Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Gemalto Sa patents


Recent patent applications related to Gemalto Sa. Gemalto Sa is listed as an Agent/Assignee. Note: Gemalto Sa may have other listings under different names/spellings. We're not affiliated with Gemalto Sa, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "G" | Gemalto Sa-related inventors


 new patent  A method for controlling remotely the permissions and rights of a target secure element

This invention relates to a method for controlling remotely the rights of a target secure element to an execute an operation, said target secure element being configured to load a profile image and to store a first set of at least one parameter indicating if the secure element is locked or unlocked and, in case it is locked, who is the locker of said secure element. The method is operated by an image delivery server, said method and comprises the following steps: receiving a second set of at least one parameter and an operation code op defining a requested operation to be performed by the target secure element, receiving a profile image to be transmitted to the secure element; generating a security scheme descriptor (ssd) file adapted to bind the profile image with the target secure element and further comprising the second set of at least one parameter and the operation code op; sending the received image profile and the associated security scheme descriptor (ssd) file to the target secure element.. ... Gemalto Sa

 new patent  System for authenticating an electronic device by means of an authentication server

A system for authenticating an electronic device by means of an authentication server in order to authenticate a user of said electronic device. The system is adapted to perform an authentication based on a fictive payment transaction and includes the authentication server which is adapted to execute a fictive payment transaction with a predetermined transaction amount with said electronic device and during said execution to receive a first cryptogram from said electronic device; send said first cryptogram to a banking server; and receive from said banking server an acknowledgment if said first cryptogram is valid; when said fictive payment transaction has been executed, compute an authentication identification based on said electronic device's data; said electronic device which is a payment electronic device and which is adapted to execute said fictive payment transaction with said authentication server and during said execution to send said first cryptogram to said authentication server.. ... Gemalto Sa

System and method for protecting a cryptographic device against fault attacks while performing cryptographic non-linear operations using linear error correcting codes

A system, method and computer-readable storage medium with instructions for protecting an electronic device against fault attack. Given a data represented as an input codeword of a systematic linear error correcting code, the technology provides the secure computation of the output codeword corresponding to the result of the non-linear function applied to this data. ... Gemalto Sa

Gemalto Sa

. . ... Gemalto Sa

Device and method for controlling dirct access of a communication equipment to a virtual store of a network operator

A device is intended for controlling access of a communication equipment of a user to virtual stores of network operators accessible into servers. This device comprises a control means arranged, when this user provides the communication equipment of the user equipment with an access code associated to a virtual store of a network operator, for determining a communication identifier of a virtual store page corresponding to this access code and to data defining a context of the communication equipment into a table establishing correspondences between access codes and communication identifiers of pages of virtual stores providing offers corresponding to communication equipment contexts, then for triggering access by the communication equipment to the virtual store page associated to the determined communication identifier to allow the user to select an offer contained into this virtual store page.. ... Gemalto Sa

A method to validate a dynamic security code in a payment transaction

This invention related to a method to validate a dynamic security code generated for a payment transaction, said method comprising the steps of: providing for a given payment transaction a dynamic security code associated to an identifier of said transaction; verifying using a verification memory if the provided dynamic security code has already been validated when associated to the same associated identifier; if not, verifying the validity of the provided dynamic security code; if the provided dynamic security code is valid, memorizing in the verification memory the provided dynamic security code, the associated identifier of the payment transaction.. . ... Gemalto Sa

Method of managing a secure element

The invention is a method for managing a secure element that comprises an operating system and a software application including an executable part which is tied to the operating system through a plurality of links. The method comprises the following steps: on receipt of an un-map command, recording in a memory area of the secure element a description of said links using an intermediate language, replacing the operating system by a new operating system by keeping said memory area unchanged, on receipt of a re-map command by the secure element, restoring a new set of links between the executable part and the new operating system by using the description.. ... Gemalto Sa

Method for modifying the execution of a platform-independent method of an integrated cercuit card

Modification of the execution of a platform-independent first method of an application within an integrated circuit card having a first non-volatile memory, a second rewritable non-volatile memory, a virtual machine and a processor unit, wherein said platform-independent first method includes a first operations sequence and a second operations sequence. Checking if there is a call within said platform-independent first method to a specific second method, having one parameter; —if there is such a call and if said specific second method is not platform-independent, checking if there is an alternate function associated to said platform-independent first method stored in a memory of said integrated circuit card; if there is an associated alternate function: executing said alternate function to replace said first operations sequence; executing the second operations sequence of said platform-independent first method; otherwise executing by the first operations sequence and the second operations sequence of said platform-independent first method.. ... Gemalto Sa

Device for managing multiple accesses to a secure module of a system on chip of an apparatus

A device for managing multiple accesses to a secure module of a system on chip of an apparatus, and comprises a stream ciphering means arranged for computing on the fly and in a single pass an integrity check for data to be transferred between secure and non secure modules of the system on chip with a seed and an encryption key, and for encrypting/decrypting on the fly and in this single pass these data with the encryption key, and a control means for providing the encryption key and seed to the stream ciphering means and for requesting data transfer and retrieving status to the secure and non secure modules for allowing the transfer of encrypted/decrypted data between the secure and non secure modules.. . ... Gemalto Sa

Method of managing access to a service

The invention is a method for managing access to a service wherein the method comprises the following steps: a client application sends to an application server a request to access the service by using credentials and a first anti-clone code, the application server performs a verification of the credentials and said first anti-clone code, the application server sends a second anti-clone code to the client application and deactivates said first anti-clone code only in case of successful verification, said second anti-clone code being required for the next attempt to access the service.. . ... Gemalto Sa

A method for producing a radiofrequency device passive wire antenna

A method for producing a radiofrequency device having a first antenna circuit connected to a radiofrequency chip and a second antenna circuit associated with, or coupled to, the first circuit, the method including the following steps: formation of the first antenna circuit in the form of a conductive wire deposited in a guided manner on a first substrate; and formation of the second antenna circuit in the form of a conductive wire deposited on the same first substrate in a guided manner and at a calibrated distance from the first antenna circuit.. . ... Gemalto Sa

Gemalto Sa

. . ... Gemalto Sa

Method for managing parking spaces on public streets

The invention relates to a method for managing on-street parking spaces. The method includes querying, by a unit of a vehicle, vehicle sensors about the occupancy status of a parking space around the vehicle, the setting up of a communication channel between the unit and a remote server, the authentication of the unit with the server, the sending of a message with a public encryption key by the server to the unit, the encryption of the geolocation data and the occupancy status, the sending of the encrypted data to server, the decryption by the server of the received encrypted data, the comparison of the geolocation data received with a database containing referenced parking spaces and the update in the database of the occupancy status of referenced parking spaces.. ... Gemalto Sa

Method for switching from a first to a second mobile network operator and corresponding device

A device comprises a chip storing a first subscription relating to the first mobile network operator in a home country. The chip stores a second subscription relating to a second mobile network operator and associated with a preferred communication technology. ... Gemalto Sa

01/25/18 / #20180027410

Method for remote subscription management of an euicc, corresponding terminal

Remote subscription management of an euicc comprising a private key and a public certificate, the public certificate comprising information allowing a subscription manager server to decide if it can agree to manage the euicc. The method includes: establishing a secure channel between the terminal and the subscription manager server by using the public certificate and dedicated cryptographic services of the euicc; sendingto the subscription manager server a subscription management request; verifying, based on the information in the public certificate in the subscription manager server, whether the euicc is entitled to be managed by the subscription manager server and, if yes: performing a key establishment procedure between the subscription manager server and the euicc by using the euicc public certificate; establishing between the subscription manager server and the euicc a secure channel with the established keys; and, executing by the subscription manager server the subscription management request on the euicc.. ... Gemalto Sa

01/18/18 / #20180018665

Method and device for accessing a service

In a method for accessing a service, a device receives data. The device gets, based upon the received data, transaction data. ... Gemalto Sa

01/04/18 / #20180007537

Method for accessing a roaming device and corresponding proxy network

A roaming device sends, through a visited network and a proxy network, to a home network, an identifier for a first subscription. The home network sends, through the proxy network, to the visited network, data relating to the first subscription. ... Gemalto Sa

12/28/17 / #20170372186

Method for producing a single-sided electronic module including interconnection zones

The invention relates to a method for producing a module having an electronic chip including metallisations which are accessible from a first side of the metallisations and an integrated circuit chip which is arranged on the second side of the metallisations, opposite the first side. The method comprises the step of forming electrical interconnection elements which are separate from the metallisations, directly connecting the chip, and are arranged on the second side of the metallisations. ... Gemalto Sa

12/28/17 / #20170368868

Card with marbled visual effect and associated manufacturing process

The card comprises a first translucent or transparent substrate layer, preferably in pvc, and a second substrate layer, and a cracked layer of ink between the two substrate layers so as to allow the second substrate layer to show through the cracks of the layer of ink. The cracked layer of printing ink comprises mirror-effect ink, that reflects light through the first translucent or transparent substrate layer. ... Gemalto Sa

12/21/17 / #20170364711

Secure element

The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory ram and nvm and at least one bus access controller, wherein the bus access controller defines at least a first area pbl, a second area sbl and a secure area mz. The first area comprises a first loader program capable of loading a program package in the second area. ... Gemalto Sa

12/14/17 / #20170357826

System and method for obfuscating an identifier to protect the identifier from impermissible appropriation

A system and method of operating a database system to protect personal identifiers from being revealed. The system and method obfuscates personal identifiers using a secret value, storing in a database records containing the obfuscated personal identifier, storing the secret value in a identifier translation device, receiving at a request preparer a record request identifying a requested record using a non-obfuscated personal identifier, and operating the request preparer to direct the identifier translation device to translate the non-obfuscated personal identifier into an obfuscated personal identifier using the secret value stored in the identifier translation device and using the obfuscated personal identifier in a query to the database.. ... Gemalto Sa

11/30/17 / #the present invention relates to a method to generate prime numbers on board a portable device, said method comprising the steps of, each time at least one prime number is requested:

Gemalto Sa

. . ... Gemalto Sa

11/30/17 / #the present invention relates to a method to execute by a processing unit a sensitive computation using multiple different and independent branches each necessitating a given number of processing unit time units to be executed, characterized in that it comprises the following steps of, at each execution of a sensitive computation:

Gemalto Sa

. . ... Gemalto Sa

11/30/17 / #20170346642

Method for authenticating attributes in a non-traceable manner and without connection to a server

The present invention relates to a method, for a provider entity belonging to a provider group, to authenticate its belonging to an attribute provider group to a verification entity in a non-traceable manner without necessitating to share secret or large constants compromising privacy. Both entities comprise at least one attribute group arborescence, this attribute group arborescence being shared by the provider entity and the verification entity when the provider entity has the attribute. ... Gemalto Sa

11/23/17 / #20170339634

Method and device for accessing an internet protocol multimedia subsystem type subsystem

The invention relates to a method for accessing an internet protocol multimedia subsystem type subsystem, said subsystem. According to the invention, a device is firstly connected to a mobile communication network, as a visited network, said first network. ... Gemalto Sa

10/26/17 / #20170310654

Method for accessing a service, corresponding first device, second device and system

A first device generates a first signature, by using complete transaction data received from a second device, a first algorithm and a first key, modifies at least one character from t complete transaction data and gets partial transaction data, and sends to the second device the partial transaction data. The second device requests a user to modify the partial transaction data by providing at least one character, as complementary data to the partial transaction data, gets, as request response from a user, at least one character to modify the partial transaction data, a corresponding result being proposed modified transaction data, generates a second signature by using the proposed modified transaction data, the first algorithm and the first key, and sends to the first device the second signature. ... Gemalto Sa

10/12/17 / #20170295449

Method for detecting dynamically that secure elements are eligible to an ota campaign and corresponding ota server

The invention concerns notably a method for detecting dynamically that secure elements are eligible to at least one ota campaign for updating these secure elements, each secure element cooperating with a telecommunication terminal in a telecommunication network, this updating being realized by an ota server. According to the invention, the method consists in: detecting which secure elements have not polled the ota server for a given time frame; checking eligibility for these secure elements; updating the secure elements that did not poll the ota server for this given time frame and that are eligible to the ota campaign by pushing messages to these secure elements.. ... Gemalto Sa

09/28/17 / #20170279600

System and method for providing defence to a cryptographic device against side-channel attacks targeting the extended euclidean algorithm during decryption operations

A system, method and computer-readable storage medium for decrypting a code c using a modified extended euclidean algorithm (eea) having an iteration loop independent of the hamming weight of inputs to the eea and performing a fixed number of operations regardless of the inputs to the eea thereby protecting a cryptographic device performing the decryption from side-channel attacks.. . ... Gemalto Sa

09/07/17 / #20170257211

System and method for one-time chinese-remainder-theorem exponentiation for cryptographic algorythms

A system, method and computer-readable storage medium with instructions for protecting an electronic device against fault attack. The technology includes operating the electronic device to determine two half-size exponents, dp and dq, from the exponent d; to split the base m into two sub-bases mp and mq determined from the base m; and to iteratively compute a decryption result s by repeatedly multiplying an accumulator a by m, mp, mq or 1 depending on the values of the i-th bit of dp and dq for each iteration i′. ... Gemalto Sa

08/24/17 / #20170244691

Method of sending data from a secure token to a distant server

The invention is a method for managing a response from an application embedded in a secure token acting as an uicc, in response to a command requesting opening a proactive session. The command is sent by an applicative server to the secure token via an ota server providing a security layer. ... Gemalto Sa

08/24/17 / #20170242999

System and method for protecting a device against attacks on processing flow using a code pointer complement

A system, method and computer-readable storage medium with instructions for operating a processor of an electronic device to protect against unauthorized manipulation of the code pointer by maintaining and updating a code pointer complement against which the code pointer may be verified. Other systems and methods are disclosed.. ... Gemalto Sa

08/10/17 / #20170228556

Method of managing several profiles in a secure element

The invention is a method for managing profiles in a secure element that has several profiles comprising files organized in respective logical tree structures comprising respective root files. The root files have identifiers whose values are different from 0x3f00 and the method comprises the step of enabling browsing of the logical tree structure comprising a targeted root file in response to the receipt of a select file command aiming at selecting said targeted root file.. ... Gemalto Sa

08/03/17 / #20170222806

Method to manage subscriptions in a provisioning server

The present invention relates to a method to manage subscriptions in a provisioning server (ps) able to communicate with a hardware security module (hsm) having an hsm key (k). Said method being such that the hsm comprising a load and a reload function, the secure device key ((ke1)k) and the storage key ((ks)k) as encrypted and stored are provided (s1) to one of said functions, said functions outputting, the storage key ((ks)ke1)k) encrypted using the provided secure device (se1) key (ke1) and the hsm key k, and an apdu_putkey command ((apdu_putkey((ke1))ke1), encrypted using the provided secure device (se1) key (ke1), to put the retrieved storage key ((ks)ke1) also encrypted using the provided secure device key (ke1), the storage key as previously stored ((ks)k) is overwritten (s6) with the storage key (((ks)ke1)k) encrypted using the secure device key (ke1) and the hsm key (k) returned by the function.. ... Gemalto Sa

07/27/17 / #20170214524

Method, server and telecommunications system for establishing, through an ota server, a secured communication channel between an administrative agent comprised in a device and a third party server

A method for establishing a first secured communication channel between an administrative agent in a device and a distant server, the device comprising a secure element communicating with the administrative agent, the secure element being administrated through the administrative agent by the distant server, the administrative agent being administrated by a third party server through a second secured communication channel, the distant server and the third party server being connected through a third secured channel. The third party server requests, from the distant server, an operation on the secure element and a one-time psk. ... Gemalto Sa

06/29/17 / #20170185881

Data carrier

The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising personalized data, the data carrier comprising a first side and a second side opposite to the first side and at least one recording layer provided with at least a first piece of authentication data of said authentication data, an array of lenticular elements being arranged at the first side of the data carrier to provide from a first predetermined angle of view an image of said at least first piece of authentication data. In order that the data carrier according to the invention shall not suffer from greyness and in order to make the data carrier esthetically appealing and manufacture it at low costs, the recording layer is a non-doped transparent pvc layer comprising said at least first piece of authentication data.. ... Gemalto Sa

06/22/17 / #20170178991

Method for producing electronic devices

The invention relates to a method for producing an electronic device including at least one electronic component in a substrate body, said method including at least one step of transferring said electronic component to a surface of a removable dielectric substrate, of delivering a protective resin on said electronic component, and of transferring, onto the protective resin, a reinforcement disc having a main front surface with a peripheral contour, wherein the protective resin extends up to the peripheral contour of the disc in order to form, together with the disc, the peripheral side contours and the final layer of the substrate body of the device.. . ... Gemalto Sa

06/15/17 / #the invention is a method for managing communication between a secure element and a device. the secure element comprises a physical communication interface and first and second virtual profiles. it is configured to exchange data targeting the virtual profiles with the device through the physical communication interface. the method comprises the steps of:

Gemalto Sa

. . ... Gemalto Sa

06/01/17 / #20170154255

Data carrier

The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising personalized data, the data carrier comprising a first side and a second opposite side, and a plurality of layers comprising personalized data, a transparent recording layer, a transparent plastic upper layer and an opaque layer between the recording layer and the upper layer. To make the data carrier very difficult to forge and to enable that it can be manufactured with ordinary machines and without need of expensive materials, the opaque layer comprises a window a first piece of authentication data of said authentication data being divided between said plurality of layers so that the first piece of authentication data is to at least one part thereof, provided above or on the first side of the opaque layer facing the upper layer, at least a rest part of the first piece of authentication data being in the form of laser engraved markings beneath the window and provided in the recording layer, or in a plurality of transparent recording layers of said plurality of layers.. ... Gemalto Sa

04/13/17 / #20170104739

Method to manage a one time password key

The present invention relates to a method to manage a one time password key, referenced otp key, used in an otp algorithm in a user device having access to an unsafe storage including the steps of retrieving a personal identification number, named pin, of a user of the user device, deriving a symmetric key from the pin, encrypting the otp key using the derived symmetric key, storing the encrypted otp key in the unsafe storage, decrypting the otp key using the derived symmetric key, and generating a next otp key using an incremental parameter, wherein the start value of the incremental parameter of the otp key generation is random.. . ... Gemalto Sa

02/23/17 / #20170053140

Dynamic change of security configurations

The present invention relates to a method to provide a dynamic change of security configurations in an integrated circuit product adapted to execute at least a given critical process and susceptible to be attacked. The method comprises the steps of tracking successive executions of the given critical process, and after a given number of such executions, triggering a change of the security configuration.. ... Gemalto Sa

02/09/17 / #20170039464

A method for fabricating an electronic/electrical circuit device

The invention relates to a method for fabricating an electronic device comprising an electronic/electrical circuit, wherein it comprises the following steps: formation of a support-body comprising a battery inside; making of a cavity emerging on the surface of the support-body, said cavity revealing connection terminals of the battery; connection of an electronic/electrical circuit to the battery via the terminals situated in said cavity; exchanging of data in the electronic/electrical circuit by electrical contact. The invention also relates to the corresponding electronic device.. ... Gemalto Sa

01/26/17 / #20170024639

Data carrier

The present invention relates to a data carrier, especially a security document, such as an identification card, e.g. A passport or a driving license, a credit card and a bank card, the data carrier comprising authentication data comprising personalized data, and as a security feature, an array of lenticular elements being arranged to provide only from predetermined angles of view an image of at least a piece of authentication data of said authentication data. ... Gemalto Sa

01/19/17 / #20170019256

Method to authenticate two devices to establish a secure channel

The present invention relates to a method to authenticate two devices to establish a secure channel, one belonging to a first group of devices, the second belonging to a second group of devices, in a non-traceable manner without the need to share a secret, each group being authenticated by an authority that stores a group secret key into the devices under its authority. The method uses a set of authentication tokens, one for each of the other groups with which the device is intended to communicate, said authentication token comprising at least a random number and a cipher of at least this random number by the secret key of each of these other groups, said authentication tokens being further renewed at each communication with a device from another group.. ... Gemalto Sa

01/19/17 / #20170017811

Method and system for optimized reading of a radio frequency communication transponder with the aid of a passive resonant circuit

The invention relates to a method of reading rf transponders disposed in one and the same magnetic interrogation field, in which a magnetic coupling of the transponders is ensured with a passive resonant circuit during reading. The method is distinguished in that the passive antenna of the resonant circuit is associated with at least one transponder antenna, and the passive resonant circuit is tuned in such a way that the resonant frequency resulting from the association corresponds to one of the frequencies of the emission side bands of the transponder to be read. ... Gemalto Sa

01/19/17 / #20170015131

Secure laser marking personalisation

The present invention relates to a method (100) for personalizing a document, said document comprising a support comprising printed patterns (201, 202), wherein said method (100) comprises generating at least a laser pulse on said support for carbonizing at least a printed pattern.. . ... Gemalto Sa

01/12/17 / #20170011381

Electronic transaction method and system via a portable accessory

The invention relates to a method for carrying out an electronic transaction between a main communication apparatus and a transaction terminal, wherein a smart portable accessory is provided, which has a different format from a standardized chip card format and is capable of relaying the transaction or of representing said main apparatus relative to a transaction terminal; and the transaction is carried out by only presenting said accessory, instead of the main apparatus, to the transaction terminal. The invention also relates to the corresponding system.. ... Gemalto Sa

01/05/17 / #20170006464

Method for accessing a service and a corresponding device

A first device stores a subscription manager and at least two subscriptions. A first subscription is active and a second subscription is non-active. ... Gemalto Sa








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Gemalto Sa in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Gemalto Sa with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###