Proton World International N.V. Patent applications |
Patent application number | Title | Published |
20140201815 | ACCESS CONTROL MECHANISM TO A SECURE ELEMENT COUPLED TO AN NFC ROUTER - The invention relates to a method of protecting a security module ( | 07-17-2014 |
20140093026 | NON-VOLATILE MEMORY COUNTER - A counter in a non-volatile memory including at least two sub-counters, each counting with a different modulo, an increment of the counter being transferred on a single one of the sub-counters and the sub-counters being incremented sequentially. | 04-03-2014 |
20140041036 | ASSESSING THE RESISTANCE OF A SECURITY MODULE AGAINST ATTACKS BY COMMUNICATION PIPE DIVERSION - A method for assessing the resistance of a security module against an attempt to divert a communication pipe between a gate of this security module and a gate of a near-field communication router present in a telecommunication device to which the security module is intended to be connected, including the steps of: connecting the security module to a near-field communication router emulator; having the emulator send at least one command to the security module, this command simulating the fact that the pipe used is not connected to a near-field communication gate; and determining whether the security module accepts the commands. | 02-06-2014 |
20130337770 | MANAGEMENT OF COMMUNICATION PIPES IN A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT - A method for detecting an attempt of diversion of a communication pipe between a port of a security module and a port of a near-field communication router present in a telecommunication device, wherein the router filters the messages addressed to said security module. | 12-19-2013 |
20130307674 | ADAPTATION OF A TRANSMISSION BETWEEN A TERMINAL AND AN ELECTROMAGNETIC TRANSPONDER - A method for determining a transponder type to which an electromagnetic transponder in the field of a terminal belongs, wherein the type is determined based on a difference between a measured value of a piece of information representative of the current in an oscillating circuit of the terminal and a no-load value of this piece of information. | 11-21-2013 |
20130225125 | PROTECTION OF A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT AGAINST MISROUTING - A method for protecting data contained in a security module of a telecommunication device equipped with a near-field communication router and with a microcontroller, wherein data relative to the routing between the security module and gates of the router assigned to near-field communications are transmitted over a channel accessible by the router only, or by a control signal which is not generated by the microcontroller for the router. | 08-29-2013 |
20130217325 | SECURING OF A TELECOMMUNICATION DEVICE EQUIPPED WITH A NEAR-FIELD COMMUNICATION MODULE - A telecommunication device including a battery capable of providing a first power supply voltage to circuits of the device, among which at least one security module; a near-field communication module capable of providing a second power supply voltage to the security module; and a circuit for activating the provision of the second power supply voltage, including a switch controllable at least by one element accessible from outside of the device. | 08-22-2013 |
20130159791 | METHOD AND DEVICE FOR FAULT DETECTION - The disclosure concerns a method implemented by a processing device. The method includes performing a first execution by the processing device of a computing function based on one or more initial parameters stored in a first memory device. The execution of the computing function generates one or more modified values of at least one of the initial parameters, wherein during the first execution the one or more initial parameters are read from the first memory device and the one or more modified values are stored in a second memory device. The method also includes performing a second execution by the processing device of the computing function based on the one or more initial parameters stored in the first memory device. | 06-20-2013 |
20130083787 | CONFIGURATION OF A NEAR-FIELD COMMUNICATION ROUTER ACCORDING TO THE MODULATION TYPE - A method for configuring a first near-field communication device according to a modulation type transmitted by a second device, wherein: a decoder of the first device is configured to decode a type-A modulation; a signal received during a first time slot corresponding to the duration of a first type-A symbol is decoded; and the first device is configured according to the value of the decoded symbol to determine the modulation type. | 04-04-2013 |
20130077781 | METHOD OF KEY DERIVATION IN AN INTEGRATED CIRCUIT - A method of derivation, by an electronic circuit, of a first key from a second key, wherein: at least one third key is derived from the second key and is used to derive the first key; and a value of a counter, representative of the number of first keys, conditions the derivation of a new value of the third key. | 03-28-2013 |
20130059568 | PROTECTION OF A SECURITY MODULE IN A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT - The invention relates to a method for protecting information contained in a security module of a telecommunication device provided with a near-field communication router, wherein the provision of information from the security module to the near-field communication router is subject to checking a signature of a routing table between ports of said router. | 03-07-2013 |
20130059567 | PROTECTION OF A COMMUNICATION CHANNEL BETWEEN A SECURITY MODULE AND AN NFC CIRCUIT - A method for protecting data contained in a security module of a telecommunication device equipped with a near field communication router, wherein a modification of a routing table between gates of the router is dependent on a verification of an authentication code keyed in by a user. | 03-07-2013 |
20130059566 | PROTECTION AGAINST REROUTING IN AN NFC CIRCUIT COMMUNICATION CHANNEL - A method for protecting information contained in a security module of a telecommunication device provided with a near-field communication router, wherein a routing table between the ports of the router contains at least one channel identifier calculated from an identifier of a radiofrequency port of a near-field communication circuit associated with the router. | 03-07-2013 |
20130059563 | DETECTION OF A REROUTING OF A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE CONNECTED TO AN NFC CIRCUIT - The invention relates to a method for detecting an attempt to reroute a communication channel between a port of a security module and a port of a near-field communication router, which are in a telecommunication device, wherein, upon receiving a message in a near-field communication format, the security module verifies from which port of the communication router said message originates. | 03-07-2013 |
20130028369 | NON-VOLATILE MEMORY COUNTER - A counter in a non-volatile memory including at least two sub-counters, each counting with a different modulo, an increment of the counter being transferred on a single one of the sub-counters and the sub-counters being incremented sequentially. | 01-31-2013 |
20130007420 | CHECKING THE INTEGRITY OF A PROGRAM EXECUTED BY AN ELECTRONIC CIRCUIT - A method for checking the integrity of a program executed by an electronic circuit and including at least one conditional jump, wherein: a first value is updated for any instruction which does not correspond to a jump instruction; a second value is updated with the first value for each conditional jump instruction; and the second value is compared with a third value, calculated according to the performed conditional jumps. | 01-03-2013 |
20120284533 | METHOD AND CIRCUIT FOR CRYPTOGRAPHIC OPERATION - A method of performing a cryptographic operation including: receiving a plurality of binary input values; splitting the binary input values into a plurality of non-binary digits of base r, where r is an integer greater than 2 and not equal to a power of 2; and performing, by a cryptographic block on each of the plurality of non-binary digits, a different modulo r operation to generate at least one output digit) of base r. | 11-08-2012 |
20120261594 | DEVICE FOR DISTURBING THE OPERATION OF AN INTEGRATED CIRCUIT - A system for injecting faults by laser beams into an electronic circuit including: at least two lasers capable of emitting approximately parallel beams; at least one optical system receiving, on the magnifying side, the beams; and a support of the integrated circuit placed on the reducing side of the optical system. | 10-18-2012 |
20110271042 | METHOD FOR WRITING INTO AND READING FROM AN ATOMICITY MEMORY - A method for writing data into a reprogrammable non-volatile memory, wherein a marking pattern including several bits is added at the beginning of the data and the set formed of the marking pattern and of the data is written from an address in the memory varying from one write operation to another, the marking pattern being identical for each write operation. | 11-03-2011 |
20110252222 | EVENT COUNTER IN A SYSTEM ADAPTED TO THE JAVACARD LANGUAGE - The implementation of a counter in a microcontroller adapted to the JavaCard language while respecting the atomicity of a modification of the value of this counter, wherein the counter is reset by the sending to the microcontroller of an instruction to verify a user code by submitting a correct code, and the value of the counter is decremented by the sending to the microcontroller of the instruction to verify the user code with an erroneous code value. | 10-13-2011 |
20110122694 | LIMITATION OF THE ACCESS TO A RESOURCE OF AN ELECTRONIC CIRCUIT - A method and a circuit for controlling the access to at least one resource of an electronic circuit, in which a test of the value of a counter over at least one bit conditions the access to the resource, the counter being automatically reset after a time period independent from whether the circuit is powered or not. | 05-26-2011 |
20110061105 | PROTECTION OF A PRIME NUMBER GENERATION AGAINST SIDE-CHANNEL ATTACKS - A method for protecting the generation, by an electronic circuit, of at least one prime number by testing the primality of successive candidate numbers, including for each candidate number tests of primality with respect to prime numbers of at least one set of consecutive prime numbers, wherein the order of application of the tests is modified at least from one prime number generation to another. | 03-10-2011 |
20110022753 | SINGLE-WIRE BUS COMMUNICATION PROTOCOL - A method of communication over a single-wire bus between a transmitter device and at least one receiver device, wherein each data bit is transmitted in a frame successively including: a synchronization slot different from a reference voltage of the devices; a first idle slot in a state corresponding to the reference voltage of the circuit; a slot representing the data bit to be transmitted; a second idle slot identical to the first one; a slot intended to contain the state of an optional response bit; and an end slot identical to the idle slot. | 01-27-2011 |
20110010775 | PROTECTION OF INFORMATION CONTAINED IN AN ELECTRONIC CIRCUIT - A method and a circuit for protecting data contained in an electronic circuit against a disturbance of its operation, in which a detection of a disturbance conditions the incrementing or the decrementing of a counter over at least one bit, the counter being automatically reset at the end of a time period independent from the fact that the circuit is or not powered. | 01-13-2011 |
20100325320 | VERIFICATION OF DATA READ IN MEMORY - A method and a circuit for checking data transferred between a circuit and a processing unit, in which: the data originating from the circuit transit through a first buffer element having a size which is a multiple of the size of data to be subsequently delivered over a bus of the processing unit; an address provided by the processing unit for the circuit is temporarily stored in a second element; and the content of the first element is compared with current data originating from the circuit, at least when they correspond to an address of data already present in this first element. | 12-23-2010 |
20100306295 | PROTECTION OF A PRIME NUMBER GENERATION FOR AN RSA ALGORITHM - A method for protecting a generation, by an electronic circuit, of at least one prime number by testing the prime character of successive candidate numbers, including: for each candidate number: the calculation of a reference number involving at least one first random number, and at least one primality test based on modular exponentiation calculations; and for a candidate number having successfully passed the primality test: a test of consistency between the candidate number and its reference number. | 12-02-2010 |
20100017553 | INTERFACE BETWEEN A TWIN-WIRE BUS AND A SINGLE-WIRE BUS - A method and a device for converting a first bus including at least a data wire and a clock wire into a single-wire bus, wherein a data bit of the first bus is converted on half a period of the clock signal for transmission over the second bus, a waiting pattern being placed on the second bus during the other half-period. | 01-21-2010 |
20090067630 | RECORDING OF A KEY IN AN INTEGRATED CIRCUIT - The invention concerns a method and a system for customizing electronic components ( | 03-12-2009 |
20080263533 | IMPLEMENTATION OF PATCHES BY A PROCESSING UNIT - A method and a circuit of execution, by a processing unit, of at least one patch of at least one first program stored in a first non-reprogrammable non-volatile memory, the patch being stored in a second memory, and wherein: each current address of an instruction of the first program provided by the processing unit is compared with values preloaded in at least one volatile storage element; in case of an identity between the current address and a preloaded value, an interrupt is triggered, this interrupt triggering a search, from a correspondence table, for an address of a patch in the second memory; and the patch is executed. | 10-23-2008 |
20080232581 | Data parallelized encryption and integrity checking method and device - A method and device for encrypting and/or decrypting binary data blocks protecting both confidentiality and integrity of data sent to or received from a memory. The encryption method comprises steps of: applying to the input data block a reversible scrambling process, the scrambling process providing a scrambled data block in which the bits of the input data block are mixed so that a modification of one bit in the scrambled data block impacts on every bit of the input data block, and applying to the scrambled data block a stream cipher encryption algorithm providing an encrypted data block. Application can be made to secured integrated circuits requiring to securely store data in an external memory. | 09-25-2008 |
20080219400 | Event Counter - A counting method and a counter using an integrated circuit memory area, including at least one step of storage of partial values in several words of identical memory sizes, the result of the counting being obtained by arithmetically adding the values contained in the different words. | 09-11-2008 |