Patents by Inventor Ettore Benedetti
Ettore Benedetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9866381Abstract: Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system.Type: GrantFiled: January 12, 2015Date of Patent: January 9, 2018Assignee: IRDETO B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Patent number: 9678898Abstract: There is described a chip comprising a one-time programmable (OTP) memory programmable to store chip configuration data, and a verification module operable to access the OTP memory. The verification module is operable to receive a verification request relating to a specified portion of the OTP memory, the verification request comprising mask data defining the specified portion of the OTP memory. In response to the verification request, the verification module is operable to use the mask data and the OTP memory to generate verification data relating to the specified portion of the OTP memory, the verification data further being generated based on a secret key of the chip. There is also described a chip-implemented method of generating verification data relating to a specified portion of a one-time programmable (OTP) memory of the chip. There are also described methods for primary or secondary verification systems to verify a configuration of a specified portion of the OTP memory the above mentioned-chip.Type: GrantFiled: October 11, 2012Date of Patent: June 13, 2017Assignee: IRDETO B.V.Inventor: Ettore Benedetti
-
Patent number: 9455834Abstract: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds.Type: GrantFiled: April 9, 2014Date of Patent: September 27, 2016Assignee: Irdeto B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Publication number: 20150261692Abstract: There is described a chip comprising a one-time programmable (OTP) memory programmable to store chip configuration data, and a verification module operable to access the OTP memory. The verification module is operable to receive a verification request relating to a specified portion of the OTP memory, the verification request comprising mask data defining the specified portion of the OTP memory. In response to the verification request, the verification module is operable to use the mask data and the OTP memory to generate verification data relating to the specified portion of the OTP memory, the verification data further being generated based on a secret key of the chip. There is also described a chip-implemented method of generating verification data relating to a specified portion of a one-time programmable (OTP) memory of the chip. There are also described methods for primary or secondary verification systems to verify a configuration of a specified portion of the OTP memory the above mentioned-chip.Type: ApplicationFiled: October 11, 2012Publication date: September 17, 2015Inventor: Ettore Benedetti
-
Patent number: 9106795Abstract: The invention provides a receiver, a smartcard and a conditional access system for securely obtaining a control word using an entitlement transform tree, wherein intermediate results are cached to improve computational efficiency.Type: GrantFiled: December 29, 2010Date of Patent: August 11, 2015Assignee: Irdeto B.V.Inventors: Ettore Benedetti, Arnoud Evert Van Foreest
-
Publication number: 20150124964Abstract: Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system.Type: ApplicationFiled: January 12, 2015Publication date: May 7, 2015Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Patent number: 8958558Abstract: Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system.Type: GrantFiled: March 1, 2010Date of Patent: February 17, 2015Assignee: Irdeto B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Publication number: 20140362987Abstract: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds.Type: ApplicationFiled: April 9, 2014Publication date: December 11, 2014Applicant: IRDETO B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Patent number: 8737620Abstract: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds.Type: GrantFiled: February 26, 2010Date of Patent: May 27, 2014Assignee: Irdeto B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Publication number: 20140016776Abstract: Methods and systems related to producing chips with the uniqueness property are disclosed. A random bit vector is generated using a hardware random number generator on the chip or “on the fly” as a hardware component is being produced. The generated random bit vector is stored in a one-time programmable memory of the chip. A value is derived in the chip from the random bit vector programmed in the one-time programmable memory of the chip. The derived value is exported to an external receiving module communicably connected to the chip to enable a security application provider to encrypt a message that is decryptable by the chip using a key based on the random bit vector programmed in the one-time programmable memory of the chip.Type: ApplicationFiled: March 7, 2012Publication date: January 16, 2014Inventors: Arnoud Evert Van Foreest, Ettore Benedetti, Gerard Johan Dekker, Sheng Bo Xu
-
Publication number: 20130311993Abstract: The invention enables the generation of an obfuscated bytecode for execution in an adaptive VM execution environment. A VM compiler compiles a high level code to obtain the bytecode 15b and applies a V-ISA definition to generate an optimized instruction combining two or more individual instructions in the bytecode. The VM execution environment is adapted to interpret and execute the optimized instruction.Type: ApplicationFiled: January 26, 2012Publication date: November 21, 2013Inventors: Ettore Benedetti, Arnoud Evert Van Foreest
-
Publication number: 20110268271Abstract: The invention provides a receiver, a smartcard and a conditional access system for securely obtaining a control word using an entitlement transform tree, wherein intermediate results are cached to improve computational efficiency.Type: ApplicationFiled: December 29, 2010Publication date: November 3, 2011Applicant: Irdeto B.V.Inventors: Ettore Benedetti, Arnoud Evert Van Foreest
-
Publication number: 20100246822Abstract: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space using a mathematical transformation under control of one or more seeds. The seeds are provided to the receiver by the sender. The sender conditionally allows the receiver to obtain the secret data by controlling the seeds.Type: ApplicationFiled: February 26, 2010Publication date: September 30, 2010Applicant: Irdeto Access B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs
-
Publication number: 20100251285Abstract: Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an entitlement message. After decryption or transformation, the subkeys are combined to obtain the control word. Typically at least one of the entitlement messages is a positive entitlement message and at least one of the entitlement messages is a negative entitlement message. Embodiments of the invention can be used in a conditional access system such as a Pay-TV system.Type: ApplicationFiled: March 1, 2010Publication date: September 30, 2010Applicant: Irdeto Access B.V.Inventors: Philip Allan Eisen, Ettore Benedetti, Arnoud Evert Van Foreest, Andrew Augustine Wajs