Patents Assigned to Irdeto B.V.
  • Patent number: 10333702
    Abstract: A method of providing key information from a sender to one or more receivers, the method comprising: obtaining initial key information comprising a plurality of units that assume respective values; forming encoded key information from the initial key information, wherein the encoded key information comprises a plurality of encoded units that correspond to respective units of the initial key information, wherein said forming comprises, for each unit of the initial key information, selecting an encoding from a plurality of invertible encodings associated with said unit and encoding said value assumed by said unit with said selected encoding to form the corresponding encoded unit; and providing the encoded key information to said one or more receivers.
    Type: Grant
    Filed: March 20, 2012
    Date of Patent: June 25, 2019
    Assignee: IRDETO B.V.
    Inventors: Peter Roelse, Yoni De Mulder
  • Patent number: 10303857
    Abstract: A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a first software client: obtaining a transformed version of the at least one decryption key; performing a decryption operation on the encrypted at least part of the item of content based on the at least one decryption key to obtain an intermediate version of the at least part of the item of content, wherein said performing the decryption operation uses a white-box implementation of the decryption operation that forms part of the first software client and that operates using the transformed version of the at least one decryption key; and performing an encryption operation on at least a portion of the intermediate version based on at least one encryption key to obtain re-encrypted content, wherein said performing the encryption operation
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: May 28, 2019
    Assignee: IRDETO B.V.
    Inventors: Arnoud Evert Van Foreest, Martin Soukup
  • Patent number: 10292049
    Abstract: The invention enables a software application to be executed on a mobile station in dependence of a SIM. Challenge data originating from the software application is input to the SIM to generate first response data using a security function of the SIM. The software application is enabled to be executed in dependence of the first response data. In addition, the challenge data may be transmitted to a verification server for the generation of second response data in dependence of the challenge data and possibly using an authentication center. The software application is then enabled to be executed in further dependence of the second response data.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: May 14, 2019
    Assignee: IRDETO B.V.
    Inventor: Jeroen Mathias Doumen
  • Publication number: 20190141414
    Abstract: A method and system for watermarking content utilizing a user device GPU. Embodiments include receiving on a processing server a request from a video server for a video to be played on the user's device. The processing server may extract a set of identifying information, such as user information, from the request for the video. The processing server may further prepare shader software code which is to be executed on a GPU present on the user's device. The code preparation may include creating a watermarking procedure to be executed during playback on the user device. The processing server may further transmit the shader software code to the streaming video server to be transmitted to the user device for execution during video playback.
    Type: Application
    Filed: September 12, 2018
    Publication date: May 9, 2019
    Applicant: Irdeto B.V.
    Inventors: Grant Goodes, Martin Soukup, Daniel Murdock
  • Publication number: 20190108349
    Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.
    Type: Application
    Filed: November 9, 2018
    Publication date: April 11, 2019
    Applicant: Irdeto B.V.
    Inventors: Phillip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
  • Patent number: 10241720
    Abstract: The invention relates to a computer-implemented method for providing content to a particular recipient device of a plurality of recipient devices. Copies of one or more content elements of the content are generated and one or more of the copies are modified to obtain modified copies of the content elements. The content elements, including the one or more modified copies of the content elements, are stored in a storage. Selection information is transmitted to the particular recipient device in response to a request for providing the content. The selection information prescribes to the recipient device the modified copy to be retrieved by the recipient device for substantially each content element for which a modified copy is available.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: March 26, 2019
    Assignee: IRDETO B.V.
    Inventors: Dmitri Jarnikov, Jeroen Mathias Doumen
  • Patent number: 10242184
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: November 5, 2017
    Date of Patent: March 26, 2019
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Patent number: 10237065
    Abstract: There is described a chip for performing cryptographic operations. The chip comprises a key storage module, a rule storage module, an interface module and a cryptographic module. The key storage module is configured to store one or more cryptographic keys. The rule storage module is configured to store one or more rules, each rule comprising respective rule data, the rule data identifying a respective predetermined cryptographic operation associated with the rule and further identifying at least one of the one or more cryptographic keys to be used in the respective predetermined cryptographic operation. The interface module is configured to receive a rule execution request, wherein the rule execution request comprises a rule identifier to identify a specific rule of the one or more rules to be executed. The cryptographic module is configured to execute the specific rule so as to perform the respective predetermined cryptographic operation in response to the rule execution request.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: March 19, 2019
    Assignee: Irdeto B.V.
    Inventors: Hans Dekker, Vladimir Zivkovic
  • Publication number: 20190073562
    Abstract: A method for identifying an object within a video sequence, wherein the video sequence comprises a sequence of images, wherein the method comprises, for each of one or more images of the sequence of images: using a first neural network to determine whether or not an object of a predetermined type is depicted within the image; and in response to the first neural network determining that an object of the predetermined type is depicted within the image, using an ensemble of second neural networks to identify the object determined as being depicted within the image.
    Type: Application
    Filed: September 6, 2017
    Publication date: March 7, 2019
    Applicant: IRDETO B.V.
    Inventors: Milosh Stolikj, Dmitri Jarnikov
  • Patent number: 10212387
    Abstract: There are described methods and apparatus for scrambling digital content, such as video or audio content, by dividing the digital content into blocks set out in an original arrangement, and reordering the blocks from the original arrangement to a scrambled arrangement. Additional manipulation transforms such as rotations and reflections may be applied to individual blocks. A subsequent compression step may then be carried out. Methods and apparatus for carrying out corresponding descrambling of digital content are also described.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: February 19, 2019
    Assignee: IRDETO B.V.
    Inventors: Annie Liu, Catherine Chambers, Luc Martel, Martin Soukup
  • Patent number: 10185837
    Abstract: A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules, the library can also be provisioned to contain an arbitrary number of named instances, representing specific sets of values for security and performance decisions, along with the corresponding native object-code resulting from those decisions. This permits distribution of software modules in a completely platform-independent manner while avoiding the disclosure of proprietary information, such as source-files.
    Type: Grant
    Filed: October 8, 2017
    Date of Patent: January 22, 2019
    Assignee: IRDETO B.V.
    Inventors: Grant Stewart Goodes, Clifford Liem
  • Publication number: 20180373849
    Abstract: A method for securing a webpage or a webapp processed by a browser executing on a client system, the method comprising the browser executing an instance of white-box protected code, wherein execution of the instance of white-box protected code causes the client system to: generate a message comprising message data for use by a control system to perform one or more security tests, the control system communicably connected to the client system via a network; send the message to the control system to enable the control system to perform the one or more security tests using the message data; receive a response from the control system based, at least in part, on the message; and process the response.
    Type: Application
    Filed: December 14, 2016
    Publication date: December 27, 2018
    Applicant: IRDETO B.V.
    Inventors: Benjamin Geoffrey GIDLEY, Catherine Chambers, Yaser EFTEKHARI ROOZBEHANI, Yegui CAI, Yuan Xiang GU
  • Publication number: 20180357391
    Abstract: A method for accessing content at a device, wherein the device is arranged to execute a digital rights management (DRM) client of a DRM system and wherein the device is arranged to receive a broadcast signal comprising a plurality of encrypted portions of content for an item of content, each encrypted portion being packaged in a format of a conditional access system and being decryptable using a corresponding decryption key, wherein the method comprises an application executing on the device performing the steps of: for each of one or more of the encrypted portions: converting said encrypted portion from being packaged in the format of the conditional access system to being packaged in a format of the DRM system; providing said encrypted portion is packaged in the format of the DRM system to the DRM client; and either (a) providing a rights object according to the DRM system to the DRM client or (b) triggering the DRM client to obtain a rights object according to the DRM system; wherein the rights object corr
    Type: Application
    Filed: March 30, 2016
    Publication date: December 13, 2018
    Applicant: IRDETO B.V.
    Inventor: Hans DEKKER
  • Patent number: 10127387
    Abstract: A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.
    Type: Grant
    Filed: March 15, 2011
    Date of Patent: November 13, 2018
    Assignee: IRDETO B.V.
    Inventors: Philip Alan Eisen, Michael James Wiener, Grant Stewart Goodes, James Muir
  • Patent number: 10127390
    Abstract: There is provided a method of performing a cryptographic algorithm in software, the cryptographic algorithm comprising one or more processing steps, wherein each processing step is arranged to process a respective input to the processing step so as to generate an output corresponding to the input, characterized in that, for each of at least one of the one or more processing steps, the method comprises: providing a respective input for the processing step as an input to a plurality of implementations of the processing step, wherein each implementation is arranged to output a corresponding intermediate result represented using a respective predetermined output representation; and using the representation of the intermediate results to generate a result for the processing step that is based on each of the intermediate results, wherein, if each intermediate result is the output that corresponds to the input for the processing step then the result for the processing step is the output that corresponds to the input
    Type: Grant
    Filed: March 27, 2013
    Date of Patent: November 13, 2018
    Assignee: IRDETO B.V.
    Inventor: Michael Wiener
  • Patent number: 10120999
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: November 6, 2018
    Assignee: IRDETO B.V.
    Inventor: Ron Vandergeest
  • Publication number: 20180295512
    Abstract: The invention enables a software application to be executed on a mobile station in dependence of a SIM. Challenge data originating from the software application is input to the SIM to generate first response data using a security function of the SIM. The software application is enabled to be executed in dependence of the first response data. In addition, the challenge data may be transmitted to a verification server for the generation of second response data in dependence of the challenge data and possibly using an authentication center. The software application is then enabled to be executed in further dependence of the second response data.
    Type: Application
    Filed: April 4, 2018
    Publication date: October 11, 2018
    Applicant: IRDETO B.V.
    Inventor: Jeroen Mathias Doumen
  • Publication number: 20180287878
    Abstract: There is described a method of monitoring a peer-to-peer network. The method comprises: (i) monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and (ii) preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer.
    Type: Application
    Filed: March 30, 2015
    Publication date: October 4, 2018
    Applicant: IRDETO B.V.
    Inventor: Dmitri Jarnikov
  • Patent number: 10089495
    Abstract: There is described a method of obfuscating access to a data store by a software application. The method comprises accessing the data store using access operations. The access operations comprise real access operations and dummy access operations. Each real access operation is operable to access the data store as part of the execution of the software application. There is also described a computer program which, when executed by a processor, causes the processor to carry out the above method. There is also described a computer readable medium storing the above computer program. There is also described a system configured to carry out the above method.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: October 2, 2018
    Assignee: IRDETO B.V.
    Inventors: Calin Ciordas, Fan Zhang
  • Patent number: 10069810
    Abstract: There is described a method of enabling a content receiver to access encrypted content, the content receiver forming part of a home network. The method comprises executing, on a device that also forms part of the home network, a key provisioning application. The method further comprises the key provisioning application receiving a key provisioning message and, based on the key provisioning message, providing to the content receiver via the home network one or more content decryption keys for decrypting the encrypted content. There is also described a device arranged to carry out this method. In addition, there is described a content receiver arranged to (a) receive from the aforementioned device, via a home network, one or more content decryption keys for accessing encrypted content; and (b) decrypt encrypted content using the one or more content decryption keys. Related computer programs and computer readable mediums are also described.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: September 4, 2018
    Assignee: IRDETO B.V.
    Inventors: Wim Mooij, Graham Kill, Chunming Qie, Michiel Willemsen