|
|
Found results for
patents
1.
|
METHODS FOR ENABLING SECURED AND PERSONALISED GENOMIC SEQUENCE ANALYSIS
| Application Number |
17612501 |
| Status |
Pending |
| Filing Date |
2020-05-26 |
| First Publication Date |
2022-09-15 |
| Owner |
- CIRCAGENE LTD (United Kingdom)
- CRYPTOEXPERTS SAS (France)
|
| Inventor |
- Paillier, Francois
- Palma, Jackeline
- Pallier, Pascal
- Rivain, Matthieu
- Goubin, Louis
|
Abstract
Described herein is a secure integrated storage and analysis solution for personal genomic applications. The method guarantees data privacy whilst enabling access and ongoing analysis of genomic data when required. Described is a computer implemented homomorphic encryption method for securely producing natively encrypted sequencing data in a way that allows subsequent analysis on the encrypted data without requiring the file to be decrypted.
IPC Classes ?
- G16B 50/40 - Encryption of genetic data
- G16B 20/20 - Allele or variant detection, e.g. single nucleotide polymorphism [SNP] detection
- G16B 30/00 - ICT specially adapted for sequence analysis involving nucleotides or amino acids
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
- G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
|
2.
|
METHODS FOR ENABLING SECURED AND PERSONALISED GENOMIC SEQUENCE ANALYSIS
| Application Number |
GB2020051268 |
| Publication Number |
2020/240167 |
| Status |
In Force |
| Filing Date |
2020-05-26 |
| Publication Date |
2020-12-03 |
| Owner |
- CIRCAGENE LTD (United Kingdom)
- CRYPTOEXPERTS SAS (France)
|
| Inventor |
- Paillier, Francois
- Palma, Jackeline
- Pallier, Pascal
- Rivain, Matthieu
- Goubin, Louis
|
Abstract
Described herein is a secure integrated storage and analysis solution for personal genomic applications. The method guarantees data privacy whilst enabling access and ongoing analysis of genomic data when required. Described is a computer implemented homomorphic encryption method for securely producing natively encrypted sequencing data in a way that allows subsequent analysis on the encrypted data without requiring the file to be decrypted.
IPC Classes ?
- G16B 20/00 - ICT specially adapted for functional genomics or proteomics, e.g. genotype-phenotype associations
- G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
- G16B 50/40 - Encryption of genetic data
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
|
3.
|
Method and system for conditional access to a digital content, associated terminal and subscriber device
| Application Number |
13988993 |
| Grant Number |
09749129 |
| Status |
In Force |
| Filing Date |
2011-11-21 |
| First Publication Date |
2013-11-21 |
| Grant Date |
2017-08-29 |
| Owner |
CRYPTOEXPERTS SAS (France)
|
| Inventor |
- Delerablee, Cécile
- Gouget, Aline
- Paillier, Pascal
|
Abstract
A secure method for transmitting a control word between a server and a plurality of processing entities so as to respectively produce and utilize the control word. Preferably such a method is applied to the field of conditional access methods and systems for preventing the fraudulent use of compromised decryption keys resulting from a coalition of pirate hackers.
IPC Classes ?
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- H04L 9/08 - Key distribution
- H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
|
4.
|
METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO A DIGITAL CONTENT, ASSOCIATED TERMINAL AND SUBSCRIBER DEVICE
| Application Number |
FR2011053040 |
| Publication Number |
2012/080683 |
| Status |
In Force |
| Filing Date |
2011-12-16 |
| Publication Date |
2012-06-21 |
| Owner |
CRYPTOEXPERTS SAS (France)
|
| Inventor |
- Delerablee, Cécile
- Gouget, Aline
- Paillier, Pascal
|
Abstract
The invention relates to a method and a system for conditional access making it possible to prevent the fraudulent use of a subscriber electronic device (1a, 1b, 1m) and to thus effectively combat the fraudulent making available of protected contents. The invention further relates to the adaptation of such a device as well as to a method allowing the revocation of the latter if it is deemed to be illicitly exploited or its possible reinstatement.
|
5.
|
METHOD AND SYSTEM FOR CONDITIONAL ACCESS TO A DIGITAL CONTENT, ASSOCIATED TERMINAL AND SUBSCRIBER DEVICE
| Application Number |
FR2011052712 |
| Publication Number |
2012/069747 |
| Status |
In Force |
| Filing Date |
2011-11-21 |
| Publication Date |
2012-05-31 |
| Owner |
CRYPTOEXPERTS SAS (France)
|
| Inventor |
- Delerablee, Cécile
- Gouget, Aline
- Paillier, Pascal
|
Abstract
The invention relates to a secure method for transmitting a control word between a server (3) and a plurality of processing entities (Ea, Eb, Em) so as to respectively produce and utilize said control word. Preferably such a method is applied to the field of conditional access methods and systems for preventing the fraudulent use of compromised decryption keys resulting from a coalition of pirate hackers.
IPC Classes ?
- H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
|
6.
|
METHOD FOR IDENTIFYING A DEVICE USED BY A HACKED TERMINAL, AND RELATED DEVICE
| Application Number |
FR2011050580 |
| Publication Number |
2011/117525 |
| Status |
In Force |
| Filing Date |
2011-03-21 |
| Publication Date |
2011-09-29 |
| Owner |
CRYPTOEXPERTS SAS (France)
|
| Inventor |
- Delerablee, Cécile
- Gouget, Aline
- Paillier, Pascal
|
Abstract
The invention relates to a method for preventing the fraudulent use of an electronic device and for thereby effectively controlling the fraudulent dissemination of protected content. The invention also relates to the modification of such a device and to a method enabling the permanent invalidation of said device, if considered to be illicitly used, or the optional reinstating of said device.
|
|