Irdeto Corporate B.V.
|Irdeto Corporate B.V. Patent applications|
|Patent application number||Title||Published|
|20140365783||METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AT LEAST PART OF AN EXECUTION ENVIRONMENT FOR EXECUTING A COMPUTER MODULE - A system for verifying authenticity of at least part of an execution environment for executing a computer program module. The system includes a processor and a storage for storing the computer program module and the execution environment. The computer program module is operative to cause the processor to process digital input data in dependence on a plurality of predetermined digital parameters. The system includes means for deriving at least part of one of the plurality of predetermined digital parameters from the at least part of the execution environment.||12-11-2014|
|20140153716||WHITE-BOX IMPLEMENTATION - A system for enabling a device to compute an outcome of an exponentiation C||06-05-2014|
|20140086409||PERSONALIZED WHITEBOX DESCRAMBLERS - The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler.||03-27-2014|
|20130129082||DETECTION OF WATERMARKS IN SIGNALS - The invention provides for a method and a device for the detection of a watermark in a signal. A first signal is compared with two or more second signals. The second signal with the closest match contains the same watermark as in the first signal. Data indicative for the second signal with the closest match is output as an indication of the watermark in the first signal. The invention further provides for a head-end system that provides watermarked content from which the watermarks are detectable by the watermark detection device.||05-23-2013|
|20120042170||DEVICE AND METHOD FOR ESTABLISHING SECURE TRUST KEY - The invention relates to an electronic device configured for encrypted data transfer with a smart card under a trust key. The electronic device comprises at least one secured portion, wherein the electronic device is configured for performing a key exchange algorithm with the smart card for establishing the trust key for the encrypted data transfer between the electronic device and the smart card and wherein the electronic device is configured for storing the trust key in the secured portion of the electronic device.||02-16-2012|
|20110270913||CONTROLLING AN ADAPTIVE STREAMING OF DIGITAL CONTENT - The invention provides an improved adaptive streaming solution wherein an optimal receiver strategy is created and stored in a client device for controlling the adaptive streaming of digital content. In various embodiments, the optimal receiver strategy data is a result of solving a stochastic decision problem using a mathematical model based on a Markov Decision Process and using as an input to the mathematical model one or more properties of an encoder and an beforehand estimation of an available bandwidth of a packet switched network and/or variation characteristics of the available bandwidth over time of the packet switched network, wherein the properties comprise at least one of an encoder type identification and a mathematical model of a decoder input buffer used by the encoder.||11-03-2011|
|20110235803||PERSONALIZED WHITEBOX DESCRAMBLERS - The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler.||09-29-2011|
|20110211694||DISABLING A CLEARTEXT CONTROL WORD LOADING MECHANISM IN A CONDITIONAL ACCESS SYSTEM - Various embodiments enable a chipset of a receiver of a conditional access system to block cleartext control words provided to the chipset from being used to descramble content. Hereto the chipset comprises a trigger module configured to obtain a disable command that is received with an encrypted Chip Set Session Key (CSSK) and, if the disable command is obtained, have the chipset block any cleartext control word.||09-01-2011|
|20110191589||PREVENTING THE USE OF MODIFIED RECEIVER FIRMWARE IN RECEIVERS OF A CONDITIONAL ACCESS SYSTEM - The invention enables the shared secret, which is used for encrypting the communication of CWs from a smartcard to a receiver, to cover at least a part of a binary image of firmware that is executing in the receiver. Preferably the shared secret covers the entire binary image of the firmware. Hereto, data from one or more predefined firmware memory locations are read, the set of data forming the shared secret.||08-04-2011|
Patent applications by Irdeto Corporate B.V.