A system (1) for asymmetrical cryptography, comprising a device (10) and a network storage (30), wherein the device is communicatively connected to the network storage, wherein the network storage is configured to store a private key, wherein the device is configured to retrieve the private key from the network storage to perform a cryptographic operation using the private key in a secure execution environment (12) of the device, and wherein the secure execution environment is configured to only temporarily store the private key for the cryptographic operation.
A method is proposed for acquiring, from a server, configuration information by a reception device connected to the server through a first network, the configuration information allowing the update of the internal setting of the reception device. Such method comprises, during an initialization stage:
providing a filtering information allowing to obtain a filtering item to a communication interface; and during an operation stage:
providing a request for the configuration information to the communication interface for allowing a terminal equipment connected to the server through a second network to obtain the request and to send a corresponding request to the server;
receiving the configuration information provided by the server as part of a data stream sent through the first network.
H04N 21/254 - Management at additional data server, e.g. shopping server or rights management server
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
The method of proximity detection between a first and a second device (DVC1, DVC2), carried out by the first device (DVC1), comprises the steps of collecting a first information on exposure of the first device (DVC1) to electromagnetic waves; receiving a second information on exposure of the second device (DVC2) to electromagnetic waves from the second device (DVC2); determining a matching information between the first information on exposure and the second information on exposure and detecting either proximity or non-proximity between the first and the second device (DVC1, DVC2) based on the matching information.
A computer-implemented method of controlling access by a third-party continuous integration/continuous delivery (herein, “CI/CD”) system to a trusted computing environment comprises: receiving, from the CI/CD system, a request to access the trusted computing environment in order to execute a first operation; in response to receiving the request to access the trusted computing environment, executing a security protocol configured to determine whether execution of the first operation is permitted, execution of the security protocol comprising: accessing a permitted operation database storing one or more digital signatures, each digital signature corresponding to a respective operation, execution of which is permitted within the trusted computing environment; determining whether a first digital signature is present in a permitted operation database, the first digital signature having been generated based on a portion of the request corresponding to the first operation; and in response to a determination that the first digital signature is present in the permitted operation database, determining that execution, by the CI/CD system, of the first operation within the trusted computing environment is permitted. An equivalent interceptor module, computer program, and computer-readable medium are also provided.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
5.
METHOD OF GENERATING AN OUTPUT BINARY WORD FROM AN INPUT BINARY WORD, METHOD OF PERFORMING AN ARITHMETIC OPERATION ON AN INPUT BINARY WORD ASSOCIATED TO AN OUTPUT BINARY WORD, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES
A method is proposed for the generation of an output binary word from an input binary word. Such method comprises: - executing a first floating-point multiplication (S200) wherein the input binary word interpreted as an integer number is multiplied with a first predetermined number of floating-point type, resulting in a first argument number of floating-point type; - applying a predetermined invertible function (S220) to the first argument number delivering a first output number of the floating-point type, the output binary word being based on the first output number. The predetermined invertible function is configured to have the first output number having a non-null output rounding error resulting in having an application, to the first output number, of an invert function of the predetermined invertible function that delivers an input number of the floating-point type corresponding to the input operand with a non-null input error.
Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.
H04N 21/2347 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04N 7/167 - Systems rendering the television signal unintelligible and subsequently intelligible
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/418 - External card to be used in combination with the client device, e.g. for conditional access
H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
H04N 21/4623 - Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
7.
METHOD AND APPARATUS TO CREATE INTUITIVE FAVORITES FOR USERS
Example embodiments provide systems and methods for dynamically creating intuitive favorites for a user. The system and methods include monitoring actions performed, by the user at a digital receiver, with respect to a plurality of content programs. The actions performed with respect to the plurality of content programs are analyzed. The analysis includes comparing a level of the actions with respect to a first content program of the plurality of content programs with a threshold. Based on the comparing indicating that the first content program is a favorites, an indication that the first content program is a favorites content program is stored to a data store.
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors
8.
DETERMINING DIGITAL CONTENT VIEWING REALIZATION RATES AND TRANSMITTING INSTRUCTIONS TO A CONTENT DISPLAY DEVICE BASED ON THE CONTENT VIEWING REALIZATION RATES VIA PROCESSING CIRCUITRY
A method, device, and computer readable medium that receives a measured electricity usage of a plurality of devices, receives a set of metric information of the plurality of devices, determines, based on the measured electricity usage of the plurality of devices, a first current content viewing realization rate by determining a non-base electricity usage compared to a base electricity usage and corresponding time periods of the non-base electricity usage, determining time periods when content is being displayed, and determining whether the corresponding time periods of the non-base electricity usage occur at overlapping time periods when the content is being displayed, determines, based on the set of metric information, a second current content viewing realization rate, and modifies, based on the first current content viewing realization rate and the second current content viewing realization rate, a running content viewing realization rate.
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
A method, device, and computer-readable medium for provisioning a networked device with digital security credentials, including receiving a first digital certificate of a secure component associated with the networked device; extracting a public key of from the first digital certificate, the public key and a corresponding private key being stored in the secure component for asymmetric cryptography; receiving a product identifier and a vendor identifier associated with the secure component from a first user device; generating a second digital certificate based on the public key of the secure component, the product identifier, and the vendor identifier; and transmitting the second digital certificate to the networked device associated with the secure component, the networked device being configured to generate a device commissioning request based on the second digital certificate and the private key of the secure component.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Aspects of the disclosure provide systems and methods to improve network security using VLAN splicing. A networking device can create multiple VLANs and place different devices on different VLANs. To enable communication between devices on different VLANs, the networking device "splices" two or more VLANs together. When packets originating from a device on a first VLAN are directed to a device on a second VLAN and the two VLANs are spliced together, the networking device processes and forwards the packets. For example, the packets may be decrypted using a decryption key of the first VLAN and encrypted using a decryption key of the second VLAN. For cross-VLAN packets of VLANs that are not spliced together, the networking device drops the packets.
Systems and techniques are described herein for communicating a status of a device. For instance, a method for communicating a status of a device is provided. The method may include: generating, by the device, a security key associated with the status of the device; providing the security key to a controller, wherein the device is configured to communicate via a first communications protocol, and wherein the controller is configured to communicate via a second communications protocol; generating, by the device, a status indicator indicative of the status of the device; encrypting, by the device, the status indicator using the security key to generate an encrypted status indicator; and transmitting, by the device to a networking device, the encrypted status indicator according to the first communications protocol.
GENERATING A SECURED ENHANCEMENT VIDEO LAYER INCLUDING A PERSONALIZED WATERMARK FOR PREVENTING UNAUTHORIZED VIDEO DATA DISTRIBUTION VIA PROCESSING CIRCUITRY
A method, device, and computer readable medium that applies a personalized watermark to an enhancement video layer, the enhancement video layer configured to adjust a quality level of a base video layer when applied to the base video layer, the base video layer having a first quality level, the base video layer generated from source video data.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/8358 - Generation of protective data, e.g. certificates involving watermark
13.
DATA PROCESSING COMPONENT, SOLID-STATE STORAGE DEVICE, AND CORRESPONDING COMPUTER-IMPLEMENTED METHOD
A data processing component for controlling storage of data to a solid-state storage device comprising a plurality of N physical storage blocks comprises a controller and a memory, wherein: the memory stores a mapping between a plurality of M logical storage blocks accessible by an operating system of a computing device and a respective physical storage block of the plurality of N physical storage blocks; and the controller is configured, in response to receiving a request from the operating system to store incoming data in a first specified logical storage block which is mapped to a first physical storage block, to execute a method comprising: determining that the first specified logical storage block is unavailable for the storage of incoming data, and in response to determining that the first specified logical storage block is unavailable for the storage of incoming data: identifying a second physical storage block of the plurality of N physical storage blocks for storage of the incoming data based on a history value of the second physical block, the history value indicative of a most recent time at which that physical storage block was updated and/or a number of times that that physical storage block has been updated; and storing the incoming data in the second physical storage block. A solid-state storage device and computer-implemented method are also provided.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
The disclosure provides methods and content consumption devices that enable a scene, for example a 360° scene, that is larger (i.e. has more pixels in at least one dimension) than a display format of the content consumption device to be displayed. Constituent scene views are received individually by the content consumption device, for example as broadcasts, and are combined, for example stitched together, at the content consumption device to output a part of the scene that fits in the display format. The part of the scene (and hence the required constituent streams) to be displayed are determined by a signal, for example a navigational input from a user, enabling the user to navigate in the scene. By, for example, receiving a limited number of scene streams based on the scene streams required to produce the view that fits in the display format based on the signal, bandwidth requirements to view and navigate within the scene.
H04N 23/698 - Control of cameras or camera modules for achieving an enlarged field of view, e.g. panoramic image capture
G06T 3/067 - Reshaping or unfolding 3D tree structures onto 2D planes
G06T 3/4038 - Image mosaicing, e.g. composing plane images from plane sub-images
H04N 21/2368 - Multiplexing of audio and video streams
H04N 21/434 - Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams or extraction of additional data from a video streamRemultiplexing of multiplex streamsExtraction or processing of SIDisassembling of packetised elementary stream
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/4728 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content for selecting a ROI [Region Of Interest], e.g. for requesting a higher resolution version of a selected region
A data processing component comprises a fault attack shielding and detection arrangement. Specifically, the data processing component comprises: a first layer comprising: a first data processing element, the first data processing element configured to receive a control input and to execute a predetermined operation on the control input to generate a control output; and a first comparator configured to compare the control output with an expected control output, and to generate a fault status signal if the control output is different from the expected control output; and a second layer comprising: a second data processing element identical to the first data processing element, configured to receive a first operational input and to execute the same predetermined operation on the first operational input to generate a first operational output. A computer processor may comprises the data processing component.
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06F 11/16 - Error detection or correction of the data by redundancy in hardware
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering
16.
GENERATING AND TRANSMITTING A TOKEN FOR ACCOUNT AUTHENTICATION ACROSS MULTIPLE PLATFORMS VIA PROCESSING CIRCUITRY
A method includes receiving, from a first application on a user device, a first sign-on request for obtaining access to content from a first content provider server; transmitting, to the first application, a token in response to receiving the first sign-on request, the token being accessible on the user device, the token providing access to the content on the first content provider server in response to the user device providing the token to the first content provider server; receiving, from a second application, the token and a second sign-on request for obtaining access to content from a second content provider server, the first application having determined the second application to be authorized to receive the token during the token request; and authorizing access to the content of the second content provider server to the second application.
A method of detecting unauthorized use of a vehicle having a tracker device. The method includes transmitting a discovery message received by a wireless device, a backend server receiving a first request from the wireless device as a result of the wireless device receiving the discovery message, the first request being for having the tracker device be paired with the wireless device, and receiving a second request from the backend server instructing the tracker device to pair with the wireless device, the second request containing a unique identifier of the wireless device.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
Anonymous access may be provided using an authorization gateway. Anonymous access reuses objects in different extended reality environments rather than having each object be restricted to a single environment. Anonymous access increases privacy when using different environments. The user and the extended reality server communicate via an authorization gateway, preventing the extended reality server from directly gathering user information. A token issuing authority may issue tokens in response to payment and forward the payment to an extended reality provider. The user pays the token issuing authority and receives a token that does not identify the user. The token issuing authority forwards the payment to the extended reality provider. The user provides the token to the authorization gateway, which communicates with the extended reality server to provide the extended reality environment to the user. Thus, the user's payment is verified by the authorization gateway without specifically identifying the user.
A method for concurrently executing a first block cryptographic computation (60) and a second block cryptographic computation (61) using a ciphering circuit. The first block cryptographic computation includes computing a first output block (42) by executing a plurality of first processing rounds (70i, 78) based on a first input block (38, 64), and the second block cryptographic computation includes computing a second output block (43) by executing a plurality of second processing rounds (75j, 79) based on a second input block (39, 65). The method further includes alternatingly executing respective first and second processing rounds in a round-interleaved sequence.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
20.
METHODS, UNIT AND DEVICE FOR SUCCESSIVELY EXECUTING FIRST AND NEXT BLOCK CRYPTOGRAPHIC COMPUTATIONS
A method for successively executing first and subsequent block cryptographic computations. These cryptographic computations include transforming a respective input block (38, 64) composed of a plurality of elements (107k), via a plurality of linear transformations (109, 115, 116, SR) and non-linear transformations (112), into a corresponding output block. The method includes:
implementing a functional correspondence between input and output of the non-linear transformations (112) applied on the elements of the first input block (38, 64) during the first block cryptographic computation, and
applying dynamical obfuscation (124) by re-encoding the functional correspondence into a modified functional correspondence between the input and the output of the non-linear transformations applied on elements of the next input block during the next block cryptographic computation.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A pairing method between a user device (1) and an operator device (2), the user device (1) being intended to receive conditional access data from the operator device (2), the user device having a user device identifier (UID), the operator having an operator device identifier (OID). The method comprises receiving, by the user device, a user device key (KUID) derived from a first cryptographically secure function and receiving, by the operator device, an operator key (KOID) derived from a second cryptographically secure function. The user device comprises a user device bilinear mathematical function (e(KUID, OID)) and the operator device comprises an operator bilinear mathematical function (e(UID, KOID)) which each define a pairing over an elliptic curve. The method includes generating, by the operator device (2), a pairing key (KD=e(UID, KOID)) between the user device (1) and the operator device (2), using the operator key (KOID) and the device identifier (UID) as variables of the operator mathematical function (e(UID, KOID)). The user device (1) generates the same pairing key (KD=e(KUID, OID)) using the user device key (KUID) and the operator device identifier (UID) as variables of the user device mathematical function e(KUID, OID).
A block cipher method and apparatus using round repetition for providing, from a plaintext message (10), a ciphertext message (50) and a global tag (52) is disclosed. The plaintext message is converted into a plurality of ordered plaintext blocks (11) which are successively processed during a round for computing:—a cryptogram (30) by encrypting input data (20) using a single cryptographic key, said cryptogram comprising a first segment (31) and a second segment (32)—a ciphertext block (51) by performing a first operation (41) using, as operands: said first segment (31) said current plaintext block (11) and said second segment (32). At each next round said input data is newly determined based on the current ciphertext block and an updated reproducible data. The ciphertext message is determined by concatenating the ciphertext blocks and the global tag by a second operation (42) using computed authentication local tags as operands.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method for training a machine learning model for locating an asset in an environment when the machine learning model is executed on a computer system The method comprises receiving data corresponding to a plurality of training signals. The plurality of training signals are received at a plurality of receivers from a plurality of training tags located in the environment. The environment has a plurality of zones, and each of the training tags is associated with a zone in which it is located. The method further comprises generating training data for a first zone of the plurality of zones, wherein the training data for the first zone includes values of the training signals received from training tags located in the first zone, each value associated with the receiver at which a respective training signal was received. The method further comprises generating training data for a second zone of the plurality of zones, wherein the training data for the second zone includes values of the training signals received from training tags located in the second zone, each value associated with the receiver at which a respective training signal was received. The method further comprises training, using the training data for the first zone and the training data for the second zone, a machine learning model to output a zone as a determined location of an asset in the environment based on an input which includes data corresponding to one or more signals received at one or more receivers from a tag associated with the asset.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
G01S 5/16 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using electromagnetic waves other than radio waves
G01S 5/18 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using ultrasonic, sonic, or infrasonic waves
A method for training a machine learning model for locating an asset in an environment when the machine learning model is executed on a computer system, wherein the environment comprises a plurality of zones. The method comprises receiving data corresponding to a first set of training signals, wherein the first set of training signals are received at a plurality of receivers, within a first data collection period, from a plurality of training tags located in a first zone of the plurality of zones. The plurality of training tags are moved from a first position in the first zone to a second position in the first zone within the first data collection period. The method also comprises receiving data corresponding to a second set of training signals, wherein the second set of training signals are received at the plurality of receivers, within a second data collection period, from a plurality of training tags located in a second zone of the plurality of zones. The plurality of training tags are moved from a first position in the second zone to a second position in the second zone within the second data collection period. The method further comprises generating training data for the first zone, wherein the training data for the first zone comprises values of the training signals received from training tags located in the first zone within a first predefined deviation window, Wt, within the first data collection period, each value associated with the receiver at which a respective training signal was received. The method further comprises generating training data for the second zone, wherein the training data for the second zone comprises values of the training signals received from training tags located in the second zone within a second predefined deviation window, Wt', within the second data collection period, each value associated with the receiver at which a respective training signal was received. The method also comprises training, using the training data for the first zone and the training data for the second zone, a machine learning model to output a zone as a determined location of an asset in the environment based on an input including data corresponding to one or more signals received at one or more receivers from a tag associated with the asset.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G01S 5/16 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using electromagnetic waves other than radio waves
G01S 5/18 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using ultrasonic, sonic, or infrasonic waves
25.
SYSTEMS AND TECHNIQUES FOR PROCESSING NON-FUNGIBLE TOKENS
Aspects of the present disclosure include systems and techniques for processing non-fungible tokens. In some aspects, the techniques described herein relate to a method for non-fungible token (NFT) processing, including: encrypting information associated with an NFT using a first key of a key pair to yield encrypted NFT information; retrieving, from at least two entities, at least two key sections associated with a second key of the key pair: decrypting the encrypted NFT information associated with the NFT via the at least two key sections to yield decrypted NFT information; and outputting the decrypted NFT information.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
26.
AUTOMATED VIDEO CLIP NON-FUNGIBLE TOKEN (NFT) GENERATION
Certain aspects of the present disclosure are directed towards a method for non-fungible token processing. The method generally includes identifying a trigger for generating a non-fungible token associated with a video clip, extracting a portion of the video clip in response to identifying the trigger, generating the non-fungible token corresponding to the portion of the video clip, and outputting the non-fungible token for hosting on a platform.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method for tracking the processing of an initial digital asset according to at least one processing step delivering an output digital asset from at least one input digital asset, which is a function of the initial digital asset. The method includes watermarking the output digital asset with a watermark, representative of an identifier of the output digital asset; and creating, in a blockchain, metadata associated to the output digital asset, the metadata being associated with the identifier.
The wireless communication device (100) includes a plurality of environmental sensors (106) configured to measure various environmental properties of an environment surrounding the object (200). The method comprises the steps, performed by a processor (114), of: - receiving measured environmental data from the plurality of environmental sensors (106) measuring the various environmental properties; - determining location information of the object (200) using the measured environmental data.
A system and method, the system including a database storing resource type elements describing resources, permission type elements describing permissions related to the resources, and user type elements describing users, each user type element being assigned to at least on e permission. The system has an access manager including a processor, and, for each resource, a resource provisioning software component that executes a resource provisioning task with the corresponding resource manager, by using APIs, to check and ensure a consistency between expected permissions on the resource assigned to users in the database, and permissions on the resource configured with the resource manager. A workflow automation software component automatically executes a workflow including the execution of each of the resource provisioning software components.
A method is proposed for securing the access to a content delivered by a content provider system (110) to a receiving device (100) through a communications network, the content being associated to at least one access condition. According to such method, the receiving device executes: - obtaining (S200) a verifiable presentation request, the verifiable presentation being representative of at least one verifiable credential attribute corresponding to a respective access condition associated to the content; - providing (S210) the verifiable presentation request to a digital wallet (130) comprising the at least one verifiable credential attribute; and - obtaining (S230) an access information representative of the right of accessing the content when the at least one verifiable credential attribute comply with the at least one access condition.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
31.
DEVICE FOR ACCESSING DATA SENT BY A DONGLE CONNECTED TO A VEHICLE AND METHOD FOR REDUCING THE POWER CONSUMPTION OF SUCH DEVICE
A device for accessing data sent by a dongle connected to a vehicle. The device is battery powered and wirelessly communicates with at least one dongle connected to corresponding vehicle, a backend server through a communications network, and at least one terminal equipment configured for acting as a relay for exchange of data between the device and the backend server.
An access management system for controlling access to an electronic resource is provided, wherein the electronic resource accessible at a resource address, and provided by a service provider having associated therewith an electronic provider address, the system comprising: a request management module, configured to determine whether a registration request received at the electronic provider address is a valid registration request, wherein: the registration request includes a public key or data identifying the public key, associated with a client device or user thereof from which the registration request is received; and an authorized client management module configured to add the public key of the user, or data identifying the public key, to an authorized list, if the request management module determines that the registration request is a valid registration request, wherein: when a public key or data identifying the public key of the client device is on the authorized list, the client device or user thereof is permitted to access the electronic resource. Another similar access management system and associated computer-implemented methods are also provided.
A system for providing a client device in a remote location secure access to the internet via a satellite connection is provided includes: a client device: a satellite system configured to provide the client device with access to the internet; and an internet service provider (ISP), wherein, during a registration process: the satellite system is configured to receive a first blockchain state signal which encodes information about a first state of a blockchain, and to generate and transmit a first RF broadcast signal encoding the information about the first state of the blockchain: the client device is configured to receive the first RF broadcast signal, to generate a registration request based on the information about the state of the blockchain, the registration request including a public key ID associated with the client device, and to be transmitted to an electronic address corresponding to a blockchain associated with the ISP, and to transmit the registration request to the satellite system: the satellite system is configured to receive the registration request, and to transmit it to the electronic address associated with the ISP; the ISP is configured to determine whether the registration request is a valid request, and if the registration request is a valid request, to add the public key ID to an authorized list, wherein when a public key ID is on the authorized list, the client device or user thereof is permitted to access the internet via the satellite system. Similar methods and systems relation to connection requests are also provided.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
The device (100) for tracking an object (200), comprising means for attaching to said object (200), a wireless communication circuit (102), at least two antenna modules (104) having respective positions different from one another, and at least one processor (108) configured to: - select one of the at least two antenna modules (104) based on information indicative of a best-oriented antenna module for wireless communication among the at least two antenna modules; - transmit or receive one or more signals for tracking said object (200) using the wireless communication circuit (102) and the selected best-oriented antenna module (104).
G01S 1/70 - Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmittersReceivers co-operating therewith using electromagnetic waves other than radio waves
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G08B 21/24 - Reminder alarms, e.g. anti-loss alarms
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 4/029 - Location-based management or tracking services
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
G01S 5/14 - Determining absolute distances from a plurality of spaced points of known location
G08B 21/02 - Alarms for ensuring the safety of persons
35.
METHODS AND SYSTEMS FOR SYNCHRONIZING A DEVICE WITH A BLOCKCHAIN
A method of synchronizing a device with a blockchain includes: receiving information about a first state of a blockchain; generating an RF broadcast signal encoding the information about the first state of the blockchain; and transmitting, at a first time, the first broadcast signal to the device. Similar methods for maintaining synchronization and for writing new data to a blockchain are also provided, as well as corresponding devices.
The present disclosure proposes method and systems for establishing secure communication session(s) between a first device and a second device, where the first device operates in a user network and implements a first key exchange protocol for secure communication. The second device is capable of communicating with the first device over a wireless communication network. The second device implements a second key exchange protocol that is different to the first key exchange protocol for secure communication. A proxy entity configured for implementing the first and the second key exchange protocols for secure communication is provided. The proxy entity is configured for generating and/or provisioning one or more session keys for the first and the second devices using the key exchange protocols specific to each device for establishing secure communication between the first and second device based on the generated session key(s).
The present disclosure relates to asset tracking. In particular, the present disclosure relates to facilitating asset supervision and monitoring. Further in particular, the present disclosure relates to a system and method incentivising user behaviour to increase a reliability of the asset tracking. Accordingly, there is provided a method (300) for tracking of at least one asset, comprising the steps receiving (302) ID information (108) of a particular asset, receiving (304) user information of a particular user, receiving (306) location information, wherein the location information is location information of the asset and/or the user, storing (308), in a database, tracking information based on at least one of the received information, associated with the asset, determining (310), based on at least one of the received information, whether to provide ancillary information associated with the asset to the user, determining (312), based on the user information, information to be transmitted to the user, wherein the information to be transmitted is at least a subset of the ancillary information associated with the asset, and providing (314) said information to be transmitted to the user.
The method for authenticating a first device, the method including receiving RF signals from the first device, acquiring feature data from the received RF signals, fitting a model for authenticating the first device using the acquired feature data, storing in memory the fitted model in a second device, and, by the second device receiving a new RF signal from a device to authenticate, acquiring feature data from the new RF signal, and determining whether or not the device to authenticate is the first device by transmitting the feature data, acquired from the new RF signal, as input to the fitted model, the feature data acquired from a RF signal includes values of only one of an in-phase component and a quadrature component of the RF signal over time.
Systems and techniques are provided for enhancing media content. In some examples, a network device of a network can detect a first event tag in an item of media content. The first event tag is associated with a first event in the item of media content and a first functionality of a first client device connected to the network. The first functionality corresponds to the first event in the item of media content. The network device can transmit, based on detecting the first event tag in the item of media content, a first activation message to the first client device to cause the first client device to perform the first functionality corresponding to the first event in the item of media content.
Systems and techniques are provided for enhancing media content. In some examples, a network device of a network can detect a first event tag in an item of media content. The first event tag is associated with a first event in the item of media content and a first functionality of a first client device connected to the network. The first functionality corresponds to the first event in the item of media content. The network device can transmit, based on detecting the first event tag in the item of media content, a first activation message to the first client device to cause the first client device to perform the first functionality corresponding to the first event in the item of media content.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/41 - Structure of clientStructure of client peripherals
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
Method for provisioning device with credentials The device (200) includes a device private key (K1pr) of a pair of public and private asymmetric keys (K1pub, K1pr). The method comprising the steps, performed by the device (200) of - receiving, from a credential provider, the device credentials in encrypted form, - internally self-determining information about a current configuration of the device (200); - generating a device attestation information based on the determined information about the current configuration of the device; - generating a decryption key (K4i) based on the device private key (K1pr) and the generated device attestation information; and - decrypting the received device credentials in encrypted form with the decryption key to provision the device (200) with the device credentials.
A computer-implemented method of embedding data in a virtual object is provided. The virtual object is generated from a mesh of polygons. The polygons comprise edges meeting at vertices, each of the vertices being represented by initial coordinates in 3D space. The computer-implemented method comprises: receiving the initial coordinates of the vertices of the virtual object; receiving the data to be embedded in the virtual object; determining a respective set of spatial adjustments for the initial coordinates of a plurality of the vertices. The set of spatial adjustments corresponds to the data being embedded. The method further comprises: adjusting the initial coordinates of the plurality of the vertices by the respective set of spatial adjustments, to generate adjusted coordinates of the vertices and encoding the data using an error and deletion correction code.
G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
H03M 13/37 - Decoding methods or techniques, not specific to the particular type of coding provided for in groups
43.
METHOD FOR PAIRING A CONTENT PROVIDER SYSTEM AND A RECEIVING DEVICE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES
A method for pairing a content provider system and a receiving device, a cryptographic function and a receiving device unique identifier being populated in the receiving device. According to such method, the receiving device executes: obtaining a first key which is a result of a first function taking as arguments an Identity Based Encryption scheme master key owned by an authority server and an output of the cryptographic function applied to the receiving device unique identifier; receiving, from the content provider system, a content provider unique identifier; and computing a secret key which is a result of a second function taking as operands the first key and an output of the cryptographic function applied to the content provider unique identifier, the secret key being known from the content provider system.
The method comprises the steps, performed by the user device (300), of: sending an access request to access a content to a content provider system (100); receiving, from the content provider system (100), an access token for said content, said access token including an encrypted session key, and a Digital Right Management, DRM, license, including said session key; and transmitting a content request including the received access token to a content delivery network and, in response, receiving from the content delivery network content data of the requested content, in a communication session; wherein the content request further comprises an authentication tag obtained by executing a cryptographic operation, performed by a DRM client module (320) of the user device (300), of signing and/or encrypting, with the session key of the received DRM license, input data that is based on at least part of the content request.
A method is proposed for securing at least one application operated in a first server communicatively connected to a second server. An application protection agent of a RASP type is associated with the application in the first server. A second security agent is implemented in the second server. According to such method, a first security agent implemented in the first server executes: - receiving (S430), from the application protection agent, at least one first information indicative that a threat has been detected in the application by the application protection agent; and - sending (S440), to the second security agent, the at least one first information.
A method for automated authorization within a restricted perimeter, comprising receiving, via processing circuitry, a digital credential of a first device, a location of the first device within the restricted perimeter, and an image of an area within the restricted perimeter; verifying the digital credential; identifying a presence of an occupant in the image; associating the occupant with the digital credential and the location of the first device based on the image; and authorizing the occupant based on the digital credential and the location of the first device.
A method for providing authorization to access a vehicle using a portable electronic key. The vehicle comprises two transceivers configured to emit a first signal and to receive a second signal from the portable electronic key. The authorization is subject to a successful completion of a control procedure including determining, for each of the first signals, a first piece of information based on at least one strength measurement of the first signal at the portable electronic key, determining, for the second signal, a second piece of information and checking whether first pieces of information determined for the first signals based on at least one strength measurement of the first signals at the portable electronic key are consistent with second pieces of information determined for the second signal based on at least one strength measurement of the second signal at each of the transceivers, and, if so, initiating or granting access to an unlocking procedure configured to provide the authorization.
Systems and techniques are described herein for annotating media content. For example, a process can include obtaining media content and generate, use one or more machine learning models, a metadata file for at least a portion of the media content. The metadata file includes one or more metadata descriptions. The process can include generating a text description of the media content based on the one or more metadata descriptions of the metadata file. The process can include annotating the media content use the text description.
G06V 20/40 - ScenesScene-specific elements in video content
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
49.
CRYPTOGRAPHIC KEY CONFIGURATION USING PHYSICAL UNCLONABLE FUNCTION
The disclosure relates to a method of obtaining a cryptographic key in a chipset (1). An initial configuration message may be generated using a physical unclonable function (hereinafter: PUF) (22) of the chipset (1). Said PUF (22) may generate a predetermined value when using the initial configuration message as input to the PUF (22). The initial configuration message may be transmitted to a client access server (31). An altered configuration message may be received from the client access server (31), wherein the altered configuration message is generated by the client access server (31) based on the initial configuration message. The cryptographic key may be obtained from the PUF (22) using the altered configuration message as input to the PUF (22).
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
50.
METHOD FOR SYNCHRONIZING A PLURALITY OF MULTIMEDIA COMPONENTS, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES
A method is proposed for synchronizing a plurality of multimedia components selected among audio and video components of a digital multimedia processed by a media player. Each of the multimedia component is rendered on a multimedia rendering device receiving the multimedia component from the media player through a respective path. The media player is configured to obtain, for each multimedia rendering device, a delay data representative of a propagation delay of the multimedia component from the reception of the multimedia component to its rendering by the multimedia rendering device, determine a buffering delay representative of a difference between a maximum value and a minimum value among the delay data; and provide the buffering delay to at least one buffer implemented along a path of the multimedia component corresponding to the minimum value among the delay data.
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
51.
MEDIA PLAYER FOR RECEIVING MEDIA CONTENT FROM A REMOTE SERVER
An embodiment of the present invention may be deployed in a system comprising a media player and a remote server operably connected to communicate with one another. The invention allows for a settings file to be stored on the remote server, the settings file comprising parameters useful for adjusting different settings on the media player such that rendering of a particular content to be made possible on the media player according to a user's predetermined taste by downloading the settings from the server onto the media player.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
The present disclosure generally relates to monitoring a blockchain wallet. For example, aspects of the present disclosure include systems and techniques for monitoring a blockchain wallet. One example method for monitoring a blockchain wallet includes: generating a plurality of blockchain wallets associated with a blockchain service, the plurality of blockchain wallets comprising a user wallet and a plurality of monitored wallets; transferring funds to the plurality of monitored wallets; monitoring the plurality of blockchain wallets to identify unauthorized access of any of the plurality of blockchain wallets; in response to identifying unauthorized access of one of the plurality of monitored wallets, generating a notification that the one of the plurality of monitored wallets has been compromised; and outputting the notification.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
53.
CONDITIONAL ACCESS SYSTEM BASED AUDIENCE MEASUREMENT
The present disclosure relates to conditional access systems In particular, the present disclosure relates to audience measurement in a conditional access system. Accordingly, there is provided a method (300) for audience related analytics measurements in a media consumption environment (100) comprising a media provisioning system (102) and a media playback device (104), the method comprising the steps of receiving (302), by the media playback device (104), encrypted and/or scrambled media data from a media provisioning system (102), receiving (304), by the media playback device (104), key data comprising at least one decryption/descrambling key for decrypting and/or descrambling the media data, wherein the media playback device (104) is processing the key data to obtain the decryption/descrambling key, and wherein the key data is indicative of a particular media data and/or a particular consumption time of media data or a particular media data, generating (306) analytics data (106) related to the processing of the data key on the media playback device (104), transmitting (308) at least part of the analytics data to the media provisioning system (102).
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
H04N 21/4385 - Multiplex stream processing, e.g. multiplex stream decrypting
H04N 21/4623 - Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/6334 - Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
H04N 21/6377 - Control signals issued by the client directed to the server or network components directed to server
H04N 21/835 - Generation of protective data, e.g. certificates
The present disclosure generally relates to user response analysis. For example, aspects of the present disclosure include systems and techniques for identifying a response of a user to a particular action. One example method includes obtaining, via a user prediction system, one or more actions associated with a subscription service; obtaining, via the user prediction system, user characteristics associated with each user of one or more users of the subscription service; determining, via the user prediction system, a probability of a reaction of the one or more users in response to each of the one or more actions based on the user characteristics; and providing a user response prediction output based on the probability of the reaction.
Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.
H04N 21/2347 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04N 7/167 - Systems rendering the television signal unintelligible and subsequently intelligible
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/418 - External card to be used in combination with the client device, e.g. for conditional access
H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
H04N 21/4623 - Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
56.
SYSTEMS AND TECHNIQUES FOR MULTI-PARTY COMPUTATION (MPC) SIGNATURE WITH KEY CARDS AND MOBILE TERMINALS
Aspects are described herein for providing access control based on key sections of a key of a key pair. For example, a computing device can receive, from at least two entities, at least two key sections associated with a first key of a key pair. The computing device can generate the first key of the key pair based on the at least two key sections. The computing device can further output the first key to provide access to a service.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
The present disclosure includes methods, devises and systems for preparing and installing one or more application keys owned by application owners in a remote device. The present disclosure further proposes methods, devices and systems for secure installation of subsequent application keys on a device utilising corresponding key derivation functions to associate an application with a respective policy and identifier using significantly lmv bandwidth for transfer of keys for execution of the respective application on the device.
Methods and systems are described herein for authenticating streaming media, based on the use of computer vision or artificial intelligence. An untrained neural network generates a first feature vector from an identified image frame of a first media stream that is encoded with a first encoding scheme. The same or a similar untrained neural network generates a second feature vector from an identified image frame of a second media stream that is encoded with a second encoding scheme. The two encoding schemes do not need to be the same. The two feature vectors are compared, and the second media stream is presumed to be authentic if the differences between the two feature vectors is less than a predetermined threshold.
The present disclosure generally relates to systems and techniques for processing media. For example, aspects of the present disclosure include systems and techniques for editing media to remove personal information. Certain aspects of the present disclosure provide an apparatus for media processing including a memory and one or more processors coupled to the memory. The one or more processors may be configured to: retrieve media showing an environment as captured using a recording element; identify or receive input to identify a geographical boundary within the environment; process the media to identify a first feature within the environment; determine whether a portion of the media is to be deleted based on whether the first feature is outside the geographical boundary; and delete the portion of the media based on the determination.
G11B 27/031 - Electronic editing of digitised analogue information signals, e.g. audio or video signals
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Systems and techniques are described herein for processing media content. For example, a process can include obtaining a first media frame and a second media frame. The process can include generating, using a first change detector, a first tag indicating a change above a first change threshold has occurred in the second media frame relative to the first media frame. The process can further include generating, using a machine learning model, a second tag indicating that media content of the second media frame is associated with a particular type of media content. The process can further include determining, based the first tag and the second tag, that the media content of the second media frame is associated with the particular type of media content.
H04L 65/613 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for the control of the source by the destination
61.
DEVICE AND METHOD FOR MONITORING AT LEAST ONE VEHICLE IDENTIFICATION NUMBER
A device for monitoring at least one vehicle identification number sent by a dongle connected to an on-board diagnostics, hereafter OBD, port of a vehicle. The device is battery powered and wirelessly communicates with at least one dongle connected to an OBD port of a corresponding vehicle, and a backend server through a communication network.
In order to allow an access to the Internet, and therefore to a remote server, for a device having no connection with an Internet gateway, a method is provided to transmit a message from a first device to a remote server, the first device having no connection with the remote server. The method includes detecting a second device by the first device, establishing a communication channel between the first and the second device, transferring the message from the first to the second device, the message comprising an address of the remote server, and transferring, by the second device, the message to the remote server using the remote server address contained in the message.
H04L 51/48 - Message addressing, e.g. address format or anonymous messages, aliases
H04L 67/1034 - Reaction to server failures by a load balancer
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
The present disclosure relates to the exchange of information between a message sending device and a message receiving device with message authentication and proposes to reduce the time required for message authentication by pre-computing a message tag, such as a MAC, and subsequently replacing the computation of the MAC when the tag is to be validated (or indeed also on sending) by a table look-up. The approach requires a set of messages and works particularly well for small sets of messages, for example as small as two or three messages, or less than five or ten messages. The approach finds particular application in control networks where control decisions have to be taken quickly and securely, for example in the control of a vehicle, for example an autonomous vehicle, or the control of a smart electricity grid.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
64.
AUTHENTICATING AUDIBLE SPEECH IN A DIGITAL VIDEO FILE
A computer-implemented method of authenticating audible speech in a digital video file is provided. The method comprises: obtaining an electronic transcript of the audible speech from an audio track of the digital video file, using a digital signature algorithm to generate a digital signature based on the electronic transcript and a private key, and inserting the digital signature in a video track of the digital video file. Also provided is a computer-implemented method of authenticating audible speech in a copy of a digital video file. The method comprises: receiving a copy of the digital video file containing unverified audible speech, obtaining a second electronic transcript, extracting the digital signature, verifying the digital signature and, if the digital signature is successfully verified, determining that audible speech in the copy of the video file is authentic. The second electronic transcript is a transcript of the unverified audible speech obtained from the audio track of the copy of the digital video file, and the digital signature is extracted from the video track of the copy of the digital video file and is verified using the digital signature algorithm, the second electronic transcript and a public key.
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
G06F 21/16 - Program or content traceability, e.g. by watermarking
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04N 21/2389 - Multiplex stream processing, e.g. multiplex stream encrypting
H04N 21/439 - Processing of audio elementary streams
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/8358 - Generation of protective data, e.g. certificates involving watermark
65.
SYSTEMS AND TECHNIQUES FOR DUPLICATE CONTENT DETECTION
The present disclosure generally relates to a duplicate identification system. For example, aspects of the present disclosure include systems and techniques for identifying duplication of media content. One example method generally includes: selecting a first frame from a first video and a second frame from a second video; identifying a first section of the first frame, the first section being less than an entirety of the first frame; comparing the first section of the first frame with the second frame; determining whether at least a portion of the first video and at least a portion of the second video are duplicates based on the comparison; and outputting an indication that the portion of the first video and the portion of the second video are duplicates based on the determination.
A method for locating an asset in an environment, the method comprising receiving, at a first receiver, signal from a tag associated with the asset, wherein the tag is positioned on or adjacent to the asset; receiving, at the first receiver, a signal from the tag associated with the asset at a second time, wherein the second time is different to the first time, and wherein the first receiver has moved location in the environment between the first time and the second time; receiving, at a second receiver, a signal from the tag associated with the asset; and determining the location of the asset in the environment based on the signal received at the first receiver at the first time, the signal received at the first receiver at the second time, the signal received at the second receiver, a track of the location of the first receiver in the environment at the the first time and the second time, and a location of the second receiver in the environment at the time when the second receiver received the signal.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
67.
Secure communication between in-vehicle electronic control units
Aspects of the present disclosure address systems, methods, and devices for enabling secure communication between electronic control units (ECUs) in a vehicle. The system may include a first and second ECU from a plurality of ECUs in the vehicle. The first ECU is to enable secure communication between the plurality of ECUs by performing operations that include provisioning the second ECU with authentication data for authenticating messages exchanged with a third ECU and provisioning the third ECU with a set of security keys to enable the third ECU to securely exchange messages with the second ECU. The second ECU receives, from the third ECU, a secure message that is cryptographically signed using a security key from the set of security keys provisioned to the third ECU, and the second ECU authenticates the secure message by comparing the authentication data with an authentication signal.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
68.
SYSTEM AND METHOD FOR SHARING A DISTRIBUTED REVOCATION LIST ON A BLOCKCHAIN
A system for sharing a distributed revocation list on a blockchain includes circuitry that identifies an access attempt by a wallet on a first blockchain network, and adds the wallet to a blacklist. The blacklist identifies the wallet as suspicious. The circuitry generates a soulbound token, and airdrops the soulbound token into the wallet. The soulbound token identifies that the wallet belongs to the distributed revocation list and identifies the wallet as a suspicious wallet to blockchain networks.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
69.
SYSTEM AND METHOD FOR AUTHORISING OPERATIONS FOR DEVICES IN A NETWORK
The disclosure related to methods and associated devices and/or systems for authorising at least one operation associated with a device, the device operating in a communication network, such as a user network, that comprises a plurality of devices communicatively coupled to a server computer, such as a control server. The disclosed method comprises generating a data model based on a plurality of patterns of actions for one or more devices among the plurality of devices. The data model is configured to detect and/or store at least one regular pattern of actions for each device among the one or more devices, each action corresponding to an operating state of the device. The disclosed method comprises receiving a request for an operation associated with a first device among the plurality of devices and determining if the received request satisfies a first criterion, the first criterion being based on or associated with the data model. Then, based on a determination that the first criterion is not satisfied, the disclosed method comprises generating at least one query based on a regular pattern of actions of at least one device among the one or more devices and sending the at least one query to a user interface. The disclosed method comprises determining if a response to the at least one query received from the user interface satisfies a second criterion. The second criterion is based on a comparison of the response received with the regular pattern of actions associated with the query in the data model. Then, based on a determination that the second condition is satisfied, the disclosed method comprises authorising the received request for the operation and providing a setting for the first device and/or control server based on the authorisation.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
70.
SYSTEM AND METHOD FOR SHARING A DISTRIBUTED REVOCATION LIST ON A BLOCKCHAIN
A system for sharing a distributed revocation list on a blockchain includes circuitry that identifies an access attempt by a wallet on a first blockchain network, and adds the wallet to a blacklist. The blacklist identifies the wallet as suspicious. The circuitry generates a soulbound token, and airdrops the soulbound token into the wallet. The soulbound token identifies that the wallet belongs to the distributed revocation list and identifies the wallet as a suspicious wallet to blockchain networks.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
The present disclosure relates generally to security solutions. More specifically, techniques (e.g., systems, methods, and devices) are provided to implement an incentivized-based intrusion detection system to detect malicious acts against an asset. The incentive may lure or facilitate the actor to provide information detecting malicious actions against an asset.
A method for notifying at least one client module implemented in a wireless device communicatively connected to a wireless communications network that respective specific data are available in a service module implemented in a server communicatively connected to the wireless communications network. According to the method, a notification client device implemented in the wireless device executes: receiving a notification, sent by a notification service device implemented in a server communicatively connected to the wireless network, including information that, for at least one client module, respective specific data are available in a server communicatively connected to the wireless communications network, and notifying the at least one client module that respective specific data are available in a server.
An embodiment of the present invention relates to physical interfaces, especially those used on consumer electronics devices. A processor, in which an embodiment of the disclosed invention is deployed, includes a physical interface for connecting to and communicating with a peripheral device, the peripheral device being configured to operate according to a standard communications protocol or to a different protocol which is adapted to have a more bandwidth-efficient performance. The processor detects which of the two protocols the attached peripheral device uses and configures the physical interface to operate according to the detected protocol. An embodiment of the invention allows for new, bandwidth-efficient communications protocols to be executed across existing standardized physical interface hardware, thereby allowing for easier acceptance of the new protocols within the consumer electronics industry. Bandwidth-efficient communications protocols advantageously allow for more convenient transfer of media content or for big-data applications to be more conveniently handled.
A method of providing a content stream based on capturing an initial delivery of the content stream. The method comprises obtaining manifest data related to the initial delivery of the content stream, the manifest data being obtained one or more times in a sequence during the initial delivery of the content stream to generate one or more manifest files; associating a time-stamp with each of the manifest files, the time stamp being indicative of a time of obtaining the associated manifest file; processing each of the manifest files to identify one or more addresses referenced in the manifest file of one or more segments comprising a portion of the content stream in the initial delivery; accessing one or more of the segments identified via the one or more addresses referenced in the manifest files; modifying a last one of the manifest files to include at least a portion of an earlier manifest file of the manifest files; and providing a client with access to the manifest files including the modified last manifest file and the accessed one or more segments.
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
75.
GENERATION AND VALIDATION OF TRUSTED NON-FUNGIBLE TOKENS
The present invention provides a computer-implemented method of minting a trusted and verifiable NFT on a blockchain, the NFT corresponding to a digital asset. The computer- implemented method comprises a step of generating an NFT ID which uniquely identifies an NFT to be minted, and inserting the NFT into the digital. This NFT ID may then be used to validate an NFT on e.g. an NFT marketplace. Thus, a corresponding computer-implemented method for validating an NFT is also provided.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
76.
DEVICES AND PROCESSES FOR GENERATING PUBLIC KEYS AND FOR GENERATING AND VERIFYING SIGNATURES
KpubEdEd Kprivs.GEdEd GEdEd S.GMM GMM M ) on the second elliptic curve corresponding to the first base point with respect to that isomorphism, by an adjusted scalar, and a resulting point is converted (604) to the scalar multiplication on the first elliptic curve by an isogeny. Signature generation and verification are exploiting similar principles. Applications to authentication.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
A computer implemented method comprising accessing representations for a plurality of corresponding media content items, each media content item having at least one corresponding representation, the representations being organized in an order in one or more sets of the representations, each representation comprising at least one of metadata for a corresponding media content item and an image for a corresponding media content item, each representation being for display to a user to enable the user to select to access the corresponding media content item, each set of representations being displayable as a scrollable list; using the order of the representations to determine display locations of the representations in the scrollable list in a display arrangement; comparing similarity of content of representations within a display range; and where representations are determined to have greater than a predetermined similarity, changing the order of at least one of the representations determined to have greater than a predetermined similarity to change the display location in the scrollable list of the at least one of the representations.
A method for securing the processing of an initial digital asset according to at least one processing step delivering an output digital asset from an input digital asset function of the initial digital asset. According to such method, a producer electronic device executes creating an initial NFT assigned to a producer wallet, in a blockchain, the initial NFT being associated with the initial digital asset, the initial NFT including input access condition to the initial digital asset and, for the at least one processing step, the initial NFT includes post-processing access conditions to the input digital asset after the execution of the processing step and output access conditions to the output digital asset delivered by the processing step, and assigning the initial NFT to a wallet, in the blockchain, associated with a first processor electronic device implementing a first processing step.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device. The malware detection logic may execute a validation test on the message to determine that the message includes malware. The malware detection logic may report an alarm to the security client of the destination device. The malware detection logic may transmit information related to the malware to a cloud computing server. The malware detection logic may prevent an application associated with the destination device from processing the message.
An integrated circuit device (100) is proposed. Such integrated circuit device comprises one or more specific block of logic gates (110) configured for generating deterministic internal state value changes inducing current leakages with corresponding deterministic variations in the integrated circuit device wherein the one or more specific block of logic gates comprises a non-linear logical function.
G06F 21/73 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
G06F 21/76 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
A user may be represented by an avatar in the extended reality environment. The user may set configuration options such as privacy restrictions, rating controls, or invisibility so that the user can explore the extended reality environment while controlling how other users are able to interact with the user's avatar. A client-side digital rights management (DRM) component can control which elements are rendered for the user. A client-side controller can control the data that is sent to an extended reality server. The user's avatar may be protected by DRM. Thus, other users will be able to see the user's avatar only if granted permission to do so.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
The method of uploading a digital content from a content provider (CP) to a content transmission network (100), such as a CDN, responsible for transmitting contents to user devices (20), comprises the following steps: - transmitting a request for a legitimation token for said digital content from the content provider (CP) to a certificate authority (30); - upon successful authentication of the content provider (CP) by the certificate authority (30), receiving by the content provider (CP) the legitimation token from the certificate authority (30), wherein said legitimation token includes a content tag and an identifier of the content provider (CP), and is digitally signed by the certificate authority (30); - uploading the digital content and the legitimation token from the content provider (CP) to the content transmission network (100).
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method of controlling access to sensor data includes of: generating sensor data, and protecting the sensor data to generate protected sensor data; and transmitting the protected sensor data to a device for storage; receiving, by the sensor: access control data defining one or more operations which the device is permitted to execute on the protected sensor data; determining by the sensor, based on the access control data, an operation which the device is permitted to execute on the protected sensor data; enabling the device to execute the permitted operation on the protected sensor data. A method of accessing protected sensor data by a device, the device having stored thereon access control data defining one or more operations which the device is permitted to execute on protected sensor data, includes the steps of: receiving protected sensor data from a sensor; storing the received protected sensor data; sending the authorization access control data to the sensor; and receiving, from the sensor, a signal enabling the device to execute a permitted operation on the protected sensor data.
The present disclosure generally relates to a blockchain monitoring system. For example, aspects of the present disclosure include systems and techniques for monitoring one or more transactions on a block chain using configured rules. Some aspects include a monitoring system having at least one memory and at least one processor coupled to the at least one memory and configured to: detect a block on a blockchain; retrieve, from a rules database, a rule associated with one or more transactions on the block; determine whether the rule applies to one or more transactions on the block; and perform one or more actions associated with the rule using an authentication code associated with a user, the authentication code being different than a private key of the user for accessing the blockchain.
A prover device (P) and methods for generating a zero-knowledge proof (18) of approximate knowledge of a reference location (Xv). The method includes: - obtaining a plurality of reference signals (13) originating from a respective plurality of reference sources (12) and acquired at a test location (Xp) within observable range of the reference sources; - constructing an initial codeword from the obtained reference signals (13), this codeword forming a representation of the test location (Xp); - applying a block-based error correction decoding operation on the initial codeword, thereby obtaining an assessment codeword; - applying a hashing operation on the assessment codeword, thereby obtaining a hash value representing the zero-knowledge proof, and - providing the hash value to a verifier device (V), to allow the latter to compare the hash value with a reference hash value and thereby assess validity of the zero-knowledge proof. In addition, a complementary verifier device and corresponding verification methods are provided.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The invention refers to a method for identifying a person (16), comprising the steps of storing information on the identity of the person (16) and/or access authorization data on the mobile device (16) as well as storing biometric data (37) of the person (16) on a mobile device (14) of the person (16); sending the identity information of the person (16) and/or the access authorization data from the mobile device (14) to an authorization device (18); obtaining biometric data (37) of the person (16) by an identification device (20); sending the biometric data (37) from the identification device (20) to the mobile device (14); comparing, only on the mobile device (14), the biometric data (37) from the identification device (20) with the stored biometric data (37) for verifying the identity of the person (16); and sending a confirmation signal from the mobile device (14) to the authorization device (18) if the comparison of step e) verifies the identity of the person (16).
G07C 9/00 - Individual registration on entry or exit
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
The present disclosure generally relates to a blockchain monitoring system. For example, aspects of the present disclosure include systems and techniques for monitoring one or more transactions on a block chain using configured rules. Some aspects include a monitoring system having at least one memory and at least one processor coupled to the at least one memory and configured to: detect a block on a blockchain; retrieve, from a rules database, a rule associated with one or more transactions on the block; determine whether the rule applies to one or more transactions on the block; and perform one or more actions associated with the rule using an authentication code associated with a user, the authentication code being different than a private key of the user for accessing the blockchain.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
88.
SYSTEMS AND TECHNIQUES FOR DATA ASSISTED SPORT AUGMENTATION
The present disclosure generally relates to sport augmentation systems. For example, aspects of the present disclosure include systems and techniques for assessing a path of a ball during a sporting session to be used to augment a sporting experience. On example method includes receiving one or more frames capturing image data associated with movement of a ball on a surface during a sporting session, determine a state associated with throwing the ball based on the one or more frames, perform an assessment of the surface on which the ball is thrown, predict a path of the ball as thrown on the surface based on the state associated with the ball and the assessment of the surface, and output an indication of the path to be displayed on a display element.
A system includes two or more communication devices. Each device includes a dedicated SDR chip with a dedicated key generator to generate a secret key shared by the two SDR chips using a physical unclonable function PUF that takes as an input configuration data and produces an output. In the dedicated key generator of each SDR chip, the PUF takes as an input configuration data and produces an output identical for the two SDR chips, that is the shared secret key or a seed to derive it. The configuration data is unique to each SDR chip, dependent on physical random factors introduced during manufacture of the SDR chip, and is adapted for the respective key generator to generate the shared secret key.
Haptic feedback device (11), comprising:
an input unit (114) for receiving remote object data (30),
at least one feedback surface (111) arranged to be touched or sensed by a user,
at least one haptic actuator (112) arranged for providing a change on the feedback surface (111),
a control unit (113):
connected to the input unit (114) to receive the remote object data (30), and
connected to the haptic actuator (112), and
arranged to control the haptic actuator (112) according to the received remote object data (30) so as to provide haptic feedback to the user.
A post-processing of video content in order to provide a capability to insert ad content, having a method to produce a modified video content from an original video content. The method comprising: analyzing the original video content to detect at least one marker, said marker comprising a marker surface delimited by a marker identification; loading profile data of a target user; determining, based at least on the profile data a replacement content; adjusting the replacement content into the marker surface; and replacing into the original video content the marker surface by the adjusted replacement content to produce the modified video content.
H04N 21/23 - Processing of content or additional dataElementary server operationsServer middleware
H04N 5/272 - Means for inserting a foreground image in a background image, i.e. inlay, outlay
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
H04N 21/431 - Generation of visual interfacesContent or additional data rendering
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
H04N 7/167 - Systems rendering the television signal unintelligible and subsequently intelligible
H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
H04N 21/6334 - Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
H04N 21/835 - Generation of protective data, e.g. certificates
93.
Distributed anonymized compliant encryption management system
A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Passive entry systems, such as passive entry-passive start vehicle systems, using short-range wireless communication signals to determine a distance between nomadic devices and unlockable devices based on a round trip time of flight (TOF) measurement.
B60R 25/20 - Means to switch the anti-theft system on or off
B60R 25/04 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
G07C 9/00 - Individual registration on entry or exit
95.
METHOD AND DEVICE FOR PROVIDING AN AUTHORIZATION TO ACCESS AN INTERACTIVE GOOD
A method for providing an authorization to access an interactive good by means of an access right issued by a first bearer device to or for a second bearer device by using a wireless communication means, the method including:
by the first device, wirelessly obtaining a first information including at least a second device identifier, generating the access right including at least the second device identifier and an identifier of the interactive good, providing, to the interactive good, a second information including at least the access right,
by the second device, wirelessly presenting an access request to the interactive good,
by the interactive good, performing an identity check in order to at least verify the second device identifier, and, in case of successful identity check, providing the requested access to the interactive good.
The present disclosure relates to a wireless token capable of representing a user network, the token being used to automatically provision an IoT enabled device to connect to the user network. Functions required to achieve this include: authenticate the token with the user network, and responsive to said authentication, obtain and store configuration information for enabling the token to communicatively couple one or more devices at or within a defined proximity to the token, with the user network; responsive to a wireless signal received from a given device among the one or more devices, establish a temporary secure communication channel between the given device and the token; and provide the configuration information from the token to the given device using the temporally secure communication channel, wherein the configuration information enables the given device to establish a connection with and operate in the user network based on the obtained configuration information.
A method for controlling access to a resource in an electronic device including a secure element with a permanent memory having an OTP area. The method includes the following steps performed first when the secure element or the electronic device boots: checking presence of at least one of a secret data and an initialization value in the permanent memory and, in a negative event, generating an initialization value and storing it into the OTP area, in a positive event, if the permanent memory includes secret data, decrypting, within the secure element, the secret data by using an algorithm using a cryptographic key and, if the permanent memory further includes an initialization value, the initialization value, and checking the integrity of the secret data by using a signature stored in the permanent memory and, on successful completion, providing access to the resource.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
98.
Distributed anonymized compliant encryption management system
A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Aspects of the present disclose involve a method, a device, and a system comprising a processor and a machine-readable storage medium storing at a set of instructions for identification and authentication of user profiles associated with a digital television system and displaying information related thereto. In example embodiments, the method includes identifying a user profile registered with a content presentation device based on received identification data that includes biometric data. The method further includes receiving, from a server, identifiers of a set of recently watched channels associated with the user profile and causing presentation of a recent channels interface that includes selectable elements corresponding to the set of recently watched channels.
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/41 - Structure of clientStructure of client peripherals
H04N 21/422 - Input-only peripherals, e.g. global positioning system [GPS]
H04N 21/4415 - Acquiring end-user identification using biometric characteristics of the user, e.g. by voice recognition or fingerprint scanning
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/458 - Scheduling content for creating a personalised stream, e.g. by combining a locally stored advertisement with an incoming streamUpdating operations, e.g. for OS modules
H04N 21/466 - Learning process for intelligent management, e.g. learning user preferences for recommending movies
H04N 21/482 - End-user interface for program selection
H04N 21/658 - Transmission by the client directed to the server
The present disclosure relates generally to data access control solutions. In particular, techniques are provided to implement a secure and distributed file storage scheme and in particular, a managed access system using a blockchain. In some aspects, a process of the disclosed technology includes operations for associating a first key share with a first copy of a file, wherein the first copy of the file is stored by a first party, associating a second key share with a second copy of the file, and recording versioning information corresponding with the file on a distributed ledger accessible by the first party and the second party. In some aspects, the process can further include operations for managing access to the file using the first key share and the second key share. Systems and machine-readable media are also provided.