会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Presence-based access control
    • 基于存在的访问控制
    • US20070192851A1
    • 2007-08-16
    • US11337767
    • 2006-01-23
    • Stephane OnnoAlain DurandEric Diehl
    • Stephane OnnoAlain DurandEric Diehl
    • H04L9/32
    • G06F21/35
    • To access services on a device, such as a computer, a user has a portable device in two parts: a plug adapted to be inserted in a USB port and a transponder that remains about his person. In a preferred embodiment, an access manager verifies that first the plug and then the transponder are identified. If so, the access manager verifies if plug and transponder have to be paired and if they have the proper access rights for the desired service. Only then is access given. In a further embodiment, more than one transponder is needed to access a certain service. It can thus be appreciated that the invention provides a flexible and secure way to secure access to services.
    • 为了访问诸如计算机的设备上的服务,用户具有两部分的便携式设备:适于插入USB端口的插头和保持在他的人身上的应答器。 在优选实施例中,访问管理器首先验证插头然后识别应答器。 如果是这样,访问管理器验证插头和转发器是否必须配对,并且是否具有所需服务的正确访问权限。 只有这样才能获得访问权限。 在另一实施例中,需要多于一个应答器来访问特定服务。 因此可以理解,本发明提供了一种灵活和安全的方式来确保对服务的访问。
    • 3. 发明申请
    • METHOD AND DEVICE FOR MANAGING A TRANSMISSION OF KEYS
    • 管理传播的方法和设备
    • US20100128873A1
    • 2010-05-27
    • US12312318
    • 2007-11-06
    • Mohamed KarroumiStephane OnnoAlain Durand
    • Mohamed KarroumiStephane OnnoAlain Durand
    • H04L9/00
    • H04N7/165H04N21/234327H04N21/2347H04N21/2662H04N21/4405H04N21/63345
    • The present invention concerns a method and a device for encrypting an encoded scalable enhancement frame sent by an emitter to a receiver, the enhancement frame comprising a plurality of complementary streams ordered in term of quality level, each complementary stream corresponding to a combination of more than one scalability type, where a complementary stream of a lower quality level corresponds to a lower quality on each scalability type, comprising at the level of the emitter the steps of generating a key per complementary stream for encrypting said complementary stream in such a way that all scalability types can be either simultaneously or individually used, said keys being generated in such a way that only the keys of the complementary streams of quality levels lower than the quality level of a complementary stream can be obtained from the key of said complementary stream, and sending the key of a complementary stream corresponding to a required quality level to the receiver, the key permitting a receiver to generate the keys of the complementary streams of the lower quality levels only. The present invention also concerns a method and a device for decrypting a received encoded scalable enhancement frame.
    • 本发明涉及一种用于加密由发射器发送到接收机的经编码的可缩放增强帧的方法和装置,所述增强帧包括在质量级别上排序的多个互补流,每个互补流对应于多于 一种可扩展性类型,其中较低质量水平的补充流对应于每种可扩展性类型的较低质量,包括在发射器的级别处产生用于加密所述互补流的每个互补流的密钥的步骤,使得所有 可扩展性类型可以同时或单独使用,所述密钥以这样一种方式生成,即只能从所述互补流的密钥获得质量水平的互补流的密钥低于互补流的质量水平,以及 将对应于所需质量水平的补充流的密钥发送给接收机t 他的密钥允许接收机仅产生较低质量级别的补充流的密钥。 本发明还涉及一种用于解密接收的经编码的可缩放增强帧的方法和装置。
    • 4. 发明授权
    • Method and device for managing a transmission of keys
    • 用于管理密钥传输的方法和设备
    • US08265271B2
    • 2012-09-11
    • US12312318
    • 2007-11-06
    • Mohamed KarroumiStephane OnnoAlain Durand
    • Mohamed KarroumiStephane OnnoAlain Durand
    • H04L9/00H04K1/00G06F21/00
    • H04N7/165H04N21/234327H04N21/2347H04N21/2662H04N21/4405H04N21/63345
    • The present invention concerns a method and a device for encrypting an encoded scalable enhancement frame sent by an emitter to a receiver, the enhancement frame comprising a plurality of complementary streams ordered in term of quality level, each complementary stream corresponding to a combination of more than one scalability type, where a complementary stream of a lower quality level corresponds to a lower quality on each scalability type, comprising at the level of the emitter the steps of generating a key per complementary stream for encrypting said complementary stream in such a way that all scalability types can be either simultaneously or individually used, said keys being generated in such a way that only the keys of the complementary streams of quality levels lower than the quality level of a complementary stream can be obtained from the key of said complementary stream, and sending the key of a complementary stream corresponding to a required quality level to the receiver, the key permitting a receiver to generate the keys of the complementary streams of the lower quality levels only. The present invention also concerns a method and a device for decrypting a received encoded scalable enhancement frame.
    • 本发明涉及一种用于加密由发射器发送到接收机的经编码的可缩放增强帧的方法和装置,所述增强帧包括在质量级别上排序的多个互补流,每个互补流对应于多于 一种可扩展性类型,其中较低质量水平的补充流对应于每种可扩展性类型的较低质量,包括在发射器的级别处产生用于加密所述互补流的每个互补流的密钥的步骤,使得所有 可扩展性类型可以同时或单独使用,所述密钥以这样一种方式生成,即只能从所述互补流的密钥获得质量水平的互补流的密钥低于互补流的质量水平,以及 将对应于所需质量水平的补充流的密钥发送给接收机t 他的密钥允许接收机仅产生较低质量级别的补充流的密钥。 本发明还涉及一种用于解密接收的经编码的可缩放增强帧的方法和装置。
    • 5. 发明授权
    • Device pairing
    • 设备配对
    • US08213613B2
    • 2012-07-03
    • US11198584
    • 2005-08-05
    • Eric DiehlJean-Pierre AndreauxLouis-Xavier CarbonnelAlain Durand
    • Eric DiehlJean-Pierre AndreauxLouis-Xavier CarbonnelAlain Durand
    • H04N7/167
    • H04N21/43615H04N7/163H04N21/44227H04N21/4623
    • The invention relates to pairing a slave device with a master device, for example decoders in a conditional access system. There is provided a security module that stores a device state that indicates whether a decoder shall be a master or a slave decoder. There is also provided a method in a conditional access system of providing a device with a device state stored on a security module. It is detected that the security module is in connection with the device and the device state is transferred from the security module to the device. There is further provided a method of pairing a slave device with a master device. The slave device asks the master device to identify itself, the master device returns an identification, and if the slave device has not yet been paired with a master device, it checks the identity of the master device and, if the identity is verified pairs with the master device. There is also provided a first, slave, device for pairing with a second, master, device. The first device comprises an interface for sending an identification command to and receiving an identification message from the master device, and a processor for checking the identity of the second device and pairing the first device with the second device.
    • 本发明涉及从属设备与主设备的配对,例如条件接入系统中的解码器。 提供了一种安全模块,其存储指示解码器是主器件还是从器件解码器的器件状态。 还提供了一种在条件访问系统中为设备提供存储在安全模块上的设备状态的方法。 检测到安全模块与设备连接,并且设备状态从安全模块传送到设备。 还提供了一种将从设备与主设备配对的方法。 从设备要求主设备自己识别,主设备返回一个标识,如果从设备尚未与主设备配对,则它检查主设备的身份,并且如果身份被验证与 主设备。 还提供了用于与第二主设备配对的第一从设备。 第一设备包括用于向主设备发送识别命令并从主设备接收标识消息的接口,以及用于检查第二设备的身份并将第一设备与第二设备配对的处理器。
    • 8. 发明授权
    • Methods and a device for secure software installation
    • 方法和安全软件安装的设备
    • US08219828B2
    • 2012-07-10
    • US12002691
    • 2007-12-18
    • Yves MaetzEric DiehlAlain DurandMichel Morvan
    • Yves MaetzEric DiehlAlain DurandMichel Morvan
    • G06F21/00
    • G06F21/123G06F2221/0797G06F2221/2137
    • A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier. A variant allows (virtually) unlimited installations of time limited programs that are transformed into time unlimited programs once the installation token has reported the number to the software provider and paid for the necessary licenses. Also provided is the installation token.
    • 一种用于安全安装软件应用程序的方法。 用户从软件提供商接收部分加密的软件和许可证的安装令牌,将软件和安装令牌插入计算机,并启动安装应用程序。 在安装应用程序和安装令牌之间建立安全认证通道,并将计算机的唯一标识符发送到安装令牌。 安装令牌验证是否剩余许可证,减少剩余许可证,授权安装并将解密密钥和证书/密钥对发送到解密和安装软件的安装应用程序,最好将安装与计算机的标识符相链接。 一个变体允许(虚拟)无限制地安装时间有限的程序,一旦安装令牌向软件提供商报告了数量并支付了必要的许可证,就会将其转换为无限制的程序。 还提供了安装令牌。
    • 9. 发明申请
    • Method for the anonymous authentication of a data transmitter
    • 数据发射机的匿名认证方法
    • US20050204132A1
    • 2005-09-15
    • US10510606
    • 2003-04-11
    • Eric DiehlJean-Pierre AndreauxAlain Durand
    • Eric DiehlJean-Pierre AndreauxAlain Durand
    • H04L9/32H04L29/06H04L9/00
    • H04L63/0407
    • The invention relates to a method whereby it can be checked whether data received by a receiver has been sent by a transmitter authorized by a trusted third party, the transmitter and the receiver being connected to a digital network. An identifier is associated with the data sent by the transmitter and, on receipt of the data by the receiver, the receiver generates a random number and diffuses the same on the network. The transmitter that receives said random number calculates a response by applying a first function to the random number and to the identifier, and sends said response to the receiver which verifies the response received by applying a second function to the response received, the random number and the identifier. The first function is delivered first to the transmitter by the trusted third part, and the second function is a function for checking the result of the first function which is delivered first to the receiver by the thrusted third party.
    • 本发明涉及一种可以检查由接收机接收的数据是否由被信任的第三方授权的发射机发送的,发射机和接收机连接到数字网络的方法。 标识符与发射机发送的数据相关联,并且在接收器接收到数据时,接收机产生一个随机数并将其扩散到网络上。 接收所述随机数的发射机通过对随机数和标识符应用第一函数来计算响应,并且通过对所接收的响应应用第二函数将所述响应发送给接收机,该接收机验证接收到的响应,随机数和 标识符。 第一功能由受信任的第三部分首先发送到发射机,第二功能是用于检查由推动的第三方首先发送给接收机的第一功能的结果的功能。