Electric Signal Modification Patents (Class 380/287)
-
Patent number: 8527752Abstract: A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication security to provide a multi-dimensional approach to providing the right fit for differing identity requests. The differing levels of security can be selected by user preference, membersite request or homesite policy.Type: GrantFiled: January 24, 2005Date of Patent: September 3, 2013Assignee: Dormarke Assets Limited LiabilityInventor: Dick C. Hardt
-
Patent number: 8520852Abstract: A method includes: receiving a plurality of audio frames, assembling groups of the audio frames into logical recording units, storing a plurality of the logical recording units, retrieving the stored logical recording units, and decoding the retrieved logical recording units. An apparatus that performs the method is also provided.Type: GrantFiled: July 31, 2008Date of Patent: August 27, 2013Assignee: iBiquity Digital CorporationInventors: Chinmay Shah, Ashwini Pahuja, Nandu Parimi
-
Publication number: 20130202112Abstract: An example method includes encapsulating, by an optical network device, at least a portion of a data packet to form a passive optical network (PON) frame. The method further includes applying, by the optical network device, a scrambling polynomial to at least a portion of the PON frame to generate a scrambled PON frame. The method further includes determining, by the optical network device, that the scrambled PON frame comprises a consecutive identical digit (CID) sequence greater than a threshold length. The method further includes replacing, by the optical network device the determined CID sequence with a correction pattern to generate a modified scrambled PON frame. The method further includes transmitting, by the optical network device, the modified scrambled PON frame.Type: ApplicationFiled: February 2, 2012Publication date: August 8, 2013Applicant: CALIX, INC.Inventors: Christopher T. Bernard, Charles J. Eddleston
-
Publication number: 20130202113Abstract: In general, techniques are described for protecting optical networks from consecutive identical digit (CID) errors. An optical network device comprising a control unit and an interface may implement the techniques described in this disclosure. The control unit determines whether a data packet will result in a CID error prior to encapsulating at least a portion of the data packet to form a passive optical network (PON) frame and then, in response to the determination that the data packet will result in the CID error, modifies the data packet to form a modified data packet so that the modified data packet will not result in the CID error. The control unit encapsulates the modified data packet to form a PON frame. The control unit applies a scrambling polynomial to the PON frame to form a scrambled PON frame. The interface transmits the scrambled PON frame.Type: ApplicationFiled: February 2, 2012Publication date: August 8, 2013Applicant: CALIX, INC.Inventors: Christopher T. Bernard, Charles J. Eddleston
-
Publication number: 20130195275Abstract: A resource allocation for a specific user equipment (UE) is encoded using an encoding scheme that identifies a specific antenna port from among a plurality of antenna ports; and the encoded resource allocation is output to the specific antenna port for transmission to the specific UE. The UE blindly detects its control channel and determines its resource allocation by decoding the control channel using a decoding scheme that identifies a specific antenna port from among the plurality of transmit antenna ports. In various embodiments, the scheme is in scrambling or masking (using an ID of the antenna port or UE); by the order of bits when encoding, port specific mapping constellations, and adding bits that give the port index.Type: ApplicationFiled: March 27, 2012Publication date: August 1, 2013Inventors: Tommi T. KOIVISTO, Tero Kuosmanen, Timo E. Roman
-
Patent number: 8488837Abstract: An apparatus and a method for generating a constructively multi-patterned watermark, an apparatus and a method for inserting and detecting the watermark using the same. The method includes dividing user's hidden data into plural partial data and outputs the plural partial data, performing a message-encoding of the plural partial data, modulating the plural message-encoded data into image signal format and outputting plural message signals, generating a synchronization signal for synchronizing the constructively multi-patterned watermark with a two-dimensional translation of an image, generating, plural sub-base patterns using the plurality of message signals modulated into the image signal format, and the synchronization signal, and generating a base watermark that is the constructively multi-patterned watermark, using the plural sub-base patterns.Type: GrantFiled: July 7, 2009Date of Patent: July 16, 2013Assignee: CK&B Co., Ltd.Inventors: Ki-Hyeok Bae, Hyun-Tae Kim, In-Je Cho
-
Patent number: 8478526Abstract: A method is described that allows a first mobile device to persistently lock onto a second mobile device, thereby allowing the first mobile device to not only constantly monitor the dynamic location of the second mobile device but also to adaptively navigate in real-time to the dynamic location associated with the second mobile device. The dynamic location may include a current location of the second mobile device or a final destination for travel of the second mobile device.Type: GrantFiled: February 8, 2012Date of Patent: July 2, 2013Assignee: Cellco PartnershipInventors: Monica Chitre, Deepa Sukumaran
-
Patent number: 8457919Abstract: A process for testing an integrated circuit includes collecting a set of points of a physical property while the integrated circuit is executing a multiplication, dividing the set of points into a plurality subsets of lateral points, calculating an estimation of the value of the physical property for each subset, and applying to the subset of lateral points a step of horizontal transversal statistical processing by using the estimations of the value of the physical property, to verify a hypothesis about the variables manipulated by the integrated circuit.Type: GrantFiled: March 31, 2010Date of Patent: June 4, 2013Assignee: Inside SecureInventors: Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
-
Patent number: 8452009Abstract: A method for processing a set of control messages used to access an encrypted stream by a multimedia unit. These messages include a discrimination parameter having a different value for at least three consecutive non-redundant messages in the stream. The method includes the steps of receiving a current control message; reading the discrimination parameter from the current control message; retrieving from a memory the discrimination parameter from the message processed previously; comparing the current and previous discrimination parameters; and blocking said current control message if the comparison step indicates that the discrimination parameters are identical. The method is characterized in that the discrimination parameter is unique and different for each message in the set of control messages, such that, during the filtering step, the current message and the previously processed message can be non-consecutive in the ordered subset of messages.Type: GrantFiled: May 29, 2007Date of Patent: May 28, 2013Assignee: Nagra France SASInventor: Antoine Burckard
-
Patent number: 8452005Abstract: Unicode character data is received for transcoding. The Unicode character data is transcoded to an intermediate value. The intermediate value is enciphered. The enciphered intermediate value is transcoded back to Unicode-compatible character data. The transcoding includes assembling character values from the Unicode character data into one or more blocks and representing the assembled character values in a compact form.Type: GrantFiled: November 30, 2009Date of Patent: May 28, 2013Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8428266Abstract: A method and terminal for implementing hot-plug of a smart card are disclosed. The method includes: during the process of playing mobile multimedia, a descrambling library sending request information for obtaining a program key to a smart card driving module, which judges whether a smart card is in a plug-in state or a pull-out state after receiving the request information: if in the plug-in state, the smart card driving module forwarding the request information to the smart card, receiving response information returned by the smart card, forwarding the response information to the descrambling library, and meanwhile forwarding the response information to a virtual smart card module to save; if in the pull-out state, the smart card driving module forwarding the request information to the virtual smart card module, which returns the saved response information to the smart card driving module, which forwards the response information to the descrambling library.Type: GrantFiled: May 25, 2010Date of Patent: April 23, 2013Assignee: ZTE CorporationInventors: Chengzhi Jiang, Weimei Yin, Chuanhui Wang
-
Patent number: 8406459Abstract: Guilloches (preventing modification) and watermarking (preventing substitution) technologies are combined to protect a medium, such as a card or a passport. The major idea stems from their dual role for medium authentication: the presence of one is needed to check the validity of the other one. By nature, the guilloche network is visible in the image and easily detectable by image processing. This network is therefore used to generate reference points as elements of synchronization to retrieve watermark information originally embedded in the medium that has submitted an RST transformation. These reference points are by nature stronger than any other means involving invisible templates in the spatial or Fourier space.Type: GrantFiled: November 28, 2008Date of Patent: March 26, 2013Assignees: Gemalto SA, Gemalto OyInventors: Frederic Ros, Christophe Mourtel, Teemu Pohjola
-
Publication number: 20130064368Abstract: Selective data encryption of a file, in particular an H.264/MPEG-4 AVC data stream. If a first unit in the data stream is to be encrypted, it is encrypted and the encryption is put into a further unit, preferably in the data stream. A substitution unit is generated and put in the place of the first unit; if necessary, at least one header value is taken from the first unit for use in the substitution unit. A decryptor receives the encrypted data stream, extracts and decrypts the further unit and replaces the substitution unit with a regenerated first unit.Type: ApplicationFiled: September 12, 2012Publication date: March 14, 2013Inventors: Frédéric Lefebvre, Séverine Baudry, Antoine Robert, Philippe Roudot
-
Patent number: 8379861Abstract: An integrated circuit that includes a controller and multiple internal circuitries, whereas the integrated circuit is characterized by further including a security mode determination unit that includes multiple one time programmable components for defining a security mode out of multiple possible security modes, whereas a selected circuitry mode affects access to an internal circuitry. A method for testing an integrated circuit, the method includes: receiving a request to access an internal circuitry; and responding to the request in view of a defined security mode; whereas the method is characterized by a stage of defining a security mode of a debug circuit out of multiple security modes, whereas the definition is responsive to at least a state of multiple one time programmable components.Type: GrantFiled: November 22, 2004Date of Patent: February 19, 2013Assignee: Freescale Semiconductor, Inc.Inventors: Dimitri Akselrod, Yossi Amon, Asaf Ashkenazi
-
Patent number: 8365243Abstract: Prevention of sensitive images such as photographs and video clips from being leaked from an organization uses geo-tagging metadata. A mobile computing device includes a software agent that implements a data loss prevention policy and a database of sensitive geographic areas defined by latitude and longitude coordinates. When an image is attempted to be stored on the device (or sent, received, renamed, copied, etc.) a software hook module detects the operation and obtains the geo-tagging metadata from the image for the agent. The agent compares the metadata of the image with each sensitive area found in its database to determine if the image was taken at a location within a sensitive area. If not, the operation is allowed, if so, the operation may be blocked, restricted or a warning may be sent to the user of the device or to another computer within the organization.Type: GrantFiled: July 14, 2010Date of Patent: January 29, 2013Assignee: Trend Micro, Inc.Inventors: Minggang Lu, Pei Zhang, Jing Li, Wen Zhu
-
Publication number: 20130016841Abstract: Methods, devices, and systems for multi-carrier network operation are disclosed. In one embodiment, a method of performing channel scrambling in a multi-carrier network, wherein the multi-carrier network includes a first component carrier (“CC”) and a second CC between a base station and a user equipment (“UE”) comprises receiving a Cell Radio Network Temporary Identifier (“C-RNTI”) and a cell identification (“ID”) for at least one of the first CC and the second CC; and using the RNTI and the cell ID to perform scrambling of information transmitted on at least one of the first CC and the second CC.Type: ApplicationFiled: September 24, 2010Publication date: January 17, 2013Inventors: Mo-han Fong, Youn Hyoung Heo, Hua Xu, Jun Li, Sean Michael McBeath
-
Patent number: 8355505Abstract: The camera includes a sensor for sensing the photographer's iris image and registering the image in advance. The iris image is recorded in the image of a subject by a digital MCU at a timing different from that at which the image of the subject is captured. The recording timing is that at which the camera power supply is turned off, that at which a recording medium is ejected from the camera or that at which the iris image to be recorded is changed to changed to the registered iris image of another photographer. The recording of the iris image is achieved by embedding it as a watermark or by appending it to metadata.Type: GrantFiled: October 1, 2007Date of Patent: January 15, 2013Assignee: Canon Kabushiki KaishaInventors: Goichi Morikawa, Go Tokura
-
Publication number: 20130003979Abstract: Provided are an apparatus and method for generating a multiple output sequence. The apparatus includes an update unit configured to update a first shift register having k stages by inputting a value to the first shift register at every clock, a transfer unit configured to simultaneously transfer, at every clock, output values output from the first shift register to k stages of a second shift register respectively and output values output from k stages of the second shift register to k stages of a third shift register having the k stages respectively, and a multiple output generator configured to generate a multiple output sequence by outputting values of the k stages of the third shift register at every clock.Type: ApplicationFiled: April 25, 2012Publication date: January 3, 2013Applicant: Electronics & Telecommunications Research InstituteInventors: Chan Bok JEONG, Dae Ho KIM
-
Publication number: 20120314870Abstract: The present invention relates to a method of generating a downlink frame. The method of generating the downlink frame includes generating a first sequence and a second sequence for identifying cell groups; generating a first scrambling sequence and a second scrambling sequence that are one-to-two mapped to the sequence number of the primary synchronization signal; scrambling the first sequence with the first scrambling sequence and scrambling the second sequence with the second scrambling sequence; and generating a secondary synchronization signal including the scrambled first sequence and second sequence and mapping the secondary synchronization signal to a frequency domain.Type: ApplicationFiled: August 10, 2012Publication date: December 13, 2012Applicants: SAMSUNG ELECTRONICS CO., LTD., ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Il Gyu KIM, Young Jo KO, Hyeong Geun PARK, Kap Seok CHANG, Hyo Seok YI, Young-Hoon KIM, Seung Chan BANG, Kyoung Joon LEE
-
Publication number: 20120314869Abstract: A preamble portion of a physical layer (PHY) data unit is generated for transmission via a long range communication protocol. A service field is generated with a length of eight or less bits. A data portion of the PHY data unit is generated to include the service field having the length of eight bits or less.Type: ApplicationFiled: June 7, 2012Publication date: December 13, 2012Inventors: Hongyuan Zhang, Yong Liu, Raja Banerjea
-
Patent number: 8331569Abstract: The present invention relates to a method for generating a downlink frame includes: generating a first short sequence and a second short sequence indicating cell group information; generating a first scrambling sequence determined by a first synchronization signal; generating a second scrambling sequence determined by a group to which the first short sequence belongs, the wireless communication system using a plurality of short sequences and the plurality of short sequence being divided into a plurality of groups; scrambling the first short sequence with the first scrambling sequence; scrambling the second short sequence with at least the second scrambling sequence; and mapping a second synchronization signal including the scrambled first short sequence and the scrambled second short sequence in the frequency domain.Type: GrantFiled: June 19, 2009Date of Patent: December 11, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Kap Seok Chang, Il Gyu Kim, Hyeong Geun Park, Young Jo Ko, Hyo Seok Yi, Moon Sik Lee, Young Hoon Kim, Seung Chan Bang
-
Patent number: 8331564Abstract: The present invention relates to a method of generating a downlink frame. The method of generating the downlink frame includes: generating a first short sequence and a second short sequence indicating cell group information; generating a first scrambling sequence and a second scrambling sequence determined by the primary synchronization signal; generating a third scrambling sequence determined by a short sequence group-a wireless communication system uses a plurality of short sequences and the plurality of short sequences are grouped into a plurality of short sequence group-to which the first short sequence is assigned; scrambling the first short sequence with the first scrambling sequence and scrambling the second short sequence with the second scrambling sequence and the third scrambling sequence; and mapping the secondary synchronization signal that includes the scrambled first short sequence and the scrambled second short sequence to a frequency domain.Type: GrantFiled: June 19, 2009Date of Patent: December 11, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Kap Seok Chang, Il Gyu Kim, Hyeong Geun Park, Young Jo Ko, Hyo Seok Yi, Chan Bok Jeong, Young Hoon Kim, Seung-Chan Bang
-
Patent number: 8320571Abstract: The present invention relates to a method of generating a downlink frame.Type: GrantFiled: June 19, 2009Date of Patent: November 27, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Kap Seok Chang, Il Gyu Kim, Hyeong Geun Park, Young Jo Ko, Hyo Seok Yi, Chan Bok Jeong, Young Hoon Kim, Seung Chan Bang
-
Patent number: 8320566Abstract: Systems and methods are provided that allow multiple transmitting network devices to transmit under an orthogonal frequency divisional multiple access (OFDMA) mode to a receiving network device. The multiple transmitting network devices may be configured to perform constellation scrambling on the symbols they will be transmitting using a predetermined scrambling sequence. They may be further configured to synchronize their use of the sequence, for example, by advancing the sequence for each available subcarrier, such that the receiving device may view the payload as if it were sent by a single transmitter. Accordingly, these multiple transmissions may be descrambled using only one instance of a sequence generator.Type: GrantFiled: October 15, 2009Date of Patent: November 27, 2012Assignee: Entropic Communications, Inc.Inventor: Arndt Mueller
-
Patent number: 8320556Abstract: An improved architecture is disclosed of a crypto engine, such as a Janus Crypto Engine (JCE) having a Programmable Cryptographic Channel (PCC) using a Programmable Cryptographic Processor (PCP). The architecture of the crypto engine does not require zeroizing between messages received by the PCC. Consequently, using the new architecture of the present invention, the crypto engine can allocate PCC resources based on throughput and algorithm needs, reducing latency, and employing fewer PCCs.Type: GrantFiled: September 28, 2006Date of Patent: November 27, 2012Assignee: Rockwell Collins, Inc.Inventors: Mark A. Bortz, David W. Jensen
-
Patent number: 8315385Abstract: The present invention provides a system and method for introducing white noises into a digital audio signal so that there is progressive and cumulative degradation in audio quality after each successive reproduction of the audio sound signal in a fashion analogous to analog audio reproduction. The invention provides a white noise generator, and a digital entroping unit. In a preferred embodiment, the white noise generator is implemented by a hardware random number generator. The digital entroping unit controls the magnitude of white noise desired based on a random number generated by the random number generator, and adds the white noise to the input audio sound signal to produce a degraded audio sound signal. The magnitude of white noise can be controlled by using various masking and formatting of random number data.Type: GrantFiled: February 12, 2007Date of Patent: November 20, 2012Assignee: Nvidia CorporationInventor: Jason Seung-Min Kim
-
Publication number: 20120288097Abstract: A management apparatus includes a collector configured to collect requests of events of which the distribution is required via the network from users of the plurality of terminals, a list generator configured to aggregate the collected requests for each event to generate a list, a disclosure unit configured to disclose the list on a site on the network for a predetermined period, a reception unit configured to receive a request for distributions from a plurality of content distributors via the site for each content included in the list, a selector configured to select a content distributor to which a distribution right is granted from among the plurality of content distributors for each content included in the list based on a predetermined conditions, and a reporter configured to report a selection result by the selector to content distributor with the distribution right granted thereto.Type: ApplicationFiled: July 20, 2012Publication date: November 15, 2012Applicant: Kabushiki Kaisha TashibaInventor: Akihiro Hatayama
-
Patent number: 8300832Abstract: Embodiments of the present invention provide for the copy protection of distributed material after conditional access is applied, regardless of where the material is distributed. The solutions described provide the advantage of being sufficiently simple in implementation to qualify as “curb high” solutions. “Curb high” solutions provide a range of security from minimal security to a high level of security while requiring relatively fewer system resources to implement than prior approaches.Type: GrantFiled: May 27, 2004Date of Patent: October 30, 2012Assignee: Samsung Electronics Co., Ltd.Inventor: Jack Chaney
-
Publication number: 20120237036Abstract: A method of communicating scrambling seed information includes obtaining raw data to be transmitted using a processor, and generating scrambled data from the raw data according to a scrambling seed. A scrambled data packet structure is configured by combining a preamble portion, a synch portion, and a header portion to the scrambled data, wherein the header portion includes a scrambler field value including a plurality of bits (M). The scrambled data packet structure is transmitted to a receiver. The receiver receives the header portion including the scrambler field value. The receiver maps the scrambler field value to a scrambling seed, and decodes the scrambled data using the scrambling seed.Type: ApplicationFiled: February 27, 2012Publication date: September 20, 2012Applicant: TEXAS INSTRUMENTS INCORPORATEDInventors: ANAND DABAK, JEAN PICARD
-
Publication number: 20120224697Abstract: A method and terminal for implementing hot-plug of a smart card are disclosed. The method includes: during the process of playing mobile multimedia, a descrambling library sending request information for obtaining a program key to a smart card driving module, which judges whether a smart card is in a plug-in state or a pull-out state after receiving the request information: if in the plug-in state, the smart card driving module forwarding the request information to the smart card, receiving response information returned by the smart card, forwarding the response information to the descrambling library, and meanwhile forwarding the response information to a virtual smart card module to save; if in the pull-out state, the smart card driving module forwarding the request information to the virtual smart card module, which returns the saved response information to the smart card driving module, which forwards the response information to the descrambling library.Type: ApplicationFiled: May 25, 2010Publication date: September 6, 2012Applicant: ZTE CORPORATIONInventors: Chengzhi Jiang, Weimei Yin, Chuanhui Wang
-
Publication number: 20120219155Abstract: Methods and devices are provided whereby scrambling codes can be set in an improved way. In accordance with one embodiment a method is provided in a User Equipment for generating a second scrambling code or a second scrambling code group. The UE is configured for multi carrier operation receiving downlink transmission from a Universal Mobile Telecommunications System Terrestrial Radio Access Network on a set of at least two downlink carriers including an anchor carrier and at least a first secondary carrier. The method comprises determining a first scrambling code or a first scrambling code group associated with a first cell on the anchor carrier; and deriving a second scrambling code or a second scrambling code group associated with a second cell on said first secondary carrier using a predefined rule defining the relation between the second scrambling code or second scrambling code group and the first scrambling code or scrambling code group.Type: ApplicationFiled: November 3, 2010Publication date: August 30, 2012Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Oskar Drugge, Douglas A. Cairns, Muhammad Kazmi, Andres Reial
-
Publication number: 20120219154Abstract: Embodiments of the invention include methods of transmitting a hidden message within a secured primary data transmission. In one embodiment, a method involves transmitting a primary data transmission over a computer network from a source host to a receiving host. Intentionally-corrupted packets are introduced within the primary data transmission in a manner providing a hidden message. For example, a pattern of intentionally-corrupted packets may be used to encode the hidden message. Alternatively, the hidden message may be embedded within the data area of the intentionally-corrupted packets. The intentionally-corrupted packets are received and interpreted at the receiving host to determine the hidden message.Type: ApplicationFiled: May 13, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Justin Bandholz, William G. Pagan, William Piazza
-
Publication number: 20120213373Abstract: Methods and apparatus to secure communications in a mobile network are disclosed. An example method disclosed herein comprises randomizing a first set of bits associated with information to be communicated over a slow associated control channel by applying a scrambling factor to generate a set of scrambled bits equal in length to the first set of bits. Another example method disclosed herein comprises concatenating a set of error detection bits with a set of information bits associated with information to be transmitted over a slow associated control channel to generate a set of coded bits, and shuffling the set of coded bits to generate a set of shuffled bits.Type: ApplicationFiled: February 21, 2011Publication date: August 23, 2012Inventors: Yan Xin, Shouxing Qu
-
Publication number: 20120213374Abstract: A receiving apparatus according to the present invention is able to normally decode reception data even when a part of an initialization symbol during training is corrupted. The receiving apparatus includes an initialization signal generation unit that generates an initialization signal, and a descrambling circuit that descrambles reception data by a descrambler initialized by the initialization signal. The reception data includes a training data set for establishing connection of high-speed serial communication, the training data set including one or more TSn ordered sets. The TSn ordered set includes one or more COM symbols and one or more pieces of data other than COM symbols. The initialization signal generation unit generates the initialization signal at an initialization last timing at which at least the last COM symbol among the COM symbols forming the last TSn ordered set included in the training data set is input to the descrambling circuit.Type: ApplicationFiled: February 13, 2012Publication date: August 23, 2012Inventors: Motoshige IKEDA, Tadahiro Watanabe, Masahiro Iio
-
Patent number: 8249253Abstract: A semiconductor integrated circuit is provided, which includes: a first circuit; a second circuit; a data BUS; and first and second encryption/decryption circuits for encrypting/decrypting data transmitted between the first and second circuits on the data bus. The first encryption/decryption circuit is for encrypting data output from the first circuit, outputting the encrypted data to the data BUS, decrypting an encrypted data received from the second encryption/decryption circuit, and providing the decrypted data to the first circuit. The second encryption/decryption circuit is for decrypting the encrypted data received from the first encryption/decryption circuit, providing the decrypted data to the second circuit, encrypting data output from the second circuit, and outputting the encrypted data to the data BUS.Type: GrantFiled: April 23, 2002Date of Patent: August 21, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Chan-Yong Kim, Jong-Rok Kim
-
Publication number: 20120207306Abstract: A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.Type: ApplicationFiled: February 10, 2011Publication date: August 16, 2012Inventors: Brant L. Candelore, Stephane Lejeune
-
Publication number: 20120201384Abstract: A process for distributing digital audio sequences according to a nominal stream format that include a succession of frames, each of which includes at least one digital audio block grouping a plurality of coefficients corresponding to digitally coded audio elements, including modifying at least one block of an original stream of sequences, in an adaptive manner on the original stream as a function of at least a part of characteristics representative of the structure, content and parameters of the original stream, a target profile and external events.Type: ApplicationFiled: April 18, 2012Publication date: August 9, 2012Applicant: Querell Data Limited Liability CompanyInventors: Daniel Lecomte, Daniela Parayre-Mitzova
-
Publication number: 20120189126Abstract: Embodiments of the present disclosure provide a transmitter, a receiver and methods of operating a transmitter and a receiver. In one embodiment, the transmitter includes a synchronization unit configured to provide a primary synchronization signal and a secondary synchronization signal having first and second segments. The transmitter also includes a secondary scrambling unit configured to provide a scrambled secondary synchronization signal, wherein scrambling agents for the first and second segments are derived from a primary synchronization sequence of the primary synchronization signal. The secondary scrambling unit is further configured to provide an additional scrambling of one of the first and second segments, wherein a second scrambling agent is derived from the remaining segment of a secondary synchronization sequence of the secondary synchronization signal.Type: ApplicationFiled: April 2, 2012Publication date: July 26, 2012Inventors: Anand G. Dabak, Eko N. Onggosanusi, Badri Varadarajan
-
Publication number: 20120170754Abstract: A method is provided for detecting scrambling of a radiocommunication network. The method is applied by a radiocommunication circuit capable of being connected to the network by being synchronized on a radiocommunication channel. The method includes a final detection phase, having the following steps: detection of verification of the following final condition: there are N radiocommunication channels on which the radiocommunication circuit cannot be synchronized despite detection of a power level normally sufficient for being synchronized, where N>2; and if the final condition is verified, generation of a final scrambling signal with a probability of scrambling equal to 100%. The method also includes at least one intermediate detection phase, having the following steps: detection of verification of at least one intermediate condition; and if the at least one intermediate condition is verified, generation of an intermediate scrambling signal with a probability of scrambling of less than 100%.Type: ApplicationFiled: July 11, 2008Publication date: July 5, 2012Applicant: SIERRA WIRELESSInventors: Erwan Girard, Christophe Flechelle, Thierry Lys
-
Publication number: 20120163604Abstract: A device for establishing network connection is disclosed, having a transmitting circuit, a receiving circuit, and a controller. The transmitting circuit, comprising a first scrambler having a plurality of first registers, transmits a first data scrambled by the first scrambler to a transmission line according to an oscillating signal generated by an oscillation circuit. The receiving circuit receives a second data scrambled by a second scrambler from the transmission line and comprises a descrambler having a plurality of second registers for descrambling the second data. The first and the second scramblers use the same scrambler generator polynomial. The controller compares at least one of the first data and the value of the first registers and at least one of the second data and the values of the second registers for configuring the oscillation circuit to adjust the frequency of the oscillating signal.Type: ApplicationFiled: December 23, 2011Publication date: June 28, 2012Inventors: Liang-Wei HUANG, Cheng-Han Lee, Yi-Huei Lei, Kai-Wen Cheng
-
Publication number: 20120163605Abstract: A method and system for programming and reading data with reduced read errors in a memory device. In one approach, date to be written to the memory device is scrambled using a first pseudo random number which is generated based on a number of a page of the memory device to which the data is to be written and a second pseudo random number which is generated based on a number of a block of the memory device to which the data is to be written. This avoids bit line-to-bit line and block-to-block redundancies which can result in read errors. The data may also be scrambled based on a number of a section within a page.Type: ApplicationFiled: March 2, 2012Publication date: June 28, 2012Inventors: Eran Sharon, Idan Alrod
-
Publication number: 20120155648Abstract: In accordance with an example embodiment of the present invention, a first bit sequence of a first length is assigned to a first group of signaling bits. Further, a second bit sequence of a second length is assigned to a second group of signaling bits. The first bit sequence is scrambled with a first scrambling sequence, and the second bit sequence is scrambled with a second scrambling sequence different from the first scrambling sequence. A first and a second orthogonal frequency-division multiplexing (OFDM) symbol are assigned to the first and the second scrambled bit sequences respectively, and the first and second orthogonal frequency-division multiplexing (OFDM) symbols are transmitted as synchronization symbols of a data frame. Further, a corresponding method for receiving the data frame, and apparatuses for transmission and reception are disclosed.Type: ApplicationFiled: August 10, 2010Publication date: June 21, 2012Applicant: NOKIA CORPORATIONInventor: Miika Tupala
-
Publication number: 20120134498Abstract: An authentication method for use in sending/receiving data between a coded data output apparatus for outputting coded data having a water mark, and a recording apparatus for recording data onto a recording medium, the method including: deciding a type of the recording medium used by the recording apparatus; based on a result of the deciding, selecting, from a plurality of authentication methods, an authentication method corresponding to the type of the recording medium, and conducting authentication between the coded data output apparatus and the recording apparatus, using the authentication method; sending/receiving data between the coded data output apparatus and the recording apparatus after conducting the authentication; and in a case where the coded data has the water mark, detecting the water mark by the coded data output apparatus, wherein the data exchanged between the coded data output apparatus and the recording apparatus is scrambled by a scrambling method corresponding to the type the recording meType: ApplicationFiled: November 30, 2011Publication date: May 31, 2012Inventors: Osamu KAWAMAE, Toshifumi Takeuchi, Hiroyuki Kimura, Takao Arai, Hiroshi Yoshiura
-
Patent number: 8175276Abstract: An encryption apparatus (14) includes a secure processing system (12) in the form of an integrated circuit. The secure processing system (12) includes an on-chip secure memory system (30). The secure memory system (30) includes a non-volatile, read-only, permanent key register (62) in which a permanent cryptographic key (64) is stored. The secure memory system (30) also includes a non-volatile, read-write, erasable key register (56) in which an erasable cryptographic key (60) is stored. Symmetric cryptographic operations take place in an encryption engine (46) using an operating cryptographic key (68) formed by combining (96) the permanent and erasable keys (64, 60). A tamper detection circuit (70) detects tampering and erases the erasable key (60) when a tamper event is detected.Type: GrantFiled: February 4, 2008Date of Patent: May 8, 2012Assignee: Freescale Semiconductor, Inc.Inventors: Thomas E. Tkacik, Asaf Ashkenazi
-
Publication number: 20120099730Abstract: A radio communication system, including: a first and second base station apparatuses which includes one or plurality of cells or sectors, respectively; and a terminal apparatus, wherein each of the first and second base station apparatuses includes: a processing unit which executes scrambling processing on a first and second transmission data that are different from each other for each cell or sector by using a first and second scrambling codes having a predetermined phase difference respectively, when the first and second transmission data are to be transmitted to the terminal apparatus respectively; and a transmission unit which transmits the first and second transmission data processed by the scrambling processing to the terminal apparatus respectively, and the terminal apparatus includes a reception unit which executes descrambling processing on the first and second transmission data by using the first and second scrambling codes respectively.Type: ApplicationFiled: December 28, 2011Publication date: April 26, 2012Applicant: FUJITSU LIMITEDInventors: Takaharu Nakamura, Takayoshi Ode
-
Patent number: 8091139Abstract: A method is disclosed for protecting secret data, which is intended to be processed by an original function, from being deduced by a side-channel attack upon execution of the original function by an electronic computing device. The method includes creating hardware circuitry which replaces the original function with one or more pairs of replacement functions, by applying a predetermined masking algorithm which performs a recursive protection process. Further disclosed is an apparatus for protecting secret data, which is intended to be processed by an original function, from being deduced by a side-channel attack upon execution of the original function by an electronic computing device.Type: GrantFiled: November 1, 2007Date of Patent: January 3, 2012Assignee: Discretix Technologies Ltd.Inventor: Alexander Klimov
-
Publication number: 20110311056Abstract: Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages.Type: ApplicationFiled: August 29, 2011Publication date: December 22, 2011Applicant: VERANCE CORPORATIONInventor: Joseph M. Winograd
-
Publication number: 20110299688Abstract: A system includes a first circuit including a scrambling module that receives N digital data streams and that scrambles the N digital data streams using a scrambling sequence. A data bus receives the N scrambled digital data streams and the scrambling sequence. A second circuit communicates with the data bus and includes a first processing module that processes the N scrambled digital data streams and that outputs M digital data streams, where M and N are integers greater than one. The second circuit includes one or more descrambling and processing modules that receive the M digital data streams, that descramble the M digital data streams based on the scrambling sequence, and that further process the M digital data streams. The second circuit includes a digital to analog converter (DAC) module that receives an output of the one or more descrambling and processing modules.Type: ApplicationFiled: June 4, 2010Publication date: December 8, 2011Applicant: Maxim Integrated Products, Inc.Inventors: Geir Sigurd Ostrem, Brian Paul Brandt
-
Patent number: 8041940Abstract: In one aspect, a method to offload encryption processing in a storage area network (SAN) system includes determining whether a host is performing at a first performance level, offloading encryption processing at a processor if the host is not performing at a first performance level and performing encryption processing at the host if the host is performing at a first performance level.Type: GrantFiled: December 26, 2007Date of Patent: October 18, 2011Assignee: EMC CorporationInventors: Assaf Natanzon, Shlomo Ahal
-
Patent number: 8042175Abstract: If content is transmitted/received through a digital signal bus, protection of copyright causes a problem because of no deterioration in quality. Accordingly, authentication is required. The quantity of information to be processed is, however, so large that a long time is required for authentication. Accordingly, both achievement of handling property as in conventional analog connection and protection of copyrighted content without user's awareness become an object. The foregoing object can be achieved by authentication which is executed, for management of copyright, among apparatuses connected to the digital signal bus when the apparatuses are powered on or connected to the digital signal bus or when an input terminal connected to the digital signal bus is selected. The object can be further achieved by an encryption key shared among these apparatuses.Type: GrantFiled: October 8, 2008Date of Patent: October 18, 2011Assignee: Hitachi, Ltd.Inventors: Seiichi Saitoh, Manabu Sasamoto, Hiroo Okamoto