Patent application number | Description | Published |
20100274948 | COPY-PROTECTED SOFTWARE CARTRIDGE - A cartridge preferably for use with a game console. The cartridge comprises a ROM, a non-volatile memory, a processor and a dispatcher. An application running on the console may communicate with the dispatcher using predefined addresses, which enables the dispatcher to access the ROM, the non-volatile memory, or the processor, as the case may be. The invention improves on the prior art copy protection as no generic copy method may be found if the addresses are changed from one cartridge to another. In addition, to copy the software, the processor must be emulated. | 10-28-2010 |
20100315922 | ROTATION-ACTIVATED ELECTRONIC COMPONENT - A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch and a component, advantageously a processor. The antenna is adapted to transform received RFID signals to electric energy that powers the component. In a preferred embodiment, the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. Supports equipped with the RFID tag of the invention will thus respond only if they rotate sufficiently. This can avoid collisions in case more than one such RFID tag is within communication range of an antenna of a reader. In a preferred embodiment, the information returned by the component is needed for full use of the content on the support. | 12-16-2010 |
20110179495 | Method of execution of a software application and a storage device for storing the software application - A method of execution of a software application. A storage device stores the software application in a first memory. The software application comprises code that, when executed by a computing device authenticates the storage device. The storage device verifies an integrity of the software application and transfers the software application to the computing device upon successful verification. The computing device executes the software application, which authenticates the storage device. If the storage device is successfully authenticated, the computing device accesses data in a second memory of the storage device, the data being susceptible to be used by the software application during execution. Also provided is the storage device. | 07-21-2011 |
20110199189 | Rotation-activated electronic component with time-limited use - A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch, a component, advantageously a processor, and a time usage limiter. The antenna is adapted to transform received RFID signals to electric energy that powers the component and the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. The time usage limiter counts down a timer when it is powered via the rotational switch and disables the RFID tag when the timer expires. Supports equipped with the RFID tag of the invention will thus respond until the timer expires, and preferably only if they rotate sufficiently. | 08-18-2011 |
20110283353 | Method and a device for generating a secret value - A device and a method for graphical passwords. A device displays an initial image comprising a plurality of graphical elements, each graphical element having at least two variants; receives user input to select a variant of a number of the graphical elements, thereby generating a modified image; and generates the secret value from at least the selected variants of the graphical elements. The graphical elements are advantageously seamlessly integrated in the images, thereby making the system resistant to shoulder surfing attacks. | 11-17-2011 |
20120112881 | Electronic component with time-limited use - An electronic device with a limited time of use. The electronic device comprises a physical interface for removable connection to a host device, a processor and a usage time limit module with a counter. When the counter reaches a pre-determined value, the usage time limit module is configured to disable the electronic device, preferably by modifying the hardware of the electronic device, e.g. by disabling a communication line between the processor and the physical interface, which may be effected by blowing a fuse. The usage time limit module is powered by the host device via a power supply from the physical interface. In a preferred embodiment, the electronic device is a storage device. In a further preferred embodiment, the physical interface is a USB interface. | 05-10-2012 |
20120120062 | METHOD AND DEVICE FOR 3D OBJECT PROTECTION BY PERMUTATION OF COORDINATES OF ITS POINTS - A 3D object is protected by a first device that receives the 3D object, permutes the coordinates of at least one dimension of at least some of the points of the 3D object to obtain a protected 3D object, and outputs the protected 3D object. The coordinates of the dimensions are preferably permuted independently of the permutations of the other dimensions. The protected 3D object is unprotected by a second device ( | 05-17-2012 |
20120297022 | METHOD, SYSTEM AND DEVICE FOR EXECUTION OF A SOFTWARE APPLICATION - A method of executing a software application. A storage device stores connection data, an identifier of the software application, a context selector, and an application launcher. An execution device connects, using the connection data, to a server. The storage device transfers the context selector to the execution device, which executes it to generate a first context for the execution device. The identifier and the first context are sent to the server from which the storage device receives the software application, which is stored with the first context. The application launcher is transferred to the execution device for execution. A second context of the execution device is generated and the storage device checks if it matches the first context. If so, the storage device transfers the software application to the execution device where it is executed. | 11-22-2012 |
20120299915 | METHOD AND DEVICE FOR 3D OBJECT PROTECTION BY TRANSFORMATION OF ITS POINTS - A 3D object is protected by a first device that receives the 3D object, generates translation vectors that are added to the points of the 3D object to obtain a protected 3D object, and outputs the protected 3D object. The protected 3D object is unprotected by a second device by receiving the protected 3D object, generating translation vectors that are subtracted from the points of the protected 3D object to obtain an unprotected 3D object, and outputting the unprotected 3D object. Also provided are the first device, the second device and computer readable storage media. | 11-29-2012 |
20150363743 | MULTI-STAGE CONTRIBUTION TRACEABILITY IN COLLECTIVE CREATION ENVIRONMENT - An apparatus for rewarding collaborative creation is described including hierarchically defining tasks of a collaborative project, defining a type of weight for each of the defined tasks, assigning weights to each of the defined tasks according to the type of weight defined for each task, measuring and recording contributions by collaborators as each task is performed and determining rewards for the collaborators. | 12-17-2015 |
20150381424 | METHOD OF AND REQUEST SERVER FOR PROVIDING A PREFERENCE VALUE FOR FEATURES OF AN APPLICATION - An application running on a processing device sends a request for preference values for features to a request server that analyses the request and then generates a request that is sent to a device storing preference values. The device returns a response comprising stored preference values for the features. In case the response does not provide values for all the features requested by the application, the request server generates a further request that is sent to a further device that returns a response. The responses are then used to generate a response that is sent to the application that uses the preferences. While the recipients of the requests sent by the request server may vary, it is preferred that the first request is sent to a device storing preferences selected by a third party and that the second request is sent to a device storing user preferences. The invention can provide a way to provide preferences for a plurality of different applications without having to specify the preferences separately for each application, and it can also provide preferences from a plurality of sources. | 12-31-2015 |
Patent application number | Description | Published |
20130067554 | METHODS, DEVICES AND COMPUTER PROGRAM SUPPORTS FOR PASSWORD GENERATION AND VERIFICATION - During log-on of a user to an entity protected by a password, the password is verified by iteratively receiving a password character; and verifying that the received character complies with a predefined property (α) that sets at least one requirement for allowable passwords. If this is not the case, then this can indicate a brute force attack and appropriate action may be taken. The property α may be dependent on the user. Also provided are a corresponding device and a computer program product. | 03-14-2013 |
20130305380 | METHODS AND DEVICES FOR 3D OBJECT PROTECTION USING SURFACE SUBDIVISION - A method of protecting a graphical object represented by a list of vertices and a list of surfaces, each surface being defined by a number N vertices. A device selects a surface S with N vertices; computes a new vertex d using a random or pseudo-random function; inserts the new vertex d into the list of vertices; creates N new surfaces S | 11-14-2013 |
20140115345 | METHODS AND DEVICES FOR OPTIMISING RENDERING OF AN ENCRYPTED 3D GRAPHICAL OBJECT - The graphical characteristics of 3D graphical objects encrypted using format-preserving encryption makes rendering of such objects quite inefficient by non-authorized devices. To optimise the rendering of a three-dimensional graphical object represented by a list of points and a list of surfaces defined by points in the list of points, a device receives the graphical object; encrypts the graphical object using a format-preserving encryption method to obtain an encrypted graphical object; encapsulates the encrypted graphical object to obtain an encapsulated graphical object by adding at least one encapsulation by adding for each encapsulation, to the list of surfaces, a plurality of surfaces that together enclose the encrypted graphical object and, in an embodiment, at least one point to the list of points; and outputs the encapsulated graphical object. Decryption is performed by essentially reversing the encryption. | 04-24-2014 |
20140119538 | METHOD AND DEVICE FOR 3D OBJECT ENCRYPTION BY APPLICATION OF A FUNCTION MODIFIED USING A SECRET KEY - A method for encrypting a 3D object. In a preferred embodiment, the encryption shapes the 3D object by generating a set of secret functions using a secret K, applying the generated functions to the 3D object, determining the function that gives an output that is closest to predetermined characteristics, encrypting the 3D object using the determined function, and outputting the encrypted 3D object and an indication of the determined function. Also provided is a corresponding decryption method, an encryption device and a decryption device. | 05-01-2014 |
20140317705 | APPARATUS AND METHOD FOR MANAGING PASSWORDS - A method for managing passwords for a user. A processor of an apparatus storing at least one received, incorrect password proposal receives via a user interface a further password proposal from a user; generates a hash value for the further password proposal; sends the hash value to the authentication server; receives from the authentication server a message indicative of whether the hash value corresponds to a correct password or to an incorrect password. In case the message indicates that the hash value corresponds to a correct password, the processor uses a distance function on each incorrect password proposal to obtain a distance value representative of a distance between the incorrect password proposal and the correct password; and sending to the authentication server hash values for password proposals for which the distance value is lower than or equal to a threshold value. Also provided are the apparatus and a computer program support. The disclosure can provide resistance to typing errors in the password proposals. | 10-23-2014 |
20150081760 | METHOD AND DEVICE FOR PROVIDING ACCESS TO A TASK - In a collaborative work environment, a participant chooses a task to perform and the identifier of the task is sent from a participant device to a first server. The first server creates a Virtual Machine that is configured with a dedicated tool and appropriate data, instantiates the Virtual Machine on a second server, and sends connection information to the participant device. Using the connection information, the participant device connects to the Virtual Machine on the second server and works on the task. It is preferred that remote desktop technology is used so that the participant works through a remote desktop client on the participant device, while the work in effect is done on the second server. The disclosure can thus, at least to a certain extent, ensure that a specified participant uses a dedicated tool to work on data to be treated by the task. | 03-19-2015 |
20150302067 | AN ASSET HANDLING TOOL FOR FILM PRE-PRODUCTION - An asset handling tool for pre-production of a film having a script configured to: obtain a search expression from a scene of the script; send to an asset database a query for assets corresponding to the search expression; receive a set of assets matching the search expression; display at least part of the set of assets to a user; receive, from the user, a selection of an asset in the set of assets; and link the selected asset with the scene. The asset handling tool is advantageously implemented in a tool for collaborative pre-preproduction of the film and can help a director or a producer to pre-produce the film by suggesting already made assets that can be imported into the film, possibly after treatment. | 10-22-2015 |
20150317571 | DEVICE FOR FILM PRE-PRODUCTION - A system for collaborative pre-production of a film comprises user interfaces advantageously implemented as web browsers, a project server, a project database for storing project data and an asset database for storing tagged assets. The project server comprises a project management module providing the framework for the system, a data access module enabling users to view data, and a pre-visualization module for providing a best effort preview of the film based on the script and associated direction choices and assets. The project server can also comprise an asset recommendation module for suggesting, based on key words, assets in the asset database for scenes of the film, a direction assistant module for suggesting direction possibilities, including cost and delay estimates, for the scenes. | 11-05-2015 |