Patents Assigned to Irdeto B.V.
  • Patent number: 12255982
    Abstract: A method of performing a cryptographic process in a secured manner, wherein the cryptographic process generates output data based on input data, the generating of the output data involving generating a value y based on an amount of data x, the value y representing a combination, according to a linear transformation L, of respective outputs from a plurality of S-boxes Sn (n=0, . . . , N?1) for integer N>1, wherein each S-box Sn (n=0, . . .
    Type: Grant
    Filed: August 25, 2022
    Date of Patent: March 18, 2025
    Assignee: IRDETO B.V.
    Inventor: Tingting Lin
  • Patent number: 12230058
    Abstract: Disclosed implementations include a method, apparatus and computer media for learning an optimal graph in the form of a tree topology defining a sequence that can be used by a learning network for image recognition. Image data representing the image of an object is received and N landmarks are detected on the image using a deep regression algorithm, wherein N is an integer. A weighted, fully connected, graph is constructed from the landmarks by assigning initial weights for the landmarks randomly. An optimized tree structure is determined based on the initial weights. A sequence is generated by traversing nodes of the tree structure and a series of embeddings representing the object image are generated based on the sequence. The embeddings can be processed by a neural network to generate an image recognition signal based on the embeddings.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: February 18, 2025
    Assignee: IRDETO B.V.
    Inventors: Alireza Sepas-Moghaddam, Ali Etemad, Mojtaba Kolahdouzi
  • Patent number: 12197566
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: October 26, 2022
    Date of Patent: January 14, 2025
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Patent number: 12184675
    Abstract: A system and method for train control system intrusion detection that uses Machine Learning (ML) to detect attacks on traction and braking operations performed by a TCMS. Control message history, which includes previously generated operational commands and control messages sent to each train and mobility information for each train at predetermined time intervals, is received. The received input data is checked for misbehavior and detect attacks.
    Type: Grant
    Filed: November 2, 2022
    Date of Patent: December 31, 2024
    Assignee: Irdeto B.V.
    Inventors: Mohammad Zulkernine, Amin Fakhereldine, Dan Murdock
  • Patent number: 12149608
    Abstract: An apparatus method and computer media for implementing a white-box block cipher in a software application to create a secure software application having the same functionality as the software application.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: November 19, 2024
    Assignee: Irdeto B.V.
    Inventors: Tingting Lin, Dafu Lou, Manfred Von Willich
  • Patent number: 12143491
    Abstract: A method for performing an elliptic curve cryptographic process to generate output data based on input data, the elliptic curve cryptographic process based on an elliptic curve over a finite field, wherein the generation of the output data comprises generating, based on a predetermined point V of the elliptic curve and a positive R-bit integer k, a first point of the elliptic curve that is based, at least in part, on the point kV of the elliptic curve, wherein k=?r=0R?1 2rbr and, for each r=0, 1, . . . , R?1, br is the bit value of k at bit position r of k, wherein the method comprises: storing, according to a partition of the R bit positions for k into T groups of bit positions Pt (t=0, 1, . . .
    Type: Grant
    Filed: August 25, 2022
    Date of Patent: November 12, 2024
    Assignee: Irdeto B.V.
    Inventor: Tingting Lin
  • Patent number: 11947665
    Abstract: Systems, methods, and storage media for creating secured computer code from original computer code are disclosed. The secured computer code is created from original computer code and has a secured interface between a first code domain and a second code domain of the original computer code, the first code domain including code in a first coding language and the second code domain including code in a second coding language, the first code domain being compiled separately from the second code domain. Exemplary implementations may: identify a code method defined in the first code domain that is declared in the second code domain; create a corresponding code method in the second code domain that has a signature that corresponds to a signature of the code method; and create a transformed code method in the first code domain.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: April 2, 2024
    Assignee: IRDETO B.V.
    Inventor: Damon Peng
  • Patent number: 11809532
    Abstract: A method for detection of modification of an item of content, the method comprising: obtaining, for the item of content, a respective first value of each attribute in a set of one or more attributes of the item of content, the set of one or more attributes selected such that, for each of one or more predetermined types of modification, said type of modification affects the value of at least one attribute in the set of one or more attributes; performing a watermark decoding operation on the item of content; and in response to the watermark decoding operation producing payload data from the item of content: determining that the one or more predetermined types of modification have not been applied to the item of content if, for each attribute in the set of one or more attributes, the respective first value for that attribute matches a respective second value for that attribute determined using the payload; or determining that a modification has been applied to the item of content if, for at least one attribute i
    Type: Grant
    Filed: October 14, 2020
    Date of Patent: November 7, 2023
    Assignee: Irdeto B.V.
    Inventors: Arnoud Van Foreest, Kimon Tsitsikas, Vyacheslav Shoshin, Chunqiu Lu, Lin Yuan, Yu Duan, Maksym Koshel, Kostiantyn Shevchenko, Svetislav Momcilovic, Vladimir Zivkovic
  • Patent number: 11755724
    Abstract: A method of securing a software routine implemented in a software instance executing in an execution environment, the method comprising: initializing a code block of the software instance with a reference to the software routine by storing the reference such that the stored reference is inaccessible to code outside of the code block; and returning a reference to the code block, the reference to the code block used by the software instance outside of the code block to invoke the software routine; wherein the code block is configured to: (a) invoke the software routine using the stored reference, and, (b) after a predetermined number of invocations of the software routine by the code block, modify the stored reference so as to prevent further invocation of the software routine by the code block.
    Type: Grant
    Filed: January 21, 2022
    Date of Patent: September 12, 2023
    Assignee: Irdeto B.V.
    Inventor: Yaser Eftekhari Roozbehani
  • Patent number: 11727102
    Abstract: There are described computer-implemented methods of obtaining a user input. A first such method comprises: (a) providing access to video content, the video content representing a user interface including a plurality of elements for selection by a user; (b) playing a first portion of the video content to the user; (c) detecting a first user interaction occurring in response to the played first portion of the video content; and (d) determining a first element selected by the user based on one or more properties of the detected first user interaction.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: August 15, 2023
    Assignee: Irdeto B.V.
    Inventors: Annie Liu, Wim Mooij, Sunitha Ramakrishna, Catherine Chambers
  • Patent number: 11722529
    Abstract: A method and system for managing shared use of an asset. An asset device and an owner device accomplish an initial setup procedure to register the owner with the asset. One or more secure policies are then sent from the owner device, or another device authorized to create policies, to one or more user devices. The policies express user conditions and limitations for using the asset. Subsequently, the user device transmits the secure policy to the asset device. Once the policy has been transferred from the user device to the asset device, user associated with the user device can request use of the asset and will be granted the requested use if the requested use is permitted by the policy.
    Type: Grant
    Filed: February 8, 2022
    Date of Patent: August 8, 2023
    Assignee: Irdeto B.V.
    Inventors: Yaser Eftekhari Roozbehani, Clifford Liem
  • Patent number: 11675880
    Abstract: A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response.
    Type: Grant
    Filed: November 5, 2020
    Date of Patent: June 13, 2023
    Assignee: Irdeto B.V.
    Inventors: Benjamin Geoffrey Gidley, Catherine Chambers, Yaser Eftekhari Roozbehani, Yegui Cai, Yuan Xiang Gu
  • Patent number: 11637835
    Abstract: Methods and systems for providing secure digital access to services are described. Embodiments include user behavior tracking, learning, and updating one or more contextual access algorithms and thereafter can act as multi-factor authentications. The method may include receiving data for a group of users and initializing a machine learning algorithm with the group data. The method may also collect individual user data and context data periodically, including characteristic behavior data, and update the machine learning algorithm with the individual user data. The method may further calculate a threshold for tolerance based on the updated algorithm, and verify user requests for access to the service. A multi-factor authentication may be presented to the user when the verifications are not acceptable, such as by being below a threshold. A permissions data structure can be generated and used to control access to the service.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: April 25, 2023
    Assignee: Irdeto B.V.
    Inventors: Clifford Liem, Martin Soukup, Daniel Murdock
  • Patent number: 11606211
    Abstract: A method of operating a system, wherein the system comprises a plurality of components, the method comprising: maintaining a distributed ledger, wherein the distributed ledger comprises data records, wherein each data record stores information concerning one or more respective components of the plurality of components; at least one component of the plurality of components processing the information stored in one or more respective data records of the distributed ledger to determine whether the system meets one or more respective security criteria; and one or both of: (i) the at least one component performing a respective first action if the at least one component determines that the system meets the one or more respective security criteria; and (ii) the at least one component performing a respective second action if the at least one component determines that the system does not meet the one or more respective security criteria.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: March 14, 2023
    Assignee: Irdeto B.V.
    Inventors: Clifford Liem, John O'Connor
  • Patent number: 11599651
    Abstract: A computer-implemented method, in which an access request in relation to data is received. There is Error Correcting Code (ECC) data relating to the data, and the ECC data is configured to enable correction of multiple-bit errors spanning up to a predetermined number of consecutive bits of the data. The ECC data is configured to enable correction of multiple-bit errors spanning up to a predetermined number of consecutive bits of the data. A first integrity verification verifies the integrity of at least the data. If the first integrity verification procedure fails, an error analysis procedure is performed based on the data and the ECC data. Responsive to generation of corrected data by the error analysis procedure, a second integrity verification verifies the integrity of the corrected data. If the second integrity verification is successful, the access request is allowed using the corrected data.
    Type: Grant
    Filed: July 5, 2018
    Date of Patent: March 7, 2023
    Assignee: Irdeto B.V.
    Inventors: Peter Williams, Andrew Williams, Colin Hutchings
  • Patent number: 11581794
    Abstract: There is described a system comprising mechanical equipment and an apparatus for monitoring and/or controlling the mechanical equipment. The mechanical equipment vibrates at a frequency fvibration in use, and the apparatus is attached to the mechanical equipment such that the apparatus also vibrates when the mechanical equipment is in use. The apparatus comprises an electronics module and a resonant electric generator. The resonant electric generator has a resonant frequency f0 comparable to the vibrational frequency fvibration of the mechanical equipment. The resonant electric generator comprises a magnet having an associated a magnetic field, a coil electrically coupled to the electronics module, and a resilient member. The resilient member is configured, when the apparatus is vibrated at or around the resonant frequency f0, to cause relative oscillation of the coil and the magnet so as to induce an electric current in the coil to thereby power the electronics module.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: February 14, 2023
    Assignee: IRDETO B.V.
    Inventors: Lawrence John King, Pat Ford, Bevan Watkiss
  • Patent number: 11514159
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: December 9, 2021
    Date of Patent: November 29, 2022
    Assignee: Irdeto B.V.
    Inventor: Ron Vandergeest
  • Publication number: 20220318373
    Abstract: There is described a method of enabling identification of the execution state of an item of software at runtime. The method comprises receiving from one or more clients one or more respective labelled sets of invocation data generated at the one or more clients by the execution of an executable of the item of software configured to cause the collection of invocation data at runtime for one or more callable units of the item of software, wherein each labelled set of invocation data comprises a label indicating an execution state of the item of software during a respective portion of runtime and invocation data corresponding to said respective portion of runtime; training, based on said collection of invocation data, an identification algorithm to identify the execution state of the item of software from collected invocation data of the item of software.
    Type: Application
    Filed: March 28, 2022
    Publication date: October 6, 2022
    Applicant: Irdeto B.V.
    Inventors: Tomasz FRYDRYCH, Michail GRESHISHCHEV, Jakub JANOWSKI, Peter MEERWALD-STADLER, Duncan OGILVIE, Piotr SKRZYPCZAK, Markus SPITZLINGER, Grzegorz TERLIKOWSKI
  • Publication number: 20220292351
    Abstract: Disclosed implementations include a depth generation method using a novel teacher-student GAN architecture (TS-GAN) to generate depth images for 2-D images, such as RGB images, where no corresponding depth information is available. An example model consists of two components, a teacher and a student. The teacher consists of a fully convolutional encoder-decoder network as a generator along with a fully convolution classification network as the discriminator. The generator takes 2-D images as inputs and aims to output the corresponding depth images. The teacher learns an initial latent mapping between 2-dimensional and co-registered depth images and the student applies the latent mapping to provide feedback to the classification network for refinement.
    Type: Application
    Filed: March 9, 2022
    Publication date: September 15, 2022
    Applicant: IRDETO B.V.
    Inventors: Ali ETEMAD, Alireza SEPAS-MOGHADDAM, Hardik UPPAL, Michael GREENSPAN, Martin SOUKUP
  • Patent number: 11411826
    Abstract: There is described a method of monitoring a peer-to-peer network. The method comprises: (i) monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and (ii) preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: August 9, 2022
    Assignee: Irdeto B.V.
    Inventor: Dmitri Jarnikov