Patents by Inventor Christophe Mialon
Christophe Mialon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9686082Abstract: A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media.Type: GrantFiled: February 19, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Publication number: 20160173285Abstract: A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media.Type: ApplicationFiled: February 19, 2016Publication date: June 16, 2016Inventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 9313025Abstract: A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media.Type: GrantFiled: October 6, 2014Date of Patent: April 12, 2016Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 8989387Abstract: A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first encrypted step certificate is extracted. A second hashing result is obtained from hashing the object to be authenticated. A third hashing result of an object identifier encoded within a decrypted second encrypted step certificate is extracted. A fourth hashing result is obtained from hashing the object to be authenticated. It is determining that the first hashing result is equal to the second hashing result and that the third hashing result is equal to the fourth hashing result, from which it is ascertained the object status of the object is that the object is an authentic object, a counterfeited object, or a stolen object. The ascertained object status is displayed on a screen of an authenticity verification equipment.Type: GrantFiled: April 2, 2013Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Publication number: 20150058635Abstract: A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media.Type: ApplicationFiled: October 6, 2014Publication date: February 26, 2015Inventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 8929553Abstract: A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity about an object. The request includes a media identifier, a media key block, an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted using a random key. The encrypted step certificate and an encrypted random key are sent to the requester entity for subsequent writing the step certificate and the encrypted random key on a media.Type: GrantFiled: April 2, 2013Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 8694799Abstract: The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with an identifier and with a media Key block MKB. The media center includes: a unique identifier identifying the media center MC_UID, a set of device keys DK; storage means for storing files identified by respective file identifiers; and a processing unit comprising file encryption means for encrypting each file before storage in the storage means, using a title key (Kt) computed from the identifier MC_UID of the media center and for encrypting the title key Kt from the set of device keys DK of the media center, and from the identifier and the media key block MKB of the mobile secure and protection keyring, the media center being further provided to write the encrypted title key (eKt) in association with the file identifier of the file to the mobile secure and protection keyring.Type: GrantFiled: August 21, 2008Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Jean-Luc Collet, Gerard Marmigere, Christophe Mialon
-
Patent number: 8689011Abstract: The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit.Type: GrantFiled: August 21, 2008Date of Patent: April 1, 2014Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Jean-Luc Collet, Gerard Marmigere, Christophe Mialon
-
Publication number: 20130230167Abstract: A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first encrypted step certificate is extracted. A second hashing result is obtained from hashing the object to be authenticated. A third hashing result of an object identifier encoded within a decrypted second encrypted step certificate is extracted. A fourth hashing result is obtained from hashing the object to be authenticated. It is determining that the first hashing result is equal to the second hashing result and that the third hashing result is equal to the fourth hashing result, from which it is ascertained the object status of the object is that the object is an authentic object, a counterfeited object, or a stolen object. The ascertained object status is displayed on a screen of an authenticity verification equipment.Type: ApplicationFiled: April 2, 2013Publication date: September 5, 2013Applicant: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Publication number: 20130230166Abstract: A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity about an object. The request includes a media identifier, a media key block, an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted using a random key. The encrypted step certificate and an encrypted random key are sent to the requester entity for subsequent writing the step certificate and the encrypted random key on a media.Type: ApplicationFiled: April 2, 2013Publication date: September 5, 2013Applicant: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 8447038Abstract: A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object.Type: GrantFiled: February 14, 2007Date of Patent: May 21, 2013Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 7933414Abstract: Data encrypted with a scrambling key Ks are transmitted from a service provider via a master device to a plurality of client devices having unique identifiers, administered by the master device. A set of partial keys comprising a respective partial key for each respective one of the plurality of clients is calculated at the service provider, by applying a predetermined function to the unique identifiers of all clients but for the identifier of the respective one of the plurality of clients. This set of partial keys is transmitted to the master device, which transmits to each respective clients the respective partial key calculated therefore. Each client can then derive the scrambling key from the respective partial key received from the master device by reference to its own unique identifier, and use the result to decrypt the data.Type: GrantFiled: December 5, 2007Date of Patent: April 26, 2011Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Francois-Xavier Drouet, Gerard Marmigere, Christophe Mialon
-
Publication number: 20090169019Abstract: A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object.Type: ApplicationFiled: February 14, 2007Publication date: July 2, 2009Inventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Publication number: 20090052671Abstract: The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit.Type: ApplicationFiled: August 21, 2008Publication date: February 26, 2009Inventors: Frederic Bauchot, Jean-Luc Collet, Gerard Marmigere, Christophe Mialon
-
Publication number: 20090052672Abstract: The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with an identifier and with a media Key block MKB. The media center includes: a unique identifier identifying the media center MC_UID, a set of device keys DK; storage means for storing files identified by respective file identifiers; and a processing unit comprising file encryption means for encrypting each file before storage in the storage means, using a title key (Kt) computed from the identifier MC_UID of the media center and for encrypting the title key Kt from the set of device keys DK of the media center, and from the identifier and the media key block MKB of the mobile secure and protection keyring, the media center being further provided to write the encrypted title key (eKt) in association with the file identifier of the file to the mobile secure and protection keyring.Type: ApplicationFiled: August 21, 2008Publication date: February 26, 2009Inventors: Frederic Bauchot, Jean-Luc Collet, Gerard Marmigere, Christophe Mialon
-
Publication number: 20080152149Abstract: Data encrypted with a scrambling key Ks are transmitted from a service provider via a master device to a plurality of client devices having unique identifiers, administered by the master device. A set of partial keys comprising a respective partial key for each respective one of the plurality of clients is calculated at the service provider, by applying a predetermined function to the unique identifiers of all clients but for the identifier of the respective one of the plurality of clients. This set of partial keys is transmitted to the master device, which transmits to each respective clients the respective partial key calculated therefore. Each client can then derive the scrambling key from the respective partial key received from the master device by reference to its own unique identifier, and use the result to decrypt the data.Type: ApplicationFiled: December 5, 2007Publication date: June 26, 2008Inventors: Frederic Bauchot, Francois-Xavier Drouet, Gerard Marmigere, Christophe Mialon