Patents by Inventor Peter Roelse
Peter Roelse has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10333702Abstract: A method of providing key information from a sender to one or more receivers, the method comprising: obtaining initial key information comprising a plurality of units that assume respective values; forming encoded key information from the initial key information, wherein the encoded key information comprises a plurality of encoded units that correspond to respective units of the initial key information, wherein said forming comprises, for each unit of the initial key information, selecting an encoding from a plurality of invertible encodings associated with said unit and encoding said value assumed by said unit with said selected encoding to form the corresponding encoded unit; and providing the encoded key information to said one or more receivers.Type: GrantFiled: March 20, 2012Date of Patent: June 25, 2019Assignee: IRDETO B.V.Inventors: Peter Roelse, Yoni De Mulder
-
Patent number: 9928350Abstract: There is disclosed a method of controlling use of encrypted content by a plurality of client terminals each provided with a digital rights management (DRM) client and a content decryption module separate to the DRM client. First key information is provided for use by one or more selected ones of the DRM clients, and second key information is provided for use by one or more selected ones of the content decryption modules. Content key information is encrypted to form encrypted content key information such that the selected ones of the content decryption modules are enabled by the second key information to recover the content key information from the encrypted content key information. The encrypted content key information is further encrypted to form super-encrypted content key information such that the selected ones of the DRM clients are enabled by the first key information to recover the encrypted content key information from the super-encrypted content key information.Type: GrantFiled: February 17, 2012Date of Patent: March 27, 2018Assignee: IRDETO B.V.Inventor: Peter Roelse
-
Patent number: 9402108Abstract: A method of obtaining descrambling information at a receiver, the descrambling information for enabling descrambling of scrambled content. A provider verification key is used to access a software image, which has been secured by a provider using a provider signature key corresponding to the provider verification key. A secured version of the descrambling information is received. The accessed software image is used to obtain virtual descrambling information from the secured version of the descrambling information and is provided as inputs to a cryptographic function to produce a given output comprising said descrambling information.Type: GrantFiled: June 21, 2012Date of Patent: July 26, 2016Assignee: Irdeto B.V.Inventor: Peter Roelse
-
Patent number: 9317668Abstract: A fingerprinting method. For each round in a series of rounds: providing to each receiver in a set of receivers a version of a source item of content, the source item of content corresponding to the round. For the round there is a corresponding part of a fingerprint-code for the receiver, the part includes one or more symbols. The version provided to the receiver represents those one or more symbols. One or more corresponding symbols are obtained from a suspect item as a corresponding part of a suspect-code. For each receiver in the set of receivers, a corresponding score that indicates a likelihood that the receiver is a colluding-receiver is updated.Type: GrantFiled: May 2, 2012Date of Patent: April 19, 2016Assignee: Irdeto B.V.Inventors: Peter Roelse, Jeroen Doumen, Thijs Laarhoven
-
Publication number: 20150163054Abstract: A method of providing key information from a sender to one or more receivers, the method comprising: obtaining initial key information comprising a plurality of units that assume respective values; forming encoded key information from the initial key information, wherein the encoded key information comprises a plurality of encoded units that correspond to respective units of the initial key information, wherein said forming comprises, for each unit of the initial key information, selecting an encoding from a plurality of invertible encodings associated with said unit and encoding said value assumed by said unit with said selected encoding to form the corresponding encoded unit; and providing the encoded key information to said one or more receivers.Type: ApplicationFiled: March 20, 2012Publication date: June 11, 2015Applicant: IRDETO B.V.Inventors: Peter Roelse, Yoni De Mulder
-
Publication number: 20150033026Abstract: A fingerprinting method. For each round in a series of rounds: providing to each receiver in a set of receivers a version of a source item of content, the source item of content corresponding to the round. For the round there is a corresponding part of a fingerprint-code for the receiver, the part includes one or more symbols. The version provided to the receiver represents those one or more symbols. One or more corresponding symbols are obtained from a suspect item as a corresponding part of a suspect-code. For each receiver in the set of receivers, a corresponding score that indicates a likelihood that the receiver is a colluding-receiver is updated.Type: ApplicationFiled: May 2, 2012Publication date: January 29, 2015Applicant: IRDETO B.V.Inventors: Peter Roelse, Jeroen Doumen, Thijs Laarhoven
-
Publication number: 20150026452Abstract: There is disclosed a method of controlling use of encrypted content by a plurality of client terminals each provided with a digital rights management (DRM) client and a content decryption module separate to the DRM client. First key information is provided for use by one or more selected ones of the DRM clients, and second key information is provided for use by one or more selected ones of the content decryption modules. Content key information is encrypted to form encrypted content key information such that the selected ones of the content decryption modules are enabled by the second key information to recover the content key information from the encrypted content key information. The encrypted content key information is further encrypted to form super-encrypted content key information such that the selected ones of the DRM clients are enabled by the first key information to recover the encrypted content key information from the super-encrypted content key information.Type: ApplicationFiled: February 17, 2012Publication date: January 22, 2015Applicant: IRDETO B.V.Inventor: Peter Roelse
-
Publication number: 20150010151Abstract: A method of obtaining descrambling information at a receiver, the descrambling information for enabling descrambling of scrambled content. A provider verification key is used to access a software image, which has been secured by a provider using a provider signature key corresponding to the provider verification key. A secured version of the descrambling information is received. The accessed software image is used to obtain virtual descrambling information from the secured version of the descrambling information and is provided as inputs to a cryptographic function to produce a given output comprising said descrambling information.Type: ApplicationFiled: June 21, 2012Publication date: January 8, 2015Inventor: Peter Roelse