-
公开(公告)号:US10592906B2
公开(公告)日:2020-03-17
申请号:US14594842
申请日:2015-01-12
Applicant: GEMALTO SA
Inventor: Dominique Quesselaire , Jean-Paul Mengus , Michel Leger
Abstract: A system for performing electronic transaction includes: a payment terminal including a human interface module, a first processor, and an internal bus for connecting these elements; a host terminal connectable to the human interface module through a connection; and a security module. The human interface module includes a keyboard, a display, a card reader for reading and authenticating a bank card or credit card. The host terminal includes a second processor, a memory, and a power supply. A transaction terminal task manager is included in the first security module, the first security module being hosted in the host terminal. The human interface module executes transaction phases under control of the security module, and executes security treatments, totally autonomously from the host terminal. The security treatments include presentation of a PIN code to the bank card or credit card.
-
公开(公告)号:US10409588B2
公开(公告)日:2019-09-10
申请号:US16074840
申请日:2017-01-27
Applicant: GEMALTO SA
Inventor: Christophe Franchi , François-Xavier Marseille
Abstract: The invention is a method of managing an object which is represented by a first instance of a class. The first instance is stored in a secure element comprising an initial operating system. The method comprises a step of updating the initial operating system to generate an updated operating system, a step of creating a metadata uniquely associated with the object, said metadata being permanently stored in the secure element and comprising a value of a parameter of said class which has been used to create said first instance. The method comprises a step of re-instantiating the object by generating an updated instance of the class in the updated operating system by using said value to set said parameter of the class, said updated instance representing the object. The re-instantiating step is automatically triggered by the step of updating the initial operating system.
-
公开(公告)号:US20190272781A1
公开(公告)日:2019-09-05
申请号:US16343647
申请日:2017-10-20
Applicant: GEMALTO SA
Inventor: Stéphane TOUVET
IPC: G09G3/16
Abstract: Method for producing an electrophoretic display device comprising a low-voltage microcontroller. The invention relates to a method for producing a segmented electrophoretic display device comprising a bistable display operating at predetermined opposing voltages and an electronic circuit with microcontroller for controlling the display according to a control program. The method includes the following steps: supplying the controller, which is different from a specific display controller for a bistable display and configured to deliver voltages, lower in absolute value to the predetermined voltages, and compensating the voltages with at least one compensation voltage to at least reach the predetermined opposing voltages. The invention also relates to the corresponding device.
-
公开(公告)号:US20190266603A1
公开(公告)日:2019-08-29
申请号:US16062812
申请日:2016-10-20
Applicant: GEMALTO SA
Inventor: Jean-Michel Desjardins , Marie Lathiere
Abstract: In a method for authenticating a user, a device accesses a key and an initial vector. The vector is generated by using a first algorithm, a reference vector and reference user authentication data. The device accesses data and provided user authentication data. The device generates an intermediary vector by using a second algorithm, the initial vector and the user authentication data. The device generates a cryptogram by using a third algorithm, the key, the intermediary vector and the data. A server receives a request for authenticating a user accompanied with the cryptogram and the data. The server accesses the key and the reference vector. The server generates a reference cryptogram by using the third algorithm, the key, the reference vector and the data. The server verifies whether the reference cryptogram matches the cryptogram. If the reference cryptogram matches the cryptogram, the server authenticates the user.
-
公开(公告)号:US20190229886A1
公开(公告)日:2019-07-25
申请号:US16337197
申请日:2017-09-22
Applicant: GEMALTO SA
Inventor: Aline GOUGET
Abstract: The present invention relates to a method to counter DCA attacks of order 2 and higher order applied on an encoded table-based (TCabi,j) implementation of block-cipher of a cryptographic algorithm to be applied to a message (m), said method comprising the steps of: —translating a cryptographic algorithm block-cipher to be applied on a message (m) into a series of look-up tables (Tabi,j),—applying secret invertible encodings to get a series of look-up tables (TCi,j),—computing message-dependent masking values, comprising the computation of at least two shares of masking value (mmask1, mmask2) for the input of the table network based on at least two different message derivation functions (F1, F2),—re-randomizing the tables (TCi,j) using the computed message-dependent masking values (mmask1, mmask2),—computing rounds to be applied on the message (m) based on the randomized network of tables (TCi,j).
-
公开(公告)号:US20190213042A1
公开(公告)日:2019-07-11
申请号:US16327271
申请日:2017-09-04
Applicant: GEMALTO SA
Inventor: Sylvain CHAFER , Valentin FAVREAU , Chandra GONDOWASITO , Guillaume PHAN
CPC classification number: G06F9/5016 , G06F9/44505 , G06F9/468 , G06Q20/355 , G06Q20/3563
Abstract: There is described a method for Java Card application memory footprint optimization which relies on the separation in advance of the code related to the personalization from the rest of the code. It allows this code to perform the personalization of an application installed from a main package while being itself included and installed from a separated package dedicated to the personalization, namely the Card Personalization Specifications (CPS) package. This way, the CPS package and all the code inherent to the personalization can be removed once all the personalization steps have been completed.
-
公开(公告)号:US10321288B2
公开(公告)日:2019-06-11
申请号:US15769145
申请日:2016-09-15
Applicant: GEMALTO SA
Inventor: Heimi Saad , Valérie Gleize , Fabien Courtiade
Abstract: The invention is a method for managing applications in a secure element comprising a communication interface. An application is installed in the secure element and configured to be implicitly selected on the communication interface. The method comprises the following steps: —the secure element receives a command requesting the installation of a new application configured to be implicitly selected on the communication interface, —upon receipt of the command, the secure element installs the new application, configures the new application to be implicitly selected on the communication interface and keeps the previous application unchanged.
-
公开(公告)号:US10298394B2
公开(公告)日:2019-05-21
申请号:US15121910
申请日:2015-02-20
Applicant: GEMALTO SA
Inventor: Alain Rhelimi
Abstract: The present invention relates to a method to authenticate two devices to establish a secure channel, one belonging to a first group of devices, the second belonging to a second group of devices, in a non-traceable manner without the need to share a secret, each group being authenticated by an authority that stores a group secret key into the devices under its authority. The method uses a set of authentication tokens, one for each of the other groups with which the device is intended to communicate, said authentication token comprising at least a random number and a cipher of at least this random number by the secret key of each of these other groups, said authentication tokens being further renewed at each communication with a device from another group.
-
89.
公开(公告)号:US20190089523A1
公开(公告)日:2019-03-21
申请号:US16098643
申请日:2017-05-04
Applicant: GEMALTO SA
Inventor: Machaël A. ADJEDJ
Abstract: There is disclosed a countermeasure using the properties of the Montgomery multiplication for securing cryptographic systems such as RSA and DSA against, in particular, safe-error injection attacks. In the proposed algorithm, the binary exponentiation b=ad mod n is iteratively calculated using the Montgomery multiplication when the current bit di of the exponent d is equal to zero. In that case, the Montgomery multiplication of the actual result of the exponentiation calculation by R is realized. Thanks to this countermeasure, if there is any perturbation of the fault injection type introduced during the computation, it will have visible effect on the final result which renders such attack inefficient to deduce the current bit di of the private key d.
-
90.
公开(公告)号:US20190052314A1
公开(公告)日:2019-02-14
申请号:US16076894
申请日:2017-01-24
Applicant: GEMALTO SA
Inventor: Jean-Paul CARUANA
CPC classification number: H04B5/0031 , G06K19/0723 , H01Q1/242 , H01Q5/25 , H04W76/15
Abstract: The invention is a method of managing communication between a portable device and a contactless reader able to communicate using a first wireless technology configured to communicate in a short-range mode. The method comprises the steps of: —establishing a first channel between the contactless reader and a wireless unit, —establishing between the wireless unit and the portable device a second channel using a second wireless technology which is configured: —to operate with a range greater than that of said first wireless technology, —to detect the position of the portable device with respect to the wireless unit, —to handle an anti-collision phase, —establishing a bridge between the contactless reader and the portable device through said first and second channels only if the detected position of the portable device matches with the contactless reader.
-
-
-
-
-
-
-
-
-