MH

Michel Hazard

BC Bull Cp8: 6 patents #2 of 34Top 6%
BS Bull S.A.: 3 patents #40 of 402Top 10%
CT Cp8 Technologies: 2 patents #5 of 20Top 25%
CA Cii Honeywell Bull (Societe Anonyme): 1 patents #15 of 46Top 35%
CT Cp8 Transac: 1 patents #2 of 8Top 25%
📍 Aubergenville, FR: #2 of 73 inventorsTop 3%
Overall (All Time): #387,563 of 4,157,543Top 10%
13
Patents All Time

Issued Patents All Time

Showing 1–13 of 13 patents

Patent #TitleCo-InventorsDate
7330979 Method for protecting the processing of sensitive information in a monolithic security module, and associate security module 2008-02-12
6977577 Method for authenticating a portable object, corresponding portable object, and apparatus therefor 2005-12-20
6658566 Process for storage and use of sensitive information in a security module and the associated security module 2003-12-02
5729609 Method for producing a common key in two devices, in order to implement a common cryptographic procedure, and associated apparatus Yves Moulart, Michel Dawirs 1998-03-17
5533126 Key protection device for smart cards 1996-07-02
5365466 Method for generating a random number in a system with portable electronic objects, and system for implementing the method 1994-11-15
5177790 Method for generating a random number in a data processing system/and system for implementing the method 1993-01-05
5153581 Method for authentication by an external medium of a portable object such as a memory card coupled to this medium 1992-10-06
5089959 Method and system for management of an electronic memory representing predetermined homogeneous units 1992-02-18
4910773 Method of dispatching secret keys to security modules and user cards in a data processing network Jean-Michel Desjardins, Francois Chemin 1990-03-20
4907270 Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line 1990-03-06
4907272 Method for authenticating an external authorizing datum by a portable object, such as a memory card Michel Ugon 1990-03-06
4811393 Method and system for diversification of a basic key and for authentication of a thus-diversified key 1989-03-07