Patent application number | Description | Published |
20080263198 | Device and method using non-cycle accurate measurements for discovering emulated clients - A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier. | 10-23-2008 |
20090240938 | Device, System and Method for Service Delivery with Anti-Emulation Mechanism - A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an identifier of the service. The system server verifies that the client is authorised to access to the service and that the client is non-emulated. If this is verified, the service is provided to the client. In a preferred embodiment, the service is scrambled content and the system server provides a descrambling key to the client, and instructs a content server to provide the scrambled content to the client. Also claimed are a device, a system, and a system server. | 09-24-2009 |
20100146297 | Method and system digital for processing digital content according to a workflow - A method of processing digital content according to a workflow. The digital content is received and information for the workflow is checked to decide if a processing device is authorised to process the content, the workflow imposing that the digital content be processed in a process chain comprising at least two nodes, wherein the processing device is authorised to process the content if it corresponds to the node that according to the process chain is the next node to process the digital content. If the processing device is authorised to process the content, the digital content is processed and the information for the workflow is updated. Also provided is a system. | 06-10-2010 |
20100146298 | Method and system for processing digital content according to a workflow - A method of processing digital content following a workflow. A processing device receives the digital content and a license for the digital content, the license comprising workflow information about a process chain, which comprises a present node and a following node; decrypts the license; verifies if it may process the content by verifying if it corresponds to the present node. If the processing device may process the digital content, it processes the digital content to obtain processed content and generates a new license comprising updated workflow information, wherein the following node is set as a new present node. Also provided is a processing device. | 06-10-2010 |
20100192231 | MEDIA PACKAGE, SYSTEM COMPRISING A MEDIA PACKAGE AND METHOD OF EXECUTING PROGRAM CODE - A media package storing program code, the media package comprising a medium storing a first part of the program code intended to be executed on a processor external to the media package, and a processing device storing a state and a second part of the program code, the first and the second parts of the program code being adapted to interact when executed so as to execute the program code. The processing device comprises a processor for verifying the state and for executing the second part of the program code if the verification of the state indicates that this is authorised; and a first interface for communication with the processor external to the media package. The processing device further comprises a second interface adapted to interact with a state change device in order to set the state from a first state not authorising execution of second part of the program code to a second state authorising execution of second part of the program code. The second interface is a Radio Frequency interface adapted to, when the media package is in the first state, interact with at least one anti-theft portal. Also provided is a system. | 07-29-2010 |
20100274948 | COPY-PROTECTED SOFTWARE CARTRIDGE - A cartridge preferably for use with a game console. The cartridge comprises a ROM, a non-volatile memory, a processor and a dispatcher. An application running on the console may communicate with the dispatcher using predefined addresses, which enables the dispatcher to access the ROM, the non-volatile memory, or the processor, as the case may be. The invention improves on the prior art copy protection as no generic copy method may be found if the addresses are changed from one cartridge to another. In addition, to copy the software, the processor must be emulated. | 10-28-2010 |
20120042379 | SYSTEM AND METHOD FOR DETECTING GENUINE COPIES OF PRE-RECORDED DIGITAL MEDIA - To authenticate a digital medium for a given title, an authentication server selects a number of challenges corresponding to the title from an authentication database, clears an error counter and sends the challenges sequentially to an authentication application in a media reader in which the digital medium is inserted. Upon reception of a response, it is verified if the answer is correct. If this is the case, then the next challenge is sent; otherwise, it is first verified if a correct answer was mandatory and if so, it is deduced that the digital medium is not genuine. If an incorrect may be accepted, then the error counter is incremented and the next challenge is sent. When there are no more challenges to send, it is verified if the error counter is above an acceptable limit. If so, the digital medium is deemed as not genuine. The invention may be used to allow an owner of a digital medium to access further information or content. | 02-16-2012 |
20120079280 | Method, system and secure processor for executing a software application - A host reads host software code and secure processor software code of an software application and passes the secure processor software code to the secure processor that requests an activation sequence for the software application from a remote server. The secure processor receives the activation sequence for the software application and applies it to the secure processor software code to make it executable. The host executes the host software code and calls a procedure of the executable secure processor software code in the secure processor, which executes the procedure of the executable secure processor software code to obtain a response to the call that is then returned. The activation sequence is advantageously software code. The invention can enable protection of a plurality of software titles using a single secure processor that is dynamically adapted for each title. | 03-29-2012 |
20120210439 | METHOD AND DEVICE FOR EXCERPT LICENSING - There are times when a first user may wish to distribute an excerpt of a protected digital content to a second user, for example for criticism. The protected digital content is divided into a plurality of parts, each part being encrypted using a control word specific for the part, wherein each control word can be generated from a master control word for the protected digital content. A device belonging to the first user selects the parts of the excerpt; generates the control words for the selected parts from the master control word; generates a license for the selected parts, the license comprising the control words for the selected parts; and transmits the selected parts and the license to the receiver of the second user. Also provided is the device of the first user. | 08-16-2012 |
20130091583 | METHOD AND DEVICE FOR SECURED ENTRY OF PERSONAL DATA - A method for secured entry of personal data is disclosed. This method comprises for each item of personal data a first step of presentation of a virtual keyboard comprising keys and a first cursor, followed by a step of selection of a key corresponding to the item of personal data wherein the virtual keyboard also comprises at least one dummy cursor and wherein the position on the virtual keyboard of the at least one dummy cursor depends on the position of the first cursor. A device for secured entry of personal data configured to implement the method is further disclosed. | 04-11-2013 |
Patent application number | Description | Published |
20100131164 | SYSTEMS AND METHODS FOR CONTROL OF TRANSMISSION AND/OR PRIME MOVER - Disclosed here are inventive systems and methods for a powertrain of an electric vehicle (EV). In some embodiments, said powertrain includes a continuously variable transmission (CVT) coupled to an electric drive motor, wherein a control system is configured to control the CVT and/or the drive motor to optimize various efficiencies associated with the EV and/or its subsystems. In one specific embodiment, the control system is configured to operate the EV in an economy mode. Operating in said mode, the control system simultaneously manages the CVT and the drive motor to optimize the range of the EV. The control system can be configured to manage the current provided to the drive motor, as well as adjust a transmission speed ratio of the CVT. Other modes of operation are also disclosed. The control system can be configured to manage the power to the drive motor and adjust the transmission speed ratio of the CVT taking into account battery voltage, throttle position, and transmission speed ratio, for example. | 05-27-2010 |
20110184614 | METHODS FOR CONTROL OF TRANSMISSION AND PRIME MOVER - Embodiments relate to methods of controlling a prime mover and a continuously variable transmission (CVT). The CVT has a group of spherical power adjusters. Each power adjuster has a tiltable axis of rotation. Embodiments also relate to methods of optimizing a vehicle having a drive motor and a continuously variable transmission. | 07-28-2011 |
20140257650 | SYSTEMS AND METHODS FOR CONTROL OF TRANSMISSION AND/OR PRIME MOVER - Disclosed here are inventive systems and methods for a powertrain of an electric vehicle (EV). In some embodiments, said powertrain includes a continuously variable transmission (CVT) coupled to an electric drive motor, wherein a control system is configured to control the CVT and/or the drive motor to optimize various efficiencies associated with the EV and/or its subsystems. In one specific embodiment, the control system is configured to operate the EV in an economy mode. Operating in said mode, the control system simultaneously manages the CVT and the drive motor to optimize the range of the EV. The control system can be configured to manage the current provided to the drive motor, as well as adjust a transmission speed ratio of the CVT. Other modes of operation are also disclosed. The control system can be configured to manage the power to the drive motor and adjust the transmission speed ratio of the CVT taking into account battery voltage, throttle position, and transmission speed ratio, for example. | 09-11-2014 |
20140365059 | SYSTEMS AND METHODS FOR CONTROL OF TRANSMISSION AND/OR PRIME MOVER - Embodiments relate to methods of controlling a prime mover and a continuously variable transmission (CVT). The CVT has a group of spherical power adjusters. Each power adjuster has a tiltable axis of rotation. Embodiments also relate to methods of optimizing a vehicle having a drive motor and a continuously variable transmission. The CVT has a plurality of spherical power adjusters, each power adjuster having a tiltable axis of rotation. Other embodiments also include methods of optimizing a drive system having a prime mover and a continuously variable transmission. | 12-11-2014 |
Patent application number | Description | Published |
20130305380 | METHODS AND DEVICES FOR 3D OBJECT PROTECTION USING SURFACE SUBDIVISION - A method of protecting a graphical object represented by a list of vertices and a list of surfaces, each surface being defined by a number N vertices. A device selects a surface S with N vertices; computes a new vertex d using a random or pseudo-random function; inserts the new vertex d into the list of vertices; creates N new surfaces S | 11-14-2013 |
20140359655 | IN-FLIGHT ENTERTAINMENT SYSTEM - A content delivery system comprising a content database storing a content item and a content license; a video server configured to retrieve the content item and the content license from the content database and to send them to a player device; a registration server configured to receive credentials from a user player device, to generate user information from the credentials, to forward the user information to an application server; an application server configured to generate a personalised player application for the user player device; and a license server configured to receive a content license and a user identity from the user player device, to check with the registration server that a user corresponding to the user identity is authorized to access the content item, to decrypt the content license using a system license key and re-encrypt the decrypted content license using a user license key to obtain a user license, and to send the user license to the user player device. Also provided is a content rendering method. | 12-04-2014 |
20150043891 | SECOND SCREEN DEVICE AND SYSTEM - A second screen system comprises a first screen that renders a first content comprising watermarks of a first type and watermarks of a second type. The watermarks of the first type are captured by a second screen that reacts to these watermarks. The second screen displays information to a user and receives user input. The second screen also watermarks a second content with watermarks of the second type and renders the second content. A third device captures watermarks of the second type in both the first content and the second content. Since the watermarks embedded by the second screen can depend on the user's actions, the third device can indirectly react to the user's actions. | 02-12-2015 |