Patents Assigned to Irdeto B.V.
  • Patent number: 10867032
    Abstract: A method of generating a protected item of software, there being an execution path within code for the protected item of software that causes code for one or more second functions to be executed before executing code for a first function, wherein execution of the code for the one or more second functions causes data to be stored at one or more memory locations, the data satisfying a set of one or more predetermined properties, wherein, in the absence of an attack against the protected item of software when the code for the protected item of software is being executed, the first function is arranged to provide first functionality, the method comprising: configuring the code for the first function so that execution, by one or more processors, of the code for the first function provides the first functionality only if the set of one or more predetermined properties is satisfied by data being stored, when the first function is executed, at the one or more memory locations.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: December 15, 2020
    Assignee: IRDETO B.V.
    Inventor: Robert Krten
  • Patent number: 10805693
    Abstract: A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: October 13, 2020
    Assignee: IRDETO B.V.
    Inventors: Martin Soukup, Daniel Murdock
  • Patent number: 10797868
    Abstract: A method for a first entity and a second entity to establish a shared secret, wherein the first entity and the second entity each have a respective asymmetric key pair that comprises a public key and a corresponding private key, wherein the method comprises: the first entity generating a protected item of software that comprises a representation of the public key of the first entity and a message generator that is configured to use an authentication key; the first entity providing the protected item of software to the second entity; the second entity executing the protected item of software, said executing comprising the message generator generating a message that represents the public key of the second entity and that comprises authentication data generated using the authentication key so that integrity of the message is verifiable using a verification key corresponding to the authentication key; the first entity obtaining the message from the second entity; in response to a set of one or more conditions bei
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: October 6, 2020
    Assignee: IRDETO B.V.
    Inventor: Simon Rix
  • Patent number: 10762179
    Abstract: Systems, methods, and storage media implemented by a computer for enabling tracking of software are disclosed. Exemplary implementations may: receive marking input code corresponding to a computer program; identify locations of the marking input code that can be modified in ways that preserve functionality of the computer program; choose at least one code transformation with associated intrinsic constants; derive derived constants from the specific intrinsic constants; apply the at least one chosen code transformation, including injecting the derived constants into the marking input code; saving the results of the above steps on computer readable media as marked code; and save metadata including a list of the derived constants on computer readable media in a file that is separate from the marked code.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: September 1, 2020
    Assignee: IRDETO B.V.
    Inventors: Catherine Chambers, Philip Allan Eisen, Robert Durand, Grant Goodes
  • Publication number: 20200218938
    Abstract: A method for identifying an object within a video sequence, wherein the video sequence comprises a sequence of images, wherein the method comprises, for each of one or more images of the sequence of images: using a first neural network to determine whether or not an object of a predetermined type is depicted within the image; and in response to the first neural network determining that an object of the predetermined type is depicted within the image, using an ensemble of second neural networks to identify the object determined as being depicted within the image.
    Type: Application
    Filed: August 30, 2018
    Publication date: July 9, 2020
    Applicant: IRDETO B.V.
    Inventors: Milosh Stolikj, Dmitri Jarnikov
  • Publication number: 20200177584
    Abstract: A method for facilitating a user to subsequently access, via an application executed by a user device of the user, an account for one or more services provided by a service provider, wherein said access is controlled based on biometric verification of the user performed, at least in part, at the user device, wherein the method comprises: obtaining reference data from a storage device, wherein the storage device stores biometric data for the user suitable for use in the biometric verification of the user, and wherein the reference data is suitable for use in one or both of: (a) subsequent access of the biometric data from the storage device and (b) authentication of the biometric data; and providing the reference data to an access system used by the service provider so that the access system can associate the reference data with an identifier associated with the user.
    Type: Application
    Filed: April 13, 2017
    Publication date: June 4, 2020
    Applicant: Irdeto B.V.
    Inventor: Andrew Augustine Wajs
  • Publication number: 20200151367
    Abstract: A change-tolerant method of generating a fingerprint of a computing environment based on asset parameters associated components of the computing environment. Asset parameters are grouped into multiple subsets based on characteristics of the components. A share is generated for each asset parameter of the category to produce a plurality of shares. A secret sharing algorithm is applied to the subsets to generate a plurality of candidate identifiers corresponding to the plurality of subsets of shares. A candidate identifier is selected from the plurality of candidate identifiers as a final identifier for each category based at least in part on a frequency of occurrence of that candidate identifier. The final identifiers are combined into a fingerprint corresponding to the computing environment, wherein the fingerprint is provides verification of the plurality of components without requiring individual verification of any shares in the plurality of shares.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 14, 2020
    Applicant: Irdeto B.V.
    Inventor: Philip Allan Eisen
  • Patent number: 10635807
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: November 3, 2017
    Date of Patent: April 28, 2020
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Patent number: 10638173
    Abstract: Watermarking of a content stream is accomplished in a session based manner to provide watermarking based on a uniquely generated manifest that will result in a stream that allows for unique identification of information. The manifest specifies a sequence of watermarks for successive segments of a content stream designated for a specific receiver. The system and method leverages existing content distribution infrastructure and has many of the benefits of conventional head-end watermarking, allows unique identification of small segments of the data stream and reduces content distribution network storage requirements.
    Type: Grant
    Filed: February 3, 2018
    Date of Patent: April 28, 2020
    Assignee: IRDETO B.V.
    Inventors: Lau Zuydervelt, Vladimir {hacek over (Z)}ivković, Maksym Koshel, Lucas Catranis
  • Patent number: 10635808
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: April 28, 2020
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Patent number: 10623409
    Abstract: There is described a method of controlling access to IP streaming content by a plurality of receivers. The method comprises the steps of (a) for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; (b) identifying a receiver from the plurality of receivers as an identified receiver; (c) updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and (d) configuring each receiver to fetch the updated control information for that receiver. For the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. A server configured to carry out the method is also described.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: April 14, 2020
    Assignee: IRDETO B.V.
    Inventors: Wim Mooij, Andrew Augustine Wajs
  • Patent number: 10607948
    Abstract: A method of individualizing a semiconductor chip of a batch of semiconductor chips with respective individualization data of the semiconductor chip, the method comprising, applying a plurality of circuit layouts to the semiconductor chip to form a plurality of circuits on the semiconductor chip, wherein for each circuit layout, said circuit layout is arranged such that, (a) the corresponding circuit, when triggered, falls into any one of two or more respective triggered states, and (b) one of the two or more respective triggered states is a respective preferred state defined by said circuit layout, wherein the plurality of respective preferred states of the circuits in the plurality of circuits encode the individualization data, and wherein each individualized semiconductor chip of the batch of semiconductor chips comprises a generic circuit.
    Type: Grant
    Filed: June 2, 2017
    Date of Patent: March 31, 2020
    Assignee: IRDETO B.V.
    Inventor: Gerard Johan Dekker
  • Patent number: 10599855
    Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: March 24, 2020
    Assignee: IRDETO B.V.
    Inventors: Phillip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
  • Publication number: 20200050740
    Abstract: Systems, methods, and storage media implemented by a computer for enabling tracking of software are disclosed. Exemplary implementations may: receive marking input code corresponding to a computer program; identify locations of the marking input code that can be modified in ways that preserve functionality of the computer program; choose at least one code transformation with associated intrinsic constants; derive derived constants from the specific intrinsic constants; apply the at least one chosen code transformation, including injecting the derived constants into the marking input code; saving the results of the above steps on computer readable media as marked code; and save metadata including a list of the derived constants on computer readable media in a file that is separate from the marked code.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 13, 2020
    Applicant: IRDETO B.V.
    Inventors: Catherine Chambers, Philip Allan Eisen, Robert Durand, Grant Goodes
  • Patent number: 10552588
    Abstract: The invention provides a method, a hardware circuit and a hardware device for enabling a software application to be executed on a hardware device in dependence of the hardware circuit, while preventing the execution of a binary copy of the application in another hardware device. Challenge data originating from the software application is input to a hardware circuit of the hardware device, wherein the hardware circuit is configured to perform a deterministic function. Response data is generated by the hardware device, which is used to manipulate at least a part of the software application to thereby enable the software application to be executed.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: February 4, 2020
    Assignee: IRDETO B.V.
    Inventor: Jeroen Mathias Doumen
  • Patent number: 10546155
    Abstract: A method of protecting an item of software, said item of software arranged to perform data processing based on one or more items of data, the method comprising: applying one or more software protection techniques to said item of software to generate a protected item of software, wherein said one or more software protection techniques are arranged so that said protected item of software implements said data processing at least in part as one or more linear algebra operations over a finite ring.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: January 28, 2020
    Assignee: IRDETO B.V.
    Inventor: Michel Kinasz
  • Patent number: 10523419
    Abstract: A method for a first entity to protect a first amount of data and to enable a second entity to perform data processing based on the first amount of data, the method comprising the first entity: applying a predetermined function to the first amount of data to generate a first value; and generating a second amount of data for the second entity to process, said generating comprising combining, using a first combination function, each of a number N of elements of the first amount of data with the first value; wherein the predetermined function is a function for which application of the predetermined function to an input quantity of data generates a corresponding output value, and the predetermined function has a property that, given a second quantity of data generated by modifying each of N elements of a first quantity of data by combining, using the first combination function, each of those N of elements of the first quantity of data with the output value generated by applying the predetermined function to the f
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: December 31, 2019
    Assignee: IRDETO B.V.
    Inventor: Michel Kinasz
  • Publication number: 20190372759
    Abstract: A method for a first entity and a second entity to establish a shared secret, wherein the first entity and the second entity each have a respective asymmetric key pair that comprises a public key and a corresponding private key, wherein the method comprises: the first entity generating a protected item of software that comprises a representation of the public key of the first entity and a message generator that is configured to use an authentication key; the first entity providing the protected item of software to the second entity; the second entity executing the protected item of software, said executing comprising the message generator generating a message that represents the public key of the second entity and that comprises authentication data generated using the authentication key so that integrity of the message is verifiable using a verification key corresponding to the authentication key; the first entity obtaining the message from the second entity; in response to a set of one or more conditions bei
    Type: Application
    Filed: May 31, 2018
    Publication date: December 5, 2019
    Applicant: Irdeto B.V.
    Inventor: Simon RIX
  • Publication number: 20190354679
    Abstract: A method of generating a protected item of software, there being an execution path within code for the protected item of software that causes code for one or more second functions to be executed before executing code for a first function, wherein execution of the code for the one or more second functions causes data to be stored at one or more memory locations, the data satisfying a set of one or more predetermined properties, wherein, in the absence of an attack against the protected item of software when the code for the protected item of software is being executed, the first function is arranged to provide first functionality, the method comprising: configuring the code for the first function so that execution, by one or more processors, of the code for the first function provides the first functionality only if the set of one or more predetermined properties is satisfied by data being stored, when the first function is executed, at the one or more memory locations.
    Type: Application
    Filed: September 17, 2014
    Publication date: November 21, 2019
    Applicant: IRDETO B.V.
    Inventor: Robert KRTEN
  • Publication number: 20190356966
    Abstract: Watermarking of a content stream is accomplished in a session-based manner to provide watermarking based on a uniquely generated manifest that will result in a stream that allows for unique identification of information. The manifest specifies a sequence of watermarks for successive segments of a content stream designated for a specific receiver. The system and method leverages existing content distribution infrastructure and has many of the benefits of conventional head-end watermarking, allows unique identification of small segments of the data stream and reduces content distribution network storage requirements. Groups of nodes can be provided with unique watermark patterns and detection and watermark pattern reconfiguration can be accomplished in an iterative manner to find a specific node without the need to create unique watermark patterns for each node.
    Type: Application
    Filed: August 1, 2019
    Publication date: November 21, 2019
    Applicant: IRDETO B.V.
    Inventors: Lau Zuydervelt, Vladimir Zivkovic, Maksym Koshel, Lucas Catranis, Yu Duan, Chunqiu Lu, Lin Yuan, Kimon Tsitsikas, Vyacheslav Shoshin