Giesecke+devrient Mobile Security Germany GmbH

Allemagne

Retour au propriétaire

1-100 de 124 pour Giesecke+devrient Mobile Security Germany GmbH Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 84
        Marque 40
Juridiction
        États-Unis 58
        International 38
        Europe 17
        Canada 11
Date
Nouveautés (dernières 4 semaines) 6
2025 octobre (MACJ) 6
2025 septembre 1
2025 août 3
2025 juillet 3
Voir plus
Classe IPC
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné 24
H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles 17
H04W 8/20 - Transfert de données utilisateur ou abonné 17
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité 10
H04L 9/40 - Protocoles réseaux de sécurité 10
Voir plus
Classe NICE
09 - Appareils et instruments scientifiques et électriques 40
42 - Services scientifiques, technologiques et industriels, recherche et conception 38
38 - Services de télécommunications 30
35 - Publicité; Affaires commerciales 23
37 - Services de construction; extraction minière; installation et réparation 21
Voir plus
Statut
En Instance 49
Enregistré / En vigueur 75
  1     2        Prochaine page

1.

METHOD, CONFIGURATION PROGRAM, OPERATING SYSTEM DATASET, COMPUTER-READABLE DATA CARRIER AS WELL AS SERVER DEVICE FOR CONFIGURING A USER DEVICE AND SAME

      
Numéro d'application EP2024063294
Numéro de publication 2025/214617
Statut Délivré - en vigueur
Date de dépôt 2024-05-14
Date de publication 2025-10-16
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Jordi, Monter Prat

Abrégé

A method, as well as a corresponding configuration program (10), an operating system dataset (O), a computer-readable data carrier (11, 12, 13), a user device (3), and a server device (4) are provided, wherein for configuring the user device (5), in particular for communication via mobile telecommunication networks, the method comprises the steps of providing a secure element (6) of the user device (5), such as an eUICC, with an operating system dataset (O) for operating the secure element (6), the operating system dataset (O) comprising an auxiliary data subset (A) and a default data subset (B); and sending an activation signal (R) to the secure element (6); wherein the auxiliary data subset (A) is activated when the operating system dataset (O) is provided to the secure element (6), and the default data subset (B) is activated by the secure element (6) after receipt of the activation signal (R).

Classes IPC  ?

  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]

2.

PROVIDING A PROFILE PACKAGE ON A PROFILE SERVER FOR DOWNLOAD TO AN EUICC

      
Numéro d'application 18866385
Statut En instance
Date de dépôt 2023-05-23
Date de la première publication 2025-10-16
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Huber, Ulrich
  • Domanska, Zofia

Abrégé

A method is for providing a profile package for download from a profile server to an eUICC, the method releasing a linked ICCID and generating new network credentials for profile download.

Classes IPC  ?

3.

METHOD FOR CONFIGURING A USER DEVICE, USER DEVICE ALONG WITH COMPUTER PROGRAM, COMPUTER-READABLE DATA CARRIER AND DEVICE ARRANGEMENT THEREFOR

      
Numéro d'application 19090957
Statut En instance
Date de dépôt 2025-03-26
Date de la première publication 2025-10-02
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Jarnik, Claus
  • Eckardt, Monika

Abrégé

Disclosed is a method, a computer program, a computer-readable data carrier, a user device having a device assembly on which a secure element, in particular an eUICC, is installed, and a device arrangement for user devices, for example mobile user devices, for participation in a telecommunication network. The method includes the following steps: predefining a command data set with operating commands for the user device; checking a binding between the device assembly and the secure element; and denying at least one of the operating commands if the check has indicated that no authorized binding is present.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

4.

METHOD FOR CONFIGURING A NETWORK DEVICE, AS WELL AS COMMUNICATION MODULE AND NETWORK DEVICE COMPRISING SAME

      
Numéro d'application EP2025058000
Numéro de publication 2025/202130
Statut Délivré - en vigueur
Date de dépôt 2025-03-24
Date de publication 2025-10-02
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Borase, Hermant Udhavrao

Abrégé

A method for configuring a network device, a communication module configured to communicate via a telecommunication network, comprising a secure element, such as an eUICC, and a network device configured to communicate via a telecommunication network, comprising a secure element, such as an eUICC, are provided, the method comprising the steps of providing an application program, in particular an LPA and/or IPA, adapted to interact with a secure element, such as an eUICC, of the network device, and checking an authentication certificate authenticating an origin of the application program with the secure element, are provided.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/42 - Dispositions de sécurité utilisant des modules d’identité utilisant des modules virtuels d’identité
  • H04W 12/043 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA] utilisant un nœud de réseau fiable comme ancre de confiance
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

5.

METHOD FOR CONFIGURING A USER DEVICE, AS WELL AS USER DEVICE AND SECURE ELEMENT

      
Numéro d'application EP2025058082
Numéro de publication 2025/202175
Statut Délivré - en vigueur
Date de dépôt 2025-03-25
Date de publication 2025-10-02
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Prat, Jordi Monter

Abrégé

A method for configuring a user device, and a secure element, such as an eUICC, for a device are provided, the method comprising the steps of providing the secure element, with an installation program for loading at least one data component onto the secure element; installing the secure element on the user device, and loading the at least one data component onto the secure element involving the installation program; wherein the at least one data component comprises at least one of a user profile dataset and an operation system dataset for operating the secure element.

Classes IPC  ?

  • G06F 8/61 - Installation
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 4/50 - Fourniture de services ou reconfiguration de services
  • H04W 8/20 - Transfert de données utilisateur ou abonné

6.

SYSTEM, IN PARTICULAR A TELEMATIC SYSTEM, WITH THERMAL DECOUPLING OF ENERGY SOURCE AND ELECTRIC CONSUMER

      
Numéro d'application EP2025058234
Numéro de publication 2025/202267
Statut Délivré - en vigueur
Date de dépôt 2025-03-26
Date de publication 2025-10-02
Propriétaire GIESECKE+DEVIRENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Heimerl, Stefan

Abrégé

A system (10), for example a telematic system, includes a housing (100) with an interior space (105), an electric consumer (110) arranged in the interior space (105), a thermal insulating component (200), and an electric energy source (300). The housing (100) has an open side (102). The thermal insulating component (200) is arranged at the housing to cover the open side (102). The electric energy source (300) is arranged atop of the thermal insulating component (200). Thereby, the amount of thermal energy entering the interior space of the housing is substantially reduced and the lifetime of the electric consumer is increased.

Classes IPC  ?

  • G06F 1/00 - Détails non couverts par les groupes et
  • H02B 1/00 - Charpentes, tableaux, panneaux, pupitres, enveloppesDétails de postes de transformation ou de dispositions de commutation
  • H02B 1/26 - EnveloppesLeurs parties constitutives ou accessoires à cet effet
  • H02B 1/30 - Enveloppes du type armoireParties constitutives ou accessoires
  • H05K 5/00 - Enveloppes, coffrets ou tiroirs pour appareils électriques

7.

PROVIDING AN eUICC WITH PROFILE DATA OF AT LEAST ONE PROFILE

      
Numéro d'application EP2025053234
Numéro de publication 2025/180808
Statut Délivré - en vigueur
Date de dépôt 2025-02-07
Date de publication 2025-09-04
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Hartel, Karl Eglof

Abrégé

A method for establishing, in a target eUICC, profile data of at least one profile, the profile data including at least a subscriber identity (IMSI; SUPI; NAI) and an authentication key K, the method characterized by the step of merging, in the target eUICC, at least at least a pre-provisioned network authentication key K into a downloaded profile lacking this key.

Classes IPC  ?

  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/40 - Dispositions de sécurité utilisant des modules d’identité

8.

DEVICE-EUICC BINDING BASED ON DEVICE IDENTIFIER

      
Numéro d'application 19059573
Statut En instance
Date de dépôt 2025-02-21
Date de la première publication 2025-08-28
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Patiño, David
  • Totev, Georgy
  • Ruau, Federico
  • Tejada, Raul Lorente
  • Gifre, Clara

Abrégé

Systems, methods, and devices are disclosed having an eUICC that is for hosting, or constructed for hosting, at least one security domain profile, ISD-P, the ISD-P hosting, or constructed for hosting, at least one subscriber profile. A method can include comparing received identification information to pre-stored identification information. When the received identification information corresponds to the pre-stored identification information, the method includes identifying the device and the eUICC in a device-eUICC binding and allowing further operation of the eUICC.

Classes IPC  ?

  • H04W 12/48 - Dispositions de sécurité utilisant des modules d’identité utilisant la liaison sécurisée, p. ex. liant de manière sécurisée les modules d'identité aux dispositifs, aux services ou aux applications
  • H04W 12/062 - Pré-authentification

9.

PROVIDING AN EUICC WITH PROFILE DATA OF AT LEAST ONE PROFILE

      
Numéro d'application EP2025053386
Numéro de publication 2025/172207
Statut Délivré - en vigueur
Date de dépôt 2025-02-10
Date de publication 2025-08-21
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Abdalla, Noha
  • Leibfarth, Robert
  • Morawietz, Andreas
  • Hartel, Karl Eglof
  • Huber, Ulrich

Abrégé

A method for establishing, in a target eUICC, profile data of at least one profile, the profile data including at least an authentication key K, the method comprising the step: a) receive at the eUICC MNO information including at least an indication which profile data shall be generated; the method characterized by the step performed after step a): b) generate, in the target eUICC, at least some of the profile data, herein at least a network authentication key K; c) after step b) export the profile data generated in the target eUICC, or at least part thereof, from the target eUICC to an external entity; d) receive at the external entity at least some or all of the exported profile data, herein at least the authentication key K; and e) initiate generation of a profile including the received authentication key, at the external entity, or at an entity called by the external entity.

Classes IPC  ?

  • H04W 12/041 - Génération ou dérivation de clé
  • H04W 12/047 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA] sans l’utilisation d’un nœud de réseau fiable comme ancre de confiance
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/40 - Dispositions de sécurité utilisant des modules d’identité
  • H04W 12/72 - Identité de l’abonné
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés

10.

APPLICATION DATA TRANSFER METHOD

      
Numéro d'application 19040715
Statut En instance
Date de dépôt 2025-01-29
Date de la première publication 2025-08-07
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Patino, David
  • Ruau, Federico
  • Gifre, Clara
  • Tolos, Nadia

Abrégé

Methods and systems for transferring application data of at least one application of a first device is provided. A method includes determining, via the operating system and by a corresponding one of the at least one application, application data to be transferred, formatting, by the at least one application, the determined application data and sending the formatted application data to a storage module, saving the application data within the storage module, retrieving the saved application data from the storage module, and restoring the retrieved application data within at least one application by the at least one application.

Classes IPC  ?

  • G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption

11.

METHOD AND SYSTEM FOR PERSONALIZING A SECURE ELEMENT

      
Numéro d'application 18854235
Statut En instance
Date de dépôt 2023-04-21
Date de la première publication 2025-07-31
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Eckardt, Monika
  • Jarnik, Claus

Abrégé

A method is for computer-aided personalization of a secure element onto which an image is loaded. An operating system of the secure element is integrated into the imageOne or more data sets provided individually for the secure element are written to a special memory area of the secure element. A sequence in which the data sets to be written are personalized is defined with a configuration command in the personalization of the secure element.

Classes IPC  ?

  • G06F 21/45 - Structures ou outils d’administration de l’authentification

12.

PROFILE PROVISIONING IN eUICC

      
Numéro d'application 19009501
Statut En instance
Date de dépôt 2025-01-03
Date de la première publication 2025-07-10
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Schnellinger, Michael

Abrégé

An eUICC includes a provisioning profile installed in the eUICC, and constructed for provisioning of profiles installed or scheduled to be installed in the eUICC; at least one profile, referred to as target profile, installed in the eUICC including a profile identifier, and present in a disabled status. The provisioning profile includes a profile enabler constructed to perform steps: E1) receive from the target profile the profile identifier; E2) receive from an enablement orchestration server an expected profile identifier of a profile installed in the eUICC; E3) enable the target profile only under the condition that the profile identifier retrieved from the target profile and the expected profile identifier retrieved from the enablement orchestration server match with each other; and optionally, when enabling the target profile, disable the provisioning profile.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

13.

EUICC AUTOMATIC PROFILE SWITCHER

      
Numéro d'application EP2024088433
Numéro de publication 2025/141061
Statut Délivré - en vigueur
Date de dépôt 2024-12-24
Date de publication 2025-07-03
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Lorente, Raúl
  • Inguanzo, Miguel
  • Totev, Georgy

Abrégé

The present invention relates to a method for allowing a UE, User Equipment, to automatically attach or connect to a private network, by using an eUICC, embedded Universal Integrated Circuit Card, application comprising the step of prioritizing, by the eUICC application, the private network by replacing content of public EHPLMN, Equivalent Home Public Land Mobile Network of a public profile, with a cumulative private EHPLMN list which contains the private network and when the UE tries to attach or connect to the private network, the step of switching, by the eUICC, to a private profile corresponding to the private network, while the public profile is still enabled, wherein the private profile contains credentials for the attachment or connection, as well as an eUICC application, an eUICC comprising the eUICC application and a computer program product for performing the method.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/06 - Authentification
  • H04W 12/08 - Sécurité d'accès
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications

14.

METHOD AND SYSTEM TO ENHANCE AN EXECUTABLE LOAD FILE (ELF) UPGRADE

      
Numéro d'application EP2024088435
Numéro de publication 2025/141062
Statut Délivré - en vigueur
Date de dépôt 2024-12-24
Date de publication 2025-07-03
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Prat, Jordi Monter

Abrégé

Disclosed is a system and a method to enhance executable load file (EFL ) upgrade, the method comprises : receiving a request for the ELF upgrade; identifying a tag in the request, the tag indicating a new ELF version intended to be loaded; determining that the new ELF version is newer, equal or lower than a current ELF version; take a decision based on the indicated new ELF version whether to continue with the upgrade process or stop the process if for instance ELF downgrade; saving data instances of a current ELF, the data instances corresponding to the ELF upgrade; in response to saving the data instances of the current ELF, loading the ELF upgrade; and in response to loading the ELF upgrade, generating data instances for the ELF upgrade, based at least in part on the saved data instances.

Classes IPC  ?

  • G06F 8/654 - Mises à jour utilisant des techniques spécialement adaptées aux mémoires de masse réinscriptibles, p. ex. aux mémoires EEPROM ou flash

15.

A METHOD OF MONITORING UPDATE OPERATIONS IN A STORAGE MEMORY OF A UNIVERSAL INTEGRATED CIRCUIT CARD (UICC) AND UICC

      
Numéro d'application EP2024061923
Numéro de publication 2025/131335
Statut Délivré - en vigueur
Date de dépôt 2024-04-30
Date de publication 2025-06-26
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Gambihler, Jörg
  • Eckardt, Monika
  • Runge, Christa
  • Johnson, Eric

Abrégé

The invention relates to a method of monitoring update operations (110) in a storage memory (10) of a universal integrated circuit card (UICC) (1), in particular an embedded universal integrated circuit (eUICC). The method comprises detecting one or more update operations (105) in a storage memory (10) of the UICC (1), the one or more update operations (105) being initiated by an application (21) executed on the UICC (1, S10). The method further comprises obtaining a counter information based on the one or more detected update operations (105) in the storage memory (10), the counter information being indicative of a number of detected update operations (105) performed in the storage memory (10) over a predetermined time period (S20). The method further comprises providing the counter information via a communication interface (2) of the UICC (1) to a terminal device (100, S30). Th invention also relates to an UICC (1) which is configured to perform said method.

Classes IPC  ?

  • G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts

16.

METHOD FOR MANAGING AN APPLICATION FOR ELECTRONIC IDENTIFICATION OF A USER

      
Numéro d'application 18848629
Statut En instance
Date de dépôt 2023-03-28
Date de la première publication 2025-06-19
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Eichholz, Jan
  • Edwards, Michael

Abrégé

A method for managing an application for the electronic identification of a user of a mobile terminal has a subscriber identity module in a mobile network. The method comprises: transmitting a request to generate a subscription profile, with the application, to a subscription manager data preparation (SM-DP+) server of the mobile network; generating a subscription profile with the application for the electronic identification of the user, wherein generating the subscription profile comprises generating a private asymmetric personalization key associated with the subscription profile and a public asymmetric personalization key associated with the subscription profile for the application; transmitting the public asymmetric personalization key to a server of the mobile network operator or to a server of an identification provider; encrypting identity data of the user using the public asymmetric personalization key; and distributing the subscription profile with the application, and the private asymmetric personalization key to the mobile terminal.

Classes IPC  ?

  • H04W 12/72 - Identité de l’abonné
  • H04L 9/08 - Répartition de clés
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 12/37 - Gestion des politiques de sécurité pour des dispositifs mobiles ou pour le contrôle d’applications mobiles

17.

METHOD FOR PERSONALIZING A CHIP MODULE

      
Numéro d'application 18931463
Statut En instance
Date de dépôt 2024-10-30
Date de la première publication 2025-06-05
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Flammensboeck, Christian

Abrégé

Systems and methods for personalizing a chip module includes: loading initialization data into a memory of the chip module, the initialization data including an operating system and static configuration data for the chip module; executing the initialization data by the chip module and starting the operating system; loading individual personalization information into the memory using the operating system; executing a personalization sequence by the operating system on the chip module, wherein during execution of the personalization sequence the individual personalization information previously loaded into the memory is linked to the chip module.

Classes IPC  ?

  • G06F 9/445 - Chargement ou démarrage de programme
  • G06F 9/4401 - Amorçage
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

18.

SECURE ELEMENT, SYSTEM, AND METHOD FOR EFFICIENT AUTHENTICATION IN GENERIC BOOTSTRAPPING ARCHITECTURE (GBA)

      
Numéro d'application 18955140
Statut En instance
Date de dépôt 2024-11-21
Date de la première publication 2025-06-05
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Patel, Praveen

Abrégé

Provided is a secure element to securely communicate over a mobile communication network, the secure element comprising a secure control unit which is configured to determine, directly after a session with a mobile network entity via a mobile core network being initialized, whether a fresh bootstrapping operation is required, wherein the bootstrapping operation is configured to generate a shared key for establishing a secure communication channel to the mobile network entity, and subsequently establish the secure communication channel to the mobile network entity.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées

19.

METHOD FOR CONFIGURING A CHIP MODULE WITH A PROFILE, CHIP MODULE, AND DEVICE COMPRISING SUCH A CHIP MODULE

      
Numéro d'application DE2024100957
Numéro de publication 2025/113731
Statut Délivré - en vigueur
Date de dépôt 2024-11-12
Date de publication 2025-06-05
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Huber, Ulrich

Abrégé

The invention relates to a method (200) for configuring a chip module (10) with a profile, the method comprising the following steps: transmitting (201) an initial profile to the chip module (10); storing (202) the initial profile in a memory (14) of the chip module (10); transmitting (203) profile type information to the chip module (10) and linking the profile type information with the initial profile in order to generate a typified profile; requesting (204) profile data (53) from a profile provisioning unit (30); transmitting (205) the profile data (53) to a profile management unit (20) using the profile provisioning unit (30); transferring (206) the profile data (53) to the chip module (10) using the profile management unit (20); linking (207) the profile data (53) with the typified profile in order to generate a modified profile.

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné

20.

SYSTEMS, METHODS, AND DEVICES FOR DEVICE-EUICC BINDING

      
Numéro d'application 18962963
Statut En instance
Date de dépôt 2024-11-27
Date de la première publication 2025-06-05
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Patino, David
  • Totev, Georgy
  • Ruau, Federico
  • Lorente, Raul
  • Gifre, Clara

Abrégé

Systems, methods, and devices are provided with an Embedded Universal Integrated Circuit Card (eUICC). The eUICC includes a device-eUICC binding applet being implemented in an issuer security domain root (ISD-R). The device-eUICC binding applet is constructed to, after each reset of the eUICC, effect the eUICC to be in a disabled state which prevents operation of the eUICC in the device.

Classes IPC  ?

  • G06F 21/44 - Authentification de programme ou de dispositif

21.

NETWORK DETERMINATION ACTION CONTROLLED BY OPERATING SYSTEM OF DATA CARRIER BASED ON SECURE ELEMENT AFTER EVALUATING MEASURED NETWORK QUALITY OF DIFFERENT COMMUNICATION NETWORKS

      
Numéro d'application EP2024083648
Numéro de publication 2025/114294
Statut Délivré - en vigueur
Date de dépôt 2024-11-26
Date de publication 2025-06-05
Propriétaire
  • GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
  • GIESECKE AND DEVRIENT MOBILE SECURITY AMERICA INC. (USA)
Inventeur(s)
  • Borase, Hemant Udhavrao
  • Prat, Jordi Monter

Abrégé

The present disclosure refers to a method of determining a communication connection (26) between an electronic device (20) and at least one communication network (12; 14), wherein said electronic device (20) comprises at least one data carrier (22; 24) based on a secure element (23) and equipped with an operating system (30), the method comprising: executing at least one communication action (28) between the data carrier (22; 24) and the electronic device (20) or between the data carrier (22; 24) and the communication network (12; 14) via the electronic device (20), said communication action (28) being controlled by the operating system (30) of said data carrier (22; 24); measuring at least one network quality parameter (34) in the course of said communication action (28); evaluating the measured network quality parameter (34) based on a pre-determined threshold (40) and/or based on a comparison of measured network quality parameters (34) corresponding to different communication networks (12; 14); executing a network determination action (44) controlled by the operating system (30) of the data carrier (22; 24) and based on said evaluation (42). The present disclosure further refers to a corresponding system (10), computer program (30; 32), data carrier (22; 24) and electronic device (20).

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
  • H04W 88/06 - Dispositifs terminaux adapté au fonctionnement dans des réseaux multiples, p. ex. terminaux multi-mode

22.

METHOD, COMPUTER PROGRAM, COMPUTER-READABLE DATA CARRIER, TERMINAL AND COMMUNICATION NETWORK FOR TRANSMITTING A USER DATASET

      
Numéro d'application EP2024083071
Numéro de publication 2025/109047
Statut Délivré - en vigueur
Date de dépôt 2024-11-21
Date de publication 2025-05-30
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Dietze, Claus

Abrégé

The present invention relates to a method, a computer program (4), a computer-readable data carrier (5), a terminal (2) for participating in a communication network (1) and same, wherein the following steps are provided for transmitting a user dataset (P), in particular an eUICC dataset, from a source device (A) to at least one receiving device (B): identifying an export flag (E) relating to authorization of the export in the user dataset (P) on the source device (A); detecting whether the export flag (E) indicates that an export and/or import of the user dataset from the source device (A) and/or on the receiving device (B) is permissible; and authorizing the export of the user dataset (P) from the source device (A) to the receiving device (B) if the export flag (E) indicates that an export and/or import of the user dataset (P) is permissible.

Classes IPC  ?

  • H04L 41/28 - Restriction de l’accès aux systèmes ou aux fonctions de gestion de réseau, p. ex. en utilisant la fonction d’autorisation pour accéder à la configuration du réseau
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/45 - Dispositions de sécurité utilisant des modules d’identité utilisant des modules multiples d’identité

23.

IoTgo

      
Numéro d'application 1855675
Statut Enregistrée
Date de dépôt 2025-02-10
Date d'enregistrement 2025-02-10
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 10 - Appareils et instruments médicaux
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 39 - Services de transport, emballage et entreposage; organisation de voyages
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Electronic devices for locating individuals and mobile objects, in particular, vehicles, containers and goods, through use of GPS, cellular telephone networks and radio frequency ranging and triangulation; electronic transponder devices for property protection; signaling and checking apparatus and instruments utilizing tracking and positioning technologies, namely, transponders, GPS receivers, cellular modems, radio ranging devices, laser or other ray-based distance measuring devices which enable positioning by triangulation for use in the dispatch, control, as well as the prevention of unauthorized use of movable objects, namely, persons, land, air, rail, ship, and space vehicles, boxes, parcels, trailers, swap trailers, containers of all types and sizes; electronic location transponders, in particular for satellites and GPS systems; apparatus for tracking and positioning of mobile objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes; computer program for smartphones or other electronic devices featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; Internet of Things gateways; Internet of Things sensors; computer hardware modules for use with the Internet of Things; computer application software for use in implementing the Internet of Things; data processing systems; data processing software; computer software for the remote control of office machines and equipment; machine control software; environmental control software; application software to control lighting; software to control building environmental, access and security systems; software for monitoring, analyzing, controlling and running physical world operations, Lighting control software for use in commercial and industrial facilities; wireless controllers to remotely monitor and control the function and status of security systems; wireless controllers to remotely monitor and control the function and status of electrical, electronic, and mechanical devices or systems; measuring and control devices for air conditioning technology; remote control telemetering machines and instruments; vehicle tracking apparatus; vehicle tracking systems; navigation, guidance, tracking, targeting and map making devices; automatic solar tracking sensors; downloadable computer software for remote monitoring and analysis; environmental monitoring software; computer software for use in remote meter monitoring; cameras for monitoring and inspecting equipment in a nuclear power station; sensors, detectors and monitoring instruments; measuring, detecting, monitoring and controlling devices; liquid level monitoring apparatus; apparatus for monitoring gas consumption; apparatus for monitoring heat consumption; apparatus for monitoring water consumption; sensors for monitoring physical movements; apparatus for monitoring electrical energy consumption. Diagnostic, examination, and monitoring equipment; patient monitoring sensors and alarms; sensor apparatus for medical use in monitoring the vital signs of patients; heart rate monitoring apparatus; blood glucose monitoring apparatus; patient monitoring instruments. Data processing; data processing management; data processing services; automated data processing; data processing, systematization and management; administrative support and data processing services. Installation, maintenance and repair of temperature control apparatus; advisory services relating to the maintenance of environmental control systems; advisory services relating to the repair of environmental control systems; providing information relating to the repair or maintenance of water pollution control equipment; repair of water pollution control equipment; maintenance of water pollution control equipment; maintenance and repair of physical access control apparatus; maintenance and repair of access control systems [hardware]; repair or maintenance of water pollution control equipment; maintenance of passenger lifts via remote monitoring systems. Providing telecommunications connections to the internet, databases and software platforms for tracking, tracing, positioning, visualizing on digital maps, and remote-control of mobile objects; online services, namely, electronic transmission of messages, in particular for computer-assisted management and tracking, dispatching, and controlling movable objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes. Location tracking of individuals and mobile objects using computers, PCs, notebooks, tablets, cellphones or similar devices; fleet control of motor vehicles and containers by means of electronic navigation and tracking apparatus; computer-aided tracking of motor vehicles, ships, containers, installations, machines and individuals; information relating to transport services by a website; cargo tracking services; tracking and tracing of shipments; electronic tracking of parcels for third parties; locating and tracking of cargo for transportation purposes; tracking of passenger vehicles by computer or via GPS; tracking of passenger or freight vehicles by computer or via GPS; advisory services relating to the tracking of goods in transit; tracking, locating and monitoring of mobile objects and devices, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes, for transportation purposes, with the use of computers, PCs, notebooks, tablets, cellphones or similar devices. Providing temporary use of non-downloadable computer software in combination with online mapping services, for tracking the location of individuals and mobile objects over computer networks, intranet and the internet; hosting a website featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; creation of control programs for automated measurement, assembly, adjustment, and related visualization; design and development of computer software for process control; providing temporary use of non-downloadable computer software for tracking packages over computer networks, intranets and the internet; providing temporary use of non-downloadable computer software for tracking freight over computer networks, intranets and the internet; design and development of software for control, regulation and monitoring of solar energy systems; providing temporary use of online, non-downloadable computer software for use in broadcast monitoring applications; monitoring of computer systems for security purposes; monitoring of computer systems to detect breakdowns; monitoring of computer systems for detecting unauthorized access or data breach; machine condition monitoring; monitoring of building structures; monitoring of contaminated land; condition monitoring relating to fluids; condition monitoring relating to greases; condition monitoring relating to lubricants; condition monitoring relating to oils; services for monitoring industrial processes; monitoring of contaminated land for gas; airborne remote monitoring relating to scientific explorations; monitoring the quality control of seismic procedures; monitoring of activities which influence the environment within buildings; monitoring of events which influence the environment within buildings; monitoring of events which influence the environment within civil engineering structures; monitoring of activities which influence the environment within civil engineering structures; monitoring of commercial and industrial sites for detection of volatile and non-volatile organic compounds; environmental monitoring services; environmental monitoring of waste storage areas; environmental monitoring of waste treatment areas; airborne remote monitoring relating to environmental explorations; monitoring of water quality; monitoring of stream water quality; process monitoring for quality assurance. Monitoring of patients; remote monitoring of medical data for medical diagnosis and treatment. Stolen property tracking and location services, namely, computer-assisted locating of vehicles, ships, equipment, machines and individuals; stolen property tracking and location services, namely, determining the location of individuals and mobile objects by means of computers, PCs, notebooks, tablets, cellphones or similar devices; locating and tracking of lost property; monitoring fire alarms; monitoring of alarms; medical alarm monitoring; monitoring of security systems; monitoring fire detection systems; home security alarm monitoring; monitoring burglar and security alarms; monitoring of burglar and security alarms; electronic monitoring services for security purposes.

24.

SECURE ELEMENT, TERMINAL DEVICE COMPRISING THE SECURE ELEMENT, SYSTEM COMPRISING THE TERMINAL DEVICE AND METHODS THEREOF

      
Numéro d'application 18944137
Statut En instance
Date de dépôt 2024-11-12
Date de la première publication 2025-05-22
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Pandey, Ankit

Abrégé

A secure element is provided to communicate over a mobile communication network securely. The secure element includes a secure storage unit in which a subscriber authentication key is stored. The secure element further has a secure control unit which is configured to firstly generate a session subscriber authentication key, e.g., during getting the identity of the secure element, and, based on receiving an authentication request from a core network entity, to authenticate the secure element to the core network entity using the previously generated session subscriber authentication key. Furthermore, a terminal device includes the secure element, a system comprising the terminal device, and a core network entity and corresponding methods of the secure element, the terminal device, and the system.

Classes IPC  ?

25.

VERIFICATION METHOD AND APPARATUS, DEVICE, READABLE STORAGE MEDIUM, AND PROGRAM PRODUCT

      
Numéro d'application CN2024132683
Numéro de publication 2025/103504
Statut Délivré - en vigueur
Date de dépôt 2024-11-18
Date de publication 2025-05-22
Propriétaire
  • GIESECKE+DEVRIENT (JIANGXI) TECHNOLOGY CO., LTD. (Chine)
  • GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Liu, Yongjian
  • Chen, Hong

Abrégé

Embodiments of the present application relate to the technical field of communications, and disclose a verification method and apparatus, a device, a readable storage medium, and a program product. The verification method is applied to a smart card, the smart card comprises a telecommunication card, and the smart card is communicatively connected to a terminal. The method comprises: when a first verification instruction is received, encrypting a first verification parameter by means of a first public key to obtain a first encryption result; signing the first encryption result by means of a second private key to obtain a first signature result, and sending the first encryption result and the first signature result to the terminal; when a second encryption result and a second signature result are received, performing signature verification on the second signature result by means of the first public key, and when the signature verification is passed, decrypting the second encryption result by means of the second private key to obtain a second verification parameter; and if verification of the second verification parameter is passed, determining that verification of the terminal is passed. The embodiments of the present application allow for verification of the legitimacy between a smart card and a terminal.

Classes IPC  ?

  • H04W 12/48 - Dispositions de sécurité utilisant des modules d’identité utilisant la liaison sécurisée, p. ex. liant de manière sécurisée les modules d'identité aux dispositifs, aux services ou aux applications

26.

PROVIDING AN EUICC WITH PROFILE DATA OF AT LEAST ONE PROFILE

      
Numéro d'application EP2024080180
Numéro de publication 2025/103735
Statut Délivré - en vigueur
Date de dépôt 2024-10-25
Date de publication 2025-05-22
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Huber, Ulrich
  • Hartel, Karl Eglof
  • Morawietz, Andreas
  • Leibfarth, Robert
  • Abdalla, Noha

Abrégé

A method for establishing, in a target eUICC, profile data of at least one profile, the profile data including at least a subscriber identity (IMSI; SUPI; NAI) and an authentication key K, the method characterized by the step: a) generate, in the target eUICC, at least some of the profile data, herein at least a network authentication key K.

Classes IPC  ?

  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/40 - Dispositions de sécurité utilisant des modules d’identité

27.

TERMINAL DEVICE, SYSTEM AND METHOD USING AUTS FOR DATA TRANSFER

      
Numéro d'application 18938640
Statut En instance
Date de dépôt 2024-11-06
Date de la première publication 2025-05-08
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Shingnapurkar, Rushikesh
  • Vinchhi, Tapan

Abrégé

A terminal device is adapted to transfer data to a backend system over a mobile communication network, and includes: a secure element having an international mobile subscriber identifier which uniquely identifies the secure element at the mobile communication network such that the secure element is internationally fully personalized; a communication interface which is adapted to communicate via the mobile communication network. The terminal device is adapted to: receive data from a sensor unit; receive an authentication request from a core network entity, including a network challenge—RAND—and a network authentication token—AUTN; retrieve a sequence number—SQN—from the authentication request; verify the SQN; always declare the SQN to be invalid by returning a command response comprising a synchronization failure parameter—AUTS, the AUTS including at least one data field containing the data; and send the command response to the backend system via the communication interface.

Classes IPC  ?

  • H04W 12/06 - Authentification
  • H04L 61/50 - Allocation d'adresse
  • H04L 101/654 - Numéros internationaux d'identité d'abonné mobile [IMSI]
  • H04W 28/06 - Optimisation, p. ex. compression de l'en-tête, calibrage des informations

28.

METHOD FOR TRANSMITTING PROFILES TO A CHIP MODULE AND FOR OPERATING THE CHIP MODULE, CHIP MODULE, AND DEVICE COMPRISING SUCH A CHIP MODULE

      
Numéro d'application DE2024100836
Numéro de publication 2025/093075
Statut Délivré - en vigueur
Date de dépôt 2024-09-23
Date de publication 2025-05-08
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Huber, Ulrich

Abrégé

The invention relates to: a method for transmitting profiles to a chip module and for operating the chip module; a chip module for storing a plurality of optionally activatable profiles; and a device comprising a communication module and a chip module. A plurality of profiles of different profile types can be stored on the chip module, each profile being assigned the relevant profile type and profile data. The chip module is operated using one or more profiles. Depending on the profile type of the activated profile, the chip module operates in a first operating mode or a second operating mode.

Classes IPC  ?

  • H04W 12/72 - Identité de l’abonné
  • H04L 67/30 - Profils
  • H04L 67/306 - Profils des utilisateurs
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné

29.

REMOTE-CONTROLLED ACTIVATION OF LOCAL SWITCHING OF SUBSCRIPTION PROFILES

      
Numéro d'application DE2024100837
Numéro de publication 2025/077969
Statut Délivré - en vigueur
Date de dépôt 2024-09-23
Date de publication 2025-04-17
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Humpisch, Jens
  • Dietze, Claus

Abrégé

The invention proposes a secure element (eUICC) having a secure storage area in which at least two subscription profiles (ISD-P) are installed, one of which is activated, and a control unit which is in communication with the secure storage area. The control unit is designed to receive a switching signal which has an origin independent of a network provider, and, on the basis of the switching signal, to generate and carry out a local switching function which deactivates the activated subscription profile and at the same time activates a predetermined subscription profile. The invention also proposes a corresponding terminal, a system and a method for locally switching subscription profiles without a third party being involved.

Classes IPC  ?

  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

30.

SYSTEM AND METHOD FOR GENERATION OF SUBSCRIPTION CONCEALED IDENTIFIER (SUCI) IN 5G NETWORKS

      
Numéro d'application 18830000
Statut En instance
Date de dépôt 2024-09-10
Date de la première publication 2025-03-20
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Pandey, Ankit
  • Mishra, Santosh Kumar

Abrégé

A system and method are provided for enabling generation of Subscription Concealed Identifier (SUCI) in 5G network. The system performs encryption of a plain text associated with Subscription Permanent Identifier (SUPI) based on an Authenticated Encryption with Associated Data (AEAD)-Advanced Encryption Standard in Galois/Counter Mode (AES-GCM), an Initialization Vector (IV), and Additional authenticated data (AAD). The system obtains public key, cipher text and Message Authentication Code (MAC) tag in parallel process by the AEAD AES-GCM and Elliptic Curve Integrated Encryption Scheme (ECIES) process along with one or more parameters for enabling generation of the SUCI in the 5G network. The one or more parameters comprise at least one of a SUPI type, a Mobile Country Code (MCC), a Mobile Network Code (MNC), or/and a protection scheme ID. Finally, system transmits the generated SUCI in response to GET IDENTITY command received by the UICC.

Classes IPC  ?

  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret

31.

SOFTWARE UPDATE IN A SECURITY ELEMENT

      
Numéro d'application 18292443
Statut En instance
Date de dépôt 2022-07-26
Date de la première publication 2025-03-13
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Ruau, Mariano
  • Gifre, Clara
  • Garcia Farres, Andreu
  • Gomez Sol, Pablo Daniel

Abrégé

A method for updating an installed software, in particular an operating system, OS, in a secure element includes the steps of providing an update agent in the secure element; securing specific data; required for operating the installed software; in a memory of the update agent; loading a software image; into the secure element, the software image representing an update of the installed software; and making the software image operable by the secured specific data. According to further aspects, a respective secure element, an update agent, and a computer-program product correspond to features of the aforementioned method.

Classes IPC  ?

  • G06F 8/65 - Mises à jour
  • G06F 21/60 - Protection de données
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

32.

5G KEY GENERATION / ECC KEY GENERATION AND SUCI CALCULATION

      
Numéro d'application 18804404
Statut En instance
Date de dépôt 2024-08-14
Date de la première publication 2025-02-27
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Mishra, Santosh Kumar
  • Pandey, Ankit

Abrégé

A method is for generating, in a UICC, a 5G subscriber concealed identifier, SUCI, for a 5G mobile communication network. The method includes the steps executed in a processing entity comprised in the UICC: (1) generation of a public/private key pair or an ECC public/private key pair; (2) DH or ECDH derivation of an Ephemeral shared key from the generated or ECC public/private key pair; (3) derivation of a symmetric encryption key from the Ephemeral shared key; (4) concealment of at least a part of a subscriber permanent identifier, SUPI, with the generated symmetric key to compute the SUCI. Steps (1, 2) are triggered by a deterministic event at the UICC, and storing the generated or ECC public/private key pair and Ephemeral shared key to a key memory provided in the UICC; and subsequently steps (3, 4) are triggered by receipt of a GET IDENTITY command.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]

33.

CONTENT PROVIDING TO INTEGRATED SECURE ELEMENT

      
Numéro d'application EP2024072387
Numéro de publication 2025/036800
Statut Délivré - en vigueur
Date de dépôt 2024-08-07
Date de publication 2025-02-20
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Vinchhi, Tapan
  • Patil, Rushikesh
  • Khopade, Sandeep
  • Mohol, Ganesh
  • Shingnapurkar, Rushikesh

Abrégé

A method for preparing contents to be provided from a hardware security module, HSM, to an integrated Secure Element, iSE, comprising: • a) provide in the HSM a pre-shared key, PSK, which is derived from a universal key-derivation constant, KDC, permanently stored in the iSE, and a first seed (SI), wherein the KDC is identical for a multitude of multiple iSEs, and the first seed (51) is specific or unique for a specific contents provider (CP) of said contents; • b) in the HSM, provide a second seed (S2) which is specific or unique for the iSE, and from the PSK and the second seed, apply a CEK-key-derivation scheme so as to derive a code encryption key, CEK; • c) in the HSM, encrypt the code package with the code encryption key, CEK, and by applying a code encryption scheme, so as to generate an encrypted code package (OS packet); • d) in the HSM, generate a header including the second seed (S2) and, if required: information on the code encryption scheme of step c) or/and information on the CEK-key-derivation scheme of step b); • e) in the HMS, encrypt the header with the PSK, or with a header encryption key derived from the PSK, and by applying a header encryption scheme, so as to generate an encrypted header (Header); • f) in the HSM, merge the encrypted code package (OS packet) and the encrypted header (Header) so as to create a binary large object, BLOB, to be transferred to the iSE.

Classes IPC  ?

  • G09C 1/00 - Appareils ou méthodes au moyen desquels une suite donnée de signes, p. ex. un texte intelligible, est transformée en une suite de signes inintelligibles en transposant les signes ou groupes de signes ou en les remplaçant par d'autres suivant un système préétabli
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support

34.

SWITCHING CONNECTIVITY BETWEEN FIRST AND SECOND MOBILE RADIO NETWORK

      
Numéro d'application 18800466
Statut En instance
Date de dépôt 2024-08-12
Date de la première publication 2025-02-20
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Mishra, Santosh Kumar

Abrégé

A method, in a SIM hosted in a mobile radio communication device, is for switching connectivity between a first mobile radio network and a second mobile radio network. The method includes a first ADFUSIM entry and a second ADFUSIM entry in the same profile; the switch of connectivity from the first to the second mobile radio network is performed by switching a configuration of the profile from using the first ADFUSIM entry and to using the second ADFUSIM entry.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/06 - Authentification
  • H04W 36/14 - Resélection d'un réseau ou d'une interface hertzienne

35.

SECURE CHANNEL INITIATION BETWEEN CARD AND HOST

      
Numéro d'application 18804381
Statut En instance
Date de dépôt 2024-08-14
Date de la première publication 2025-02-20
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Patel, Praveen

Abrégé

A procedure is provided for initiating a secure communication session between a card and a host. A static encryption key is assigned to the card and stored in the card. Each of the card and the host provide a key version number and a key identifier of the static key.

Classes IPC  ?

  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

36.

IoTgo

      
Numéro d'application 240019200
Statut En instance
Date de dépôt 2025-02-10
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 10 - Appareils et instruments médicaux
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 39 - Services de transport, emballage et entreposage; organisation de voyages
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Electronic devices for locating individuals and mobile objects, in particular, vehicles, containers and goods, through use of GPS, cellular telephone networks and radio frequency ranging and triangulation; electronic transponder devices for property protection; signaling and checking apparatus and instruments utilizing tracking and positioning technologies, namely, transponders, GPS receivers, cellular modems, radio ranging devices, laser or other ray-based distance measuring devices which enable positioning by triangulation for use in the dispatch, control, as well as the prevention of unauthorized use of movable objects, namely, persons, land, air, rail, ship, and space vehicles, boxes, parcels, trailers, swap trailers, containers of all types and sizes; electronic location transponders, in particular for satellites and GPS systems; apparatus for tracking and positioning of mobile objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes; computer program for smartphones or other electronic devices featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; Internet of Things gateways; Internet of Things sensors; computer hardware modules for use with the Internet of Things; computer application software for use in implementing the Internet of Things; data processing systems; data processing software; computer software for the remote control of office machines and equipment; machine control software; environmental control software; application software to control lighting; software to control building environmental, access and security systems; software for monitoring, analyzing, controlling and running physical world operations, Lighting control software for use in commercial and industrial facilities; wireless controllers to remotely monitor and control the function and status of security systems; wireless controllers to remotely monitor and control the function and status of electrical, electronic, and mechanical devices or systems; measuring and control devices for air conditioning technology; remote control telemetering machines and instruments; vehicle tracking apparatus; vehicle tracking systems; navigation, guidance, tracking, targeting and map making devices; automatic solar tracking sensors; downloadable computer software for remote monitoring and analysis; environmental monitoring software; computer software for use in remote meter monitoring; cameras for monitoring and inspecting equipment in a nuclear power station; sensors, detectors and monitoring instruments; measuring, detecting, monitoring and controlling devices; liquid level monitoring apparatus; apparatus for monitoring gas consumption; apparatus for monitoring heat consumption; apparatus for monitoring water consumption; sensors for monitoring physical movements; apparatus for monitoring electrical energy consumption. (2) Diagnostic, examination, and monitoring equipment; patient monitoring sensors and alarms; sensor apparatus for medical use in monitoring the vital signs of patients; heart rate monitoring apparatus; blood glucose monitoring apparatus; patient monitoring instruments. (1) Data processing; data processing management; data processing services; automated data processing; data processing, systematization and management; administrative support and data processing services. (2) Installation, maintenance and repair of temperature control apparatus; advisory services relating to the maintenance of environmental control systems; advisory services relating to the repair of environmental control systems; providing information relating to the repair or maintenance of water pollution control equipment; repair of water pollution control equipment; maintenance of water pollution control equipment; maintenance and repair of physical access control apparatus; maintenance and repair of access control systems [hardware]; repair or maintenance of water pollution control equipment; maintenance of passenger lifts via remote monitoring systems. (3) Providing telecommunications connections to the internet, databases and software platforms for tracking, tracing, positioning, visualizing on digital maps, and remote-control of mobile objects; online services, namely, electronic transmission of messages, in particular for computer-assisted management and tracking, dispatching, and controlling movable objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes. (4) Location tracking of individuals and mobile objects using computers, PCs, notebooks, tablets, cellphones or similar devices; fleet control of motor vehicles and containers by means of electronic navigation and tracking apparatus; computer-aided tracking of motor vehicles, ships, containers, installations, machines and individuals; information relating to transport services by a website; cargo tracking services; tracking and tracing of shipments; electronic tracking of parcels for third parties; locating and tracking of cargo for transportation purposes; tracking of passenger vehicles by computer or via GPS; tracking of passenger or freight vehicles by computer or via GPS; advisory services relating to the tracking of goods in transit; tracking, locating and monitoring of mobile objects and devices, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes, for transportation purposes, with the use of computers, PCs, notebooks, tablets, cellphones or similar devices. (5) Providing temporary use of non-downloadable computer software in combination with online mapping services, for tracking the location of individuals and mobile objects over computer networks, intranet and the internet; hosting a website featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; creation of control programs for automated measurement, assembly, adjustment, and related visualization; design and development of computer software for process control; providing temporary use of non-downloadable computer software for tracking packages over computer networks, intranets and the internet; providing temporary use of non-downloadable computer software for tracking freight over computer networks, intranets and the internet; design and development of software for control, regulation and monitoring of solar energy systems; providing temporary use of online, non-downloadable computer software for use in broadcast monitoring applications; monitoring of computer systems for security purposes; monitoring of computer systems to detect breakdowns; monitoring of computer systems for detecting unauthorized access or data breach; machine condition monitoring; monitoring of building structures; monitoring of contaminated land; condition monitoring relating to fluids; condition monitoring relating to greases; condition monitoring relating to lubricants; condition monitoring relating to oils; services for monitoring industrial processes; monitoring of contaminated land for gas; airborne remote monitoring relating to scientific explorations; monitoring the quality control of seismic procedures; monitoring of activities which influence the environment within buildings; monitoring of events which influence the environment within buildings; monitoring of events which influence the environment within civil engineering structures; monitoring of activities which influence the environment within civil engineering structures; monitoring of commercial and industrial sites for detection of volatile and non-volatile organic compounds; environmental monitoring services; environmental monitoring of waste storage areas; environmental monitoring of waste treatment areas; airborne remote monitoring relating to environmental explorations; monitoring of water quality; monitoring of stream water quality; process monitoring for quality assurance. (6) Monitoring of patients; remote monitoring of medical data for medical diagnosis and treatment. (7) Stolen property tracking and location services, namely, computer-assisted locating of vehicles, ships, equipment, machines and individuals; stolen property tracking and location services, namely, determining the location of individuals and mobile objects by means of computers, PCs, notebooks, tablets, cellphones or similar devices; locating and tracking of lost property; monitoring fire alarms; monitoring of alarms; medical alarm monitoring; monitoring of security systems; monitoring fire detection systems; home security alarm monitoring; monitoring burglar and security alarms; monitoring of burglar and security alarms; electronic monitoring services for security purposes.

37.

A SECURE DATA TRANSMISSION

      
Numéro d'application 18714674
Statut En instance
Date de dépôt 2022-12-12
Date de la première publication 2025-01-30
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Arbos, Noemi
  • Joshi, Mukesh
  • Garcia Del Pino, Luis Domingo

Abrégé

A method for securely transmitting data from an IoT device to an application server via a telecommunication network, wherein a re-encryption server decrypts data encrypted by the IoT device and re-encrypts the decrypted data by an encryption key of the application server in such a way that the application server can obtain the data by decrypting the re-encrypted data. A re-encryption server is configured to enable secure transmission of data from an IoT device to an application server via a telecommunication network, and includes a cryptography means configured to decrypt data encrypted by the IoT device and to re-encrypt the decrypted data by an encryption key of the application server in such a way that the application server can obtain the data by decrypting the re-encrypted data. A system is configured for secure transmission of data from an IoT device to an application server via a telecommunication network.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

38.

SECURE ELEMENT WITH ACCESS RULE APPLICATION ARA

      
Numéro d'application 18715912
Statut En instance
Date de dépôt 2022-12-08
Date de la première publication 2025-01-23
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Schnellinger, Michael

Abrégé

A secure element includes an SE application implemented therein or configured to implement an SE application therein. The secure element includes: an SE terminal interface to a terminal, in conjunction with which the secure element is able to be operated; an ARA application (ARA-X) and ARA access rules, by way of which access operations from applications implemented in the terminal to SE applications implemented or able to be implemented in the secure element via the SE terminal interface are controlled. The secure element is: an ARA user interface (ARA-UI), which is configured: to receive user commands that are input by a user on a user interface provided on the terminal or on the secure element; to forward received user commands to the ARA application; and to prompt the ARA application to apply forwarded user commands to the ARA application.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/44 - Authentification de programme ou de dispositif

39.

Management of Subscriber Profiles on an eUICC

      
Numéro d'application 18711838
Statut En instance
Date de dépôt 2022-11-30
Date de la première publication 2025-01-16
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Garcia Farres, Andreu
  • Moron I Peiro, Oriol

Abrégé

Disclosed are methods, devices, and computer program products arranged for managing subscriber profiles on an eUICC. Within that context, a method for managing subscriber profiles stored in an eUICC includes an ISD-R and an API implemented on the eUICC, the API providing for executing or executing via the ISD-R a profile management operation concerning a subscriber profile of the eUICC. Further, an application installed on the eUICC instructs the API to exe-cute the profile management operation concerning the subscriber profile. A device has embedded therein a eUICC and computer program products representing the API and the application.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

40.

SUBSCRIBER IDENTIFICATION MODULE AND APPLICATION EXECUTABLE ON A SUBSCRIBER IDENTIFICATION MODULE

      
Numéro d'application 18891771
Statut En instance
Date de dépôt 2024-09-20
Date de la première publication 2025-01-09
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Jarnik, Claus
  • Eckardt, Monika

Abrégé

A subscriber identity module for employment in a mobile device has a processor, a storage as well as a location determining device. The location determining device is adapted to determine a location of the subscriber identity module. The subscriber identity module makes a plurality of functions available.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/306 - Profils des utilisateurs
  • H04W 4/50 - Fourniture de services ou reconfiguration de services
  • H04W 8/24 - Transfert des données du terminal
  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
  • H04W 12/08 - Sécurité d'accès
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
  • H04W 12/67 - Sécurité dépendant du contexte dépendant du risque, p. ex. choix du niveau de sécurité selon les profils de risque

41.

METHOD AND APPARATUS FOR CONTROLLING USE OF UNIVERSAL INTEGRATED CIRCUIT CARD

      
Numéro d'application CN2024099981
Numéro de publication 2024/260353
Statut Délivré - en vigueur
Date de dépôt 2024-06-19
Date de publication 2024-12-26
Propriétaire
  • GIESECKE+DEVRIENT (JIANGXI) TECHNOLOGY CO., LTD. (Chine)
  • GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Chen, Hong

Abrégé

The present application discloses a method and apparatus for controlling the use of a universal integrated circuit card. The universal integrated circuit card is integrated on an electronic device, and a program file is run on the electronic device, the method being applied to at least one of the universal integrated circuit card and the program file. The method comprises: acquiring a use request of a target code number corresponding to the universal integrated circuit card; on the basis of the use request, acquiring a first location of the electronic device; looking up the first location in a first white list, the first white list comprising a permitted use location of the universal integrated circuit card; when the first location is found in the first white list, allowing the universal integrated circuit card to be used at the first location; when the first location is not found in the first white list, prohibiting use of the universal integrated circuit card at the first location. Thus, use of the eUICC card is limited.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

42.

METHOD FOR MANAGING AT LEAST ONE EUICC INFORMATION SET (EIS) OF A EUICC AND INTERMEDIATE BUFFER PROXY

      
Numéro d'application 18703490
Statut En instance
Date de dépôt 2022-10-06
Date de la première publication 2024-12-19
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Ruiz Litwinski, David

Abrégé

A method for managing at least one eUICC information set (EIS) of a eUICC. The method comprises the following consecutive steps: generating a first request for registering the eUICC information set (EIS) at an eUICC manufacturer (EUM), the first request comprising a first Function Call Identifier (FCI); sending the first request from the eUICC manufacturer (EUM) to an intermediate buffer proxy; generating a response to the first request within the intermediate buffer proxy; and sending the response to the request to the eUICC manufacturer (EUM).

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 4/50 - Fourniture de services ou reconfiguration de services

43.

PROVISIONING OF A XUICC WITH AN OPERATING SYSTEM AND DATA AND PROGRAMS

      
Numéro d'application EP2024063818
Numéro de publication 2024/245798
Statut Délivré - en vigueur
Date de dépôt 2024-05-17
Date de publication 2024-12-05
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Lim, Beegek
  • Rösner, Martin
  • Huber, Ulrich

Abrégé

1. A method for provisioning an xUICC, destined to host one or more profiles for communication in a mobile communication network, comprising the steps: E1) Providing in the xUICC an OS load key, as a root of trust (RoT); E2) Loading and installing to the xUICC an xUICC operating system, xUICC OS, encrypted with the OS load key for the loading, the xUICC OS being designed to enable directly or indirectly receiving and installing in the xUICC one or several eSIM profiles; E3) Loading and storing to the xUICC xUICC unique data, encrypted with the OS load key for the loading, the xUICC unique data comprising at least one GSMA certificate, certifying the xUICC with the installed xUICC as certified for receiving and installing in the xUICC eSIM profiles; E4)* preparing the xUICC for a later downloading and installing step E4) of downloading and installing an eSIM profile, encrypted with the OS load key for the downloading, to the xUICC prepared with steps E1-E3, characterized in that the xUICC operating system, xUICC, of step E2), the xUICC unique data of step E3), and the eSIM profiles of step E4) are encrypted with the same OS load key provided in step E1).

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

44.

FLEXIBLE REMOTE SIM PROVISIONING

      
Numéro d'application 18571664
Statut En instance
Date de dépôt 2022-06-30
Date de la première publication 2024-10-31
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Nitsch, Nils
  • Li, Harry
  • Thorstensson, Tommy
  • Thorén, Dan
  • Haubner, Markus
  • Kitzmann, Andreas

Abrégé

A method, at a data generation server, for generation of a profile image for downloading the profile image from the profile server to an eUICC hosted in a device, is provided for the purpose of installing a profile corresponding to the profile image in the eUICC. The method includes the steps: Ga) provide, on the data generation server, at least one global identifier and at least a first functionality identifier and a second functionality identifier different from the first functionality identifier; Gb) generate, on the data generation server, at least a first profile image and a second profile image; Gc) assign the at least first and second profile images to the same global identifier; Gd) store the at least first and second profile image as profile images assigned to the same global identifier, for providing the first and second profile image to the profile server for download to eUICCs.

Classes IPC  ?

  • H04W 8/20 - Transfert de données utilisateur ou abonné

45.

UPDATE AGENT DOWNLOAD SCHEME

      
Numéro d'application 18574927
Statut En instance
Date de dépôt 2022-06-29
Date de la première publication 2024-10-24
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Gifre, Clara
  • Patino, David
  • Ruau, Federico

Abrégé

A method, a data structure, and an update agent for implementing a scheme for downloading an operating system image onto a secure element. The update agent receives from an external device an installation package for installing an operating system onto the secure element. The update agent requests control of the secure element and loads the operating system received with the installation package into the secure element, after which control of the secure element is transferred to the operating system.

Classes IPC  ?

46.

UPDATE BACKUP AND FAILSAFE ROLLBACK IN SECURE ELEMENTS

      
Numéro d'application 18292484
Statut En instance
Date de dépôt 2022-07-26
Date de la première publication 2024-10-24
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Perarnau, Xavier
  • Couto, Marta
  • Gifre, Clara
  • Patino, David
  • Ruau, Federico

Abrégé

A method and an apparatus for updating software loaded on a secure element, SE, which SE comprises an update agent handler, and an update agent. In a first step, a request to backup a current version of software loaded on the SE is received at the SE. The request is sent from a device, external to the SE. Upon receiving the backup request, the SE performs a secure backup of the current software version, and returns the software backup to the device, to be stored thereon. In a further step, the SE performs an update process of the current software version, to obtain an updated software version. If the update process fails, a rollback is performed at the SE to restore the software backup as a new current soft-ware version on the SE.

Classes IPC  ?

47.

METHOD IN A SECURE ELEMENT

      
Numéro d'application 18685360
Statut En instance
Date de dépôt 2022-08-19
Date de la première publication 2024-10-17
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Dirnberger, Wolfgang

Abrégé

A method in a secure element, SE, for generating at least one symmetric key and/or one SE-specific cryptographic key pair for creating and transmitting a response to an identity query, including a GET IDENTITY command, transmitted by a network. The invention additionally relates to an SE, a computer program product and a system comprising an SE and a network.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité

48.

UPDATE AGENT WITH PROVISIONING CONNECTIVITY AND SECURE ELEMENT COMPRISING THE SAME

      
Numéro d'application 18292398
Statut En instance
Date de dépôt 2022-07-26
Date de la première publication 2024-10-17
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Patino, David
  • Gifre, Clara
  • Ruau, Federico

Abrégé

An update agent, a secure element containing the update agent, and a method for retrieving a software image to be stored onto the secure element includes a communication interface for providing connectivity to a storage module for downloading software images onto the SE. The update agent has a first memory storing authentication data for authenticating software images, and a second memory storing credentials for personalizing software images.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie

49.

Delegated eUICC Profile Management

      
Numéro d'application 18683143
Statut En instance
Date de dépôt 2022-08-09
Date de la première publication 2024-10-17
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Perarnau, Xavier

Abrégé

Methods, interfaces and devices for delegated management of profiles of an embedded Universal Integrated Circuit Card, eUICC, are included in a mobile device. Delegated management is provided to a profile selected from a list of profiles available at the eUICC by registering the eUICC with a server and joining with the selected profile an existing subscription group of profiles on the server or by creating a new subscription group on the server based on the selected profile.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

50.

UPDATE AGENT AND DATA PRE-SEEDING IN UPDATE AGENT

      
Numéro d'application 18292524
Statut En instance
Date de dépôt 2022-07-26
Date de la première publication 2024-10-10
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Patino, David
  • Gifre, Clara
  • Ruau, Federico
  • Kornefalk, Bjorn

Abrégé

An update agent, a secure element containing the update agent, and a method for loading and personalizing a software in the secure element are provided. In a first step, an update agent is loaded into the se-cure element. In a further step, software personalization data is loaded into the secure element, and stored in the update agent. Subsequently, the software is loaded into the secure element and personalized using the software personalization data stored in the update agent.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 9/445 - Chargement ou démarrage de programme

51.

USER PATTERN ORIENTED METHOD AND SYSTEM FOR PREVENTION OF RISK IN CARD BASED TRANSACTIONS

      
Numéro d'application 18293013
Statut En instance
Date de dépôt 2022-07-27
Date de la première publication 2024-10-03
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Kotkunde, Anjali Suresh

Abrégé

A method is provided to effectively preempt or prevent any instance of fraudulent, or otherwise unauthorized and/or undesired use of a Card by dynamic, user-configurable profiling of user and/or usage pattern information. The system implementation includes a duo of Payment applet and Fraud Rule detection Applet in separate packages provided on the Card and a Mobile Applet on smart phone of the Card owner, which trio interactively enabling the Card holder to keep and configure the CRM rules for effectively safeguarding against fraudulent and/or undesired transactions using the Card.

Classes IPC  ?

  • G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
  • G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
  • G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives

52.

PROTECTION OF A KEY ENCAPSULATION MECHANISM, KEM, AGAINST FAULT INJECTION ATTACKS

      
Numéro d'application EP2024053665
Numéro de publication 2024/193906
Statut Délivré - en vigueur
Date de dépôt 2024-02-14
Date de publication 2024-09-26
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Guillen Hernandez, Oscar

Abrégé

A first processing entity, comprising an implementation covering at least a Key Decapsulation Phase of a Key Encapsulation Mechanism, KEM, constructed to share a key to be shared between a second processing entity and said first processing entity, wherein the first processing entity, when executing the implementation of the Key Decapsulation Phase, executes a decapsulation method, the decapsulation method is characterized in that the decapsulation method comprises: a decapsulation count mechanism coupled to or integrated into the Key Decapsulation Phase of the KEM, comprising steps to: (i) detect and count and store in the processing entity decapsulation errors occurring when the Key Decapsulation Phase is executed, and (ii) when the count of decapsulation errors reaches or exceeds a predefined count limit, initiate an error measure.

Classes IPC  ?

  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés

53.

PROFILE GENERATION FOR PROVISIONING THE PROFILE TO AN EUICC

      
Numéro d'application 18596972
Statut En instance
Date de dépôt 2024-03-06
Date de la première publication 2024-09-12
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Schnellinger, Michael

Abrégé

A method for generating at least one profile, for provisioning the profile to an eUICC designed to be hosted in a device, includes the steps: S1) providing profile generation data, including static profile data for generating a profile container (T_ISD-P[ ]) and dynamic; S2) generating a profile (P1), and a dynamic-data description file (D-XML) indicating content and storage location of at least the dynamic profile data in the profile; S3-1) creating, in the eUICC at least one profile container (T_ISD-P[ ]); S3-2) providing the profile (P1) and the dynamic-data description file (D-XML) to a Dynamic Converter, and at the Dynamic Converter, with support of the dynamic-data description file (D-XML), extracting the dynamic profile data from the profile (P1), for later transferring the extracted dynamic profile data (EDP-P1) to the eUICC, and installing the transferred extracted dynamic profile data (EDP-P1) into the profile container (T_ISD-P[ ]) created in step S3-1).

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné

54.

PROFILE PROVISIONING FROM EUICC PRODUCTION MACHINE TO EUICC

      
Numéro d'application 18596905
Statut En instance
Date de dépôt 2024-03-06
Date de la première publication 2024-09-12
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s) Schnellinger, Michael

Abrégé

A method for provisioning a profile to an eUICC designed to be hosted in a mobile device, includes the steps: providing an eUICC production machine comprising or having connected thereto an eUICC read/write facility, and being installed in a secure production environment; providing an IFPP Controller installed in the secure production environment; provide dynamic profile data to the IFPP Controller; providing the eUICC, with at least one already present created profile container created from static profile data, at the eUICC production machine; by the IFPP Controller, providing the dynamic profile data to the eUICC production machine; by the eUICC production machine, downloading the dynamic profile data via the eUICC read/write facility to the eUICC, and writing the dynamic profile data into the profile container, so as to install the profile and thereby provision the profile to the eUICC.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles

55.

ENCRYPTION SCHEME FOR PROVIDING SOFTWARE UPDATES TO AN UPDATE AGENT

      
Numéro d'application 18574474
Statut En instance
Date de dépôt 2022-06-29
Date de la première publication 2024-09-05
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Gifre, Clara
  • Patino, David
  • Ruau, Federico

Abrégé

Methods, apparatus and systems are provided for implementing an encryption scheme for providing a software image to a secure element. The software image is converted into a sequence of ciphered blocks, which is protected with an authentication tag to obtain a sequence of protected blocks, which are then transmitted to an update agent on the secure element. The steps of converting the software image into a sequence of ciphered blocks and protecting the sequence of ciphered blocks with an authentication tag are implemented by an authenticated encryption function using a same block cipher.

Classes IPC  ?

  • G06F 8/65 - Mises à jour
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

56.

FLEXIBLE REMOTE SIM PROVISIONING

      
Numéro d'application 18571956
Statut En instance
Date de dépôt 2022-06-30
Date de la première publication 2024-08-29
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Nitsch, Nils
  • Li, Harry
  • Thorstensson, Tommy
  • Thorén, Dan
  • Haubner, Markus
  • Kitzmann, Andreas

Abrégé

A method, on a data generation server, is for preparing generating a profile image for download from a profile server to an eUICC hosted in a device, for the purpose of installing a profile corresponding to the profile image in the eUICC, the method comprising the steps: a) at a data generation server, generate, for multiple devices, multiple non-personalized profile images, each non-personalized profile image comprising at least one functionality identifier specific for the respective device, and each non-personalized profile image not comprising any individual global identifier specific of an individual eUICC, and store the generated multiple non-personalized profile images for providing to the profile server; b) at the data generation server, generate at least one profile-data image, said profile-data image comprising at least one individual global identifier of an individual eUICC, and store the generated at least one profile-data image for providing to the profile server.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/0431 - Distribution ou pré-distribution de clésMise en accord de clés
  • H04W 12/42 - Dispositions de sécurité utilisant des modules d’identité utilisant des modules virtuels d’identité

57.

AUTHENTICATION SCHEME FOR PROVIDING SOFTWARE UPDATES TO AN UPDATE AGENT

      
Numéro d'application 18571919
Statut En instance
Date de dépôt 2022-06-29
Date de la première publication 2024-08-22
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Gifre, Clara
  • Patino, David
  • Ruau, Federico

Abrégé

A method, an update agent and an off-card entity are provided for implementing an authentication scheme for providing a software image to a secure element. An installation package includes a package binding function for linking the installation package to the secure element, a manifest, a manifest signature generated using a block-cipher algorithm, and a software image is received at an update agent within the secure element. The update agent implements an authentication and integrity scheme by verifying various signatures contained within the installation package and installing the software image in case of successful authentication and integrity verification.

Classes IPC  ?

  • G06F 8/65 - Mises à jour
  • G06F 8/61 - Installation
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

58.

METHOD IN A SECURE ELEMENT

      
Numéro d'application 18682702
Statut En instance
Date de dépôt 2022-08-09
Date de la première publication 2024-08-22
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Dirnberger, Wolfgang

Abrégé

A method in a secure element (SE), includes the following method steps: obtaining, in the SE, an identity query, in particular a GET IDENTITY command, sent by a network; encrypting, by means of the SE, identity data stored on the SE, in order to generate encrypted identity data using a symmetrical key generated in the SE before the obtaining step; applying, by means of the SE, a message authentication code (MAC) algorithm to the generated encrypted identity data in order to obtain a MAC; and creating and sending a response to the identity query from the SE to the network, wherein the message contains the encrypted identity data and the MAC. An SE is provided for a computer program product, and a system comprising a SE and a network.

Classes IPC  ?

  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes

59.

PERSONALIZATION OF A SECURE ELEMENT

      
Numéro d'application 18292420
Statut En instance
Date de dépôt 2022-07-26
Date de la première publication 2024-08-15
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Gifre, Clara
  • Patino, David
  • Ruau, Federico
  • Gomez Jimenez, Ruben

Abrégé

A method for personalizing a software, in particular an operating system OS, in a secure element, SE, includes the steps of loading a software image into the memory of the SE; loading a software personalization record comprising personalization data into the memory of the SE; and personalizing the loaded software image using the software personalization data. Personalization of the software image is initiated by an internal agent of the SE. Initiation personalization of the software image by the internal agent is triggered by a trigger event that is detected by the internal agent, the trigger event being unrelated to software personalization.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie

60.

Things360

      
Numéro d'application 019065675
Statut Enregistrée
Date de dépôt 2024-08-08
Date d'enregistrement 2025-02-11
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 10 - Appareils et instruments médicaux
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 39 - Services de transport, emballage et entreposage; organisation de voyages
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Electronic devices for locating individuals and mobile objects, in particular, vehicles, containers and goods, through use of GPS, cellular telephone networks and radio frequency ranging and triangulation; electronic transponder devices for property protection; signaling and checking apparatus and instruments utilizing tracking and positioning technologies, namely, transponders, GPS receivers, cellular modems, radio ranging devices, laser or other ray-based distance measuring devices which enable positioning by triangulation for use in the dispatch, control, as well as the prevention of unauthorized use of movable objects, namely, persons, land, air, rail, ship, and space vehicles, boxes, parcels, trailers, swap trailers, containers of all types and sizes; electronic location transponders, in particular for satellites and GPS systems; apparatus for tracking and positioning of mobile objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes; computer program for smartphones or other electronic devices featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; Internet of Things gateways; Internet of Things sensors; Computer hardware modules for use with the Internet of Things in the field of transport and logistics; Computer application software for use in implementing the Internet of Things in the field of transport and logistics; Data processing systems in the field of transport and logistics; Data processing software in the field of transport and logistics; Computer software for the remote control of office machines and equipment; Machine control software; Environmental control software; Application software to control lighting; Software to control building environmental, access and security systems; Software for monitoring, analyzing, controlling and running physical world operations in the field of transport and logistics, Lighting control software for use in commercial and industrial facilities; Wireless controllers to remotely monitor and control the function and status of security systems; Wireless controllers to remotely monitor and control the function and status of electrical, electronic, and mechanical devices or systems; Measuring and control devices for air conditioning technology; Remote control telemetering machines and instruments; Vehicle tracking apparatus; Vehicle tracking systems; Navigation, guidance, tracking, targeting and map making devices; Automatic solar tracking sensors; Downloadable computer software for remote monitoring and analysis in the field of transport and logistics; Environmental monitoring software; Computer software for use in remote meter monitoring; Cameras for monitoring and inspecting equipment in a nuclear power station; Sensors, detectors and monitoring instruments; Measuring, detecting, monitoring and controlling devices; Liquid level monitoring apparatus; Apparatus for monitoring gas consumption; Apparatus for monitoring heat consumption; Apparatus for monitoring water consumption; Sensors for monitoring physical movements; Apparatus for monitoring electrical energy consumption. Diagnostic, examination, and monitoring equipment; Patient monitoring sensors and alarms; Sensor apparatus for medical use in monitoring the vital signs of patients; Heart rate monitoring apparatus; Blood glucose monitoring apparatus; Patient monitoring instruments. Data processing; Data processing management; Data processing services; Automated data processing; Data processing, systematization and management; Administrative support and data processing services. Installation, maintenance and repair of temperature control apparatus; Advisory services relating to the maintenance of environmental control systems; Advisory services relating to the repair of environmental control systems; Providing information relating to the repair or maintenance of water pollution control equipment; Repair of water pollution control equipment; Maintenance of water pollution control equipment; Maintenance and repair of physical access control; Maintenance and repair of access control systems; Repair or maintenance of water pollution control equipment; Maintenance of passenger lifts via remote monitoring systems. Providing telecommunications connections to the internet, databases and software platforms for tracking, tracing, positioning, visualizing on digital maps, and remote-control of mobile objects; online services, namely, electronic transmission of messages, in particular for computer-assisted management and tracking, dispatching, and controlling movable objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes. Location tracking of individuals and mobile objects using computers, PCs, notebooks, tablets, cellphones or similar devices; fleet control of motor vehicles and containers by means of electronic navigation and tracking apparatus; computer-aided tracking of motor vehicles, ships, containers, installations, machines and individuals; information relating to transport services by a website; Cargo tracking services; Tracking and tracing of shipments; Electronic tracking of parcels for third parties; Locating and tracking of cargo for transportation purposes; Tracking of passenger vehicles by computer or via GPS; Tracking of passenger or freight vehicles by computer or via GPS; Advisory services relating to the tracking of goods in transit; Tracking, locating, dispatching and monitoring of mobile objects & devices, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes, for commercial purposes with the use of computers, PCs, notebooks, tablets, cellphones or similar devices. Providing temporary use of non-downloadable computer software in combination with online mapping services, for tracking the location of individuals and mobile objects over computer networks, intranet and the internet in the field of transport and logistics; providing a website featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; Creation of control programs for automated measurement, assembly, adjustment, and related visualization; Design and development of computer software for process control in the field of transport and logistics; Providing temporary use of non-downloadable computer software for tracking packages over computer networks, intranets and the internet; Providing temporary use of non-downloadable computer software for tracking freight over computer networks, intranets and the internet; Design and development of software for control, regulation and monitoring of solar energy systems; Providing temporary use of online, non-downloadable computer software for use in broadcast monitoring applications in the field of transport and logistics; Monitoring of computer systems for security purposes; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems for detecting unauthorized access or data breach; Machine condition monitoring; Monitoring of building structures; Monitoring of contaminated land; Condition monitoring relating to fluids; Condition monitoring relating to greases; Condition monitoring relating to lubricants; Condition monitoring relating to oils; Services for monitoring industrial processes; Monitoring of contaminated land for gas; Airborne remote monitoring relating to scientific explorations; Monitoring the quality control of seismic procedures; Monitoring of activities which influence the environment within buildings; Monitoring of events which influence the environment within buildings; Monitoring of events which influence the environment within civil engineering structures; Monitoring of activities which influence the environment within civil engineering structures; Monitoring of commercial and industrial sites for detection of volatile and non-volatile organic compounds; Environmental monitoring services; Environmental monitoring of waste storage areas; Environmental monitoring of waste treatment areas; Airborne remote monitoring relating to environmental explorations; Monitoring of water quality; Monitoring of stream water quality; Process monitoring for quality assurance. Monitoring of patients; Remote monitoring of medical data for medical diagnosis and treatment. Stolen property tracking and location services, namely, computer-assisted locating of vehicles, ships, equipment, machines and individuals; stolen property tracking and location services, namely, determining the location of individuals and mobile objects by means of computers, PCs, notebooks, tablets, cellphones or similar devices; Locating and tracking of lost property; Monitoring fire alarms; Monitoring of alarms; Medical alarm monitoring; Monitoring of security systems; Monitoring fire detection systems; Home security alarm monitoring; Monitoring burglar and security alarms; Monitoring of burglar and security alarms; Electronic monitoring services for security purposes.

61.

SECURE SESSION CAPABILITY BY ENCRYPTION OF RANDOM NUMBERS IN HANDSHAKE MESSAGES UNDER A PRESHARED KEY

      
Numéro d'application EP2024051932
Numéro de publication 2024/160678
Statut Délivré - en vigueur
Date de dépôt 2024-01-26
Date de publication 2024-08-08
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Patel, Praveen

Abrégé

Disclosed herein is a method for ensuring secure TLS13 sessions in which the random data in client and server hello messages are encrypted under a unique ssPSK shared previously with both the client and the server, therein making it impossible for hackers / bots to ascertain said random data to generate the sessions key.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
  • H04W 12/033 - Protection de la confidentialité, p. ex. par chiffrement du plan utilisateur, p. ex. trafic utilisateur

62.

IoTgo

      
Numéro d'application 019065645
Statut Enregistrée
Date de dépôt 2024-08-08
Date d'enregistrement 2025-01-10
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 10 - Appareils et instruments médicaux
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 39 - Services de transport, emballage et entreposage; organisation de voyages
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Electronic devices for locating individuals and mobile objects, in particular, vehicles, containers and goods, through use of GPS, cellular telephone networks and radio frequency ranging and triangulation; electronic transponder devices for property protection; signaling and checking apparatus and instruments utilizing tracking and positioning technologies, namely, transponders, GPS receivers, cellular modems, radio ranging devices, laser or other ray-based distance measuring devices which enable positioning by triangulation for use in the dispatch, control, as well as the prevention of unauthorized use of movable objects, namely, persons, land, air, rail, ship, and space vehicles, boxes, parcels, trailers, swap trailers, containers of all types and sizes; electronic location transponders, in particular for satellites and GPS systems; apparatus for tracking and positioning of mobile objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes; computer program for smartphones or other electronic devices featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; Internet of Things gateways; Internet of Things sensors; Computer hardware modules for use with the Internet of Things; Computer application software for use in implementing the Internet of Things; Data processing systems; Data processing software; Computer software for the remote control of office machines and equipment; Machine control software; Environmental control software; Application software to control lighting; Software to control building environmental, access and security systems; Software for monitoring, analyzing, controlling and running physical world operations, Lighting control software for use in commercial and industrial facilities; Wireless controllers to remotely monitor and control the function and status of security systems; Wireless controllers to remotely monitor and control the function and status of electrical, electronic, and mechanical devices or systems; Measuring and control devices for air conditioning technology; Remote control telemetering machines and instruments; Vehicle tracking apparatus; Vehicle tracking systems; Navigation, guidance, tracking, targeting and map making devices; Automatic solar tracking sensors; Downloadable computer software for remote monitoring and analysis; Environmental monitoring software; Computer software for use in remote meter monitoring; Cameras for monitoring and inspecting equipment in a nuclear power station; Sensors, detectors and monitoring instruments; Measuring, detecting, monitoring and controlling devices; Liquid level monitoring apparatus; Apparatus for monitoring gas consumption; Apparatus for monitoring heat consumption; Apparatus for monitoring water consumption; Sensors for monitoring physical movements; Apparatus for monitoring electrical energy consumption. Diagnostic, examination, and monitoring equipment; Patient monitoring sensors and alarms; Sensor apparatus for medical use in monitoring the vital signs of patients; Heart rate monitoring apparatus; Blood glucose monitoring apparatus; Patient monitoring instruments. Data processing; Data processing management; Data processing services; Automated data processing; Data processing, systematization and management; Administrative support and data processing services. Installation, maintenance and repair of temperature control apparatus; Advisory services relating to the maintenance of environmental control systems; Advisory services relating to the repair of environmental control systems; Providing information relating to the repair or maintenance of water pollution control equipment; Repair of water pollution control equipment; Maintenance of water pollution control equipment; Maintenance and repair of physical access control; Maintenance and repair of access control systems; Repair or maintenance of water pollution control equipment; Maintenance of passenger lifts via remote monitoring systems. Providing telecommunications connections to the internet, databases and software platforms for tracking, tracing, positioning, visualizing on digital maps, and remote-control of mobile objects; online services, namely, electronic transmission of messages, in particular for computer-assisted management and tracking, dispatching, and controlling movable objects, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes. Location tracking of individuals and mobile objects using computers, PCs, notebooks, tablets, cellphones or similar devices; fleet control of motor vehicles and containers by means of electronic navigation and tracking apparatus; computer-aided tracking of motor vehicles, ships, containers, installations, machines and individuals; information relating to transport services by a website; Cargo tracking services; Tracking and tracing of shipments; Electronic tracking of parcels for third parties; Locating and tracking of cargo for transportation purposes; Tracking of passenger vehicles by computer or via GPS; Tracking of passenger or freight vehicles by computer or via GPS; Advisory services relating to the tracking of goods in transit; Tracking, locating, dispatching and monitoring of mobile objects & devices, namely, individuals, equipment, land, air, rail and space vehicles, boats, boxes, parcels, trailers, swap trailers, containers of all types and sizes, for commercial purposes with the use of computers, PCs, notebooks, tablets, cellphones or similar devices. Providing temporary use of non-downloadable computer software in combination with online mapping services, for tracking the location of individuals and mobile objects over computer networks, intranet and the internet; providing a website featuring technology enabling users to remotely view, monitor, program, operate, dispatch and control fleet vehicles or other mobile logistics objects; Creation of control programs for automated measurement, assembly, adjustment, and related visualization; Design and development of computer software for process control; Providing temporary use of non-downloadable computer software for tracking packages over computer networks, intranets and the internet; Providing temporary use of non-downloadable computer software for tracking freight over computer networks, intranets and the internet; Design and development of software for control, regulation and monitoring of solar energy systems; Providing temporary use of online, non-downloadable computer software for use in broadcast monitoring applications; Monitoring of computer systems for security purposes; Monitoring of computer systems to detect breakdowns; Monitoring of computer systems for detecting unauthorized access or data breach; Machine condition monitoring; Monitoring of building structures; Monitoring of contaminated land; Condition monitoring relating to fluids; Condition monitoring relating to greases; Condition monitoring relating to lubricants; Condition monitoring relating to oils; Services for monitoring industrial processes; Monitoring of contaminated land for gas; Airborne remote monitoring relating to scientific explorations; Monitoring the quality control of seismic procedures; Monitoring of activities which influence the environment within buildings; Monitoring of events which influence the environment within buildings; Monitoring of events which influence the environment within civil engineering structures; Monitoring of activities which influence the environment within civil engineering structures; Monitoring of commercial and industrial sites for detection of volatile and non-volatile organic compounds; Environmental monitoring services; Environmental monitoring of waste storage areas; Environmental monitoring of waste treatment areas; Airborne remote monitoring relating to environmental explorations; Monitoring of water quality; Monitoring of stream water quality; Process monitoring for quality assurance. Monitoring of patients; Remote monitoring of medical data for medical diagnosis and treatment. Stolen property tracking and location services, namely, computer-assisted locating of vehicles, ships, equipment, machines and individuals; stolen property tracking and location services, namely, determining the location of individuals and mobile objects by means of computers, PCs, notebooks, tablets, cellphones or similar devices; Locating and tracking of lost property; Monitoring fire alarms; Monitoring of alarms; Medical alarm monitoring; Monitoring of security systems; Monitoring fire detection systems; Home security alarm monitoring; Monitoring burglar and security alarms; Monitoring of burglar and security alarms; Electronic monitoring services for security purposes.

63.

INSTALLING AN OPERATING SYSTEM IN A PROCESSOR DEVICE, IN PARTICULAR A SAFETY MODULE

      
Numéro d'application DE2024100073
Numéro de publication 2024/160320
Statut Délivré - en vigueur
Date de dépôt 2024-01-29
Date de publication 2024-08-08
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Stocker, Thomas
  • Steinmeier, Steffen
  • Jager, Barbara

Abrégé

The invention relates to a method for installing an operating system in a processor device, which operating system comprises a plurality of two or more sets of operating-system functionalities, or for installing parts of such an operating system, the method comprising the following steps: - loading the operating system, or the parts of the operating system, in the processor device; and - installing the loaded operating system, or the loaded parts of the operating system, in the processor device; characterised in that a) the operating system, or the parts of the operating system, is/are loaded in the form of at least one or more mutually separate operating-system modules, wherein the operating-system module or the operating-system module in question b) contains a code which is configured to install a set of operating-system functionalities in the processor device, which set corresponds to the operating-system module, and c) allows for the separate installation of only that set of operating-system functionalities that corresponds to the operating-system module in question, in particular without further sets of operating-system functions being installed.

Classes IPC  ?

64.

UPDATE OF AN OPERATING SYSTEM IN A SECURITY ELEMENT

      
Numéro d'application 18291689
Statut En instance
Date de dépôt 2022-07-26
Date de la première publication 2024-08-01
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Patino, David
  • Gifre, Clara
  • Ruau, Federico
  • Gomez Jimenez, Ruben

Abrégé

A method is for updating an operating system, OS, administering a file system in a secure element, SE. The method includes the steps of providing an update agent in the SE; assuming control of the SE by the update agent from the operating system; loading an OS image into the SE, the OS image representing an update of the operating system; providing an updated operating system by installing the OS image; and handing over control of the SE by the update agent to the updated operating system. Within this update process, the update agent provides a provisional file system in the SE and administers the provisional file system as long as the update agent is in control of the SE. A respective secure element, a respective update agent, and to a respective computer-program product employ the method.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 8/61 - Installation
  • G06F 21/60 - Protection de données

65.

REPLACEMENT OF EXECUTABLE LOAD FILES IN SECURE ELEMENTS

      
Numéro d'application 18578208
Statut En instance
Date de dépôt 2022-07-11
Date de la première publication 2024-07-25
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Patino, David
  • Gifre, Clara
  • Ruau, Federico

Abrégé

A method and a device for upgrading an Executable Load File, ELF, having dependencies, on a Secure Element, SE. The method includes in a first step receiving a request for upgrading an ELF. The request involves a first identifier, identifying a first ELF version loaded on the SE, a second identifier, identifying a second ELF version loaded on the SE, and an upgrade option. Upon receiving the request, dependencies of the first ELF version from other ELFs loaded or stored on the SE are determined. Subsequently, if dependencies have been determined, it is checked whether the upgrade re-quest is allowed. If the update request is allowed, an upgrade session is started and the first ELF version is replaced with the second ELF version. The dependencies of the first ELF version are then linked to the second ELF version.

Classes IPC  ?

  • G06F 8/65 - Mises à jour
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

66.

CHANGE AND RECOVERY OF PERSONALIZATION DATA IN A SECURE ELEMENT

      
Numéro d'application 18411563
Statut En instance
Date de dépôt 2024-01-12
Date de la première publication 2024-07-18
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Inventeur(s)
  • Gifre, Clara
  • Patino, David
  • Gomez, Xavier
  • Naranjo Gallardo, Patricia

Abrégé

A method is provided for changing and recovering personalization data of a trusted software in a secure element and changing and restoring diversified data. The method includes the steps of providing an update agent in the secure element; storing personalization data in the installed software; performing a Full Reflash to recover or update a software or operating system comprising the steps of first securing personalization data to a memory of the update agent before, in following step, recovering or loading a software image into the secure element. The method includes as a final step personalizing the software image by the personalization data secured during the first step of the Full Reflash.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données

67.

PROFILE PROVISIONING PLATFORM

      
Numéro d'application 18490994
Statut En instance
Date de dépôt 2023-10-20
Date de la première publication 2024-07-11
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Badawy, Waleed
  • Patel, Nirmalkumar Vasant
  • Korber, Frank
  • Ruiz Litwinski, David

Abrégé

A profile provisioning platform, includes a profile database which allows access by at least two different profile providers or/and at least two different use case owners or/and at least two different UICC requesters; and which includes a business relation manager managing access of the different profile providers, use case owners and UICC requesters to data in the profile database.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/306 - Profils des utilisateurs
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles

68.

TERMINAL WITH AN ASSISTANCE MODULE FOR MANAGING TELECOMMUNICATIONS PROFILES STORED IN THE TERMINAL AND MANAGEMENT METHOD

      
Numéro d'application DE2023100985
Numéro de publication 2024/132039
Statut Délivré - en vigueur
Date de dépôt 2023-12-20
Date de publication 2024-06-27
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Huber, Ulrich
  • Dietze, Claus

Abrégé

The invention relates to a terminal (50) with an embedded identification module (70), which is designed to carry out profile management actions, with which a telecommunications profile (80) stored in the embedded identification module (70) can be changed or a new telecommunications profile (80) can be loaded. The embedded identification module (70) has a first assistance module (72), which provides a first interface to a remote management unit (20), and a second assistance module (72), which is connected to the embedded identification module (70) and provides a second interface to a profile provision entity (10). At the same time, either the first assistance module (72) or the second assistance module (52) is active. The terminal (50) obtains command data sets from the remote management unit (20), containing profile management actions. The first assistance module (72) is active and causes a profile management action to be carried out, if the profile management action relates to a change in the status of a telecommunications profile (80) stored in the embedded identification module (70). The second assistance module (52) is active and causes a profile management action to be carried out, if same relates to the loading of a new telecommunications profile (80).

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/42 - Dispositions de sécurité utilisant des modules d’identité utilisant des modules virtuels d’identité
  • H04W 8/20 - Transfert de données utilisateur ou abonné

69.

METHOD FOR PERSONALIZING A SECURE ELEMENT

      
Numéro d'application 18554084
Statut En instance
Date de dépôt 2022-04-05
Date de la première publication 2024-04-18
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Lim, Beegek
  • Rosner, Martin

Abrégé

A method for personalizing a secure element, had the following steps: receiving, in a data generator, a request for a bundle of storage images for a plurality of secure elements; obtaining, in the data generator, at least one subscription data set for at least one securing element to be personalized of the plurality of secure elements; providing an operating system or a part of the operating system for the secure element to be personalized; generating, by means of the data generator, a storage image for each of the secure elements according to the received request; and bundling the generated storage image and providing the bundled storage image in the form of a storage image bundle by means of the data generator in order to complete the terminal, thereby introducing at least the storage image of the secure element to be personalized into the secure element.

Classes IPC  ?

  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
  • H04W 24/06 - Réalisation de tests en trafic simulé

70.

METHOD FOR OPERATING A DISTRIBUTION SERVER SYSTEM

      
Numéro d'application EP2023025423
Numéro de publication 2024/074225
Statut Délivré - en vigueur
Date de dépôt 2023-10-06
Date de publication 2024-04-11
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Sanchez, Alejandro
  • Dans, Martin
  • Garcia, Luis Domingo
  • Gallego, Ixent
  • Joshi, Mukesh
  • Arbós, Noemí
  • Gaur, Mudit

Abrégé

The present invention is directed towards a computer-implemented method for operating a distribution server system which allows the reduction of traffic load and especially spam is avoided. Moreover, the present invention is directed towards the distribution server system as such, along with a computer program product comprising instructions for implementing the suggested method and operating the suggested distribution server system.

Classes IPC  ?

  • G06Q 10/107 - Gestion informatisée du courrier électronique
  • G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
  • H04L 67/1036 - Répartition de la charge des demandes adressées aux serveurs pour des services autres que la fourniture de contenu à utilisateur, p. ex. répartition des charges entre serveurs de noms de domaine

71.

REST STATE MODE FOR SMART CARDS

      
Numéro d'application DE2023100684
Numéro de publication 2024/056132
Statut Délivré - en vigueur
Date de dépôt 2023-09-13
Date de publication 2024-03-21
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Shingnapurkar, Rushikesh
  • Rösner, Martin

Abrégé

Exemplary embodiments of a method and a device for implementing a rest state mode for a smart card are provided. A rest state trigger command is received on the smart card by a terminal with which the smart card is in communicative connection. On the smart card, a maximum rest state time is determined and transmitted to the terminal, as a result of which the smart card transitions to the rest state mode.

Classes IPC  ?

  • H04W 52/02 - Dispositions d'économie de puissance
  • G06F 1/3203 - Gestion de l’alimentation, c.-à-d. passage en mode d’économie d’énergie amorcé par événements

72.

EUICC PROVISIONING AND NOTIFICATION HANDLING THEREIN

      
Numéro d'application 18364645
Statut En instance
Date de dépôt 2023-08-03
Date de la première publication 2024-02-08
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Dietze, Claus

Abrégé

A method of providing to a remote entity a Notification referring to a profile download to an eUICC, includes the following steps: downloading a profile to the eUICC from a Personalization Equipment, wherein the Personalization Equipment is constructed to effect or to support: to provision eUICCs by one or several of: downloading profiles, installing downloaded profiles in eUICCs or supporting such installing, and personalizing eUICCs and/or profiles downloaded to eUICCs or supporting such personalizing; after the profile download, generating at least one Notification referring to the profile download; providing the generated at least one Notification for sending it to a remote entity; generating and providing the at least one Notification at the Personalization Equipment.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné

73.

UPDATE AGENT FOR MULTIPLE OPERATING SYSTEMS IN A SECURE ELEMENT

      
Numéro d'application EP2023025319
Numéro de publication 2024/012717
Statut Délivré - en vigueur
Date de dépôt 2023-07-13
Date de publication 2024-01-18
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Gifre, Clara
  • Patino, David
  • Ruau, Federico
  • Gomez Jimenez , Ruben

Abrégé

The present invention relates to a method and an apparatus for managing multiple operating systems on a secure element. A secure element comprises an update agent configured to identify a first operating system, being actively used by the secure element, to identify inactive operating systems within the secure element, which are not actively used by the secure element, and to allocate the inactive operating systems to a storage provider.

Classes IPC  ?

  • G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil

74.

PROFILE AND SUBSCRIBER IDENTITY MODULE HAVING PROFILE

      
Numéro d'application 18339483
Statut En instance
Date de dépôt 2023-06-22
Date de la première publication 2023-12-28
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Dietze, Claus

Abrégé

A profile for implementation in a or implemented in a subscriber identity module (eUICC), wherein the profile can adopt at least a first and a second profile state. The profile including profile metadata. The profile metadata has a profile-state-management flag which can adopt a first and a second flag state of the profile-state-management flag. If the flag adopts the first flag state, any management servers are permitted to change the profile state of the profile.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

75.

SOFTWARE ELIGIBILITY

      
Numéro d'application 18041861
Statut En instance
Date de dépôt 2021-08-18
Date de la première publication 2023-10-19
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Amoros, Luis Miguel
  • Bravo, Hector
  • De Antonio, Pablo
  • Gifre, Clara
  • Patino, David

Abrégé

A method is for making sure that a piece of software to be installed on an end device is compatible with an existing software and especially the underlying hardware structure of the end device. Software components can be evaluated before installing them, thus preventing incompatible software components from being installed on an end device which would harm or destroy the same. A system arrangement is implemented in accordance with the suggested method along with a computer program product including control instructions for implementing the suggested method.

Classes IPC  ?

  • G06F 8/61 - Installation
  • G06F 8/658 - Mises à jour par incrémentMises à jour différentielles

76.

PERSONALIZATION OF A SECURE ELEMENT

      
Numéro d'application 17927506
Statut En instance
Date de dépôt 2021-05-26
Date de la première publication 2023-06-01
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Eckardt, Stefan
  • Rosner, Martin
  • Lim, Beegek

Abrégé

A method for personalizing an integrated secure element, which is permanently installed in a mobile end device. The method involves the agreement of a shared secret between the secure element and an HSM, encrypting an operating system, and possibly personalization data and/or one or several profiles, in the HSM based on the shared secret and transferring the encrypted operating system to the secure element, and re-encrypting the operating system in the secure element for storage in the NVM memory of the mobile end device.

Classes IPC  ?

  • H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/08 - Répartition de clés

77.

SOFTWARE UPDATE IN A SECURITY ELEMENT

      
Numéro d'application EP2022025349
Numéro de publication 2023/006246
Statut Délivré - en vigueur
Date de dépôt 2022-07-26
Date de publication 2023-02-02
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Ruau, Mariano
  • Gifre, Clara
  • Garcia Farrés, Andreu
  • Gomez Soll, Pablo Daniel

Abrégé

In a first aspect, the present invention relates to a method for updating an installed software (60a), in particular an operating system, OS, (30a) in a secure element (100). The method comprises the steps of providing S1 an update agent (10) in the secure element (100); securing S3 specific data (35a; 65a) required for operating the installed software (30a; 60a) in a memory (12) of the update agent (10); loading S4a a software image (30b); (60b) into the secure element (100), the software image (30b; 60b) representing an update of the installed software (30a; 60a); and making the software image (30b; 60b) operable by the secured specific data (35b; 65b). According to further aspects, the present invention relates to a respective secure element (100), an update agent (10), and a computerprogram product in relation to other aspects of the invention.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie

78.

Backlog mechanism for subscriber profiles on EUICCs

      
Numéro d'application 17852988
Numéro de brevet 12082297
Statut Délivré - en vigueur
Date de dépôt 2022-06-29
Date de la première publication 2023-01-05
Date d'octroi 2024-09-03
Propriétaire GIESECKE-DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Larsson, Thomas

Abrégé

Methods and devices are arranged for managing reset and re-downloaded profiles Over-the-Air on an eUICC. An operator system imports a profiles list from a server, each entry in the list comprising a flag indicating whether the corresponding profile has been downloaded onto the eUICC. Upon receiving, from a mobile network operator, MNO, a request to update a profile on the eUICC, the request comprising a profile identifier and an OTA campaign, the operator system performs a backlog of the OTA campaign for the profile indicated by the profile identifier under consideration of the flag in the corresponding profile entry.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné

79.

BORN CONNECTED

      
Numéro d'application 1699824
Statut Enregistrée
Date de dépôt 2022-06-03
Date d'enregistrement 2022-06-03
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; cards for use with mobile terminals; encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; cards with a contactless interface; smart cards; security tokens [encryption devices]; wearable computers; smart meters; data processing equipment for communication with the aforesaid cards, in particular mobile terminals, tablets, laptop computers; servers; cloud servers; server software; operating system and applications software for the aforesaid cards and data processing equipment; software for telecommunications, mobility, telematic, identity, authentication or financial services; personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; downloadable software for smartcards and mobile terminals. Arranging subscriptions to telecommunication services for others, arranging subscriptions to telematics, telephone or computer services; data processing for the collection of data for business purposes; data management services; business data analysis services; marketing research, all of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; targeted data search for others in computer files. Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; maintenance of computerised systems, in particular of communication systems [hardware]; installation, maintenance and consultancy relating to installation, maintenance and repair of computer hardware; installation and maintenance of hardware for computer networks and internet access. Telecommunication services; telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; providing access to telecommunications infrastructures for others, in particular for electronic payment services; telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; secured transmission of information on networks and other telecommunications networks; consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; server administration; server hosting; hosting of computerized data, files, applications and information; design and development of computerised systems, in particular communication systems; providing virtual computer systems through cloud computing; technological consultancy in relation to computerised systems; design of software, in particular for telecommunications systems; programming of operating software for computer networks and servers; providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; data security services; installation, maintenance and consultancy with regard to software; development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency computer security services for issuing and administrating certified codes and algorithms; authentication services and computer security services for managing certified keys and algorithms; data mining; it consultancy and programming for generating digital identities; it consultancy and programming for generating digital certificates; distribution [issuance] of digital certificates.

80.

BORN SECURED

      
Numéro d'application 1699823
Statut Enregistrée
Date de dépôt 2022-05-13
Date d'enregistrement 2022-05-13
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; cards for use with mobile terminals; encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; cards with a contactless interface; smart cards; security tokens [encryption devices]; wearable computers; smart meters; data processing equipment for communication with the aforesaid cards, in particular mobile terminals, tablets, laptop computers; servers; cloud servers; server software; operating system and applications software for the aforesaid cards and data processing equipment; software for telecommunications, mobility, telematic, identity, authentication or financial services; personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; downloadable software for smartcards and mobile terminals. Arranging subscriptions to telecommunication services for others, arranging subscriptions to telematics, telephone or computer services; data processing for the collection of data for business purposes; data management services; business data analysis services; marketing research, all of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; targeted data search for others in computer files. Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; maintenance of computerised systems, in particular of communication systems [hardware]; installation, maintenance and consultancy relating to installation, maintenance and repair of computer hardware; installation and maintenance of hardware for computer networks and internet access. Telecommunication services; telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; providing access to telecommunications infrastructures for others, in particular for electronic payment services; telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; secured transmission of information on networks and other telecommunications networks; consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; server administration; server hosting; hosting of computerized data, files, applications and information; design and development of computerised systems, in particular communication systems; providing virtual computer systems through cloud computing; technological consultancy in relation to computerised systems; design of software, in particular for telecommunications systems; programming of operating software for computer networks and servers; providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; data security services; installation, maintenance and consultancy with regard to software; development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency computer security services for issuing and administrating certified codes and algorithms; authentication services and computer security services for managing certified keys and algorithms; data mining; it consultancy and programming for generating digital identities; it consultancy and programming for generating digital certificates; distribution [issuance] of digital certificates.

81.

Token, particularly OTP, based authentication system and method

      
Numéro d'application 17825322
Numéro de brevet 11968531
Statut Délivré - en vigueur
Date de dépôt 2022-05-26
Date de la première publication 2022-12-01
Date d'octroi 2024-04-23
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Sangai, Shreyas

Abrégé

A method for authenticating a mobile device of a user versus a third-party such that instead of a mobile phone number MSISDN of the mobile device, a Universal Unique User Identifier, U3I, assigned to the mobile device is used, in combination with a secure routing service server constructed to communicate with a third-party server and with an MNO server. The secure routing service server and the MNO server interact to translate the Universal Unique User Identifier, U3I, to the mobile phone number MSISDN so as to enable sending the token to the mobile device.

Classes IPC  ?

82.

Method for setting up a subscription profile, method for providing a subscription profile, subscriber identity module

      
Numéro d'application 17612440
Numéro de brevet 12114166
Statut Délivré - en vigueur
Date de dépôt 2020-05-19
Date de la première publication 2022-07-21
Date d'octroi 2024-10-08
Propriétaire GIESECK+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Nitsch, Nils

Abrégé

The invention relates to a method for setting up a subscription profile in a subscriber identity module, preferably an embedded UICC, wherein the following method steps take place in the subscriber identity module: receiving a subscription profile encrypted with a cryptographic key of a subscription server, wherein the cryptographic key for decrypting the subscription profile is unknown to the subscriber identity module at the time of receiving; storing the encrypted subscription profile without decrypting the subscription profile; receiving the cryptographic key at a time after the storing step; decrypting the encrypted subscription profile with the cryptographic key; and installing the decrypted subscription profile to set up the subscription profile in the subscriber identity module. The invention also relates to a corresponding method in a subscription server, a subscriber identity module, and a computer program product.

Classes IPC  ?

  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
  • H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
  • H04W 12/40 - Dispositions de sécurité utilisant des modules d’identité

83.

BORN CONNECTED

      
Numéro d'application 222657300
Statut Enregistrée
Date de dépôt 2022-06-03
Date d'enregistrement 2025-05-09
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in connection with telecommunications, mobility, telematic, identity, authentication and financial services; integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in connection with telecommunications, mobility, telematic, identity, authentication and financial services on mobile terminals, in particular on computer networks and telecommunications networks; cards for use with mobile terminals, namely, SIM cards, embedded SIM cards, integrated SIM cards; encoded cards, namely, encoded chip cards for use in cryptographic methods, in particular for telecommunications, mobility, telematic, identity, authentication and financial services; cards with a contactless interface, namely, cards with integrated circuits; blank smart cards; security tokens [encryption devices]; wearable computers in the nature of smartwatches and smart glasses; smart meters being electricity meter; data processing equipment for communication with cards with integrated circuits, in particular mobile terminals, tablets, laptop computers; computer network servers; cloud servers; downloadable and recorded network access server operating software; downloadable and recorded operating system and applications software for telecommunications, mobility, telematic, identity, authentication and financial services in connection with the aforesaid cards and data processing equipment; downloadable and recorded software for telecommunications, mobility, telematic, identity, authentication and financial services for use in database management and cellular communication; personalisation and management systems in the nature of downloadable and recorded software programs for cellular communication and data services, database management, encryption, and decryption for use in connection with cards with integrated circuits, security tokens and other embedded software; downloadable and recorded computer programs for development, maintenance and management of the aforesaid software in the nature of programming software; downloadable and recorded computer software for use in encryption and decryption services; downloadable software for smartcards and mobile terminals, namely software for accessing, authenticating, tracking, encrypting, and transmitting information in the field of financial transactions. (1) Arranging subscriptions to telecommunication services for others, arranging subscriptions to telematics, telephone or computer services; data processing for the collection of data for business purposes; data management services, namely, data collection and data consolidation; business data analysis services in the field of information security; marketing research, all of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; targeted data search for others in computer files. (2) Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; maintenance of hardware for computerized systems, in particular of communication systems hardware; installation and maintenance of hardware for computer networks and internet access. (3) Telecommunication services, namely, leasing of telecommunications equipment; telecommunications consultancy in the field of telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; data transfer by telecommunications, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; providing access to telecommunications infrastructures for others, in particular for electronic payment services; telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; providing of telecommunications access to an online platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; secured transmission of information on networks and other telecommunications networks; consultancy relating to communication systems. (4) Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; server administration; server hosting; hosting of computerized data, files, applications and information; design and development of computerised systems, in particular communication systems; providing virtual computer systems through cloud computing; technological consultancy in relation to computerised systems; design of software, in particular for telecommunications systems; programming of operating software for computer networks and servers; providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; data security services; installation, maintenance and consultancy with regard to software; development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency computer security services for issuing and administrating certified codes and algorithms; authentication services and computer security services for managing certified keys and algorithms; data mining; it consultancy and programming for generating digital identities; it consultancy and programming for generating digital certificates; distribution [issuance] of digital certificates.

84.

BORN SECURED

      
Numéro d'application 222656300
Statut Enregistrée
Date de dépôt 2022-05-13
Date d'enregistrement 2025-05-09
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in connection with telecommunications, mobility, telematic, identity, authentication and financial services; integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in connection with telecommunications, mobility, telematic, identity, authentication and financial services on mobile terminals, in particular on computer networks and telecommunications networks; cards for use with mobile terminals, namely, SIM cards, embedded SIM cards, integrated SIM cards; encoded cards, namely, encoded chip cards for use in cryptographic methods, in particular for telecommunications, mobility, telematic, identity, authentication and financial services; cards with a contactless interface, namely, cards with integrated circuits; blank smart cards; security tokens [encryption devices]; wearable computers in the nature of smartwatches and smart glasses; smart meters being electricity meter; data processing equipment for communication with cards with integrated circuits, in particular mobile terminals, tablets, laptop computers; computer network servers; cloud servers; downloadable and recorded network access server operating software; downloadable and recorded operating system and applications software for telecommunications, mobility, telematic, identity, authentication and financial services in connection with the aforesaid cards and data processing equipment; downloadable and recorded software for telecommunications, mobility, telematic, identity, authentication and financial services for use in database management and cellular communication; personalization and management systems in the nature of downloadable and recorded software programs for cellular communication and data services, database management, encryption, and decryption for use in connection with cards with integrated circuits, security tokens and other embedded software; downloadable and recorded computer programs for development, maintenance and management of the aforesaid software in the nature of programming software; downloadable and recorded computer software for use in encryption and decryption services; downloadable software for smartcards and mobile terminals, namely software for accessing, authenticating, tracking, encrypting, and transmitting information in the field of financial transactions. (1) Arranging subscriptions to telecommunication services for others, arranging subscriptions to telematics, telephone or computer services; data processing for the collection of data for business purposes; data management services, namely, data collection and data consolidation; business data analysis services in the field of information security; marketing research, all of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; targeted data search for others in computer files. (2) Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; maintenance of hardware for computerized systems, in particular of communication systems hardware; installation and maintenance of hardware for computer networks and internet access. (3) Telecommunication services, namely, leasing of telecommunications equipment; telecommunications consultancy in the field of telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; data transfer by telecommunications, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; providing access to telecommunications infrastructures for others, in particular for electronic payment services; telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; providing of telecommunications access to an online platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; secured transmission of information on networks and other telecommunications networks; consultancy relating to communication systems. (4) Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; server administration; server hosting; hosting of computerized data, files, applications and information; design and development of computerised systems, in particular communication systems; providing virtual computer systems through cloud computing; technological consultancy in relation to computerised systems; design of software, in particular for telecommunications systems; programming of operating software for computer networks and servers; providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; data security services; installation, maintenance and consultancy with regard to software; development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency computer security services for issuing and administrating certified codes and algorithms; authentication services and computer security services for managing certified keys and algorithms; data mining; it consultancy and programming for generating digital identities; it consultancy and programming for generating digital certificates; distribution [issuance] of digital certificates.

85.

Method for providing subscription profiles, subscriber identity module and subscription server

      
Numéro d'application 17439111
Numéro de brevet 11930558
Statut Délivré - en vigueur
Date de dépôt 2020-03-12
Date de la première publication 2022-05-12
Date d'octroi 2024-03-12
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Nitsch, Nils

Abrégé

The invention relates to a method for providing subscription profiles to a subscriber identity module, preferably an eUICC, by means of a subscription server, preferably an SM-DP, wherein: the subscription server has knowledge of a first subscription profile, which is installed in the subscriber identity module, has a first profile file structure and first profile data stored in the first profile file structure; and at least a portion of a second profile file structure of a second subscription profile is flagged in the subscription server and the second subscription profile is sent to the subscriber identity module, the flagged portion of the second subscription profile being sent without second profile data. The invention additionally relates to a corresponding method in a subscriber identity module, a subscriber identity module, a subscription server and a computer program product.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné

86.

Method and devices for managing subscription profiles on a security element

      
Numéro d'application 17427260
Numéro de brevet 11943837
Statut Délivré - en vigueur
Date de dépôt 2020-01-29
Date de la première publication 2022-04-28
Date d'octroi 2024-03-26
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Morawietz, Andreas
  • Nitsch, Nils
  • Huber, Ulrich
  • Wimbock, Ulrich

Abrégé

A method for managing subscription profiles of a security element, which is provided for use in a mobile end device and on which a profile manager and at least one first subscription profile is loaded, includes: loading a second subscription profile from a subscription management server; checking whether the at least one first loaded subscription profile satisfies a predetermined condition; and putting the at least one first subscription profile out of operation when the at least one first subscription profile satisfies the predetermined condition.

Classes IPC  ?

  • H04W 8/04 - Enregistrement dans un registre de localisation nominal ou un serveur d'abonnés locaux [HSS Home Subscriber Server]
  • H04W 8/08 - Transfert de données de mobilité
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 12/06 - Authentification

87.

Transfer functionality between secure elements servers

      
Numéro d'application 17416889
Numéro de brevet 11997495
Statut Délivré - en vigueur
Date de dépôt 2019-12-18
Date de la première publication 2022-03-17
Date d'octroi 2024-05-28
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Laina Farell, Joan Carles
  • Honorato Garcia, José Ignacio
  • Patiño Piedra, David
  • Sanchez Muñoz, Blanca Esther

Abrégé

It is provided a method for transferring and managing data packages between a first portable secure element, SE, server implemented in a portable device (100, 200) and a second portable SE server implemented in an embedded UICC, eUICC (120, 240), comprised in a user's device (110, 230) which is local to the portable device (100, 200), the first and second portable SE severs comprising Subscription Manager, SM, functionalities, the method comprises the first and the second portable SE servers establishing off-line communication using local data transport protocols in a secured mode, the first or the second portable SE server implementing first transfer functionalities (140) for performing secure transfer of the data packages and the first or the second portable SE server implementing second transfer functionalities (140) for performing end-to-end securing of the data packages after the secure transfer of the data packages.

Classes IPC  ?

  • H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
  • H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
  • H04W 8/20 - Transfert de données utilisateur ou abonné
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles

88.

BORN SECURED

      
Numéro d'application 018646313
Statut Enregistrée
Date de dépôt 2022-01-31
Date d'enregistrement 2022-07-07
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; Cards for use with mobile terminals; Encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; Cards with a contactless interface; Smart cards; Security tokens [encryption devices]; Wearable computers; Smart meters; Data processing equipment for communication with the aforesaid cards, In particular mobile terminals, Tablets, Laptop computers; Servers; Cloud servers; Server software; Operating system and applications software for the aforesaid cards and data processing equipment; Software for telecommunications, mobility, telematic, identity, authentication or financial services; Personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; Computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; Downloadable software for smartcards and mobile terminals. Arranging subscriptions to telecommunication services for others, Arranging subscriptions to telematics, telephone or computer services; Data processing for the collection of data for business purposes; Data management services; Business data analysis services; Marketing research, All of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; Targeted data search for others in computer files. Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; Maintenance of computerised systems, in particular of communication systems; Installation, maintenance and consultancy relating to the aforesaid hardware; Installation and maintenance of hardware for computer networks and Internet access. Telecommunication services; Telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; Data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; Providing access to telecommunications infrastructures for others, in particular for electronic payment services; Telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; Providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; Secured transmission of information on networks and other telecommunications networks; Consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; Server administration; sever hosting; Hosting of computerized data, files, applications and information; Design and development of computerised systems, in particular communication systems; Providing virtual computer systems through cloud computing; Consultancy in relation to computerised systems; Design of software, in particular for telecommunications systems; Programming of operating software for computer networks and servers; Providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; Data security services; Installation, maintenance and consultancy with regard to the aforesaid software; Development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; Certification agency services (trust centres), in particular issuing and administration of certified codes and algorithms; Authentication services and fiduciary issue and management of certified keys and algorithms; Data mining; IT services for generating digital identities; IT services for generating digital certificates; Distribution [issuance] of digital certificates.

89.

BORN CONNECTED

      
Numéro d'application 018645867
Statut Enregistrée
Date de dépôt 2022-01-31
Date d'enregistrement 2022-06-29
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; Cards for use with mobile terminals; Encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; Cards with a contactless interface; Smart cards; Security tokens [encryption devices]; Wearable computers; Smart meters; Data processing equipment for communication with the aforesaid cards, In particular mobile terminals, Tablets, Laptop computers; Servers; Cloud servers; Server software; Operating system and applications software for the aforesaid cards and data processing equipment; Software for telecommunications, mobility, telematic, identity, authentication or financial services; Personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; Computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; Downloadable software for smartcards and mobile terminals. Arranging subscriptions to telecommunication services for others, Arranging subscriptions to telematics, telephone or computer services; Data processing for the collection of data for business purposes; Data management services; Business data analysis services; Marketing research, All of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; Targeted data search for others in computer files. Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; Maintenance of computerised systems, in particular of communication systems; Installation, maintenance and consultancy relating to the aforesaid hardware; Installation and maintenance of hardware for computer networks and Internet access. Telecommunication services; Telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; Data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; Providing access to telecommunications infrastructures for others, in particular for electronic payment services; Telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; Providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; Secured transmission of information on networks and other telecommunications networks; Consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; Server administration; sever hosting; Hosting of computerized data, files, applications and information; Design and development of computerised systems, in particular communication systems; Providing virtual computer systems through cloud computing; Consultancy in relation to computerised systems; Design of software, in particular for telecommunications systems; Programming of operating software for computer networks and servers; Providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; Data security services; Installation, maintenance and consultancy with regard to the aforesaid software; Development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency services (trust centers), In particular issuing and management of certified keys and algorithms; Authentication services and fiduciary issue and management of certified keys and algorithms; Data mining; IT services for generating digital identities; IT services for generating digital certificates; Distribution [issuance] of digital certificates.

90.

Polling from device to OTA core system via OTA edge system

      
Numéro d'application 17290020
Numéro de brevet 11979806
Statut Délivré - en vigueur
Date de dépôt 2019-10-24
Date de la première publication 2021-12-30
Date d'octroi 2024-05-07
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Hult, Jorgen
  • Thorstensson, Par
  • Thorstensson, Tommy
  • Kokeritz, Anders
  • Bolander, Mats
  • Eklund, Joachim
  • Gaur, Mudit
  • Ohlsson, Michael

Abrégé

An OTA Edge system, constructed to: (1) receive polling requests, dedicated to an OTA Core system, from one or several mobile end de-vices; wherein an offload filter implemented in the OTA Edge system and constructed to: (2) accept polling requests from mobile end devices for which contents are present on the OTA Core system, and (2′) reject polling re-quests from mobile end devices for which no contents are present on the OTA Core system.

Classes IPC  ?

  • H04W 4/50 - Fourniture de services ou reconfiguration de services
  • G16Y 30/00 - Infrastructure de l’IdO

91.

OFFLINE SCRIPTING FOR REMOTE FILE MANAGEMENT

      
Numéro d'application 17213658
Statut En instance
Date de dépôt 2021-03-26
Date de la première publication 2021-09-30
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Amoros, Luis Miguel
  • Monter Prat, Jordi

Abrégé

Methods, devices and systems are provided for performing remote file management, RFM, operations at a secure element, SE. A secure file update script is received at an OfflineRFMAgent, located within the SE, from an off card entity, OCE. The secure file update script has been generated offline by an SE issuer managing the OCE, using a decentralized remote file management, DRFM, platform, and comprises a plurality of remote management commands for carrying out file management operations on the SE. In a further step, a security level authentication between the OCE and SE based on the secure file update script is performed. If the security level authentication is successful, in a subsequent step a secure channel session between the OCE and the SE is established through the OfflineRFMAgent. Finally, the plurality of remote management commands is processed to remotely manage a file system on the SE.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 16/182 - Systèmes de fichiers distribués

92.

Green SIM by G+D

      
Numéro d'application 018456528
Statut Enregistrée
Date de dépôt 2021-04-20
Date d'enregistrement 2021-08-21
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 16 - Papier, carton et produits en ces matières
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; Cards for use with mobile terminals; Encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; Cards with a contactless interface; Smart cards; Security tokens [encryption devices]; Wearable computers; Smart meters; Data processing equipment for communication with the aforesaid cards, In particular mobile terminals, Tablets, Laptop computers; Servers; Cloud servers; Server software; Operating system and applications software for the aforesaid cards and data processing equipment; Software for telecommunications, mobility, telematic, identity, authentication or financial services; Personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; Computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; Downloadable software for smartcards and mobile terminals. Paper; Millboard; Folding boxes, made of the follwing materials, Paper, Millboard; mailing folders, Packaging boxes, made of the follwing materials, Paper, Millboard; Packaging materials made from paper or card; Packaging of paper or cardboard; Bags, pouches and goods of paper or cardboard for packaging, wrapping and storage purposes. Telecommunication services; Telecommunications consultancy; Operation of telecommunications systems; Wireless communications services; Mobile communication network services; Telecommunications routing and junction services; Location-based telecommunications network services; Computer network communications, Communication by computer terminals, Communications by fibreoptic networks; Radio communications services, Telephony communication services; Data transmission, Especially, In connection with subscriptions, in relation to the following fields, Telematics services, Telephone services, Computer service; Providing third party users with access to telecommunication infrastructure; Telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; Providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; Secured transmission of information on networks and other telecommunications networks; Consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; Server administration; sever hosting; Hosting of computerized data, files, applications and information; Design and development of computerised systems, in particular communication systems; Providing virtual computer systems through cloud computing; Consultancy in relation to computerised systems; Design of software, in particular for telecommunications systems; Programming of operating software for computer networks and servers; Providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; Data security services; Installation, maintenance and consultancy with regard to the aforesaid software; Development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency services (trust centers), In particular issuing and management of certified keys and algorithms; Authentication services and fiduciary issue and management of certified keys and algorithms; Data mining; IT services for generating digital identities; IT services for generating digital certificates; Distribution [issuance] of digital certificates.

93.

IMEI storage

      
Numéro d'application 17125327
Numéro de brevet 11848929
Statut Délivré - en vigueur
Date de dépôt 2020-12-17
Date de la première publication 2021-04-08
Date d'octroi 2023-12-19
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s)
  • Götze, Frank
  • Dietze, Claus
  • Eichholz, Jan

Abrégé

A chip set for a terminal comprises at least one secure processor, in which a one-time programmable memory is integrated. At least one terminal serial number of the terminal is stored in the chip set. Information for securing the terminal serial number against tampering is stored in the one-time programmable memory.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/06 - Authentification
  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 12/71 - Identité matérielle

94.

AirOn360

      
Numéro d'application 1557634
Statut Enregistrée
Date de dépôt 2020-09-09
Date d'enregistrement 2020-09-09
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; cards for use with mobile terminals; encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; cards with a contactless interface; smart cards; security tokens [encryption devices]; wearable computers; smart meters; data processing equipment for communication with the aforesaid cards, in particular mobile terminals, tablets, laptop computers; servers; cloud servers; server software; operating system and applications software for the aforesaid cards and data processing equipment; software for telecommunications, mobility, telematic, identity, authentication or financial services; personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; downloadable software for smartcards and mobile terminals. Arranging subscriptions to telecommunication services for others, arranging subscriptions to telematics, telephone or computer services; data processing for the collection of data for business purposes; data management services; business data analysis services; marketing studies, all of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; targeted data search for others in computer files. Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; maintenance of computerised systems, in particular of communication systems; installation, maintenance and consultancy relating to the aforesaid hardware; installation and maintenance of hardware for computer networks and internet access. Telecommunications; telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; providing access to telecommunications infrastructures for others, in particular for electronic payment services; telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; secured transmission of information on networks and other telecommunications networks; consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; server administration; server hosting; hosting of computerized data, files, applications and information; design and development of computerised systems, in particular communication systems; providing virtual computer systems through cloud computing; consultancy in relation to computerised systems; design of software, in particular for telecommunications systems; programming of operating software for computer networks and servers; providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; data security services; installation, maintenance and consultancy with regard to the aforesaid software; development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency services (trust centers), in particular issuing and management of certified keys and algorithms; authentication services and fiduciary issue and management of certified keys and algorithms; data mining; IT services for generating digital identities; IT services for generating digital certificates; distribution [issuance] of digital certificates.

95.

AirOn360

      
Numéro d'application 206089800
Statut Enregistrée
Date de dépôt 2020-09-09
Date d'enregistrement 2023-05-31
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

(1) Integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in cryptographic methods and authentication processes in connection with telecommunications, mobility, telematic, identity, authentication or financial services; integrated circuit cards, namely, encoded integrated circuit cards for use in cryptographic methods and authentication processes in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; cards for use with mobile terminals, namely, SIM cards, embedded SIM cards, integrated SIM cards, embedded secure elements in the nature of SIM cards, and integrated secure elements in the nature of SIM cards; encoded cards, namely, encoded electronic chip cards for use in cryptographic methods and authentication processes in connection with telecommunications, mobility, telematic, identity, authentication or financial services; cards with a contactless interface, namely, cards with integrated circuits; smart cards, namely, encoded integrated circuit cards for use in cryptographic methods and authentication processes; security tokens [encryption devices]; wearable computers, namely, smartwatch, wearable activity trackers, smartglasses; smart meters, for measuring energy and water consumption; data processing equipment, namely, mobile terminals, tablets, laptop computers for communication with integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in cryptographic methods and authentication processes, encoded cards, namely, encoded chip cards for use in cryptographic methods and authentication processes and smart cards, namely, encoded integrated circuit cards for use in cryptographic methods and authentication processes; servers, namely, computer servers, internet servers, network servers; cloud servers; operating software for network access servers; operating system software; downloadable computer application software for integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in cryptographic methods and authentication processes, encoded cards, namely, encoded chip cards for use in cryptographic methods and authentication processes and smart cards, namely, encoded integrated circuit cards for use in cryptographic methods and authentication processes and data processing equipment, namely, mobile computer terminals, tablets, laptop computers for enablement of cellular communication and data services, database management, encryption and decryption; recorded and downloadable software for telecommunications, mobility, telematic, identity, authentication or financial management services for cellular communication and data services, database management, encryption and decryption; personalization and management systems in the nature of recorded and downloadable programs for cellular communication and data services, database management, encryption, and decryption for cards with integrated circuits, security tokens [encryption units] and other embedded operating software; computer programs and computer software for development, maintenance and management of integrated circuit cards, namely, encoded integrated circuit cards containing programming for use in cryptographic methods and authentication processes, encoded cards, namely, encoded chip cards for use in cryptographic methods and authentication processes and smart cards, namely, encoded integrated circuit cards for use in cryptographic methods and authentication processes; computer software for use in the encryption and decryption of digital files; downloadable software for operating magnetically, optically and electronically smartcards and mobile terminals (1) Arranging subscriptions to telecommunication services for others, namely arranging of subscriptions to internet access, to telephone plans, arranging subscriptions to a telematics, telephone or computer service for others; acquisition, compilation and systematization of data in computer databases for business purposes, in particular for mobile systems and applications, in particular in connection with the manufacture and personalization of chip cards and other electronic data carriers, namely, encoded identity cards, identification cards with embedded chips, identification smart cards, updating and maintenance of data in computer databases and cloud computing web hosting services; economic consulting in the management of business activities, in particular with regard to the procurement of durable capital goods, in particular machine tools, in particular for the manufacture and personalization of chip cards and other electronic data carriers, namely, encoded identity cards, identification cards with embedded chips, identification smart cards; analysis of business data and market research in particular in connection with the manufacture and personalization of chip cards and other electronic data carriers, namely, encoded identity cards, identification cards with embedded chips, identification smart cards, and for mobile systems and applications; business consulting in the form of developing of marketing strategies, in particular for mobile systems and applications in connection with the manufacture and personalization of chip cards and other electronic data carriers, namely, encoded identity cards, identification cards with embedded chips, identification smart cards; office functions in the nature of targeted data search for others in computer files (2) Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; maintenance of computerised systems, in particular of communication systems; installation and maintenance of computer hardware; consultancy relating to the aforesaid hardware, namely consultation about the maintenance and repair of computer hardware; installation and maintenance of hardware for computer networks and internet access (3) Telecommunications, namely, leasing of telecommunication equipment namely, cell phones, mobile telephones, computers, wireless electronic payment terminals, network routes, network servers; telecommunications consultancy, telecommunications support in the nature of advisory services related to telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, and location-based-services for telecommunications networks; providing electronic transmission of digital data and digital images relating to subscriptions to internet, telematic and telephone access, tracking and navigating vehicles and tracking other mobile goods, persons and animals, computer maintenance and repair services and printed and electronic publications and manuals in the field of computer hardware and software and in the field of the remote servicing of machines; providing electronic transmission of credit card transaction data and electronic payment data via a global computer network; telecommunications relating to the processing of payment transactions in electronic commerce via networks in the nature of providing electronic transmission of contactless payment data in the internet, in particular on the internet and via mobile telecommunications networks; providing access to Internet platforms for credit card transactions and electronic payment via a global computer network; providing secure multiple user access to global computer information networks for the transfer and dissemination of a wide range of information; providing access to telecommunications infrastructures of other operators, namely, providing communication services for communication by computers in the nature of sending digital data and digital images and voice messages over computer networks, providing access to global communication networks, the Internet and wireless networks, providing Internet access; providing Internet access via wireless broadband networks and cellular phone networks to other providers with access to communication services for communication by computers in the nature of sending digital text and digital images and voice messages over computer networks, to global communication networks, the Internet and wireless networks, to Internet, to multiple-user wireless access to the Internet, to Internet via wireless broadband networks and cellular phone networks and electronic transmission of credit card transaction data and electronic payment data via a global computer network (4) Scientific and technological consultancy in connection with design and development of computer hardware, software, portable data carriers and telecommunication computer hardware and computer software; scientific and technological research and development in connection with computer hardware, software, portable data carriers and telecommunication computer hardware and computer software; server administration; server hosting, namely web hosting; hosting of websites, computer-aided data and information, internet hosting and cloud hosting of computerized files and of applications of mobile computers and phones; design and development of computer software for computer-aided systems in particular communication systems for telematic purposes and the remote servicing of machines; providing virtual computer systems through cloud computing; consulting services relating to computer software for computer-aided systems for telematic purposes and the remote servicing of machines; design of software, in particular for telecommunications systems; programming of operating software for computer networks and servers; providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; data security services; installation, maintenance and consultancy with regard to the aforesaid software; development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency services (trust centers), in particular issuing and management of certified keys and algorithms; authentication services and fiduciary issue and management of certified keys and algorithms; data mining; IT consulting services for generating digital identities; distribution in the nature of issuance of digital certificates

96.

G+D Digital Key

      
Numéro d'application 018236551
Statut Enregistrée
Date de dépôt 2020-05-11
Date d'enregistrement 2020-09-22
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 37 - Services de construction; extraction minière; installation et réparation
  • 39 - Services de transport, emballage et entreposage; organisation de voyages
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Encoded keys; Encoded or magnetic key cards; Electronic keys for vehicles; Electronic key cards; USB web keys; Safety, security, protection and signalling devices; Access control devices; Electronic systems for communication between motor vehicles and road surveillance or toll systems; Access control systems for interlocked doors; Automatic access control equipment and systems; Electrical devices, In particular mobile devices, Smartphones and wearables [computers] for access control and to guarantee access security; Computer hardware and software; Computer programs for the enabling of access or entrance control; Downloadable software for smartcards and mobile terminals; Software for mobility, telematic, identity or authentication services; Navigation, guidance, tracking, targeting and map making devices. installation, maintenance and repair of access control systems; Installation and maintenance of hardware for safeguarding of electronic communications processes and identity verification processes; Installation, maintenance and repair of computers systems and networks (hardware). Car parking [valet] services; Car sharing services; Carpooling services. Application service provider services; Application service provider services; Software development; Research and development in connection with computer hardware and software; Design, development and maintenance of computerised systems; Cloud computing, Design and development of operating software for accessing and using a cloud computing network.

97.

AirOn360

      
Numéro d'application 018208513
Statut Enregistrée
Date de dépôt 2020-03-10
Date d'enregistrement 2020-07-28
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 35 - Publicité; Affaires commerciales
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services; Integrated circuit cards for use in connection with telecommunications, mobility, telematic, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; Cards for use with mobile terminals; Encoded cards, in particular for telecommunications, mobility, telematic, identity, authentication or financial services; Cards with a contactless interface; Smart cards; Security tokens [encryption devices]; Wearable computers; Smart meters; Data processing equipment for communication with the aforesaid cards, In particular mobile terminals, Tablets, Laptop computers; Servers; Cloud servers; Server software; Operating system and applications software for the aforesaid cards and data processing equipment; Software for telecommunications, mobility, telematic, identity, authentication or financial services; Personalisation and management systems for cards with integrated circuits, security tokens [encryption units] and other embedded software; Computer programs for development, maintenance and management of the aforesaid software; computer encryption and decryption software; Downloadable software for smartcards and mobile terminals. Arranging subscriptions to telecommunication services for others, Arranging subscriptions to telematics, telephone or computer services; Data processing for the collection of data for business purposes; Data management services; Business data analysis services; Marketing studies, All of the aforesaid services being in particular in connection with the manufacture and/or personalisation of chip cards and other electronic data carriers; Targeted data search for others in computer files. Installation, maintenance and repair of computer systems and networks [hardware], and telecommunications hardware for network systems, internet access, telecommunications systems, electronic commerce [e-commerce] and electronic payment transactions; Maintenance of computerised systems, in particular of communication systems; Installation, maintenance and consultancy relating to the aforesaid hardware; Installation and maintenance of hardware for computer networks and Internet access. Telecommunications; Telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; Data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; Providing access to telecommunications infrastructures for others, in particular for electronic payment services; Telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; Providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; Secured transmission of information on networks and other telecommunications networks; Consultancy relating to communication systems. Scientific and technological consultancy, research and development in connection with computer hardware, software, portable data carriers and telecommunications; Server administration; sever hosting; Hosting of computerized data, files, applications and information; Design and development of computerised systems, in particular communication systems; Providing virtual computer systems through cloud computing; Consultancy in relation to computerised systems; Design of software, in particular for telecommunications systems; Programming of operating software for computer networks and servers; Providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; Data security services; Installation, maintenance and consultancy with regard to the aforesaid software; Development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; certification agency services (trust centers), In particular issuing and management of certified keys and algorithms; Authentication services and fiduciary issue and management of certified keys and algorithms; Data mining; IT services for generating digital identities; IT services for generating digital certificates; Distribution [issuance] of digital certificates.

98.

Simworld

      
Numéro d'application 018202102
Statut Enregistrée
Date de dépôt 2020-02-26
Date d'enregistrement 2020-07-01
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 16 - Papier, carton et produits en ces matières
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Data processing programs, included in class 9. Data processing programmes in printed form; Printed matter in the field of information and data technology. Development, generation and renting of data processing programs.

99.

Method for managing partly and/or incompletely loaded subscription data

      
Numéro d'application 16098956
Numéro de brevet 11856647
Statut Délivré - en vigueur
Date de dépôt 2017-05-02
Date de la première publication 2019-06-27
Date d'octroi 2023-12-26
Propriétaire GIESECKE+DEVRIENT MOBILE SECURITY GERMANY GMBH (Allemagne)
Inventeur(s) Kurtz, Volker

Abrégé

A method for managing partly and/or incompletely loaded subscription data is provided for a mobile device and/or another device. A communication connection is established between the mobile device and the other device. Then, it is ascertained whether the partly and/or incompletely loaded subscription data is available on the other device, and a managing action is carried out on the partly and/or incompletely loaded subscription data.

Classes IPC  ?

  • H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
  • H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
  • H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
  • H04W 80/06 - Protocoles de couche transport, p. ex. protocole de commande de transport [TCP Transport Control Protocol] par liaison sans fil

100.

SIGNiT

      
Numéro d'application 018025888
Statut Enregistrée
Date de dépôt 2019-02-21
Date d'enregistrement 2019-10-05
Propriétaire Giesecke+Devrient Mobile Security Germany GmbH (Allemagne)
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 37 - Services de construction; extraction minière; installation et réparation
  • 38 - Services de télécommunications
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

Integrated circuit cards for use in connection with telecommunications, health, mobility, telematics, identity, authentication or finance services, in particular SIM cards; Cards with integrated circuits for use in connection with telecommunications, health, mobility, telematics, identity, authentication or financial services on mobile terminals, in particular on computer networks and telecommunications networks; Cards for use with mobile terminals; Encoded cards, in particular for telecommunications, health, mobility, telematics, identity, authentication or financial services, and as bank cards, debit cards and credit cards; Smart meters; Data processing equipment for communication with the aforesaid cards, In particular mobile terminals, Tablets, Laptop computers; Data carriers with programs stored thereon for telecommunications, health, mobility, telematics, identity, authentication or financial services; Operating system and applications software for the aforesaid cards and data processing equipment; Software for telecommunications, health, mobility, telematics, identity, authentication or financial services; Personalisation and management systems for cards with integrated circuits, tokens and other embedded software; Computer programs for development, maintenance and management of the aforesaid software; Downloadable software for smartcards and mobile terminals. Installation, maintenance and repair of computer systems and networks (hardware), and telecommunications hardware for network systems, internet access and telecommunications systems; Installation and maintenance of hardware for the development of concepts for safeguarding electronic communications processes and identity verification processes in commercial and private sectors based on cryptographic methods and authentication processes. Telecommunications; Telecommunications consultancy, telecommunications for operation of telecommunications systems, mobile communications networks, wireless communication services, telecommunications cabling, routing and connection services, location-based-services for telecommunications networks; Data transfer, in particular in connection with subscriptions to telematic, telephone or computer services and in particular in connection with remote maintenance of machines; Providing access to telecommunications infrastructures for others, in particular for electronic payment services; Telecommunications relating to the processing of payment transactions in electronic commerce via networks, in particular on the internet and via mobile telecommunications networks; Providing of access to a platform for the processing of payment transactions on networks, in particular on the internet and mobile telecommunications networks; Secured transmission of information on networks and other telecommunications networks. Scientific and technological consultancy, research and development in connection with computer hardware and software; Server hosting and administration; Hosting of computerized data, files, applications and information; Development, programming and implementation of operating system software, middleware and application software for data carriers and data processing apparatus; Updating, installation, upkeep and maintenance of the aforesaid operating system software, middleware and application software; Consultancy with regard to using and applying the aforesaid operating system software, middleware and the aforesaid application software; Development, programming, implementation and maintenance of computer-aided systems, in particular communications systems; Consultancy and development in relation to computer software and hardware; computer software and hardware rental services; Remote server administration; Remote maintenance of computer software and computer hardware; Cloud computing, design and development of operating software, middleware and application software for access to and the use of cloud computing networks; Providing virtual computer systems through cloud computing; Consultancy in relation to computerised systems, in particular communications systems; Design of software, in particular for telecommunications systems; Consultancy in relation to security on computers, computer networks and for computer transactions and computer applications, in particular in connection with mobile communication networks; Providing of security services in relation to computers, computer networks and computer transactions, in particular in connection with mobile communications networks; Data security services; Development of concepts for ensuring security in information and communications technology, for electronic commerce, electronic payment transactions, in particular mobile payment transactions; Consultancy with regard to the development of the aforesaid concepts; Development of software and hardware for ensuring security in information and communications technology, for electronic commerce, electronic payment transactions, in particular mobile payment transactions; Installation, maintenance and consultancy with regard to the aforesaid software; Technical consultancy with regard to the aforesaid hardware; Data mining; Targeted data searching; Design and development of data storage systems; Data security consultancy; Development of concepts, and software and hardware for ensuring security in information and communications technology; Development of concepts for the safeguarding of electronic communication processes and identity verification processes in the business and private sectors based on cryptographic methods and authentication processes, and installation and maintenance of related software; Encryption, decryption and authentication of information, messages and data; IT security, protection and restoration; certification agency services (trust centers), In particular issuing and management of certified keys and algorithms; Authentication in connection with certified keys and algorithms; Fiduciary functions (IT security) in connection with certified keys and algorithms; Digital watermarking; Monitoring of computer systems for detecting unauthorized access or data breach. Licensing of computer software [legal services]; Licensing of technology; Consultancy in the field of security, in particular relating to security solutions for computer networks and digital applications; Providing authentication of personal identification information [identification verification services]; Authentication of identification data for identifying machines, tokens, integrated circuit cards and other items connected with a computer network (identity verification); Consultancy in the field of data theft and identity theft; Identity validation services; Identity verification; Conducting identity verification; Creation, management and administration of digital identities; Creation, management and administration of digital certificates.
  1     2        Prochaine page