Time filter

Source Type


Oberthur Technologies is a French secure technology company, providing digital security solutions for Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control.As of 2008, Oberthur's revenue was €882 million.Oberthur Technologies is the successor of the Oberthur printing which was founded in 1842 by the master printer and lithographer, François Charles Oberthur. Wikipedia.

An electronic appliance includes a first processor and a secure electronic entity equipped with a second processor, the electronic appliance being designed to operate by the execution by the first processor of a trusted operating system. An element situated outside the secure electronic entity and distinct from the trusted operating system is designed to trigger the execution of an application by the second processor; the application executed by the second processor is designed to request the implementation of a service of the trusted operating system. A method implemented in such an electronic appliance is also described.

Oberthur Technologies | Date: 2015-07-14

Disclosed are methods performed by, and devices including, a microcircuit card that makes it possible to set up a communication session between the microcircuit card and a contactless communication module via an SWP interface. An implementation of the method comprises: an initialization phase for the SWP interface; and a negotiation phase between the microcircuit card and the contactless communication module, the contactless communication module being suitable for maintaining the power supply of said microcircuit card during these phases. Among other reasons, the method is remarkable in that the microcircuit card prolongs said negotiation phase until the end of a procedure internal to the microcircuit card.

Agency: Cordis | Branch: H2020 | Program: IA | Phase: DS-02-2014 | Award Amount: 5.34M | Year: 2015

The SpeechXRays project will develop and test in real-life environments a user recognition platform based on voice acoustics analysis and audio-visual identity verification. SpeechXRays will outperform state-of-the-art solutions in the following areas: Security: high accuracy solution (cross over accuracy1 of 1/100 ie twice the commercial voice/face solutions) Privacy: biometric data stored in the device (or in a private cloud under the responsibility of the data subject) Usability: text-independent speaker identification (no pass phrase), low sensitivity to surrounding noise Cost-efficiency: use of standard embedded microphone and cameras (smartphones, laptops) The project will combine and pilot two proven techniques: acoustic driven voice recognition (using acoustic rather than statistical only models) and multi-channel biometrics incorporating dynamic face recognition (machine vision analysis of speech, lip movement and face). The vision of the SpeechXRays project is to provide a solution combining the convenience and cost-effectiveness of voice biometrics, achieving better accuracies by combining it with video, and bringing superior anti-spoofing capabilities. The technology will be deployed on 2000 users in 3 pilots: a workforce use case, an eHealth use case and a consumer use case. The project lasts 36 months and is coordinated by world leader in digital security solutions for the mobility space.

In an electronic device designed to function in a trusted execution environment (TEE), because of the execution of a trusted operating system by a processor of the electronic device, or in a rich execution environment (REE), a method of loading files into random access memory includes the following steps: An associated electronic device is also proposed.

Oberthur Technologies | Date: 2015-10-09

An intermediary third-party receives, from a master device, a batch of pre-generated secure commands; plays it so as to send sequentially, to a slave device, the commands. The batch includes an initial command indicating the establishment of a channel secured with a session key dependent on a sequence counter, and second commands protected by a MAC code that is a function of the session key. An update of the sequence counter in non-volatile memory of the slave on each new establishment of a secure channel renders the pre-generated batch obsolete by virtue of a new session key. In order to allow the batch to be replayed, the invention provides for each update value of the counter to be temporarily stored in volatile memory, and for the current value to be overwritten in non-volatile memory on predefined events, including a test counter reaching a maximum number of replays.

Discover hidden collaborations