INSIDE CONTACTLESS Patent applications |
Patent application number | Title | Published |
20110274271 | COUNTERMEASURE METHOD AND DEVICES FOR ASYMMETRIC ENCRYPTION - A countermeasure method in an electronic component implementing an asymmetric private key encryption algorithm includes generating a protection parameter, calculating, using a primitive, an intermediate data from the protection parameter, dividing the binary representation of the private key into several binary blocks, transforming each binary block using the protection parameter and, for each transformed binary block, performing an intermediate calculation using the primitive, and calculating an output data by combining the intermediate data with the intermediate calculations. | 11-10-2011 |
20110246789 | INTEGRATED CIRCUIT PROTECTED AGAINST HORIZONTAL SIDE CHANNEL ANALYSIS - An integrated circuit including a multiplication function configured to execute a multiplication operation of two binary words x and y including a plurality of basic multiplication steps of components xi of word x by components yj of word y is described. The multiplication function of the integrated circuit is configured to execute two successive multiplications by modifying, in a random or pseudo-random manner, an order in which the basic multiplication steps of components xi by components yj are executed. | 10-06-2011 |
20110246119 | PROCESS FOR TESTING THE RESISTANCE OF AN INTEGRATED CIRCUIT TO A SIDE CHANNEL ANALYSIS - A process for testing an integrated circuit includes collecting a set of points of a physical property while the integrated circuit is executing a multiplication, dividing the set of points into a plurality subsets of lateral points, calculating an estimation of the value of the physical property for each subset, and applying to the subset of lateral points a step of horizontal transversal statistical processing by using the estimations of the value of the physical property, to verify a hypothesis about the variables manipulated by the integrated circuit. | 10-06-2011 |
20110226853 | METHOD OF CONDUCTING A TRANSACTION USING AN NFC DEVICE - The invention relates to a method of conducting a transaction between an NFC device and a contactless integrated circuit of the passive reader type. The method includes providing, in the contactless integrated circuit, at least one reader application emulation program and, by an intermediary unit of the NFC device, establishing a communication with the contactless integrated circuit, receiving from the contactless integrated circuit reader application commands and transferring the commands to the first host processor, and receiving card application responses supplied by the first host processor and transferring the responses to the contactless integrated circuit. | 09-22-2011 |
20110170685 | COUNTERMEASURE METHOD AND DEVICES FOR ASYMMETRIC ENCRYPTION WITH SIGNATURE SCHEME - A countermeasure method in an electronic component implementing an asymmetric private key encryption algorithm includes generating a first output data, using a primitive, and a protection parameter, transforming, using the protection parameter, at least one element of a set consisting of the private key and an intermediate parameter obtained from the first output data, to respectively supply first and second operands, and generating, from an operation involving the first and second operands, a second output data. | 07-14-2011 |
20110138186 | METHOD OF CONTROLLING ACCESS TO A CONTACTLESS INTERFACE IN AN INTEGRATED CIRCUIT WITH TWO COMMUNICATION INTERFACES WITH CONTACT AND CONTACTLESS - A method of access control to a communication interface of an integrated circuit, includes intercepting an event transmitted between a communication interface and an application performed by the integrated circuit, and transmitting the intercepted event if a specific parameter of the application indicates that the application is authorized to use the communication interface. | 06-09-2011 |
20100287386 | SECURE INTEGRATED CIRCUIT COMPRISING MEANS FOR DISCLOSING COUNTERPART MASK VALUES - An integrated circuit includes a communication interface circuit, a cryptographic algorithm, a countermeasure configured to protect the cryptographic algorithm against side-channel attacks, and a mask generator configured to provide the countermeasure with mask values. The integrated circuit is configured to execute a specific command requiring the disclosure of mask values used by the countermeasures to protect the cryptographic algorithm during a cryptographic session, and, in response to such a command, to send the mask values through the communication interface circuit. | 11-11-2010 |
20100262840 | METHOD AND DEVICES FOR PROTECTING A MICROCIRCUIT FROM ATTACKS FOR OBTAINING SECRET DATA - A method of protecting a microcircuit against attacks aimed at discovering secret data used on the execution, by the microcircuit, of an encryption algorithm includes generating at least one protection parameter for the secret data and modifying the execution of the encryption algorithm through that protection parameter. Generation of the at least one protection parameter includes defining a function generating, by successively applying to at least one secret parameter which is stored in memory, a sequence of values which can only be determined from that secret parameter and that function, and to generate the protection parameter in a reproducible way from at least one value in that sequence. | 10-14-2010 |
20100253532 | Method of Locating an Emitting Handheld Device and Man/Machine Interface System Implementing Such a Method - A method of locating a handheld device emitting an electric field and/or magnetic field includes defining a reference area, arranging at least one electric field and/or magnetic field probe proximate to or inside the reference area, arranging the handheld device within the reference area, receiving from the probe a detection signal of the electric field and/or magnetic field emitted by the handheld device, and analyzing the detection signal supplied by the probe and determining therefrom the location of the handheld device within the reference area. Embodiments of the invention are applicable to the performance of an interactive action, which is initiated depending upon the location of the handheld device within the reference area. | 10-07-2010 |
20100240303 | PROCESS FOR ESTABLISHING A DATA LINK BETWEEN TWO PROCESSORS, SPECIFICALLY WITHIN AN NFC CHIPSET - A process for establishing a data link between a first processor configured to supply, upon a contact communication port, a first data carrying signal, and a second processor configured to supply, upon a contact communication port, a second data carrying signal is described. The process includes providing a first coupler and a second coupler, establishing a contactless coupling between the first and second couplers and, by the intermediary of the couplers and at least one RF signal, transferring the first data carrying signal to the second processor and transferring the second data carrying signal to the first processor. The second processor is, for example, a secure processor of a SIM card and the first processor is an NFC controller. | 09-23-2010 |
20100227553 | METHOD OF ROUTING INCOMING APPLICATION DATA IN AN NFC CHIPSET, FOR IDENTIFICATION OF THE APPLICATION - A method for routing incoming or outgoing application data in an NFC system includes an NFC interface circuit performing contactless data sending and receiving. The routing of incoming application data received by the interface circuit includes routing at least a first portion of the incoming application data to a destination point located in the NFC system and designated as arbitration point of incoming application data routing; analyzing by the arbitration point the first portion of the incoming application data to identify the application for which the data is sent to the NFC system; designating by the arbitration point a point of destination of the application data and application processing; and routing a second portion of the incoming application data to the destination and processing point. | 09-09-2010 |
20100178868 | Method and Device for Managing Application Data in an NFC System - A method for managing application data in an NFC system embedded or to be embedded in a portable object and including a contactless data sending/receiving interface, one or more host processors, and a data routing or transferring processor is described. The method includes generating internal application data in response to the occurrence of an internal event within the NFC system, and supplying the internal application data to a host processor of the NFC system. | 07-15-2010 |
20100178867 | Method and Device for Managing Application Data in an NFC System in Response to Contactless Data Sending or Receiving - A method for managing application data in an NFC system embedded or to be embedded in a portable object including a contactless data sending/receiving interface, one or more host processors and a data routing or transferring processor is described. The method includes generating complementary application data in response to the routing or transferring of external application data, and supplying the complementary application data to a host processor of the NFC system. | 07-15-2010 |
20100093412 | PROTECTIVE ENVELOPE FOR A HANDHELD ELECTRONIC DEVICE - A protective envelope for a handheld electronic device is shaped to cover at least 40% of a surface of the handheld device. The protective envelope includes at least a first housing having at least one first host processor or being suitable for receiving at least one first host processor, at least one main antenna, and an assembly for linking the host processor to the main antenna. | 04-15-2010 |
20100037322 | METHOD FOR SECURING A TRANSACTION PERFORMED WITH A PROGRAMMABLE PORTABLE DEVICE - A method for securing a transaction between a transaction device and an external device is described. The transaction device includes a communication controller, an application processor, and an input device. The method includes requiring the user to enter agreed transaction data via the input device, monitoring the transaction data designated to be sent to the external device or received from the external device, and preventing the transaction data designated to be sent from being sent to the external device if the transaction data designated to be sent is different from the agreed transaction data, or rejecting the received transaction data if the received transaction data is different from the agreed transaction data. | 02-11-2010 |
20090206984 | APPLICATION CONTROL METHOD IN AN NFC CHIPSET COMPRISING SEVERAL HOST PROCESSORS - A method for controlling the execution of an application in a system having a contactless data sending/receiving interface (CLINT) of NFC type, and host processors (HP | 08-20-2009 |
20090203313 | METHOD AND DEVICE FOR TRANSMITTING DATA BY CHARGE MODULATION - A contactless data transmission device includes an antenna circuit supplying an alternating voltage in the presence of an alternating excitation field, a charge modulation transistor having a control terminal receiving a charge modulation signal having at least one low state and one high state, and a conduction terminal receiving the alternating voltage. The device includes a circuit for supplying a boosted direct voltage greater than a peak value of the alternating voltage supplied by the antenna circuit, and a circuit for applying to the control terminal of the charge modulation transistor a charge modulation signal which, in the high state, has a voltage level equal to the boosted direct voltage. | 08-13-2009 |
20090173235 | BEVERAGE PRODUCTION MACHINE WITH FUNCTIONAL BLOCK AND SUPPORT BASE - A beverage production machine that includes a functional block including a beverage extraction module and a beverage delivery outlet, and a support base on which the functional block is arranged and which is designed to supply the functional block electrically, wherein at least the beverage delivery outlet is mounted free in rotation around a vertical axis relative to the support base. | 07-09-2009 |
20090103732 | Method of personalizing a NFC Chipset - The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a server identification data of a user memorized in a secure storage medium, personalization data corresponding to the user identification data, and identification data of a NFC system of the user, comprising an encryption key of the secure processor, encrypting by the server personalization data using the encryption key, transmitting to the NFC system encrypted personalization data, receiving by the secure processor encrypted personalization data, deciphering personalization data, and memorizing in a secured way personalization data by the secure processor. | 04-23-2009 |
20080219444 | Method for the secure loading in a NFC chipset of data allowing access to a service - A method for the secured loading of data into a first secured host processor of an NFC system comprising an NFC interface circuit for sending and receiving data, enabling a service to be accessed, the method comprising: generating a secret data, transmitting the secret data to the first host processor through a secured link, ciphering data to be loaded into the first host processor using a public key of the first host processor, and transmitting the ciphered data to the system for the first host processor which deciphers the data using a private key corresponding to the public key. | 09-11-2008 |