Abstract:
The present invention relates to mixed reality simulation in general, and more specifically to mixed reality simulation devices and systems for training purposes, for example in the medical field. The present invention proposes a mixed reality simulation method for rendering on a display a mixed reality scenario of a virtual environment adapted to a physical environment, the method comprising: acquiring, with a sensor, a position of a physical environment object; identifying a mismatch between a physical environment surface and a virtual environment surface, the mismatch depending on the physical environment object position and a mixed reality scenario parameter; and computing a mapping displacement for a virtual environment surface based on the identified mismatch.
Abstract:
The aim of the present invention is to ensure that a security module or conditional access module ("module") is used together with an authorised receiver/decoder to access pay TV content. The module uses a wireless transceiver to read an authorisation message from a wireless tag attached to the receiver/decoder to which it is connected. The authorisation message contains an identifier of the module and is encrypted with a system key. If the obtained identifier in the authorisation message is not the one of the security module, operation of the security module is blocked. The authorisation message is written by a communications device (located i.e. in a shop selling receiver/decoder devices) to a wireless tag attached to the receiver/decoder. Thus a sold receiver/decoder can be immediately operated together with a specific module.
Abstract:
Method and cryptographic system for descrambling content packets (15) included within a digital transport stream (10) together with conditional access messages (12) and header data (15') belonging to these content packets (15). This method requires a deciphering algorithm (35), processed by a descrambler (36) of a multimedia unit (30), using an initialization vector (33) as first input and a control word (13) as second input. This unit is connected with a security module (40) for processing the conditional access messages (12) and extracting thereof said control words (13). This initialization vector (33), or intermediate data (33') to determine the initialization vector (33), is the result of cryptographic function (44) based on at least one variable (43) extracted from the digital transport stream (10) and processed into the security module (40).
Abstract:
Method to customize an application associated with a television experience based on the recognition of users located in front of a display and in the field of view of a camera, comprising the following steps: -an initialization step during which each user is enrolled in a database of a computer system and is defined by a profile referenced by a profile ID and comprising the user name, biometric data and additional personal data, -a finding step during which a wide image, acquired by said camera is scanned to isolate at least one user's faces, to define a marking area surrounding it, to memorize the position of said marking areas, -a matching step to extract the biometric data from said marking area, to match them with the biometric data of the profiles stored in the database, and to assign the detected profile ID with the marking area. While subsequent identification is requested by the application, the following steps are executed -acquiring a wide image with the camera, -extracting the areas of said image according to the marking areas, -extracting for a particular marking area the biometric data of a face, -starting the comparison of the extracted biometric data with the biometric data of the profile ID related to this marking area, and in absence of match, continuing with the other biometric data of the database until one profile is found, -transmitting the found profile ID to the application.
Abstract:
According to the system and method of the invention a television event may be consumed after been stored in a mass memory of a multimedia unit such as a set top box but still fully relies on the security of a secure device. A conversion of a received content aims at firstly descrambling the content using control words included in entitlement control messages and immediately re-encrypting the descrambled content by a unique key, this key being generated specifically for this content. Access conditions attached to the entitlement control message containing the control word are temporarily stored and once the decryption is terminated, the secure device produces an information block. This information block containing for example access conditions and an identifier of the content is either stored into a secure memory of the secure device or stored in the mass memory with the encrypted content. The unique key is made up of a combination of a root key specific to the secure device and the information block.
Abstract:
The present invention proposes a method to mark and exploit at least one sequence record of a video presentation played on a multimedia unit, said method comprising the steps of : - during the video presentation, receiving a command from a user to mark a currently displayed video sequence, said command initiating the step of : - creating a sequence record comprising a time index or frame index, allowing to locate the proper part of the video presentation, and a reference of the video presentation, At a later stage, requesting the edition of the sequence record by : - adding textual information which corresponds to the actual sequence, - storing the sequence record.
Abstract:
The aim of the present invention is to propose a method for providing attribute-based encryption for conjunctive normal form (CNF) expressions, the said CNF expression comprising at least one clause over a set of attributes, the said method using a key generation engine, an encryption engine and a decryption engine.
Abstract:
A method to prevent, detect and fight against cloning attacks by using payload keys to encrypt request and response messages exchanged between user units and server. In an initialization phase, the user unit generates locally an initial payload key and sends to the server in a secure way a request comprising a unique identifier of the user unit, check data, the initial payload key and a request instruction encrypted with a payload key retrieved from the memory of the user unit. Each time the server receives a request from a user unit; it will retrieve the payload key by searching in its memory according to the unique identifier of the user unit. The obtained payload key is then used to decrypt the request instruction. The server then generates a derivation key as response key which will be used by the user unit to compute a new payload key. Doing this way, the payload key is modified preferably during each data exchange between user unit and server, allowing thus the server to check in the next incoming request from the same user unit if the payload key is the expected one. The server also stores a fallback payload key, which is the last one used by the user unit. By checking a status parameter at decryption with the expected payload key or with the fallback key, the server can, by applying predefined business rules, distinguish correct behaviors or authorized user units from unexpected system failures (network, storage, interferences, application software crash, etc.) and from true cloning attacks.
Abstract:
A method for monitoring an execution of a sequence of instructions of a data processing program (PR) in a security module (SM) associated to a multimedia unit (MU) connected to a managing center (MC) supplying control messages (ECM, EMM) authorizing the multimedia unit (MU) to access broadcast audio video content data streams. The security module (SM) comprises at least one processor (CPU) executing the data processing program instructions, a memory (M), and a monitoring module (MM) for analyzing the instructions before execution by the processor (CPU). The managing center (MC) comprises a security module emulator (EM) generating reference data sets (REF) by executing a sequence of instructions induced by data of a given control message (ECM, EMM) in the data processing program (PR). The reference data sets (REF) are appended to control messages (ECM, EMM) sent to the security module (SM) for verification. The monitoring module (MM) analyses a sequence of instructions of the data processing program (PR) for determining a check data set (CD) which is compared with a reference data set (REF) received from the control messages (ECM, EMM). When the reference data set (REF) matches with the check data set (CD), the data processing program (PR) continues its execution. Otherwise, the monitoring module (MM) sends an instruction (INT) to the processor (CPU) preventing further processing of the control messages (ECM, EMM) by the security module (SM).
Abstract:
The present invention concerns the field of tacking and authenticating genuine products such as tablets or pills manufactured by compressing powder The purpose of this invention is to provide a method to recognize tablets or pills by authenticate elements, those elements being very difficult to reproduce for the counterfeiters. Accordingly, the present invention proposes a method to authenticate genuine tablets manufactured by compressing powder between a punch/die set comprising the steps of at an initial stage - creating a microstructure on the surface of at least one of the face of the punch/die set, - compressing the powder between the punch and the die, - acquiring at least one reference image of the face of the tablet for which the punch/die set contains microstructure, And at a later stage - acquiring at least one test image of a tablet to be authenticated which is supposed to contain microstructure, - computing a level of similarity by an electronic device between the test image and each of the reference image, - comparing the computed level with a threshold value so as to define if the acquired tablet is genuine.