Patent application number | Description | Published |
20090185676 | METHOD TO GENERATE A PRIVATE KEY IN A BONEH-FRANKLIN SCHEME - The aim of the present invention is to propose an alternative scheme to the classical Boneh-Franklin scheme in order to simplify the generation and the use of the asymmetric keys. | 07-23-2009 |
20090185686 | METHOD TO TRACE TRACEABLE PARTS OF ORIGINAL PRIVATE KEYS IN A PUBLIC-KEY CRYPTOSYSTEM - The aim of the present invention is to propose a very fast alternative mechanism to the traitor tracing algorithm introduced by Boneh and Franklin to trace private keys in a public-key cryptosystem. This invention concerns a method to trace traceable parts of original private keys in a public-key cryptosystem consisting of one public key and l corresponding private keys, a private key being formed by a traceable array of 2 | 07-23-2009 |
20090208010 | System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module revocation method used for securing broadcasted messages - The present invention makes use of techniques such as those described by Boneh and Franklin to allow for the realisation of a pseudo-asymmetric encryption scheme whereby one public encryption corresponds to a plurality of private decryption keys. This scheme therefore provides a solution to the problem of inefficient use of bandwidth in asymmetrical encryption schemes which inherently require that a plurality of encryptions of data be broadcast to a plurality of receivers. The invention further ensures that the advantage of traceability, typical found in asymmetric encryption schemes, is maintained due to the characteristic that each receiver uses a unique traceable decryption key. The traceability thus achieved by the present invention allows for the revocation of a security module which has been involved in the abusive use of conditional access data, particularly by means of clones of security modules whose security has been compromised. | 08-20-2009 |
20110164747 | METHOD TO ENFORCE BY A MANAGEMENT CENTER THE ACCESS RULES FOR A BROADCAST PRODUCT - A method to enforce by a management center access rules for a broadcast product accessed by an access key, the management center managing a plurality of Boolean positive and negative attributes, comprising the steps: associating one positive Boolean attribute to a receiver entitled to the attribute and loading the same; associating one negative Boolean attribute to a receiver not entitled to the attribute and loading the same; defining at least a second broadcast encryption scheme for the negative Boolean attributes and associating each negative Boolean attribute corresponding decryption key material; expressing access conditions on a product as a Boolean expression by combining at least one positive Boolean attribute and at least one negative Boolean attribute by at least one Boolean conjunction or disjunction; generating and broadcasting at least one cryptogram to a receiver, encrypting the access key with the two combined broadcast encryption schemes according to the Boolean expression. | 07-07-2011 |
20110188655 | METHOD TO MANAGE MEMBERS OF AT LEAST ONE GROUP OF DECODERS HAVING ACCESS TO BROADCAST DATA - A method to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at least a net group access key encrypted so that only non revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key. | 08-04-2011 |
20120224692 | METHOD FOR PUBLIC-KEY ATTRIBUTE-BASED ENCRYPTION WITH RESPECT TO A CONJUNCTIVE LOGICAL EXPRESSION - The aim of the present invention is to propose a method for providing attribute-based encryption for conjunctive normal form (CNF) expressions, the said CNF expression comprising at least one clause over a set of attributes, the said method using a key generation engine, an encryption engine and a decryption engine. | 09-06-2012 |
20120281833 | METHOD TO MANAGE REVOCATIONS IN A GROUP OF TERMINALS - The present invention concerns the field of broadcast encryption method, i.e. a method to organize the distribution of keys into a group of users so that it is possible to manage the revocation of one member of the group in an efficient way. The proposed solution is a private encryption key ciphertext constant collusion-resistant broadcast encryption. The main idea behind the invention is to mix the notion of efficient tree-based key derivation (also called subset management) with individual and personalized key blinding thus achieving a full collusion-resistant broadcast encryption system. The key de-blinding is performed at the last moment thanks to a cryptographic technique called pairings (also known as bilinear maps) resulting in a global key commonly shared by all authorized (non-revoked) devices. It should be noted that only non-revoked devices can compute the final key (this is achieved through subset management and related subset key derivation technique) and perform the de-blinding (which is performed with one pairing). | 11-08-2012 |
20130308780 | APPARATUS FOR MANAGING MEMBERS OF AT LEAST ONE GROUP OF DECODERS HAVING ACCESS TO BROADCAST DATA - A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key. | 11-21-2013 |
20140143150 | ELECTRONIC PAYMENT METHOD AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - The present invention relates to an electronic payment method for securely exchanging information between an authentication device and a server via a communication device. The method comprises the following steps: acquiring by the authentication device a payment amount and a seller identifier, displaying the payment amount on a display of said authentication device, acquiring by the authentication device user feedback data by means of a user interface of said authentication device, generating, at the authentication device, a secure payment request comprising the displayed payment amount, said seller identifier and an authentication device identifier stored in the authentication device, and transmitting said secure payment request to the server by using said communication device as relaying device. | 05-22-2014 |
20140143155 | ELECTRONIC PAYMENT METHOD, SYSTEM AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - Electronic payment method for securely exchanging payment information between an authentication device and an authorization server via a communication device. The authentication device comprising an interface for data exchange with the device, a user interface for user authentication data input, a nonvolatile memory for storing an authentication device ID, a data memory for storing a cryptographic key and a crypto-processor for performing cryptographic operations. The communication device comprising a device ID and an interface for receiving and sending data, the authorization server comprising an interface for data exchange with the device, a database for storing a plurality of customer accounts each including an authentication device ID associated to a device holder authentication data, a data storage for storing a second cryptographic key, and a cryptographic unit for performing cryptographic operations. | 05-22-2014 |
Patent application number | Description | Published |
20090123089 | ADAPTIVE FILTERING FOR IMAGE TRANSFORM PROCESSES - Adaptive filtering techniques are set forth that improve video playback performance. A color similarity metric is computed for source pixels undergoing an image transform operation to determine color values of a target pixel location. The value of the color similarity metric defines what algorithm is used to determine the color values of the target pixel location from the source pixels. While the computation of the color similarity metric introduces additional instructions for each pixel, going against conventional wisdom, enormous performance savings by avoiding unnecessarily complex sets of interpolation instructions where a simpler instruction set suffices, outweighs any such cost from additional instructions. | 05-14-2009 |
20090282475 | Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback. | 11-12-2009 |
20140043351 | ADAPTIVE FILTERING FOR IMAGE TRANSFORM PROCESSES - Adaptive filtering techniques are set forth that improve video playback performance. A color similarity metric is computed for source pixels undergoing an image transform operation to determine color values of a target pixel location. The value of the color similarity metric defines what algorithm is used to determine the color values of the target pixel location from the source pixels. While the computation of the color similarity metric introduces additional instructions for each pixel, going against conventional wisdom, enormous performance savings by avoiding unnecessarily complex sets of interpolation instructions where a simpler instruction set suffices, outweighs any such cost from additional instructions. | 02-13-2014 |
20140337433 | Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback. | 11-13-2014 |
Patent application number | Description | Published |
20090066840 | SYSTEM AND METHOD FOR LOW BANDWIDTH DISPLAY INFORMATION TRANSPORT - To conserve communication channel bandwidth, video information must often be compressed in low bandwidth environments. To significantly reduce bandwidth usage, a first disclosed embodiment proposes transmits a reduced color depth image initially and then later transmitting additional color depth information when the image becomes static. In this manner, a reduced color image is displayed when an image is dynamic but a full color image is displayed when the image becomes static. Note that the additional color information is transmitted only when bandwidth is has become less utilized since updated image information is no longer being transmitted since the image has become static. The additional color depth information may be stored in the same buffer or within a different buffer in the receiving system. A second embodiment delays additional color depth information and also spatially reduces the additional color depth information. | 03-12-2009 |
20090070441 | SYSTEM AND METHOD FOR COMPUTER NETWORK CONFIGURATION AND OPERATION - A system for simplifying the configuration and administration of computer networks. A the server system first sends a broadcast message out to the other network nodes on the computer network to learn configuration of each other network nodes on the local network. Next, network software within each other network node (not shown) responds to the broadcast message with a response containing configuration information and an identifier key value. In one embodiment, the identifier key value may be a randomly generated number. The server system then builds a table of network nodes using the information received in the response messages sent in response to the broadcast message. The server may then communicate with systems having duplicate addresses using the identifier key value. In some embodiments, the server system may send request messages to one or more network nodes specifying a network configuration change. | 03-12-2009 |
20110213864 | SYSTEM AND METHOD FOR COMPUTER NETWORK CONFIGURATION AND OPERATION - A system for simplifying the configuration and administration of computer networks. A the server system first sends a broadcast message out to the other network nodes on the computer network to learn configuration of each other network nodes on the local network. Next, network software within each other network node (not shown) responds to the broadcast message with a response containing configuration information and an identifier key value. In one embodiment, the identifier key value may be a randomly generated number. The server system then builds a table of network nodes using the information received in the response messages sent in response to the broadcast message. The server may then communicate with systems having duplicate addresses using the identifier key value. In some embodiments, the server system may send request messages to one or more network nodes specifying a network configuration change. | 09-01-2011 |
20130304876 | SYSTEM AND METHOD FOR COMPUTER NETWORK CONFIGURATION AND OPERATION - A system for simplifying the configuration and administration of computer networks. A the server system first sends a broadcast message out to the other network nodes on the computer network to learn configuration of each other network nodes on the local network. Next, network software within each other network node (not shown) responds to the broadcast message with a response containing configuration information and an identifier key value. In one embodiment, the identifier key value may be a randomly generated number. The server system then builds a table of network nodes using the information received in the response messages sent in response to the broadcast message. The server may then communicate with systems having duplicate addresses using the identifier key value. In some embodiments, the server system may send request messages to one or more network nodes specifying a network configuration change. | 11-14-2013 |