Patents Assigned to Irdeto B.V.
  • Patent number: 9025765
    Abstract: A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content data in dependence on respective keys. A key provider 106 determines the respective key used for the processing of a respective block of the content data in dependence on a respective portion 112 of the predetermined system data 104, the portion not including all the predetermined system data, wherein different respective portions of the predetermined system data are selected for the respective blocks of content data. A server system 200 for increasing data security comprises an output 202 for providing processed content data 110 to a client system 100, the client system comprising predetermined system data 104 to be protected. The server system 200 also comprises a cryptographic unit 208 and a key provider 206.
    Type: Grant
    Filed: May 19, 2008
    Date of Patent: May 5, 2015
    Assignee: Irdeto B.V.
    Inventors: Wilhelmus Petrus Adrianus Johannus Michiels, Paulus Mathias Hubertus Mechtildis Antonius Gorissen, Boris Skoric
  • Publication number: 20150121073
    Abstract: A method of providing a receiver with a version of an initial item of software, the method comprising: for each of a plurality of sections of the initial item of software that together form the initial item of software, obtaining one or more respective versions of that section, wherein for at least one of the sections a respective plurality of different versions of that section are obtained; for each of the plurality of sections of the initial item of software, selecting a respective version of that section to be used by the receiver, said selecting being arranged so that the receiver is identifiable from the set of selected versions; and providing the receiver with a version of the initial item of software by providing the receiver with access to the selected versions of the sections of the initial item of software.
    Type: Application
    Filed: March 23, 2012
    Publication date: April 30, 2015
    Applicant: Irdeto B.V.
    Inventor: Andrew Augustine Wajs
  • Patent number: 8958558
    Abstract: Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system.
    Type: Grant
    Filed: March 1, 2010
    Date of Patent: February 17, 2015
    Assignee: Irdeto B.V.
    Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
  • Publication number: 20150043577
    Abstract: There is described a method of distributing a first piece of content to multiple receivers. The first piece of content comprises a plurality of content portions. The method comprises: (a) for each of a plurality of selected content portion of the plurality of content portions, there being two or more versions of each said selected content portion, allocating each version of that selected content portion to a respective multicast channel; and (b) providing each receiver with access to a respective group of the multicast channels, each receiver being identifiable at least in part by means of the respective group of multicast channels for that receiver. A corresponding multicast system and receiver are also described.
    Type: Application
    Filed: January 19, 2012
    Publication date: February 12, 2015
    Applicant: Irdeto B.V.
    Inventor: Jeroen Doumen
  • Publication number: 20150040224
    Abstract: A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secure software agent is provided for embedding within the abstraction layer forming the operating system. A secure store is provided for storing security information unique to one or more instances of the application plication software. The secure software agent uses the security information for continuous runtime assurance of ongoing operational integrity of the operating system and application software and thus operational integrity of the device.
    Type: Application
    Filed: March 9, 2011
    Publication date: February 5, 2015
    Applicant: IRDETO B.V.
    Inventors: Paul Litva, David Jones, Ron Vandergeest
  • Publication number: 20150033026
    Abstract: A fingerprinting method. For each round in a series of rounds: providing to each receiver in a set of receivers a version of a source item of content, the source item of content corresponding to the round. For the round there is a corresponding part of a fingerprint-code for the receiver, the part includes one or more symbols. The version provided to the receiver represents those one or more symbols. One or more corresponding symbols are obtained from a suspect item as a corresponding part of a suspect-code. For each receiver in the set of receivers, a corresponding score that indicates a likelihood that the receiver is a colluding-receiver is updated.
    Type: Application
    Filed: May 2, 2012
    Publication date: January 29, 2015
    Applicant: IRDETO B.V.
    Inventors: Peter Roelse, Jeroen Doumen, Thijs Laarhoven
  • Publication number: 20150023495
    Abstract: A secure and change-tolerant method for obtaining an identifier for a collection of assets associated with a computing environment. Each asset has an asset parameter and the computing environment has a fingerprint based on an original collection of assets and on a codeword generation algorithm on the original collection of assets. The method comprises: retrieving the asset parameters of the collection of assets and processing the retrieved asset parameters to obtain code symbols. An error-correction algorithm is applied to the code symbols to obtain the identifier. The method can be used in node-locking.
    Type: Application
    Filed: March 15, 2011
    Publication date: January 22, 2015
    Applicant: IRDETO B.V.
    Inventors: Fan Zhang, Andrew Augustine Wajs
  • Publication number: 20150026452
    Abstract: There is disclosed a method of controlling use of encrypted content by a plurality of client terminals each provided with a digital rights management (DRM) client and a content decryption module separate to the DRM client. First key information is provided for use by one or more selected ones of the DRM clients, and second key information is provided for use by one or more selected ones of the content decryption modules. Content key information is encrypted to form encrypted content key information such that the selected ones of the content decryption modules are enabled by the second key information to recover the content key information from the encrypted content key information. The encrypted content key information is further encrypted to form super-encrypted content key information such that the selected ones of the DRM clients are enabled by the first key information to recover the encrypted content key information from the super-encrypted content key information.
    Type: Application
    Filed: February 17, 2012
    Publication date: January 22, 2015
    Applicant: IRDETO B.V.
    Inventor: Peter Roelse
  • Publication number: 20140362987
    Abstract: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds.
    Type: Application
    Filed: April 9, 2014
    Publication date: December 11, 2014
    Applicant: IRDETO B.V.
    Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
  • Publication number: 20140344850
    Abstract: A plurality of sets of primary product keys is established or generated, each set containing at least two different primary product keys. One primary product key of each set is made available to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys. For each set of primary product keys, the plurality of receivers or groups of receivers is provided with a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. The primary control words can then be used for purposes such as tracing compromise of the conditional access system, or arranging for differently fingerprinted content to be decoded at different receivers or groups of receivers.
    Type: Application
    Filed: November 2, 2011
    Publication date: November 20, 2014
    Applicant: IRDETO B.V.
    Inventor: Andrew Augustine Wajs
  • Publication number: 20140259086
    Abstract: There is disclosed a head-end system in which differently processed copies of content portions are reordered such that copies from different content portions are not interleaved in the final transport stream.
    Type: Application
    Filed: October 28, 2011
    Publication date: September 11, 2014
    Applicant: IRDETO B.V.
    Inventor: Andrew Augustine Wajs
  • Publication number: 20140237029
    Abstract: The invention involves the migration of at least some of the content discovery and/or resource management tasks from a home network to a remote server by using a proxy device, such as e.g. a DLNA-compatible proxy server or a proxy server compatible with other and/or multiple standards, connected to the devices within the home network and also connected to the resource server via an external, network. The proxy device can obtain content-relation information and, possibly, also: device-related information from the devices within the home network and provide that information to the remote server which can use the information to create an integrated navigation interface for navigating and/or managing content available to all of the devices within the home network.
    Type: Application
    Filed: April 25, 2014
    Publication date: August 21, 2014
    Applicant: Irdeto B.V.
    Inventors: Andrew Augustine Wajs, Calin Ciordas, Jeroen Mathias Doumen
  • Publication number: 20140229744
    Abstract: The invention provides a method, a hardware circuit and a hardware device for enabling a software application to be executed on a hardware device in dependence of the hardware circuit, while preventing the execution of a binary copy of the application in another hardware device. Challenge data originating from the software application is input to a hardware circuit of the hardware device, wherein the hardware circuit is configured to perform a deterministic function. Response data is generated by the hardware device, which is used to manipulate at least a part of the software application to thereby enable the software application to be executed.
    Type: Application
    Filed: March 19, 2012
    Publication date: August 14, 2014
    Applicant: IRDETO B.V.
    Inventor: Jeroen Mathias Doumen
  • Patent number: 8738927
    Abstract: In order to further develop an arrangement for as well as a method of protecting at least one data processing device, in particular at least one embedded system, for example at least one chip card or smart card, against at least one attack, in particular against at least one side-channel attack, for example against at least one current trace analysis, the data processing device, in particular at least one integrated circuit of the data processing device, carrying out calculations, in particular cryptographic operations wherein an attack, for example an E[lectro]M[agnetic] radiation attack, or an analysis, for example a D[ifferential]P[ower]A[nalysis], such attack or such analysis in particular targeted on finding out a private key, is to be securely averted, it is proposed to blind all intermediate results of the calculations by at least one random variable, without inverting any operand of the calculations.
    Type: Grant
    Filed: June 23, 2006
    Date of Patent: May 27, 2014
    Assignee: Irdeto B.V.
    Inventor: Gerardus Tarcisius Maria Hubert
  • Patent number: 8737620
    Abstract: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: May 27, 2014
    Assignee: Irdeto B.V.
    Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
  • Patent number: 8731235
    Abstract: Embodiments of the invention provide a method and a system for fingerprinting a data object at a server system and a method and a system for extracting the fingerprint from the data object at a client system. Sections of a data object are watermarked with known watermark data to create a first and a second variant of the data object, whereby the section boundaries are optionally saved as metadata. Using the metadata, the first and second variant are combined by taking sections from the variants to create a fingerprinted data object. From the fingerprinted data object, the watermark data can be extracted again.
    Type: Grant
    Filed: December 29, 2009
    Date of Patent: May 20, 2014
    Assignee: Irdeto B.V.
    Inventors: Joseph Boyd, Peter Marcotte
  • Publication number: 20140068656
    Abstract: The invention provides a solution for secure and non-manipulatable processing of a data stream in a receiver, possibly in conjunction with a smartcard. A packet identity and a content type identifier associated with the packet identifier are received in encrypted form and securely processed within the receiver to allow an encrypted payload of the data stream to be processed without the possibility to manipulate the content type identifier in an attempt to intercept the payload after decryption.
    Type: Application
    Filed: November 12, 2013
    Publication date: March 6, 2014
    Applicant: IRDETO B.V.
    Inventors: Andrew Augustine Wajs, Arnoud Evert Van Foreest, Gerard Johan Dekker, Bruce Victor Curtin
  • Publication number: 20140026214
    Abstract: A method to secure a non-native application. The non-native application is processed to obtain an application stub to be triggered within a virtual machine. The processing of the non-native application also provide a native code function upon which the application stub depends. The non-native function is part of a trusted module that extends security services from the trusted module to the virtual machine. The trusted module is a native code application that creates a trusted zone as a root of trustiness extending to the virtual machine by an execution-enabling mechanism between the application tab and the non-native function.
    Type: Application
    Filed: March 31, 2011
    Publication date: January 23, 2014
    Applicant: IRDETO B.V.
    Inventors: Garney David Adams, Yuan Xiang Gu, Jack Jiequn Rong
  • Publication number: 20140019771
    Abstract: A method of protecting the execution of a cryptographic hash function, such as SHA-256, in a computing environment where inputs, outputs and intermediate values can be observed. The method consists of encoding input messages so that hash function inputs are placed in a transformed domain, and then applying a transformed cryptographic hash function to produce an encoded output digest; the transformed cryptographic hash function implements the cryptographic hash function in the transformed domain.
    Type: Application
    Filed: March 31, 2011
    Publication date: January 16, 2014
    Applicant: IRDETO B.V.
    Inventors: Jonathan Emmett, Philip Allan Eisen, James Muir, Daniel Murdock
  • Publication number: 20140019767
    Abstract: The invention relates to a computer-implemented method for providing a data stream comprising a plurality of content elements. At least one of two or more copies of a first content element of the data stream has been watermarked with a different watermark. The method includes watermarking at least one of two or more copies of a second content element with a different watermark. In a rendering order of the data stream, the second content element is at an interval equal to or greater than a watermark interval from the first content element. The watermark interval is set to be sufficiently long so that the output quality of the rendered data stream can either completely recover or at least return to a predetermined acceptable level following the watermarking of the copies of the first content element before watermarking the copies of the next content element.
    Type: Application
    Filed: March 29, 2011
    Publication date: January 16, 2014
    Applicant: IRDETO B.V.
    Inventor: Dmitri Jarnikov