, a personal identification number and an amount, all associated. The memory also contains a program having comprising instructions for storing, in an example of the structure after entry, the customer identifier and the personal identification number. The same example of the structure is then updated locally by payments out and in made on the terminal on behalf of the customer identified. | 10-23-2008 |
20080222193 | COMPUTER-IMPLEMENTED METHOD AND EXECUTABLE PROGRAM FOR UPDATING REFERENCE DATA - A computer-implemented method is provided for updating reference data. The method includes a step of providing update data structured according to a given data structure. The data structure has at least two streams of data, wherein one of the streams includes patterns of instructions to a processor, and at least one other stream includes patterns of operands of the instructions. The operands and the instructions are designed for updating the reference data upon processing the update data at a processor. Also, a computer executable program code is provided, which is stored in a computer readable medium or in a signal, suitable for implementation of the method. Further, a terminal (e.g. a payment terminal or electronic funds transfer at point of sale) is provided, which includes a memory with the program code stored thereon. | 09-11-2008 |
20080218347 | SECURING METHOD AND MOBILE DEVICE THUS SECURED - A method and apparatus are provided for securing a mobile digital processing device. The method includes: a protective step that is self-activated when the mobile device measures an evolutionary value approaching a threshold value and wherein the mobile device executes a protective action; and includes a step of self-setting the evolutionary value when the mobile device and a holder associated therewith are detected in a common vicinity. The evolutionary value is positioned at a value remote from the threshold value, so as to allow the evolutionary value to approach the threshold value naturally, when the mobile device and the holder are no longer detected in a common vicinity. | 09-11-2008 |