摘要:
There are times when a first user may wish to distribute an excerpt of a protected digital content to a second user, for example for criticism. The protected digital content is divided into a plurality of parts, each part being encrypted using a control word specific for the part, wherein each control word can be generated from a master control word for the protected digital content. A device belonging to the first user selects the parts of the excerpt; generates the control words for the selected parts from the master control word; generates a license for the selected parts, the license comprising the control words for the selected parts; and transmits the selected parts and the license to the receiver of the second user. Also provided is the device of the first user.
摘要:
A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch, a component, advantageously a processor, and a time usage limiter. The antenna is adapted to transform received RFID signals to electric energy that powers the component and the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. The time usage limiter counts down a timer when it is powered via the rotational switch and disables the RFID tag when the timer expires. Supports equipped with the RFID tag of the invention will thus respond until the timer expires, and preferably only if they rotate sufficiently.
摘要:
A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch and a component, advantageously a processor. The antenna is adapted to transform received RFID signals to electric energy that powers the component. In a preferred embodiment, the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. Supports equipped with the RFID tag of the invention will thus respond only if they rotate sufficiently. This can avoid collisions in case more than one such RFID tag is within communication range of an antenna of a reader. In a preferred embodiment, the information returned by the component is needed for full use of the content on the support.
摘要:
Within the context of the broadcasting of DVB services over an IP network, the trend is to separate the signalling information describing the network and the services offered from the services themselves. The signalling is made available to the terminals via XML files available on HTTP servers. In contrast to this approach, the invention consists of a method of recognition, by a receiver connected to a bidirectional network, of digital services on the bidirectional network, which comprises a step in which the receiver connects to a first stream, a step in which the receiver extracts from said stream information on the location on the network, on the one hand, of streams conveying the content of these services and, on the other hand, of separate streams conveying information describing these services, a step in which the receiver connects to at least some of the streams conveying service description information to obtain information on these services and a step in which the receiver uses this information to construct a list, possibly unitary, of the services available on the network.
摘要:
A method for acquisition of a software application stored on a software application distribution unit and intended to be supplied to a user computer unit is disclosed wherein, the user computer unit communicates an item of identification information identifying the software application to be acquired to an electronic security module connected to the user computer unit. The module generates, using a secret and identification information, an item of user information and transmits it with the identification information to the unit. The unit protects with the user information the software application identified by the identification information and the protected software application is transmitted to the user computer unit. Thus, the software application is protected with an item of information from the electronic security module of the user. The protected software application then has its protection removed on an electronic security unit equipped with an electronic security module.
摘要:
A 3D object is protected by a first device that receives the 3D object, permutes the coordinates of at least one dimension of at least some of the points of the 3D object to obtain a protected 3D object, and outputs the protected 3D object. The coordinates of the dimensions are preferably permuted independently of the permutations of the other dimensions. The protected 3D object is unprotected by a second device (140) by receiving the protected 3D object, permuting the coordinates of at least one dimension of at least some the points of the protected 3D object to obtain an unprotected 3D object, and outputting the unprotected 3D object. Also provided are the first device, the second device and computer readable storage media.
摘要:
The present invention relates to a device and a process for acquiring files by accumulation of points. The device is designed for a user of a receiver of data of a communication network, able to earn points by accomplishing at least one predefined operation, and to acquire at least one of the files by downloading via this communication network, when the aggregate number of points reaches a predetermined level associated with this file. The device comprises an automatic control module for ordering downloading via this network to a storage space accessible to this receiver, of portions of this file, designed to order the downloading of each of these portions when the number of points earned by this user reaches a fraction of this predetermined level which corresponds to this portion.
摘要:
The present invention relates to IP networks and, more particularly, local area networks, for example home networks. It concerns the manner in which devices connected to such networks obtain and update knowledge of the other compatible devices connected to the network. To do this, the invention is based on a finite-state machine, comprising connected, disconnected and standby states. The changes of state take place on receipt of messages, requests or replies from the other devices, or on expiry of timers in the absence of receipt of messages.
摘要:
The invention relates to a process for transmitting service information in a television system. The invention relates more particularly to the providing of an upgradeable summary tied to the broadcasting of an event. Versions of the summary are transmitted at certain moments in the service information. These versions are concatenated in the receiver so that the result of the concatenation constitutes a summary of that part of the event which has already been broadcast.The invention also relates to a receiver for receiving service information in such a television system, to the process for processing this service information at the level of this receiver and to the transmitter implementing the transmission process according to the invention.
摘要:
A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier. A variant allows (virtually) unlimited installations of time limited programs that are transformed into time unlimited programs once the installation token has reported the number to the software provider and paid for the necessary licenses. Also provided is the installation token.