Oberthur Technologies is a French secure technology company, providing digital security solutions for Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control.As of 2008, Oberthur's revenue was €882 million.Oberthur Technologies is the successor of the Oberthur printing which was founded in 1842 by the master printer and lithographer, François Charles Oberthur. Wikipedia.
Oberthur Technologies | Date: 2017-03-22
A method of communicating between a terminal (20) and a secure element (10) comprises determining a challenge and sending the challenge (122) to the terminal (20). The secure element receives a response (124, 126) from the terminal (20) comprising the challenge and personal identification number, PIN, data. The response is encrypted with a key. The secure element determines (132) if the challenge received in the response matches the challenge sent to the terminal (20). If the challenge received in the response does not match the challenge sent to the terminal (20), the secure element performs a computation (133) using the received challenge and the sent challenge. The secure element recovers a data element (136) carried by the response. The data element (136) is indicative of an action to be performed by the secure element. The data element can be an encrypted operation code.
Oberthur Technologies | Date: 2017-01-04
An authentication method is performed between a first party (10) and a second party (20). The method comprises: determining a challenge (11); (ii) sending the challenge to the second party (20); receiving a response from the second party (20) comprising a second cryptogram (C2; ARPC); computing (17) a first cryptogram (C1) using the challenge and the key of the first party; determining (18) if the first cryptogram (C1) matches the second cryptogram (C2; ARPC) received from the second party (20). If the first cryptogram (C1) does not match the second cryptogram (C2; ARPC), the method further comprises performing a computation (19) using the first cryptogram (C1; ARQC) and the second cryptogram (C2; ARPC); and comparing (19) a result of the computation with a stored set of results to recover a first data element (D1; OPn) carried by the second cryptogram (C2; ARPC).
Oberthur Technologies | Date: 2017-05-03
A secure element (10) performs (40) a secure transaction by communicating with an external terminal (20). The transaction comprises a plurality of events when the secure element receives a command message from the external terminal and sends, in reply, a response message to the external terminal. During the secure transaction the secure element (10) determines (43) a time interval between sending a response message to the external terminal (20) and receiving a subsequent command message from the external terminal (20) and stores (47) log data indicative of the determined time interval at the secure element (10). The secure element (10) may send the stored log data to the external terminal (20) or perform (48) a security action at the secure element based on the log data. An external entity, such as an authorisation entity (30), may receive the log data and perform a security action based on analysis of the log data.
Oberthur Technologies | Date: 2017-03-15
The invention relates to a method for generating a session key (SK) for a secure data exchange between a first electronic entity (H) and a second electronic entity (C), characterised by the following steps: determining (E2), by means of the first electronic entity (H), a first verification word (PRM); transmitting (E4) the first verification word (PRM) from the first electronic entity (H) to the second electronic entity (C); incrementing (E14) a counter (SQC), by means of the second electronic entity (C), only when the first verification word (PRM) is identical to a second verification word (PRM*); generating (E18) a session key (SK), by means of the electronic entity (C), on the basis of the value of the counter (SQC). The invention also provides an electronic entity (C) designed such as to exchange data with another electronic entity (H).
Oberthur Technologies | Date: 2017-04-05
The invention relates to a method implemented by a profile management server (500) for managing the profiles (P1, P2, PROV) of a secure entity. Said method comprises: a step (S25) of sending a message (302) to said secure entity in order to modify the active profile of said entity; a step (V50) of initialising and initiating a time-recording meter (TIM); and in the event that said server (500) does not receive a message indicating the active profile in said secure entity (100) before the expiry of a predetermined period starting from said initiation: a step of initiating an audit procedure (V100) in order to determine the effectively active profile in said secure entity (100).
Oberthur Technologies | Date: 2017-02-10
The invention relates to a bank card (100) comprising a presentation surface of a pictogram (120) coding at least one item of information for executing a transaction.
Oberthur Technologies | Date: 2017-05-10
The invention relates to an antenna carrier intended for being built into an electronic document, the carrier comprising: a first plastic substrate (30), defined by first and second opposing surfaces (30a, 30b) defining therebetween a substrate body (30), an antenna comprising at least one turn (26a) which extends between two ends (26b, 26c), the antenna being made up of a wire embedded in the body of the first substrate (30) from the first surface (30a), the two ends (26b, 26c) each having a zigzag shape made up of at least two straight portions (32) and two bends (34). The bends (34) are embedded more deeply than the straight portions (32) in the body of the first substrate (30) with respect to the first surface (30a).
Oberthur Technologies | Date: 2017-03-29
The invention concerns a method for modifying the profile in a device (D) comprising a communication module for communicating on a communication network, the device (D) being provided with a microcircuit storing connection data used by the communication module and associated with a profile, characterised in that it comprises the following steps: reception, by the microcircuit and via the communication module, of a request to deactivate (E6) the profile; transmission, by the microcircuit, of a first message (E10) to the device (D); transmission, by the device (D) and to the microcircuit, of a response (E14) indicative of the existence of a critical situation; following the receipt of said response (E14) by the microcircuit, implementation of a time delay mechanism (E18); upon expiry of the time delay (E18), transmission, by the microcircuit and to the device (D), of a second message (E22) resulting in the deactivation of the profile. An associated device and microcircuit are also described.
Oberthur Technologies | Date: 2017-02-01
The invention relates to the securing of the loading of data originating from an external device into a code memory area defined by an initial program of the secure element and any modification of which is controlled solely by the latter. When the external device obtains data to be transmitted to the secure element, the latter simulates an image of the code memory area such as it would be modified by the loading of these data. A signature is calculated on the basis of the simulated image, then dispatched to the secure element with the data. The initial program of the secure element compares a signature that it has calculated over the whole of the code memory area after the actual loading of the data, with the signature received from the external device. The identity between these signatures makes it possible to ensure that the code memory area does indeed conform to the image simulated by the external device, and hence is indeed unimpaired.
Agency: European Commission | Branch: H2020 | Program: IA | Phase: DS-02-2014 | Award Amount: 5.34M | Year: 2015
The SpeechXRays project will develop and test in real-life environments a user recognition platform based on voice acoustics analysis and audio-visual identity verification. SpeechXRays will outperform state-of-the-art solutions in the following areas: Security: high accuracy solution (cross over accuracy1 of 1/100 ie twice the commercial voice/face solutions) Privacy: biometric data stored in the device (or in a private cloud under the responsibility of the data subject) Usability: text-independent speaker identification (no pass phrase), low sensitivity to surrounding noise Cost-efficiency: use of standard embedded microphone and cameras (smartphones, laptops) The project will combine and pilot two proven techniques: acoustic driven voice recognition (using acoustic rather than statistical only models) and multi-channel biometrics incorporating dynamic face recognition (machine vision analysis of speech, lip movement and face). The vision of the SpeechXRays project is to provide a solution combining the convenience and cost-effectiveness of voice biometrics, achieving better accuracies by combining it with video, and bringing superior anti-spoofing capabilities. The technology will be deployed on 2000 users in 3 pilots: a workforce use case, an eHealth use case and a consumer use case. The project lasts 36 months and is coordinated by world leader in digital security solutions for the mobility space.