Patents by Inventor Fabien Gremaud
Fabien Gremaud has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9942212Abstract: The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This method comprises the steps of generating, by the security module, a plurality of initial keys from an initial keys generation function, and of transmitting said plurality of initial keys to said corresponding host. For each initial key received by the host, the method comprises a step of generating a plurality of encryption keys by an extension module of said host, by using an extension function. The method further comprises the steps of receiving the data to be processed by said host and of combining said data to be processed with said encryption keys, in a combination module of said host. The invention further concerns a communication device and a communication system allowing for the implementation of this method, as well as a method allowing the secure exchange of data between two communication devices.Type: GrantFiled: December 10, 2015Date of Patent: April 10, 2018Assignee: Nagravision S.A.Inventor: Fabien Gremaud
-
Publication number: 20160182478Abstract: The present invention relates to a method for processing data in a communication device comprising a host and a security module associated with this host. This method comprises the steps of generating, by the security module, a plurality of initial keys from an initial keys generation function, and of transmitting said plurality of initial keys to said corresponding host. For each initial key received by the host, the method comprises a step of generating a plurality of encryption keys by an extension module of said host, by using an extension function. The method further comprises the steps of receiving the data to be processed by said host and of combining said data to be processed with said encryption keys, in a combination module of said host. The invention further concerns a communication device and a communication system allowing for the implementation of this method, as well as a method allowing the secure exchange of data between two communication devices.Type: ApplicationFiled: December 10, 2015Publication date: June 23, 2016Inventor: Fabien GREMAUD
-
Patent number: 9191621Abstract: A television event may be consumed after been stored in a mass memory of a multimedia unit, but still fully relies on the security of a secure device. A conversion of a received content aims at firstly descrambling the content using control words included in entitlement control messages and immediately re-encrypting the descrambled content by a unique key generated specifically for this content. Access conditions attached to the entitlement control message containing the control word are temporarily stored and once the decryption is terminated, the secure device produces an information block. This information block containing for example access conditions and an identifier of the content is either stored into a secure memory of the secure device or stored in the mass memory with the encrypted content. The unique key is made up of a combination of a root key specific to the secure device and the information block.Type: GrantFiled: December 1, 2011Date of Patent: November 17, 2015Assignee: NAGRAVISION S.A.Inventors: Fabien Gremaud, Nicolas Fischer
-
Patent number: 8954696Abstract: The present invention describes a system and a method for securely loading digital information from an external storage device in a non-trusted environment into a memory module in a trusted environment within a data processing system. A master mode and a service mode are described, the master mode being when the secure loading is requested by a secure processor residing within the trusted environment and the service mode being when the loading is requested by an element which is external to the trusted environment i.e. in the non-trusted environment. The system comprises at least one storage device, one memory module and at least one first processor, and further comprises a memory access controller module connected between the processor and the memory module, and a secure memory management module connected to the processor, the memory module, the storage device and the memory access controller.Type: GrantFiled: June 13, 2013Date of Patent: February 10, 2015Assignee: Nagravision S.A.Inventors: Fabien Gremaud, Christophe Gogniat, Marc Bellocchio, Pascal Fuchs
-
Patent number: 8819434Abstract: A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message encapsulates a second part including another control message. The processing unit for carrying out the method comprises a first conditional access device connected to a second conditional access device provided with a descrambler and a secured processor or secured hardware logic. The control message and the second part are each encrypted and accompanied by respectively first and second authentication data. The first conditional access device decrypts and verifies integrity of the control message, verifies the first access conditions and transmits the second part to the second access control device. The second conditional access device decrypts and verifies integrity of the second part and further verifies the second access conditions, and releases and loads the control word into the descrambler.Type: GrantFiled: December 17, 2010Date of Patent: August 26, 2014Assignee: Nagravision S.A.Inventors: Fabien Gremaud, Olivier Brique
-
Patent number: 8782417Abstract: A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message includes a first part including first access conditions and a second part structured as a control message including at least second access conditions and a control word. A first conditional access device is configured for decrypting the control message with a common key specific to units having a first conditional access device and verifying the authenticity of said message. When the verification succeeds, the second part and a second right is transmitted to a second conditional access device, which decrypts the second part with a common key specific to units having a second conditional access device and verifies the authenticity of said second part and the second access conditions in relation to the second right encrypted by a personal key embedded therein.Type: GrantFiled: June 15, 2012Date of Patent: July 15, 2014Assignee: Nagravision S.A.Inventors: Fabien Gremaud, Olivier Brique
-
Publication number: 20130279694Abstract: A television event may be consumed after been stored in a mass memory of a multimedia unit, but still fully relies on the security of a secure device. A conversion of a received content aims at firstly descrambling the content using control words included in entitlement control messages and immediately re-encrypting the descrambled content by a unique key generated specifically for this content. Access conditions attached to the entitlement control message containing the control word are temporarily stored and once the decryption is terminated, the secure device produces an information block. This information block containing for example access conditions and an identifier of the content is either stored into a secure memory of the secure device or stored in the mass memory with the encrypted content. The unique key is made up of a combination of a root key specific to the secure device and the information block.Type: ApplicationFiled: December 1, 2011Publication date: October 24, 2013Applicant: NAGRAVISION S.A.Inventors: Fabien Gremaud, Nicolas Fischer
-
Publication number: 20130276149Abstract: The present invention describes a system and a method for securely loading digital information from an external storage device in a non-trusted environment into a memory module in a trusted environment within a data processing system. A master mode and a service mode are described, the master mode being when the secure loading is requested by a secure processor residing within the trusted environment and the service mode being when the loading is requested by an element which is external to the trusted environment i.e. in the non-trusted environment. The system comprises at least one storage device, one memory module and at least one first processor, and further comprises a memory access controller module connected between the processor and the memory module, and a secure memory management module connected to the processor, the memory module, the storage device and the memory access controller.Type: ApplicationFiled: June 13, 2013Publication date: October 17, 2013Inventors: FABIEN GREMAUD, CHRISTOPHE GOGNIAT, MARC BELLOCCHIO, PASCAL FUCHS
-
Patent number: 8549655Abstract: Unit for secure processing access controlled audio/video data capable of receiving control messages (ECM) comprising at least one first control word (CW1) and first right execution parameters (C1), at least one second control word (CW2) and second right execution parameters (C2), said processing unit being connected to a first access control device (CA1), said processing unit is characterized in that it comprises: —means for verifying and applying the first right execution parameters (C1) in relation to the contents of a memory (M1) of said first access control device (CA1) and means for obtaining the first control word CW1, —a second access control device (CA2) integrated into the processing unit UT including means for verifying and applying the second right execution parameters (C2) in relation to the contents of a memory (M2) associated to said second access control device (CA2) and means for obtaining the second control word (CW2), —a deciphering module (MD) capable of deciphering, sequentially with the fType: GrantFiled: May 28, 2009Date of Patent: October 1, 2013Assignee: Nagravision S.A.Inventors: Fabien Gremaud, Joel Wenger
-
Patent number: 8489836Abstract: The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing system, said data processing system comprising at least one storage device, one memory module and at least one processor, said data processing system further comprising a memory access controller module connected between the processor and the memory module, and a secure memory management module connected to the processor, the memory module, the storage device and the memory access controller. Requests by the processor for data are passed to the secure memory management module, which loads the data from the storage device to the memory module and configures the memory access controller such that the processor will have access to the data.Type: GrantFiled: June 23, 2009Date of Patent: July 16, 2013Assignee: Nagravision SAInventors: Fabien Gremaud, Christophe Gogniat, Marc Bellocchio, Pascal Fuchs
-
Patent number: 8484435Abstract: A method for updating, in the background, data stored in physical memories without affecting the current operations performed by the microprocessor. When the update is completely terminated, the application switches from an old version to a new version. This switching occurs by a reconfiguration of the page table during which a first sub-tree structure of pointers accessing the old version of data stored in memories is replaced by a second sub-tree structure of pointers thus allowing access to the new version of data. This update method prevents incoherent transitory states of the system as the latter works with the previous data version until the installation of the new version becomes usable. In the case of an interruption to the update process, the application can always reinitialize the update since the old version of data can be reactivated by returning to the previous configuration of the page table.Type: GrantFiled: July 23, 2009Date of Patent: July 9, 2013Assignee: Nagravision S.A.Inventors: Fabien Gremaud, Henri Kudelski
-
Patent number: 8347114Abstract: A system and a method are disclosed for enforcing a predetermined mapping of addresses in a physical address space to addresses in a virtual address space in a data processing system including a processor in the virtual address space and a memory in a physical address space. During the compilation and linking of an application to be run on the data processing system, in at least one embodiment, the mapping table is generated linking the virtual addresses to physical addresses. This mapping table is kept secret. A second mapping table is generated using a cryptographic function of the physical address with the virtual address as a key to link virtual addresses to intermediate addresses. The second mapping table is loaded into the memory management unit. The data processing system further includes cryptographic hardware to convert the intermediate address to the physical address using the inverse of the cryptographic function which was used to calculate the intermediate address.Type: GrantFiled: July 27, 2009Date of Patent: January 1, 2013Assignee: Nagravision S.A.Inventors: Fabien Gremaud, Henri Kudelski
-
Publication number: 20120257749Abstract: A method for verifying access conditions performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message includes a first part including first access conditions and a second part structured as a control message including at least second access conditions and a control word. A first conditional access device is configured for decrypting the control message with a common key specific to units having a first conditional access device and verifying the authenticity of said message. When the verification succeeds, the second part and a second right is transmitted to a second conditional access device, which decrypts the second part with a common key specific to units having a second conditional access device and verifies the authenticity of said second part and the second access conditions in relation to the second right encrypted by a personal key embedded therein.Type: ApplicationFiled: June 15, 2012Publication date: October 11, 2012Applicant: Nagravision SAInventors: Fabien GREMAUD, Olivier Brique
-
Publication number: 20110154042Abstract: A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message encapsulates a second part including another control message. The processing unit for carrying out the method comprises a first conditional access device connected to a second conditional access device provided with a descrambler and a secured processor or secured hardware logic. The control message and the second part are each encrypted and accompanied by respectively first and second authentication data. The first conditional access device decrypts and verifies integrity of the control message, verifies the first access conditions and transmits the second part to the second access control device. The second conditional access device decrypts and verifies integrity of the second part and further verifies the second access conditions, and releases and loads the control word into the descrambler.Type: ApplicationFiled: December 17, 2010Publication date: June 23, 2011Applicant: NAGRAVISION SAInventors: Fabien GREMAUD, Olivier Brique
-
Publication number: 20110131389Abstract: A method for updating, in the background, data stored in physical memories without affecting the current operations performed by the microprocessor. When the update is completely terminated, the application switches from an old version to a new version. This switching occurs by a reconfiguration of the page table during which a first sub-tree structure of pointers accessing the old version of data stored in memories is replaced by a second sub-tree structure of pointers thus allowing access to the new version of data. This update method prevents incoherent transitory states of the system as the latter works with the previous data version until the installation of the new version becomes usable. In the case of an interruption to the update process, the application can always reinitialize the update since the old version of data can be reactivated by returning to the previous configuration of the page table.Type: ApplicationFiled: July 23, 2009Publication date: June 2, 2011Applicant: NAGRAVISION SAInventors: Fabien Gremaud, Henri Kudelski
-
Publication number: 20110099387Abstract: A system and a method are disclosed for enforcing a predetermined mapping of addresses in a physical address space to addresses in a virtual address space in a data processing system including a processor in the virtual address space and a memory in a physical address space. During the compilation and linking of an application to be run on the data processing system, in at least one embodiment, the mapping table is generated linking the virtual addresses to physical addresses. This mapping table is kept secret. A second mapping table is generated using a cryptographic function of the physical address with the virtual address as a key to link virtual addresses to intermediate addresses. The second mapping table is loaded into the memory management unit. The data processing system further includes cryptographic hardware to convert the intermediate address to the physical address using the inverse of the cryptographic function which was used to calculate the intermediate address.Type: ApplicationFiled: July 27, 2009Publication date: April 28, 2011Inventors: Fabien Gremaud, Henri Kudelski
-
Publication number: 20110075843Abstract: Unit for secure processing access controlled audio/video data capable of receiving control messages(ECM) comprising at least one first control word (CW1) and first right execution parameters (C1), at least one second control word (CW2) and second right execution parameters (C2), said processing unit being connected to a first access control device (CA1), said processing unit is characterized in that it comprises: —means for verifying and applying the first right execution parameters (C1) in relation to the contents of a memory (M1) of said first access control device (CA1) and means for obtaining the first control word CW1, —a second access control device (CA2) integrated into the processing unit UT including means for verifying and applying the second right execution parameters (C2) in relation to the contents of a memory (M2) associated to said second access control device (CA2) and means for obtaining the second control word (CW2), —a deciphering module (MD) capable of deciphering, sequentially with the fiType: ApplicationFiled: May 28, 2009Publication date: March 31, 2011Applicant: NAGRAVISION S.A.Inventors: Fabien Gremaud, Joel Wenger
-
Patent number: 7697686Abstract: Example embodiments are directed to a digital audio/video (AV) data processing unit and a method of controlling access to the digital AV data. The processing unit of AV digital data includes a deciphering unit of the AV data, a decompression unit, an input/output interface of the processed AV data and communication device towards a security module. The deciphering and decompression units respectively include an encryption unit and a decryption unit, each having at least one personal key and a common encryption key. Deciphering the AV data using the control words and re-encrypting the deciphered AV data occurs only after a successful verification of the control word and the common key. After temporary storage, the re-encrypted AV data cannot be decrypted by the decryption unit unless the common key has been positively verified by the security module by way of a random number generated by the decryption unit.Type: GrantFiled: November 22, 2005Date of Patent: April 13, 2010Assignee: Nagravision S.A.Inventors: Jean-Michel Puiatti, André Nicoulin, Nicolas Fischer, Guy Moreillon, Fabien Gremaud, Michael John Hill
-
Publication number: 20090319741Abstract: The present invention describes a system and a method for securely loading digital information from a storage device into a memory module in a data processing system, said data processing system comprising at least one storage device, one memory module and at least one processor, said data processing system further comprising a memory access controller module connected between the processor and the memory module, and a secure memory management module connected to the processor, the memory module, the storage device and the memory access controller. Requests by the processor for data are passed to the secure memory management module, which loads the data from the storage device to the memory module and configures the memory access controller such that the processor will have access to the data.Type: ApplicationFiled: June 23, 2009Publication date: December 24, 2009Applicant: Nagravision SAInventors: Fabien Gremaud, Christophe Gogniat, Marc Bellocchio, Pascal Fuchs
-
Publication number: 20060109982Abstract: A digital audio/video data processing unit and an access control method to this data are disclosed. The processing unit of audio/video digital data encrypted with control-words coming from control messages includes a deciphering unit of the audio/video data, a decompression unit, an input/output interface of the processed audio/video data and communication device towards a security module. The deciphering and decompression units include respectively an encryption unit and a decryption unit each having at least one personal key and a common encryption key. It includes a secured transmission device of the common key and of the control word extracted from a control message between the security module, the deciphering unit and the encryption unit using the personal key of the encryption unit.Type: ApplicationFiled: November 22, 2005Publication date: May 25, 2006Inventors: Jean-Michel Puiatti, Andre Nicoulin, Nicolas Fischer, Guy Moreillon, Fabien Gremaud, Michael Hill