Patents by Inventor Jérôme Perrine
Jérôme Perrine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10715557Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: GrantFiled: September 13, 2018Date of Patent: July 14, 2020Assignee: NAGRAVISION S.A.Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Patent number: 10356059Abstract: In an embodiment, a communication device receives a request to establish a media session with a remote endpoint. In response to receiving the request, the communication device exchanges media-session control data with the remote endpoint on behalf of a local endpoint to establish the requested media session between the local endpoint and the remote endpoint. The communication device is communicatively connected to the local endpoint via a Personal Area Network (PAN) communication link. The communication device relays media-session payload data between the local and remote endpoints. The media-session payload data (i) is associated with the media session and (ii) is encrypted based on at least one payload-data cryptographic key that is not accessible to the communication device.Type: GrantFiled: June 4, 2015Date of Patent: July 16, 2019Assignee: NAGRAVISION S.A.Inventors: Jerome Perrine, Bernard Benoit, Maurice Van Riek, Osen Karl
-
Publication number: 20190187994Abstract: A method of monitoring execution in an execution environment of an operation, for example a cryptographic operation, comprising a sequence of instructions, is disclosed. Instructions sent in the sequence from a main processor to one or more auxiliary processors, for example cryptographic processors, to execute the operation are monitored and the sequence of instructions is verified using verification information. The method comprises enabling output from the execution environment of a result of the operation in response to a successful verification of the sequence, or generating a verification failure signal in response to a failed verification of the sequence.Type: ApplicationFiled: August 2, 2017Publication date: June 20, 2019Inventors: Marco MACCHETTI, Nicolas FISCHER, Jerome PERRINE
-
Patent number: 10237730Abstract: Disclosed herein are methods and systems for encrypting communications using a secure element. An embodiment takes the form of a method including the steps of performing a key-exchange procedure with an endpoint via a voice-communication device to obtain a symmetric seed key for a secure voice session with the endpoint; generating first and second symmetric session keys for the secure voice session based on the obtained symmetric seed key; receiving outbound voice packets from the voice-communication device in connection with the secure voice session, each outbound voice packet including a header and an unencrypted payload; using a first symmetric encryption algorithm and the first symmetric session key, followed by a second symmetric encryption algorithm and the second symmetric session key to generate and output twice-encrypted outbound-voice-packet payloads to the voice-communication device for transmission to the endpoint in connection with the secure voice session.Type: GrantFiled: May 10, 2016Date of Patent: March 19, 2019Assignee: NAGRAVISION S.A.Inventors: Bernard Benoit, Jean-Claude Fournier, Jerome Perrine, Laurent Gauteron
-
Publication number: 20190050605Abstract: A method of programming a device comprising acquiring configuration data, loading the configuration data onto a programmable device, processing at least a portion of the configuration data through a one way function to form processed configuration data, and configuring at least one configurable module of the programmable device using the processed configuration data from the processing step.Type: ApplicationFiled: April 7, 2017Publication date: February 14, 2019Applicant: NAGRAVISION S.A.Inventors: Andre KUDELSKI, Nicolas FISCHER, Jerome PERRINE
-
Publication number: 20190028518Abstract: System and method for establishing secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: ApplicationFiled: September 13, 2018Publication date: January 24, 2019Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Patent number: 10122767Abstract: System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: GrantFiled: May 29, 2015Date of Patent: November 6, 2018Assignee: NAGRAVISION S.A.Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Patent number: 10075770Abstract: Method for securing control words within a decoder in charge of descrambling digital content protected by these control words, comprising the following steps: for each descrambling unit of this decoder, loading in a directory a pairing key referenced by an identifier associating said key to a descrambling unit; receiving at least one encrypted control word referenced by an indication allowing to identify the descrambling unit for which it is intended; decrypting the control word by using a first key shared with a security module; identifying in the directory the pairing key whose identifier corresponds to the indication of destination associated to the control word; encrypting this control word by using this pairing key; and storing in a register the control word in a chronological and referenced way.Type: GrantFiled: July 4, 2014Date of Patent: September 11, 2018Assignee: Nagravision S.A.Inventors: Marco Macchetti, Jerome Perrine, Patrick Servet, Didier Hunacek
-
Publication number: 20180123807Abstract: A method for generating a value inherent to an electronic circuit by measuring a physical quantity carried out on components of the electronic circuit, comprising calculating and associating to each component at least one value derived from a series of measurements carried out on said component, the calculating of the at least one value comprising: determining a statistical value from said series of measurements, defining said value derived from the series of measures as being said statistical value or an uncertainty range calculated from said statistical value, forming a collection of invariable pairs of components, selecting, in said collection, pairs so that said values associated to the components of each one of these pairs are spaced from each other by at least a setpoint value, generating said value inherent to the electronic circuit by concatenating the results of comparisons based on at least one of the values associated to the components of each selected pair, and data among which at least one is derType: ApplicationFiled: May 26, 2016Publication date: May 3, 2018Applicant: NAGRAVISION S.A.Inventors: Marco MACCHETTI, Roan HAUTIER, Claudio FAVI, Jerome PERRINE
-
Publication number: 20170238172Abstract: Disclosed herein are methods and systems for encrypting communications using a secure element. An embodiment takes the form of a method including the steps of performing a key-exchange procedure with an endpoint via a voice-communication device to obtain a symmetric seed key for a secure voice session with the endpoint; generating first and second symmetric session keys for the secure voice session based on the obtained symmetric seed key; receiving outbound voice packets from the voice-communication device in connection with the secure voice session, each outbound voice packet including a header and an unencrypted payload; using a first symmetric encryption algorithm and the first symmetric session key, followed by a second symmetric encryption algorithm and the second symmetric session key to generate and output twice-encrypted outbound-voice-packet payloads to the voice-communication device for transmission to the endpoint in connection with the secure voice session.Type: ApplicationFiled: May 10, 2016Publication date: August 17, 2017Inventors: Bernard Benoit, Jean-Claude Fournier, Jerome Perrine, Laurent Gauteron
-
Patent number: 9729322Abstract: Method and system for personalizing a chip, intended to be integrated into a smart card, comprising a tester associated to an FPGA device connected to the chip, the chip being part of a wafer comprising a plurality of chips and a disposable hardware module for verifying presence of the chip on the wafer. The tester sends a first secret code to the FPGA device, which commands the chip to initiate a test mode activation. The FPGA device encrypts a second secret code by using a secret encryption algorithm parameterized with a random number received from the chip and the first secret code to obtain a first cryptogram which is sent to the chip. The chip determines a second cryptogram by carrying out a Boolean function over a result obtained by decryption of the first cryptogram using the inverse algorithm parameterized with the random number and the first secret code.Type: GrantFiled: April 7, 2016Date of Patent: August 8, 2017Assignee: NAGRAVISION S.A.Inventors: Roan Hautier, Marco Macchetti, Jerome Perrine
-
Patent number: 9647997Abstract: Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The secure processor may connect to the device via a standard connection, such as via a USB 3.0 connector.Type: GrantFiled: January 29, 2015Date of Patent: May 9, 2017Assignee: NagraStar, LLCInventors: Jerome Perrine, Hervé Goupil, Maurice Gerard van Riek, William Michael Beals, Nicolas Fischer, Benjamin Brian Ellis, Gregory Duval
-
Publication number: 20160359814Abstract: In an embodiment, a communication device receives a request to establish a media session with a remote endpoint. In response to receiving the request, the communication device exchanges media-session control data with the remote endpoint on behalf of a local endpoint to establish the requested media session between the local endpoint and the remote endpoint. The communication device is communicatively connected to the local endpoint via a Personal Area Network (PAN) communication link. The communication device relays media-session payload data between the local and remote endpoints. The media-session payload data (i) is associated with the media session and (ii) is encrypted based on at least one payload-data cryptographic key that is not accessible to the communication device.Type: ApplicationFiled: June 4, 2015Publication date: December 8, 2016Inventors: Jerome Perrine, Bernard Benoit, Maurice Van Riek, Osen Karl
-
Publication number: 20160352708Abstract: System and method for establish secure conference calls. In one example system, a central conference call server establishes point-to-point connections with accessory devices comprising a secure element and connected to corresponding participant devices. The conference call server includes an interface to a plurality of secure elements configured to perform scrambling and unscrambling of media signals communicated to and from the accessory devices. In another example, one of the participant devices operates as the central conference call server. In other examples, participant devices communicate on a conference call via point-to-point connections between all accessory devices connected to the participant devices. The accessory devices include secure elements for decryption and encryption of media signals communicated between the accessory devices.Type: ApplicationFiled: May 29, 2015Publication date: December 1, 2016Inventors: Francois Fer, Marco Macchetti, Laurent Gauteron, Jerome Perrine
-
Publication number: 20160226662Abstract: Method and system for personalizing a chip, intended to be integrated into a smart card, comprising a tester associated to an FPGA device connected to the chip, the chip being part of a wafer comprising a plurality of chips and a disposable hardware module for verifying presence of the chip on the wafer. The tester sends a first secret code to the FPGA device, which commands the chip to initiate a test mode activation. The FPGA device encrypts a second secret code by using a secret encryption algorithm parameterized with a random number received from the chip and the first secret code to obtain a first cryptogram which is sent to the chip. The chip determines a second cryptogram by carrying out a Boolean function over a result obtained by decryption of the first cryptogram using the inverse algorithm parameterized with the random number and the first secret code.Type: ApplicationFiled: April 7, 2016Publication date: August 4, 2016Inventors: Roan HAUTIER, Marco MACCHETTI, Jerome PERRINE
-
Publication number: 20160173946Abstract: Method for securing control words within a decoder in charge of descrambling digital content protected by these control words, comprising the following steps: for each descrambling unit of this decoder, loading in a directory a pairing key referenced by an identifier associating said key to a descrambling unit; receiving at least one encrypted control word referenced by an indication allowing to identify the descrambling unit for which it is intended; decrypting the control word by using a first key shared with a security module; identifying in the directory the pairing key whose identifier corresponds to the indication of destination associated to the control word; encrypting this control word by using this pairing key; and storing in a register the control word in a chronological and referenced way.Type: ApplicationFiled: July 4, 2014Publication date: June 16, 2016Applicant: Nagravision S.A.Inventors: Marco MACCHETTI, Jerome PERRINE, Patrick SERVET, Didier HUNACEK HUNACEK
-
Patent number: 9338004Abstract: Method and system for personalizing a chip, intended to be integrated into a smart card, comprising a tester associated to an FPGA device connected to the chip, the chip being part of a wafer comprising a plurality of chips and a disposable hardware module for verifying presence of the chip on the wafer. The tester sends a first secret code to the FPGA device, which commands the chip to initiate a test mode activation. The FPGA device encrypts a second secret code by using a secret encryption algorithm parameterized with a random number received from the chip and the first secret code to obtain a first cryptogram which is sent to the chip. The chip determines a second cryptogram by carrying out a Boolean function over a result obtained by decryption of the first cryptogram using the inverse algorithm parameterized with the random number and the first secret code.Type: GrantFiled: October 8, 2013Date of Patent: May 10, 2016Assignee: NAGRAVISION S.A.Inventors: Roan Hautier, Marco Macchetti, Jerome Perrine
-
Publication number: 20150370751Abstract: An embodiment of the present invention relates to physical interfaces, especially those used on consumer electronics devices. A processor, in which an embodiment of the disclosed invention is deployed, includes a physical interface for connecting to and communicating with a peripheral device, the peripheral device being configured to operate according to a standard communications protocol or to a different protocol which is adapted to have a more bandwidth-efficient performance. The processor detects which of the two protocols the attached peripheral device uses and configures the physical interface to operate according to the detected protocol. An embodiment of the invention allows for new, bandwidth-efficient communications protocols to be executed across existing standardized physical interface hardware, thereby allowing for easier acceptance of the new protocols within the consumer electronics industry.Type: ApplicationFiled: June 3, 2015Publication date: December 24, 2015Inventors: Jérôme PERRINE, Hervé GOUPIL, Maurice VAN RIEK
-
Publication number: 20150270962Abstract: Method and system for personalizing a chip, intended to be integrated into a smart card, comprising a tester associated to an FPGA device connected to the chip, the chip being part of a wafer comprising a plurality of chips and a disposable hardware module for verifying presence of the chip on the wafer. The tester sends a first secret code to the FPGA device, which commands the chip to initiate a test mode activation. The FPGA device encrypts a second secret code by using a secret encryption algorithm parameterized with a random number received from the chip and the first secret code to obtain a first cryptogram which is sent to the chip. The chip determines a second cryptogram by carrying out a Boolean function over a result obtained by decryption of the first cryptogram using the inverse algorithm parameterized with the random number and the first secret code.Type: ApplicationFiled: October 8, 2013Publication date: September 24, 2015Applicant: NAGRAVISION S.A.Inventors: Roan Hautier, Marco Macchetti, Jerome Perrine
-
Publication number: 20150143105Abstract: Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The secure processor may connect to the device via a standard connection, such as via a USB 3.0 connector.Type: ApplicationFiled: January 29, 2015Publication date: May 21, 2015Inventors: Jerome Perrine, Hervé Goupil, Maurice Gerard van Riek, William Michael Beals, Nicolas Fischer, Benjamin Brian Ellis, Gregory Duval