INSIDE SECURE Patent applications |
Patent application number | Title | Published |
20150339102 | Cryptography Method Comprising an Operation of Multiplication by a Scalar or an Exponentiation - A cryptographic data processing method, implemented in an electronic device including a processor, the method including steps of providing a point of an elliptic curve in a Galois field, and a whole number, and of calculating a scalar product of the point by the number, the coordinates of the point and the number having a size greater than the size of words that may be processed directly by the processor, the scalar multiplication of the point by the number including steps of: storing scalar multiples of the point multiplied-by the number 2 raised to a power belonging to a series of whole numbers, setting a resulting point for each non-zero bit of the first number, adding the resulting point and one of the stored multiple points, and providing at the output of the processor the resulting point as result of the scalar product. | 11-26-2015 |
20150280787 | NFC DEVICE COMPRISING CONFIGURABLE NOTIFICATION MEANS - The present invention relates to a near field communication device configured to establish a near field communication channel with an external device, and provide a first host processor with application data sent by the external device. The device is configured to provide a second host processor with notifications relating to the nature or content of application data provided to the first host processor, and configure the notifications according to a characteristic parameter of an application in the framework of which the external device sends data to the first host processor. | 10-01-2015 |
20150082435 | CYCLIC REDUNDANCY CHECK METHOD WITH PROTECTION FROM SIDE-CHANNEL ATTACKS - The present invention relates to a method for processing a binary data item, comprising a step of calculating a cyclic redundancy check code for the data item by means of a generator polynomial, wherein the step of calculating the cyclic redundancy check code comprises the steps of: masking the data item with a random binary mask that is a multiple of the generator polynomial, and generating the cyclic redundancy check code for the data item from the masked data item. | 03-19-2015 |
20140378051 | COMMUNICATION METHOD BETWEEN A DUAL INTERFACE NFC CARD INSERTED INTO AN NFC TERMINAL, AND AN NFC DEVICE - The present invention relates to a contactless communication method between an NFC card with a contact and contactless dual interface, installed in a communication terminal, and an external NFC device, the terminal including an NFC module coupled to the contact interface of the card and including a contactless communication interface, the method including the steps of: selecting one or the other of the contact and contactless interfaces of the card, transmitting signals between the card and the NFC device through the selected interface, and if the contact interface of the card is selected, through the contactless interface of the NFC module, and detecting by the card the presence of the NFC module connected to its contact interface, the selection of one or the other of the contact and contactless interfaces of the card being performed by the card depending on the result of the detection of the NFC module presence. | 12-25-2014 |
20140244993 | METHOD OF UPDATING THE OPERATING SYSTEM OF A SECURE MICROCIRCUIT - A method of loading an operating program in a secure microcircuit, includes the steps of: downloading and installing in the microcircuit a boot program, which is launched upon activation of the microcircuit, loading into the microcircuit initialization data including a first public key, performing a mutual authentication procedure between the microcircuit and a first server having a private key corresponding to the first public key, and if the mutual authentication is successful, loading from the first server operating program profile data holding a second public key, performing a mutual authentication procedure between the microcircuit and a second server having a private key corresponding to the second public key, and if the mutual authentication is successful, loading an operating program from the second server and installing it in the microcircuit, and activating the operating program when it is in the microcircuit. | 08-28-2014 |
20140149559 | VIRTUAL PRIVATE NETWORK (VPN) SYSTEM UTILIZING CONFIGURATION MESSAGE INCLUDING VPN CHARACTER CONFIGURATION STRING - A virtual private network (VPN) system may include a VPN server configured to generate a configuration message comprising a VPN character configuration string, and a VPN client device configured to receive the configuration message and initiate a VPN connection with the VPN server over a communications network based upon the VPN character configuration string. The VPN server may be configured to provide the configuration message to the VPN client device in a non-human-readable form, and the VPN client device may be configured to initiate the VPN connection without user entry of VPN configuration data. | 05-29-2014 |
20140075582 | METHOD FOR PLAYING DIGITAL CONTENTS PROTECTED WITH A DRM (DIGITAL RIGHTS MANAGEMENT) SCHEME AND CORRESPONDING SYSTEM - The method and system are for playing digital contents protected by a DRM scheme, wherein the digital contents are stored in a server and downloaded or streamed to a user device. The approach includes executing a DRM application inside the user device implementing a proxy between the server and a native player of the user device, and connecting the DRM proxy application to the server, selecting a digital content to be downloaded and retrieving a corresponding remote playlist. Also, the approach includes transforming the remote playlist into a local playlist having a format readable from the native player and executing a plurality of local packets of the local playlist inside the native player. | 03-13-2014 |
20140068693 | METHOD, SYSTEM, OR USER DEVICE FOR ADAPTIVE BANDWIDTH CONTROL OF PROXY MULTIMEDIA SERVER - The approach is for controlling a data rate of proxy server of a user device that includes a multimedia player, and a proxy server adapted to communicate with the multimedia player. The proxy server also communicates with a multimedia server. The approach includes receiving a request for a multimedia content from the multimedia player, requesting the multimedia content to the multimedia server, receiving a plurality of packets for the multimedia content from the multimedia server, estimating a data rate between the user device and the multimedia server, and sending a data stream for the multimedia content to the multimedia player based on the estimated data rate. | 03-06-2014 |
20140068264 | SYSTEM AND METHOD FOR PROTECTING DIGITAL CONTENTS WITH DIGITAL RIGHTS MANAGEMENT (DRM) - An approach for protecting digital contents includes a content delivery phase wherein a client stores digital contents or retrieves them in streaming, transmits to a user device the digital content in a protected format along with an enabling code for enabling the user device to access or read the protected digital content. The approach includes a key generation phase in a DRM (Digital Right Management) server which derives at least one key for encrypting the digital contents. A key transmission phase involves the derived key being transmitted from the DRM server to the client. For decrypting the digital content, the user device requests the key from the DRM server, with the request including a key identification defined by the enabling code transmitted by the client to the user device which is used by the DRM server to derive the key for the user device. | 03-06-2014 |
20130288599 | METHOD AND DEVICE FOR MODULATING AN ACTIVE LOAD WITH DAMPING OF AUTO OSCILLATION - A method for sending data by inductive coupling includes: extracting an antenna signal from an antenna circuit, extracting from the antenna signal a first periodic signal, producing a second periodic signal by way of a synchronous oscillator, placing the oscillator in a free oscillation mode and applying to the antenna circuit the second periodic signal, modifying the impedance of the antenna circuit, restoring the amplitude of the antenna signal, then resynchronizing the oscillator on the first periodic signal. | 10-31-2013 |
20130283393 | METHOD FOR PLAYING DIGITAL CONTENTS PROTECTED WITH A DRM (DIGITAL RIGHT MANAGEMENT) SCHEME AND CORRESPONDING SYSTEM - A method for playing DRM-protected contents, the protected contents being downloaded by a user device from a media server in the form of protected segments, comprises executing a DRM proxy inside the user device, the DRM proxy interfacing the media server and a player configured to implement the HLS protocol; executing an HLS server in the DRM proxy; registering the DRM proxy to handle HTTP requests; producing by the DRM proxy a playlist in HLS format including a list of URLs locating the individual protected segments on the user device; processing the playlist in the player; in the DRM proxy, acquiring a license to access the protected segment identified by the URL of a current request; decrypting the protected segment in the DRM proxy based on the license; and returning a segment based on the decrypted segment to the player in response to the current URL request. | 10-24-2013 |
20130282570 | METHOD AND SYSTEM FOR NFC TRANSACTION - A method for performing a transaction between a portable device and a transaction terminal includes establishing a communication channel between the portable device and the transaction terminal; establishing a first data link between the transaction terminal and the transaction server; and using an application program in the transaction server to perform the transaction with the transaction terminal through the data link, on behalf of the portable device. | 10-24-2013 |
20130212407 | METHOD FOR MANAGING MEMORY SPACE IN A SECURE NON-VOLATILE MEMORY OF A SECURE ELEMENT - The invention relates to a method for managing non-volatile memory space in a secure processor comprising a secure non-volatile internal memory, the method comprising steps of: selecting data elements to remove from the internal memory, generating, by the secure processor, a data block comprising the selected data elements, and a signature computed from the selected data elements using a secret key generated by the secure processor, transmitting the data block by the secure processor, and storing the transmitted data block in an external memory. | 08-15-2013 |
20130183897 | APPARATUS COMPRISING INDUCTIVE COUPLING COMMUNICATION MEANS - An apparatus including inductive coupling communication circuitry configured to communicate in peer-to-peer mode with an identical apparatus includes an antenna coil presenting, relative to a longitudinal median or a transversal median axis of the antenna coil, an asymmetry corresponding to a coverage rate less than or equal to 0.6 if the antenna coil comprises 4 or more loops, less than or equal to 0.7 if the antenna coil comprises 3 loops, or less than or equal to 0.8 if the antenna coil comprises 1 or 2 loops. | 07-18-2013 |
20130181875 | NFC ANTENNA WITH INTERLEAVED COILS - An antenna circuit for near-field communications includes a planar active winding, connected between a first and a second access terminal; an auxiliary winding coplanar with the active winding and connected by a first end to the first access terminal; and a tuning capacitor connected to the second end of the auxiliary winding. The turns of the active and auxiliary windings are interleaved. | 07-18-2013 |
20130055025 | MICROPROCESSOR PROTECTED AGAINST MEMORY DUMP - A microprocessor including a memory and a central processing unit configured to sign a binary word written in the memory, and during the reading of a binary word in the memory, verify the signature of the binary word and, if the signature is invalid, launching a protective action of the memory. According to the invention, the central processing unit is configured to execute a write instruction of a binary word accompanied by an invalid signature in a memory zone, so that a later read of the memory zone by the central processing unit launches the protective action. | 02-28-2013 |
20130021106 | CLOCK FREQUENCY ADJUSTING METHOD AND CIRCUIT - A method for adjusting an oscillator clock frequency, comprising: providing a first oscillator, applying a first setpoint value to the first oscillator, determining a first oscillator frequency value within a first time frame, providing a second oscillator, applying a second setpoint value to the second oscillator, determining a second oscillator frequency value within a second time frame, determining a new frequency setpoint value from the first and second frequency values, the first and second setpoint values, and a desired frequency value, and applying the new frequency setpoint value to one of the first and second oscillators. | 01-24-2013 |
20120322500 | CONTACTLESS INTEGRATED CIRCUIT HAVING NFC AND UHF OPERATING MODES - A contactless integrated circuit includes modulation and demodulation circuits configured to connect to an HF antenna circuit to emit and receive HF signals by inductive coupling in a reader mode, modulation and demodulation circuits configured to connect to a UHF antenna to emit and receive UHF signals by electric coupling in a reader mode, a data processing circuit connected to the modulation and demodulation circuits, and configured to provide data to be emitted to the modulation circuits, and to process received signals, transmitted by the demodulation circuits, the demodulation circuits including a common demodulation circuit to equally process signals received by the UHF and HF antennas. | 12-20-2012 |
20120265797 | MONTGOMERY MULTIPLICATION METHOD - Disclosed is a method of modular multiplication of two L-bit numbers (X, Y), the result defined from XY+mM, where M is the modulo, of L bits, and m is a number of L bits found and is divisible by 2 | 10-18-2012 |
20120265794 | MONTGOMERY MULTIPLICATION CIRCUIT - A circuit for calculating a sum of products, each product having a q-bit binary operand and a k-bit binary operand, where k is a multiple of q,includes a q-input carry-save adder (CSA); a multiplexer ( | 10-18-2012 |
20120221618 | ENCRYPTION METHOD COMPRISING AN EXPONENTIATION OPERATION - A method and a device protected against hidden channel attacks includes a calculation of the result of the exponentiation of a data m by an exponent d. The method and the device are configured to execute only multiplications of identical large variables, by breaking down any multiplication of different large variables x, y into a combination of multiplications of identical large variables. | 08-30-2012 |
20120199948 | SEMICONDUCTOR CHIP COMPRISING PROTECTION MEANS AGAINST A PHYSICAL ATTACK - A semiconductor chip includes a semiconductor substrate, an integrated circuit region having an integrated circuit, and conductive lines extending above the integrated circuit region. To protect the semiconductor chip against a physical attack, the semiconductor chip includes an array of protection capacitors extending above the conductive lines, at least first and second interconnection conductive lines, arranged to interconnect the protection capacitors in parallel, and a cprotection circuit configured to prevent at least some data from circulating on at least some conductive lines, when a short occurs in at least one protection capacitor. | 08-09-2012 |
20120129571 | RADIO COMMUNICATION DEVICE COMPRISING A UHF TAG READER - A device includes a radio transceiver equipped with a UHF antenna, a clock generator associated with the radio transceiver, a processor configured to periodically connect to the radiotelephony network by way of the radio transceiver, and a UHF tag reader configured to conduct a transaction with a UHF tag only outside periods of connection of the processor to the radiotelephony network. The device is particularly directed for use in mobile telephones. | 05-24-2012 |
20120123945 | NFC TRANSACTION METHOD AND SYSTEM - A method for performing a transaction between a portable device and a transaction device includes: providing at least one transaction server having at least one application program configured to receive, process and emit application data, establishing at least one data link between the portable device and the transaction server, establishing a near field communication channel between the portable device and the transaction device, and, via the portable device, transferring to the application program of the server application data sent by the transaction device, and receiving application data sent by the application program of the server and transferring them to the transaction device. | 05-17-2012 |
20120123883 | NFC TRANSACTION SERVER - A near field transaction system includes a first transaction device having near field communication circuitry, and a portable device having near field communication circuitry. The system also includes at least one transaction server having a memory area with at least one application program, and a mechanism for establishing a data link between the server and the near field communication circuitry of the portable device. The application program is configured to perform a transaction with the first transaction device, using the near field communication circuitry of the portable device as a proximity relay to communicate with the first transaction terminal. | 05-17-2012 |
20120071090 | NFC Card Sensitive to Eddy Currents - An NFC card includes an antenna circuit including an antenna coil having at least one magnetic axis, and at least one integrated circuit linked to the antenna circuit. The magnetic axis of the antenna coil is substantially parallel to the plane of the card, and is at an angle of 45°±25° with respect to a longitudinal axis LX of the card. Embodiments of the invention are applicable in particular to SIM-NFC card and SD-NFC cards. | 03-22-2012 |
20120071089 | Method and Device for Active Load Modulation by Inductive Coupling - A data emission/reception device by inductive coupling includes an inductive antenna circuit in which an antenna signal appears, a mechanism configured to for extracting a first periodic signal from the antenna signal, a synchronous oscillator receiving the first periodic signal and supplying a second periodic signal, and an active load modulation circuit configured to apply bursts of the second periodic signal to the antenna circuit. The device is configured to place the oscillator in the synchronous oscillation mode before each application of a burst of the second periodic signal to the antenna circuit, then place the oscillator in the free oscillation mode. | 03-22-2012 |
20120071088 | NFC Card for Handheld Device - An NFC card includes an antenna circuit including an antenna coil having at least one magnetic axis, and at least one integrated circuit linked to the antenna circuit. The magnetic axis of the antenna coil is substantially parallel to at least one side of the card, and the card further includes at least one electrically conductive screen extending near the antenna coil, which does not cross the magnetic axis. The card does not include any magnetically permeable material between the at least one conductive screen and the antenna coil. Embodiments of the invention are applicable in particular to SIM-NFC card and SD-NFC cards. | 03-22-2012 |
20120011572 | METHOD OF PERFORMING A SECURE APPLICATION IN AN NFC DEVICE - The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated. | 01-12-2012 |