Nagravision SA Patent applications |
Patent application number | Title | Published |
20160142355 | MANAGING COMMUNICATION EXPLOITATION IN GLOBAL ORGANIZATIONS - Techniques disclosed herein integrate communication mechanisms of a business or government with time management/calendar systems having knowledge of an employee's work schedule and geo-location, with a set of rules usable to selectively store and/or forward work related communications to an employee, while enabling overrides for emergencies, preventing employee self-exploitation, and monitoring for compliance. When a work related communications is sent towards an employee, the system receives the communication, and evaluates the communication based on the employee's work schedule, geo-location, and any other restrictions within the set of rules. When it is determined that the communications should be restricted from being sent, and no override to the restrictions is identified, then the communication is scheduled for transmission to the employee at a later time. Overrides to the restrictions are logged and monitored for compliance to company or public policy. | 05-19-2016 |
20160132762 | METHOD OF MANUFACTURING CARDS THAT INCLUDE AN ELECTRONIC MODULE AND INTERMEDIATE PRODUCTS - Method of manufacturing at least one card each including an electronic module ( | 05-12-2016 |
20160098628 | ELECTRONIC CARD HAVING AN EXTERNAL CONNECTOR - A smart card is provided, including an external connector formed of an insulating support and a plurality of external metal contact pads arranged on an external face of the support, and a card body having a housing in which the external connector is arranged and includes an electronic unit and/or an antenna electrically connected to a plurality of internal metal contact pads arranged underneath the external connector and respectively aligned with the external pads. The external pads are respectively electrically connected to the internal pads by a plurality of metal parts, which are each at least partially formed by a solder material and which traverse the insulating support through respective apertures. The metal parts are respectively covered by the external pads, which close the apertures on the external face of the support, and respectively form connecting bridges between rear surfaces of the external pads and the internal pads. | 04-07-2016 |
20160088366 | METHOD FOR WATERMARKING MEDIA CONTENT AND SYSTEM FOR IMPLEMENTING THIS METHOD - A method for watermarking digital media content received in a form of at least one encrypted sample to which metadata is assigned. Each sample is encrypted by means of a sample key. The metadata comprises first data, second data and a signature resulting from the first and second data. The first data is encrypted by a transport key and comprises at least a content key and watermarking metadata. The second data comprises an initialization vector so that the content key and the initialization vector form a unique pair of cryptographic data equivalent to the sample key. The method comprises the steps of extracting the metadata from the media content, decrypting the first data by using the transport key, authenticating the signed data and, in case of positive outcome, descrambling each sample by using the pair of cryptographic data, and marking each descrambled sample by using the watermarking metadata. | 03-24-2016 |
20150358156 | METHOD AND SYSTEM FOR SCRAMBLING AND DESCRAMBLING A DIGITAL IMAGE - The present invention refers to a method for scrambling an original digital image into a scrambled image and for descrambling the scrambled image into a reconstructed image. The method firstly comprises a scrambling operation for substituting a plurality of original coefficients by dummy coefficients, while safeguarding the coding format, and for storing the substituted original coefficients with their respective position, as original data into at least two control objects, each control object corresponding to a specific degradation level of the original image. This method secondly comprises a descrambling operation for receiving the scrambled image and at least a part of said control objects, and for using original data derived from a selection of at least one of said control objects, performed on the basis of a user access condition, to obtain the reconstructed image by putting back the original coefficients instead of said dummy coefficients thanks to their respective position. | 12-10-2015 |
20150334367 | TECHNIQUES FOR DISPLAYING THREE DIMENSIONAL OBJECTS - Techniques for visual presentation of video objects on a display screen include providing an overflow area around a primary or active video display area. The video objects are selectively displayed in the overflow area to provide a sense of three dimensionality or giving an appearance that the object is spilling out of the display and is present at the display. Operational modes to selectively turn on or off the use of the overflow area may be encoded in video bitstream or may be configured via a user interface. | 11-19-2015 |
20150296258 | MEDIA GATEWAY FOR SCHEDULING CONTENT - Methods and systems to schedule media content using a media gateway are presented. In an example method, data is collected that identifies content accessed from one or more communication networks via the media gateway by a user. Further content items for presentation to the user are determined based on the collected data. The further content items may be sourced by content channels received at the media gateway. The further content items may then be scheduled for presentation to the user. The scheduling may include defining a sequence in which the further content items are to be presented to the user. | 10-15-2015 |
20150270962 | METHOD AND SYSTEM FOR SMART CARD CHIP PERSONALIZATION - Method and system for personalizing a chip, intended to be integrated into a smart card, comprising a tester associated to an FPGA device connected to the chip, the chip being part of a wafer comprising a plurality of chips and a disposable hardware module for verifying presence of the chip on the wafer. The tester sends a first secret code to the FPGA device, which commands the chip to initiate a test mode activation. The FPGA device encrypts a second secret code by using a secret encryption algorithm parameterized with a random number received from the chip and the first secret code to obtain a first cryptogram which is sent to the chip. The chip determines a second cryptogram by carrying out a Boolean function over a result obtained by decryption of the first cryptogram using the inverse algorithm parameterized with the random number and the first secret code. The second cryptogram is compared with a result obtained by carrying out the Boolean function over the second secret code temporarily stored on the chip. The FPGA device personalizes the chip only if the second cryptogram matches the calculated result. | 09-24-2015 |
20150264566 | SECURE SMARTCARD PAIRING - Techniques for pairing two different security modules that use two different encryption technologies for operation in two different networks include generation and transmission of a secret to both the security modules via their respective communication networks. In one advantageous aspect, one of the security module, which may be prone for duplication or theft, is logically tethered to the other security module via the pairing. For example, after pairing is successfully performed, the first security module may be usable in a wide area network only when its presence in a local communication connection, such as a home network of a subscriber, or a peer-to-peer or a near field communication link, can be detected and verified by the second security module. | 09-17-2015 |
20150237052 | USER IDENTIFICATION BASED ACCESS CONTROL - A user's access to software applications installed on a device is limited by evaluating the context in which the user requests access to the application and determining, based on the context analysis, whether or not the user is to be given access to the application. When it is determined that the user requesting access is not a primary authorized user, the primary authorized user may be notified of the attempt to access the application. | 08-20-2015 |
20150234548 | GRAPHICAL USER INTERFACE WITH UNFOLDING PANEL - As presented by a server machine or a device, a graphical user interface may include first and second panels presented on a display. The first panel may show a set of menu items that include a menu item that is highlighted by a shape that surrounds the menu item. The second panel may be presented adjacent to the first panel and may show a set of one or more sub-menu items that correspond to the highlighted menu item. In response to a selection of the highlighted menu item, the presenting of the graphical user interface may include presenting an animated transition that shows the first panel folding out of view underneath the second panel, the third panel unfolding into view from beneath the second panel, and the shape transitioning from surrounding the menu item in the first panel to surrounding a sub-menu item in the second panel. | 08-20-2015 |
20150222436 | TECHNIQUES FOR SECURING NETWORKED ACCESS SYSTEMS - A system for controlling access to a facility such as a parking structure includes an access device that operates a physical barrier that controls access and a controller that communicates with the access device via a communication network to control the operation of the access device. Messages exchanged between the controller and the access device are secured by encrypting the messages using a first private key and by encrypting a hash value of the encrypted message with a second private key. | 08-06-2015 |
20150106531 | MULTICAST OF STREAM SELECTION FROM PORTABLE DEVICE - To view media, a user may select a media stream by operating a portable device that controls a media presentation device. The portable device may be configured to multicast this stream selection to both the media presentation device and a selection analysis machine. The remote control may have or include both an infrared emitter and a cellular telephone, and the stream selection may be sent both to the media presentation device and to the selection analysis machine. The selection analysis machine may receive and store stream selections over a period of time, and these aggregated stream selections may form all or part of a profile of a user or a group of users who use the media presentation device. This profile may indicate viewing habits and choices of one or more users of the media presentation device, and the selection analysis machine may analyze this profile. | 04-16-2015 |
20150052545 | METHOD TO BIND THE USE OF A TELEVISION RECEIVER TO A PARTICULAR NETWORK - A method to bind the use of a digital audio/video service data receiver to a network on which at least one services provider broadcasts access controlled and free digital audio/video services streams, the method having the steps: receiving by the receiver a periodic signal transmitted by a conditional access system server via the network, said periodic signal being processed by a run time software embedded in the receiver to check legitimacy of the network; displaying services available on the network only if said run time software recognizes the periodic signal as indicating network legitimacy; and checking operability of the run time software and if necessary taking actions to enforce limitation of using the receiver on the network checked as legitimate. The invention further discloses a receiver bound to a specific network configured to perform the method. | 02-19-2015 |
20150052350 | SYSTEM AND METHOD FOR AUTHENTICATING A USER - A method for a user authentication implementing a first server connected to a public network, and a second server connected to the first server but not connected to the public network, this method comprising a step of enrolment comprising: receiving by the first server an reference identifier and of a reference password, and transmitting this information to the second server, loading a security parameter by the second server, and calculating a first cryptogram by a one-way function Hash on the reference identifier, the reference password, and the security parameter, encrypting at least the reference identifier and the password by using an asymmetrical encryption method, and storing the encrypted data by the second server, returning the first cryptogram to the first server and storing said cryptogram by the first server, and a verification step of an user comprising: receiving by the first server of the current identifier and of the current password, and transmission of said information to the second server, calculating a second cryptogram by the one-way function Hash on the current identifier, the current password, and the security parameter by the second server, returning the second cryptogram to the first server and verification that the first cryptogram is included in the database, if not, generating an error message. | 02-19-2015 |
20150040023 | SYSTEM AND METHOD TO MANAGE SWITCHING BETWEEN DEVICES - In example embodiments, a system and method for managing switching between devices are provided. A consolidated catalog of applications available on devices coupled to a master device is maintained. The consolidated catalog of applications is graphically presented on a screen controlled by the master device. A selection of an application from the consolidated catalog of applications is received via a control device. Based on the selected application being located at a device coupled to the master device, input is automatically switched from the master device to the device having the selected application. As a result, a display corresponding to the selected application is presented on the screen. | 02-05-2015 |
20150030154 | METHOD AND SYSTEM FOR SCRAMBLING AND DESCRAMBLING A DIGITAL IMAGE - The present invention refers to a method for scrambling an original digital image into a scrambled image and for descrambling the scrambled image into a reconstructed image. The method firstly comprises a scrambling operation for substituting a plurality of original coefficients by dummy coefficients, while safeguarding the coding format, and for storing the substituted original coefficients with their respective position, as original data into at least two control objects, each control object corresponding to a specific degradation level of the original image. This method secondly comprises a descrambling operation for receiving the scrambled image and at least a part of said control objects, and for using original data derived from a selection of at least one of said control objects, performed on the basis of a user access condition, to obtain the reconstructed image by putting back the original coefficients instead of said dummy coefficients thanks to their respective position. | 01-29-2015 |
20140373042 | METHOD AND SYSTEM FOR SECURE PROCESSING A STREAM OF ENCRYPTED DIGITAL AUDIO/VIDEO DATA - Method and system to prevent control words sharing. The system comprises a receiver capable of processing a digital data stream. The receiver, having a video descrambler device, is coupled to a primary and secondary secure device. The digital data stream comprises video content data scrambled by a first algorithm using a control word, audio content data encrypted with a secret second algorithm using a system key, and encrypted control messages comprising the control word. The primary secure device decrypts the control message and obtains the control word. The video descrambler device uses this control word to descramble the video content data. The secondary secure device comprises a decryption device which decrypts the encrypted audio content data and a watermarking module configured to add a watermark to the decrypted audio content data and return watermarked decrypted audio content data to the receiver. | 12-18-2014 |
20140351848 | METHOD, CRYPTOGRAPHIC SYSTEM AND SECURITY MODULE FOR DESCRAMBLING CONTENT PACKETS OF A DIGITAL TRANSPORT STREAM - A method and cryptographic system for descrambling content packets, included within a digital transport stream, having conditional access messages and header data. The method and system require a deciphering algorithm, processed by a descrambler of a multimedia unit, using an initialization vector as a first input and a control word as a second input. The multimedia unit is connectable to a security module for processing the conditional access messages and extracting control words therefrom. The initialization vector, or intermediate data to determine the initialization vector, is the result of a cryptographic function based on at least one variable extracted from the digital transport stream and processed by the security module. | 11-27-2014 |
20140304752 | METHOD TO IDENTIFY AT LEAST ONE CONTENT WITHIN A DATA STREAM - A method to identify content within a data stream, comprising: capturing a data stream, analysing and filtering the data stream by isolating a test stream of the data stream and disabling the other sub-streams, applying the test stream to the application so as to produce an output, applying the output to a comparator, the comparator receiving a reference and determining by the comparator a distance between the application output and the reference, if the distance is below a predefined level, repeating the isolating step with a new test stream selected among the previous test stream, the new test stream being a subset of the previous test stream, if that the distance is above or equal a second predefined level, repeating the isolating step by selecting a different test stream from the data stream not already applied to the application. | 10-09-2014 |
20140303802 | SYSTEM AND METHOD FOR CONTROLLING OPERATION OF CONSUMPTION APPLIANCES - A method is disclosed for controlling the operating of a consumption appliance by way of a selector switch controlled by an energy saving device connected to a management center. The consumption appliance is kept in its default power mode, until receiving, by the energy saving device, an authentic secured control message sent by the management center. This message includes a command onto the mode in which the consumption appliance has to be switched. A counter is initialized with an initialization value before to be triggered. The consumption appliance is switched in the mode indicated by the command, either until the counter has reached a threshold value, or until receiving another authentic control message. If the counter has reached the threshold value, then the consumption appliance is switched in its default power mode. If another authentic secured control message has been received, then returning to the step of initializing the counter. | 10-09-2014 |
20140282713 | METHOD FOR PLAYING REPEATABLE EVENTS ON A MEDIA PLAYER - The present invention is directed to playing an alternative pre-stored content in place of a particular type of content received by the player within a transport stream comprising a plurality of types of content. The invention can be useful in providing targeted advertising, where, when combined with profiling techniques, alternative content of interest to a viewer can be substituted in the transport stream in place of the received content. According to other embodiments of the present invention, computing resources and communication bandwidth use can be saved by playing pre-stored content instead of the received content. Embodiments of the present invention provide for the maintenance of the pre-stored material by storing appropriate content as it is received in the transport stream or by deleting pre-stored content when deemed appropriate to do so. An embodiment of the present invention may be deployed in a personal video player/recorder. | 09-18-2014 |
20140259061 | REMOTE CONTROL FOR CONTROLLING A TELEVISION RECEIVER - A remote control for controlling a television receiver. The remote control comprises a communication mechanism for communicating with the receiver, an active NFC reader for communicating with an active or passive NFC device, and a mechanism for transmitting the information received from the NFC device to the receiver. The remote control allows the use of a near filed communication (NFC) portable device (e.g., card or smartphone) for transactions using a television. | 09-11-2014 |
20140258531 | METHOD FOR ACQUIRING ACCESS RIGHTS TO CONDITIONAL ACCESS CONTENT - A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights. | 09-11-2014 |
20140258530 | METHOD FOR ACQUIRING ACCESS RIGHTS TO A PRODUCT OR A SERVICE - A method of acquiring access rights to a product or a service. The method comprises receiving an access right to a service and/or a product by a multimedia unit, said right being sent by a right provider; transmitting said access right from said multimedia unit to a mobile terminal, said transmission using a near field communication; and storing said right in a memory of the mobile terminal. | 09-11-2014 |
20140256255 | CONFIGURATION METHOD OF A MULTIMEDIA SYSTEM - A configuration method of a multimedia system comprising a first device and at least one adjacent device having a mechanism to communicate with the first device. The first device comprises a mechanism to read/write data from/to an NFC data carrier. The method comprises a set-up phase and an exploitation phase. | 09-11-2014 |
20140256254 | METHOD AND APPARATUS FOR SELECTING AN APPLICATION OF A DEVICE HAVING AN NFC INTERFACE - The present invention describes a method to select an application on a first device having an NFC interface and comprising a plurality of applications using the NFC interface, said method comprising the steps of detecting a second device having a NFC interface via the NFC interface of the first device, obtaining via the NFC interface a message comprising a message type and a service identification, determining an application type based on the message type and the service identification, selecting at least one application among the plurality of applications matching the message type and the service identification, prompting a user of the first device to accept a communication between the second device and the selected application, in case of positive answer, notifying the selected application of the message type, establishing the communication between the selected application and the second device via the NFC interface. | 09-11-2014 |
20140254470 | NEAR FIELD COMMUNICATION SYSTEM IN A LOCAL NETWORK - A system for a local network, the system being configured to extend a near field communication (NFC) between an NFC device and an NFC mobile device beyond the range defined by the NFC standards. | 09-11-2014 |
20140223472 | METHOD TO ENHANCE A VIDEO CONTENT IN A RECEIVING DEVICE - A method to enhance a video content in a receiving device, comprising the steps of: receiving a video content at a management center; analyzing the visual content of the video content to determine at least one context information; transmitting the video content according to transmission parameters to a receiving device having a receiving device identification; storing in a database the context information and the transmission parameters; on the receiving device, selecting the transmission parameters and receiving the video content; sending a request for enhanced video content, said request comprising at least the transmission parameters and the receiving device identification; from the received transmission parameters, retrieving from the database, the context information; retrieving an enhanced video content related to the first context content information; sending the enhanced video content, based on the receiving device identification, to the receiving device; and displaying the enhanced video content by the receiving device. | 08-07-2014 |
20140215638 | METHOD TO CONTROL THE ACCESS OF PERSONAL DATA OF A USER - A system and method give a user control of personal data. A trusted center comprises a database for personal data, access conditions for the personal data, and a counter. A user loads personal data into the database and assigns access conditions to said data. The personal data is divided into at least two categories, each associated with a user's value. A third party requests access to personal data of a plurality of users, the request comprising search criteria. The trusted center identifies a first set of users matching the search criteria and returns the quantity of users in, and a sum of user's values for, the first set. The third party acknowledges all or part of the sum, and the trusted center returns the personal data of a second set of users for which the sum covers the user's values and updates the counters of user in the second set. | 07-31-2014 |
20140214685 | PRICING SYSTEM AND METHOD FOR UTILITY CONSUMPTIONS WITHIN A SMART GRID - A pricing method for utility consumptions of utility meters each connected to at least one management center through an intermediate data concentrator. The data concentrator receives, from each management center, at least a tariff table comprising at least one time interval and an associated pricing rate. It selects the lowest rate for each received time interval. The data concentrator receives, from the utility meter, secured utility meter messages, each comprising: a metering data measurement, the utility meter identifier, a data concentrator identifier and a management center identifier. On the basis of several metering data measurements, a metering counter differential consumption value is determined and the management center suggesting the lowest rate is assigned thereto. Finally, a secured report containing at least the metering counter differential consumption value together with the utility meter identifier to which this value refers is sent from the data concentrator towards each management center. | 07-31-2014 |
20140205137 | METHOD TO TRACE VIDEO CONTENT PROCESSED BY A DECODER - The method traces the origin of a (illegally) distributed video material. It fingerprints a data object A having a nominal stream format F to provide a fingerprinted data object B including a pre-fingerprinting forensic luring process. | 07-24-2014 |
20140181520 | METHOD USING A SINGLE AUTHENTICATION DEVICE TO AUTHENTICATE A USER TO A SERVICE PROVIDER AMONG A PLURALITY OF SERVICE PROVIDERS AND DEVICE FOR PERFORMING SUCH A METHOD - A method for authenticating a user to a provider, among a plurality of providers. The method uses an authentication device comprising, for each of provider, a record comprising a pairing key and first data, both as shared data. Provider authentication data comprises a first cryptogram obtained by encrypting said first data with said pairing key. Authenticating provider authentication data is performed at the authentication device by the steps of decrypting said first cryptogram by means of the pairing key stored in one of said records, then comparing the result of this decryption with first data resulting from pairing data stored in said record, if the comparison does not indicate a match, then processing again the previous decryption and comparison steps by using the pairing key of another record until each of said records stored in the authentication device has been processed. | 06-26-2014 |
20140177835 | METHOD AND A SECURITY MODULE CONFIGURED TO ENFORCE PROCESSING OF MANAGEMENT MESSAGES - A method and a security module configured to enforce processing of management messages. The security module is associated to a multimedia receiver configured to receive broadcast access controlled multimedia services. The management messages are transmitted by a managing center to the multimedia receiver. The method comprises steps of: receiving by the security module at least one global management message addressed to a plurality of multimedia receivers operated by the managing center, tracing processing of said global management message, receiving at least one positive addressing management message addressed to said security module, checking, by the security module, anterior processing of the global management message through the value of the parameters set during tracing processing of the global message, processing the positive addressing management message only if previous checking gives a result indicating a successful enforcement of the global management message allowing the multimedia receiver accessing the broadcast multimedia services. | 06-26-2014 |
20140177834 | METHOD TO ENFORCE WATERMARKING INSTRUCTIONS IN A RECEIVING DEVICE - A method to enforce watermarking instructions by a security module in a receiving device, comprising the steps of receiving a security message by—a security module, comprising at least a content key, watermark instructions and security message signature, said watermark instruction activates or deactivates a watermarking module, decrypting—a security message with a transmission key, verifying—a security message signature, and in case of successful verification, reading a watermarking data from the watermarking module, verifying the authenticity of the watermarking data, and in case of successful verification, transmitting the watermark instructions to the watermark module and the content key to a descrambling module. | 06-26-2014 |
20140169567 | METHOD FOR GRANTING A PLURALITY OF ELECTRONIC COMMUNICATION DEVICES ACCESS TO A LOCAL AREA NETWORK - Method for granting a plurality of electronic communication devices access to a local area network (LAN) via an access point using a single cryptographic key to secure communications exchanged through the LAN. The method comprising an activation phase performed once at initialization of the LAN and an operating phase wherein the electronic communication devices accesses the LAN. The activation phase comprising: providing the cryptographic key in a digital form by the access point; transferring the cryptographic key to a master device, switching the access point into a secure mode in which any further communication with the access point is secured with the cryptographic key. The operating phase comprising: transferring the cryptographic key from the master device to the electronic communication devices. The cryptographic key is converted from its digital form into a graphic form and then transferred in the graphic form to the electronic communication devices during the operating phase. | 06-19-2014 |
20140146966 | METHOD, SYSTEM AND DEVICE FOR SECURELY TRANSFERRING CONTENT BETWEEN DEVICES WITHIN A NETWORK - A method is disclosed for securely transferring a content CT between devices within a network managed by a management center. The method includes an activation of the network; a keys recovering phase; and a transfer of a content CT. | 05-29-2014 |
20140143155 | ELECTRONIC PAYMENT METHOD, SYSTEM AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - Electronic payment method for securely exchanging payment information between an authentication device and an authorization server via a communication device. The authentication device comprising an interface for data exchange with the device, a user interface for user authentication data input, a nonvolatile memory for storing an authentication device ID, a data memory for storing a cryptographic key and a crypto-processor for performing cryptographic operations. The communication device comprising a device ID and an interface for receiving and sending data, the authorization server comprising an interface for data exchange with the device, a database for storing a plurality of customer accounts each including an authentication device ID associated to a device holder authentication data, a data storage for storing a second cryptographic key, and a cryptographic unit for performing cryptographic operations. | 05-22-2014 |
20140143150 | ELECTRONIC PAYMENT METHOD AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - The present invention relates to an electronic payment method for securely exchanging information between an authentication device and a server via a communication device. The method comprises the following steps: acquiring by the authentication device a payment amount and a seller identifier, displaying the payment amount on a display of said authentication device, acquiring by the authentication device user feedback data by means of a user interface of said authentication device, generating, at the authentication device, a secure payment request comprising the displayed payment amount, said seller identifier and an authentication device identifier stored in the authentication device, and transmitting said secure payment request to the server by using said communication device as relaying device. | 05-22-2014 |
20140115626 | METHOD AND SYSTEM FOR ENHANCING REDISTRIBUTED AUDIO/VIDEO CONTENT - A method and a system for recognizing, by a broadcasting platform, content sequences of an input linear content stream by retrieving content information determined by small fingerprints of portions of the linear content and comparing the small fingerprint with reference fingerprints stored in a database. The output stream transmitted to the user units is modified by the addition of a synchronization stream including at least identifiers of the content sequences and associated temporal information determined on the basis of the reference fingerprints. The content information is exploited by the broadcasting platform or the users units for replacing a sequence by anther one, removing predefined sequences, skipping or forcing viewing content sequences, The initial linear content stream is thus enriched with accurate content information allowing the viewer to navigate and select the content to play either in live or replay mode. A back in time feature may also be introduced allowing navigating back and forward inside a content currently played. | 04-24-2014 |
20140101056 | PORTABLE NEAR-FIELD COMMUNICATION DEVICE - An embodiment of the present invention may be deployed in a mobile payment device configured to communicate with a payment terminal via an RF near-field communication channel. The payment device comprises a sensor to detect and log usage parameters corresponding to behaviors of the user of the payment device. Sensors may take the form of any from movement sensors, light sensors or orientation sensors for example. In order to prevent inadvertent execution of a payment instruction from the terminal, the log of parameters created due to the user's behaviors is compared with a predetermined set of parameters compatible with a user's expected behaviors should he be intentionally performing payment behaviors and payment is only authorized if a match is achieved. | 04-10-2014 |
20140068257 | METHOD FOR HANDLING PRIVACY DATA - The present invention aims to improve data protection against illegal access by a strong differentiation of the security level specific on a type of data so that when the protection on a part of the data is violated, the remaining data are still inaccessible. A method for controlling access, via an open communication network, to user private data, comprising steps of: dividing the user private data into a plurality of categories, each category defining a privacy level of the data, encrypting the user private data of each category with a category key pertaining to the category of the data, attributing to a stakeholder an entity configured for accessing to at least one category of user private data, and authorizing the access to the at least one category of user private data for the entity of the stakeholder, by providing the stakeholder with the category keys required for decrypting the user private data of the corresponding category. | 03-06-2014 |
20140040623 | ETHERNET DECODER DEVICE AND METHOD TO ACCESS PROTECTED CONTENT - The present invention aims to address the issue of deploying costly hardware by proposing a content protection layer with an easy distribution capability to clients. The aim is achieved by an network device for descrambling an access controlled audio/video content stream, said network device being configured to be connected to a network router comprises a memory to store a unique address UA specific to the network device, an network input/output interface, a descrambler to descramble the audio/video content stream, and a watermark engine configured to watermark the descrambled audio/video content stream by applying the unique address. A further object of the invention is a method to access scrambled audio/video content stream in a local or roaming mode by a multimedia reception device connected via an IP network to a network router having an IP port connected to the network device. | 02-06-2014 |
20140032918 | METHOD FOR BUIDLING AND TRANSMITTING A WATERMARKED CONTENT, AND METHOD FOR DETECTING A WATERMARK OF SAID CONTENT - The present invention concerns a method for building a watermarked content for sending to at least one user unit having a user unit identifier, the watermarked content comprising a first series of packets, at least some from the first series of packets being available in at least two different qualities, wherein said method comprises the steps of:
| 01-30-2014 |
20140020026 | SYSTEM AND METHOD FOR MANAGING A CONTENT CATALOGUE - The present invention related to the domain of audio/video content distribution, where a catalogue of available content is made available to end users. An aim of the invention is to ensure that the catalogue has a high quality in that a search within the catalogue will have a high probability of yielding a result. The invention provides a method and a system for creating useful links between elements in the catalogue whenever it is deemed that such links be useful. The links between the elements are created either by adding new content to the catalogue or new metadata which can be associated with the new content and existing content in the catalogue. | 01-16-2014 |
20130329971 | METHOD AND DEVICE TO SPEED UP FACE RECOGNITION - Method to customize an application associated with a television experience based on the recognition of users located in front of a display and in the field of view of a camera, comprising the following steps:—an initialization step during which each user is enrolled in a database of a computer system and is defined by a profile referenced by a profile ID and comprising the user name, biometric data and additional personal data,—a finding step during which a wide image, acquired by said camera is scanned to isolate at least one user's faces, to define a marking area surrounding it, to memorize the position of said marking areas,—a matching step to extract the biometric data from said marking area, to match them with the biometric data of the profiles stored in the database, and to assign the detected profile ID with the marking area. While subsequent identification is requested by the application, the following steps are executed—acquiring a wide image with the camera,—extracting the areas of said image according to the marking areas,—extracting for a particular marking area the biometric data of a face,—starting the comparison of the extracted biometric data with the biometric data of the profile ID related to this marking area, and in absence of match, continuing with the other biometric data of the database until one profile is found,—transmitting the found profile ID to the application. | 12-12-2013 |
20130326553 | METHOD TO OPTIMIZE RECEPTION OF ENTITLEMENT MANAGEMENT MESSAGES IN A PAY-TV SYSTEM - A method to optimize reception of entitlement management messages in a subscriber unit that is part of a Pay-TV system. The subscriber units are set up to a default reception channel for receiving default entitlement management messages such as the ones addressed to all or a group of subscriber units controlled by the management system. When one or a plurality of operating parameters of a specific subscriber unit needs to be modified, the security module sends an information signal to the subscriber unit which switches to a specific reception channel. In this case only specific entitlement management messages, also called positive addressing entitlement management messages, are received for performing the operating parameters modification of the concerned subscriber units. Once the modification is executed, the subscriber unit switches back to the default reception channel to be ready for receiving default entitlement management messages again. | 12-05-2013 |
20130322853 | METHOD TO MARK AND EXPLOIT AT LEAST ONE SEQUECE RECORD OF A VIDEO PRESENTATION - The present invention proposes a method to mark and exploit at least one sequence record of a video presentation played on a multimedia unit, said method comprising the steps of:—during the video presentation, receiving a command from a user to mark a currently displayed video sequence, said command initiating the step of:—creating a sequence record comprising a time index or frame index, allowing to locate the proper part of the video presentation, and a reference of the video presentation, At a later stage, requesting the edition of the sequence record by:—adding textual information which corresponds to the actual sequence,—storing the sequence record. | 12-05-2013 |
20130314249 | UTILITY METER FOR METERING A UTILITY CONSUMPTION AND OPTIMIZING UPSTREAM COMMUNICATIONS AND METHOD FOR MANAGING THESE COMMUNICATIONS - A utility meter and method for metering consumption of at least one utility including: a metering unit, a communication unit for sending/receiving messages to/from a management center, a memory to store a unique identifier pertaining to the utility meter and a first key, an encryption unit for encrypting the utility consumption as a first cryptogram, a message generator for generating a utility message containing the first cryptogram, a key generator for generating a payload key to be used by the encryption unit for encrypting the utility consumption, a second cryptogram generated by the encryption unit by encrypting the payload key with the first key, the second cryptogram being intended to be included, by the message generator, at least once into the utility message to be sent to the remote management center. | 11-28-2013 |
20130312119 | METHOD TO DETECT CLONED SOFTWARE - Method to detect a cloned software to be used on a client user unit communicating with a server for requesting a service by sending a request from the user unit to the server, the latter being connected to a database comprising client records, each of these records comprising at least a tag value (t | 11-21-2013 |
20130308780 | APPARATUS FOR MANAGING MEMBERS OF AT LEAST ONE GROUP OF DECODERS HAVING ACCESS TO BROADCAST DATA - A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key. | 11-21-2013 |
20130293390 | SYSTEM AND METHOD TO ENFORCE UTILITY METER SECURITY - The present invention relates to a system, and method for enforcing utility usage and metering functions by a utility meter associated with a utility consumer end user, connected to a remote utility management center by a communication network. The present invention proposes a utility meter for controlling and metering a least one utility consumption. | 11-07-2013 |
20130282587 | SYSTEM AND METHOD TO RECORD ENCRYPTED CONTENT WITH ACCESS CONDITIONS - A secure detachable utility monitoring device is disclosed, to be appended to a utility metering apparatus for controlling at least one utility usage consumption. A detachable metering monitoring device of at least one embodiment includes: a usage reading interface to acquire a utility consumption value metered by the utility meter; a first memory to store at least a unique identifier ID and a personal key, both pertaining to the device; a crypto processor to generate a cryptogram from information data comprising at least the utility consumption value, the cryptogram being encrypted with the personal key; a message generator to generate an information message including at least the cryptogram and the unique identifier ID; and a communication network interface including a sending unit to send the information message to a remote management center. | 10-24-2013 |
20130279694 | SYSTEM AND METHOD TO RECORD ENCRYPTED CONTENT WITH ACCESS CONDITIONS - A television event may be consumed after been stored in a mass memory of a multimedia unit, but still fully relies on the security of a secure device. A conversion of a received content aims at firstly descrambling the content using control words included in entitlement control messages and immediately re-encrypting the descrambled content by a unique key generated specifically for this content. Access conditions attached to the entitlement control message containing the control word are temporarily stored and once the decryption is terminated, the secure device produces an information block. This information block containing for example access conditions and an identifier of the content is either stored into a secure memory of the secure device or stored in the mass memory with the encrypted content. The unique key is made up of a combination of a root key specific to the secure device and the information block. | 10-24-2013 |
20130279692 | PROTECTING MODULAR EXPONENTIATION IN CRYPTOGRAPHIC OPERATIONS - The present invention proposes a method for executing a blinded modular exponentiation, based on a window method with a window size of k bits so using 2 | 10-24-2013 |
20130254843 | METHOD FOR CONTROLLING ACCESS TO VISUAL MEDIA IN A SOCIAL NETWORK - A method for controlling access to a visual medium in a social network comprising user units connected to a social network site server associated to a database and a to a distorted visual medium server storing visual media posted by users of the social network. A visual medium is selected by a posting user on a user unit and made available to at least one entitled user of said social network. The posting user defines a list of entitled users to be entitled to access the visual medium, said list of entitled users comprising at least one identifier identifying at least one entitled user, said identifier being associated to a parameter defining an access level to the selected visual medium. The selected visual medium is uploaded to the distorted visual medium server in association with the list of entitled users. The distorted visual medium server stores the visual medium in a memory and applies a distortion effect so as to obtain at least one distorted visual medium degraded according to a predefined degradation level. An entitled user iden tified on the list receives, from the distorted visual medium server, the visual medium distorted according to a degradation level corresponding to the parameter defining the access level associated to the identifier of the entitled user. The distortion effect applied on the original visual medium preferably consists of a scrambling operation performed on the original visual medium to obtain a scrambled visual medium. The access level defines the rights of a user for descrambling the scrambled visual medium into a reconstructed visual medium. Depending on the user access level, the reconstructed visual medium can be a partially descrambled visual medium or a fully descrambled visual medium according to the user access level. | 09-26-2013 |
20130124874 | SECURE SYSTEM-ON-CHIP - A secure system-on-chip for processing data, the system-on-chip comprising at least a central processing unit (CPU), an input and an output channel, an encryption/decryption engine and a memory, wherein, said input channel comprises an input encryption module to encrypt all incoming data, said output channel comprising an output decryption module to decrypt all outgoing data, said CPU receiving the encrypted data from the input encryption module and storing them in the memory, and while processing the stored data, said CPU reading the stored data from the memory, requesting decryption of same in the encryption/decryption engine, processing the data and requesting encryption of the result by the encryption/decryption engine and storing the encrypted result, outputting the result to the output decryption module for decryption purpose and exiting the decrypted result via the output channel. | 05-16-2013 |
20120281833 | METHOD TO MANAGE REVOCATIONS IN A GROUP OF TERMINALS - The present invention concerns the field of broadcast encryption method, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of one member of the group in an efficient way. The proposed solution is a private encryption key ciphertext constant collusion-resistant broadcast encryption. The main idea behind the invention is to mix the notion of efficient tree-based key derivation (also called subset management) with individual and personalized key blinding thus achieving a full collusion-resistant broadcast encryption system. The key de-blinding is performed at the last moment thanks to a cryptographic technique called pairings (also known as bilinear maps) resulting in a global key commonly shared by all authorized (non-revoked) devices. It should be noted that only non-revoked devices can compute the final key (this is achieved through subset management and related subset key derivation technique) and perform the de-blinding (which is performed with one pairing). | 11-08-2012 |
20120257749 | METHOD AND PROCESSING UNIT FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message includes a first part including first access conditions and a second part structured as a control message including at least second access conditions and a control word. A first conditional access device is configured for decrypting the control message with a common key specific to units having a first conditional access device and verifying the authenticity of said message. When the verification succeeds, the second part and a second right is transmitted to a second conditional access device, which decrypts the second part with a common key specific to units having a second conditional access device and verifies the authenticity of said second part and the second access conditions in relation to the second right encrypted by a personal key embedded therein. | 10-11-2012 |
20120250856 | Method And System For Encryption With Bidirectional Difference Propagation - An encryption method is disclosed, including two passes over a sequence of N input digital data X | 10-04-2012 |
20120224692 | METHOD FOR PUBLIC-KEY ATTRIBUTE-BASED ENCRYPTION WITH RESPECT TO A CONJUNCTIVE LOGICAL EXPRESSION - The aim of the present invention is to propose a method for providing attribute-based encryption for conjunctive normal form (CNF) expressions, the said CNF expression comprising at least one clause over a set of attributes, the said method using a key generation engine, an encryption engine and a decryption engine. | 09-06-2012 |
20120195383 | MEDIA DECODER AND A DECODING METHOD ALLOWING FOR THE MEDIA DECODER TO BE TRACED - The present invention aims to overcome drawbacks of conventional content tracing methods requiring re-processing the content before its broadcast with a significant side channel transmission i.e. extra processing, storage and/or bandwidth at the distribution side, or alternately a complex signal processing implementation at the receiver side that has to be protected against hackers attacks. An efficient system and method consists of tracing and uniquely identifying decoders of a video stream wherein the decoders implement at least one variant of a standard image decompression algorithm and wherein the resulting decompressed image approximation varies according to the decoders' identifier. | 08-02-2012 |
20120185893 | TELEVISION DECODING UNIT WITH MULTIPLE WIRELESS ACCESS MODULES - The present invention proposes a system comprising a television decoding unit and a plurality of access modules, said access modules comprising wireless communication means with the television decoding unit, a memory comprising an identification of said module, said television decoding unit comprising means for detecting the presence and to receive the identification of an access module, means to apply a filter on events displayed on the television unit, said filter being defined with pre-defined filter category attached to the identification, and means to record the events consumption while the access module is detected by the television unit. | 07-19-2012 |
20120167124 | System to identify a user of television services by using biometrics - A system to identify a user in relation with television services comprising eyeglasses worn by said user, said eyeglasses having a pair of flexible temples taking on the shape of a portion of the circumference of the user's head, a television receiver device comprising a server module communicating wirelessly with sensors arranged on the eyeglasses. The system is characterized in that each of the flexible temples of the eyeglasses incorporates at least one sensor configured for measuring a value of deflection caused by the temple bending around a portion of the circumference of the user's head, said value being unique for each user is transmitted as biometric to the server module configured for determining the identity of the user according to the measured value of the portion of the user's head circumference. | 06-28-2012 |
20120144479 | METHOD FOR AUTHENTICATING A TERMINAL - The invention provides a system, a secure device and a method for authenticating dynamically a host device with a secure device without modifying hardware or basic functional software of the host device. An authentication engine implemented in the secure device allows detecting non-authorized host devices or illegal secure devices environment. The secure device is locally connected to the host device comprising at least one processor configured for handling a plurality of hardware or software parameters defining the functioning behavior of the host device. A memory associated to the processor stores a plurality of reference hardware and software parameters. The secure device monitors the behavior of the host device both in terms of hardware and software. After comparison with the reference parameters, the host device is considered as authentic or authorized only when the values of counters associated to the hardware and software parameters are within an acceptable. | 06-07-2012 |
20120134530 | METHOD TO TRACE VIDEO CONTENT PROCESSED BY A DECODER - A method traces the origin of a (illegally) distributed video material. It fingerprints a data object A having a nominal stream format F to provide a fingerprinted data object B including a pre-fingerprinting forensic luring process. | 05-31-2012 |
20120127672 | INTERFACE BETWEEN A SECURITY MODULE AND A HOST DEVICE - The present invention may be deployed in a system comprising a security module housed on a chip card and a host device comprising a chip card reader. The host device is comprised in a housing with a slot for the chip card. The housing is shielded to reduce the amount of electromagnetic radiation generated by the security module and/or the host device from penetrating to the exterior of the housing. Similarly, the shielding is adapted to reduce the effects of electromagnetic radiation generated outside of the host device on the components within the housing. The slot is also shielded by a flap made of an electrically conductive epoxy material or an electrically conductive resin. | 05-24-2012 |
20120126009 | METHOD AND APPARATUS FOR COMMUNICATING BETWEEN A SECURITY MODULE AND A HOST DEVICE - The present invention may be deployed in an interface between a security module (CH) housed on a chip card (CC) and a host device (HST) comprising a chip card reader (RDR). In the case where the security module (CH) operates at frequencies which are high enough to generate unwanted electromagnetic interference, the invention allows for a substantial reduction in such interference by providing a converter module (CVT) which allows the host device to operate at lower frequencies while a limited number of short, shielded connections are used to interface with the security module (CH). | 05-24-2012 |
20120106741 | METHOD FOR CREATING AN ENHANDED DATA STREAM - The present invention provides a method for secure communication of digital information between a transmission entity and at least one reception entity. The method may be applied in the domain of audio/video data transmission, where stuffing data packets comprising random payloads are inserted into a transport stream along with true data packets comprising the audio/video data. The dummy data packets are detectable by an authorized reception entity but not detectable by unauthorized reception entities. A large number of stuffing data packets are included in the transmission to occupy bandwidth and to further render the job difficult for an unauthorized reception entity which tries to intercept the transmission. | 05-03-2012 |
20120036538 | Method for sharing data and synchronizing broadcast data with additional information - A method for sharing data and synchronizing broadcast data with additional information, the broadcast data and the additional information being provided by at least two distinct sources to a multimedia device. The method comprises steps of:
| 02-09-2012 |
20120023055 | System and method for multi-source semantic content exploration on a TV receiver set - The present invention refers to the field of metadata enhancement system for broadcast televisions program, in particular to provide to the customer more information about a current, past or future broadcast. It concerns a method to enhance transmitted contents, said method starting from the metadata to populate a knowledge database. This method is based on a iterative process to fetch information from open Internet using as search criteria the result of the previous search. The data in the knowledge database are organized in data triple. According to one embodiment, the iterative process is stops when the returned data are related to another content. | 01-26-2012 |
20120017235 | System and method to prevent manipulation of transmitted video data - The aim of the invention is to provide a solution to ensure that the content sent by the IRD is the content effectively displayed on the screen. | 01-19-2012 |
20120017233 | System and method to prevent manipulation of transmitted video data - The aim of the invention is to provide a solution to ensure that the content sent by the IRD is the content effectively displayed on the screen. | 01-19-2012 |
20120008779 | METHOD FOR SECURE TRANSFER OF MESSAGES - The present invention may be deployed in a system for broadcast of conditional access content where it is desirable to detect and take action against receiver equipment which has been used in a control word sharing activity. By requiring that receiver equipment used in the system send a message to a broadcaster of conditional access content at a precise time, the invention provides a method for the server to detect receiver equipment involved in control word sharing activity and to inhibit that receiver's ability to further access the content. | 01-12-2012 |
20120008774 | Method and device to enhance video content - A multifunction device for television set and a method to enhance video content provided to a display device of said television set. The multifunction device comprises an input for receiving audio/video data from an audio/video content data source, an output for outputting audio/video data to the display device, and communication means for accessing Internet or a local area network for collecting additional data. The multifunction device being connected and powered by a common interface of the display device further comprises image processing means configured for receiving first image data from the input, a converter configured for receiving additional data from Internet or a local area network and for converting said additional data into additional image data, an image merging module configured for combining said additional image data with all or part of the input first image data to obtain second image data to be forwarded to the output connected to the display device. | 01-12-2012 |
20110314491 | METHOD FOR ACCESSING GOODS OR SERVICES FOLLOWING AN ACTION PERFORMED BY A VIEWER OF BROADCAST PROGRAM CONTENT - A method is described for rewarding a viewer of a broadcast program in exchange for the viewer proving his presence at the time that certain program content is being broadcast. The method involves the use of running an application in a television environment, said application displaying a graphic inviting the viewer to intervene in some manner and to subsequently log the viewer's intervention, thereby documenting his viewing activity. The method further allows for the convenient and mobile reporting of the status of a log of the viewer's viewing activity. Finally, the method allows for the convenient and flexible redemption of accrued credit, as documented in the viewing log, against goods and/or services. | 12-22-2011 |
20110307725 | METHOD TO MANAGE THE POWER SETTING OF A RECEIVER/DECODER FOR PAY-TV - A method to manage the power setting of a receiver/decoder for pay-TV comprising a timer and means to receive management messages, the power setting comprising at least three states, the active state during which the reception and the decoder is active, the active/standby state during which the receiver is active for the reception of management messages and the standby state during which the receiver/decoder is in idle mode. | 12-15-2011 |
20110302427 | METHOD FOR ACTIVATING AT LEAST A FUNCTION ON A CHIPSET AND CHIPSET FOR THE IMPLEMENTATION OF THE METHOD - A method for activating a function of a chipset comprising at least a memory and a calculation module in charge of cryptographic operations, the memory containing at least a seed and the calculation module containing at least one cryptographic algorithm, the method comprising the steps of: receiving at least one of a segmentation key, a global key and a global cryptographic algorithm selector; transmitting at least two items selected from the group consisting of the seed, the received segmentation key, the global key and the global cryptographic algorithm selector, to the calculation module, each of the items being provided by different entities; generating in the calculation module, a temporary key by using one of said at least one cryptographic algorithm of the calculation module and at least the two items; and verifying an authenticity of a received activation message using the temporary key and controlling activation based on the verification. | 12-08-2011 |
20110293091 | Method and apparatus for decrypting encrypted content - The present invention provides a method for decrypting encrypted content transmitted from an operator to a plurality of users where said operator further provides security information allowing for the decryption of said content. The method has the advantage of satisfying the goal of providing the capability for detecting a fraudulent user who retransmits control words extracted from the security information to other users. The method provides for the achievement of the goal without incurring extra overhead in addition to the transmitted content and security information. The method makes use of control words which are based on multiple solutions provided by collisions in mathematical functions and involves the observation of choices of control words retransmitted by the fraudulent user. | 12-01-2011 |
20110249814 | DEVICE AND A METHOD FOR PERFORMING A CRYPTOGRAPHIC FUNCTION - The present invention provides a method and an apparatus for encrypting and decrypting digital information while imparting a high level of security on the encrypted digital information. A mixed-mode digital-analogue encryption and decryption technique is proposed, which minimises the probability of an unintended recipient of the thus encrypted information being able to decrypt the information using known reverse engineering techniques. | 10-13-2011 |
20110231709 | Method for checking data consistency in a system on chip - The invention aims to provide a method and a system on chip able to detect at once hardware and software errors to prevent manipulations for retrieving cryptographic keys, inserting or suppressing instructions to bypass security processes, modifying programs or memory content etc. The system on chip comprises a core including at least two processors, registers, and a data consistency check module. The core is connected to at least one set of memories containing zones for instructions of a first program and of a second program, said instructions being to be executed respectively by the first and second processor, which respectively produce and store result data into the registers and the memories. The data consistency check module is configured to verify conformity of the produced result data by comparing a test result obtained by carrying out a predetermined function F over one of the first or second result data with the corresponding second or first result data and to continue execution of instructions of each program when the comparison is successful, or stop execution when the comparison shows an error. | 09-22-2011 |
20110213790 | METHOD FOR NOTIFYING A USER ABOUT A BROADCAST EVENT - A method for notifying a user about a broadcast event comprises the steps of receiving at a management center at least one user keyword; receiving at the management center an identifier of at least one user unit, said at least one user unit being linked to the user; in the management center, determining a set of broadcast data linked to broadcast events; forming a query containing data identifying at least a subset of the set of broadcast data and at least one user keyword; sending said query to a plurality of data sources; receiving at the management center a response to the query, the response indentifying at least one event; transmitting a notification containing an identifier of the at least one present or future event in said response and the identifier of the user unit so that the user unit may notify the user of the events in the response. | 09-01-2011 |
20110188655 | METHOD TO MANAGE MEMBERS OF AT LEAST ONE GROUP OF DECODERS HAVING ACCESS TO BROADCAST DATA - A method to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at least a net group access key encrypted so that only non revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key. | 08-04-2011 |
20110164747 | METHOD TO ENFORCE BY A MANAGEMENT CENTER THE ACCESS RULES FOR A BROADCAST PRODUCT - A method to enforce by a management center access rules for a broadcast product accessed by an access key, the management center managing a plurality of Boolean positive and negative attributes, comprising the steps: associating one positive Boolean attribute to a receiver entitled to the attribute and loading the same; associating one negative Boolean attribute to a receiver not entitled to the attribute and loading the same; defining at least a second broadcast encryption scheme for the negative Boolean attributes and associating each negative Boolean attribute corresponding decryption key material; expressing access conditions on a product as a Boolean expression by combining at least one positive Boolean attribute and at least one negative Boolean attribute by at least one Boolean conjunction or disjunction; generating and broadcasting at least one cryptogram to a receiver, encrypting the access key with the two combined broadcast encryption schemes according to the Boolean expression. | 07-07-2011 |
20110154042 | METHOD AND PROCESSING UNIT FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message encapsulates a second part including another control message. The processing unit for carrying out the method comprises a first conditional access device connected to a second conditional access device provided with a descrambler and a secured processor or secured hardware logic. The control message and the second part are each encrypted and accompanied by respectively first and second authentication data. The first conditional access device decrypts and verifies integrity of the control message, verifies the first access conditions and transmits the second part to the second access control device. The second conditional access device decrypts and verifies integrity of the second part and further verifies the second access conditions, and releases and loads the control word into the descrambler. | 06-23-2011 |
20110131389 | METHOD FOR UPDATING DATA IN MEMORIES USING A MEMORY MANAGEMENT UNIT - A method for updating, in the background, data stored in physical memories without affecting the current operations performed by the microprocessor. When the update is completely terminated, the application switches from an old version to a new version. This switching occurs by a reconfiguration of the page table during which a first sub-tree structure of pointers accessing the old version of data stored in memories is replaced by a second sub-tree structure of pointers thus allowing access to the new version of data. This update method prevents incoherent transitory states of the system as the latter works with the previous data version until the installation of the new version becomes usable. In the case of an interruption to the update process, the application can always reinitialize the update since the old version of data can be reactivated by returning to the previous configuration of the page table. | 06-02-2011 |
20110099567 | METHOD FOR THE ALLOCATION AND MANAGEMENT OF SUBSCRIPTIONS FOR THE RECEPTION OF BROADCAST PRODUCTS - A method to reduce bandwidth necessary for renewal of subscriptions for reception of broadcast services including: defining a plurality of sets of subscriber identification numbers, each set being associated with a product; splitting a set of subscriber identification numbers into groups of subscribers; searching for an available subscriber identification number related to the desired product at the time of initialization of a new subscriber; confirming that an inhibit duration has elapsed between the end of the previous subscription and the start of the new subscription; sending an initialization message to the new subscriber addressed with his unique identification address and containing the subscriber identification number of, and rights to, his product; preparing a group rights renewal message for the product to the group containing the subscriber identification number, this message comprising the group header containing this subscriber and a compressed bitmap allowing to individually address each of the group members. | 04-28-2011 |
20110099364 | Method for accessing services by a user unit - The invention concerns a method for accessing services by a user unit, said services being a subset of all services broadcast by a management center and comprising at least two services, said subset of services defining a package, each service being simultaneously broadcast and containing audio/video data, the data of a service being encrypted by at least one control word, the method comprising the steps of:
| 04-28-2011 |
20110078722 | METHOD FOR DISPLAYING ENHANCED VIDEO CONTENT - The present invention provides a solution to the problem of displaying enhanced video content from a remote server in situations where a connection to the remote server provides inadequate bandwidth to be able to do so. One solution involves pre-storing the enhanced video content locally, receiving a broadcast of a default format version of the enhanced content and displaying the enhanced content instead of the default format content. The present invention also provides a means for ensuring that such pre-stored content is only viewed at a predefined time and by viewers who are authorised to do so. | 03-31-2011 |
20110075843 | UNIT AND METHOD FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - Unit for secure processing access controlled audio/video data capable of receiving control messages(ECM) comprising at least one first control word (CW | 03-31-2011 |
20100310068 | METHOD FOR MONITORING EXECUTION OF DATA PROCESSING PROGRAM INSTRUCTIONS IN A SECURITY MODULE - A method for monitoring execution of a sequence of data processing program instructions in a security module associated to a multimedia unit connected to a managing center supplying control messages authorizing access to broadcast data streams. The security module comprises a processor for executing the instructions, a memory, and a monitoring module for analyzing the instructions before execution by the processor. The managing center comprises a security module emulator generating reference data sets by executing a sequence of instructions induced by data of a given control message in the program. The reference data sets are appended to control messages sent to the security module. The monitoring module analyzes a sequence of program instructions for determining a check data set which is compared with a reference data set received from the control messages. When the reference and check data sets match, the program continues executing. Otherwise, further control message processing stops. | 12-09-2010 |
20100299528 | METHOD FOR PROVIDING ACCESS CONTROL TO MEDIA SERVICES - The present invention proposes a solution to prevent a program flow in a processing unit from being modified with respect to an intended program flow, thereby ensuring that important steps such as verifying or authenticating are not bypassed. The invention is particularly aimed at security modules within receiver/decoders in a pay-TV system and involves performing a set of predetermined operations during the processing of entitlement management messages and/or entitlement control messages, said operations being redundant with respect to the normal processing of said messages while leading to the calculation of keys which can then be used to verify that the intended program flow has been respected. | 11-25-2010 |
20100293098 | PROCESS FOR CARRYING OUT A TRANSACTION BETWEEN A PAYMENT MODULE AND A SECURITY MODULE - This invention relates to a process for carrying out a transaction between a payment module and a security module connected to a user's unit, this process being characterized in that it comprises the following steps: entering an identifier representative of the transaction to be carried out by means of an input device; generating by the user's unit, a control message containing at least a representative code of said transaction and an identifier of the security module requiring the transaction; sending said control message to said payment module (PP); verifying in said payment module whether it is entitled to carry out the desired transaction; if the payment module is entitled to carry out this transaction, execution of the transaction, storage of the result of the transaction in said payment module and generation by the payment module, of a receipt relating to the desired transaction and to the related security module; sending said receipt to a management centre; sending an unlocking code to the security module (SC) by the management centre; registering the transaction in said security module. | 11-18-2010 |
20100272267 | METHOD TO SECURE ACCESS TO AUDIO/VIDEO CONTENT IN A DECODING UNIT - The present invention concerns the generation of a key necessary to decrypt audio/video contents by genuine decoding units. It concerns in particular a method to secure the reception of a broadcast content managed by a control center and encrypted by at least one content key, said content key or a data allowing to recover said content key being transmitted to the decoding units encrypted by a transmission key common to the decoding units, each decoding unit having at least one environment parameter known by the control center, said decoding unit receiving from the control center a first message common to all decoding units and comprising the encrypted transmission key and a second message, pertaining to said decoding unit and comprising correction data dedicated to said decoding unit, the decryption of the transmission key being made using the environment parameter and the correction data. | 10-28-2010 |
20100268964 | METHOD FOR EVALUATING USER'S RIGHTS STORED IN A SECURITY MODULE - The aim of the present invention consists of reducing the switching time from one reception channel to another. In fact, this reduction will be particularly discernable since the number of different rights stored in a security module of a multimedia unit or decoder is high. When a user selects a service among those proposed by an electronic programs guide, an access control module explores a stored service information table in order to extract an access condition associated to the service. This access condition allows determining an index in a rights table stored in the access control module of a right that fulfils the access condition. The access control module transmits to the security module the index thus determined alone or accompanied by a control message. This index allows the security module to find quickly the right that it compares afterwards with the access condition included in the control message after decryption of the latter. | 10-21-2010 |
20100088229 | VALUE MANAGEMENT METHOD IN A PREPAID DEVICE - A method to secure a prepaid device for access to audio/video content having the possibility of reimbursement of the unused balance upon presentation of the aforementioned device to a control center by managing an account value in the prepaid device, the prepaid device including an identifier unique to each device and a control value, the method comprising: receiving of a request to modify the account value by an amount; calculating a new account value by modifying the account value by the amount, determining a number of steps, the number of steps being determined according to a function expressing the modification of the new account value relative to the account value; and modifying the control value by executing at least one one-way function on said control value a number of times equal to the number of steps. | 04-08-2010 |
20100077390 | METHOD FOR UPDATING AND MANAGING AN AUDIOVISUAL DATA PROCESSING APPLICATION INCLUDED IN A MULTIMEDIA UNIT BY MEANS OF A CONDITIONAL ACCESS MODULE - A method to force a multimedia unit to update an application for viewing broadcast conditional access content by linking said update to an update of the conditional access module firmware. The firmware update is initialized by means of version information transmitted in the content stream. In particular, this version information may be included in ECM or EMM messages or in services information tables in order to be processed by the conditional access module independently from the multimedia unit. The version information comprises of a minimum version and of an available maximum version. If the conditional access module detects that the current version of the firmware is inferior to the available maximum version, it transmits a message requesting an update of the application that initiates downloading a firmware updating from a management center. The update installation is carried out simultaneously in the conditional access module and in the multimedia unit. | 03-25-2010 |
20100061554 | METHOD FOR THE ALLOCATION AND MANAGEMENT OF SUBSCRIPTIONS FOR THE RECEPTION OF BROADCAST PRODUCTS - A method to reduce the bandwidth for the renewal of subscriptions includes: A) defining a maximum length for a message, B) defining a command for security modules, C) forming a message comprising the command, D) filling the message with a starting address and a range E) determining a remaining length in the message, F) defining a bitmap of variable length, G) starting at identification address equal to the starting address and initializing an index value and the bitmap length, H) updating the bitmap bit for the security module pertaining to the identification address to activate/deactivate the command, I) compressing the bitmap, J) when the compressed bitmap length is smaller than the remaining size in the message, updating the index value, the bitmap length and the identification address and re-executing the steps H to J, K) updating the range with the index value and filling the message with the bitmap. | 03-11-2010 |
20100011387 | METHOD FOR VALIDATING ACCESS TO A PRODUCT BY MEANS OF A SECURITY MODULE - A method for validating access to a product by a security module associated with a user unit unidirectionally connected to a managing center MC transmitting management messages being generated following the receipt of a request for an access right to the product, said method comprises the steps of purchasing a product, determining a code representing the product, displaying said code on a display device, transmitting to the MC, a request comprising said code and an security module identifier, transmitting a right confirmation message addressed to the user unit associated with said security module, wherein, at purchasing of the product, a temporary right is registered in the security module, said temporary right being replaced by a definitive right by the right confirmation message received from the MC, said definitive right authorizing the access to the purchased product by debiting the value amount associated with said product. | 01-14-2010 |
20090325576 | METHOD OF LOCAL CONDITIONAL ACCESS FOR MOBILE EQUIPMENT - A method for conditional access to a digital data stream encrypted with at least one control word and broadcasted to at least one mobile device, said transmitter also transmitting a control message stream containing control words and access conditions, said mobile device being connected to a mobile communication network via a mobile access point, comprises: receiving the control message stream by the mobile device; determining a location identifier for the said mobile device by either the identifier of the mobile access point or the identifier of the broadcasting network transmitter; verifying access conditions contained in the control message, said access conditions comprising a reception condition related to a mobile access point identifier and/or an identifier of one broadcasting network transmitter; comparing the determined identifier with the identifier(s) contained in the access conditions; and authorizing or blocking the access to said data stream depending on the result of the comparison. | 12-31-2009 |
20090319741 | SECURE MEMORY MANAGEMENT SYSTEM AND METHOD - The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing system, said data processing system comprising at least one storage device, one memory module and at least one processor, said data processing system further comprising a memory access controller module connected between the processor and the memory module, and a secure memory management module connected to the processor, the memory module, the storage device and the memory access controller. Requests by the processor for data are passed to the secure memory management module, which loads the data from the storage device to the memory module and configures the memory access controller such that the processor will have access to the data. | 12-24-2009 |
20090254996 | Security module for audio/video data processing unit - The aim of the present invention is to limit the impact of security breaches, which are the emulators of the security module. This aim is reached by a processing unit of audio/video digital conditional access data, encrypted by control words, responsible for processing security messages containing at least one cryptogram relative to a control word and one instruction relative to the control word, characterised in that it includes means to receive at least two micro programs by security messages, executable by the security module, said security module comprising means to store at least two micro programs and means to receive an instruction contained in the security message, for selecting the micro program indicated by the instruction, for executing the said micro program with at least the cryptogram as a parameter of execution, this execution allowing the calculation of the control word to be sent back to the audio/video processing unit. | 10-08-2009 |
20090185686 | METHOD TO TRACE TRACEABLE PARTS OF ORIGINAL PRIVATE KEYS IN A PUBLIC-KEY CRYPTOSYSTEM - The aim of the present invention is to propose a very fast alternative mechanism to the traitor tracing algorithm introduced by Boneh and Franklin to trace private keys in a public-key cryptosystem. This invention concerns a method to trace traceable parts of original private keys in a public-key cryptosystem consisting of one public key and l corresponding private keys, a private key being formed by a traceable array of 2 | 07-23-2009 |
20090185676 | METHOD TO GENERATE A PRIVATE KEY IN A BONEH-FRANKLIN SCHEME - The aim of the present invention is to propose an alternative scheme to the classical Boneh-Franklin scheme in order to simplify the generation and the use of the asymmetric keys. | 07-23-2009 |
20090138701 | METHOD FOR RECORDING AND RESTORING A CIPHERED CONTENT BY A PROCESSING UNIT - A method of operating by a second processing unit a content recorded by a first processing unit, said first and second processing units having a specific key being managed by a central server. The processing units have access to a removable storage memory intended to record a content ciphered by a content key accompanied by a file associated to the content. The content key is produced by means of a cascaded deciphering starting from the specific key of the first unit of at least two constants provided by the central server and a variable. The content is restored by the second processing unit by means of a cascaded deciphering starting from the specific key of the second unit by using the constants and the variable stored in the file accompanying the content and a transcoding key calculated by the central server. | 05-28-2009 |
20080250444 | Method For Processing Conditional Access Contents By A User Unit - A method allows a broadcasted conditional access content accessible at the time of transmission to be also accessible at a later time thanks to intermediate storage on a hard disk of a user unit. The processing method includes the steps of receiving at the user unit a data stream encrypted by at least one control word, at least one control message stream containing the control words, forming an index file, each index comprising an identifier of a control message formed by the extraction of data associated to the control messages and an identifier of the part of the content to which the control message is applied; and, at the time of the deferred processing of the content, extracting at least one part of the control messages and resynchronizing the content with the control messages by the use of the index file, the identifier of the control message allowing the selection of the current control message from a set of control messages at the time of the exploitation of the content identified by the identifier of the part of the content related to this control message. | 10-09-2008 |
20080219643 | METHOD TO CONTROL THE ACCESS TO CONDITIONAL ACCESS AUDIO/VIDEO CONTENT - The present invention aims at solving the financial revenue loss due to the presence of digital video recorders that allow skipping the commercial breaks. | 09-11-2008 |