Oberthur Technologies


Oberthur Technologies is a French secure technology company, providing digital security solutions for Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control.As of 2008, Oberthur's revenue was €882 million.Oberthur Technologies is the successor of the Oberthur printing which was founded in 1842 by the master printer and lithographer, François Charles Oberthur. Wikipedia.

Time filter
Source Type

Oberthur Technologies | Date: 2017-04-05

The invention relates to a method implemented by a profile management server (500) for managing the profiles (P1, P2, PROV) of a secure entity. Said method comprises: a step (S25) of sending a message (302) to said secure entity in order to modify the active profile of said entity; a step (V50) of initialising and initiating a time-recording meter (TIM); and in the event that said server (500) does not receive a message indicating the active profile in said secure entity (100) before the expiry of a predetermined period starting from said initiation: a step of initiating an audit procedure (V100) in order to determine the effectively active profile in said secure entity (100).

Oberthur Technologies | Date: 2017-01-04

An authentication method is performed between a first party (10) and a second party (20). The method comprises: determining a challenge (11); (ii) sending the challenge to the second party (20); receiving a response from the second party (20) comprising a second cryptogram (C2; ARPC); computing (17) a first cryptogram (C1) using the challenge and the key of the first party; determining (18) if the first cryptogram (C1) matches the second cryptogram (C2; ARPC) received from the second party (20). If the first cryptogram (C1) does not match the second cryptogram (C2; ARPC), the method further comprises performing a computation (19) using the first cryptogram (C1; ARQC) and the second cryptogram (C2; ARPC); and comparing (19) a result of the computation with a stored set of results to recover a first data element (D1; OPn) carried by the second cryptogram (C2; ARPC).

Oberthur Technologies | Date: 2017-02-10

The invention relates to a bank card (100) comprising a presentation surface of a pictogram (120) coding at least one item of information for executing a transaction.

Oberthur Technologies | Date: 2017-03-22

A method of communicating between a terminal (20) and a secure element (10) comprises determining a challenge and sending the challenge (122) to the terminal (20). The secure element receives a response (124, 126) from the terminal (20) comprising the challenge and personal identification number, PIN, data. The response is encrypted with a key. The secure element determines (132) if the challenge received in the response matches the challenge sent to the terminal (20). If the challenge received in the response does not match the challenge sent to the terminal (20), the secure element performs a computation (133) using the received challenge and the sent challenge. The secure element recovers a data element (136) carried by the response. The data element (136) is indicative of an action to be performed by the secure element. The data element can be an encrypted operation code.

Oberthur Technologies | Date: 2017-03-29

The invention concerns a method for modifying the profile in a device (D) comprising a communication module for communicating on a communication network, the device (D) being provided with a microcircuit storing connection data used by the communication module and associated with a profile, characterised in that it comprises the following steps: reception, by the microcircuit and via the communication module, of a request to deactivate (E6) the profile; transmission, by the microcircuit, of a first message (E10) to the device (D); transmission, by the device (D) and to the microcircuit, of a response (E14) indicative of the existence of a critical situation; following the receipt of said response (E14) by the microcircuit, implementation of a time delay mechanism (E18); upon expiry of the time delay (E18), transmission, by the microcircuit and to the device (D), of a second message (E22) resulting in the deactivation of the profile. An associated device and microcircuit are also described.

The invention relates to the securing of the loading of data originating from an external device into a code memory area defined by an initial program of the secure element and any modification of which is controlled solely by the latter. When the external device obtains data to be transmitted to the secure element, the latter simulates an image of the code memory area such as it would be modified by the loading of these data. A signature is calculated on the basis of the simulated image, then dispatched to the secure element with the data. The initial program of the secure element compares a signature that it has calculated over the whole of the code memory area after the actual loading of the data, with the signature received from the external device. The identity between these signatures makes it possible to ensure that the code memory area does indeed conform to the image simulated by the external device, and hence is indeed unimpaired.

Oberthur Technologies | Date: 2017-03-15

The invention relates to a method for generating a session key (SK) for a secure data exchange between a first electronic entity (H) and a second electronic entity (C), characterised by the following steps: determining (E2), by means of the first electronic entity (H), a first verification word (PRM); transmitting (E4) the first verification word (PRM) from the first electronic entity (H) to the second electronic entity (C); incrementing (E14) a counter (SQC), by means of the second electronic entity (C), only when the first verification word (PRM) is identical to a second verification word (PRM*); generating (E18) a session key (SK), by means of the electronic entity (C), on the basis of the value of the counter (SQC). The invention also provides an electronic entity (C) designed such as to exchange data with another electronic entity (H).

Oberthur Technologies | Date: 2017-05-03

A secure element (10) performs (40) a secure transaction by communicating with an external terminal (20). The transaction comprises a plurality of events when the secure element receives a command message from the external terminal and sends, in reply, a response message to the external terminal. During the secure transaction the secure element (10) determines (43) a time interval between sending a response message to the external terminal (20) and receiving a subsequent command message from the external terminal (20) and stores (47) log data indicative of the determined time interval at the secure element (10). The secure element (10) may send the stored log data to the external terminal (20) or perform (48) a security action at the secure element based on the log data. An external entity, such as an authorisation entity (30), may receive the log data and perform a security action based on analysis of the log data.

Oberthur Technologies | Date: 2017-02-23

Devices and methods for masking and unmasking sensitive data, based on a standard cryptographic algorithm defining a ciphering algorithm, and a deciphering algorithm using more resources than the ciphering algorithm are described. The masking of sensitive data is done by applying the deciphering algorithm to the sensitive data to obtain masked sensitive data. The unmasking of the masked sensitive data is done by applying the ciphering algorithm to the masked sensitive data to obtain sensitive data in plain form.

Oberthur Technologies | Date: 2017-05-10

The invention relates to an antenna carrier intended for being built into an electronic document, the carrier comprising: a first plastic substrate (30), defined by first and second opposing surfaces (30a, 30b) defining therebetween a substrate body (30), an antenna comprising at least one turn (26a) which extends between two ends (26b, 26c), the antenna being made up of a wire embedded in the body of the first substrate (30) from the first surface (30a), the two ends (26b, 26c) each having a zigzag shape made up of at least two straight portions (32) and two bends (34). The bends (34) are embedded more deeply than the straight portions (32) in the body of the first substrate (30) with respect to the first surface (30a).

Loading Oberthur Technologies collaborators
Loading Oberthur Technologies collaborators