Patents by Inventor Corinne Le Buhan

Corinne Le Buhan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080219643
    Abstract: The present invention aims at solving the financial revenue loss due to the presence of digital video recorders that allow skipping the commercial breaks.
    Type: Application
    Filed: March 6, 2008
    Publication date: September 11, 2008
    Applicant: NAGRAVISION S.A.
    Inventors: Corinne Le Buhan, Holger Ippach, Laura Fullton, Ivan Verbesselt
  • Publication number: 20080022299
    Abstract: The aim of the present invention is to allow the flexible exploitation of a broadcasted and recorded content, in particular to allow both users as well as broadcasters to conciliate temporary prohibition and posterior exploitation. This aim is achieved by a storage method of a broadcasted event, by at least one receiver, this method comprising the following steps: storage of an event encrypted by at least one content key storage of a control licence comprising the content key, an event identifier and the first usage conditions, after the diffusion of the event has finished, generation and storage of a release message, comprising the event identifier and the second usage conditions, during the exploitation of the event, search for a release message, and if such message exists, execution of the second usage conditions of the release message in place of the first usage conditions of the control licence.
    Type: Application
    Filed: July 20, 2007
    Publication date: January 24, 2008
    Inventor: Corinne Le Buhan
  • Publication number: 20070201477
    Abstract: Even if high speed are available between the router and the multimedia unit through the IP line (up to 24 Mbits/sec), this is still the bottleneck in term of data transfer. Indeed in practice the vast majority of IP users have access speed between 2 to 5 Mbits/sec and the development of other services (telephony, videoconference, push VOD, game) are bandwidth consuming. It is now an object of the invention to propose a solution to reduce the data flow between the router and the multimedia unit over IP line.
    Type: Application
    Filed: February 12, 2007
    Publication date: August 30, 2007
    Inventors: Holger Ippach, Corinne Le Buhan, Marc Uldry
  • Publication number: 20070061875
    Abstract: The aim of this invention is to propose different distribution and management methods of the revocation lists associated to anti-copying protection standards, in order to facilitate processing in a television broadcast environment by guaranteeing security against the piracy of the receiver equipment and of the equipment connected to this television broadcast receiver at the core of a home network. This aim is achieved by a verification method of a target device connected to a master device, the latter having means to receive a content transmitted by a diffusion centre via a data stream, the master device and the target device authenticating themselves by the exchange of a certificate comprising at least one certificate identifier, this method comprising the following steps: a. transmission by broadcast of at least one target device verification table containing a certificate identifier list, b. storage of this list in the master device, c.
    Type: Application
    Filed: March 13, 2006
    Publication date: March 15, 2007
    Inventors: Corinne Le Buhan, Yishan Zhao
  • Publication number: 20060107045
    Abstract: The aim of this invention is to propose a control method for the conformity of a network key (NK). This method is applied during the transfer of data coming from a conditional access source to a domestic network. It handles on the verification of the network key (NK) authenticity using relevant control data provided by the verification center in general in form of a list {(TK)NK1, (TK)NK2, (TK)NK3 . . . }. A verification of the presence or absence of a cryptogram (TK)NK is carried out according to the list {(TK)NK1, (TK)NK2, (TK)NK3 . . . }. The cryptogram (TK)NK is constituted from a test key (TK), provided by the verification center, encrypted by a network key (NK) of a security module (CT) of a device (TV1, TV2, PC) connected to the network.
    Type: Application
    Filed: August 14, 2003
    Publication date: May 18, 2006
    Inventors: Corinne Le Buhan, Rached Ksontini
  • Publication number: 20030177365
    Abstract: The objective of the present invention is to propose a storage method in a decoder of an event encrypted by control words that guarantees the access to this event at whichever moment, even if certain keys of the system have changed for security reasons.
    Type: Application
    Filed: November 1, 2002
    Publication date: September 18, 2003
    Inventors: Corinne Le Buhan, Marco Sasselli, Patrick Bertholet