Patent application number | Description | Published |
20090154700 | Generation of a pseudorandom data sequence - A method of generating a pseudorandom data sequence, wherein said pseudorandom data sequence is generated by a procedure for searching for a search pattern in an initial data sequence of N bits, said search procedure comprising the following steps: (a) detecting in said initial data sequence a particular search pattern of r bits that is one of a set of search patterns; (b) determining an output pattern of k bits by an operation that depends on the progress of the preceding step; and repeating the preceding steps (a) and (b) successively to form the pseudorandom data sequence from a succession of output patterns. | 06-18-2009 |
20090157779 | Method System and Device for Generation of a Pseudo-Random Data Sequence - A method and a generator for generating a pseudo-random data sequence ( | 06-18-2009 |
20100094760 | TRANSACTION METHOD BETWEEN TWO ENTITIES PROVIDING ANONYMITY REVOCATION FOR TREE-BASED SCHEMES WITHOUT TRUSTED PARTY - The invention proposes an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value n | 04-15-2010 |
20110243328 | DATA PROVIDING PROCESS BASED ON AN IBPE SCHEME - The present invention is a method to ensure a secure exchange of crypted numeric data between two entities, where their decryption depends to the approval of a third entity. The solution uses a combination of Identity Based Encryption scheme, and transcription trap use. | 10-06-2011 |
20110283107 | METHOD FOR ESTABLISHING A SECURED COMMUNICATION WITHOUT PRELIMINARY INFORMATION SHARE - The invention relates to a method for generating a session key between two communicating electronic devices not requiring any prerecorded information in one of the two devices and enabling the authentication of one of said devices. The method uses a close collaboration between a symmetrical algorithm and an asymmetrical algorithm. | 11-17-2011 |
20130212374 | METHOD FOR IDENTIFYING A DEVICE USED BY A HACKED TERMINAL, AND RELATED DEVICE - The invention relates to a method for preventing the fraudulent use of an electronic device and thus for effectively combating the fraudulent dissemination of protected content. | 08-15-2013 |
20130301828 | METHOD FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL - The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (sk | 11-14-2013 |
20130308776 | METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO A DIGITAL CONTENT, ASSOCIATED TERMINAL AND SUBSCRIBER DEVICE - A secure method for transmitting a control word between a server and a plurality of processing entities so as to respectively produce and utilize the control word. Preferably such a method is applied to the field of conditional access methods and systems for preventing the fraudulent use of compromised decryption keys resulting from a coalition of pirate hackers. | 11-21-2013 |
20130326211 | METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO A DIGITAL CONTENT, ASSOCIATED TERMINAL AND SUBSCRIBER DEVICE - The invention relates to a method and a system for conditional access making it possible to prevent the fraudulent use of a subscriber electronic device ( | 12-05-2013 |
20140050316 | METHOD AND APPARATUS FOR NONLINEAR IV SETUP IN KEYSTREAM GENERATORS - The invention concerns the contact-less technology MIFARE, and describes a method to update a state by injecting an IV using a non-linear feedback shift register that makes use of only look-up tables and basic operations on 8-bit words. | 02-20-2014 |
20140223526 | SYSTEM AND METHOD FOR PROVIDING PRIVACY IN SMART METER DEPLOYMENT - Privacy-preserving smart metering for a smart grid. Issuing a privacy-enhanced credential to a consumer node having smart meter. Operating the consumer node to associate an id with the credential and to use the id to report usage. Other systems and methods are disclosed. | 08-07-2014 |