Morpho

India
India
SEARCH FILTERS
Time filter
Source Type

Patent
Morpho | Date: 2016-06-09

A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y^(2)=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying: f(X1(t))f(X2(t))f(X3(t))=U(t)^(2 )in Fq, with q=3 mod 4. Firstly a value of the parameter t is obtained. Next, the point P is determined by: (i) calculating X1=X1(t), X2=X2(t), X3=X3(t) and U=U(t); (ii) if the term f(X1)f(X2) is a square, then testing whether the term f(X3) is a square in Fq and if so calculating the square root of f(X3) in order to obtain the point P(X3); (iii) otherwise, testing whether the term f(X1) is a square and, if so, calculating the square root of f(X1) in order to obtain the point P(X1); (iv) otherwise, calculating the square root of f(X2) in order to obtain the point P(X2). This point P is useful in a cryptographic application.


Patent
Morpho | Date: 2016-06-09

A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y^(2)=f(X) and from polynomials satisfying: f(X_(1)(t))f(X_(2)(t))=U(t)^(2 )in the finite body Fq, irrespective of the parameter t, q=3 mod 4. A value of the parameter t is obtained and the point P is determined by: (i) calculating X_(1)=X_(1)(t), X_(2)=X_(2)(t) and U=U(t); (ii) testing whether the term f(X1) is a squared term in the finite body Fq and, if so, calculating the square root of the term f(X1), the point P having X_(1 )as abscissa and Y_(1), the square root of the term f(X_(1)), as ordinate; (iii) otherwise, calculating the square root of the term f(X_(2)), the point P having X_(2), as abscissa and Y_(2), the square root of the term f(X_(2)), as ordinate. The point P is useful in encryption, scrambling, signature, authentication or identification cryptographic applications.


Method for deploying an authentication application in a secure element of a communication terminal comprising a non-secure processing unit executing a program for calling the authentication applications. The method comprises the step of transferring via at least one communication network data between a first trusted server associated with a provider of the security element so as to execute a first program for managing the security element, a second trusted server associated with at least one provider of authentication applications so as to execute a program for managing authentication applications, and the communication terminal, so as to create in the secure element a secure domain and install the authentication application therein.


Patent
Morpho | Date: 2016-06-16

A biometric identification method comprising the steps of comparing a candidate print with a reference print and validating identification as a function of a number of characteristics that are common in the two prints and of a predetermined validation threshold, the method being characterized in that it comprises the steps of altering the biometric characteristics of one of the two prints prior to comparison and of taking the alteration into account during validation.


An image correction method includes: estimating a 3D model of an object as when an imaging device takes an image of the object; calculating the light intensity of each point of a simulated image as it would be taken by the imaging device, using the estimated 3D model of the object, a model of illumination of the object illuminated by a lighting system that illuminates the object, a model of reflection on a surface of the object, and a model of the imaging device, to obtain a simulated image of the object; and correcting the taken image by modifying the light intensity of each point on the taken image or on at least one area of interest of the taken image, according to the light intensity of the corresponding point in the simulated image or the respective light intensities of points adjacent to the corresponding point in the simulated image.


Disclosed is a checking device that is intended to check the authenticity of a fingerprint of a finger and which includes, among other things, a capture system for capturing an image of the finger and of the fingerprint, and acquisition means for acquiring a three-dimensional model of the finger. The checking device also includes means for determining the core on the image of the fingerprint, for locating the crown of the three-dimensional model, for determining the orientation and position of the end of the finger and for determining the relative positions of the end, the crown and the core. From these elements, the checking device can decide whether the fingerprint is real or false.


Patent
Morpho | Date: 2016-04-15

A method is proposed for managing a memory (2) of an electronic card (1), the electronic card (1) being able to execute a first program (P1) and a second program (P2), the method comprising steps of:


The invention deals with a method to control deployment of a program to be executed across a cluster of machines (M1-Mn), the method comprising steps of:


The invention relates to a method for generating a message signature intended to be validated by a verifier server, a client device being configured to hold a private key and a corresponding public key and comprising steps of:


Patent
Morpho | Date: 2016-01-07

The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d_(1), . . . , d_(n)) corresponding to reference entities and comprising:

Loading Morpho collaborators
Loading Morpho collaborators