Patent application number | Description | Published |
20090037733 | Method for Recording and Distributing Digital Data and Related Device - The invention relates to a method for burning digital data onto a blank disk by a client device, the digital data being transmitted to the client device by a remote content server. The method comprises the following steps carried out by the client device: setting up a secure authenticated channel with the content server; receiving the digital data transmitted by the content server; verifying the existence of the secure authenticated channel and authorizing the burning of the digital data received only during the existence of the secure authenticated channel; and burning onto the blank disk the digital data received. The invention also relates to a client device and a method for distributing digital data. | 02-05-2009 |
20100070756 | DEVICE AND METHOD FOR DIGITAL PROCESSING MANAGEMENT OF CONTENT SO AS TO ENABLE AN IMPOSED WORK FLOW - A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing. | 03-18-2010 |
20100128873 | METHOD AND DEVICE FOR MANAGING A TRANSMISSION OF KEYS - The present invention concerns a method and a device for encrypting an encoded scalable enhancement frame sent by an emitter to a receiver, the enhancement frame comprising a plurality of complementary streams ordered in term of quality level, each complementary stream corresponding to a combination of more than one scalability type, where a complementary stream of a lower quality level corresponds to a lower quality on each scalability type, comprising at the level of the emitter the steps of generating a key per complementary stream for encrypting said complementary stream in such a way that all scalability types can be either simultaneously or individually used, said keys being generated in such a way that only the keys of the complementary streams of quality levels lower than the quality level of a complementary stream can be obtained from the key of said complementary stream, and sending the key of a complementary stream corresponding to a required quality level to the receiver, the key permitting a receiver to generate the keys of the complementary streams of the lower quality levels only. The present invention also concerns a method and a device for decrypting a received encoded scalable enhancement frame. | 05-27-2010 |
20100146297 | Method and system digital for processing digital content according to a workflow - A method of processing digital content according to a workflow. The digital content is received and information for the workflow is checked to decide if a processing device is authorised to process the content, the workflow imposing that the digital content be processed in a process chain comprising at least two nodes, wherein the processing device is authorised to process the content if it corresponds to the node that according to the process chain is the next node to process the digital content. If the processing device is authorised to process the content, the digital content is processed and the information for the workflow is updated. Also provided is a system. | 06-10-2010 |
20100146298 | Method and system for processing digital content according to a workflow - A method of processing digital content following a workflow. A processing device receives the digital content and a license for the digital content, the license comprising workflow information about a process chain, which comprises a present node and a following node; decrypts the license; verifies if it may process the content by verifying if it corresponds to the present node. If the processing device may process the digital content, it processes the digital content to obtain processed content and generates a new license comprising updated workflow information, wherein the following node is set as a new present node. Also provided is a processing device. | 06-10-2010 |
20100150344 | Methods and devices for a chained encryption mode - An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N−1 and plaintext block N−1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and a random initialization key K. In a preferred embodiment, initialization key K is subkeys resulting from a key schedule algorithm and encryption key N−1 is only one of the subkeys. Encryption key for the first plaintext block is generated by XOR-ing a random Initialization vector and one subkey resulting from a key schedule algorithm. Also provided is a corresponding decryption method, an encryption device, a decryption device. | 06-17-2010 |
20100153745 | Methods and devices for instruction level software encryption - A method of encrypting compiled computer code instructions to be decrypted instruction by instruction during execution. The computer code instructions are encrypted using a chaining mode so that an encrypted instruction depends on the values of the instruction, the value of the preceding instruction and a pseudo-random number. As it may happen that the instruction can be arrived at from more than one preceding instruction, at least one of the preceding instructions is associated with a random number compensator for use during decryption of the encrypted instruction, so that the decryption of the encrypted instruction yields the same result regardless of which the preceding instruction was. Also provided are an encryption device, a decryption device and method, and a digital support medium storing encrypted compiled computer code instructions. | 06-17-2010 |
20100332343 | METHOD FOR DISPLAYING MULTIMEDIA CONTENT WITH VARIABLE INTERFERENCE BASED ON RECEIVER/DECODER LOCAL LEGISLATION - A multimedia content receiver/decoder that receives data representing the multimedia content as well as disturbance data associated with the content is disclosed. It processes the data representing the content based on the associated disturbance data locally stored in the receiver/decoder then it transmits to the display means the multimedia content for displaying with a disturbance defined by the disturbance data according to a disturbance level depending on local disturbance rights. | 12-30-2010 |
20130179555 | METHOD AND DEVICE FOR TIMESTAMPING DATA AND METHOD AND DEVICE FOR VERIFICATION OF A TIMESTAMP - An owner timestamps data f by generating a set of domain names D from the data f and the ‘timestamping’ time t. The owner then sends resolution requests for the domain names D to one or more DNS servers. To verify a timestamp, a verifier generates a set of domain names D from the data f and the ‘timestamping’ time t, sends resolution requests for the domain names D to the same DNS servers as the owner, receives resolution responses comprising TTL values, retrieves reference TTLs for the DNS servers and compares the current time with the ‘timestamping’ time t and, for each resolution response, the TTL and the reference TTL. If a predetermined ratio of comparisons match, then the timestamp is verified. Also provided are devices and computer program products. | 07-11-2013 |
20130242795 | METHOD AND DEVICE FOR FINGERPRINTING OF WIRELESS COMMUNICATION DEVICES - A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, if possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol. | 09-19-2013 |
20130347105 | METHOD AND DEVICE FOR COUNTERING FINGERPRINT FORGERY ATTACKS IN A COMMUNICATION SYSTEM - A method and a fingerprinting device for countering fingerprint forgery in a communication system. The fingerprinting device obtains and stores a reference fingerprint for a client device, generates and transmits decoy traffic that appears to originate from the client device, the decoy traffic having different fingerprinting properties than real traffic from the client device, generates a fingerprint for non-decoy traffic purportedly from the client device, and compares the generated fingerprint with a reference fingerprint. A forged fingerprint is detected if there is a mismatch. The decoy traffic preferably comprises frames to which no response is needed. The invention is particularly suited for 802.11 using fingerprints based on duration fields of received frames and the decoy traffic is then preferably probe request frames and null data frames. | 12-26-2013 |
20140019754 | ANONYMOUS AND UNLINKABLE DISTRIBUTED COMMUNICATION AND DATA SHARING SYSTEM - A distributed communication and data sharing system that provides anonymity and unlinkability. A group comprising a number of structures, each having a public/private key pair, is stored on a plurality of nodes in a Distributed Hash Table. Advantageous features of the group management system are provided through the use of Cryptographically Generated Addresses (CGA) for the structures, a secure capture method that enables a user to capture an address and be the only one authorized to request certain operations for the address, and an anonymous get/set mechanism in which a user signs messages, encloses the public key in the message and encrypts the message and public key using the public key of the receiver. The distributed communication and data sharing system of the invention can advantageously be used for group management of social networks. | 01-16-2014 |
20140195818 | METHOD AND DEVICE FOR PRIVACY RESPECTING DATA PROCESSING - A user device encrypts data and privacy attributes associated with the data. A processing device receives the encrypted data and privacy attributes, receives a signed script from a requester and verifies the signature. If successfully verified, the private key is unsealed and used to decrypt the privacy attributes and script attributes, which are compared to determine if the script respects the privacy attributes. If so, the encrypted data are decrypted and the script processes the private data to generate a result that is encrypted using a key of the requester and the encrypted result is then output. The device is preferably configured to inhibit the output of any information while the data is unencrypted. This way, the user can be ensured that the processing of the private data respects the privacy attributes set by the user. | 07-10-2014 |
20140313983 | METHOD AND DEVICE FOR FINGERPRINTING OF NETWORK DEVICES - A method for fingerprinting at least one network device is disclosed which comprises, in a monitoring device, computing a passive fingerprint from a plurality of parameters of the at least one network device. And in the at least one network device, modifying at least one parameter among the plurality of parameters of the at least one network device by applying to the at least one parameter a diversity function; wherein the diversity function is chosen in such a way that variations of the modified parameter of each network devices are not correlated; and wherein a variation range of the at least one modified parameter is inferior to a first value so that a variation range of the passive fingerprint for each of the at least one network device is limited to a determined range. A network device, modifying at least one parameter among the plurality of parameters of the at least one network device by applying to the at least one parameter a diversity function is further disclosed. The invention is particularly suitable for IEEE 802.11 and for a fingerprinting method based on inter-arrival time histogram. | 10-23-2014 |
20150082375 | A SYSTEM FOR ENFORCING AN ACCESS POLICY FOR CONTENT ITEM CONSUMPTION - Enforcing a global access policy, comprising a global access rule for a user's devices, for consumption of a content item. The user's devices advantageously comprise a set-top box, a tablet and a gateway. The gateway is configured to split the global access rule into local access rules for the set-top box and the tablet so that independent consumption of the content item by the set-top box and the tablet according to the respective local access rules does not violate the global access rule; and to send the local access rules to a first and a second enforcement point, which are configured to receive a request to access the content item from a user device; and allow or inhibit access to the content item depending on whether or not access to the content item is authorized by the local access rule for the user device from which the request was received. | 03-19-2015 |