Abstract:
The processing device is intended to be connected to a network of the second domain so as to receive data encrypted according to an encryption method specific to the first domain. It comprises: a memory for containing a first secret specific to the first domain; means of decryption of the data encrypted with the aid of the first secret so as to obtain decrypted data; means of encryption of the data decrypted according to an encryption method specific to the second domain, so that the data encrypted by said means of encryption cannot be decrypted other than with the aid of a second secret specific to the second domain. The invention also relates to the method for transmitting data encrypted with the aid of the secret specific to the first domain in the network of the second domain.
Abstract:
A method of processing digital content according to a workflow. The digital content is received and information for the workflow is checked to decide if a processing device is authorized to process the content, the workflow imposing that the digital content be processed in a process chain comprising at least two nodes, wherein the processing device is authorized to process the content if it corresponds to the node that according to the process chain is the next node to process the digital content. If the processing device is authorized to process the content, the digital content is processed and the information for the workflow is updated. Also provided is a system.
Abstract:
A rotating tool includes a plurality of elongated members, a cutting edge extending from at least one of the elongated members. A support is attached to each of the elongated members for holding the elongated members at a distance relative to an axis of rotation of the tool. A guiding pad extends radially outwardly from the axis relative to at least one of the elongated members. The tool is particularly useful for reaming operations in which it can be useful to have a tool with a large diameter and/or length.
Abstract:
A method for preventing the bypassing of watermark embedding in a bit-stream representative of audio/video data is disclosed. The method is remarkable in that it comprises a step of corrupting the bit-stream wherein original blocks in the bit-stream are replaced by corrupted blocks producing a non-compliant bit-stream; and a step of repairing the corrupted bit-stream by replacing each corrupted blocks, wherein at least one corrupted block is replaced by a watermarked block and at least one corrupted block is replaced by an original block, producing a compliant repaired and watermarked bit-stream. A device for watermarking and repairing a corrupted bit-stream and to a device for preparing a corrupted bit-stream, wherein the original bit-stream is representative of audio/video data are further disclosed.
Abstract:
A system for protection against unauthorized modifications of digital content, in particular image content, in which a content processing system retrieves content, a fingerprint for the content and at least one modification limit expressing authorized modifications to the content. The content may then be modified, but before saving or exportation is allowed, a second fingerprint is calculated, and the difference between the fingerprints is compared with the at least one modification limit. If the difference is within the allowed bounds, then saving or exportation is allowed; if not, it is prevented. Also provided are a method and a content consumer device performing essentially the same steps before allowing rendering of the content.
Abstract:
The invention concerns a method implemented in a communication network comprising a source device including: a first symmetrical key for encrypting data to be transmitted to a display device connected to the network; and the first symmetrical key encrypted with a second symmetrical network key known only to at least one display device connected to the network. When the source device needs to renew its first symmetrical key to encrypt new data, it generates a random number, then it calculates a new symmetrical key based on the first symmetrical key and on the random number. It then encrypts the data to be transmitted with the new symmetrical key and transmits to a display device, via the network: the data encrypted with the new symmetrical key, the random number, and the first encrypted symmetrical key with the second symmetrical network key.
Abstract:
A rotating tool includes a plurality of elongated members, and a support for holding the elongated members relative to an axis of rotation of the tool, wherein a guiding pad extends from at least one of the elongated members.
Abstract:
A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier. A variant allows (virtually) unlimited installations of time limited programs that are transformed into time unlimited programs once the installation token has reported the number to the software provider and paid for the necessary licenses. Also provided is the installation token.
Abstract:
Distinguishing between live and recorded content in a network comprising a rendering device, an access device, and a storage device. The rendering device broadcasts a message requesting devices in the network to respond if they diffuse a content, and sets a timer. The devices respond if they diffuse the content. The rendering device then determines that the content is: live, if it has received a response from the access device; recorded, if it has received a response from the storage device, but not from the access device; and illegal, if it has not received a response before time-out of the timer. There is further a “still live delay” after diffusion of the content during which the access device responds that it is diffusing the content, and following which it may send a content release message to the storage device that may then respond to request messages.
Abstract:
A layered audiovisual packet data stream, such as one obtained by a JPEG2000 encoder, is received together with information (metadata) about the contribution of each packet to the reduction of image distortion. The distortion-to-rate ratio for each packet is calculated and the packets are ordered in descending ratio. The non-encrypted packet having the highest ratio is encrypted until the target distortion is obtained. Also provided is an apparatus. In a variant, the data in the packets are substituted by dummy data instead of encrypted.