Cryptoexperts SAS

France

Back to Profile

1-6 of 6 for Cryptoexperts SAS Sort by
Query
Aggregations
Jurisdiction
        World 4
        United States 2
Date
2022 1
2020 1
Before 2020 4
IPC Class
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols 3
H04L 9/08 - Key distribution 3
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 2
G16B 50/40 - Encryption of genetic data 2
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy 2
See more
Status
Pending 1
Registered / In Force 5
Found results for  patents

1.

METHODS FOR ENABLING SECURED AND PERSONALISED GENOMIC SEQUENCE ANALYSIS

      
Application Number 17612501
Status Pending
Filing Date 2020-05-26
First Publication Date 2022-09-15
Owner
  • CIRCAGENE LTD (United Kingdom)
  • CRYPTOEXPERTS SAS (France)
Inventor
  • Paillier, Francois
  • Palma, Jackeline
  • Pallier, Pascal
  • Rivain, Matthieu
  • Goubin, Louis

Abstract

Described herein is a secure integrated storage and analysis solution for personal genomic applications. The method guarantees data privacy whilst enabling access and ongoing analysis of genomic data when required. Described is a computer implemented homomorphic encryption method for securely producing natively encrypted sequencing data in a way that allows subsequent analysis on the encrypted data without requiring the file to be decrypted.

IPC Classes  ?

  • G16B 50/40 - Encryption of genetic data
  • G16B 20/20 - Allele or variant detection, e.g. single nucleotide polymorphism [SNP] detection
  • G16B 30/00 - ICT specially adapted for sequence analysis involving nucleotides or amino acids
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
  • G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records

2.

METHODS FOR ENABLING SECURED AND PERSONALISED GENOMIC SEQUENCE ANALYSIS

      
Application Number GB2020051268
Publication Number 2020/240167
Status In Force
Filing Date 2020-05-26
Publication Date 2020-12-03
Owner
  • CIRCAGENE LTD (United Kingdom)
  • CRYPTOEXPERTS SAS (France)
Inventor
  • Paillier, Francois
  • Palma, Jackeline
  • Pallier, Pascal
  • Rivain, Matthieu
  • Goubin, Louis

Abstract

Described herein is a secure integrated storage and analysis solution for personal genomic applications. The method guarantees data privacy whilst enabling access and ongoing analysis of genomic data when required. Described is a computer implemented homomorphic encryption method for securely producing natively encrypted sequencing data in a way that allows subsequent analysis on the encrypted data without requiring the file to be decrypted.

IPC Classes  ?

  • G16B 20/00 - ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G16B 50/40 - Encryption of genetic data
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

3.

Method and system for conditional access to a digital content, associated terminal and subscriber device

      
Application Number 13988993
Grant Number 09749129
Status In Force
Filing Date 2011-11-21
First Publication Date 2013-11-21
Grant Date 2017-08-29
Owner CRYPTOEXPERTS SAS (France)
Inventor
  • Delerablee, Cécile
  • Gouget, Aline
  • Paillier, Pascal

Abstract

A secure method for transmitting a control word between a server and a plurality of processing entities so as to respectively produce and utilize the control word. Preferably such a method is applied to the field of conditional access methods and systems for preventing the fraudulent use of compromised decryption keys resulting from a coalition of pirate hackers.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

4.

METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO A DIGITAL CONTENT, ASSOCIATED TERMINAL AND SUBSCRIBER DEVICE

      
Application Number FR2011053040
Publication Number 2012/080683
Status In Force
Filing Date 2011-12-16
Publication Date 2012-06-21
Owner CRYPTOEXPERTS SAS (France)
Inventor
  • Delerablee, Cécile
  • Gouget, Aline
  • Paillier, Pascal

Abstract

The invention relates to a method and a system for conditional access making it possible to prevent the fraudulent use of a subscriber electronic device (1a, 1b, 1m) and to thus effectively combat the fraudulent making available of protected contents. The invention further relates to the adaptation of such a device as well as to a method allowing the revocation of the latter if it is deemed to be illicitly exploited or its possible reinstatement.

IPC Classes  ?

5.

METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO A DIGITAL CONTENT, ASSOCIATED TERMINAL AND SUBSCRIBER DEVICE

      
Application Number FR2011052712
Publication Number 2012/069747
Status In Force
Filing Date 2011-11-21
Publication Date 2012-05-31
Owner CRYPTOEXPERTS SAS (France)
Inventor
  • Delerablee, Cécile
  • Gouget, Aline
  • Paillier, Pascal

Abstract

The invention relates to a secure method for transmitting a control word between a server (3) and a plurality of processing entities (Ea, Eb, Em) so as to respectively produce and utilize said control word. Preferably such a method is applied to the field of conditional access methods and systems for preventing the fraudulent use of compromised decryption keys resulting from a coalition of pirate hackers.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

6.

METHOD FOR IDENTIFYING A DEVICE USED BY A HACKED TERMINAL, AND RELATED DEVICE

      
Application Number FR2011050580
Publication Number 2011/117525
Status In Force
Filing Date 2011-03-21
Publication Date 2011-09-29
Owner CRYPTOEXPERTS SAS (France)
Inventor
  • Delerablee, Cécile
  • Gouget, Aline
  • Paillier, Pascal

Abstract

The invention relates to a method for preventing the fraudulent use of an electronic device and for thereby effectively controlling the fraudulent dissemination of protected content. The invention also relates to the modification of such a device and to a method enabling the permanent invalidation of said device, if considered to be illicitly used, or the optional reinstating of said device.

IPC Classes  ?