A method of processing a multimedia fragment into two or more variants of the multimedia fragment, each variant having a different watermark, the method comprising: fragmenting a multimedia content into a sequence of fragments; watermarking a plurality of the fragments to create two or more variants of each of the plurality of fragments, wherein the two or more variants of one fragment are watermarked using different watermarks; adjusting the length of the two or more variants for at least one of the fragments to a same adjusted length, wherein the adjusted length is indicative of a temporal position of the two or more variants of the at least one of the fragments compared to variants of other fragments in the sequence of fragments.
A method of enabling a user to access recorded data associated with an event, the method comprising determining the location of a user's device at a control unit, confirming the location is within a predetermined vicinity and that the user's device was at the location within a predetermined period and the control unit enabling access for the user to the data if the location of the user's device in the predetermined period is confirmed.
Example embodiments provide systems and methods for dynamically creating intuitive favorites for a user. The system and methods include monitoring actions performed, by the user at a digital receiver, with respect to a plurality of content programs. The actions performed with respect to the plurality of content programs are analyzed. The analysis includes comparing a level of the actions with respect to a first content program of the plurality of content programs with a threshold. Based on the comparing indicating that the first content program is a favorites, an indication that the first content program is a favorites content program is stored to a data store.
H04N 21/431 - Génération d'interfaces visuellesRendu de contenu ou données additionnelles
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 16/78 - Recherche de données caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
G06F 16/9538 - Présentation des résultats des requêtes
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
H04N 21/442 - Surveillance de procédés ou de ressources, p. ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans le disque dur interne
H04N 21/45 - Opérations de gestion réalisées par le client pour faciliter la réception de contenu ou l'interaction avec le contenu, ou pour l'administration des données liées à l'utilisateur final ou au dispositif client lui-même, p. ex. apprentissage des préférences d'utilisateurs pour recommander des films ou résolution de conflits d'ordonnancement
H04N 21/488 - Services de données, p. ex. téléscripteur d'actualités
H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
4.
Method and system to detect abnormal message transactions on a network
A surveillance system connectable to a network, comprising a communication module and a management module; said system being configured to, during an initialization phase: a. intercept a first message being sent to a first device; b. intercept a second message said second message being a response from the first device to the first message; c. calculate a time interval between the interception of the first message and the second message; d. repeat the steps a. to c. to determine further time intervals; e. determine a distribution of said time intervals; f. store the distribution and during a surveillance phase, intercept a third message said message being sent to the first device; intercept a fourth message said fourth message being a response to the third message; calculate a new time interval between the interception of the third and fourth messages; and verify that the new time interval is within the distribution.
H04L 43/106 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p. ex. en ajoutant des horodatages
The disclosure provide methods and content consumption devices that enable a scene, for example a 360° scene, that is larger (i.e. has more pixels in at least one dimension) than a display format of the content consumption device to be displayed. Constituent scene views are received individually by the content consumption device, for example as broadcasts, and are combined, for example stitched together, at the content consumption device to output a part of the scene that fits in the display format. The part of the scene (and hence the required constituent streams) to be displayed are determined by a signal, for example a navigational input from a user, enabling the user to navigate in the scene.
H04N 23/698 - Commande des caméras ou des modules de caméras pour obtenir un champ de vision élargi, p. ex. pour la capture d'images panoramiques
G06T 3/067 - Remodelage ou dépliement de structures en arbre 3D sur des plans 2D
G06T 3/4038 - Création de mosaïques d’images, p. ex. composition d’images planes à partir de sous-images planes
H04N 21/2368 - Multiplexage de flux audio et vidéo
H04N 21/434 - Désassemblage d'un flux multiplexé, p. ex. démultiplexage de flux audio et vidéo, extraction de données additionnelles d'un flux vidéoRemultiplexage de flux multiplexésExtraction ou traitement de SIDésassemblage d'un flux élémentaire mis en paquets
H04N 21/44 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé
H04N 21/4728 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de servicesInterface pour utilisateurs finaux pour l'interaction avec le contenu, p. ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés pour la sélection d'une région d'intérêt [ROI], p. ex. pour la requête d'une version de plus haute résolution d'une région sélectionnée
6.
Techniques for managing generation and rendering of user interfaces on client devices
Techniques and systems are provided for processing user interface content. For example, a server computer can receive a user interface event corresponding to a user interface of a device (e.g., a client device, another server computer, or other device). An application associated with the user interface event can be determined, and an interface model can be generated using the application associated with the user interface event. The interface model defines state information for one or more graphic objects of the user interface. The state information results from the user interface event. The server computer can send the interface model to the device, which enables the device to render the user interface.
An integrated circuit device is disclosed, the device comprising a protective layer and a protected circuit on a substrate, the protective layer being configured to protect the protected circuit by absorbing laser radiation targeted at the protected circuit through the substrate. The device may be configured such that removal of the protective layer causes physical damage that disables the protected circuit. The device may comprise intermediate circuitry protruding into the substrate between the protective layer and the protected circuit, wherein the physical damage that disables the protected circuit is physical damage to the intermediate circuitry. The device may comprise detection circuitry configured to detect a change in an electrical property of the device indicative of removal of the protective layer, and, in response to detecting the change in the electrical property, cause the protected circuit to be disabled.
In order to allow access to the Internet, and therefore to a remote server, for a device having no connection with an Internet gateway, there is provided a method to transmit a message from a first device to a remote server, the first device having no connection with the remote server, the method including detecting a second device by the first device, establishing a communication channel between the first and the second device, transferring the message from the first to the second device, the message comprising an address of the remote server, and transferring, by the second device, the message to the remote server using the remote server address contained in the message.
H04L 67/141 - Configuration des sessions d'application
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04L 67/1034 - Réaction aux pannes de serveur par un répartiteur de charge
H04L 51/48 - Adressage des messages, p. ex. format des adresses ou messages anonymes, alias
9.
SOFTWARE PROTECTION FROM ATTACKS USING SELF-DEBUGGING TECHNIQUES
In overview, methods, computer programs products and devices for securing software are provided. In accordance with the disclosure, a method may comprise attaching a debugger process to a software process. During execution of the software process, operations relevant to the functionality of the code process are carried out within the debugger process. As a result, the debugger process cannot be replaced or subverted without impinging on the functionality of the software process. The software process can therefore be protected from inspection by modified or malicious debugging techniques.
The disclosure generally relates to a method for accessing media content, said method being used in a receiver. The method comprises a preparation phase and a use phase. The preparation phase comprises the steps of obtaining, by said receiver, a catalog of media content items, each media content item corresponding to a media content and comprising at least an item description and an item identification data and storing said catalog of media content items in a local database in a memory of the receiver. The use phase comprises the steps of accessing, by a mobile display device, said catalog of media content items through a local communication channel; displaying at least a part of the catalog of media content items on the mobile display device; selecting, by said mobile display device, at least one media content item displayed on the mobile display device; transmitting, by said mobile display device, a request to a content provider, the request comprising the item identification data corresponding to said selected media content item and additional data allowing for the receiver to be identified, said transmission using a first remote communication channel distinct from said local communication channel; and obtaining by the receiver, the media content corresponding to the media content item identified by the identification data contained in said request.
The disclosure further relates to a receiver and a mobile display device for implementing the above described method and a system comprising at least said receiver and said mobile display device.
H04N 21/41 - Structure de clientStructure de périphérique de client
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour monodiffusion [unicast]
H04N 21/262 - Ordonnancement de la distribution de contenus ou de données additionnelles, p. ex. envoi de données additionnelles en dehors des périodes de pointe, mise à jour de modules de logiciel, calcul de la fréquence de transmission de carrousel, retardement de la transmission de flux vidéo, génération de listes de reproduction
H04N 21/433 - Opération de stockage de contenu, p. ex. opération de stockage en réponse à une requête de pause ou opérations de cache
H04N 21/436 - Interfaçage d'un réseau de distribution local, p. ex. communication avec un autre STB ou à l'intérieur de la maison
H04N 21/437 - Interfaçage de la voie montante du réseau de transmission, p. ex. pour transmettre des requêtes de client à un serveur VOD
H04N 21/462 - Gestion de contenu ou de données additionnelles, p. ex. création d'un guide de programmes électronique maître à partir de données reçues par Internet et d'une tête de réseau ou contrôle de la complexité d'un flux vidéo en dimensionnant la résolution ou le débit en fonction des capacités du client
H04N 21/472 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de servicesInterface pour utilisateurs finaux pour l'interaction avec le contenu, p. ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés
H04N 21/482 - Interface pour utilisateurs finaux pour la sélection de programmes
11.
Techniques for incentivized intrusion detection system
The present disclosure relates generally to security solutions. More specifically, techniques (e.g., systems, methods, and devices) are provided to implement an incentivized-based intrusion detection system to detect malicious acts against an asset. The incentive may lure or facilitate the actor to provide information detecting malicious actions against an asset.
A method of enabling a user to access recorded data associated with an event, the method comprising determining the location of a user's device at a control unit, confirming the location is within a predetermined vicinity and that the user's device was at the location within a predetermined period and the control unit enabling access for the user to the data if the location of the user's device in the predetermined period is confirmed.
Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device. The malware detection logic may execute a validation test on the message to determine that the message includes malware. The malware detection logic may report an alarm to the security client of the destination device. The malware detection logic may transmit information related to the malware to a cloud computing server. The malware detection logic may prevent an application associated with the destination device from processing the message.
A consumable can be used to securely send data to devices. A security platform can produce a consumable, for example an ink cartridge, with data to be uploaded onto a device, such as a printer. If the consumable and device can perform a successful authentication, broadcast data can be delivered to the device via the consumable. Such techniques can help ensure that authentic consumables are being used in authentic devise. Further, such techniques can enable a licensing model where different consumables can be configured with different data to enable or disable different features of the device.
A device for securing a bottle's cap includes a first part; a second part mechanically connected to the first part through a mechanical connection; and a securing component including a radio frequency transponder, a first portion of the component being implemented in the first part of the device, a second portion of the component being implemented in the second part of the device, at least one portion of the component extending through the mechanical connection. The second part includes a device for fixing the device to a cap of a bottle. The mechanical connection is configured for breaking when a traction or a torsion is applied on the first part of the device versus the second part.
B65D 55/02 - Dispositifs de blocageMoyens pour empêcher ou indiquer l'ouverture ou l'enlèvement de la fermeture non autorisés
B65D 55/06 - Fils métalliques, cordons ou bandes déformables ou déchirables (capuchons ou couvercles en forme de capuchons avec bandes de déchirure ) Utilisation de sceaux
16.
SYSTEMS AND METHODS FOR REGISTERING OR AUTHENTICATING A USER WITH A RELYING PARTY
A method of registering or authenticating a user with a relying party is provided, the method including: receiving a request to generate a key pair, the request including key-generation data, the key-generation data including relying party information; deterministically generating, based on at least the key-generation data and a secret key stored in a memory of the authenticator, a key pair comprising a public key and a private key; either: transmitting the public key, or performing further processing using the private key; and deleting the key pair. An authenticator configured to perform the process is also provided.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system (100) for actively monitoring and securing a CDI (110CDI) is proposed. Such system comprises a TEE (100TEE) implementing one or more monitoring policy rule for ruling the active monitoring of the CDI. The system further comprises an 1C (100IC) comprising one or more monitoring device for monitoring the CDI at a corresponding monitoring tapping point delivering a corresponding monitoring information element. The 1C is configured for providing to the TEE a monitoring information based on the monitoring information element. The 1C is subordinated to the TEE. The one or more monitoring device is configured by the TEE responsive to the implementation of the one or more monitoring policy rule.
G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Systems and techniques are described herein for processing media content. For example, a process can include obtaining a first media frame and a second media frame. The process can include generating, using a first change detector, a first tag indicating a change above a first change threshold has occurred in the second media frame relative to the first media frame. The process can further include generating, using a machine learning model, a second tag indicating that media content of the second media frame is associated with a particular type of media content. The process can further include determining, based the first tag and the second tag, that the media content of the second media frame is associated with the particular type of media content.
H04L 65/613 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la commande de la source par la destination
19.
Method and apparatus for peripheral context management
The present disclosure relates to a method and system for presenting a set of control functions via an interface of a peripheral control device (PCD). A control function can include a command associated with one or more media contexts of a host media device. The method decodes a payload, from the host media device, with an encoded context identifier, where the context identifier indicates a primary media context active on the host media device. The method determines one or more control functions corresponding to the context identifier, and changes the set of control functions on the interface of the PCD to include the one or more control functions that can command the primary media context.
H04N 21/482 - Interface pour utilisateurs finaux pour la sélection de programmes
G06F 3/04886 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels par partition en zones à commande indépendante de la surface d’affichage de l’écran tactile ou de la tablette numérique, p. ex. claviers virtuels ou menus
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
H04N 21/222 - Serveurs secondaires, p. ex. serveur proxy ou tête de réseau de télévision par câble
H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
20.
Media player for receiving media content from a remote server
An embodiment of the present invention may be deployed in a system comprising a media player and a remote server operably connected to communicate with one another. The invention allows for a settings file to be stored on the remote server, the settings file comprising parameters useful for adjusting different settings on the media player such that rendering of a particular content to be made possible on the media player according to a user's predetermined taste by downloading the settings from the server onto the media player.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 65/60 - Diffusion en flux de paquets multimédias
H04L 67/1095 - Réplication ou mise en miroir des données, p. ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
H04L 67/565 - Conversion ou adaptation du format ou du contenu d'applications
H04W 4/18 - Conversion de format ou de contenu d'informations, p. ex. adaptation, par le réseau, des informations reçues ou transmises pour une distribution sans fil aux utilisateurs ou aux terminaux
A method for identifying a peripheral device from a digital content having been received by said peripheral device from a master device located at a user end is described. The master device can be connected to a server located at a back end, and the method includes receiving, by the master device from the peripheral device, at least peripheral identification data. The method also includes generating, at the master device, a first mark as a function of at least a part of the peripheral identification data, and watermarking the digital content using the first mark before transmitting the digital content to the peripheral device.
Systems and techniques are described herein for annotating media content. For example, a process can include obtaining media content and generate, use one or more machine learning models, a metadata file for at least a portion of the media content. The metadata file includes one or more metadata descriptions. The process can include generating a text description of the media content based on the one or more metadata descriptions of the metadata file. The process can include annotating the media content use the text description.
G06V 20/40 - ScènesÉléments spécifiques à la scène dans le contenu vidéo
H04N 21/266 - Gestion de canal ou de contenu, p. ex. génération et gestion de clés et de messages de titres d'accès dans un système d'accès conditionnel, fusion d'un canal de monodiffusion de VOD dans un canal multidiffusion
23.
Secure communication between in-vehicle electronic control units
Aspects of the present disclosure address systems, methods, and devices for enabling secure communication between electronic control units (ECUs) in a vehicle. The system may include a first and second ECU from a plurality of ECUs in the vehicle. The first ECU is to enable secure communication between the plurality of ECUs by performing operations that include provisioning the second ECU with authentication data for authenticating messages exchanged with a third ECU and provisioning the third ECU with a set of security keys to enable the third ECU to securely exchange messages with the second ECU. The second ECU receives, from the third ECU, a secure message that is cryptographically signed using a security key from the set of security keys provisioned to the third ECU, and the second ECU authenticates the secure message by comparing the authentication data with an authentication signal.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p. ex. communication véhicule-piétons
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
24.
DEVICE FOR GENERATING AT LEAST ONE CRYPTOGRAPHIC KEY, CORRESPONDING METHODS AND COMPUTER PROGRAM PRODUCTS
A device (100) is proposed for generating at least one cryptographic key (Keu_Part1, Key_Part2, RootKey) by implementing: selecting at least three input data selected among, on one hand, a predetermined data and, on the other hand, a function of at least one piece of data having a type belonging to the group comprising: a physical unclonable type, corresponding to physical unclonable function data (ID, PUF); a hardwired type, corresponding to data hardwired within said device (GK, Soc_Key); and a software type, corresponding to software data (Seg_Partl, Seg_Part2), assembling the at least three input data to produce an assembled input data; applying the assembled input data into a cryptographic element to produce a cryptographic key.
G09C 1/00 - Appareils ou méthodes au moyen desquels une suite donnée de signes, p. ex. un texte intelligible, est transformée en une suite de signes inintelligibles en transposant les signes ou groupes de signes ou en les remplaçant par d'autres suivant un système préétabli
The present invention relates to a system for rendering a content, the rendering of which is subject to conditional access security conditions. A system is described, comprising a host device and a detachable security device, the security device configured to decrypt the encrypted content, re-encrypt it under a local key and to deliver the re-encrypted content to the host device while ensuring that the host device applies or otherwise enforces any conditions associated with the rendering of the content.
A content owner registers with an identity authority by providing information about the content owner and a public key of a public/private key pair. The content owner registers content to the identity authority and signs the multiple segments of the content with the private key of the public/private key pair. A system that receives the signed content determines an indicated content owner of the received media content and communicates with the identity authority to confirm that the media content was produced by the indicated content owner. The receiving system requests the public key of the content owner from the identity authority and uses the public key to verify the signature of each media content segment. Accordingly, the receiving system is able to determine if the media content was manipulated after being distributed by the content owner.
G06F 21/10 - Protection de programmes ou contenus distribués, p. ex. vente ou concession de licence de matériel soumis à droit de reproduction
H04N 19/61 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant un codage par transformée combiné avec un codage prédictif
H04N 21/845 - Structuration du contenu, p. ex. décomposition du contenu en segments temporels
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
38 - Services de télécommunications
39 - Services de transport, emballage et entreposage; organisation de voyages
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Vehicle locating, tracking, security, payment and retrieval
systems comprised of computer hardware and software,
computer application software for mobile phones, GPS units,
and radio telecommunications equipment, all for use in
connection with vehicle locating, vehicle tracking, vehicle
anti-theft, vehicle payment management, equipment locating,
namely, farming equipment, construction equipment, heavy
machinery equipment, manufacturing equipment locating,
equipment tracking, namely, farming equipment, construction
equipment, heavy machinery equipment, manufacturing
equipment tracking, equipment anti-theft, namely, farming
equipment, construction equipment, heavy machinery
equipment, manufacturing equipment anti-theft; wireless
transceivers with collection and display technology for
locating, tracking and monitoring vehicles and equipment,
namely, namely, farming equipment, construction equipment,
heavy machinery equipment, manufacturing equipment, and
instruction manuals used in connection therewith; wireless
electronic devices for tracking and condition monitoring of
mobile assets in the nature of automobiles, trucks,
trailers, cargo containers, equipment, namely, farming
equipment, construction equipment, heavy machinery
equipment, manufacturing equipment, machinery equipment and
other freight and transportation equipment, namely, portable
tracking units comprising wireless data transceivers, global
positioning satellite receivers, processors, sensors,
namely, temperature, pressure and acceleration sensors, and
computer software that combine GPS and cellular technologies
for determining mobile asset location information and
environmental information, for transmitting the mobile asset
location and environmental information, for transmitting
alert messages when a mobile asset moves beyond a preset
geographic area, and for transmitting alert messages when an
environmental condition of a mobile asset goes beyond a
preset boundary for the environmental condition. Providing business intelligence services in the fields of
mobile resource management, mobile asset tracking and
monitoring, namely, monitoring and tracking of vehicles and
equipment, namely, farming equipment, construction
equipment, heavy machinery equipment, manufacturing
equipment, for commercial purposes; providing business data
analytics related to mobile assets. Telecommunication services, namely, electronic transmission
of data in the field of sensors and sensor networks for
mobile resource management and tracking; transmission and
reception of sensor data via telecommunication networks for
tracking and monitoring mobile assets in the nature of
automobiles, trucks, trailers, cargo containers, equipment,
namely, farming equipment, construction equipment, heavy
machinery equipment, manufacturing equipment, and machinery
equipment. Tracking, locating and monitoring of mobile assets in the
nature of automobiles, trucks, trailers, cargo containers,
equipment, namely, farming equipment, construction
equipment, heavy machinery equipment, manufacturing
equipment, and other freight and transportation equipment,
namely, global positioning, tracking, and position
information transmission services for financial lending
institutions to monitor collateralized mobile assets. Software as a service (SAAS) services featuring software for
stolen vehicle recovery, vehicle tracking, vehicle status
monitoring, and generating vehicle alert messages related to
speeding or geofence boundary crossings; software as a
service (SaaS) services featuring software for mobile
resource management, mobile asset tracking and monitoring,
and business data analytics related to mobile assets;
electronic storage services for archiving electronic sensor
data; technical support and consulting services, namely,
monitoring technological functions of computer network
systems for tracking sensor network usage; computer
services, namely, acting as an application service provider
in the field of knowledge management to host computer
application software for the purpose of controlling,
viewing, storing and analyzing GPS tracking and sensor data;
application service provider, namely, hosting, managing,
developing, and maintaining applications in the field of
controlling, viewing, storing, and analyzing GPS tracking
and sensor data for wireless delivery of content to handheld
computers, laptops and mobile electronic devices.
In overview, the disclosed methods, devices, and systems enable the location of the first device to be verified. In particular, second location verification data is generated using a current location of the second device is provided to a first device by a second device which can be matched with first location verification data received by the first device from a server, the first location verification data is generated using a stored location of the first device. If the first and second location verification data match, the location of the first device is considered to have been verified.
H04N 21/254 - Gestion au sein du serveur de données additionnelles, p. ex. serveur d'achat ou serveur de gestion de droits
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
H04N 21/414 - Plate-formes spécialisées de client, p. ex. récepteur au sein d'une voiture ou intégré dans un appareil mobile
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
A method for remotely programming a programmable device (35) designed to provide an expected sensitive result (45), the method comprising : - transmitting a first program code (41) to the programmable device (35), said first program code (41) being configured to get at least one distinctive data (35d) unique and physically inherent to the programmable device (35), - retrieving said distinctive data (35e) to generate a second program code (42) configured to provide the expected sensitive result (45) in case of the second program code (42) is executed on the programmable device (35) having produced the distinctive data (35d), and10 - transmitting said second program code (42) to the programmable device (35), so as to load the second program code (42) into the programmable device (35).
H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
G06F 21/76 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits intégrés à application spécifique [ASIC] ou les dispositifs programmables, p. ex. les réseaux de portes programmables [FPGA] ou les circuits logiques programmables [PLD]
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
30.
INTEGRATED CIRCUIT DEVICE WITH PROTECTION AGAINST MALICIOUS ATTACKS
Integrated circuit device with protection against malicious attacks The integrated circuit device (100) comprises a semiconductor substrate layer (10) and at least one active layer (20) including electronic components and supported by said semiconductor substrate layer (10). The semiconductor substrate layer (10) and the at least one active layer (20) are sandwiched between two protective layers (30A, 30B) acting as physical obstacles to prevent the passage of radiations. In addition, the two protective layers (30A, 30B) are electrically connected to a detection circuit (40) that can monitor an electrical information of the protective layers (30A, 30B) and detect a physical attack of at least one of the two protective layers (30A, 30B), based on the monitored electrical information.
G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse
G06F 21/87 - Boîtiers fiables ou inviolables par encapsulation, p. ex. de circuits intégrés
G09C 1/00 - Appareils ou méthodes au moyen desquels une suite donnée de signes, p. ex. un texte intelligible, est transformée en une suite de signes inintelligibles en transposant les signes ou groupes de signes ou en les remplaçant par d'autres suivant un système préétabli
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
31.
Techniques for managing generation and rendering of user interfaces on client devices
Techniques and systems are provided for processing user interface content. For example, a server computer can receive a user interface event corresponding to a user interface of a device (e.g., a client device, another server computer, or other device). An application associated with the user interface event can be determined, and an interface model 5 can be generated using the application associated with the user interface event. The interface model defines state information for one or more graphic objects of the user interface. The state information results from the user interface event. The server computer can send the interface model to the device, which enables the device to render the user interface.
Aspects of the present disclose involve a method, a device, and a system comprising a processor and a machine-readable storage medium storing at a set of instructions for identification and authentication of user profiles associated with a digital television system and displaying information related thereto. In example embodiments, the method includes identifying a user profile registered with a content presentation device based on received identification data that includes biometric data. The method further includes receiving, from a server, identifiers of a set of recently watched channels associated with the user profile and causing presentation of a recent channels interface that includes selectable elements corresponding to the set of recently watched channels.
H04N 21/45 - Opérations de gestion réalisées par le client pour faciliter la réception de contenu ou l'interaction avec le contenu, ou pour l'administration des données liées à l'utilisateur final ou au dispositif client lui-même, p. ex. apprentissage des préférences d'utilisateurs pour recommander des films ou résolution de conflits d'ordonnancement
H04N 21/41 - Structure de clientStructure de périphérique de client
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
H04N 21/25 - Opérations de gestion réalisées par le serveur pour faciliter la distribution de contenu ou administrer des données liées aux utilisateurs finaux ou aux dispositifs clients, p. ex. authentification des utilisateurs finaux ou des dispositifs clients ou apprentissage des préférences des utilisateurs pour recommander des films
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
H04N 21/442 - Surveillance de procédés ou de ressources, p. ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans le disque dur interne
H04N 21/466 - Procédé d'apprentissage pour la gestion intelligente, p. ex. apprentissage des préférences d'utilisateurs pour recommander des films
H04N 21/441 - Acquisition de l'identification d'un utilisateur final
H04N 21/4415 - Acquisition de l'identification d'un utilisateur final utilisant les caractéristiques biométriques de l'utilisateur, p. ex. par reconnaissance de la voix ou balayage d'empreintes digitales
H04N 21/658 - Transmission du client vers le serveur
H04N 21/433 - Opération de stockage de contenu, p. ex. opération de stockage en réponse à une requête de pause ou opérations de cache
H04N 21/458 - Ordonnancement de contenu pour créer un flux personnalisé, p. ex. en combinant une publicité stockée localement avec un flux d'entréeOpérations de mise à jour, p. ex. pour modules de système d'exploitation
H04N 21/482 - Interface pour utilisateurs finaux pour la sélection de programmes
33.
DISTRIBUTED ANONYMIZED COMPLIANT ENCRYPTION MANAGEMENT SYSTEM
A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
34.
Method and system to share a snapshot extracted from a video transmission
The present invention refers to the field of television experience in particular the simultaneous use of the portable computing device and a television to share a user's experience. The present disclosure proposes a method to create a snapshot from a video transmission received by a receiver, said receiver being connected with a portable computing device and having a screen output, said method comprising the steps of receiving a video transmission by the receiver, converting by the receiver, the video transmission into a lower-bandwidth video transmission, sending the lower-bandwidth video transmission to the portable computing device, receiving from the portable computing device to the receiver, a command to execute a snapshot, producing by the receiver a snapshot from the video transmission, sending the snapshot to the portable computing device.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04N 21/2743 - Hébergement vidéo de données téléchargées à partir du dispositif client
H04N 21/475 - Interface pour utilisateurs finaux pour acquérir des données d'utilisateurs finaux, p. ex. numéro d'identification personnel [PIN] ou données de préférences
H04N 21/4788 - Services additionnels, p. ex. affichage de l'identification d'un appelant téléphonique ou application d'achat communication avec d'autres utilisateurs, p. ex. discussion en ligne
H04N 21/433 - Opération de stockage de contenu, p. ex. opération de stockage en réponse à une requête de pause ou opérations de cache
H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire
H04N 21/61 - Structure physique de réseauTraitement de signal
H04N 21/8549 - Création de résumés vidéo, p. ex. bande annonce
35.
SECURE ELEMENT FOR SECURELY PROCESSING DIGITAL INFORMATION
The secure element (100) has a secure processor (110) for securely processing the digital information stored in a memory (200) external to the secure element, and a loading and pre-processing system configured to load the digital information from the external memory (200) into the secure element (100), and pre-process said digital information by executing a cryptographic algorithm before processing said digital information by the secure processor (110). The system reads a version number of the digital information that has been loaded, from an internal memory (122) of the secure element (100), and uses said version number in executing the cryptographic algorithm.
G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
36.
Intelligent content queuing from a secondary device
Example embodiments provide systems and methods for managing intelligent content queuing from a secondary device for content delivery to a primary device. A content queuing system on the secondary device generates and displays a playlist interface on the secondary device. A selection of a content item to be added to a playlist is received. The content queuing system determines that addition of the content item causes a live content item to overlap with an on-demand content item on the playlist. As a result, the content queuing system creates at least two segments for the on-demand content item. The live content item is positioned between the first and a second segment on the playlist. The first segment is scheduled to end at a start time of the live content item and the second segment is scheduled to begin at an ending time of the live content item.
H04N 21/482 - Interface pour utilisateurs finaux pour la sélection de programmes
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
H04N 21/436 - Interfaçage d'un réseau de distribution local, p. ex. communication avec un autre STB ou à l'intérieur de la maison
H04N 21/44 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé
H04N 21/472 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de servicesInterface pour utilisateurs finaux pour l'interaction avec le contenu, p. ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés
H04N 21/442 - Surveillance de procédés ou de ressources, p. ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans le disque dur interne
H04N 21/41 - Structure de clientStructure de périphérique de client
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels
a matching step to extract the biometric data from said marking area, to match them with the biometric data of the profiles stored in the database, and to assign the detected profile ID with the marking area.
transmitting the found profile ID to the application.
G06V 10/143 - Détection ou éclairage à des longueurs d’onde différentes
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
G06V 10/24 - Alignement, centrage, détection de l’orientation ou correction de l’image
38.
Protection of wire-bond ball grid array packaged integrated circuit chips
A chip includes a substrate having a first surface and a second surface opposite the first surface, and an integrated circuit mounted on a landing zone on the first surface of the substrate. The chip also includes contacts provided about the first surface in the peripheral region, and wire-bonds providing electrical connections between the integrated circuit and the contacts. The chip further includes solder ball connections provided in the peripheral region on the second surface, and connections provided in the substrate for connecting the electrical contacts on the first surface with the solder ball connections on the second surface. The substrate includes at least one conductive track routed through the landing zone region of the substrate, and the chip is configured such that an alteration in the at least one conductive track prevents operation of the integrated circuit.
H01L 23/498 - Connexions électriques sur des substrats isolants
H01L 21/66 - Test ou mesure durant la fabrication ou le traitement
H01L 23/00 - Détails de dispositifs à semi-conducteurs ou d'autres dispositifs à l'état solide
H01L 23/538 - Dispositions pour conduire le courant électrique à l'intérieur du dispositif pendant son fonctionnement, d'un composant à un autre la structure d'interconnexion entre une pluralité de puces semi-conductrices se trouvant au-dessus ou à l'intérieur de substrats isolants
H01L 23/552 - Protection contre les radiations, p. ex. la lumière
The digital information is stored in a plurality of segments (Si) in an external memory. The method is performed by a processing device and comprises the steps of : loading (S50) a first integrity table (MAC-Table 1) containing a plurality of first integrity elements (Ai) respectively authenticating the plurality of segments of digital information (Si), and an associated digital signature (SIG) of said plurality of first integrity elements (Ai), from the external memory; verifying (S51) the digital signature (SIG) associated with the first integrity table (MAC-Table 1), loading (S54) segments of digital information ([Si]) in a protected form from the external memory to the processing device.
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
A method of transmitting entitlement messages to content consumption devices in a access control system, the method comprising periodically transmitting entitlement messages to content consumption devices in a access control system and periodically extending an expiry time comprised in the entitlement messages. The entitlement messages comprise indicator data indicating to the content consumption devices that subsequent entitlement messages loaded into a content consumption device after a first entitlement message is loaded into the content consumption device shall not be used by the content consumption device to access protected media content.
H04N 21/266 - Gestion de canal ou de contenu, p. ex. génération et gestion de clés et de messages de titres d'accès dans un système d'accès conditionnel, fusion d'un canal de monodiffusion de VOD dans un canal multidiffusion
H04N 21/235 - Traitement de données additionnelles, p. ex. brouillage de données additionnelles ou traitement de descripteurs de contenu
H04N 21/418 - Carte externe destinée à être utilisée en combinaison avec le dispositif client, p. ex. pour l'accès conditionnel
H04N 21/462 - Gestion de contenu ou de données additionnelles, p. ex. création d'un guide de programmes électronique maître à partir de données reçues par Internet et d'une tête de réseau ou contrôle de la complexité d'un flux vidéo en dimensionnant la résolution ou le débit en fonction des capacités du client
H04N 21/633 - Signaux de commande issus du serveur dirigés vers des éléments du réseau ou du client
H04N 21/4623 - Traitement de messages de titres d'accès, p. ex. message de contrôle d'accès [ECM], message de gestion d'accès [EMM]
H04N 21/6334 - Signaux de commande issus du serveur dirigés vers des éléments du réseau ou du client vers le client pour l’autorisation, p. ex. en transmettant une clé
41.
METHOD FOR SECURELY PROCESSING DIGITAL INFORMATION IN A SECURE ELEMENT
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p. ex. les mémoires adressables directement
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
The present disclosure relates to methods and devices for testing video data being rendered at or using a media device. A plurality of video frames to be rendered is received, each frame comprising one or more primary screen objects and at least one further screen object. The received frames are rendered at or using the media device wherein the at least one further screen object is superimposed on the one or more primary screen objects of a given frame during rendering. The rendered frames are provided to a data model. Extracted metadata indicating the presence or absence of further screen objects in the rendered video frames is the output of the data model. The data model is also provided with original metadata associated with the video frames prior to rendering. The rendering of each further screen object is then tested based on the original metadata and extracted metadata relating to a given video frame. The disclosure also extends to associated methods and devices for generating training data for testing rendering of video frame and training a data model using the training data.
H04N 21/43 - Traitement de contenu ou données additionnelles, p. ex. démultiplexage de données additionnelles d'un flux vidéo numériqueOpérations élémentaires de client, p. ex. surveillance du réseau domestique ou synchronisation de l'horloge du décodeurIntergiciel de client
H04N 17/04 - Diagnostic, test ou mesure, ou leurs détails, pour les systèmes de télévision pour les récepteurs
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
38 - Services de télécommunications
39 - Services de transport, emballage et entreposage; organisation de voyages
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Vehicle locating, tracking, security, payment and retrieval systems comprised of computer hardware and software, computer application software for mobile phones, GPS units, and radio telecommunications equipment, all for use in connection with vehicle locating, vehicle tracking, vehicle anti-theft, vehicle payment management, equipment locating, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment locating, equipment tracking, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment tracking, equipment anti-theft, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment anti-theft; wireless transceivers with collection and display technology for locating, tracking and monitoring vehicles and equipment, namely, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and instruction manuals used in connection therewith; wireless electronic devices for tracking and condition monitoring of mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, machinery equipment and other freight and transportation equipment, namely, portable tracking units comprising wireless data transceivers, global positioning satellite receivers, processors, sensors, namely, temperature, pressure and acceleration sensors, and computer software that combine GPS and cellular technologies for determining mobile asset location information and environmental information, for transmitting the mobile asset location and environmental information, for transmitting alert messages when a mobile asset moves beyond a preset geographic area, and for transmitting alert messages when an environmental condition of a mobile asset goes beyond a preset boundary for the environmental condition. (1) Providing business intelligence services in the fields of mobile resource management, mobile asset tracking and monitoring, namely, monitoring and tracking of vehicles and equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, for commercial purposes; providing business data analytics related to mobile assets.
(2) Telecommunication services, namely, electronic transmission of data in the field of sensors and sensor networks for mobile resource management and tracking; transmission and reception of sensor data via telecommunication networks for tracking and monitoring mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and machinery equipment.
(3) Tracking, locating and monitoring of mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and other freight and transportation equipment, namely, global positioning, tracking, and position information transmission services for financial lending institutions to monitor collateralized mobile assets.
(4) Software as a service (SAAS) services featuring software for stolen vehicle recovery, vehicle tracking, vehicle status monitoring, and generating vehicle alert messages related to speeding or geofence boundary crossings; software as a service (SaaS) services featuring software for mobile resource management, mobile asset tracking and monitoring, and business data analytics related to mobile assets; electronic storage services for archiving electronic sensor data; technical support and consulting services, namely, monitoring technological functions of computer network systems for tracking sensor network usage; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of controlling, viewing, storing and analyzing GPS tracking and sensor data; application service provider, namely, hosting, managing, developing, and maintaining applications in the field of controlling, viewing, storing, and analyzing GPS tracking and sensor data for wireless delivery of content to handheld computers, laptops and mobile electronic devices.
A system and method of transmitting respective audio streams to a plurality of end points, such as headphones, earphones, headsets, speakers, etc. is disclosed. Different audio streams are transmitted to each of the plurality of end points. The end points may be arranged to audibly output received audio streams, and so each end point may audibly output a respective different audio stream, i.e. the respective audio streams may be mutually different from each other.
H04N 21/485 - Interface pour utilisateurs finaux pour la configuration du client
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
45.
SECURED COMMUNICATION BETWEEN A DEVICE AND A REMOTE SERVER
Method for securing a communication between a remote server and a device equipped with a secure element, - device side profile data being stored in the device, - device side secure element data being stored in the secure element, - image data comprising : - server side profile data being stored in the remote server, - server side secure element data being stored in the remote server, or being retrievable from the remote server, the method comprising the steps of: a- associating the device with the secure element, b- generating, on the device side, a device key material, c- reporting the association to the remote server, d- generating, on the remote server side, a server key material e- authorizing a communication between the device and the remote server, after an authentication based at least on the basis of a comparison between the device key material and the server key material.
A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04N 21/6334 - Signaux de commande issus du serveur dirigés vers des éléments du réseau ou du client vers le client pour l’autorisation, p. ex. en transmettant une clé
H04N 21/8355 - Génération de données de protection, p. ex. certificats impliquant des données sur l’utilisation, p. ex. nombre de copies ou de visualisations autorisées
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
A method of providing a content stream based on capturing an initial delivery of the content stream. The method comprises obtaining manifest data related to the initial delivery of the content stream, the manifest data being obtained one or more times in a sequence during the initial delivery of the content stream to generate one or more manifest files; associating a time-stamp with each of the manifest files, the time stamp being indicative of a time of obtaining the associated manifest file; processing each of the manifest files to identify one or more addresses referenced in the manifest file of one or more segments comprising a portion of the content stream in the initial delivery; accessing one or more of the segments identified via the one or more addresses referenced in the manifest files; modifying a last one of the manifest files to include at least a portion of an earlier manifest file of the manifest files; and providing a client with access to the manifest files including the modified last manifest file and the accessed one or more segments, thereby enabling the client to receive at least a portion of the content stream.
H04N 21/845 - Structuration du contenu, p. ex. décomposition du contenu en segments temporels
H04N 21/222 - Serveurs secondaires, p. ex. serveur proxy ou tête de réseau de télévision par câble
H04N 21/231 - Opération de stockage de contenu, p. ex. mise en mémoire cache de films pour stockage à court terme, réplication de données sur plusieurs serveurs, ou établissement de priorité des données pour l'effacement
48.
TECHNIQUES FOR CONTROLLING ACCESS TO SEGMENTED DATA
Techniques for controlling access to segmented data of a plurality of users that is requested by at least one data consumer device. In response to conditions specified in communications between at least one data aggregator system and the at least one data consumer device, information of a number of users meeting specified search criteria are shared (e.g., for a limited time). Use of the data in violation of the specified conditions may trigger penalties under a smart contract on a distributed ledger or blockchain.
A method for detecting perturbations in a logic circuit comprising a plurality of datapaths coordinated by a clock signal and at least one test circuit (21) having a programmable length datapath (22) for varying a test propagation delay, said test circuit further comprising inputs (X, Y), an output (N) and an error generator (26) for providing an error (E) in case that the output (N) is different than an expected output (R1, R2) for said inputs, said test circuit having a calibration mode comprising: - determining a critical propagation delay by varying the programmable length datapath (22) until the error generator (26) outputs an error (E), - adjusting the programmable length datapath (22) to include therein a tolerance delay, - switching into a detection mode configured to detect a perturbation in the logic circuit along the programmable length datapath (22) in case the error generator outputs an error (E).
G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse
50.
METHOD FOR PROVIDING A CLIENT DEVICE WITH MANAGEMENT MESSAGES AND DEVICE FOR IMPLEMENTING THIS METHOD
Method for providing at least one client device (10), from a server (20) configured to control access to audio/video content, with management messages (40), comprising: - determining a first set (41) of management messages pertaining to said client device (10), - transmitting said first set through a first communication channel (51) in a repetitive manner, - receiving, from said client device, a notification (15) comprising at least a client device identifier (11), - determining a second set (42) of management messages, said second set comprising all or part of the first set, - determining a token (45) associated with the second set, - receiving, from the client device, a confirmation (15') comprising data pertaining to the token, - verifying the data pertaining to the token and, in case of a positive verification, removing all or part of the second set from the transmission through the first communication channel.
Methods and content consumption devices are disclosed that enable a revocation list to be securely enforced and managed, in terms of enforcing version control and providing granular control of individual capabilities, for example. Aspects also relate to enhanced enforcement control of content consumption control information more generally, for example by enforcing version control of activation messages, and/or granular management of individual capabilities.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.
H04N 21/2347 - Traitement de flux vidéo élémentaires, p. ex. raccordement de flux vidéo ou transformation de graphes de scènes du flux vidéo codé impliquant le cryptage de flux vidéo
H04N 21/266 - Gestion de canal ou de contenu, p. ex. génération et gestion de clés et de messages de titres d'accès dans un système d'accès conditionnel, fusion d'un canal de monodiffusion de VOD dans un canal multidiffusion
H04N 21/418 - Carte externe destinée à être utilisée en combinaison avec le dispositif client, p. ex. pour l'accès conditionnel
H04N 21/4405 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé impliquant le décryptage de flux vidéo
H04N 21/4623 - Traitement de messages de titres d'accès, p. ex. message de contrôle d'accès [ECM], message de gestion d'accès [EMM]
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 9/16 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04N 7/167 - Systèmes rendant le signal de télévision inintelligible et ensuite intelligible
53.
PLAYING DRM PROTECTED CONTENT FROM A PORTABLE FLASH DRIVE
A portable storage device (1) for storing protected content (111, 115, 119) is proposed. The portable storage device comprises connection means (14) for communicatively connecting the portable storage device to a play back device (2, 3, 4) for playing the protected content. The portable storage device further comprises a non-volatile memory (11) for storing the protected content. The protected content is protected by one or more digital rights management schemes (112-114, 116-118, 120-122). The portable storage device further comprises a chipset (10) comprising an embedded digital rights management server (101, 103, 104) configured to provide a digital rights management license to the play back device in response to a request from the play back device for the digital rights management license for playing the protected content.
A surveillance system connectable to a network, comprising a communication module and a management module; said system being configured to, during an initialization phase: a. intercept a first message being sent to a first device; b. intercept a second message said second message being a response from the first device to the first message; c. calculate a time interval between the interception of the first message and the second message; d. repeat the steps a. to c. to determine further time intervals; e. determine a distribution of said time intervals; f. store the distribution and during a surveillance phase, intercept a third message said message being sent to the first device; intercept a fourth message said fourth message being a response to the third message; calculate a new time interval between the interception of the third and fourth messages; and verify that the new time interval is within the distribution.
H04L 41/142 - Analyse ou conception de réseau en utilisant des méthodes statistiques ou mathématiques
H04L 43/106 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p. ex. en ajoutant des horodatages
H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
55.
Method and apparatus for peripheral context management
The present disclosure relates to a method and system for presenting a set of control functions via an interface of a peripheral control device (PCD). A control function can include a command associated with one or more media contexts of a host media device. The method decodes a payload, from the host media device, with an encoded context identifier, where the context identifier indicates a primary media context active on the host media device. The method determines one or more control functions corresponding to the context identifier, and changes the set of control functions on the interface of the PCD to include the one or more control functions that can command the primary media context.
H04N 21/482 - Interface pour utilisateurs finaux pour la sélection de programmes
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
H04N 21/222 - Serveurs secondaires, p. ex. serveur proxy ou tête de réseau de télévision par câble
H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
56.
Method and device to transfer a video stream between a host device and an electronic descrambling device
A method to transfer a video stream from a host device comprising a controller configured for bulk transfers to a descrambling device, comprises: forming a chain out transfer comprising a chain out header linked with multiple chain out descriptors, the first chain out descriptor pointing to an out description packet containing at least one producer ID, the second and subsequent chain out descriptor pointing to chunks from the video stream, the last chain out descriptor being configured to generate an interrupt; forming a chain in transfer comprising a chain in header linked with a plurality of chain in descriptors, each chain in descriptor pointing to a descrambled chunk; requesting the controller to process the chain; receiving the description packet by the descrambling device and using key data associated with the chunks to descramble them; receiving by the controller the descrambled chunks and triggering an interrupt on the last chunk.
H04N 7/167 - Systèmes rendant le signal de télévision inintelligible et ensuite intelligible
H04N 21/418 - Carte externe destinée à être utilisée en combinaison avec le dispositif client, p. ex. pour l'accès conditionnel
H04N 21/436 - Interfaçage d'un réseau de distribution local, p. ex. communication avec un autre STB ou à l'intérieur de la maison
H04N 21/4405 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé impliquant le décryptage de flux vidéo
H04N 21/266 - Gestion de canal ou de contenu, p. ex. génération et gestion de clés et de messages de titres d'accès dans un système d'accès conditionnel, fusion d'un canal de monodiffusion de VOD dans un canal multidiffusion
H04N 21/8352 - Génération de données de protection, p. ex. certificats impliquant des données d’identification du contenu ou de la source, p. ex. "identificateur unique de matériel" [UMID]
H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
A computer implemented method for sending context information between programs, the method including: displaying a graphical user interface including a plurality of selectable application icons; receiving a simultaneous selection of a first icon and a second icon from the plurality of selectable application icons; launching a first program associated with the first icon; launching a second program associated with the second icon; and sending context information between the first program and the second program.
Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device. The malware detection logic may execute a validation test on the message to determine that the message includes malware. The malware detection logic may report an alarm to the security client of the destination device. The malware detection logic may transmit information related to the malware to a cloud computing server. The malware detection logic may prevent an application associated with the destination device from processing the message.
In overview, an integrated circuit in accordance with the disclosure comprises first and second network interface processors which are separate processors and which are connected by a first unidirectional interconnect. The first unidirectional interconnect allows data transfer from the first network interface processor to the second network interface processor, while preventing data transfer in the reverse direction. The first network interface processor is for communication with a first network which may be a secure network and the second network interface processor is for communication with second network which may be a public network, for example an insecure public network. In this way, the processing of data received from each of the first and second networks is performed by separate processors and data can only be sent from the first network to the second network, thereby protecting the first network from the second network.
System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Vehicle locating, tracking, security, payment and retrieval systems comprised of computer hardware and downloadable software, downloadable computer application software for mobile phones, GPS units, and radio telecommunications equipment, all for use in connection with vehicle locating, vehicle tracking, vehicle anti-theft, vehicle payment management, equipment locating, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment locating, equipment tracking, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment tracking, equipment anti-theft, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment anti-theft; Wireless transceivers with collection and display technology for locating, tracking and monitoring vehicles and equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and downloadable instruction manuals used in connection therewith sold as a unit; Wireless electronic devices for tracking and condition monitoring of mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, machinery equipment and other freight and transportation equipment, namely, portable tracking units comprising wireless data transceivers, global positioning satellite receivers, processors, sensors, namely, temperature, pressure and acceleration sensors, and recorded computer software that combine GPS and cellular technologies for determining mobile asset location information and environmental information, for transmitting the mobile asset location and environmental information, for transmitting alert messages when a mobile asset moves beyond a preset geographic area, and for transmitting alert messages when an environmental condition of a mobile asset goes beyond a preset boundary for the environmental condition Providing business intelligence services in the fields of mobile resource management, mobile asset tracking and monitoring, namely, monitoring and tracking of vehicles and equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, for commercial inventory purposes; Providing business data analytics related to mobile assets; Tracking, locating and monitoring of mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and other freight and transportation equipment for commercial purposes, namely, global positioning, tracking, and position information transmission services for financial lending institutions to monitor collateralized mobile assets for business inventory purposes Telecommunication services, namely, electronic transmission of data in the field of sensors and sensor networks for mobile resource management and tracking; Transmission and reception of sensor data via telecommunication networks for tracking and monitoring mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and machinery equipment Software as a service (SAAS) services featuring software for stolen vehicle recovery, vehicle tracking, vehicle status monitoring, and generating vehicle alert messages related to speeding or geofence boundary crossings; Software as a service (SaaS) services featuring software for mobile resource management, mobile asset tracking and monitoring, and business data analytics related to mobile assets; Electronic storage services for archiving electronic sensor data; technical support and consulting services, namely, monitoring technological functions of computer network systems for tracking sensor network usage; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for the purpose of controlling, viewing, storing and analyzing GPS tracking and sensor data; Application service provider, namely, hosting, managing, developing, and maintaining applications in the field of controlling, viewing, storing, and analyzing GPS tracking and sensor data for wireless delivery of content to handheld computers, laptops and mobile electronic devices Providing business intelligence services in the fields of mobile resource management, mobile asset tracking and monitoring, namely, monitoring and tracking of vehicles and equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, for commercial stolen property recovery purposes; Tracking, locating and monitoring of mobile assets in the nature of automobiles, trucks, trailers, cargo containers, equipment, namely, farming equipment, construction equipment, heavy machinery equipment, manufacturing equipment, and other freight and transportation equipment for commercial purposes, namely, global positioning, tracking, and position information transmission services for financial lending institutions to monitor collateralized mobile assets for recovery of stolen property
62.
TECHNIQUES FOR INCENTIVIZED INTRUSION DETECTION SYSTEM
The present disclosure relates generally to security solutions. More specifically, techniques (e.g., systems, methods, and devices) are provided to implement an incentivized-based intrusion detection system to detect malicious acts against an asset. The incentive may lure or facilitate the actor to provide information detecting malicious actions against an asset.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
The present disclosure relates generally to security solutions. More specifically, techniques (e.g., systems, methods, and devices) are provided to implement an incentivized-based intrusion detection system to detect malicious acts against an asset. The incentive may lure or facilitate the actor to provide information detecting malicious actions against an asset.
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
64.
TECHNIQUES FOR INCENTIVIZED INTRUSION DETECTION SYSTEM
The present disclosure relates generally to security solutions. More specifically, techniques (e.g., systems, methods, and devices) are provided to implement an incentivized-based intrusion detection system to detect malicious acts against an asset. The incentive may lure or facilitate the actor to provide information detecting malicious actions against an asset.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
65.
WATERMARKING VIDEO FRAGMENTS INTO TWO OR MORE VARIANTS
A method of processing a video fragment into two or more variants of the video fragment, each variant having a different watermark, the method comprising: fragmenting a video content into a sequence of fragments; watermarking a plurality of the fragments to create two or more variants of each of the plurality of fragments, wherein the two or more variants of one fragment are watermarked using different watermarks; adjusting the length of the two or more variants for at least one of the fragments to a same adjusted length, wherein the adjusted length is indicative of a temporal position of the two or more variants of the at least one of the fragments compared to variants of other fragments in the sequence of fragments.
H04N 21/845 - Structuration du contenu, p. ex. décomposition du contenu en segments temporels
H04N 21/8358 - Génération de données de protection, p. ex. certificats impliquant des filigranes numériques
H04N 21/236 - Assemblage d'un flux multiplexé, p. ex. flux de transport, en combinant un flux vidéo avec d'autres contenus ou données additionnelles, p. ex. insertion d'une adresse universelle [URL] dans un flux vidéo, multiplexage de données de logiciel dans un flux vidéoRemultiplexage de flux multiplexésInsertion de bits de remplissage dans le flux multiplexé, p. ex. pour obtenir un débit constantAssemblage d'un flux élémentaire mis en paquets
H04N 21/472 - Interface pour utilisateurs finaux pour la requête de contenu, de données additionnelles ou de servicesInterface pour utilisateurs finaux pour l'interaction avec le contenu, p. ex. pour la réservation de contenu ou la mise en place de rappels, pour la requête de notification d'événement ou pour la transformation de contenus affichés
H04N 21/254 - Gestion au sein du serveur de données additionnelles, p. ex. serveur d'achat ou serveur de gestion de droits
66.
Key sequence generation for cryptographic operations
Methods, system and devices are provided that generate a sequence of sub-keys for cryptographic operations from a main key. The main key is operated on only once to generate the sub-keys of the sequence, with a transformation comprising one or more one-way functions. The respective bit values of the sub-keys of the sequence are set using respective bit values of the one or more one-way functions. Advantageously, deriving sub-key bits from respective output bits of one or more one-way functions removes or at least reduces correlations between the main key and the sub-keys, as well as between sub-keys, making it harder or even impossible to recover the main key or other sub-keys from a single sub-key, for example as found using a side-channel attack. At the same time, by using the main key only once (rather than using the main key each time a sub-key is generated), the vulnerability of the main key to a side-channel attack is reduced, because the opportunities for recovering physical information that could lead to the discovery of the main key are reduced. Specific embodiments use parallel or chained execution of sub-functions to generate respective sub-keys. Other specific embodiments generate all sub-keys from a single one-way function in one go.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
67.
A HARDWARE COMPONENT AND A METHOD FOR IMPLEMENTING A CAMOUFLAGE OF CURRENT TRACES GENERATED BY A DIGITAL SYSTEM
Implementing a camouflage of current traces generated by a hardware component having one or more set of digital elements defining a plurality of operational datapaths comprises adjusting (761) one or more working condition(s) of the hardware component, measuring (762) a reaction of the hardware component to the working condition(s) by a logic test circuit through processing data operations along a reference datapath having a minimum duration corresponding to at least the longest of the operational datapaths, and in response to detecting an error (763) along the reference datapath, modifying (764) the working condition(s) so that the error generated by the logic test circuit is cancelled. Applications to countermeasures to side-channel attacks.
Example embodiments provide systems and methods for dynamically creating intuitive favorites for a user. The system and methods include monitoring actions performed, by the user at a digital receiver, with respect to a plurality of content programs. The actions performed with respect to the plurality of content programs are analyzed. The analysis includes comparing a level of the actions with respect to a first content program of the plurality of content programs with a threshold. Based on the comparing indicating that the first content program is a favorites, an indication that the first content program is a favorites content program is stored to a data store.
H04N 21/431 - Génération d'interfaces visuellesRendu de contenu ou données additionnelles
G06F 16/78 - Recherche de données caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
H04N 21/442 - Surveillance de procédés ou de ressources, p. ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans le disque dur interne
H04N 21/45 - Opérations de gestion réalisées par le client pour faciliter la réception de contenu ou l'interaction avec le contenu, ou pour l'administration des données liées à l'utilisateur final ou au dispositif client lui-même, p. ex. apprentissage des préférences d'utilisateurs pour recommander des films ou résolution de conflits d'ordonnancement
H04N 21/488 - Services de données, p. ex. téléscripteur d'actualités
H04N 21/84 - Génération ou traitement de données de description, p. ex. descripteurs de contenu
An integrated circuit and a method of configuring a plurality of integrated circuits are disclosed. Each integrated circuit comprises a cryptographic key specific to it. Each integrated circuit comprises a cryptographic key specific to it. Each cryptographic key can be generated on the respective integrated circuit using a physical unclonable function and data associated with the cryptographic key, e.g. a configuration message comprising instructions for generating the cryptographic key using the physical unclonable function. The cryptographic key specific to the integrated circuit is not stored on the integrated circuit. Each of the plurality of integrated circuits are configured using a data file that is encrypted with the respective cryptographic key specific to the integrated circuit, circuit.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method for securing transmission of digital data in a communication network comprising a central station or a terminal and at least one device monitored by the central station via the communication network. The at least one device is configured to produce and to transmit a digital data stream to the central station or terminal. The at least one device further comprises a secure non-volatile memory for storing at least device specific information. The at least one device forms a data block based on at least the device specific information stored in the secure memory. The data block thus formed may compose additional data to be merged with the digital data stream produced by the at least one device. A modified digital data stream results from this merging operation and is transmitted by the at least one device to the central station or terminal.
H04N 21/8358 - Génération de données de protection, p. ex. certificats impliquant des filigranes numériques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Example embodiments provide systems and methods for securing a deployed camera. A security apparatus is coupled to the deployed camera and accesses video content from the coupled camera. The security apparatus accesses video content from the coupled camera, splits the video content within a plurality of RTP packets, encrypts payloads of the RTP packets, embeds in a header of the encrypted RTP packets, at least two key identifications for decryption of the encrypted RTP packets, and transmits the plurality of RTP packets over a network to a video management system.
H04L 9/16 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
72.
Securing digital data transmission in a communication network
A method for securing transmission of digital data in a communication network comprising a central station or a terminal and at least one device monitored by the central station via the communication network. The at least one device is configured to produce and to transmit a digital data stream to the central station or terminal. The at least one device further comprises a secure non-volatile memory for storing at least device specific information. The at least one device forms a data block based on at least the device specific information stored in the secure memory. The data block thus formed may compose additional data to be merged with the digital data stream produced by the at least one device. A modified digital data stream results from this merging operation and is transmitted by the at least one device to the central station or terminal.
H04N 21/8358 - Génération de données de protection, p. ex. certificats impliquant des filigranes numériques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method of transmitting data to a receiver via a network includes transmitting a sequence of first data packets to the receiver via the network, each first data packet including payload data and identification data, the identification data identifying the respective first data packet, the identification data being different for each first data packet. The method also includes transmitting a corresponding second data packet for each first data packet to the receiver via the network, each second data packet including the data enabling identification of the corresponding first data packet and additional data related to the corresponding first data packet, the data enabling identification of the corresponding first data packet enabling the receiver to associate each second data packet with the corresponding first data packet.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
74.
Method for initiating a transmission of a streaming content delivered to a client device and access point for implementing this method
A method for initiating a transmission of a program stream for delivery from a local access point to a client device, said program stream being structured as a plurality of regular segments relating to a single event. This method comprises the steps of: (a) processing at least one of the regular segments into a set of particular segments, where the at least one regular segment carries a payload of a first playback duration and the payload of said set represents a second playback duration that is greater than that of the first playback duration, and where the second playback duration is sufficient to comply with a client device requirement for initiating a rendering of the event, and (b) transmitting, during an initial period, from the local access point said set of particular segments.
H04N 7/173 - Systèmes à secret analogiquesSystèmes à abonnement analogiques à deux voies, p. ex. l'abonné envoyant un signal de sélection du programme
H04N 21/2343 - Traitement de flux vidéo élémentaires, p. ex. raccordement de flux vidéo ou transformation de graphes de scènes du flux vidéo codé impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04N 21/845 - Structuration du contenu, p. ex. décomposition du contenu en segments temporels
H04N 21/236 - Assemblage d'un flux multiplexé, p. ex. flux de transport, en combinant un flux vidéo avec d'autres contenus ou données additionnelles, p. ex. insertion d'une adresse universelle [URL] dans un flux vidéo, multiplexage de données de logiciel dans un flux vidéoRemultiplexage de flux multiplexésInsertion de bits de remplissage dans le flux multiplexé, p. ex. pour obtenir un débit constantAssemblage d'un flux élémentaire mis en paquets
75.
Method for detecting at least one glitch in an electrical signal and device for implementing this method
A method for detecting at least one glitch in an electrical signal. This method comprises: generating, from said electrical signal, at least one digital oscillating signal which is sensitive to glitches; and—performing the following steps as a repeatable round: (a) assigning a time window to at least one digital oscillating signal; said time window being implemented on the basis of a clock signal substantially insensitive to said at least one glitch to be detected; (b) determining from said time window a sampling value of the digital oscillating signal, said sampling value being characteristic of said digital oscillating signal throughout its time window; (c) detecting any potential glitch in said electrical signal by comparing said sampling value with an expected reference value; and (d) outputting a response typifying a result of the comparison step. Also, a device for implementing said method is described.
G06F 1/08 - Générateurs d'horloge ayant une fréquence de base modifiable ou programmable
G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie
G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p. ex. pour empêcher l'ingénierie inverse
In overview, the disclosed methods, devices, and systems enable the location of the first device to be verified. In particular, second location verification data is generated using a current location of the second device is provided to a first device by a second device which can be matched with first location verification data received by the first device from a server, the first location verification data is generated using a stored location of the first device. If the first and second location verification data match, the location of the first device is considered to have been verified.
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
H04N 21/414 - Plate-formes spécialisées de client, p. ex. récepteur au sein d'une voiture ou intégré dans un appareil mobile
H04N 21/45 - Opérations de gestion réalisées par le client pour faciliter la réception de contenu ou l'interaction avec le contenu, ou pour l'administration des données liées à l'utilisateur final ou au dispositif client lui-même, p. ex. apprentissage des préférences d'utilisateurs pour recommander des films ou résolution de conflits d'ordonnancement
H04N 21/6334 - Signaux de commande issus du serveur dirigés vers des éléments du réseau ou du client vers le client pour l’autorisation, p. ex. en transmettant une clé
H04N 21/658 - Transmission du client vers le serveur
H04N 21/254 - Gestion au sein du serveur de données additionnelles, p. ex. serveur d'achat ou serveur de gestion de droits
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
A method for anti-replay protection of a memory of a device, wherein the memory is used by and external to a secure element of the device, the method comprising the following steps, wherein the steps are performed in the device after a content of the memory is modified: generating device state data indicative of a state of the content of the memory; transmitting the device state data to a remote system for updating an authentication key of the device stored in a data storage of the remote system and for use by the remote system in an authentication procedure; and providing authentication information based on the device state data from the secure element to the remote system in the authentication procedure between the device and the remote system to verify a validity of the content of the memory.
G06F 21/74 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information opérant en mode dual ou compartimenté, c.-à-d. avec au moins un mode sécurisé
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
In overview, a computer-implemented method of transmitting data in a data stream from a first device to a second device is disclosed. The data stream is encrypted before transmission from the first device to the second device, and a location of the data in the data stream is indicated to the second device. The location may be a pre-shared location between the first and second devices, or the first device may transmit the location of the data to the second device. The second device decrypts the encrypted data stream, identifies the data in the data stream based on the location, and encrypts the identified data in the data stream.
Virtual platform system for use in a cloud-based system, comprising: a virtual platform simulator configured to represent in software a physical remote client device and to have this representation interact with a virtual platform application; a process virtual machine configured to execute program instructions of the virtual platform application and comprising a code morpher component for transforming the program instructions of the virtual platform application into native program instructions for execution on a physical host machine of the cloud-based system; and interception components for capturing transactions from the virtual platform simulator and the process virtual machine. The transactions are related to the execution of the program instructions of the virtual platform application. The virtual platform system is configured to compare the captured transactions with pre-stored transactions, preferably stored in a blockchain, to obtain a comparison result, and to allow the execution of the program instructions depending on the comparison result.
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
80.
METHODS AND DEVICES FOR REMOTE INTEGRITY VERIFICATION
A computer-implemented method for use by a client device is provided. The client device comprises a memory and is configured to send data according to a cryptographic protocol that uses a key. The method comprises: generating a data unit and a seed related to the data unit; generating a measurement result of the client device related to the seed; generating an attestation key based on the measurement result and a key that is agreed in accordance with the cryptographic protocol; encrypting the data unit at least in part based on the attestation key; and generating an output comprising the encrypted data unit. Related methods for use by a server device and a network component, and related client device, server device and network component are also provided.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A method for securing a beacon signal in a network comprising a transmitter for broadcasting the beacon signal and one or more receivers for receiving the beacon signal, wherein the beacon signal comprises a data packet (103) including a payload (106) that comprises a first field containing broadcast information from the transmitter and a second field (204) for storing authentication information, the method comprising: computing, using a secret key, a message authentication code over the payload; extracting bytes from the message authentication code to obtain the authentication information; and encrypting the first field using a symmetric cipher which takes as parameter the secret key and a nonce, wherein the nonce comprises the authentication information, the encrypting resulting in an encrypted first field, the resulting secure beacon signal (200) comprising the encrypted first field (203) and the second field (204) with the authentication information.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The disclosure enables securing a transmission of content from a surveillance device to a remote server. The surveillance device is configured to obtain the content from observing a surroundings. The surveillance device is e.g. a security camera, in which case the content can comprise video data. The remote server is e.g. a centralized monitoring system or VMS. An encryption key that is generated in the remote server is received in the surveillance device from the remote server. The content is encrypted in the surveillance device using the encryption key and transmitted from the surveillance device to the remote server. The encryption key can be a control word that is received in an entitlement control message generated in the remote server.
H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
H04N 21/2347 - Traitement de flux vidéo élémentaires, p. ex. raccordement de flux vidéo ou transformation de graphes de scènes du flux vidéo codé impliquant le cryptage de flux vidéo
H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c.-à-d. systèmes dans lesquels le signal vidéo n'est pas diffusé
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
The present disclosure proposes method and systems for establishing secure communication session (s) between a first device and a second device, where the first device operates in a user network and implements a first key exchange protocol for secure communication. The second device is capable of communicating with the first device over a wireless communication network. The second device implements a second key exchange protocol that is different to the first key exchange protocol for secure communication. A proxy entity configured for implementing the first and the second key exchange protocols for secure communication is provided. The proxy entity is configured for generating and/or provisioning one or more session keys for the first and the second devices using the key exchange protocols specific to each device for establishing secure communication between the first and second device based on the generated session key(s).
Techniques and systems are provided for processing user interface content. For example, a server computer can receive a user interface event corresponding to a user interface of a device (e.g., a client device, another server computer, or other device). An application associated with the user interface event can be determined, and an interface model 5 can be generated using the application associated with the user interface event. The interface model defines state information for one or more graphic objects of the user interface. The state information results from the user interface event. The server computer can send the interface model to the device, which enables the device to render the user interface.
The disclosure relates to a method for sealing into a device (1) device information, which enable the secure functions of the device (1), managed by a RoT (2) of the device (1) by the security owner, furthermore to bootstrap the device (1) to a system (10) and to finally authenticate the combination of RoT (2) and device information in the device (1). This method has the minimum impact on the device (1) production flow.
A system (1) for asymmetrical cryptography, comprising a device (10) and a network storage (30), wherein the device is communicatively connected to the network storage, wherein the network storage is configured to store a private key, wherein the device is configured to retrieve the private key from the network storage to perform a cryptographic operation using the private key in a secure execution environment (12) of the device, and wherein the secure execution environment is configured to only temporarily store the private key for the cryptographic operation.
The disclosure related to methods and associated devices and/or systems for authorising at least one operation associated with a device, the device operating in a communication network, such as a user network, that comprises a plurality of devices communicatively coupled to a server computer, such as a control server. The disclosed method comprises generating a data model based on a plurality of patterns of actions for one or more devices among the plurality of devices. The data model is configured to detect and/or store at least one regular pattern of actions for each device among the one or more devices, each action corresponding to an operating state of the device. The disclosed method comprises receiving a request for an operation associated with a first device among the plurality of devices and determining if the received request satisfies a first criterion, the first criterion being based on or associated with the data model. Then, based on a determination that the first criterion is not satisfied, the disclosed method comprises generating at least one query based on a regular pattern of actions of at least one device among the one or more devices and sending the at least one query to a user interface. The disclosed method comprises determining if a response to the at least one query received from the user interface satisfies a second criterion. The second criterion is based on a comparison of the response received with the regular pattern of actions associated with the query in the data model. Then, based on a determination that the second condition is satisfied, the disclosed method comprises authorising the received request for the operation and providing a setting for the first device and/or control server based on the authorisation.
A system for handling data content is provided. The system comprises a transmitting module, a receiving module and an examination module. The transmitting module is arranged to transmit data content in a first format to a device for rendering the data content in a second format. The receiving module is arranged to receive a signal comprising at least a part of the data content rendered by the device for rendering the data content in a second format. The examination module is coupled to the receiving module and arranged to examine the signal received by the receiving module so as to determine whether the data content transmitted in the first format has been rendered in the second format.
H04N 21/44 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé
H04H 60/31 - Dispositions de contrôle de l'utilisation des services de radiodiffusion
H04N 21/442 - Surveillance de procédés ou de ressources, p. ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans le disque dur interne
89.
METHOD OF MANAGING NETWORK ACCESS OF A DEVICE AND DEVICE
In overview, disclosed methods and devices enable managing of the network access of a device by the selection of a network access profile from a plurality of network access profiles stored on the device. In order to select a network access profile, a security state of the device is determined at the device. A local decision rule is then executed based on a security state and a network access profile is selected based on an outcome of the execution of the local decision rule.
Techniques and systems are provided for processing user interface content. For example, a server computer can receive a user interface event corresponding to a user interface of a device (e.g., a client device, another server computer, or other device). An application associated with the user interface event can be determined, and an interface model 5 can be generated using the application associated with the user interface event. The interface model defines state information for one or more graphic objects of the user interface. The state information results from the user interface event. The server computer can send the interface model to the device, which enables the device to render the user interface.
A system and method for searching for a specific datum among data stored in a permanent memory of a user unit linked to a central authority, comprising: receiving in the user unit, a processing key derived, in said central authority, using a key derivation function applied on a secret piece of information, said key derivation function being a first iterative one-way function; storing said processing key in a temporary memory of the user unit; receiving from said central authority the specific datum converted by a second one-way function using said processing key; in the user unit, converting at least a part of the data stored in the permanent memory using said second one-way function and said processing key; comparing said converted specific datum received from the central authority with the converted data from the permanent memory, thereby providing a search result; and deleting said processing key from the temporary memory.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
92.
Media player for receiving media content from a remote server
An embodiment of the present invention may be deployed in a system comprising a media player and a remote server operably connected to communicate with one another. The invention allows for a settings file to be stored on the remote server, the settings file comprising parameters useful for adjusting different settings on the media player such that rendering of a particular content to be made possible on the media player according to a user's predetermined taste by downloading the settings from the server onto the media player.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04W 4/18 - Conversion de format ou de contenu d'informations, p. ex. adaptation, par le réseau, des informations reçues ou transmises pour une distribution sans fil aux utilisateurs ou aux terminaux
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
The generation of hash values become popular with the storage of pin code by an authentication server, since the authentication server knows only the result of the hash function and not the pin code itself. Each time an authentication is requested, a hash function is executed on the received pin code and then compared with the stored reference hash value of the initial pin code. In order to improve the security of the hash value, it is proposed a method to produce a secure hash value (R) from a plaintext (P), said method comprising: —producing a first result (H) using an hash function of the plaintext (P), —obtaining an initial floating value (U0) by converting the first result (H) into a floating number representation of the first value (H), —updating a floating value (Un) by executing at least once a Transcendental function (TF) on the initial floating value (Un−1), —obtaining the secure hash value (R) by mixing the first result (H) with the updated floating value (Un).
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
G06F 7/544 - Méthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p. ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs n'établissant pas de contact, p. ex. tube, dispositif à l'état solideMéthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p. ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs non spécifiés pour l'évaluation de fonctions par calcul
G06F 7/548 - Méthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p. ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs n'établissant pas de contact, p. ex. tube, dispositif à l'état solideMéthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p. ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs non spécifiés pour l'évaluation de fonctions par calcul de fonctions trigonométriquesChangement de coordonnées
G06F 7/556 - Méthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p. ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs n'établissant pas de contact, p. ex. tube, dispositif à l'état solideMéthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p. ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs non spécifiés pour l'évaluation de fonctions par calcul de fonctions logarithmiques ou exponentielles
A method of enabling a user to access recorded data associated with an event, the method comprising determining the location of a user's device at a control unit, confirming the location is within a predetermined vicinity and that the user's device was at the location within a predetermined period and the control unit enabling access for the user to the data if the location of the user's device in the predetermined period is confirmed.
The present application is directed at protecting integrated circuits which are packaged in a wire-bond ball grid array form of package and in particular is directed at preventing an attack through the substrate of the package directly underneath the integrated circuit.
H01L 23/00 - Détails de dispositifs à semi-conducteurs ou d'autres dispositifs à l'état solide
H01L 23/58 - Dispositions électriques structurelles non prévues ailleurs pour dispositifs semi-conducteurs
H01L 23/488 - Dispositions pour conduire le courant électrique vers le ou hors du corps à l'état solide pendant son fonctionnement, p. ex. fils de connexion ou bornes formées de structures soudées
H01L 21/02 - Fabrication ou traitement des dispositifs à semi-conducteurs ou de leurs parties constitutives
96.
Method for controlling access to broadcast content
The present invention relates to the domain of control of access to audiovisual content transmitted to a receiver, in particular control based on the localization of the receiver.
verification, by the verification means, that the current localization is included in said area, and if so, transmission of an authorization message for the reception of the audiovisual content to the security means relative to the receiver.
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
H04N 21/266 - Gestion de canal ou de contenu, p. ex. génération et gestion de clés et de messages de titres d'accès dans un système d'accès conditionnel, fusion d'un canal de monodiffusion de VOD dans un canal multidiffusion
H04N 21/414 - Plate-formes spécialisées de client, p. ex. récepteur au sein d'une voiture ou intégré dans un appareil mobile
H04N 21/422 - Périphériques d'entrée uniquement, p. ex. système de positionnement global [GPS]
H04N 21/45 - Opérations de gestion réalisées par le client pour faciliter la réception de contenu ou l'interaction avec le contenu, ou pour l'administration des données liées à l'utilisateur final ou au dispositif client lui-même, p. ex. apprentissage des préférences d'utilisateurs pour recommander des films ou résolution de conflits d'ordonnancement
H04N 21/418 - Carte externe destinée à être utilisée en combinaison avec le dispositif client, p. ex. pour l'accès conditionnel
H04N 21/254 - Gestion au sein du serveur de données additionnelles, p. ex. serveur d'achat ou serveur de gestion de droits
H04N 21/475 - Interface pour utilisateurs finaux pour acquérir des données d'utilisateurs finaux, p. ex. numéro d'identification personnel [PIN] ou données de préférences
The present disclosure relates to software tampering resistance. In one aspect, a method for generating protected code is provided, comprising identifying a primary function in code to be obscured, the primary function being a function used to verify the integrity of the code run-time. The method then comprises generating a finite state machine from the primary function, wherein a state of the finite state machine at a given instance defines an element of the primary function to be executed. The method then comprises distributing the finite state machine throughout the code to obscure one or more areas of the code.
The present disclosure relates to the use of cryptographic techniques to facilitate local decision making at a gateway device (120) interfacing between an operator device (110) and edge devices (130), for example as can be found in Internet of Things infrastructures. Local decision making is facilitated in the context of end to end encryption of data between the edge device and operator device by enabling a function of the data to be computed at the gateway (120) without decrypting the data, for example using Functional Encryption (FE). The gateway determines an action based on the computed function, for example whether to transmit the data to the operator device (110). Examples of edge devices are video surveillance cameras or utility consumption meters but the disclosure is applicable to any edge device that produces data to be transmitted with end to end encryption. The disclosure is also not limited to loT infrastructures.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
A method of transmitting entitlement messages to content consumption devices in a access control system, the method comprising periodically transmitting entitlement messages to content consumption devices in a access control system and periodically extending an expiry time comprised in the entitlement messages. The entitlement messages comprise indicator data indicating to the content consumption devices that subsequent entitlement messages loaded into a content consumption device after a first entitlement message is loaded into the content consumption device shall not be used by the content consumption device to access protected media content.
H04N 21/266 - Gestion de canal ou de contenu, p. ex. génération et gestion de clés et de messages de titres d'accès dans un système d'accès conditionnel, fusion d'un canal de monodiffusion de VOD dans un canal multidiffusion
H04N 21/235 - Traitement de données additionnelles, p. ex. brouillage de données additionnelles ou traitement de descripteurs de contenu
H04N 21/418 - Carte externe destinée à être utilisée en combinaison avec le dispositif client, p. ex. pour l'accès conditionnel
H04N 21/462 - Gestion de contenu ou de données additionnelles, p. ex. création d'un guide de programmes électronique maître à partir de données reçues par Internet et d'une tête de réseau ou contrôle de la complexité d'un flux vidéo en dimensionnant la résolution ou le débit en fonction des capacités du client
H04N 21/633 - Signaux de commande issus du serveur dirigés vers des éléments du réseau ou du client
H04N 21/4623 - Traitement de messages de titres d'accès, p. ex. message de contrôle d'accès [ECM], message de gestion d'accès [EMM]
H04N 21/6334 - Signaux de commande issus du serveur dirigés vers des éléments du réseau ou du client vers le client pour l’autorisation, p. ex. en transmettant une clé
100.
SECURING DATA STORED IN A MEMORY OF AN IOT DEVICE DURING A LOW POWER MODE
The disclosure relates to a method for enabling the secure functions of a chipset (1) and especially the encryption of the content of the secure memory (7) when the device goes into low power mode. The content of the secure memory (7) may be encrypted and stored in an external memory (20) during low power mode of the chipset (1).
G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/81 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur en agissant sur l’alimentation, p. ex. en branchant ou en débranchant l’alimentation, les fonctions de mise en veille ou de reprise