Patent application number | Description | Published |
20090009357 | Method and system for preventing accidents - A method and a system for preventing an undesired incident between moving objects within a defined area which comprise establishing an overview of the objects by using a combination of data received from positioning means installed in the objects and sound data from the objects to be monitored. From data received, future expected position is computed, and warning is initiated if necessary. | 01-08-2009 |
20090137222 | LOCATION-BASED ALERT SYSTEM - Method and system for sending alert messages to users of mobile phones staying at a specific geographical location without overloading the network, and doing so independently of any user preferences. | 05-28-2009 |
20120064819 | ALERT SYSTEM WITH CONTROLLED LOAD OF NETWORK - A method for preventing overload and blocking of a mobile network when sending of alert messages to a plurality of mobile phone users located in a specific geographical area, independently of any user preferences on mobile phones, wherein the method is performed in an optimizing message distribution component (A-SMSC) connected to the mobile network, has an alert initiating message receiving step of receiving an alert initiation message having information about content of the message and where the message is to be sent, represented as relevant cells, performed as a request from an LBAS Server to A-SMSC, and information about the relevant cells is determined by a LBAS GT by converting information of a specific geographical area to corresponding cell ids. | 03-15-2012 |
20140242938 | METHOD, APPARATUS AND SYSTEM FOR PERFORMING PRIORITIZED BARRING OF SERVICE ACCESS - A method for continuous and optimal utilization of a capacity of a mobile network that is serving mobile phones covering a specific selected geographical area in order to facilitate optimal handling of network traffic without overloading said mobile network. The method includes establishing an overview of maximum network capacity of said mobile network, establishing an overview of an identity of selected mobile phones located within said selected geographical and performing monitoring of current traffic load of one or more mobile services on said mobile network; selecting a type of barring of one or more mobile services to be performed or removed for network traffic to and/or from selected mobile phones based on said maximum network capacity, said possible maximum traffic load, and said current traffic load. | 08-28-2014 |
Patent application number | Description | Published |
20080263198 | Device and method using non-cycle accurate measurements for discovering emulated clients - A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier. | 10-23-2008 |
20090070584 | Method for Providing, Distributing and Engraving Digital Data and Associated Distribution Server - The invention relates to a method for engraving digital data received from a remote server. The inventive method consists in acquiring an identifier of a secured disc used for receiving digital data, in transmitting the identifier and a digital data loading instruction to the remote server, in receiving digital date scrambled by at least one second encryption key and second encryption keys by a first encryption key and in engraving scrambled digital data and the second encryption keys on the secured disc. A providing and distributing methods and a distribution server are also disclosed. | 03-12-2009 |
20090240938 | Device, System and Method for Service Delivery with Anti-Emulation Mechanism - A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an identifier of the service. The system server verifies that the client is authorised to access to the service and that the client is non-emulated. If this is verified, the service is provided to the client. In a preferred embodiment, the service is scrambled content and the system server provides a descrambling key to the client, and instructs a content server to provide the scrambled content to the client. Also claimed are a device, a system, and a system server. | 09-24-2009 |
20100070756 | DEVICE AND METHOD FOR DIGITAL PROCESSING MANAGEMENT OF CONTENT SO AS TO ENABLE AN IMPOSED WORK FLOW - A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing. | 03-18-2010 |
20110078239 | Detecting client software versions - A method for detecting a version of a client software in a network. A server receives a first request from the client software, sends a first response comprising a first challenge to the client software, receives a second request comprising an answer to the first challenge from the client software, and detects the version of the client software from at least the second request. The answer to the challenge is dependent on the version of the client software and is expressed as a modification to a communication protocol used for the first and the second request. Also provided are a server, a client and a computer program product. | 03-31-2011 |
20110093561 | SYSTEM, SHARING NODE,SERVER, AND METHOD FOR CONTENT DISTRIBUTION - A system for distribution of a content item in a network, particularly a peer-to-peer network. A requesting node sends a request for the content item. An access requirement value for the content item is compared to a counter value for the requesting node to determine if the requesting node may download the content item from a sharing node. The counter value is advantageously linked to the requesting node's habit of sharing content items. The access requirement value, which preferably is not only linked to the size of the content item, is modified for at least one content item in the network, either following a time rule or when the content is downloaded. In this way it can be ensured that initial downloaders are likely to share the content item and that the content then gets more accessible to other nodes. Also provided are a sharing node, a server and a method. | 04-21-2011 |
20130034002 | METHOD AND DEVICE FOR RELIABLE ESTIMATION OF NETWORK TRAFFIC - A network, advantageously a home network, comprises a number of user devices, for example personal computers, game consoles and smartphones, each having an estimator application, preferably voluntarily installed by the user. The network further comprises a network device that acts as an interface between the network and an external network. The estimator applications measure the network traffic for its user device, while the network device in parallel generates an independent measurement of the network consumption. The measurements are then compared. If the difference between the sum of the measurements from the estimator applications and the measurement of the network device is below a fixed threshold, it is assumed that the measurements are valid for the considered measurement time interval. Otherwise, the difference is an indication that at least one estimation was incorrect. | 02-07-2013 |
20130242795 | METHOD AND DEVICE FOR FINGERPRINTING OF WIRELESS COMMUNICATION DEVICES - A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, if possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol. | 09-19-2013 |
20130305380 | METHODS AND DEVICES FOR 3D OBJECT PROTECTION USING SURFACE SUBDIVISION - A method of protecting a graphical object represented by a list of vertices and a list of surfaces, each surface being defined by a number N vertices. A device selects a surface S with N vertices; computes a new vertex d using a random or pseudo-random function; inserts the new vertex d into the list of vertices; creates N new surfaces S | 11-14-2013 |
20130347105 | METHOD AND DEVICE FOR COUNTERING FINGERPRINT FORGERY ATTACKS IN A COMMUNICATION SYSTEM - A method and a fingerprinting device for countering fingerprint forgery in a communication system. The fingerprinting device obtains and stores a reference fingerprint for a client device, generates and transmits decoy traffic that appears to originate from the client device, the decoy traffic having different fingerprinting properties than real traffic from the client device, generates a fingerprint for non-decoy traffic purportedly from the client device, and compares the generated fingerprint with a reference fingerprint. A forged fingerprint is detected if there is a mismatch. The decoy traffic preferably comprises frames to which no response is needed. The invention is particularly suited for 802.11 using fingerprints based on duration fields of received frames and the decoy traffic is then preferably probe request frames and null data frames. | 12-26-2013 |
20140019754 | ANONYMOUS AND UNLINKABLE DISTRIBUTED COMMUNICATION AND DATA SHARING SYSTEM - A distributed communication and data sharing system that provides anonymity and unlinkability. A group comprising a number of structures, each having a public/private key pair, is stored on a plurality of nodes in a Distributed Hash Table. Advantageous features of the group management system are provided through the use of Cryptographically Generated Addresses (CGA) for the structures, a secure capture method that enables a user to capture an address and be the only one authorized to request certain operations for the address, and an anonymous get/set mechanism in which a user signs messages, encloses the public key in the message and encrypts the message and public key using the public key of the receiver. The distributed communication and data sharing system of the invention can advantageously be used for group management of social networks. | 01-16-2014 |
20140037132 | USER DEVICE, A SECOND SCREEN SYSTEM AND A METHOD FOR RENDERING SECOND SCREEN INFORMATION ON A SECOND SCREEN - Rendering second screen information on a second screen device. A user device receives information characterizing the source of a content data stream and the content data stream; generates a watermark payload using a plurality of parameters comprising the information and a time of the user device; and inserts a watermark comprising the watermark payload into the content data stream that is rendered. The second screen device captures the watermark and extracts the watermark payload and then at least one of the plurality of parameters; generates, using the at least one extracted parameter, a request that is sent the request to a server; receives information from the server in response to the request; and displays the received information on a screen of the second screen. | 02-06-2014 |
20140195818 | METHOD AND DEVICE FOR PRIVACY RESPECTING DATA PROCESSING - A user device encrypts data and privacy attributes associated with the data. A processing device receives the encrypted data and privacy attributes, receives a signed script from a requester and verifies the signature. If successfully verified, the private key is unsealed and used to decrypt the privacy attributes and script attributes, which are compared to determine if the script respects the privacy attributes. If so, the encrypted data are decrypted and the script processes the private data to generate a result that is encrypted using a key of the requester and the encrypted result is then output. The device is preferably configured to inhibit the output of any information while the data is unencrypted. This way, the user can be ensured that the processing of the private data respects the privacy attributes set by the user. | 07-10-2014 |
20140313983 | METHOD AND DEVICE FOR FINGERPRINTING OF NETWORK DEVICES - A method for fingerprinting at least one network device is disclosed which comprises, in a monitoring device, computing a passive fingerprint from a plurality of parameters of the at least one network device. And in the at least one network device, modifying at least one parameter among the plurality of parameters of the at least one network device by applying to the at least one parameter a diversity function; wherein the diversity function is chosen in such a way that variations of the modified parameter of each network devices are not correlated; and wherein a variation range of the at least one modified parameter is inferior to a first value so that a variation range of the passive fingerprint for each of the at least one network device is limited to a determined range. A network device, modifying at least one parameter among the plurality of parameters of the at least one network device by applying to the at least one parameter a diversity function is further disclosed. The invention is particularly suitable for IEEE 802.11 and for a fingerprinting method based on inter-arrival time histogram. | 10-23-2014 |
20150082375 | A SYSTEM FOR ENFORCING AN ACCESS POLICY FOR CONTENT ITEM CONSUMPTION - Enforcing a global access policy, comprising a global access rule for a user's devices, for consumption of a content item. The user's devices advantageously comprise a set-top box, a tablet and a gateway. The gateway is configured to split the global access rule into local access rules for the set-top box and the tablet so that independent consumption of the content item by the set-top box and the tablet according to the respective local access rules does not violate the global access rule; and to send the local access rules to a first and a second enforcement point, which are configured to receive a request to access the content item from a user device; and allow or inhibit access to the content item depending on whether or not access to the content item is authorized by the local access rule for the user device from which the request was received. | 03-19-2015 |