Amiel, FR
Catherine Amiel, L'Hay-Les-Roses FR
Patent application number | Description | Published |
---|---|---|
20120107252 | METHOD FOR FORMING CYCLODEXTRIN POLYMER AND LIPOPHILIC COMPOUND EMULSIONS, RESULTING EMULSIONS, AND COMPOSITIONS INCLUDING SAID EMULSIONS - The present invention relates to a method for preparing a cyclodextrin polymer and/or a hydrophilic polymer emulsion having cyclodextrins as well as lipophilic compounds, the emulsions having a remarkable stability. In particular, the method includes: (i) adding a lipophilic compound into an aqueous solution of a cyclodextrin unit polymer or hydrophilic polymer having cyclodextrins; (ii) forming an emulsion from the mixture resulting from step (i). The invention also relates to the resulting emulsions, i.e. stabilized emulsions by a non-covalent and non-crystalline inclusion complex consisting of (i) a cyclodextrin unit polymer or a hydrophilic polymer having cyclodextrins and (ii) a lipophilic compound. The invention also relates to the use of said emulsions in the cosmetic, pharmaceutical and/or agri-food fields. | 05-03-2012 |
Frederic Amiel, Carnoux FR
Patent application number | Description | Published |
---|---|---|
20100239091 | METHOD FOR GENERATING MASKS IN A COMMUNICATING OBJECT AND CORRESPONDING COMMUNICATING OBJECT - The invention relates to a method for generating masks in a communicating object, the masks being intended to mask data to be stored in the communicating object. At least one master mask is stored in the communicating object. According to the invention, the method involves applying at least one diversifier to the master mask so as to generate a diversified mask; masking the datum to be stored in the communicating object by a reversible function using the diversified mask, the mask generating a masked datum; and storing the masked datum in the communicating object with the diversifier used to generate the diversified mask for obtaining the masked datum. The invention also relates to a communicating object including components for implementing such a method. | 09-23-2010 |
Frederic P. R. Amiel, Antibes FR
Patent application number | Description | Published |
---|---|---|
20090217050 | SYSTEMS AND METHODS FOR OPTIMIZING SIGNATURE VERIFICATION TIME FOR A CRYPTOGRAPHIC CACHE - Embodiments provide systems and methods to optimize signature verification time for a cryptographic cache. Time is reduced by eliminating at least some of the duplicative application of cryptographic primitives. In some embodiments, systems and methods for signature verification comprise obtaining a signature which was previously generated using an asymmetrical cryptographic scheme, and determining whether an identical signature has previously been stored in a signature cache. If an identical signature has been previously stored in the signature cache, retrieving previously generated results corresponding to the previously stored identical signature, the results a consequence of application of cryptographic primitives of the asymmetrical cryptographic scheme corresponding to the identical signature. The results are forwarded to a signature verifier. In at least some embodiments, at least one of these functions occurs in a secure execution environment. | 08-27-2009 |
20090282264 | ENCRYPTION/DECRYPTION ENGINE WITH SECURE MODES FOR KEY DECRYPTION AND KEY DERIVATION - In at least some embodiments, an electronic device comprises a processor and an encryption/decryption (E/D) engine coupled to the processor via a bus. The E/D engine selectively operates in a first mode and a second mode. For the first mode, an E/D engine output is provided to the bus. For the second mode, the E/D engine output is not provided to the bus and is accessible only to the E/D engine. | 11-12-2009 |
Jean-Christophe Amiel, Paris FR
Patent application number | Description | Published |
---|---|---|
20090097555 | Video encoding method and device - Successive images (F) of a video sequence are encoded in order in generate parameters which are included in an output flow (F) that is to be transmitted to a decoder. The encoding of certain images is effected in Inter mode relative to one or several previous images of the sequence. The output flow also includes long term marking commands for certain images and demarking commands for previously marked images. Each long-term marked image is kept in a memory by the decoder until a corresponding demarking command is received. Return information on the restoration of the images of the video sequence by the decoder is received by the encoder (1) and analyzed in order to identify an image that has been lost by the decoder. It is possible to encode a following image of the sequence in Inter mode in relation to a long-term marked image in response to identification of an image lost to the decoder. | 04-16-2009 |
Jean-Christophe Amiel, Arcueil FR
Patent application number | Description | Published |
---|---|---|
20100262927 | METHOD AND A DEVICE FOR CONTROLLING THE DISPLAY OF AN INFORMATION AREA ON THE WELCOME SCREEN OF A MOBILE TERMINAL - The invention relates to a method and a device for controlling the display of at least one information area on the welcome screen ( | 10-14-2010 |
Patrice Amiel, La Ciotat FR
Patent application number | Description | Published |
---|---|---|
20150223061 | METHOD FOR INITIATING AN OTA SESSION - The invention relates to a method for initiating an OTA session in a mobile radio communication network at the request of a user of a mobile terminal. The OTA session is established between the mobile terminal and a remote OTA server, the mobile terminal including a security element such as a UICC card. According to the invention, the method comprises: i) entering a special code using the man/machine interface of said mobile terminal; ii) said security element intercepting said special code; and iii) opening said OTA session between said mobile terminal and said remote server in a secure mode. | 08-06-2015 |
Patrice Amiel, Aix-Les-Milles FR
Patent application number | Description | Published |
---|---|---|
20090307358 | Transmission of Data Between A Server and A Communicating Object - Transmission of data between a download server and a communicating object through a communications network is initiated by a registration server, by transmitting connection parameters received from the download server to the communicating object via a first data channel opened by a first agent of the communicating object after attaching the object to the network. As a function of the connection parameters, a second agent in the communicating object opens a second data channel to the download server so as to transmit the data therein. As long as the first data channel is open, other servers can initiate a transmission via the registration server. | 12-10-2009 |
20100211784 | METHOD FOR ACCESSING A PORTABLE DEVICE, CORRESPONDING PORTABLE DEVICE, HOST DEVICE AND SYSTEM - The invention relates to a method for accessing a portable device, the portable device being connected to a host device. According to the invention, the host device, as a client, opens a communication channel to the portable device, as a server, according to a first network communication protocol, and the portable device, as a client, uses the communication channel to transport data to the host device, as a server, according to a second network communication protocol, without the implementation of any complex infrastructure. The invention relates also to a corresponding system for accessing a portable device, a corresponding portable device accessible from outside and a corresponding host device for accessing a portable device. | 08-19-2010 |
20120231736 | METHOD OF PROTECTING THE EXECUTION OF AN NFC APPLICATION LOADED IN A SECURE ELEMENT FORMING AN INTEGRAL PART OF A MOBILE TERMINAL - The invention relates to a method for securing the execution of an onboard NFC application in a secure element which does not include a native OTA application. The secure element interacts with a mobile terminal including a removable card. According to the invention, the method includes recording an identifier of the removable card in the secure element no later than when the NFC application is loaded onto the secure element. When an event occurs, a verification is made, in the secure element, whether or not the identifier of the removable card present in the mobile terminal corresponds to the identifier previously stored in the secure element, in order to detect a possible change of the removable card. | 09-13-2012 |
Patrice Amiel, Aix-Lesmilles FR
Patent application number | Description | Published |
---|---|---|
20100017499 | Data downloading initiated by portable communicating objects during a campaign - Content data available in a server is downloaded to portable communicating objects via a radio communication network during a data downloading campaign initiated by a portable communicating object upon transmission of a request of content availability to the server when at least one request transmission triggering element fulfills a rule stored in the portable communicating object. Upon reception of the content availability request, one of the devices including the server and the portable communicating object determines whether the content data are available for the portable communicating object so as to transmit the same thereto. | 01-21-2010 |
20130305339 | METHOD OF LOADING DATA INTO A PORTABLE SECURE TOKEN - The invention is a method for loading data into a portable secure token comprising a plurality of security domains. A first security domain comprises a first administration agent and a second security domain comprises a second administration agent. A remote application server comprises a first data to be provided to the second administration agent. A syndication server, which is distinct from the remote application server, contains a list which comprises a reference to the first data. The list is sent in response to a polling request that is sent by the first administration agent. This list is comprised in a polling response which is sent by the syndication server. | 11-14-2013 |
Patrice Amiel, Meudon FR
Patent application number | Description | Published |
---|---|---|
20120204240 | MULTI-APPLICATION MOBILE AUTHENTICATION DEVICE - (EN) The invention makes it possible to allow several applications to coexist in the same card; the implementation of the applications uses reading and writing of data by the reader in the same memory location. The invention is a method for exchanging data between a mobile authentication device | 08-09-2012 |
Patrice Amiel, La Ciotat Cedex FR
Patent application number | Description | Published |
---|---|---|
20130291084 | METHOD FOR ACCESSING A SECURE ELEMENT AND CORRESPONDING SECURE ELEMENT AND SYSTEM - The invention relates to a method for communicating information. A first device is coupled to a secure element. The secure element sends, at an initiative of the secure element, to the first device a secure element identifier. The first device sends to a second device at least one first message comprising the secure element identifier. The second device sends to a third device at least one second message comprising the secure element identifier and two communication network subscription identifiers, as associated data, the second device adding the two communication network subscription identifiers. The third device stores the associated data. The invention also relates to a corresponding system. | 10-31-2013 |
Patrice Amiel, Les Milles FR
Patent application number | Description | Published |
---|---|---|
20110092253 | METHOD FOR ACTIVATING THE SUBSCRIPTION OF AN UICC DEVICE - The invention provides a method for activating the subscription of an UICC, said UICC comprising an activation application, said method comprising the step of activating the subscription of the holder of the UICC by sending a message to an activation server, said message being sent by the activation application to the activation server by using an IP based communication. | 04-21-2011 |
20110185438 | REGULATOR OF COMMANDS WHICH ARE DESTINED FOR A SENSITIVE APPLICATION - The present invention describes a method and a software module making it possible to secure communications with a sensitive application, for which exchanges with the outside have been delegated to a so-called interfacing application. Accordingly, the present invention describes the application of security rules to all or some of the commands destined for this sensitive application. | 07-28-2011 |
20120117219 | METHOD OF MANAGING AN APPLICATION EMBEDDED IN A SECURED ELECTRONIC TOKEN - The invention is a method of managing an application embedded in a secured electronic token. The token is intended to receive a message from a server machine. The message has a header and a body. The token comprises an agent able to manage the message. The method comprises the steps of: | 05-10-2012 |
Roland Amiel, Cannes FR
Patent application number | Description | Published |
---|---|---|
20140080338 | ANNULAR COUPLER FOR DRILL STEM COMPONENT - A pair of contact or capacitive HF couplers for drill stem components. Each of the first and second couplers includes a central conductor, a supplemental conductor, and an annular dielectric mechanism. The dielectric mechanism is disposed between the conductors. The conductors are isolated from each other. The supplemental conductor includes two electrical contact surfaces. The central conductor includes an electrical contact surface or electrode. The central conductors of the first and second couplers interact electrically in the coupled state. The supplemental conductors of the first and second couplers are in electrical contact in the coupled state. The supplemental conductors surround the central conductors. In the mounted state, the supplemental conductors form a shielding for the central conductors. | 03-20-2014 |