Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Gemalto Sa patents


Recent patent applications related to Gemalto Sa. Gemalto Sa is listed as an Agent/Assignee. Note: Gemalto Sa may have other listings under different names/spellings. We're not affiliated with Gemalto Sa, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "G" | Gemalto Sa-related inventors


Method, device and system for authenticating to a mobile network and a server for authenticating devices to a mobile network

The invention relates to a method for authenticating to a mobile network. According to the invention, the method comprises the following steps. ... Gemalto Sa

Method to authenticate a subscriber in a local network

The present invention relates to a method to authenticate a subscriber (imsii) within a local network (lnj) comprising preliminary step of deriving a subscriber key (smki) in local keys (lki), one local key (lkilnj) for each local network (lnj) the subscriber (imsii) is authorized to access, provisioning each local network (lnj) the subscriber (imsii) is authorized to access with its own local key (lkilnj). When an authentication is required in a given local network (lnj), an uicc application derives a local key (lkilnj) in the uicc application of the subscriber (imsii) using the network identifier (lnj), the key derivation function (kdf) and the subscriber key (smki) and use the derived local key (lkilnj) in the algorithm to perform local authentication in the local network (lnj).. ... Gemalto Sa

Electronic voting using secure electronic identity device

Electronic voting including a registration authority server, an election authority server, and a voter-host computer connected to an electronic identity card associated with a voter casting a vote. The registration authority server computer and the secure electronic identity card establish a first cross-domain unlinkable pseudonym for the secure electronic identification token, the first cross-domain unlinkable pseudonym being unique to the electronic identity card and the registration authority. ... Gemalto Sa

Non-contact friction ridge capture device

A non-contact friction ridge capture device is described. The device comprises a device housing, the device housing including an electronics compartment and an illumination shield, with an opening between the electronics compartment and the illumination shield into which a user can insert the user's hand. ... Gemalto Sa

Method for manufacturing a radiofrequency antenna on a substrate and antenna thus obtained

The invention relates to a method for manufacturing an antenna for a radiofrequency transponder, said antenna including a spiral comprising turns which extend, at least in part, over an insulating substrate; the method is characterised in that it includes the step ac-cording to which at least one first portion of each turn is deposited on said substrate at a first plane level, at least one second portion of each turn being formed or kept at a distance from the first plane level of the substrate, the axis of the spiral being parallel to the plane of the substrate. The invention also relates to a portable electronic object comprising, in a fixed or removable manner, the obtained antenna.. ... Gemalto Sa

Method for establishing ota sessions between terminals and an ota server, corresponding ota server and reverse proxy server

A method for establishing ota sessions between terminals and an ota server in a telecommunications network, each of the terminals interacting with a security element capable of interrogating the ota server to establish a secure session in order to download data from the ota server via a reverse proxy server in order to update security elements. The method includes provision by an ota server to reverse proxy server of a list of identifiers of security elements for which an update is available; only establishing a secure session between the security elements and the ota server for the security elements having identifiers included in said list.. ... Gemalto Sa

Security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server

The present invention relates to a security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server, wherein said security management system comprises: —said identity provider server which is adapted to: —open with said token a secure messaging channel by means of a general authentication procedure using at least one certificate; —receive via said secure messaging channel from said token enciphered data; —transmit to said service provider server said enciphered data; —said service provider server which is adapted to: —receive from said identity provider server enciphered data of said token; —decipher said enciphered data to extract said data; —said token which is adapted to: —encipher data; and —transmit via said secure messaging channel to said identity provider server said enciphered data.. . ... Gemalto Sa

Method to secure an applicative function in a cloud-based virtual secure element implementation

The present invention relates to a method to secure an applicative function in a cloud-based virtual secure element implementation, said virtual secure element being intended to be used by a dedicated emulated secure element application to perform said applicative function, said implementation being supported by a user device comprising the emulated secure element application and a local secure element comprising a public key infrastructure applet and by a cloud remote server having an emulated virtual secure element corresponding to the user of the user device, said user device and cloud remote server further respectively having a secure cloud library and a secure cloud front-end.. . ... Gemalto Sa

Method of and apparatus for access geographical location information service

The invention provides a solution to accessing for a geographical location information-based service in a server of a machine type communication based communication system, where firstly a server broadcasts or multicasts a content request message, the content request message comprising information on requested content and information on a target geographical location; then the server receives a response message from at least one user equipment, the response message indicating that the at least one user equipment possesses the requested content and the at least one user equipment being located within the target geographical location; and finally the server acquires the requested content from the at least one user equipment.. . ... Gemalto Sa

Method of replacing at least one authentication parameter for authenticating a security element and corresponding security element

A method of replacing an authentication parameter for authenticating a security element co-operating with a terminal includes storing in the security element a first authentication parameter; transmitting to a mobile network operator the first authentication parameter for the operator to record it in its authentication system; on occurrence of an event, having a remote platform transmit to the security element an indicator informing the security element that it is authorized to replace the first authentication parameter with a second authentication parameter if its authentication fails; on occurrence of the event, having the entity transmit to the operator a second authentication parameter to replace the first authentication parameter; and in the event of subsequent failure of the security element to connect to the mobile network and if the indicator is present at the security element, replacing the first authentication parameter with the second authentication parameter at the security element.. . ... Gemalto Sa

Method for managing a secure channel between a server and a secure element

The invention is a method for managing a secure channel between a server and a secure element embedded in a first device, wherein a user agent embedded in a second device establishes a https session with the server and retrieves a web application from the server, the method comprising the steps: the server sends to the web application an application certificate which is linked to a specific data reflecting the identity of the server, the secure element gets the application certificate and the specific data, the secure element checks the validity of the application certificate and that the application certificate is consistently linked to the specific data, in case of successful checks, the secure element and the server generate an ephemeral session key and use it for opening a secure channel.. . ... Gemalto Sa

Integrated circuit card adapted to transfer first data from a first application for use by a second application

The present invention relates to an integrated circuit card comprising a rewritable non-volatile memory and a buffer, said rewritable non-volatile memory comprising a first context where a first java card™ application comprising first data is stored, wherein said integrated circuit card is adapted to: store in a second context of said rewritable non-volatile memory a second java card™ application sent by a terminal; load the first java card™ application first data into said buffer; extract said first java card™ application first data from said buffer and store said first data into said second context.. . ... Gemalto Sa

Secure element with shared memories, for a multi-image owner device

A secure element equips a device usable by n image owners, and comprises a first non-volatile memory divided into n parts storing image owner data, a second non-volatile memory storing a primary boot loader, a third non-volatile memory divided into n parts storing image owner session private data, a first random access memory divided into n parts associated to the n first non-volatile memory parts, a second random access memory for temporarily storing image owner data during an access session, and a controller activated by the primary boot loader when the device starts an access session, and then controlling accesses to the non-volatile memories and random access memories according to rules, and erasing the second random access memory each time the device starts an access session.. . ... Gemalto Sa

A method for controlling remotely the permissions and rights of a target secure element

This invention relates to a method for controlling remotely the rights of a target secure element to an execute an operation, said target secure element being configured to load a profile image and to store a first set of at least one parameter indicating if the secure element is locked or unlocked and, in case it is locked, who is the locker of said secure element. The method is operated by an image delivery server, said method and comprises the following steps: receiving a second set of at least one parameter and an operation code op defining a requested operation to be performed by the target secure element, receiving a profile image to be transmitted to the secure element; generating a security scheme descriptor (ssd) file adapted to bind the profile image with the target secure element and further comprising the second set of at least one parameter and the operation code op; sending the received image profile and the associated security scheme descriptor (ssd) file to the target secure element.. ... Gemalto Sa

05/17/18 / #20180137511

System for authenticating an electronic device by means of an authentication server

A system for authenticating an electronic device by means of an authentication server in order to authenticate a user of said electronic device. The system is adapted to perform an authentication based on a fictive payment transaction and includes the authentication server which is adapted to execute a fictive payment transaction with a predetermined transaction amount with said electronic device and during said execution to receive a first cryptogram from said electronic device; send said first cryptogram to a banking server; and receive from said banking server an acknowledgment if said first cryptogram is valid; when said fictive payment transaction has been executed, compute an authentication identification based on said electronic device's data; said electronic device which is a payment electronic device and which is adapted to execute said fictive payment transaction with said authentication server and during said execution to send said first cryptogram to said authentication server.. ... Gemalto Sa

05/03/18 / #20180123778

System and method for protecting a cryptographic device against fault attacks while performing cryptographic non-linear operations using linear error correcting codes

A system, method and computer-readable storage medium with instructions for protecting an electronic device against fault attack. Given a data represented as an input codeword of a systematic linear error correcting code, the technology provides the secure computation of the output codeword corresponding to the result of the non-linear function applied to this data. ... Gemalto Sa

04/19/18 / #20180109943

Device and method for controlling dirct access of a communication equipment to a virtual store of a network operator

. . A device is intended for controlling access of a communication equipment of a user to virtual stores of network operators accessible into servers. This device comprises a control means arranged, when this user provides the communication equipment of the user equipment with an access code associated to a virtual store of a network operator, for determining a communication identifier of a virtual store page corresponding to this access code and to data defining a context of the communication equipment into a table establishing correspondences between access codes and communication identifiers of pages of virtual stores providing offers corresponding to communication equipment contexts, then for triggering access by the communication equipment to the virtual store page associated to the determined communication identifier to allow the user to select an offer contained into this virtual store page.. ... Gemalto Sa

04/19/18 / #20180108017

A method to validate a dynamic security code in a payment transaction

This invention related to a method to validate a dynamic security code generated for a payment transaction, said method comprising the steps of: providing for a given payment transaction a dynamic security code associated to an identifier of said transaction; verifying using a verification memory if the provided dynamic security code has already been validated when associated to the same associated identifier; if not, verifying the validity of the provided dynamic security code; if the provided dynamic security code is valid, memorizing in the verification memory the provided dynamic security code, the associated identifier of the payment transaction.. . ... Gemalto Sa

04/19/18 / #20180107822

Method of managing a secure element

The invention is a method for managing a secure element that comprises an operating system and a software application including an executable part which is tied to the operating system through a plurality of links. The method comprises the following steps: on receipt of an un-map command, recording in a memory area of the secure element a description of said links using an intermediate language, replacing the operating system by a new operating system by keeping said memory area unchanged, on receipt of a re-map command by the secure element, restoring a new set of links between the executable part and the new operating system by using the description.. ... Gemalto Sa

04/19/18 / #20180107475

Method for modifying the execution of a platform-independent method of an integrated cercuit card

Modification of the execution of a platform-independent first method of an application within an integrated circuit card having a first non-volatile memory, a second rewritable non-volatile memory, a virtual machine and a processor unit, wherein said platform-independent first method includes a first operations sequence and a second operations sequence. Checking if there is a call within said platform-independent first method to a specific second method, having one parameter; —if there is such a call and if said specific second method is not platform-independent, checking if there is an alternate function associated to said platform-independent first method stored in a memory of said integrated circuit card; if there is an associated alternate function: executing said alternate function to replace said first operations sequence; executing the second operations sequence of said platform-independent first method; otherwise executing by the first operations sequence and the second operations sequence of said platform-independent first method.. ... Gemalto Sa

04/05/18 / #20180097781

Device for managing multiple accesses to a secure module of a system on chip of an apparatus

A device for managing multiple accesses to a secure module of a system on chip of an apparatus, and comprises a stream ciphering means arranged for computing on the fly and in a single pass an integrity check for data to be transferred between secure and non secure modules of the system on chip with a seed and an encryption key, and for encrypting/decrypting on the fly and in this single pass these data with the encryption key, and a control means for providing the encryption key and seed to the stream ciphering means and for requesting data transfer and retrieving status to the secure and non secure modules for allowing the transfer of encrypted/decrypted data between the secure and non secure modules.. . ... Gemalto Sa

03/29/18 / #20180091977

Method of managing access to a service

The invention is a method for managing access to a service wherein the method comprises the following steps: a client application sends to an application server a request to access the service by using credentials and a first anti-clone code, the application server performs a verification of the credentials and said first anti-clone code, the application server sends a second anti-clone code to the client application and deactivates said first anti-clone code only in case of successful verification, said second anti-clone code being required for the next attempt to access the service.. . ... Gemalto Sa

02/22/18 / #20180053083

A method for producing a radiofrequency device passive wire antenna

A method for producing a radiofrequency device having a first antenna circuit connected to a radiofrequency chip and a second antenna circuit associated with, or coupled to, the first circuit, the method including the following steps: formation of the first antenna circuit in the form of a conductive wire deposited in a guided manner on a first substrate; and formation of the second antenna circuit in the form of a conductive wire deposited on the same first substrate in a guided manner and at a calibrated distance from the first antenna circuit.. . ... Gemalto Sa

02/01/18 / #20180033301

Method for managing parking spaces on public streets

. . The invention relates to a method for managing on-street parking spaces. The method includes querying, by a unit of a vehicle, vehicle sensors about the occupancy status of a parking space around the vehicle, the setting up of a communication channel between the unit and a remote server, the authentication of the unit with the server, the sending of a message with a public encryption key by the server to the unit, the encryption of the geolocation data and the occupancy status, the sending of the encrypted data to server, the decryption by the server of the received encrypted data, the comparison of the geolocation data received with a database containing referenced parking spaces and the update in the database of the occupancy status of referenced parking spaces.. ... Gemalto Sa

01/25/18 / #20180027486

Method for switching from a first to a second mobile network operator and corresponding device

A device comprises a chip storing a first subscription relating to the first mobile network operator in a home country. The chip stores a second subscription relating to a second mobile network operator and associated with a preferred communication technology. ... Gemalto Sa

01/25/18 / #20180027410

Method for remote subscription management of an euicc, corresponding terminal

Remote subscription management of an euicc comprising a private key and a public certificate, the public certificate comprising information allowing a subscription manager server to decide if it can agree to manage the euicc. The method includes: establishing a secure channel between the terminal and the subscription manager server by using the public certificate and dedicated cryptographic services of the euicc; sendingto the subscription manager server a subscription management request; verifying, based on the information in the public certificate in the subscription manager server, whether the euicc is entitled to be managed by the subscription manager server and, if yes: performing a key establishment procedure between the subscription manager server and the euicc by using the euicc public certificate; establishing between the subscription manager server and the euicc a secure channel with the established keys; and, executing by the subscription manager server the subscription management request on the euicc.. ... Gemalto Sa

01/18/18 / #20180018665

Method and device for accessing a service

In a method for accessing a service, a device receives data. The device gets, based upon the received data, transaction data. ... Gemalto Sa

01/04/18 / #20180007537

Method for accessing a roaming device and corresponding proxy network

A roaming device sends, through a visited network and a proxy network, to a home network, an identifier for a first subscription. The home network sends, through the proxy network, to the visited network, data relating to the first subscription. ... Gemalto Sa

12/28/17 / #20170372186

Method for producing a single-sided electronic module including interconnection zones

The invention relates to a method for producing a module having an electronic chip including metallisations which are accessible from a first side of the metallisations and an integrated circuit chip which is arranged on the second side of the metallisations, opposite the first side. The method comprises the step of forming electrical interconnection elements which are separate from the metallisations, directly connecting the chip, and are arranged on the second side of the metallisations. ... Gemalto Sa

12/28/17 / #20170368868

Card with marbled visual effect and associated manufacturing process

The card comprises a first translucent or transparent substrate layer, preferably in pvc, and a second substrate layer, and a cracked layer of ink between the two substrate layers so as to allow the second substrate layer to show through the cracks of the layer of ink. The cracked layer of printing ink comprises mirror-effect ink, that reflects light through the first translucent or transparent substrate layer. ... Gemalto Sa

12/21/17 / #20170364711

Secure element

The invention relates to a secure element device comprising at least one processor, at least one communication interface, at least one memory ram and nvm and at least one bus access controller, wherein the bus access controller defines at least a first area pbl, a second area sbl and a secure area mz. The first area comprises a first loader program capable of loading a program package in the second area. ... Gemalto Sa

12/14/17 / #20170357826

System and method for obfuscating an identifier to protect the identifier from impermissible appropriation

A system and method of operating a database system to protect personal identifiers from being revealed. The system and method obfuscates personal identifiers using a secret value, storing in a database records containing the obfuscated personal identifier, storing the secret value in a identifier translation device, receiving at a request preparer a record request identifying a requested record using a non-obfuscated personal identifier, and operating the request preparer to direct the identifier translation device to translate the non-obfuscated personal identifier into an obfuscated personal identifier using the secret value stored in the identifier translation device and using the obfuscated personal identifier in a query to the database.. ... Gemalto Sa

11/30/17 / #20170346642

Method for authenticating attributes in a non-traceable manner and without connection to a server

. . . . The present invention relates to a method, for a provider entity belonging to a provider group, to authenticate its belonging to an attribute provider group to a verification entity in a non-traceable manner without necessitating to share secret or large constants compromising privacy. Both entities comprise at least one attribute group arborescence, this attribute group arborescence being shared by the provider entity and the verification entity when the provider entity has the attribute. ... Gemalto Sa

11/23/17 / #20170339634

Method and device for accessing an internet protocol multimedia subsystem type subsystem

The invention relates to a method for accessing an internet protocol multimedia subsystem type subsystem, said subsystem. According to the invention, a device is firstly connected to a mobile communication network, as a visited network, said first network. ... Gemalto Sa

10/26/17 / #20170310654

Method for accessing a service, corresponding first device, second device and system

A first device generates a first signature, by using complete transaction data received from a second device, a first algorithm and a first key, modifies at least one character from t complete transaction data and gets partial transaction data, and sends to the second device the partial transaction data. The second device requests a user to modify the partial transaction data by providing at least one character, as complementary data to the partial transaction data, gets, as request response from a user, at least one character to modify the partial transaction data, a corresponding result being proposed modified transaction data, generates a second signature by using the proposed modified transaction data, the first algorithm and the first key, and sends to the first device the second signature. ... Gemalto Sa

10/12/17 / #20170295449

Method for detecting dynamically that secure elements are eligible to an ota campaign and corresponding ota server

The invention concerns notably a method for detecting dynamically that secure elements are eligible to at least one ota campaign for updating these secure elements, each secure element cooperating with a telecommunication terminal in a telecommunication network, this updating being realized by an ota server. According to the invention, the method consists in: detecting which secure elements have not polled the ota server for a given time frame; checking eligibility for these secure elements; updating the secure elements that did not poll the ota server for this given time frame and that are eligible to the ota campaign by pushing messages to these secure elements.. ... Gemalto Sa

09/28/17 / #20170279600

System and method for providing defence to a cryptographic device against side-channel attacks targeting the extended euclidean algorithm during decryption operations

A system, method and computer-readable storage medium for decrypting a code c using a modified extended euclidean algorithm (eea) having an iteration loop independent of the hamming weight of inputs to the eea and performing a fixed number of operations regardless of the inputs to the eea thereby protecting a cryptographic device performing the decryption from side-channel attacks.. . ... Gemalto Sa

09/07/17 / #20170257211

System and method for one-time chinese-remainder-theorem exponentiation for cryptographic algorythms

A system, method and computer-readable storage medium with instructions for protecting an electronic device against fault attack. The technology includes operating the electronic device to determine two half-size exponents, dp and dq, from the exponent d; to split the base m into two sub-bases mp and mq determined from the base m; and to iteratively compute a decryption result s by repeatedly multiplying an accumulator a by m, mp, mq or 1 depending on the values of the i-th bit of dp and dq for each iteration i′. ... Gemalto Sa

08/24/17 / #20170244691

Method of sending data from a secure token to a distant server

The invention is a method for managing a response from an application embedded in a secure token acting as an uicc, in response to a command requesting opening a proactive session. The command is sent by an applicative server to the secure token via an ota server providing a security layer. ... Gemalto Sa

08/24/17 / #20170242999

System and method for protecting a device against attacks on processing flow using a code pointer complement

A system, method and computer-readable storage medium with instructions for operating a processor of an electronic device to protect against unauthorized manipulation of the code pointer by maintaining and updating a code pointer complement against which the code pointer may be verified. Other systems and methods are disclosed.. ... Gemalto Sa

08/10/17 / #20170228556

Method of managing several profiles in a secure element

The invention is a method for managing profiles in a secure element that has several profiles comprising files organized in respective logical tree structures comprising respective root files. The root files have identifiers whose values are different from 0x3f00 and the method comprises the step of enabling browsing of the logical tree structure comprising a targeted root file in response to the receipt of a select file command aiming at selecting said targeted root file.. ... Gemalto Sa

08/03/17 / #20170222806

Method to manage subscriptions in a provisioning server

The present invention relates to a method to manage subscriptions in a provisioning server (ps) able to communicate with a hardware security module (hsm) having an hsm key (k). Said method being such that the hsm comprising a load and a reload function, the secure device key ((ke1)k) and the storage key ((ks)k) as encrypted and stored are provided (s1) to one of said functions, said functions outputting, the storage key ((ks)ke1)k) encrypted using the provided secure device (se1) key (ke1) and the hsm key k, and an apdu_putkey command ((apdu_putkey((ke1))ke1), encrypted using the provided secure device (se1) key (ke1), to put the retrieved storage key ((ks)ke1) also encrypted using the provided secure device key (ke1), the storage key as previously stored ((ks)k) is overwritten (s6) with the storage key (((ks)ke1)k) encrypted using the secure device key (ke1) and the hsm key (k) returned by the function.. ... Gemalto Sa

07/27/17 / #20170214524

Method, server and telecommunications system for establishing, through an ota server, a secured communication channel between an administrative agent comprised in a device and a third party server

A method for establishing a first secured communication channel between an administrative agent in a device and a distant server, the device comprising a secure element communicating with the administrative agent, the secure element being administrated through the administrative agent by the distant server, the administrative agent being administrated by a third party server through a second secured communication channel, the distant server and the third party server being connected through a third secured channel. The third party server requests, from the distant server, an operation on the secure element and a one-time psk. ... Gemalto Sa

06/29/17 / #20170185881

Data carrier

The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising personalized data, the data carrier comprising a first side and a second side opposite to the first side and at least one recording layer provided with at least a first piece of authentication data of said authentication data, an array of lenticular elements being arranged at the first side of the data carrier to provide from a first predetermined angle of view an image of said at least first piece of authentication data. In order that the data carrier according to the invention shall not suffer from greyness and in order to make the data carrier esthetically appealing and manufacture it at low costs, the recording layer is a non-doped transparent pvc layer comprising said at least first piece of authentication data.. ... Gemalto Sa

06/22/17 / #20170178991

Method for producing electronic devices

The invention relates to a method for producing an electronic device including at least one electronic component in a substrate body, said method including at least one step of transferring said electronic component to a surface of a removable dielectric substrate, of delivering a protective resin on said electronic component, and of transferring, onto the protective resin, a reinforcement disc having a main front surface with a peripheral contour, wherein the protective resin extends up to the peripheral contour of the disc in order to form, together with the disc, the peripheral side contours and the final layer of the substrate body of the device.. . ... Gemalto Sa

06/01/17 / #20170154255

Data carrier

. . The present invention relates to a data carrier, especially a security document, such as an identification card, comprising authentication data comprising personalized data, the data carrier comprising a first side and a second opposite side, and a plurality of layers comprising personalized data, a transparent recording layer, a transparent plastic upper layer and an opaque layer between the recording layer and the upper layer. To make the data carrier very difficult to forge and to enable that it can be manufactured with ordinary machines and without need of expensive materials, the opaque layer comprises a window a first piece of authentication data of said authentication data being divided between said plurality of layers so that the first piece of authentication data is to at least one part thereof, provided above or on the first side of the opaque layer facing the upper layer, at least a rest part of the first piece of authentication data being in the form of laser engraved markings beneath the window and provided in the recording layer, or in a plurality of transparent recording layers of said plurality of layers.. ... Gemalto Sa

04/13/17 / #20170104739

Method to manage a one time password key

The present invention relates to a method to manage a one time password key, referenced otp key, used in an otp algorithm in a user device having access to an unsafe storage including the steps of retrieving a personal identification number, named pin, of a user of the user device, deriving a symmetric key from the pin, encrypting the otp key using the derived symmetric key, storing the encrypted otp key in the unsafe storage, decrypting the otp key using the derived symmetric key, and generating a next otp key using an incremental parameter, wherein the start value of the incremental parameter of the otp key generation is random.. . ... Gemalto Sa

02/23/17 / #20170053140

Dynamic change of security configurations

The present invention relates to a method to provide a dynamic change of security configurations in an integrated circuit product adapted to execute at least a given critical process and susceptible to be attacked. The method comprises the steps of tracking successive executions of the given critical process, and after a given number of such executions, triggering a change of the security configuration.. ... Gemalto Sa

02/09/17 / #20170039464

A method for fabricating an electronic/electrical circuit device

The invention relates to a method for fabricating an electronic device comprising an electronic/electrical circuit, wherein it comprises the following steps: formation of a support-body comprising a battery inside; making of a cavity emerging on the surface of the support-body, said cavity revealing connection terminals of the battery; connection of an electronic/electrical circuit to the battery via the terminals situated in said cavity; exchanging of data in the electronic/electrical circuit by electrical contact. The invention also relates to the corresponding electronic device.. ... Gemalto Sa

01/26/17 / #20170024639

Data carrier

The present invention relates to a data carrier, especially a security document, such as an identification card, e.g. A passport or a driving license, a credit card and a bank card, the data carrier comprising authentication data comprising personalized data, and as a security feature, an array of lenticular elements being arranged to provide only from predetermined angles of view an image of at least a piece of authentication data of said authentication data. ... Gemalto Sa

01/19/17 / #20170019256

Method to authenticate two devices to establish a secure channel

The present invention relates to a method to authenticate two devices to establish a secure channel, one belonging to a first group of devices, the second belonging to a second group of devices, in a non-traceable manner without the need to share a secret, each group being authenticated by an authority that stores a group secret key into the devices under its authority. The method uses a set of authentication tokens, one for each of the other groups with which the device is intended to communicate, said authentication token comprising at least a random number and a cipher of at least this random number by the secret key of each of these other groups, said authentication tokens being further renewed at each communication with a device from another group.. ... Gemalto Sa

01/19/17 / #20170017811

Method and system for optimized reading of a radio frequency communication transponder with the aid of a passive resonant circuit

The invention relates to a method of reading rf transponders disposed in one and the same magnetic interrogation field, in which a magnetic coupling of the transponders is ensured with a passive resonant circuit during reading. The method is distinguished in that the passive antenna of the resonant circuit is associated with at least one transponder antenna, and the passive resonant circuit is tuned in such a way that the resonant frequency resulting from the association corresponds to one of the frequencies of the emission side bands of the transponder to be read. ... Gemalto Sa

01/19/17 / #20170015131

Secure laser marking personalisation

The present invention relates to a method (100) for personalizing a document, said document comprising a support comprising printed patterns (201, 202), wherein said method (100) comprises generating at least a laser pulse on said support for carbonizing at least a printed pattern.. . ... Gemalto Sa

01/12/17 / #20170011381

Electronic transaction method and system via a portable accessory

The invention relates to a method for carrying out an electronic transaction between a main communication apparatus and a transaction terminal, wherein a smart portable accessory is provided, which has a different format from a standardized chip card format and is capable of relaying the transaction or of representing said main apparatus relative to a transaction terminal; and the transaction is carried out by only presenting said accessory, instead of the main apparatus, to the transaction terminal. The invention also relates to the corresponding system.. ... Gemalto Sa

01/05/17 / #20170006464

Method for accessing a service and a corresponding device

A first device stores a subscription manager and at least two subscriptions. A first subscription is active and a second subscription is non-active. ... Gemalto Sa








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Gemalto Sa in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Gemalto Sa with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###