会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • A PROCESSOR-IMPLEMENTED METHOD FOR ENSURING SOFTWARE INTEGRITY
    • 一种用于确保软件完整性的处理器实现方法
    • WO2012010205A1
    • 2012-01-26
    • PCT/EP2010/060603
    • 2010-07-22
    • NAGRAVISION S.A.MACCHETTI, MarcoKUDELSKI, Henri
    • MACCHETTI, MarcoKUDELSKI, Henri
    • G06F21/22
    • G06F9/30178G06F21/54G06F21/72
    • The present invention provides a solution to the problem of guaranteeing the integrity of software programmes by encrypting all or part of each instruction of a programme using a key based on all or part of one or a plurality of previous instructions, thus resulting in a different encryption key per instruction. The invention is applicable to software programmes whose structures are not necessarily tree-like in nature and is also applicable when the programme includes loops, jumps, calls or breaks etc. The invention allows for an exception to be flagged when an encrypted instruction is wrongly decrypted. There is no need for the first instruction to be in clear, since the instruction key may be appropriately initialised as required. The invention can be realised in software or entirely in hardware thereby eliminating the possibility of a third party intercepting a decrypted instruction or a decryption key.
    • 本发明通过使用基于一个或多个先前指令的全部或部分的密钥加密程序的每个指令的全部或部分来提供软件程序的完整性的问题的解决方案,从而导致不同的加密 按指令键。 本发明适用于其结构本质上不一定是树状的软件程序,并且当程序包括循环,跳转,调用或中断等时也是适用的。本发明允许在加密指令被错误地解密时被标记的异常 。 不需要第一条指令清楚,因为指令键可以根据需要进行适当的初始化。 本发明可以以软件或完全在硬件中实现,从而消除了第三方拦截解密指令或解密密钥的可能性。
    • 2. 发明申请
    • DEVICE KEYS PROTECTION
    • 装置保护
    • WO2016091837A1
    • 2016-06-16
    • PCT/EP2015/078896
    • 2015-12-08
    • NAGRAVISION S.A.
    • HUNACEK, DidierMACCHETTI, MarcoFISCHER, Nicolas
    • G06F21/44
    • H04L9/003G06F21/445H04L9/006H04L9/3234H04L63/0435H04L63/0442H04L63/061
    • A method to protect a device key in a device comprising at least one secure element locally connected to at least one time programmable memory storing a global value in form of a bit string comprising locked bits and unlocked bits. The locked bits are irreversibly pre-programmed in the one-time-programmable memory during an initialization phase of the device while the unlocked bits remaining in an initial state may be programmable by the secure element. The secure element is configured to generate, at initialization of the device, a device specific value by using the global value, program the device specific value previously obtained in the one time programmable memory, and erase the global value by programming the unlocked bits of the corresponding bit string. A further object of the disclosure includes a device configured to carry out the method.
    • 一种用于保护设备中的设备密钥的方法,包括至少一个安全元件,本地连接到至少一个时间可编程存储器,其以包含锁定位和解锁位的位串的形式存储全局值。 锁定位在设备的初始化阶段期间在一次性可编程存储器中被不可逆地预编程,而处于初始状态的解锁位可以被安全元件编程。 安全元件被配置为在初始化设备时通过使用全局值来生成设备特定值,对先前在一次可编程存储器中获得的设备特定值进行编程,并通过编程所述全局值的解锁位来擦除全局值 相应的位串。 本公开的另一个目的包括被配置为执行该方法的设备。
    • 4. 发明申请
    • METHOD FOR WATERMARKING MEDIA CONTENT AND SYSTEM FOR IMPLEMENTING THIS METHOD
    • 用于实施该方法的媒体内容和系统的方法
    • WO2014173697A1
    • 2014-10-30
    • PCT/EP2014/057331
    • 2014-04-11
    • NAGRAVISION S.A.
    • HUNACEK, DidierSERVET, PatrickMACCHETTI, Marco
    • H04N21/8355H04N21/8358H04N21/4405H04N21/6334
    • H04N21/8358H04N21/4181H04N21/4405H04N21/63345H04N21/8355
    • The present invention refers to a method and a system (20) for watermarking digital media content (1) received by application software (APP) in a form of at least one encrypted sample (15). The digital media content (1) is related to metadata (10) assigned to each sample (15). The latter is encrypted by means of a sample key (Kc'). The metadata (10) comprises first data (11), second data (12) and a digital signature (13) resulting from the signature of said first and second data. The first data (11) comprises at least a content key (Kc) and watermarking metadata (WM) and at least said first data (11) is encrypted by a transport key (KT). The second data (12) comprises an initialization vector (IV) so that the content key (Kc) and the initialization vector (IV) form a unique pair of cryptographic data equivalent to the sample key (Kc'). The application software (APP) communicates with a secure environment (30) in charge of handling said metadata (10). The watermarking of the digital media content (1) is performed by the following steps: - instructing the application software (APP) to extract the metadata (10) from the digital media content (1) before transmitting the metadata (10) to the secure environment (30), - decrypting at least a part of the first data (11) by means of the transport key (KT), - verifying the authentication of said digitally signed data (11, 12) and in the case of positive outcome, then transmitting the content key (Kc) and the initialization vector (IV) to a descrambler (37) and transmitting the watermarking metadata (WM) to a watermarking unit (39), - transmitting the digital media content (1) to the descrambler (37) for descrambling each sample (15) by means of said pair of cryptographic data, - transmitting each descrambled sample (15') to the watermarking unit (39) for digitally marking it by means of at least said watermarking metadata, - transmitting the sample (15', 15") from the watermarking unit (39) to the application software (APP) or to a secure media path for rendering purposes.
    • 本发明涉及用于以至少一个加密样本(15)的形式对由应用软件(APP)接收的数字媒体内容(1)进行水印处理的方法和系统(20)。 数字媒体内容(1)与分配给每个样本(15)的元数据(10)有关。 后者通过样本密钥(Kc')进行加密。 元数据(10)包括由所述第一和第二数据的签名产生的第一数据(11),第二数据(12)和数字签名(13)。 第一数据(11)至少包括内容密钥(Kc)和水印元数据(WM),并且至少所述第一数据(11)由传输密钥(KT)加密。 第二数据(12)包括初始化向量(IV),使得内容密钥(Kc)和初始化向量(IV)形成与样本密钥(Kc')相当的唯一的密码数据对。 应用软件(APP)与负责处理所述元数据(10)的安全环境(30)进行通信。 通过以下步骤来执行数字媒体内容(1)的水印: - 在将元数据(10)发送到安全(1)之前,指示应用软件(APP)从数字媒体内容(1)提取元数据(10) 环境(30), - 通过所述传输密钥(KT)对所述第一数据(11)的至少一部分进行解密, - 验证所述数字签名数据(11,12)的认证,并且在肯定结果的情况下, 然后将内容密钥(Kc)和初始化向量(IV)发送到解扰器(37),并将水印元数据(WM)发送给水印单元(39), - 将数字媒体内容(1)发送到解扰器 37),用于通过所述一对加密数据对每个采样(15)进行解扰; - 将每个解扰的采样(15')发送到水印单元(39),以通过至少所述水印元数据对其进行数字标记; - 传送 来自水印单元(39)的样本(15',15“) 到应用软件(APP)或用于呈现目的的安全媒体路径。
    • 5. 发明申请
    • AGING CONTROL OF A SYSTEM ON CHIP
    • 芯片系统的老化控制
    • WO2016026846A1
    • 2016-02-25
    • PCT/EP2015/068923
    • 2015-08-18
    • NAGRAVISION S.A.
    • FAVI, ClaudioMACCHETTI, MarcoOSEN, Karl
    • G01R31/28G01R31/30G01R31/317
    • G01R31/2856G01R31/3016G01R31/31725G06F21/577G06F21/602G06F2221/034
    • A method to control aging of a system on chip comprising one or more devices including semiconductor circuit components and at least one aging controller monitoring electrical signals circulating inside the system on chip. The method comprises steps of stressing at least one device of the system on chip by varying hardware parameters related to its operating mode, comparing at least one parameter associated with an electrical signal produced by the at least one device with a reference parameter to determine a difference corresponding to an operating age value of the at least one device, if the operating age value equals or exceeds a threshold age value, determining a stress state value and modifying the operating mode of the at least one device according to the stress state value. A system on chip performing the method is also disclosed.
    • 一种用于控制芯片上的系统的老化的方法,包括一个或多个包括半导体电路部件的器件和至少一个老化控制器,监视在片上系统内循环的电信号。 该方法包括以下步骤:通过改变与其操作模式相关的硬件参数来对片上系统的至少一个设备进行加密,将与由至少一个设备产生的电信号相关联的至少一个参数与参考参数进行比较,以确定差异 对应于所述至少一个设备的运行年龄值,如果所述运行年龄值等于或超过阈值年龄值,确定应力状态值并根据所述应力状态值修改所述至少一个设备的操作模式。 还公开了一种执行该方法的片上系统。
    • 7. 发明申请
    • METHOD AND DEVICE TO PROTECT A CRYPTOGRAPHIC EXPONENT
    • 保护密码指数的方法和设备
    • WO2017198745A1
    • 2017-11-23
    • PCT/EP2017/061905
    • 2017-05-18
    • NAGRAVISION S.A.
    • MACCHETTI, MarcoVILLEGAS, Karine
    • H04L9/30H04L9/00
    • Since the publication of its principle, public-key cryptography has known important theoretical and practical developments. Notably, public-key cryptography has allowed putting into practice the concepts of digital signatures and of public-key key exchange; these methods are used on a daily basis in uncountable many digital systems. It is therefore proposed a method to generate a protected secret value k' used as a first operand in a cryptographic group operation involving a base group element G of order n and comprising: - generating random positive integers k1 and k2, that are strictly smaller than the order of the group element G thanks to a cryptographically secure random number generator, such that the generated random positive integers k1 and k2 do not share any divisor with the order n other than 1, - generating the protected secret value k' based on said generating random positive integers such as k' = k1 * k2, said protected secret value k' being used as a second operand in the group operation.
    • 自从其原理公布以来,公钥密码学已经知道了重要的理论和实践发展。 值得注意的是,公钥密码学已经允许实施数字签名和公钥密钥交换的概念; 这些方法每天都在不可数数的许多数字系统中使用。 因此提出了一种方法,用于在涉及n阶基本元素G的密码群操作中生成用作第一操作数的受保护秘密值k',并且该方法包括: - 生成随机正整数k1和k2,其严格小于 由于密码安全的随机数发生器,群组元素G的顺序使得所生成的随机正整数k1和k2不共享除1以外的n次级的任何除数, - 基于所述所述生成受保护的秘密值k' 产生随机正整数,例如k'= k1 * k2,所述受保护秘密值k'被用作组操作中的第二操作数。
    • 8. 发明申请
    • SYSTEMS AND METHODS FOR CONDUCTING SECURE VOIP MULTI-PARTY CALLS
    • 用于执行安全电话多方呼叫的系统和方法
    • WO2016193135A1
    • 2016-12-08
    • PCT/EP2016/061966
    • 2016-05-27
    • NAGRAVISION S.A.
    • FER, FrançoisMACCHETTI, MarcoGAUTERON, LaurentPERRINE, Jérôme
    • H04L29/06
    • H04L65/1006G06F17/30312H04L63/06H04L63/065H04L65/403H04L65/605H04M7/006H04W12/04H04W12/08
    • System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.
    • 用于建立安全电话会议的系统和方法。 在一个示例系统中,中央电话会议服务器与包括安全元件的附件设备建立点对点连接并连接到相应的参与者设备。 会议呼叫服务器包括与多个安全元件的接口,该多个安全元件被配置为对与辅助设备通信的媒体信号执行加扰和解扰频。 在另一示例中,参与者设备之一作为中央电话会议服务器。 在其他示例中,参与者设备通过连接到参与者设备的所有附件设备之间的点到点连接在电话会议上进行通信。 附件设备包括用于解密和加密在附件设备之间传送的媒体信号的安全元件。
    • 9. 发明申请
    • METHOD FOR GENERATING A VALUE INHERENT TO AN ELECTRONIC CIRCUIT, ELECTRONIC CIRCUIT GENERATING THIS VALUE AND METHOD FOR USING SUCH A VALUE
    • 产生电子电路价值的方法,产生此价值的电子电路和使用这种价值的方法
    • WO2016189070A1
    • 2016-12-01
    • PCT/EP2016/061867
    • 2016-05-26
    • NAGRAVISION S.A.
    • MACCHETTI, MarcoHAUTIER, RoanFAVI, ClaudioPERRINE, Jérôme
    • H03K3/84H04L9/08
    • H04L9/3278G09C1/00H03K3/84H04L9/0866
    • Method for generating a value (19) inherent to an electronic circuit (10) by means of measures of a physical quantity carried out on components (11) of this circuit; this method is intended to: calculate and associate to each component (11) at least one value (V) derived from a series of measures carried out on said component, the calculation of said value (V) being done by determining a statistical value from said series of measures and by defining said value (V) as being either said statistical value, or an uncertainty range calculated from this statistical value, form a collection of invariable pairs of components, select, in said collection, pairs so that said values (V) associated to the components of each of these pairs are spaced by at least one setpoint value, generate said value (19) inherent to the electronic circuit on the basis of results of comparisons of the values (V) associated to the components of each selected pair.
    • 用于通过在该电路的部件(11)上执行的物理量的测量来产生电子电路(10)固有的值(19)的方法; 该方法旨在:对每个组件(11)计算和关联从对所述组件执行的一系列测量得到的至少一个值(V),通过确定所述值(V)的统计值来计算所述值(V) 所述一系列措施并且将所述值(V)定义为所述统计值或从该统计值计算的不确定性范围,形成不变组分对的集合,在所述集合中选择对,使得所述值 V)与这些对中的每一个的组件相关联,间隔至少一个设定点值,基于与每个组件相关联的值(V)的比较结果,生成电子电路固有的所述值(19) 选择对。
    • 10. 发明申请
    • METHOD AND SYSTEM FOR SMART CARD CHIP PERSONALIZATION
    • 智能卡芯片个性化方法与系统
    • WO2014056876A1
    • 2014-04-17
    • PCT/EP2013/070889
    • 2013-10-08
    • NAGRAVISION S.A.
    • HAUTIER, RoanMACCHETTI, MarcoPERRINE, Jérôme
    • G06F21/31G06F21/44
    • H04L9/0897G06F21/31G06F21/44G06F21/572G06F21/76H04L9/0643H04L9/0869H04L9/0877H04L9/14H04L2209/24
    • A method and system configured for personalizing at least one chip (IC), intended to be integrated into a smart card, comprising a tester (T) associated to a (Field Programmable Gate Array) FPGA device (WB) connected to the chip (IC), the chip (IC) being part of a wafer (W) comprising an arrangement of a plurality of chips and a disposable hardware module (HM) for verifying presence of the chip (IC) on the wafer (W). The tester (T) sends a first secret code (S1) to the FPGA device (WB), which sends a command (C) to the chip to initiate a test mode activation. The FPGA device (WB) encrypts a second secret code (S2) by using a secret encryption algorithm (E) parameterized with a true random number (R) received from the chip (IC) and the first secret code (S1) to obtain a first cryptogram (M1) which is sent to the chip (IC).The chip (IC) determines a second cryptogram (M2) by carrying out a Boolean function (F) over a result obtained by decryption of the first cryptogram (M1) using the inverse of the secret encryption algorithm (E-) parameterized with the random number (R) and the first secret code (S1). The second cryptogram (M2) is compared with a calculated result F(S2) obtained by carrying out the Boolean function (F) over the second secret code (S2) temporarily stored on the chip (IC). The FPGA device (WB) performs personalization of the chip (IC) only if the test mode of the chip (IC) is enabled by a successful comparison between the second cryptogram (M2) and the calculated result F(S2).
    • 一种方法和系统,被配置为个性化旨在集成到智能卡中的至少一个芯片(IC),其包括与连接到芯片(IC)的(现场可编程门阵列)FPGA器件(WB)相关联的测试器(T) ),所述芯片(IC)是包括多个芯片的布置的晶片(W)的一部分,以及用于验证晶片(W)上的芯片(IC)的存在的一次性硬件模块(HM)。 测试器(T)向FPGA器件(WB)发送第一密码(S1),该器件向芯片发送命令(C)以启动测试模式激活。 FPGA器件(WB)通过使用由从芯片(IC)和第一密码(S1)接收的真随机数(R)参数化的秘密加密算法(E)来加密第二密码(S2),以获得 发送到芯片(IC)的第一密码(M1)。芯片(IC)通过对通过第一密封(M1)的解密获得的结果执行布尔函数(F)来确定第二密码(M2) 用随机数(R)和第一密码(S1)参数化的秘密加密算法(E)的倒数。 将第二密码(M2)与通过临时存储在芯片(IC)上的第二秘密码(S2)执行布尔函数(F)而获得的计算结果F(S2)进行比较。 仅当通过第二密码(M2)和计算结果F(S2)之间的成功比较来启用芯片(IC)的测试模式时,FPGA器件(WB)才执行芯片(IC)的个性化。