Abstract:
The present invention relates to a PCMCIA contacting unit for a conditional access module. The innovative contacting unit is economic to manufacture and provides enhanced flexibility for customising the unit to a client's preferences while meeting the physical and mechanical constraints required of a conditional access module for insertion into the slot of a host device.
Abstract:
New authentication features are proposed that are visible, can be authenticated with a mobile equipment and yet are challenging to counterfeit. In a possible embodiment, the surface of the authentication feature may have three-dimensional characteristics, which can be recognized by a handheld camera, such as a smartphone camera, while it cannot be easily reproduced by a simple scan and print procedure. In a further possible embodiment, at least two different viewpoints of the authentication feature may be acquired using a smartphone camera and the resulting images may be analyzed using the smartphone processor to identify the three-dimensional characteristics of the authentication feature. The manufacturing of the feature may be performed at a low cost by embossing the three dimensional structure on a surface. The authentication feature may be carried by a self-adhesive label or directly embedded on the product packaging.
Abstract:
In an embodiment, a communication device receives a request to establish a media session with a remote endpoint. In response to receiving the request, the communication device exchanges media-session control data with the remote endpoint on behalf of a local endpoint to establish the requested media session between the local endpoint and the remote endpoint. The communication device is communicatively connected to the local endpoint via a Personal Area Network (PAN) communication link. The communication device relays media-session payload data between the local and remote endpoints. The media-session payload data (i) is associated with the media session and (ii) is encrypted based on at least one payload-data cryptographic key that is not accessible to the communication device.
Abstract:
A method to protect a device key in a device comprising at least one secure element locally connected to at least one time programmable memory storing a global value in form of a bit string comprising locked bits and unlocked bits. The locked bits are irreversibly pre-programmed in the one-time-programmable memory during an initialization phase of the device while the unlocked bits remaining in an initial state may be programmable by the secure element. The secure element is configured to generate, at initialization of the device, a device specific value by using the global value, program the device specific value previously obtained in the one time programmable memory, and erase the global value by programming the unlocked bits of the corresponding bit string. A further object of the disclosure includes a device configured to carry out the method.
Abstract:
Techniques for pairing two different security modules that use two different encryption technologies for operation in two different networks include generation and transmission of a secret to both the security modules via their respective communication networks. In one advantageous aspect, one of the security module, which may be prone for duplication or theft, is logically tethered to the other security module via the pairing. For example, after pairing is successfully performed, the first security module may be usable in a wide area network only when its presence in a local communication connection, such as a home network of a subscriber, or a peer-to-peer or a near field communication link, can be detected and verified by the second security module.
Abstract:
As presented by a server machine or a device, a graphical user interface may include first and second panels presented on a display. The first panel may show a set of menu items that include a menu item that is highlighted by a shape that surrounds the menu item. The second panel may be presented adjacent to the first panel and may show a set of one or more sub-menu items that correspond to the highlighted menu item. In response to a selection of the highlighted menu item, the presenting of the graphical user interface may include presenting an animated transition that shows the first panel folding out of view underneath the second panel, the third panel unfolding into view from beneath the second panel, and the shape transitioning from surrounding the menu item in the first panel to surrounding a sub-menu item in the second panel.
Abstract:
Méthode de distribution de licences multimédias (LIR, LIS) par un serveur à une pluralité de dispositifs dans un système de distribution d'un service multimédia d'accès protégé par une première protection (KT1). Cette méthode vise à: - vérifier que les ressources de calcul utilisées par le serveur n'excèdent pas un seuil maximum, dans l'affirmative générer puis transmettre des licences régulières (LIR) incluant la première protection (KT1) en réponse à des requêtes des dispositifs, sinon basculer le serveur dans un mode singulier consistant à: -protéger l'accès au service multimédia par une seconde protection (KT2), indépendante de la première protection (KT1), -générer et transmettre aux dispositifs une licence singulière (LIS) incluant la seconde protection (KT2), - vérifier que les ressources de calcul n'excèdent pas le seuil maximum, dans l'affirmative, basculer du mode singulier à un mode régulier pour ne protéger l'accès au service multimédia qu'à l'aide de ladite première protection (KT1).
Abstract:
A method to manage raw genomic data (SAM/BAM files) in a privacy preserving manner in a biobank. By using order preserving encryption of the reads' positions,the method provides a requested range of nucleotides to a medical unit, without revealing the locations of the short reads (which include the requested nucleotides) to the biobank. The method prevents the leakage of extra information in the short reads to the medical unit by masking the encrypted short reads at the biobank. That is, specific parts of the genomic data for which the medical unit is not authorized or the patient prefers to keep secret are masked at the biobank, without revealing any information to the biobank.
Abstract:
An embodiment of the present invention may be deployed in a system comprising a media player and a remote server operably connected to communicate with one another. The invention allows for a settings file to be stored on the remote server, the settings file comprising parameters useful for adjusting different settings on the media player such that rendering of a particular content to be made possible on the media player according to a user's predetermined taste by downloading the settings from the server onto the media player.
Abstract:
The aim of the present invention is to enforce the watermarking on a content received by a client device, in particular to compressed video content. The present invention proposes a method to watermark a compressed content encrypted by at least one content key (CA key), said content key as well as pre-marking data forming CAS data, said CAS Data being encrypted by a transmission key and comprising at least one signature to authenticate all or part of the CAS Data, said compressed content being received by a client device comprising : - a Descrambler (103) having an input to receive the encrypted compressed content and an output to produce an compressed content, - a WM inserter (104) directly connected to the output of the Descrambler, said Descrambler and said WM inserter being connected with the Conditioner (200), said Conditioner executing the following steps : - receiving the CAS Data, - decrypting the CAS Data with the transmission key, - verifying the signature of the CAS Data, and if the signature is valid, - transferring the content key (CA key) to the descrambler (103) and the pre-marking data to the WM inserter, - watermarking by the WM inserter, the decrypted content received by the descrambler using the pre-marking data and the identifier.