Nagravision SARL

Switzerland

Back to Profile

1-100 of 237 for Nagravision SARL Sort by
Query
Patent
Aggregations Reset Report
Jurisdiction
        United States 156
        World 67
        Canada 14
Date
New (last 4 weeks) 4
2025 May (MTD) 4
2025 April 5
2025 March 4
2025 February 4
See more
IPC Class
H04L 9/40 - Network security protocols 47
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 42
H04L 9/08 - Key distribution 41
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols 19
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material 15
See more
Status
Pending 75
Registered / In Force 162
Found results for  patents
  1     2     3        Next Page

1.

PRIVATE KEY CLOUD STORAGE

      
Application Number 18981924
Status Pending
Filing Date 2024-12-16
First Publication Date 2025-05-29
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Retaureau, Hervé
  • Celletti, Antony

Abstract

A system (1) for asymmetrical cryptography, comprising a device (10) and a network storage (30), wherein the device is communicatively connected to the network storage, wherein the network storage is configured to store a private key, wherein the device is configured to retrieve the private key from the network storage to perform a cryptographic operation using the private key in a secure execution environment (12) of the device, and wherein the secure execution environment is configured to only temporarily store the private key for the cryptographic operation.

IPC Classes  ?

2.

METHOD FOR ACQUIRING CONFIGURATION INFORMATION BY A RECEPTION DEVICE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number 18726899
Status Pending
Filing Date 2023-01-10
First Publication Date 2025-05-15
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bieber, Yann
  • Stransky-Heilkron, Philippe

Abstract

A method is proposed for acquiring, from a server, configuration information by a reception device connected to the server through a first network, the configuration information allowing the update of the internal setting of the reception device. Such method comprises, during an initialization stage: providing a filtering information allowing to obtain a filtering item to a communication interface; and during an operation stage: providing a request for the configuration information to the communication interface for allowing a terminal equipment connected to the server through a second network to obtain the request and to send a corresponding request to the server; receiving the configuration information provided by the server as part of a data stream sent through the first network.

IPC Classes  ?

  • H04N 21/4627 - Rights management
  • H04N 21/254 - Management at additional data server, e.g. shopping server or rights management server
  • H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data

3.

METHOD OF PROXIMITY DETECTION BETWEEN TWO DEVICES

      
Application Number 18948674
Status Pending
Filing Date 2024-11-15
First Publication Date 2025-05-08
Owner Nagravision Sàrl (Switzerland)
Inventor Fischer, Jean-Bernard

Abstract

The method of proximity detection between a first and a second device (DVC1, DVC2), carried out by the first device (DVC1), comprises the steps of collecting a first information on exposure of the first device (DVC1) to electromagnetic waves; receiving a second information on exposure of the second device (DVC2) to electromagnetic waves from the second device (DVC2); determining a matching information between the first information on exposure and the second information on exposure and detecting either proximity or non-proximity between the first and the second device (DVC1, DVC2) based on the matching information.

IPC Classes  ?

  • B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
  • B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
  • H04W 4/02 - Services making use of location information
  • H04W 76/10 - Connection setup

4.

CONTROLLING ACCESS TO A TRUSTED COMPUTING ENVIRONMENT

      
Application Number 18996625
Status Pending
Filing Date 2023-07-18
First Publication Date 2025-05-01
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Aviolat, Romain
  • Dumont, Pierre

Abstract

A computer-implemented method of controlling access by a third-party continuous integration/continuous delivery (herein, “CI/CD”) system to a trusted computing environment comprises: receiving, from the CI/CD system, a request to access the trusted computing environment in order to execute a first operation; in response to receiving the request to access the trusted computing environment, executing a security protocol configured to determine whether execution of the first operation is permitted, execution of the security protocol comprising: accessing a permitted operation database storing one or more digital signatures, each digital signature corresponding to a respective operation, execution of which is permitted within the trusted computing environment; determining whether a first digital signature is present in a permitted operation database, the first digital signature having been generated based on a portion of the request corresponding to the first operation; and in response to a determination that the first digital signature is present in the permitted operation database, determining that execution, by the CI/CD system, of the first operation within the trusted computing environment is permitted. An equivalent interceptor module, computer program, and computer-readable medium are also provided.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

5.

METHOD OF GENERATING AN OUTPUT BINARY WORD FROM AN INPUT BINARY WORD, METHOD OF PERFORMING AN ARITHMETIC OPERATION ON AN INPUT BINARY WORD ASSOCIATED TO AN OUTPUT BINARY WORD, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number EP2024078853
Publication Number 2025/082900
Status In Force
Filing Date 2024-10-14
Publication Date 2025-04-24
Owner NAGRAVISION SARL (Switzerland)
Inventor Pelletier, Hervé

Abstract

A method is proposed for the generation of an output binary word from an input binary word. Such method comprises: - executing a first floating-point multiplication (S200) wherein the input binary word interpreted as an integer number is multiplied with a first predetermined number of floating-point type, resulting in a first argument number of floating-point type; - applying a predetermined invertible function (S220) to the first argument number delivering a first output number of the floating-point type, the output binary word being based on the first output number. The predetermined invertible function is configured to have the first output number having a non-null output rounding error resulting in having an application, to the first output number, of an invert function of the predetermined invertible function that delivers an input number of the floating-point type corresponding to the input operand with a non-null input error.

IPC Classes  ?

  • G06F 7/76 - Arrangements for rearranging, permuting or selecting data according to predetermined rules, independently of the content of the data

6.

CONTENT PROTECTION

      
Application Number 18917668
Status Pending
Filing Date 2024-10-16
First Publication Date 2025-04-10
Owner NAGRAVISION Sarl (Switzerland)
Inventor
  • Schwarz, Christian
  • Nicoulin, Andre
  • Hunacek, Didier

Abstract

Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.

IPC Classes  ?

  • H04N 21/2347 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04N 7/167 - Systems rendering the television signal unintelligible and subsequently intelligible
  • H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
  • H04N 21/418 - External card to be used in combination with the client device, e.g. for conditional access
  • H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
  • H04N 21/4623 - Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]

7.

METHOD AND APPARATUS TO CREATE INTUITIVE FAVORITES FOR USERS

      
Application Number 18914610
Status Pending
Filing Date 2024-10-14
First Publication Date 2025-04-10
Owner Nagravision Sàrl (Switzerland)
Inventor
  • Kaliamoorthi, Amudha
  • Lakshmi Sharan Lal, Dharmveer

Abstract

Example embodiments provide systems and methods for dynamically creating intuitive favorites for a user. The system and methods include monitoring actions performed, by the user at a digital receiver, with respect to a plurality of content programs. The actions performed with respect to the plurality of content programs are analyzed. The analysis includes comparing a level of the actions with respect to a first content program of the plurality of content programs with a threshold. Based on the comparing indicating that the first content program is a favorites, an indication that the first content program is a favorites content program is stored to a data store.

IPC Classes  ?

  • H04N 21/431 - Generation of visual interfacesContent or additional data rendering
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 16/78 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/9538 - Presentation of query results
  • H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
  • H04N 21/4147 - PVR [Personal Video Recorder]
  • H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
  • H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
  • H04N 21/488 - Data services, e.g. news ticker
  • H04N 21/84 - Generation or processing of descriptive data, e.g. content descriptors

8.

DETERMINING DIGITAL CONTENT VIEWING REALIZATION RATES AND TRANSMITTING INSTRUCTIONS TO A CONTENT DISPLAY DEVICE BASED ON THE CONTENT VIEWING REALIZATION RATES VIA PROCESSING CIRCUITRY

      
Application Number IB2024059640
Publication Number 2025/074270
Status In Force
Filing Date 2024-10-02
Publication Date 2025-04-10
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Gidley, Benjamin
  • Bennett-James, Jonathan
  • Holbrook, Craig

Abstract

A method, device, and computer readable medium that receives a measured electricity usage of a plurality of devices, receives a set of metric information of the plurality of devices, determines, based on the measured electricity usage of the plurality of devices, a first current content viewing realization rate by determining a non-base electricity usage compared to a base electricity usage and corresponding time periods of the non-base electricity usage, determining time periods when content is being displayed, and determining whether the corresponding time periods of the non-base electricity usage occur at overlapping time periods when the content is being displayed, determines, based on the set of metric information, a second current content viewing realization rate, and modifies, based on the first current content viewing realization rate and the second current content viewing realization rate, a running content viewing realization rate.

IPC Classes  ?

  • H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
  • H04N 21/81 - Monomedia components thereof

9.

DEPLOYMENT OF DIGITAL SECURITY CREDENTIALS FOR JUST-IN-TIME PROVISIONING OF NETWORKED DEVICES

      
Application Number 18900406
Status Pending
Filing Date 2024-09-27
First Publication Date 2025-04-03
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Gremaud, Fabien

Abstract

A method, device, and computer-readable medium for provisioning a networked device with digital security credentials, including receiving a first digital certificate of a secure component associated with the networked device; extracting a public key of from the first digital certificate, the public key and a corresponding private key being stored in the secure component for asymmetric cryptography; receiving a product identifier and a vendor identifier associated with the secure component from a first user device; generating a second digital certificate based on the public key of the secure component, the product identifier, and the vendor identifier; and transmitting the second digital certificate to the networked device associated with the secure component, the networked device being configured to generate a device commissioning request based on the second digital certificate and the private key of the secure component.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution

10.

VLAN SPLICING FOR NETWORK PROTECTION

      
Application Number EP2024075546
Publication Number 2025/056709
Status In Force
Filing Date 2024-09-12
Publication Date 2025-03-20
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Buffard, Christophe
  • Meynet, Nicolas

Abstract

Aspects of the disclosure provide systems and methods to improve network security using VLAN splicing. A networking device can create multiple VLANs and place different devices on different VLANs. To enable communication between devices on different VLANs, the networking device "splices" two or more VLANs together. When packets originating from a device on a first VLAN are directed to a device on a second VLAN and the two VLANs are spliced together, the networking device processes and forwards the packets. For example, the packets may be decrypted using a decryption key of the first VLAN and encrypted using a decryption key of the second VLAN. For cross-VLAN packets of VLANs that are not spliced together, the networking device drops the packets.

IPC Classes  ?

11.

COMMUNICATING STATUS MESSAGES IN AN INTERNET OF THINGS (IOT) NETWORK

      
Application Number IB2024058788
Publication Number 2025/057059
Status In Force
Filing Date 2024-09-10
Publication Date 2025-03-20
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Roys, Joshua
  • Lancaster, Joshua
  • Wert, Nathaniel

Abstract

Systems and techniques are described herein for communicating a status of a device. For instance, a method for communicating a status of a device is provided. The method may include: generating, by the device, a security key associated with the status of the device; providing the security key to a controller, wherein the device is configured to communicate via a first communications protocol, and wherein the controller is configured to communicate via a second communications protocol; generating, by the device, a status indicator indicative of the status of the device; encrypting, by the device, the status indicator using the security key to generate an encrypted status indicator; and transmitting, by the device to a networking device, the encrypted status indicator according to the first communications protocol.

IPC Classes  ?

12.

GENERATING A SECURED ENHANCEMENT VIDEO LAYER INCLUDING A PERSONALIZED WATERMARK FOR PREVENTING UNAUTHORIZED VIDEO DATA DISTRIBUTION VIA PROCESSING CIRCUITRY

      
Application Number EP2024075403
Publication Number 2025/056626
Status In Force
Filing Date 2024-09-11
Publication Date 2025-03-20
Owner NAGRAVISION SARL (Switzerland)
Inventor Gidley, Benjamin

Abstract

A method, device, and computer readable medium that applies a personalized watermark to an enhancement video layer, the enhancement video layer configured to adjust a quality level of a base video layer when applied to the base video layer, the base video layer having a first quality level, the base video layer generated from source video data.

IPC Classes  ?

  • G06T 1/00 - General purpose image data processing
  • H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
  • H04N 21/8358 - Generation of protective data, e.g. certificates involving watermark

13.

DATA PROCESSING COMPONENT, SOLID-STATE STORAGE DEVICE, AND CORRESPONDING COMPUTER-IMPLEMENTED METHOD

      
Application Number EP2024074367
Publication Number 2025/046120
Status In Force
Filing Date 2024-08-30
Publication Date 2025-03-06
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

A data processing component for controlling storage of data to a solid-state storage device comprising a plurality of N physical storage blocks comprises a controller and a memory, wherein: the memory stores a mapping between a plurality of M logical storage blocks accessible by an operating system of a computing device and a respective physical storage block of the plurality of N physical storage blocks; and the controller is configured, in response to receiving a request from the operating system to store incoming data in a first specified logical storage block which is mapped to a first physical storage block, to execute a method comprising: determining that the first specified logical storage block is unavailable for the storage of incoming data, and in response to determining that the first specified logical storage block is unavailable for the storage of incoming data: identifying a second physical storage block of the plurality of N physical storage blocks for storage of the incoming data based on a history value of the second physical block, the history value indicative of a most recent time at which that physical storage block was updated and/or a number of times that that physical storage block has been updated; and storing the incoming data in the second physical storage block. A solid-state storage device and computer-implemented method are also provided.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 12/02 - Addressing or allocationRelocation

14.

EXTENDED SCENE VIEW

      
Application Number 18827343
Status Pending
Filing Date 2024-09-06
First Publication Date 2025-02-27
Owner NAGRAVISION SARL (Switzerland)
Inventor Wendling, Bertrand

Abstract

The disclosure provides methods and content consumption devices that enable a scene, for example a 360° scene, that is larger (i.e. has more pixels in at least one dimension) than a display format of the content consumption device to be displayed. Constituent scene views are received individually by the content consumption device, for example as broadcasts, and are combined, for example stitched together, at the content consumption device to output a part of the scene that fits in the display format. The part of the scene (and hence the required constituent streams) to be displayed are determined by a signal, for example a navigational input from a user, enabling the user to navigate in the scene. By, for example, receiving a limited number of scene streams based on the scene streams required to produce the view that fits in the display format based on the signal, bandwidth requirements to view and navigate within the scene.

IPC Classes  ?

  • H04N 23/698 - Control of cameras or camera modules for achieving an enlarged field of view, e.g. panoramic image capture
  • G06T 3/067 - Reshaping or unfolding 3D tree structures onto 2D planes
  • G06T 3/4038 - Image mosaicing, e.g. composing plane images from plane sub-images
  • H04N 21/2368 - Multiplexing of audio and video streams
  • H04N 21/434 - Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams or extraction of additional data from a video streamRemultiplexing of multiplex streamsExtraction or processing of SIDisassembling of packetised elementary stream
  • H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
  • H04N 21/4728 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content for selecting a ROI [Region Of Interest], e.g. for requesting a higher resolution version of a selected region

15.

DATA PROCESSING COMPONENT AND COMPUTER PROCESSOR

      
Application Number EP2024072947
Publication Number 2025/036955
Status In Force
Filing Date 2024-08-14
Publication Date 2025-02-20
Owner NAGRAVISION SÁRL (Switzerland)
Inventor Pelletier, Herve

Abstract

A data processing component comprises a fault attack shielding and detection arrangement. Specifically, the data processing component comprises: a first layer comprising: a first data processing element, the first data processing element configured to receive a control input and to execute a predetermined operation on the control input to generate a control output; and a first comparator configured to compare the control output with an expected control output, and to generate a fault status signal if the control output is different from the expected control output; and a second layer comprising: a second data processing element identical to the first data processing element, configured to receive a first operational input and to execute the same predetermined operation on the first operational input to generate a first operational output. A computer processor may comprises the data processing component.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • G06F 11/16 - Error detection or correction of the data by redundancy in hardware
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering

16.

GENERATING AND TRANSMITTING A TOKEN FOR ACCOUNT AUTHENTICATION ACROSS MULTIPLE PLATFORMS VIA PROCESSING CIRCUITRY

      
Application Number IB2024057140
Publication Number 2025/032409
Status In Force
Filing Date 2024-07-23
Publication Date 2025-02-13
Owner NAGRAVISION SARL (Switzerland)
Inventor Gidley, Benjamin

Abstract

A method includes receiving, from a first application on a user device, a first sign-on request for obtaining access to content from a first content provider server; transmitting, to the first application, a token in response to receiving the first sign-on request, the token being accessible on the user device, the token providing access to the content on the first content provider server in response to the user device providing the token to the first content provider server; receiving, from a second application, the token and a second sign-on request for obtaining access to content from a second content provider server, the first application having determined the second application to be authorized to receive the token during the token request; and authorizing access to the content of the second content provider server to the second application.

IPC Classes  ?

  • G06F 21/41 - User authentication where a single sign-on provides access to a plurality of computers
  • H04L 9/40 - Network security protocols

17.

TRACKER DEVICE FOR ACCESSING DATA SENT BY A DONGLE CONNECTED TO A VEHICLE AND METHOD FOR SECURING THE MOVE OF SUCH DEVICE

      
Application Number 18717281
Status Pending
Filing Date 2022-12-08
First Publication Date 2025-02-06
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Hernandez, Juan-Ramon

Abstract

A method of detecting unauthorized use of a vehicle having a tracker device. The method includes transmitting a discovery message received by a wireless device, a backend server receiving a first request from the wireless device as a result of the wireless device receiving the discovery message, the first request being for having the tracker device be paired with the wireless device, and receiving a second request from the backend server instructing the tracker device to pair with the wireless device, the second request containing a unique identifier of the wireless device.

IPC Classes  ?

  • B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
  • H04W 8/00 - Network data management

18.

USER PRIVACY IN EXTENDED REALITY

      
Application Number 18358172
Status Pending
Filing Date 2023-07-25
First Publication Date 2025-01-30
Owner Nagravision Sàrl (Switzerland)
Inventor
  • Van Boven, Christian
  • Stevens, Charles

Abstract

Anonymous access may be provided using an authorization gateway. Anonymous access reuses objects in different extended reality environments rather than having each object be restricted to a single environment. Anonymous access increases privacy when using different environments. The user and the extended reality server communicate via an authorization gateway, preventing the extended reality server from directly gathering user information. A token issuing authority may issue tokens in response to payment and forward the payment to an extended reality provider. The user pays the token issuing authority and receives a token that does not identify the user. The token issuing authority forwards the payment to the extended reality provider. The user provides the token to the authorization gateway, which communicates with the extended reality server to provide the extended reality environment to the user. Thus, the user's payment is verified by the authorization gateway without specifically identifying the user.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/131 - Protocols for games, networked simulations or virtual reality

19.

METHODS, UNIT AND DEVICE FOR CONCURRENTLY EXECUTING FIRST AND SECOND BLOCK CRYPTOGRAPHIC COMPUTATIONS

      
Application Number 18779694
Status Pending
Filing Date 2024-07-22
First Publication Date 2025-01-30
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Macchetti, Marco
  • Pelletier, Hervé

Abstract

A method for concurrently executing a first block cryptographic computation (60) and a second block cryptographic computation (61) using a ciphering circuit. The first block cryptographic computation includes computing a first output block (42) by executing a plurality of first processing rounds (70i, 78) based on a first input block (38, 64), and the second block cryptographic computation includes computing a second output block (43) by executing a plurality of second processing rounds (75j, 79) based on a second input block (39, 65). The method further includes alternatingly executing respective first and second processing rounds in a round-interleaved sequence.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms

20.

METHODS, UNIT AND DEVICE FOR SUCCESSIVELY EXECUTING FIRST AND NEXT BLOCK CRYPTOGRAPHIC COMPUTATIONS

      
Application Number 18782220
Status Pending
Filing Date 2024-07-24
First Publication Date 2025-01-30
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Macchetti, Marco
  • Pelletier, Hervé

Abstract

A method for successively executing first and subsequent block cryptographic computations. These cryptographic computations include transforming a respective input block (38, 64) composed of a plurality of elements (107k), via a plurality of linear transformations (109, 115, 116, SR) and non-linear transformations (112), into a corresponding output block. The method includes: implementing a functional correspondence between input and output of the non-linear transformations (112) applied on the elements of the first input block (38, 64) during the first block cryptographic computation, and applying dynamical obfuscation (124) by re-encoding the functional correspondence into a modified functional correspondence between the input and the output of the non-linear transformations applied on elements of the next input block during the next block cryptographic computation.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

21.

IMPROVEMENTS IN AND RELATING TO CRYPTOGRAPHY

      
Application Number 18713457
Status Pending
Filing Date 2022-12-08
First Publication Date 2025-01-16
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Macchetti, Marco
  • Perrine, Jerome
  • Fischer, Nicolas

Abstract

A pairing method between a user device (1) and an operator device (2), the user device (1) being intended to receive conditional access data from the operator device (2), the user device having a user device identifier (UID), the operator having an operator device identifier (OID). The method comprises receiving, by the user device, a user device key (KUID) derived from a first cryptographically secure function and receiving, by the operator device, an operator key (KOID) derived from a second cryptographically secure function. The user device comprises a user device bilinear mathematical function (e(KUID, OID)) and the operator device comprises an operator bilinear mathematical function (e(UID, KOID)) which each define a pairing over an elliptic curve. The method includes generating, by the operator device (2), a pairing key (KD=e(UID, KOID)) between the user device (1) and the operator device (2), using the operator key (KOID) and the device identifier (UID) as variables of the operator mathematical function (e(UID, KOID)). The user device (1) generates the same pairing key (KD=e(KUID, OID)) using the user device key (KUID) and the operator device identifier (UID) as variables of the user device mathematical function e(KUID, OID).

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/08 - Key distribution

22.

BLOCK CRYPTOGRAPHIC METHOD FOR ENCRYPTING/DECRYPTING MESSAGES AND CRYPTOGRAPHIC DEVICES FOR IMPLEMENTING THIS METHOD

      
Application Number 18786687
Status Pending
Filing Date 2024-07-29
First Publication Date 2025-01-16
Owner NAGRAVISION SARL (Switzerland)
Inventor Wyseur, Brecht

Abstract

A block cipher method and apparatus using round repetition for providing, from a plaintext message (10), a ciphertext message (50) and a global tag (52) is disclosed. The plaintext message is converted into a plurality of ordered plaintext blocks (11) which are successively processed during a round for computing:—a cryptogram (30) by encrypting input data (20) using a single cryptographic key, said cryptogram comprising a first segment (31) and a second segment (32)—a ciphertext block (51) by performing a first operation (41) using, as operands: said first segment (31) said current plaintext block (11) and said second segment (32). At each next round said input data is newly determined based on the current ciphertext block and an updated reproducible data. The ciphertext message is determined by concatenating the ciphertext blocks and the global tag by a second operation (42) using computed authentication local tags as operands.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/60 - Protecting data
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

23.

ASSET LOCATING METHOD

      
Application Number EP2024069108
Publication Number 2025/012162
Status In Force
Filing Date 2024-07-05
Publication Date 2025-01-16
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Bahroun, Aymen
  • Fendri, Hedi
  • Lahlou, Lamyae
  • Gradassi, Luca

Abstract

A method for training a machine learning model for locating an asset in an environment when the machine learning model is executed on a computer system The method comprises receiving data corresponding to a plurality of training signals. The plurality of training signals are received at a plurality of receivers from a plurality of training tags located in the environment. The environment has a plurality of zones, and each of the training tags is associated with a zone in which it is located. The method further comprises generating training data for a first zone of the plurality of zones, wherein the training data for the first zone includes values of the training signals received from training tags located in the first zone, each value associated with the receiver at which a respective training signal was received. The method further comprises generating training data for a second zone of the plurality of zones, wherein the training data for the second zone includes values of the training signals received from training tags located in the second zone, each value associated with the receiver at which a respective training signal was received. The method further comprises training, using the training data for the first zone and the training data for the second zone, a machine learning model to output a zone as a determined location of an asset in the environment based on an input which includes data corresponding to one or more signals received at one or more receivers from a tag associated with the asset.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G01S 5/16 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using electromagnetic waves other than radio waves
  • G01S 5/18 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using ultrasonic, sonic, or infrasonic waves

24.

ASSET LOCATING METHOD

      
Application Number EP2024069120
Publication Number 2025/012170
Status In Force
Filing Date 2024-07-05
Publication Date 2025-01-16
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Bahroun, Aymen
  • Fendri, Hedi
  • Lahlou, Lamyae
  • Gradassi, Luca

Abstract

A method for training a machine learning model for locating an asset in an environment when the machine learning model is executed on a computer system, wherein the environment comprises a plurality of zones. The method comprises receiving data corresponding to a first set of training signals, wherein the first set of training signals are received at a plurality of receivers, within a first data collection period, from a plurality of training tags located in a first zone of the plurality of zones. The plurality of training tags are moved from a first position in the first zone to a second position in the first zone within the first data collection period. The method also comprises receiving data corresponding to a second set of training signals, wherein the second set of training signals are received at the plurality of receivers, within a second data collection period, from a plurality of training tags located in a second zone of the plurality of zones. The plurality of training tags are moved from a first position in the second zone to a second position in the second zone within the second data collection period. The method further comprises generating training data for the first zone, wherein the training data for the first zone comprises values of the training signals received from training tags located in the first zone within a first predefined deviation window, Wt, within the first data collection period, each value associated with the receiver at which a respective training signal was received. The method further comprises generating training data for the second zone, wherein the training data for the second zone comprises values of the training signals received from training tags located in the second zone within a second predefined deviation window, Wt', within the second data collection period, each value associated with the receiver at which a respective training signal was received. The method also comprises training, using the training data for the first zone and the training data for the second zone, a machine learning model to output a zone as a determined location of an asset in the environment based on an input including data corresponding to one or more signals received at one or more receivers from a tag associated with the asset.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • G06N 20/00 - Machine learning
  • G01S 5/16 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using electromagnetic waves other than radio waves
  • G01S 5/18 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using ultrasonic, sonic, or infrasonic waves

25.

SYSTEMS AND TECHNIQUES FOR PROCESSING NON-FUNGIBLE TOKENS

      
Application Number 18712631
Status Pending
Filing Date 2022-11-29
First Publication Date 2025-01-09
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Hamiel, Nathan
  • Rudresh, Vishruta Gowda
  • Spanier, Ryan

Abstract

Aspects of the present disclosure include systems and techniques for processing non-fungible tokens. In some aspects, the techniques described herein relate to a method for non-fungible token (NFT) processing, including: encrypting information associated with an NFT using a first key of a key pair to yield encrypted NFT information; retrieving, from at least two entities, at least two key sections associated with a second key of the key pair: decrypting the encrypted NFT information associated with the NFT via the at least two key sections to yield decrypted NFT information; and outputting the decrypted NFT information.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

26.

AUTOMATED VIDEO CLIP NON-FUNGIBLE TOKEN (NFT) GENERATION

      
Application Number 18710923
Status Pending
Filing Date 2022-08-19
First Publication Date 2025-01-09
Owner NAGRAVISION SARL (Switzerland)
Inventor Spanier, Ryan

Abstract

Certain aspects of the present disclosure are directed towards a method for non-fungible token processing. The method generally includes identifying a trigger for generating a non-fungible token associated with a video clip, extracting a portion of the video clip in response to identifying the trigger, generating the non-fungible token corresponding to the portion of the video clip, and outputting the non-fungible token for hosting on a platform.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06Q 30/0283 - Price estimation or determination
  • H04N 21/2187 - Live feed
  • H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs

27.

METHOD FOR TRACKING THE PROCESSING OF A DIGITAL ASSET, METHOD FOR IDENTIFYING SUCH PROCESSING, CORRESPONDING COMPUTER PROGRAM PRODUCTS AND DEVICES

      
Application Number 18744773
Status Pending
Filing Date 2024-06-17
First Publication Date 2024-12-26
Owner NAGRAVISION Sàrl (Switzerland)
Inventor Sarda, Pierre

Abstract

A method for tracking the processing of an initial digital asset according to at least one processing step delivering an output digital asset from at least one input digital asset, which is a function of the initial digital asset. The method includes watermarking the output digital asset with a watermark, representative of an identifier of the output digital asset; and creating, in a blockchain, metadata associated to the output digital asset, the metadata being associated with the identifier.

IPC Classes  ?

28.

METHOD FOR LOCATING OBJECT ATTACHED TO WIRELESS COMMUNICATION DEVICE

      
Application Number EP2024065947
Publication Number 2024/256332
Status In Force
Filing Date 2024-06-10
Publication Date 2024-12-19
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Depraz, Florian

Abstract

The wireless communication device (100) includes a plurality of environmental sensors (106) configured to measure various environmental properties of an environment surrounding the object (200). The method comprises the steps, performed by a processor (114), of: - receiving measured environmental data from the plurality of environmental sensors (106) measuring the various environmental properties; - determining location information of the object (200) using the measured environmental data.

IPC Classes  ?

29.

ACCESS MANAGEMENT SYSTEM FOR MANAGING ACCESS TO RESOURCES

      
Application Number 18702889
Status Pending
Filing Date 2022-11-01
First Publication Date 2024-12-19
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Aviolat, Romain

Abstract

A system and method, the system including a database storing resource type elements describing resources, permission type elements describing permissions related to the resources, and user type elements describing users, each user type element being assigned to at least on e permission. The system has an access manager including a processor, and, for each resource, a resource provisioning software component that executes a resource provisioning task with the corresponding resource manager, by using APIs, to check and ensure a consistency between expected permissions on the resource assigned to users in the database, and permissions on the resource configured with the resource manager. A workflow automation software component automatically executes a workflow including the execution of each of the resource provisioning software components.

IPC Classes  ?

30.

METHOD FOR SECURING THE ACCESS TO A CONTENT, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number EP2024066159
Publication Number 2024/256430
Status In Force
Filing Date 2024-06-12
Publication Date 2024-12-19
Owner NAGRAVISION SARL (Switzerland)
Inventor Bieber, Yann

Abstract

A method is proposed for securing the access to a content delivered by a content provider system (110) to a receiving device (100) through a communications network, the content being associated to at least one access condition. According to such method, the receiving device executes: - obtaining (S200) a verifiable presentation request, the verifiable presentation being representative of at least one verifiable credential attribute corresponding to a respective access condition associated to the content; - providing (S210) the verifiable presentation request to a digital wallet (130) comprising the at least one verifiable credential attribute; and - obtaining (S230) an access information representative of the right of accessing the content when the at least one verifiable credential attribute comply with the at least one access condition.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

31.

DEVICE FOR ACCESSING DATA SENT BY A DONGLE CONNECTED TO A VEHICLE AND METHOD FOR REDUCING THE POWER CONSUMPTION OF SUCH DEVICE

      
Application Number 18700455
Status Pending
Filing Date 2022-10-10
First Publication Date 2024-12-12
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Hernandez, Juan-Ramon

Abstract

A device for accessing data sent by a dongle connected to a vehicle. The device is battery powered and wirelessly communicates with at least one dongle connected to corresponding vehicle, a backend server through a communications network, and at least one terminal equipment configured for acting as a relay for exchange of data between the device and the backend server.

IPC Classes  ?

  • G07C 5/00 - Registering or indicating the working of vehicles
  • H04W 4/23 - Services signallingAuxiliary data signalling, i.e. transmitting data via a non-traffic channel for mobile advertising
  • H04W 8/00 - Network data management
  • H04W 76/14 - Direct-mode setup

32.

ACCESS MANAGEMENT SYSTEM AND ASSOCIATED COMPUTER-IMPLEMENTED METHODS

      
Application Number 18712198
Status Pending
Filing Date 2022-11-23
First Publication Date 2024-12-12
Owner NAGRAVISION SARL (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

An access management system for controlling access to an electronic resource is provided, wherein the electronic resource accessible at a resource address, and provided by a service provider having associated therewith an electronic provider address, the system comprising: a request management module, configured to determine whether a registration request received at the electronic provider address is a valid registration request, wherein: the registration request includes a public key or data identifying the public key, associated with a client device or user thereof from which the registration request is received; and an authorized client management module configured to add the public key of the user, or data identifying the public key, to an authorized list, if the request management module determines that the registration request is a valid registration request, wherein: when a public key or data identifying the public key of the client device is on the authorized list, the client device or user thereof is permitted to access the electronic resource. Another similar access management system and associated computer-implemented methods are also provided.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

33.

PROVIDING SECURE INTERNET ACCESS TO A CLIENT DEVICE IN A REMOTE LOCATION

      
Application Number 18712207
Status Pending
Filing Date 2022-11-23
First Publication Date 2024-12-12
Owner NAGRAVISION SARL (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

A system for providing a client device in a remote location secure access to the internet via a satellite connection is provided includes: a client device: a satellite system configured to provide the client device with access to the internet; and an internet service provider (ISP), wherein, during a registration process: the satellite system is configured to receive a first blockchain state signal which encodes information about a first state of a blockchain, and to generate and transmit a first RF broadcast signal encoding the information about the first state of the blockchain: the client device is configured to receive the first RF broadcast signal, to generate a registration request based on the information about the state of the blockchain, the registration request including a public key ID associated with the client device, and to be transmitted to an electronic address corresponding to a blockchain associated with the ISP, and to transmit the registration request to the satellite system: the satellite system is configured to receive the registration request, and to transmit it to the electronic address associated with the ISP; the ISP is configured to determine whether the registration request is a valid request, and if the registration request is a valid request, to add the public key ID to an authorized list, wherein when a public key ID is on the authorized list, the client device or user thereof is permitted to access the internet via the satellite system. Similar methods and systems relation to connection requests are also provided.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • H04B 7/185 - Space-based or airborne stations
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

34.

DEVICE FOR TRACKING OBJECT

      
Application Number EP2024064935
Publication Number 2024/251609
Status In Force
Filing Date 2024-05-30
Publication Date 2024-12-12
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Depraz, Florian

Abstract

The device (100) for tracking an object (200), comprising means for attaching to said object (200), a wireless communication circuit (102), at least two antenna modules (104) having respective positions different from one another, and at least one processor (108) configured to: - select one of the at least two antenna modules (104) based on information indicative of a best-oriented antenna module for wireless communication among the at least two antenna modules; - transmit or receive one or more signals for tracking said object (200) using the wireless communication circuit (102) and the selected best-oriented antenna module (104).

IPC Classes  ?

  • G01S 1/70 - Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmittersReceivers co-operating therewith using electromagnetic waves other than radio waves
  • G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
  • G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • G08B 21/24 - Reminder alarms, e.g. anti-loss alarms
  • G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
  • H04W 4/029 - Location-based management or tracking services
  • H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
  • H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
  • G01S 5/14 - Determining absolute distances from a plurality of spaced points of known location
  • G08B 21/02 - Alarms for ensuring the safety of persons

35.

METHODS AND SYSTEMS FOR SYNCHRONIZING A DEVICE WITH A BLOCKCHAIN

      
Application Number 18712210
Status Pending
Filing Date 2022-11-23
First Publication Date 2024-12-12
Owner NAGRAVISION SARL (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

A method of synchronizing a device with a blockchain includes: receiving information about a first state of a blockchain; generating an RF broadcast signal encoding the information about the first state of the blockchain; and transmitting, at a first time, the first broadcast signal to the device. Similar methods for maintaining synchronization and for writing new data to a blockchain are also provided, as well as corresponding devices.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

36.

KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORK

      
Application Number 18748149
Status Pending
Filing Date 2024-06-20
First Publication Date 2024-12-12
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Fischer, Jean-Bernard
  • Thomas, Frederic
  • Gremaud, Fabien

Abstract

The present disclosure proposes method and systems for establishing secure communication session(s) between a first device and a second device, where the first device operates in a user network and implements a first key exchange protocol for secure communication. The second device is capable of communicating with the first device over a wireless communication network. The second device implements a second key exchange protocol that is different to the first key exchange protocol for secure communication. A proxy entity configured for implementing the first and the second key exchange protocols for secure communication is provided. The proxy entity is configured for generating and/or provisioning one or more session keys for the first and the second devices using the key exchange protocols specific to each device for establishing secure communication between the first and second device based on the generated session key(s).

IPC Classes  ?

37.

SYSTEM AND METHOD FOR TRACKING OF ASSETS

      
Application Number 18721899
Status Pending
Filing Date 2022-12-29
First Publication Date 2024-12-05
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Michelet, Matthieu
  • Métral, Pascal
  • Sharp, Michael
  • Marx, Clément
  • Chinelli, Adrien
  • Gee, Jerry

Abstract

The present disclosure relates to asset tracking. In particular, the present disclosure relates to facilitating asset supervision and monitoring. Further in particular, the present disclosure relates to a system and method incentivising user behaviour to increase a reliability of the asset tracking. Accordingly, there is provided a method (300) for tracking of at least one asset, comprising the steps receiving (302) ID information (108) of a particular asset, receiving (304) user information of a particular user, receiving (306) location information, wherein the location information is location information of the asset and/or the user, storing (308), in a database, tracking information based on at least one of the received information, associated with the asset, determining (310), based on at least one of the received information, whether to provide ancillary information associated with the asset to the user, determining (312), based on the user information, information to be transmitted to the user, wherein the information to be transmitted is at least a subset of the ancillary information associated with the asset, and providing (314) said information to be transmitted to the user.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

38.

METHOD AND SYSTEM FOR AUTHENTICATION OF RF DEVICE

      
Application Number 18693817
Status Pending
Filing Date 2022-09-16
First Publication Date 2024-11-28
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Ayhan, Sinan
  • Conus, Joël

Abstract

The method for authenticating a first device, the method including receiving RF signals from the first device, acquiring feature data from the received RF signals, fitting a model for authenticating the first device using the acquired feature data, storing in memory the fitted model in a second device, and, by the second device receiving a new RF signal from a device to authenticate, acquiring feature data from the new RF signal, and determining whether or not the device to authenticate is the first device by transmitting the feature data, acquired from the new RF signal, as input to the fitted model, the feature data acquired from a RF signal includes values of only one of an in-phase component and a quadrature component of the RF signal over time.

IPC Classes  ?

39.

ENHANCEMENT OF MEDIA CONTENT CONSUMPTION

      
Application Number 18665204
Status Pending
Filing Date 2024-05-15
First Publication Date 2024-11-21
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bennett-James, Jonathan
  • Holbrook, Craig

Abstract

Systems and techniques are provided for enhancing media content. In some examples, a network device of a network can detect a first event tag in an item of media content. The first event tag is associated with a first event in the item of media content and a first functionality of a first client device connected to the network. The first functionality corresponds to the first event in the item of media content. The network device can transmit, based on detecting the first event tag in the item of media content, a first activation message to the first client device to cause the first client device to perform the first functionality corresponding to the first event in the item of media content.

IPC Classes  ?

  • H04L 41/069 - Management of faults, events, alarms or notifications using logs of notificationsPost-processing of notifications
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 67/75 - Indicating network or usage conditions on the user display

40.

ENHANCEMENT OF MEDIA CONTENT CONSUMPTION

      
Application Number IB2024054743
Publication Number 2024/236514
Status In Force
Filing Date 2024-05-15
Publication Date 2024-11-21
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bennett-James, Jonathan
  • Holbrook, Craig

Abstract

Systems and techniques are provided for enhancing media content. In some examples, a network device of a network can detect a first event tag in an item of media content. The first event tag is associated with a first event in the item of media content and a first functionality of a first client device connected to the network. The first functionality corresponds to the first event in the item of media content. The network device can transmit, based on detecting the first event tag in the item of media content, a first activation message to the first client device to cause the first client device to perform the first functionality corresponding to the first event in the item of media content.

IPC Classes  ?

  • H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
  • H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
  • H04N 21/41 - Structure of clientStructure of client peripherals
  • H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
  • H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs

41.

METHOD FOR PROVISIONING DEVICE WITH CREDENTIALS

      
Application Number EP2024061474
Publication Number 2024/231132
Status In Force
Filing Date 2024-04-25
Publication Date 2024-11-14
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Gremaud, Fabien

Abstract

Method for provisioning device with credentials The device (200) includes a device private key (K1pr) of a pair of public and private asymmetric keys (K1pub, K1pr). The method comprising the steps, performed by the device (200) of - receiving, from a credential provider, the device credentials in encrypted form, - internally self-determining information about a current configuration of the device (200); - generating a device attestation information based on the determined information about the current configuration of the device; - generating a decryption key (K4i) based on the device private key (K1pr) and the generated device attestation information; and - decrypting the received device credentials in encrypted form with the decryption key to provision the device (200) with the device credentials.

IPC Classes  ?

42.

METHOD OF EMBEDDING DATA IN A VIRTUAL OBJECT

      
Application Number EP2024062613
Publication Number 2024/231401
Status In Force
Filing Date 2024-05-07
Publication Date 2024-11-14
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

A computer-implemented method of embedding data in a virtual object is provided. The virtual object is generated from a mesh of polygons. The polygons comprise edges meeting at vertices, each of the vertices being represented by initial coordinates in 3D space. The computer-implemented method comprises: receiving the initial coordinates of the vertices of the virtual object; receiving the data to be embedded in the virtual object; determining a respective set of spatial adjustments for the initial coordinates of a plurality of the vertices. The set of spatial adjustments corresponds to the data being embedded. The method further comprises: adjusting the initial coordinates of the plurality of the vertices by the respective set of spatial adjustments, to generate adjusted coordinates of the vertices and encoding the data using an error and deletion correction code.

IPC Classes  ?

  • G06T 1/00 - General purpose image data processing
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
  • H03M 13/37 - Decoding methods or techniques, not specific to the particular type of coding provided for in groups

43.

METHOD FOR PAIRING A CONTENT PROVIDER SYSTEM AND A RECEIVING DEVICE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number 18651810
Status Pending
Filing Date 2024-05-01
First Publication Date 2024-11-07
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Macchetti, Marco
  • Hunacek, Didier
  • Villegas, Karine

Abstract

A method for pairing a content provider system and a receiving device, a cryptographic function and a receiving device unique identifier being populated in the receiving device. According to such method, the receiving device executes: obtaining a first key which is a result of a first function taking as arguments an Identity Based Encryption scheme master key owned by an authority server and an output of the cryptographic function applied to the receiving device unique identifier; receiving, from the content provider system, a content provider unique identifier; and computing a secret key which is a result of a second function taking as operands the first key and an output of the cryptographic function applied to the content provider unique identifier, the secret key being known from the content provider system.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

44.

METHOD FOR RECEIVING CONTENT IN USER DEVICE OVER CDN

      
Application Number EP2024060689
Publication Number 2024/223424
Status In Force
Filing Date 2024-04-19
Publication Date 2024-10-31
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Bieber, Yann

Abstract

The method comprises the steps, performed by the user device (300), of: sending an access request to access a content to a content provider system (100); receiving, from the content provider system (100), an access token for said content, said access token including an encrypted session key, and a Digital Right Management, DRM, license, including said session key; and transmitting a content request including the received access token to a content delivery network and, in response, receiving from the content delivery network content data of the requested content, in a communication session; wherein the content request further comprises an authentication tag obtained by executing a cryptographic operation, performed by a DRM client module (320) of the user device (300), of signing and/or encrypting, with the session key of the received DRM license, input data that is based on at least part of the content request.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

45.

METHOD FOR SECURING AT LEAST ONE APPLICATION ASSOCIATED WITH AN APPLICATION PROTECTION AGENT, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number EP2024061165
Publication Number 2024/223611
Status In Force
Filing Date 2024-04-24
Publication Date 2024-10-31
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Aviolat, Romain
  • Ruiz, Cristian
  • Kondah, Mouad

Abstract

A method is proposed for securing at least one application operated in a first server communicatively connected to a second server. An application protection agent of a RASP type is associated with the application in the first server. A second security agent is implemented in the second server. According to such method, a first security agent implemented in the first server executes: - receiving (S430), from the application protection agent, at least one first information indicative that a threat has been detected in the application by the application protection agent; and - sending (S440), to the second security agent, the at least one first information.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

46.

GENERATING AND UPDATING ELECTRONIC AUTHORIZATION CONTENT USING AUTOMATED POSITIONING IN A PHYSICAL ENVIRONMENT

      
Application Number 18300469
Status Pending
Filing Date 2023-04-14
First Publication Date 2024-10-17
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Gremaud, Fabien
  • Dubrova, Serge

Abstract

A method for automated authorization within a restricted perimeter, comprising receiving, via processing circuitry, a digital credential of a first device, a location of the first device within the restricted perimeter, and an image of an area within the restricted perimeter; verifying the digital credential; identifying a presence of an occupant in the image; associating the occupant with the digital credential and the location of the first device based on the image; and authorizing the occupant based on the digital credential and the location of the first device.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management

47.

METHOD AND DEVICE FOR PROVIDING AN AUTHORIZATION TO ACCESS A VEHICLE

      
Application Number 18547262
Status Pending
Filing Date 2022-02-10
First Publication Date 2024-09-26
Owner Nagravision Sàrl (Switzerland)
Inventor Zhao, Yishan

Abstract

A method for providing authorization to access a vehicle using a portable electronic key. The vehicle comprises two transceivers configured to emit a first signal and to receive a second signal from the portable electronic key. The authorization is subject to a successful completion of a control procedure including determining, for each of the first signals, a first piece of information based on at least one strength measurement of the first signal at the portable electronic key, determining, for the second signal, a second piece of information and checking whether first pieces of information determined for the first signals based on at least one strength measurement of the first signals at the portable electronic key are consistent with second pieces of information determined for the second signal based on at least one strength measurement of the second signal at each of the transceivers, and, if so, initiating or granting access to an unlocking procedure configured to provide the authorization.

IPC Classes  ?

48.

MACHINE LEARNING BASED MEDIA CONTENT ANNOTATION

      
Application Number 18618080
Status Pending
Filing Date 2024-03-27
First Publication Date 2024-09-19
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bennett-James, Jonathan
  • Holbrook, Craig

Abstract

Systems and techniques are described herein for annotating media content. For example, a process can include obtaining media content and generate, use one or more machine learning models, a metadata file for at least a portion of the media content. The metadata file includes one or more metadata descriptions. The process can include generating a text description of the media content based on the one or more metadata descriptions of the metadata file. The process can include annotating the media content use the text description.

IPC Classes  ?

  • H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
  • G06N 20/00 - Machine learning
  • G06V 20/40 - ScenesScene-specific elements in video content
  • H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel

49.

CRYPTOGRAPHIC KEY CONFIGURATION USING PHYSICAL UNCLONABLE FUNCTION

      
Application Number 18616542
Status Pending
Filing Date 2024-03-26
First Publication Date 2024-09-12
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Hunacek, Didier
  • Macchetti, Marco
  • Perrine, Jerome

Abstract

The disclosure relates to a method of obtaining a cryptographic key in a chipset (1). An initial configuration message may be generated using a physical unclonable function (hereinafter: PUF) (22) of the chipset (1). Said PUF (22) may generate a predetermined value when using the initial configuration message as input to the PUF (22). The initial configuration message may be transmitted to a client access server (31). An altered configuration message may be received from the client access server (31), wherein the altered configuration message is generated by the client access server (31) based on the initial configuration message. The cryptographic key may be obtained from the PUF (22) using the altered configuration message as input to the PUF (22).

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

50.

METHOD FOR SYNCHRONIZING A PLURALITY OF MULTIMEDIA COMPONENTS, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number 18592782
Status Pending
Filing Date 2024-03-01
First Publication Date 2024-09-05
Owner NAGRAVISION SARL (Switzerland)
Inventor Conus, Joël

Abstract

A method is proposed for synchronizing a plurality of multimedia components selected among audio and video components of a digital multimedia processed by a media player. Each of the multimedia component is rendered on a multimedia rendering device receiving the multimedia component from the media player through a respective path. The media player is configured to obtain, for each multimedia rendering device, a delay data representative of a propagation delay of the multimedia component from the reception of the multimedia component to its rendering by the multimedia rendering device, determine a buffering delay representative of a difference between a maximum value and a minimum value among the delay data; and provide the buffering delay to at least one buffer implemented along a path of the multimedia component corresponding to the minimum value among the delay data.

IPC Classes  ?

  • H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware

51.

MEDIA PLAYER FOR RECEIVING MEDIA CONTENT FROM A REMOTE SERVER

      
Application Number 18416561
Status Pending
Filing Date 2024-01-18
First Publication Date 2024-08-15
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Pathak, Aditee Anil
  • Stransky, Philippe
  • Singh, Gyanveer

Abstract

An embodiment of the present invention may be deployed in a system comprising a media player and a remote server operably connected to communicate with one another. The invention allows for a settings file to be stored on the remote server, the settings file comprising parameters useful for adjusting different settings on the media player such that rendering of a particular content to be made possible on the media player according to a user's predetermined taste by downloading the settings from the server onto the media player.

IPC Classes  ?

  • H04L 67/565 - Conversion or adaptation of application format or content
  • H04L 9/40 - Network security protocols
  • H04L 65/60 - Network streaming of media packets
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/303 - Terminal profiles
  • H04L 67/306 - User profiles
  • H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
  • H04W 12/06 - Authentication

52.

SYSTEMS AND TECHNIQUES FOR BLOCKCHAIN MONITORING

      
Application Number IB2024051094
Publication Number 2024/165996
Status In Force
Filing Date 2024-02-06
Publication Date 2024-08-15
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Hamiel, Nathan
  • Rudresh, Vishruta Gowda

Abstract

The present disclosure generally relates to monitoring a blockchain wallet. For example, aspects of the present disclosure include systems and techniques for monitoring a blockchain wallet. One example method for monitoring a blockchain wallet includes: generating a plurality of blockchain wallets associated with a blockchain service, the plurality of blockchain wallets comprising a user wallet and a plurality of monitored wallets; transferring funds to the plurality of monitored wallets; monitoring the plurality of blockchain wallets to identify unauthorized access of any of the plurality of blockchain wallets; in response to identifying unauthorized access of one of the plurality of monitored wallets, generating a notification that the one of the plurality of monitored wallets has been compromised; and outputting the notification.

IPC Classes  ?

  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

53.

CONDITIONAL ACCESS SYSTEM BASED AUDIENCE MEASUREMENT

      
Application Number EP2024052940
Publication Number 2024/165576
Status In Force
Filing Date 2024-02-06
Publication Date 2024-08-15
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Fernandez, Carlos
  • Bieber, Yann

Abstract

The present disclosure relates to conditional access systems In particular, the present disclosure relates to audience measurement in a conditional access system. Accordingly, there is provided a method (300) for audience related analytics measurements in a media consumption environment (100) comprising a media provisioning system (102) and a media playback device (104), the method comprising the steps of receiving (302), by the media playback device (104), encrypted and/or scrambled media data from a media provisioning system (102), receiving (304), by the media playback device (104), key data comprising at least one decryption/descrambling key for decrypting and/or descrambling the media data, wherein the media playback device (104) is processing the key data to obtain the decryption/descrambling key, and wherein the key data is indicative of a particular media data and/or a particular consumption time of media data or a particular media data, generating (306) analytics data (106) related to the processing of the data key on the media playback device (104), transmitting (308) at least part of the analytics data to the media provisioning system (102).

IPC Classes  ?

  • H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
  • H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
  • H04N 21/4385 - Multiplex stream processing, e.g. multiplex stream decrypting
  • H04N 21/426 - Internal components of the client
  • H04N 21/4623 - Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
  • H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
  • H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
  • H04N 21/6334 - Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
  • H04N 21/6377 - Control signals issued by the client directed to the server or network components directed to server
  • H04N 21/835 - Generation of protective data, e.g. certificates

54.

SYSTEMS AND TECHNIQUES FOR USER RESPONSE ANALYSIS

      
Application Number EP2024052796
Publication Number 2024/161040
Status In Force
Filing Date 2024-02-05
Publication Date 2024-08-08
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Berkes, Pietro
  • Fivaz, Mathieu
  • Daolio, Fabio
  • Suter, Samuel

Abstract

The present disclosure generally relates to user response analysis. For example, aspects of the present disclosure include systems and techniques for identifying a response of a user to a particular action. One example method includes obtaining, via a user prediction system, one or more actions associated with a subscription service; obtaining, via the user prediction system, user characteristics associated with each user of one or more users of the subscription service; determining, via the user prediction system, a probability of a reaction of the one or more users in response to each of the one or more actions based on the user characteristics; and providing a user response prediction output based on the probability of the reaction.

IPC Classes  ?

  • G06Q 30/0201 - Market modellingMarket analysisCollecting market data

55.

Content protection

      
Application Number 18440588
Grant Number 12200279
Status In Force
Filing Date 2024-02-13
First Publication Date 2024-08-08
Grant Date 2025-01-14
Owner NAGRAVISION Sarl (Switzerland)
Inventor
  • Schwarz, Christian
  • Nicoulin, Andre
  • Hunacek, Didier

Abstract

Devices, servers, systems and methods for content protection are provided. Disclosed embodiments improve temporal granularity of controlling access to the protected content and increase resilience against attacks attempting to prevent re-evaluation of conditions of access. Enforcement of re-evaluation may be based on the receipt and/or verification of tokens. In some embodiments, re-evaluation is enforced by periodically rendering content keys required for content decryption unuseable and/or clearing content keys already in use.

IPC Classes  ?

  • H04N 21/2347 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04N 7/167 - Systems rendering the television signal unintelligible and subsequently intelligible
  • H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
  • H04N 21/418 - External card to be used in combination with the client device, e.g. for conditional access
  • H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
  • H04N 21/4623 - Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]

56.

SYSTEMS AND TECHNIQUES FOR MULTI-PARTY COMPUTATION (MPC) SIGNATURE WITH KEY CARDS AND MOBILE TERMINALS

      
Application Number IB2024050419
Publication Number 2024/154060
Status In Force
Filing Date 2024-01-16
Publication Date 2024-07-25
Owner NAGRAVISION SARL (Switzerland)
Inventor Devallonné, Luc

Abstract

Aspects are described herein for providing access control based on key sections of a key of a key pair. For example, a computing device can receive, from at least two entities, at least two key sections associated with a first key of a key pair. The computing device can generate the first key of the key pair based on the at least two key sections. The computing device can further output the first key to provide access to a service.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

57.

Secure installation of application keys

      
Application Number 18542551
Grant Number 12244691
Status In Force
Filing Date 2023-12-15
First Publication Date 2024-07-25
Grant Date 2025-03-04
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Fischer, Jean-Bernard
  • Fischer, Nicolas
  • Gremaud, Fabien
  • Villegas, Karine

Abstract

The present disclosure includes methods, devises and systems for preparing and installing one or more application keys owned by application owners in a remote device. The present disclosure further proposes methods, devices and systems for secure installation of subsequent application keys on a device utilising corresponding key derivation functions to associate an application with a respective policy and identifier using significantly lmv bandwidth for transfer of keys for execution of the respective application on the device.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms

58.

MEDIA AUTHENTICATION BASED ON MACHINE LEARNING OUTPUT FEATURES

      
Application Number IB2024050415
Publication Number 2024/154056
Status In Force
Filing Date 2024-01-16
Publication Date 2024-07-25
Owner NAGRAVISION SARL (Switzerland)
Inventor Buffard, Christophe

Abstract

Methods and systems are described herein for authenticating streaming media, based on the use of computer vision or artificial intelligence. An untrained neural network generates a first feature vector from an identified image frame of a first media stream that is encoded with a first encoding scheme. The same or a similar untrained neural network generates a second feature vector from an identified image frame of a second media stream that is encoded with a second encoding scheme. The two encoding schemes do not need to be the same. The two feature vectors are compared, and the second media stream is presumed to be authentic if the differences between the two feature vectors is less than a predetermined threshold.

IPC Classes  ?

  • G06V 20/40 - ScenesScene-specific elements in video content

59.

SYSTEMS AND TECHNIQUES FOR MEDIA PROCESSING TO REMOVE PRIVATE INFORMATION

      
Application Number IB2024050221
Publication Number 2024/150141
Status In Force
Filing Date 2024-01-09
Publication Date 2024-07-18
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bennett-James, Jonathan
  • Holbrook, Craig
  • Mcghee, Robert
  • Powell, Matthew
  • Davies, Graham
  • Kramer, John

Abstract

The present disclosure generally relates to systems and techniques for processing media. For example, aspects of the present disclosure include systems and techniques for editing media to remove personal information. Certain aspects of the present disclosure provide an apparatus for media processing including a memory and one or more processors coupled to the memory. The one or more processors may be configured to: retrieve media showing an environment as captured using a recording element; identify or receive input to identify a geographical boundary within the environment; process the media to identify a first feature within the environment; determine whether a portion of the media is to be deleted based on whether the first feature is outside the geographical boundary; and delete the portion of the media based on the determination.

IPC Classes  ?

  • G11B 27/031 - Electronic editing of digitised analogue information signals, e.g. audio or video signals
  • H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
  • G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

60.

CONTENT COMPLETION DETECTION FOR MEDIA CONTENT

      
Application Number 18423488
Status Pending
Filing Date 2024-01-26
First Publication Date 2024-07-18
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bennett-James, Jonathan
  • Singh, Bineet Kumar
  • Kumar, Nishant

Abstract

Systems and techniques are described herein for processing media content. For example, a process can include obtaining a first media frame and a second media frame. The process can include generating, using a first change detector, a first tag indicating a change above a first change threshold has occurred in the second media frame relative to the first media frame. The process can further include generating, using a machine learning model, a second tag indicating that media content of the second media frame is associated with a particular type of media content. The process can further include determining, based the first tag and the second tag, that the media content of the second media frame is associated with the particular type of media content.

IPC Classes  ?

  • H04L 65/613 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for the control of the source by the destination

61.

DEVICE AND METHOD FOR MONITORING AT LEAST ONE VEHICLE IDENTIFICATION NUMBER

      
Application Number 18565205
Status Pending
Filing Date 2022-06-02
First Publication Date 2024-07-18
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Hernandez, Juan-Ramon
  • Schmidbauer, Hardy

Abstract

A device for monitoring at least one vehicle identification number sent by a dongle connected to an on-board diagnostics, hereafter OBD, port of a vehicle. The device is battery powered and wirelessly communicates with at least one dongle connected to an OBD port of a corresponding vehicle, and a backend server through a communication network.

IPC Classes  ?

  • G07C 5/00 - Registering or indicating the working of vehicles

62.

Method to transmit messages between a device and a remoter server

      
Application Number 18417897
Grant Number 12278871
Status In Force
Filing Date 2024-01-19
First Publication Date 2024-07-11
Grant Date 2025-04-15
Owner NAGRAVISION SARL (Switzerland)
Inventor Kudelski, Andre

Abstract

In order to allow an access to the Internet, and therefore to a remote server, for a device having no connection with an Internet gateway, a method is provided to transmit a message from a first device to a remote server, the first device having no connection with the remote server. The method includes detecting a second device by the first device, establishing a communication channel between the first and the second device, transferring the message from the first to the second device, the message comprising an address of the remote server, and transferring, by the second device, the message to the remote server using the remote server address contained in the message.

IPC Classes  ?

  • H04L 67/141 - Setup of application sessions
  • H04L 51/48 - Message addressing, e.g. address format or anonymous messages, aliases
  • H04L 67/1034 - Reaction to server failures by a load balancer
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

63.

SENDING AND RECEIVING MESSAGES

      
Application Number 18438741
Status Pending
Filing Date 2024-02-12
First Publication Date 2024-06-27
Owner NAGRAVISION SARL (Switzerland)
Inventor Wyseur, Brecht

Abstract

The present disclosure relates to the exchange of information between a message sending device and a message receiving device with message authentication and proposes to reduce the time required for message authentication by pre-computing a message tag, such as a MAC, and subsequently replacing the computation of the MAC when the tag is to be validated (or indeed also on sending) by a table look-up. The approach requires a set of messages and works particularly well for small sets of messages, for example as small as two or three messages, or less than five or ten messages. The approach finds particular application in control networks where control decisions have to be taken quickly and securely, for example in the control of a vehicle, for example an autonomous vehicle, or the control of a smart electricity grid.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

64.

AUTHENTICATING AUDIBLE SPEECH IN A DIGITAL VIDEO FILE

      
Application Number EP2023085694
Publication Number 2024/126620
Status In Force
Filing Date 2023-12-13
Publication Date 2024-06-20
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Amiet, Nils
  • Pelissier, Sylvain
  • Vialar, Louis

Abstract

A computer-implemented method of authenticating audible speech in a digital video file is provided. The method comprises: obtaining an electronic transcript of the audible speech from an audio track of the digital video file, using a digital signature algorithm to generate a digital signature based on the electronic transcript and a private key, and inserting the digital signature in a video track of the digital video file. Also provided is a computer-implemented method of authenticating audible speech in a copy of a digital video file. The method comprises: receiving a copy of the digital video file containing unverified audible speech, obtaining a second electronic transcript, extracting the digital signature, verifying the digital signature and, if the digital signature is successfully verified, determining that audible speech in the copy of the video file is authentic. The second electronic transcript is a transcript of the unverified audible speech obtained from the audio track of the copy of the digital video file, and the digital signature is extracted from the video track of the copy of the digital video file and is verified using the digital signature algorithm, the second electronic transcript and a public key.

IPC Classes  ?

  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G06F 21/16 - Program or content traceability, e.g. by watermarking
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04N 21/2389 - Multiplex stream processing, e.g. multiplex stream encrypting
  • H04N 21/439 - Processing of audio elementary streams
  • H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
  • H04N 21/8358 - Generation of protective data, e.g. certificates involving watermark

65.

SYSTEMS AND TECHNIQUES FOR DUPLICATE CONTENT DETECTION

      
Application Number IB2023062640
Publication Number 2024/127280
Status In Force
Filing Date 2023-12-13
Publication Date 2024-06-20
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bennett-James, Jonathan
  • Holbrook, Craig

Abstract

The present disclosure generally relates to a duplicate identification system. For example, aspects of the present disclosure include systems and techniques for identifying duplication of media content. One example method generally includes: selecting a first frame from a first video and a second frame from a second video; identifying a first section of the first frame, the first section being less than an entirety of the first frame; comparing the first section of the first frame with the second frame; determining whether at least a portion of the first video and at least a portion of the second video are duplicates based on the comparison; and outputting an indication that the portion of the first video and the portion of the second video are duplicates based on the determination.

IPC Classes  ?

  • G06V 20/40 - ScenesScene-specific elements in video content

66.

ASSET LOCATING METHOD

      
Application Number EP2023085692
Publication Number 2024/126618
Status In Force
Filing Date 2023-12-13
Publication Date 2024-06-20
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Conus, Joël
  • Gradassi, Luca
  • Prisi, Marcel
  • Pablo, Palomero

Abstract

A method for locating an asset in an environment, the method comprising receiving, at a first receiver, signal from a tag associated with the asset, wherein the tag is positioned on or adjacent to the asset; receiving, at the first receiver, a signal from the tag associated with the asset at a second time, wherein the second time is different to the first time, and wherein the first receiver has moved location in the environment between the first time and the second time; receiving, at a second receiver, a signal from the tag associated with the asset; and determining the location of the asset in the environment based on the signal received at the first receiver at the first time, the signal received at the first receiver at the second time, the signal received at the second receiver, a track of the location of the first receiver in the environment at the the first time and the second time, and a location of the second receiver in the environment at the time when the second receiver received the signal.

IPC Classes  ?

  • G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves

67.

Secure communication between in-vehicle electronic control units

      
Application Number 18390905
Grant Number 12309171
Status In Force
Filing Date 2023-12-20
First Publication Date 2024-06-13
Grant Date 2025-05-20
Owner Nagravision Sàrl (Switzerland)
Inventor
  • Buffard, Christophe
  • Sehgal, Sanjeev

Abstract

Aspects of the present disclosure address systems, methods, and devices for enabling secure communication between electronic control units (ECUs) in a vehicle. The system may include a first and second ECU from a plurality of ECUs in the vehicle. The first ECU is to enable secure communication between the plurality of ECUs by performing operations that include provisioning the second ECU with authentication data for authenticating messages exchanged with a third ECU and provisioning the third ECU with a set of security keys to enable the third ECU to securely exchange messages with the second ECU. The second ECU receives, from the third ECU, a secure message that is cryptographically signed using a security key from the set of security keys provisioned to the third ECU, and the second ECU authenticates the secure message by comparing the authentication data with an authentication signal.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

68.

SYSTEM AND METHOD FOR SHARING A DISTRIBUTED REVOCATION LIST ON A BLOCKCHAIN

      
Application Number US2023081242
Publication Number 2024/118541
Status In Force
Filing Date 2023-11-28
Publication Date 2024-06-06
Owner NAGRAVISION SARL (Switzerland)
Inventor Bieber, Yann

Abstract

A system for sharing a distributed revocation list on a blockchain includes circuitry that identifies an access attempt by a wallet on a first blockchain network, and adds the wallet to a blacklist. The blacklist identifies the wallet as suspicious. The circuitry generates a soulbound token, and airdrops the soulbound token into the wallet. The soulbound token identifies that the wallet belongs to the distributed revocation list and identifies the wallet as a suspicious wallet to blockchain networks.

IPC Classes  ?

  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]

69.

SYSTEM AND METHOD FOR AUTHORISING OPERATIONS FOR DEVICES IN A NETWORK

      
Application Number 18394305
Status Pending
Filing Date 2023-12-22
First Publication Date 2024-06-06
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Zafar, Mohammad Tarig
  • Chattopadhyay, Ritwik
  • Ramachandran, Vaidyanathan

Abstract

The disclosure related to methods and associated devices and/or systems for authorising at least one operation associated with a device, the device operating in a communication network, such as a user network, that comprises a plurality of devices communicatively coupled to a server computer, such as a control server. The disclosed method comprises generating a data model based on a plurality of patterns of actions for one or more devices among the plurality of devices. The data model is configured to detect and/or store at least one regular pattern of actions for each device among the one or more devices, each action corresponding to an operating state of the device. The disclosed method comprises receiving a request for an operation associated with a first device among the plurality of devices and determining if the received request satisfies a first criterion, the first criterion being based on or associated with the data model. Then, based on a determination that the first criterion is not satisfied, the disclosed method comprises generating at least one query based on a regular pattern of actions of at least one device among the one or more devices and sending the at least one query to a user interface. The disclosed method comprises determining if a response to the at least one query received from the user interface satisfies a second criterion. The second criterion is based on a comparison of the response received with the regular pattern of actions associated with the query in the data model. Then, based on a determination that the second condition is satisfied, the disclosed method comprises authorising the received request for the operation and providing a setting for the first device and/or control server based on the authorisation.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
  • G16Y 30/10 - Security thereof
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

70.

SYSTEM AND METHOD FOR SHARING A DISTRIBUTED REVOCATION LIST ON A BLOCKCHAIN

      
Application Number 18072130
Status Pending
Filing Date 2022-11-30
First Publication Date 2024-05-30
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bieber, Yann
  • Rudresh, Vishruta Gowda

Abstract

A system for sharing a distributed revocation list on a blockchain includes circuitry that identifies an access attempt by a wallet on a first blockchain network, and adds the wallet to a blacklist. The blacklist identifies the wallet as suspicious. The circuitry generates a soulbound token, and airdrops the soulbound token into the wallet. The soulbound token identifies that the wallet belongs to the distributed revocation list and identifies the wallet as a suspicious wallet to blockchain networks.

IPC Classes  ?

  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
  • G06Q 20/38 - Payment protocolsDetails thereof

71.

TECHNIQUES FOR INCENTIVIZED INTRUSION DETECTION SYSTEM

      
Application Number 18419851
Status Pending
Filing Date 2024-01-23
First Publication Date 2024-05-30
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Dumont, Pierre
  • Thabaret-Diebold, Frederic
  • Ruiz, Cristian
  • Succa, Riccardo

Abstract

The present disclosure relates generally to security solutions. More specifically, techniques (e.g., systems, methods, and devices) are provided to implement an incentivized-based intrusion detection system to detect malicious acts against an asset. The incentive may lure or facilitate the actor to provide information detecting malicious actions against an asset.

IPC Classes  ?

72.

METHOD FOR NOTIFYING AT LEAST ONE CLIENT MODULE IMPLEMENTED IN A WIRELESS DEVICE, CORRESPONDING COMPUTER PROGRAM PRODUCT AND DEVICES

      
Application Number 18514545
Status Pending
Filing Date 2023-11-20
First Publication Date 2024-05-23
Owner NAGRAVISION Sàrl (Switzerland)
Inventor
  • Gremaud, Fabien
  • Hernandez, Juan-Ramon
  • Thomas, Frédéric
  • Russ, Gilles
  • Devallonné, Luc

Abstract

A method for notifying at least one client module implemented in a wireless device communicatively connected to a wireless communications network that respective specific data are available in a service module implemented in a server communicatively connected to the wireless communications network. According to the method, a notification client device implemented in the wireless device executes: receiving a notification, sent by a notification service device implemented in a server communicatively connected to the wireless network, including information that, for at least one client module, respective specific data are available in a server communicatively connected to the wireless communications network, and notifying the at least one client module that respective specific data are available in a server.

IPC Classes  ?

73.

Physical interface module

      
Application Number 18519839
Grant Number 12259842
Status In Force
Filing Date 2023-11-27
First Publication Date 2024-05-23
Grant Date 2025-03-25
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Perrine, Jérôme
  • Goupil, Hervé
  • Van Riek, Maurice

Abstract

An embodiment of the present invention relates to physical interfaces, especially those used on consumer electronics devices. A processor, in which an embodiment of the disclosed invention is deployed, includes a physical interface for connecting to and communicating with a peripheral device, the peripheral device being configured to operate according to a standard communications protocol or to a different protocol which is adapted to have a more bandwidth-efficient performance. The processor detects which of the two protocols the attached peripheral device uses and configures the physical interface to operate according to the detected protocol. An embodiment of the invention allows for new, bandwidth-efficient communications protocols to be executed across existing standardized physical interface hardware, thereby allowing for easier acceptance of the new protocols within the consumer electronics industry. Bandwidth-efficient communications protocols advantageously allow for more convenient transfer of media content or for big-data applications to be more conveniently handled.

IPC Classes  ?

74.

TECHNIQUES FOR PROVIDING A CONTENT STREAM BASED ON A DELIVERED STREAM OF CONTENT

      
Application Number 18530607
Status Pending
Filing Date 2023-12-06
First Publication Date 2024-05-23
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Fieldhouse, Patricia
  • Lavery-Griffiths, Ben
  • Price, David

Abstract

A method of providing a content stream based on capturing an initial delivery of the content stream. The method comprises obtaining manifest data related to the initial delivery of the content stream, the manifest data being obtained one or more times in a sequence during the initial delivery of the content stream to generate one or more manifest files; associating a time-stamp with each of the manifest files, the time stamp being indicative of a time of obtaining the associated manifest file; processing each of the manifest files to identify one or more addresses referenced in the manifest file of one or more segments comprising a portion of the content stream in the initial delivery; accessing one or more of the segments identified via the one or more addresses referenced in the manifest files; modifying a last one of the manifest files to include at least a portion of an earlier manifest file of the manifest files; and providing a client with access to the manifest files including the modified last manifest file and the accessed one or more segments.

IPC Classes  ?

  • H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
  • H04N 21/845 - Structuring of content, e.g. decomposing content into time segments

75.

GENERATION AND VALIDATION OF TRUSTED NON-FUNGIBLE TOKENS

      
Application Number EP2023079346
Publication Number 2024/099741
Status In Force
Filing Date 2023-10-20
Publication Date 2024-05-16
Owner NAGRAVISION SÀRL (Switzerland)
Inventor Bieber, Yann

Abstract

The present invention provides a computer-implemented method of minting a trusted and verifiable NFT on a blockchain, the NFT corresponding to a digital asset. The computer- implemented method comprises a step of generating an NFT ID which uniquely identifies an NFT to be minted, and inserting the NFT into the digital. This NFT ID may then be used to validate an NFT on e.g. an NFT marketplace. Thus, a corresponding computer-implemented method for validating an NFT is also provided.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

76.

DEVICES AND PROCESSES FOR GENERATING PUBLIC KEYS AND FOR GENERATING AND VERIFYING SIGNATURES

      
Application Number EP2023081134
Publication Number 2024/100108
Status In Force
Filing Date 2023-11-08
Publication Date 2024-05-16
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Macchetti, Marco
  • Simon, Clement
  • Tongiani, Claudio
  • Villegas, Karine

Abstract

KpubEdEd Kprivs.GEdEd GEdEd S.GMM GMM M ) on the second elliptic curve corresponding to the first base point with respect to that isomorphism, by an adjusted scalar, and a resulting point is converted (604) to the scalar multiplication on the first elliptic curve by an isogeny. Signature generation and verification are exploiting similar principles. Applications to authentication.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

77.

MEDIA CONTENT ITEM SELECTION

      
Application Number 18549008
Status Pending
Filing Date 2022-03-04
First Publication Date 2024-05-09
Owner
  • NAGRA MEDIA UK LTD. (United Kingdom)
  • NAGRAVISION SARL (Switzerland)
Inventor
  • Gidley, Benjamin
  • Bennett-James, Jonathan

Abstract

A computer implemented method comprising accessing representations for a plurality of corresponding media content items, each media content item having at least one corresponding representation, the representations being organized in an order in one or more sets of the representations, each representation comprising at least one of metadata for a corresponding media content item and an image for a corresponding media content item, each representation being for display to a user to enable the user to select to access the corresponding media content item, each set of representations being displayable as a scrollable list; using the order of the representations to determine display locations of the representations in the scrollable list in a display arrangement; comparing similarity of content of representations within a display range; and where representations are determined to have greater than a predetermined similarity, changing the order of at least one of the representations determined to have greater than a predetermined similarity to change the display location in the scrollable list of the at least one of the representations.

IPC Classes  ?

  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/0485 - Scrolling or panning
  • G06V 10/56 - Extraction of image or video features relating to colour
  • G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces

78.

METHOD FOR SECURING THE PROCESSING OF A DIGITAL ASSET, CORRESPONDING COMPUTER PROGRAM PRODUCTS AND DEVICES

      
Application Number 18484662
Status Pending
Filing Date 2023-10-11
First Publication Date 2024-04-18
Owner Nagravision Sàrl (Switzerland)
Inventor Stransky-Heilkron, Philippe

Abstract

A method for securing the processing of an initial digital asset according to at least one processing step delivering an output digital asset from an input digital asset function of the initial digital asset. According to such method, a producer electronic device executes creating an initial NFT assigned to a producer wallet, in a blockchain, the initial NFT being associated with the initial digital asset, the initial NFT including input access condition to the initial digital asset and, for the at least one processing step, the initial NFT includes post-processing access conditions to the input digital asset after the execution of the processing step and output access conditions to the output digital asset delivered by the processing step, and assigning the initial NFT to a wallet, in the blockchain, associated with a first processor electronic device implementing a first processing step.

IPC Classes  ?

  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/38 - Payment protocolsDetails thereof

79.

Secured home network

      
Application Number 18495956
Grant Number 12316670
Status In Force
Filing Date 2023-10-27
First Publication Date 2024-04-18
Grant Date 2025-05-27
Owner NAGRAVISION SARL (Switzerland)
Inventor Stransky-Heilkron, Philippe

Abstract

Malware detection logic executed by a secured device residing in a home network may receive a message from an unsecured device of a first unsecured network and intended for a destination device of the home network, the destination device comprising a security client. The malware detection logic may establish a secure communication channel between the malware detection logic of the secured device and the security client of the destination device. The malware detection logic may execute a validation test on the message to determine that the message includes malware. The malware detection logic may report an alarm to the security client of the destination device. The malware detection logic may transmit information related to the malware to a cloud computing server. The malware detection logic may prevent an application associated with the destination device from processing the message.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 9/40 - Network security protocols
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

80.

INTEGRATED CIRCUIT DEVICE AND METHOD FOR AUTHENTICATING THE HARDWARE DESIGN OF SUCH INTEGRATED CIRCUIT DEVICE

      
Application Number EP2023077833
Publication Number 2024/079017
Status In Force
Filing Date 2023-10-09
Publication Date 2024-04-18
Owner NAGRAVISION SARL (Switzerland)
Inventor Pelletier, Hervé

Abstract

An integrated circuit device (100) is proposed. Such integrated circuit device comprises one or more specific block of logic gates (110) configured for generating deterministic internal state value changes inducing current leakages with corresponding deterministic variations in the integrated circuit device wherein the one or more specific block of logic gates comprises a non-linear logical function.

IPC Classes  ?

  • G06F 21/73 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
  • G06F 21/76 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
  • G06F 30/30 - Circuit design

81.

RIGHTS MANAGEMENT IN AN EXTENDED REALITY ENVIRONMENT

      
Application Number US2023076219
Publication Number 2024/077227
Status In Force
Filing Date 2023-10-06
Publication Date 2024-04-11
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Stevens, Charles
  • Isbiliroglu, Mehmet Hakan
  • Van Boven, Christian

Abstract

A user may be represented by an avatar in the extended reality environment. The user may set configuration options such as privacy restrictions, rating controls, or invisibility so that the user can explore the extended reality environment while controlling how other users are able to interact with the user's avatar. A client-side digital rights management (DRM) component can control which elements are rendered for the user. A client-side controller can control the data that is sent to an extended reality server. The user's avatar may be protected by DRM. Thus, other users will be able to see the user's avatar only if granted permission to do so.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

82.

METHOD OF UPLOADING CONTENT TO CDN

      
Application Number EP2023076278
Publication Number 2024/068481
Status In Force
Filing Date 2023-09-22
Publication Date 2024-04-04
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Stransky-Heilkron, Philippe
  • Piron, Laurent

Abstract

The method of uploading a digital content from a content provider (CP) to a content transmission network (100), such as a CDN, responsible for transmitting contents to user devices (20), comprises the following steps: - transmitting a request for a legitimation token for said digital content from the content provider (CP) to a certificate authority (30); - upon successful authentication of the content provider (CP) by the certificate authority (30), receiving by the content provider (CP) the legitimation token from the certificate authority (30), wherein said legitimation token includes a content tag and an identifier of the content provider (CP), and is digitally signed by the certificate authority (30); - uploading the digital content and the legitimation token from the content provider (CP) to the content transmission network (100).

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • G06F 21/33 - User authentication using certificates
  • H04N 21/00 - Selective content distribution, e.g. interactive television or video on demand [VOD]

83.

METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO SENSOR DATA

      
Application Number 18276664
Status Pending
Filing Date 2022-02-18
First Publication Date 2024-03-28
Owner NAGRAVISION SARL (Switzerland)
Inventor Gremaud, Fabien

Abstract

A method of controlling access to sensor data includes of: generating sensor data, and protecting the sensor data to generate protected sensor data; and transmitting the protected sensor data to a device for storage; receiving, by the sensor: access control data defining one or more operations which the device is permitted to execute on the protected sensor data; determining by the sensor, based on the access control data, an operation which the device is permitted to execute on the protected sensor data; enabling the device to execute the permitted operation on the protected sensor data. A method of accessing protected sensor data by a device, the device having stored thereon access control data defining one or more operations which the device is permitted to execute on protected sensor data, includes the steps of: receiving protected sensor data from a sensor; storing the received protected sensor data; sending the authorization access control data to the sensor; and receiving, from the sensor, a signal enabling the device to execute a permitted operation on the protected sensor data.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]

84.

BLOCKCHAIN MONITORING PLATFORM

      
Application Number 17940687
Status Pending
Filing Date 2022-09-08
First Publication Date 2024-03-14
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Vialar, Louis
  • Amiet, Nils
  • Hamiel, Nathan

Abstract

The present disclosure generally relates to a blockchain monitoring system. For example, aspects of the present disclosure include systems and techniques for monitoring one or more transactions on a block chain using configured rules. Some aspects include a monitoring system having at least one memory and at least one processor coupled to the at least one memory and configured to: detect a block on a blockchain; retrieve, from a rules database, a rule associated with one or more transactions on the block; determine whether the rule applies to one or more transactions on the block; and perform one or more actions associated with the rule using an authentication code associated with a user, the authentication code being different than a private key of the user for accessing the blockchain.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/31 - User authentication

85.

METHODS AND SYSTEM FOR GENERATING AND VERIFYING ZERO-KNOWLEDGE PROOF OF APPROXIMATE LOCATION KNOWLEDGE

      
Application Number EP2023074191
Publication Number 2024/052292
Status In Force
Filing Date 2023-09-04
Publication Date 2024-03-14
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Gagliardoni, Tommaso
  • Fischer, Jean-Bernard
  • Romailler, Yolan

Abstract

A prover device (P) and methods for generating a zero-knowledge proof (18) of approximate knowledge of a reference location (Xv). The method includes: - obtaining a plurality of reference signals (13) originating from a respective plurality of reference sources (12) and acquired at a test location (Xp) within observable range of the reference sources; - constructing an initial codeword from the obtained reference signals (13), this codeword forming a representation of the test location (Xp); - applying a block-based error correction decoding operation on the initial codeword, thereby obtaining an assessment codeword; - applying a hashing operation on the assessment codeword, thereby obtaining a hash value representing the zero-knowledge proof, and - providing the hash value to a verifier device (V), to allow the latter to compare the hash value with a reference hash value and thereby assess validity of the zero-knowledge proof. In addition, a complementary verifier device and corresponding verification methods are provided.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

86.

METHODS AND SYSTEMS FOR IDENTIFYING A PERSON

      
Application Number EP2023074307
Publication Number 2024/052330
Status In Force
Filing Date 2023-09-05
Publication Date 2024-03-14
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Devallonne, Luc
  • Gremaud, Fabien
  • Gradassi, Luca

Abstract

The invention refers to a method for identifying a person (16), comprising the steps of storing information on the identity of the person (16) and/or access authorization data on the mobile device (16) as well as storing biometric data (37) of the person (16) on a mobile device (14) of the person (16); sending the identity information of the person (16) and/or the access authorization data from the mobile device (14) to an authorization device (18); obtaining biometric data (37) of the person (16) by an identification device (20); sending the biometric data (37) from the identification device (20) to the mobile device (14); comparing, only on the mobile device (14), the biometric data (37) from the identification device (20) with the stored biometric data (37) for verifying the identity of the person (16); and sending a confirmation signal from the mobile device (14) to the authorization device (18) if the comparison of step e) verifies the identity of the person (16).

IPC Classes  ?

  • G07C 9/00 - Individual registration on entry or exit
  • G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition

87.

BLOCKCHAIN MONITORING PLATFORM

      
Application Number IB2023058676
Publication Number 2024/052779
Status In Force
Filing Date 2023-09-01
Publication Date 2024-03-14
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Vialar, Louis
  • Amiet, Nils
  • Hamiel, Nathan

Abstract

The present disclosure generally relates to a blockchain monitoring system. For example, aspects of the present disclosure include systems and techniques for monitoring one or more transactions on a block chain using configured rules. Some aspects include a monitoring system having at least one memory and at least one processor coupled to the at least one memory and configured to: detect a block on a blockchain; retrieve, from a rules database, a rule associated with one or more transactions on the block; determine whether the rule applies to one or more transactions on the block; and perform one or more actions associated with the rule using an authentication code associated with a user, the authentication code being different than a private key of the user for accessing the blockchain.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

88.

SYSTEMS AND TECHNIQUES FOR DATA ASSISTED SPORT AUGMENTATION

      
Application Number 18239588
Status Pending
Filing Date 2023-08-29
First Publication Date 2024-03-07
Owner NAGRAVISION SARL (Switzerland)
Inventor Gidley, Benjamin

Abstract

The present disclosure generally relates to sport augmentation systems. For example, aspects of the present disclosure include systems and techniques for assessing a path of a ball during a sporting session to be used to augment a sporting experience. On example method includes receiving one or more frames capturing image data associated with movement of a ball on a surface during a sporting session, determine a state associated with throwing the ball based on the one or more frames, perform an assessment of the surface on which the ball is thrown, predict a path of the ball as thrown on the surface based on the state associated with the ball and the assessment of the surface, and output an indication of the path to be displayed on a display element.

IPC Classes  ?

  • A63B 24/00 - Electric or electronic controls for exercising apparatus of groups
  • G06T 7/00 - Image analysis
  • G06T 7/20 - Analysis of motion
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
  • G06V 20/40 - ScenesScene-specific elements in video content
  • G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
  • G06V 40/20 - Movements or behaviour, e.g. gesture recognition

89.

COMMUNICATION SYSTEM INCLUDING DEVICES WITH SDR CHIP

      
Application Number 18259840
Status Pending
Filing Date 2021-11-02
First Publication Date 2024-03-07
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Perrine, Jérôme
  • Conus, Joël

Abstract

A system includes two or more communication devices. Each device includes a dedicated SDR chip with a dedicated key generator to generate a secret key shared by the two SDR chips using a physical unclonable function PUF that takes as an input configuration data and produces an output. In the dedicated key generator of each SDR chip, the PUF takes as an input configuration data and produces an output identical for the two SDR chips, that is the shared secret key or a seed to derive it. The configuration data is unique to each SDR chip, dependent on physical random factors introduced during manufacture of the SDR chip, and is adapted for the respective key generator to generate the shared secret key.

IPC Classes  ?

90.

HAPTIC FEEDBACK DEVICE AND HAPTIC FEEDBACK METHOD

      
Application Number 18462036
Status Pending
Filing Date 2023-09-06
First Publication Date 2024-03-07
Owner Nagravision Sàrl (Switzerland)
Inventor Kudelski, Estelle

Abstract

Haptic feedback device (11), comprising: an input unit (114) for receiving remote object data (30), at least one feedback surface (111) arranged to be touched or sensed by a user, at least one haptic actuator (112) arranged for providing a change on the feedback surface (111), a control unit (113): connected to the input unit (114) to receive the remote object data (30), and connected to the haptic actuator (112), and arranged to control the haptic actuator (112) according to the received remote object data (30) so as to provide haptic feedback to the user.

IPC Classes  ?

  • G08B 6/00 - Tactile signalling systems, e.g. personal calling systems

91.

Method to insert ad content into a video scene

      
Application Number 18493834
Grant Number 12316889
Status In Force
Filing Date 2023-10-25
First Publication Date 2024-03-07
Grant Date 2025-05-27
Owner NAGRAVISION SARL (Switzerland)
Inventor Stransky-Heilkron, Philippe

Abstract

A post-processing of video content in order to provide a capability to insert ad content, having a method to produce a modified video content from an original video content. The method comprising: analyzing the original video content to detect at least one marker, said marker comprising a marker surface delimited by a marker identification; loading profile data of a target user; determining, based at least on the profile data a replacement content; adjusting the replacement content into the marker surface; and replacing into the original video content the marker surface by the adjusted replacement content to produce the modified video content.

IPC Classes  ?

  • H04N 21/23 - Processing of content or additional dataElementary server operationsServer middleware
  • H04N 5/272 - Means for inserting a foreground image in a background image, i.e. inlay, outlay
  • H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
  • H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
  • H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
  • H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
  • H04N 21/431 - Generation of visual interfacesContent or additional data rendering
  • H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
  • H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
  • H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
  • H04N 21/462 - Content or additional data management e.g. creating a master electronic program guide from data received from the Internet and a Head-end or controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
  • H04N 21/81 - Monomedia components thereof

92.

Secure provisioning, by a client device, cryptographic keys for exploiting services provided by an operator

      
Application Number 18463191
Grant Number 12143692
Status In Force
Filing Date 2023-09-07
First Publication Date 2024-02-29
Grant Date 2024-11-12
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Bieber, Yann
  • Nicoulin, André

Abstract

A method for securely receiving a multimedia content by a client device operated by one or more operator(s) involving a dedicated provisioning server of a security provider managing symmetric secrets used by the client devices and operators license servers. The provisioning server provides to the client device one or more generations of operator specific unique device secrets, which are then exploited by the various operators' license servers to deliver licenses such that authorized client devices can consume protected multimedia contents.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04N 7/167 - Systems rendering the television signal unintelligible and subsequently intelligible
  • H04N 21/4405 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
  • H04N 21/6334 - Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
  • H04N 21/835 - Generation of protective data, e.g. certificates

93.

Distributed anonymized compliant encryption management system

      
Application Number 18457265
Grant Number 12206769
Status In Force
Filing Date 2023-08-28
First Publication Date 2024-02-22
Grant Date 2025-01-21
Owner Nagravision Sàrl (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

94.

Relay attack prevention

      
Application Number 18457382
Grant Number 12162431
Status In Force
Filing Date 2023-08-29
First Publication Date 2024-02-22
Grant Date 2024-12-10
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Thomas, Frédéric
  • Conus, Joël

Abstract

Passive entry systems, such as passive entry-passive start vehicle systems, using short-range wireless communication signals to determine a distance between nomadic devices and unlockable devices based on a round trip time of flight (TOF) measurement.

IPC Classes  ?

  • B60R 25/20 - Means to switch the anti-theft system on or off
  • B60R 25/04 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
  • B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
  • G07C 9/00 - Individual registration on entry or exit

95.

METHOD AND DEVICE FOR PROVIDING AN AUTHORIZATION TO ACCESS AN INTERACTIVE GOOD

      
Application Number 18259617
Status Pending
Filing Date 2021-11-23
First Publication Date 2024-02-22
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Zhao, Yishan
  • Devallonne, Luc

Abstract

A method for providing an authorization to access an interactive good by means of an access right issued by a first bearer device to or for a second bearer device by using a wireless communication means, the method including: by the first device, wirelessly obtaining a first information including at least a second device identifier, generating the access right including at least the second device identifier and an identifier of the interactive good, providing, to the interactive good, a second information including at least the access right, by the second device, wirelessly presenting an access request to the interactive good, by the interactive good, performing an identity check in order to at least verify the second device identifier, and, in case of successful identity check, providing the requested access to the interactive good.

IPC Classes  ?

  • H04W 12/084 - Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
  • H04W 12/082 - Access security using revocation of authorisation

96.

Facilitating network connectivity

      
Application Number 18241290
Grant Number 12256215
Status In Force
Filing Date 2023-09-01
First Publication Date 2024-02-22
Grant Date 2025-03-18
Owner NAGRAVISION SARL (Switzerland)
Inventor Fischer, Jean-Bernard

Abstract

The present disclosure relates to a wireless token capable of representing a user network, the token being used to automatically provision an IoT enabled device to connect to the user network. Functions required to achieve this include: authenticate the token with the user network, and responsive to said authentication, obtain and store configuration information for enabling the token to communicatively couple one or more devices at or within a defined proximity to the token, with the user network; responsive to a wireless signal received from a given device among the one or more devices, establish a temporary secure communication channel between the given device and the token; and provide the configuration information from the token to the given device using the temporally secure communication channel, wherein the configuration information enables the given device to establish a connection with and operate in the user network based on the obtained configuration information.

IPC Classes  ?

  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
  • H04W 12/30 - Security of mobile devicesSecurity of mobile applications
  • H04W 12/63 - Location-dependentProximity-dependent

97.

METHOD AND DEVICE FOR CONTROLLING ACCESS TO A RESOURCE

      
Application Number 18261073
Status Pending
Filing Date 2021-12-16
First Publication Date 2024-02-22
Owner NAGRAVISION SÀRL (Switzerland)
Inventor
  • Ruiz, Luis
  • Hunacek, Didier

Abstract

A method for controlling access to a resource in an electronic device including a secure element with a permanent memory having an OTP area. The method includes the following steps performed first when the secure element or the electronic device boots: checking presence of at least one of a secret data and an initialization value in the permanent memory and, in a negative event, generating an initialization value and storing it into the OTP area, in a positive event, if the permanent memory includes secret data, decrypting, within the secure element, the secret data by using an algorithm using a cryptographic key and, if the permanent memory further includes an initialization value, the initialization value, and checking the integrity of the secret data by using a signature stored in the permanent memory and, on successful completion, providing access to the resource.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

98.

Distributed anonymized compliant encryption management system

      
Application Number 18457244
Grant Number 12206768
Status In Force
Filing Date 2023-08-28
First Publication Date 2024-02-08
Grant Date 2025-01-21
Owner Nagravision Sàrl (Switzerland)
Inventor Gagliardoni, Tommaso

Abstract

A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

99.

Automatically loading user profile to show recently watched channels

      
Application Number 18459708
Grant Number 12184935
Status In Force
Filing Date 2023-09-01
First Publication Date 2024-02-08
Grant Date 2024-12-31
Owner Nagravision Sàrl (Switzerland)
Inventor
  • Kannan, Srinivasan
  • Swamy, Siddalinga
  • Kaliamoorthi, Amudha

Abstract

Aspects of the present disclose involve a method, a device, and a system comprising a processor and a machine-readable storage medium storing at a set of instructions for identification and authentication of user profiles associated with a digital television system and displaying information related thereto. In example embodiments, the method includes identifying a user profile registered with a content presentation device based on received identification data that includes biometric data. The method further includes receiving, from a server, identifiers of a set of recently watched channels associated with the user profile and causing presentation of a recent channels interface that includes selectable elements corresponding to the set of recently watched channels.

IPC Classes  ?

  • H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
  • H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
  • H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
  • H04N 21/41 - Structure of clientStructure of client peripherals
  • H04N 21/422 - Input-only peripherals, e.g. global positioning system [GPS]
  • H04N 21/4223 - Cameras
  • H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
  • H04N 21/441 - Acquiring end-user identification
  • H04N 21/4415 - Acquiring end-user identification using biometric characteristics of the user, e.g. by voice recognition or fingerprint scanning
  • H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
  • H04N 21/458 - Scheduling content for creating a personalised stream, e.g. by combining a locally stored advertisement with an incoming streamUpdating operations, e.g. for OS modules
  • H04N 21/466 - Learning process for intelligent management, e.g. learning user preferences for recommending movies
  • H04N 21/482 - End-user interface for program selection
  • H04N 21/658 - Transmission by the client directed to the server

100.

Blockchain managed access system

      
Application Number 18236447
Grant Number 12242624
Status In Force
Filing Date 2023-08-22
First Publication Date 2024-02-08
Grant Date 2025-03-04
Owner NAGRAVISION SARL (Switzerland)
Inventor
  • Jufer, Romain
  • Ruiz, Cristian
  • Morel, Olivier

Abstract

The present disclosure relates generally to data access control solutions. In particular, techniques are provided to implement a secure and distributed file storage scheme and in particular, a managed access system using a blockchain. In some aspects, a process of the disclosed technology includes operations for associating a first key share with a first copy of a file, wherein the first copy of the file is stored by a first party, associating a second key share with a second copy of the file, and recording versioning information corresponding with the file on a distributed ledger accessible by the first party and the second party. In some aspects, the process can further include operations for managing access to the file using the first key share and the second key share. Systems and machine-readable media are also provided.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/33 - User authentication using certificates
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  1     2     3        Next Page