会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明公开
    • Method for providing information to determine a graph associated with a data item
    • 一种用于确定与数据元素的图形信息提供方法
    • EP3040891A1
    • 2016-07-06
    • EP14307219.7
    • 2014-12-31
    • Thomson Licensing
    • Neumann, ChristopheHeen, OlivierOnno, StephaneTaft, Nina Anne
    • G06F21/16G06F21/55
    • G06F17/30958G06F17/3033G06F21/16G06F21/55G06F2221/0737
    • In one embodiment, it is proposed a method for providing information to determine a graph associated with a data item, said graph being representative of a history of said data item in a network, and said graph comprising a set of vertices and a set of edges, each vertex being associated with an electronic device (101) of said network, and each edge linked at least two vertices being representative of a dataflow between said at least two vertices. The method is executed by an electronic device (101) and is remarkable in that it comprises:
      - verifying if an hash information derived from an obtained data item is comprised in a list of tracked data item (307) comprising a list of hashes, each hash being a hash of a first information related to a data item;
      - in the case that said hash information derived from said obtained data item is comprised in said list of tracked data item (307), transmitting in said network said information to determine a graph comprising a hash of a second information related to said obtained data item, when said obtained data item is obtained by said electronic device (101), and/or transmitted to another electronic device (203) in said network and/or a derived data item from said obtained data item is generated.
    • 在一个,实施例,提出了一种用于以确定性的矿提供信息与数据项相关联的曲线图,所述曲线图代表所述数据项的历史的网络中,并且所述图形包括一组顶点和一组边的 中,每个顶点被与在所述网络的电子设备(101)相关联,并且每一个边缘连接的至少两个顶点代表所述之间的数据流的至少两个顶点。 该方法是通过向电子设备(101)执行,并且是显着的中那样,它包括: - 验证如果散列从在获得的数据项导出的信息在跟踪的数据项(307)的列表由包含散列的列表,每个 散列是相关的数据项的第一信息的散列; - 在所述导出的散列信息从所述获得的数据项在跟踪的数据项(307)的所述列表包括在所述网络中传输的情况下,所述信息来确定的矿井,包括相关于所述第二信息的散列的曲线图获得的数据项 ,当所述获得的数据项是由所述电子设备(101)中获得,和/或反式mitted到在所述网络和/或导出数据项从所述获得的生成的数据项的另一电子设备(203)。
    • 2. 发明公开
    • Apparatus and method enabling interactive searches
    • Vorrichtung und Verfahren zurErmöglichungeiner interaktiven Suche
    • EP2827260A1
    • 2015-01-21
    • EP13306017.8
    • 2013-07-16
    • Thomson Licensing
    • Eluard, MarcMaetz, YvesHeen, Olivier
    • G06F17/30
    • G06F17/3064
    • A search server (220) receives a search query comprising at least one keyword from a device (210), performs (S12) a search and generates (S13) a response that is returned to the device (210). The response comprises the number of hits found in the search and, for each keyword, an indication of the number of hits a subsequent search excluding the keyword would return. In a preferred embodiment, the response also comprises a number of additional keywords and indications on the number of hits a subsequent search including the additional keywords would return. The response is displayed (S14) to a user, the indications can be given as a number or as graphical modifications - e.g. size or colour - to each keyword. The user can then use the information in the response to refine the request by removing or adding a keyword.
    • 搜索服务器(220)从设备(210)接收包括至少一个关键字的搜索查询,执行(S12)搜索并生成(S13)返回到设备(210)的响应。 响应包括在搜索中找到的命中数,并且对于每个关键字,排除关键字的后续搜索将返回的点击次数的指示。 在优选实施例中,响应还包括多个附加关键字和关于包括其他关键字将返回的后续搜索的命中次数的指示。 对用户显示响应(S14),指示可以作为数字或图形修改来给出。 大小或颜色 - 每个关键字。 然后,用户可以使用响应中的信息来通过删除或添加关键字来优化请求。
    • 3. 发明公开
    • Method and device for reliable estimation of network traffic
    • 用于可靠估计网络业务的方法和设备
    • EP2555470A1
    • 2013-02-06
    • EP11306010.7
    • 2011-08-03
    • Thomson Licensing
    • Courtay, OlivierHeen, Olivier
    • H04L12/26H04L29/06H04L12/24
    • H04W24/00H04L12/66H04L43/062H04L43/0876H04L63/1408
    • A network (100), advantageously a home network, comprises a number of user devices (110), for example personal computers, game consoles and smartphones, each having an estimator application (111), preferably voluntarily installed by the user. The network (100) further comprises a network device (120) that acts as an interface between the network (100) and an external network. The estimator applications (111) measure (210) the network traffic for its user device (110), while the network device (120) in parallel generates (220) an independent measurement of the network consumption. The measurements are then compared (230). If the difference between the sum of the measurements from the estimator applications and the measurement of the network device is below a fixed threshold, it is assumed that the measurements are valid for the considered measurement time interval. Otherwise, the difference is an indication that at least one estimation was incorrect.
    • 有利地,家庭网络的网络(100)包括多个用户设备(110),例如个人计算机,游戏控制台和智能手机,每个用户设备具有估计器应用(111),优选地由用户自愿安装。 网络(100)还包括充当网络(100)与外部网络之间的接口的网络设备(120)。 估计器应用(111)测量(210)其用户设备(110)的网络流量,而网络设备(120)并行产生(220)网络消耗的独立测量。 然后比较测量结果(230)。 如果来自估计器应用的测量值的总和与网络设备的测量值之间的差值低于固定阈值,则假定测量对于考虑的测量时间间隔是有效的。 否则,差异表明至少有一个估计是不正确的。
    • 5. 发明公开
    • Detecting client software versions
    • Erkennen von Client-Softwareversionen
    • EP2323032A1
    • 2011-05-18
    • EP10178828.9
    • 2010-09-23
    • Thomson Licensing
    • Heen, OlivierSalmon-Legagneur, CharlesMorvan, Michel
    • G06F9/445G06F9/44
    • G06F8/65
    • A method for detecting a version of a client software (210) in a network. A server (220) receives (201) a first request from the client software (210), sends (203) a first response comprising a first challenge to the client software (210), receives (205) a second request comprising an answer to the first challenge from the client software (210), and detects (207) the version of the client software (210) from at least the second request. The answer to the challenge is dependent on the version of the client software (210) and is expressed as a modification to a communication protocol used for the first and the second request. Also provided are a server (220), a client (210) and a computer program product (240).
    • 一种用于检测网络中的客户端软件(210)的版本的方法。 服务器(220)从客户软件(210)接收(201)第一请求,向客户软件(210)发送(203)包括第一挑战的第一响应(203),接收(205)包括答复的第二请求 来自客户端软件(210)的第一个挑战,并从至少第二个请求检测(207)客户端软件(210)的版本。 挑战的答案取决于客户端软件(210)的版本,并且被表示为用于第一和第二请求的通信协议的修改。 还提供了服务器(220),客户端(210)和计算机程序产品(240)。
    • 6. 发明公开
    • Semantic graphical password system
    • Semantisches grafisches Passwortsystem
    • EP2254071A1
    • 2010-11-24
    • EP09305554.9
    • 2009-06-17
    • Thomson Licensing
    • Maetz, YvesOnno, StéphaneHeen, Olivier
    • G06F21/00
    • G06F21/36
    • A graphical password system. A device (400) displays a background image (110) and a number of icons (130). In order to generate a password, a user selects (320) the background image (110) and then iteratively selects (330) and places (340) a number of icons on the background image (110). The user then instructs the device to generate (360) the password based on the background image (110), the selected icons (130) and their location, and possibly the order of input. As the placed icons (130) preferably modify the displayed screen, the invention can enable the creation of a semantic graphical password, which is easy to retain, while it at the same time is possible to make the password strong.
    • 图形密码系统。 设备(400)显示背景图像(110)和多个图标(130)。 为了生成密码,用户选择(320)背景图像(110),然后迭代地选择(330)并将多个图标放置(340)在背景图像(110)上。 然后,用户指示设备基于背景图像(110),所选择的图标(130)及其位置以及可能的输入顺序来生成(360)密码。 由于放置的图标(130)优选地修改显示的屏幕,本发明可以使得能够创建易于保留的语义图形密码,同时可以使密码变强。
    • 8. 发明公开
    • DEVICE AND METHOD FOR RECORD LINKAGE
    • VORRICHTUNG UND VERFAHREN ZURDATENSATZVERKNÜPFUNG
    • EP3093776A1
    • 2016-11-16
    • EP15305719.5
    • 2015-05-13
    • Thomson Licensing
    • Neumann, ChristophHeen, OlivierMaurice, Clémentine
    • G06F17/30
    • G06F17/30557
    • A method of and a server device (120) for record linkage. A processor (121) finds (S20) in memory (122) for the device (120) a first record and a second record having identical password equivalent values, sends (S22), via a communications interface (123), a notification to a client device (110), the notification comprising a token for the first record, the notification inviting the user to confirm a link between the first record and the second record, receives (S24), via the communications interface (123) and through a service linked to the second record, the token for the first record, verifies (S25) that the token received matches the token sent, and, in case of positive verification, links (S26) the first record and the second record.
    • 一种用于记录链接的方法和服务器设备(120)。 处理器(121)在存储器(122)中找到用于设备(​​120)的第一记录和具有相同密码等价值的第二记录(S20),经由通信接口(123)发送(S22)通知给 客户端设备(110),该通知包括第一记录的令牌,邀请用户确认第一记录和第二记录之间的链接的通知,经由通信接口(123)和通过服务接收(S24) 链接到第二记录的第一记录的令牌验证(S25)所接收的令牌是否匹配所发送的令牌,并且在正验证的情况下,链接(S26)第一记录和第二记录。
    • 9. 发明公开
    • Apparatus and method for data taint tracking
    • Vorrichtung und Verfahren zum Verfolgen vonDatenverfälschung
    • EP2953045A1
    • 2015-12-09
    • EP14305853.5
    • 2014-06-05
    • Thomson Licensing
    • Heen, OlivierNeumann, ChristophPlane, BenjaminOnno, Stéphane
    • G06F21/16G06F21/55
    • G06F21/16G06F21/552G06F2221/034G06F2221/0737
    • A controlled system (110, 120) performs internal taint tracking of data items. When a data item is created, the controlled system computes (202) a name and a taint for the data item and performs (204) an initialization function, thus informing a tracking entity (130) that of the name and data of the data item. The taint is propagated to further data items, while the name may change, and when a data item is exported to (210) or imported from a further device, the controlled system informs (216; 224; 232) the tracking entity (130) of the name and taint of the exported or imported data item as well as its source and destination. A controlled system (110, 120) may request (236) a propagation history from the tracking entity (130). As the tracking entity (130) is shared by more than one controlled system (110, 120), it is possible to perform taint tracking across controlled systems even if these do not use the same taint tracking framework.
    • 受控系统(110,120)执行数据项目的内部污点跟踪。 当创建数据项时,受控系统计算(202)数据项的名称和污点,并执行(204)初始化功能,从而通知跟踪实体(130)数据项的名称和数据 。 该污点被传播到另外的数据项目,而该名称可能改变,并且当数据项目被导出到(210)或从另一个设备导入时,受控系统通知(216; 224; 232)跟踪实体(130) 导出或导入的数据项目的名称和污点以及其来源和目的地。 受控系统(110,120)可以请求(236)来自跟踪实体(130)的传播历史。 由于跟踪实体(130)由多于一个受控系统(110,120)共享,所以即使不使用相同的污染跟踪框架,也可以跨受控系统执行污染跟踪。
    • 10. 发明公开
    • Proxy re-encryption methods and devices
    • PROXY-WIEDERVERSCHLÜSSELUNGSVERFAHRENUND -VORRICHTUNGEN
    • EP2892177A1
    • 2015-07-08
    • EP14305004.5
    • 2014-01-03
    • Thomson Licensing
    • Heen, OlivierJoye, MarcLibert, Benoît
    • H04L9/08H04L9/30H04L29/06
    • H04L9/30H04L9/0825H04L63/0464H04L63/0478H04L2209/76
    • The invention is directed to a proxy re-encryption scheme with limited delegations. To generate a ℓ-level ciphertext for a message, wherein ℓ is an integer, a ℓ-level ciphertext enabling ℓ - 1 re-encryptions and L -1 is a maximum number of possible re-encryptions, a processor (112) generates, in a ℓ-level group of prime order p , a ℓ-level encryption key for the ℓ-level ciphertext from a public key and a ℓ-level generator for the ℓ-level group; obtains a first ciphertext component by multiplying the message with a generator of a final group of a multi-linear configuration with L levels, the generator being raised to the power of an integer exponent; obtains a second ciphertext component by taking the ℓ-level encryption key to the power of the integer exponent; and outputs the ℓ-level ciphertext comprising the integer ℓ, the first ciphertext component and the second ciphertext component. In a preferred embodiment, the processor (112) includes an indicator of a time period in the ℓ-level ciphertext; and, if the integer ℓ > 1, obtains a third ciphertext component by taking a hash value over the time period to the power of the integer exponent and includes the third ciphertext component in the ℓ-level ciphertext that is output. Also provided are the re-encryption and decryption counterparts.
    • 本发明涉及具有有限授权的代理重新加密方案。 为了为消息生成“”级的密文,其中“”是整数,可以使“1”重新加密的“”级密文,而L -1是可能重新加密的最大数量,处理器 112)以“”级的初级阶段p生成用于“”级公开密钥的“”级加密密钥和“”级组的“”级生成器; 通过将消息与具有L个级别的多线性配置的最终组的生成器相乘来获得第一密文分量,生成器被提升为整数指数的幂; 通过将“”级加密密钥取为整数指数的幂来获得第二密文分量; 并输出包含整数“”的第一密文组和第二密文分量的“”级密文。 在优选实施例中,处理器(112)包括“”级密文中的时间段的指示符; 并且如果整数“> 1,则通过将整个指数的幂乘以时间周期的哈希值来获得第三密文分量,并且在输出的”“级密文中包括第三密文分量。 还提供了重新加密和解密对手。