Oberthur Technologies is a French secure technology company, providing digital security solutions for Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control.As of 2008, Oberthur's revenue was €882 million.Oberthur Technologies is the successor of the Oberthur printing which was founded in 1842 by the master printer and lithographer, François Charles Oberthur. Wikipedia.

Time filter

Source Type

A method of personalization for at least two cards (10), each card including a first side, a second side, and a peripheral surface, includes the following steps: forming a pile (20) of at least two cards by stacking the first side or the second side of an article (n) such that the first surface or the second surface of the following card (n+1) is in contact with the first side or the second side of the card (n); aligning, via an alignment device (32, 34) at least one element of the peripheral surface of the card (n) with at least one element of the peripheral surface of the following card (n+1) such that at least one element of the set of peripheral surfaces of each card forms at least one uniform surface; applying, via an application device, at least one product on at least one element of the uniform surface.

Devices and methods for managing a mobile communications profile stored in a nonvolatile memory of a secure element and performed by the secure element are disclosed. The devices and methods may include operations such as reading the state of a flag stored in the nonvolatile memory of the secure element and indicating whether the profile may be deleted; determining the active or inactive state of the profile; and if the flag indicates that the profile may be deleted and if it is determined that the profile is inactive, then deleting the profile.

Oberthur Technologies | Date: 2017-03-22

A method of communicating between a terminal (20) and a secure element (10) comprises determining a challenge and sending the challenge (122) to the terminal (20). The secure element receives a response (124, 126) from the terminal (20) comprising the challenge and personal identification number, PIN, data. The response is encrypted with a key. The secure element determines (132) if the challenge received in the response matches the challenge sent to the terminal (20). If the challenge received in the response does not match the challenge sent to the terminal (20), the secure element performs a computation (133) using the received challenge and the sent challenge. The secure element recovers a data element (136) carried by the response. The data element (136) is indicative of an action to be performed by the secure element. The data element can be an encrypted operation code.

Oberthur Technologies | Date: 2017-01-04

An authentication method is performed between a first party (10) and a second party (20). The method comprises: determining a challenge (11); (ii) sending the challenge to the second party (20); receiving a response from the second party (20) comprising a second cryptogram (C2; ARPC); computing (17) a first cryptogram (C1) using the challenge and the key of the first party; determining (18) if the first cryptogram (C1) matches the second cryptogram (C2; ARPC) received from the second party (20). If the first cryptogram (C1) does not match the second cryptogram (C2; ARPC), the method further comprises performing a computation (19) using the first cryptogram (C1; ARQC) and the second cryptogram (C2; ARPC); and comparing (19) a result of the computation with a stored set of results to recover a first data element (D1; OPn) carried by the second cryptogram (C2; ARPC).

Agency: Cordis | Branch: H2020 | Program: IA | Phase: DS-02-2014 | Award Amount: 5.34M | Year: 2015

The SpeechXRays project will develop and test in real-life environments a user recognition platform based on voice acoustics analysis and audio-visual identity verification. SpeechXRays will outperform state-of-the-art solutions in the following areas: Security: high accuracy solution (cross over accuracy1 of 1/100 ie twice the commercial voice/face solutions) Privacy: biometric data stored in the device (or in a private cloud under the responsibility of the data subject) Usability: text-independent speaker identification (no pass phrase), low sensitivity to surrounding noise Cost-efficiency: use of standard embedded microphone and cameras (smartphones, laptops) The project will combine and pilot two proven techniques: acoustic driven voice recognition (using acoustic rather than statistical only models) and multi-channel biometrics incorporating dynamic face recognition (machine vision analysis of speech, lip movement and face). The vision of the SpeechXRays project is to provide a solution combining the convenience and cost-effectiveness of voice biometrics, achieving better accuracies by combining it with video, and bringing superior anti-spoofing capabilities. The technology will be deployed on 2000 users in 3 pilots: a workforce use case, an eHealth use case and a consumer use case. The project lasts 36 months and is coordinated by world leader in digital security solutions for the mobility space.

Oberthur Technologies | Date: 2016-06-29

A server (20) comprises a first server (S0) configured to receive requests and a plurality of second servers (S1-SN) configured to service requests. A method of client-server communication comprises receiving, at the first server (S0), a request (31) from the client and allocating the request to one of the second servers (Sn). The server (20) determines (32, 32A) if the allocated second server (Sn) can provide a response to the request within a predetermined time period. If the allocated second server (Sn) cannot provide a response to the request within the predetermined time period it sends a reply (33) to the client indicating when the server system can provide a response to the request and comprising an identifier of the allocated second server (Sn). Server (Sn) generates (38) a response to the request. Server (Sn) receives a callback message (37) from the client. Server (Sn) sends the response (39) to the client.

Oberthur Technologies | Date: 2016-03-30

A Serial Peripheral Interface (20) connects a master device (10) and at least one slave device (1-3). The Serial Peripheral Interface (20) comprises a slave select line (25). The slave device (1) can signal an interrupt request to the master device (10) by changing a state of the slave select line (25) from a first state indicative of an inactive state to a second state indicative of an active state. The slave select line (25) can be connected to an input/output stage (52) of the slave device (1) which: allows the slave select line (25) to remain in the first state if the master device (10) or the slave device (1) does not change the state of the slave select line (25); and allows the slave select line (25) to change to the second state if the master device (10) or the slave device (1) wants to change the state of the slave select line (25).

Oberthur Technologies | Date: 2016-05-25

A secure element (30) has a local store of file property data (50). A method of preparing a script to send to the secure element (30) to remotely provision a profile (31) at the secure element comprising preparing the script such that the script lacks a command to create a file if the local store of file property data (50) at the secure element includes file property data which can be used to locally create that file. A script may include an entry of reduced length which refers to the file to be locally created, such as a SELECT FILE command and an identifier of the file.

Oberthur Technologies | Date: 2016-02-16

An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly.

Oberthur Technologies | Date: 2016-03-02

A mobile device (10) receives a first token part (TOK) via a first communications channel (31) and receives a second token part (RND) via a second communications channel (33). The mobile device (10) stores the first token part (TOK) and the second token part (RND) at the mobile device (10). The first token part (TOK) and the second token part (RND) are for use in a token-based transaction between the mobile device (10) and an external device (40). The first token part (TOK) and the second token part (RND) are required for the token-based transaction. The second token part (RND) can have a period of validity. The mobile device (10) can receive a plurality of second token parts (RND) at spaced apart times. The second communications channel (33) can be a channel requiring authentication of a secure element at the mobile device (10), such as a Short Message Service (SMS) channel.

Loading Oberthur Technologies collaborators
Loading Oberthur Technologies collaborators