MEDIA AUTHENTICATION BASED ON MACHINE LEARNING OUTPUT FEATURES

    公开(公告)号:EP4404150A1

    公开(公告)日:2024-07-24

    申请号:EP23152174.1

    申请日:2023-01-18

    申请人: Nagravision Sarl

    IPC分类号: G06V20/40

    CPC分类号: G06V20/48

    摘要: Methods and systems are described herein for authenticating streaming media, based on the use of computer vision or artificial intelligence. An untrained neural network generates a first feature vector from an identified image frame of a first media stream that is encoded with a first encoding scheme. The same or a similar untrained neural network generates a second feature vector from an identified image frame of a second media stream that is encoded with a second encoding scheme. The two encoding schemes do not need to be the same. The two feature vectors are compared, and the second media stream is presumed to be authentic if the differences between the two feature vectors is less than a predetermined threshold.

    DEVICES AND PROCESSES FOR GENERATING PUBLIC KEYS AND FOR GENERATING AND VERIFYING SIGNATURES

    公开(公告)号:EP4369234A1

    公开(公告)日:2024-05-15

    申请号:EP22206498.2

    申请日:2022-11-09

    申请人: Nagravision Sarl

    IPC分类号: G06F21/60 H04L9/32 H04L9/30

    摘要: A public key (KpubEd) is generated (6, 60) from a private key (Kpriv) in elliptic curve cryptography, by getting a scalar multiplication (s.GEd) on a first elliptic curve of a twisted Edwards type, of a first base point (GEd) on that first elliptic curve by a scalar (s) derived from the private key. It is proceeded (603) with a scalar multiplication (s.GM) on a second elliptic curve of a Montgomery type birationally equivalent to the first elliptic curve via an isomorphism, of a second base point (GM) on the second elliptic curve corresponding to the first base point with respect to that isomorphism, by an adjusted scalar, and a resulting point is converted (604) to the scalar multiplication on the first elliptic curve by an isogeny. Signature generation and verification are exploiting similar principles.
    Applications to authentication.