METHOD FOR PROTECTING DATA
    1.
    发明申请

    公开(公告)号:US20190065759A1

    公开(公告)日:2019-02-28

    申请号:US16108653

    申请日:2018-08-22

    申请人: SKEYECODE

    发明人: Guillaume Pitel

    摘要: A method for encoding can include generating a data structure defining a Boolean circuit including a memory storing original data, inputs and outputs, logic gates, and wires interconnecting the inputs, the logic gates and the outputs, the memory including, for each bit of the original data, a memory cell including a logic gate performing a logic operation depending on a value of the bit, the Boolean circuit configured to receive input data for selecting and reading a memory cell, and to provide a binary data of a bit read in the selected memory cell and address data of the bit in the original data. Generating the data structure including: generating a valid data for each binary state of each wires of the Boolean circuit, and computing truth table values of the logic gates as a function of the valid input and output data, and a logical operation of the logic gate.

    Method for securely transmitting a secret data to a user of a terminal

    公开(公告)号:US10565357B2

    公开(公告)日:2020-02-18

    申请号:US15801036

    申请日:2017-11-01

    申请人: SKEYECODE

    摘要: This disclosure relates to a method for securely transmitting secret information to a user, including receiving by the user terminal, from a secure processor, a software component protected against tampering and reverse-engineering and configured to generate sets of adjacent pixels having a probability lower than 100% to be in a visible or invisible state, executing the software component by the user terminal, at a frame display refresh rate, to generate the pixel sets at the display refresh rate, inserting the pixel sets generated by each execution of the software component into one respective image frame, and activating display of the image frames at the frame display refresh rate, the image frames including information which is machine unintelligible as being formed of the pixel sets, the information becoming intelligible to a user at the display refresh rate based on a human visual system.

    METHOD FOR SECURELY TRANSMITTING A SECRET DATA TO A USER OF A TERMINAL

    公开(公告)号:US20180145827A1

    公开(公告)日:2018-05-24

    申请号:US15801036

    申请日:2017-11-01

    申请人: SKEYECODE

    IPC分类号: H04L9/08 G06F21/14

    摘要: This disclosure relates to a method for securely transmitting secret information to a user, including receiving by the user terminal, from a secure processor, a software component protected against tampering and reverse-engineering and configured to generate sets of adjacent pixels having a probability lower than 100% to be in a visible or invisible state, executing the software component by the user terminal, at a frame display refresh rate, to generate the pixel sets at the display refresh rate, inserting the pixel sets generated by each execution of the software component into one respective image frame, and activating display of the image frames at the frame display refresh rate, the image frames including information which is machine unintelligible as being formed of the pixel sets, the information becoming intelligible to a user at the display refresh rate based on a human visual system.

    SECURING A TRANSACTION PERFORMED FROM A NON-SECURE TERMINAL

    公开(公告)号:US20190260748A1

    公开(公告)日:2019-08-22

    申请号:US16398071

    申请日:2019-04-29

    申请人: SKEYECODE

    IPC分类号: H04L29/06 G06F21/36 H04L9/32

    摘要: In a general aspect, a method for authenticating a user including: receiving, from a secure processor, a software component configured to generate an image frame including encrypted information; executing the software component, the execution of the software component generating the image frame; displaying the image frame; superimposing on the image frame a semi-transparent image including transparent and opaque pixels configured to make the encrypted information intelligible to the user; acquiring from the user a response depending on the information; and transmitting the acquired response to the secure processor, the user being authenticated by the secure processor as a function of the acquired response.

    SECURING A TRANSACTION PERFORMED FROM A NON-SECURE TERMINAL

    公开(公告)号:US20190260747A1

    公开(公告)日:2019-08-22

    申请号:US16398066

    申请日:2019-04-29

    申请人: SKEYECODE

    摘要: In a general aspect, a method for authenticating a user can include: receiving, from a secure processor, a software component configured to generate an image frame including information intelligible to the user, and input data of the software component, the software component can include a first input for receiving a first input data having two randomly-selected valid values, and invalid values. The transmitted input data can include the valid values of the first input data. The method can also include, performing a plurality of times: selecting one of the valid values of the first input data in the transmitted input data, executing the software component by applying the transmitted input data to inputs of the software component and the selected valid value to the first input of the software component. The execution of the software component generating the image frame can have pixels in a visible or invisible state, depending on the selected valid value and defining the information, displaying the image frame. The method can also include, acquiring, from the user, a response depending on the information in the displayed image frame, and transmitting the acquired response to the secure processor.

    SECURELY PERFORMING A SENSITIVE OPERATION USING A NON-SECURE TERMINAL

    公开(公告)号:US20190258829A1

    公开(公告)日:2019-08-22

    申请号:US16398068

    申请日:2019-04-29

    申请人: Skeyecode

    发明人: Guillaume Pitel

    摘要: In a general aspect, a method for securely performing an operation using a non-secure user terminal can include: receiving and storing, by the user terminal, software component data defining a set of a plurality of software components performing the operation, the software component data including, for each software component, structure data and content data; receiving by the user terminal, from a secure processor, an execution request to perform the operation; selecting a valid software component among the set of software components; executing the selected software component; and setting the selected software component to invalid.