Patents by Inventor Sebastiaan Antonius Fransiscus Van Den Heuvel
Sebastiaan Antonius Fransiscus Van Den Heuvel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8863239Abstract: This invention relates to a system and a method of generating an Authorized Domain (AI)), the method comprising the steps of selecting a domain identifier (Domain ID) uniquely identifying the Authorized Domain, binding at least one user (P1, P2, . . . , PN1) to the domain identifier (Domain ID), and binding at least one device (D1, D2, . . . , DM) to at least one user (P1, P2, . . . , PN1), thereby obtaining a number of devices (D1, D2, . . . , DM) and a number of users (P1, P2, . . . , PN1) that is authorized to access a content item (C1, C2, CN2) of said Authorized Domain (100). Hereby, a number of verified devices (D1, D2, . . . , DM) and a number of verified persons (P1, P2, . . . , PN1) that is authorized to access a content item of said Authorized Domain (100) is obtained. Additionally, it is possible to enable automatic assignment of imported content being imported on a device belonging to the Authorized Domain (AD) since it now is given to which person a given authorized device belongs to.Type: GrantFiled: March 15, 2005Date of Patent: October 14, 2014Assignee: Adrea, LLCInventors: Petrus Johannes Lenoir, Franciscus Lucas Antonius Johannes Kamperman, Sebastiaan Antonius Fransiscus Van Den Heuvel, Robert Paul Koster
-
Publication number: 20080060081Abstract: This invention relates to a method and a device providing a content listing comprising a data structure (200) comprising a content listing (CDS) representing a number of media content items (100), where a media content item (100) is represented two times by a first (DRM id(s)) and a second (Dom.ID) representation if the media content item (100) belongs to a specific Digital Rights Management system (DRM) (300; 400) protecting the media content item (100). The first representation (DRM id(s)) comprises an identifier of the type of Digital Rights Management system (DRM) (300; 400) that protects the media content item (100), and the second representation (Dom.ID) comprises the first representation and additional information relating to the identification and/or a state of the specific Digital Rights Management system (DRM) (300; 400) that the media content item (100) belongs to.Type: ApplicationFiled: June 17, 2005Publication date: March 6, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventor: Sebastiaan Antonius Fransiscus Van Den Heuvel
-
Publication number: 20070220610Abstract: A digital rights management (DRM) system, device and method having an authorized domain (12) for managing digital media, wherein the authorized domain or entity such as a rights issuer utilizes user based content key encryption. In one aspect, the system includes plurality of interconnected devices (16) that comprise: a storage system for storing a user key (19) from a user belonging to the authorized domain; a system for downloading content (13) encrypted with a content key (32); a system for downloading a content key encrypted with the user key; a decryption system (28) for decrypting the encrypted content key with the user key; and a system (28) for decrypting the encrypted content with the decrypted content key.Type: ApplicationFiled: October 6, 2005Publication date: September 20, 2007Applicant: Koninklijke Philips Electronics, N.V.Inventors: Arno Van Loenen, Sebastiaan Antonius Fransiscus van den Heuvel, Zwart Sjoerd
-
Publication number: 20060285686Abstract: For conditional access purposes a stream is used in which at least two different decryption algorithms are needed for decryption of packets that encode different interspersed parts of the same signal for (quasi-)continuous rendering (such as an audio or video signal). Information is included in the stream to indicate dynamically which decryption algorithm should be used for which packets. In this way, it is possible for example to use a more robust algorithm with a less frequently changing key and a less robust algorithm with a more frequently changing key, interspersed with one another for the same signal. Also, different algorithms may be used for transcrypted and not transcrypted-packets of the same signal for example when an alternative is needed for the original encryption algorithm that was used for the non-transcrypted packets.Type: ApplicationFiled: December 1, 2003Publication date: December 21, 2006Applicant: Koninklijke Philips Electronics N.V.Inventors: Sebastiaan Antonius Fransiscus Van Den Heuvel, Petrus Lenoir, Albert Rijckaert
-
Publication number: 20060195885Abstract: A transmitter (110) which transmits a signal (120) for reception by a receiving device (130). The transmitter is arranged to insert into the signal an indication of a geographical region where the signal physically can be received. Preferably the geographical region is indicated in the signal using geometrical shapes. The receiving device receives one or more signals, each of the signals carrying an indication of a respective geographical region where the respective signal physically can be received, and is arranged to determine its locale from said indications. The receiver can compute the intersection of the sets of geometrical shapes carried in the various signals it received as the geographical region it is in. Based on its determined locale the receiver can restrict access to content, if such content is restricted to certain regions.Type: ApplicationFiled: March 4, 2003Publication date: August 31, 2006Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Petrus Lenoir, Sebastiaan Antonius Fransiscus Van Den Heuvel, Michael Epstein
-
Publication number: 20060080726Abstract: The present invention relates to a method, for a controller (103) for invoking actions on a device (105), of determining which actions are authorized to be invoked on said device (105). The controller (103) is adapted for invoking actions on the device (105) by sending an action command (A1, A2, A3, A4) to said device (105). Each of said predefined action commands (A1, A2, A3, A4) can be sent to invoke a specific action on the device (105). The method comprises the step of transmitting an checking-checking query (107, 109, 111, 113) to determine authorizations related to at least one of said actions that can be invoked on the device (105) by said action commands. The method further comprises the step of receiving an indication (115, 117, 119, 121) of authorizations related to the at least one of said actions being invoked on the device (105). Thereby a controller can know in advance, which actions are authorized to be invoked on the device.Type: ApplicationFiled: February 25, 2004Publication date: April 13, 2006Inventors: Maarten Bodlaender, Hugo Zonneveld, Sebastiaan Antonius Fransiscus Van Den Heuvel, Robert Koster
-
Publication number: 20060047952Abstract: This invention concerns a method, system, device, and signal for the protection of the integrity of TV anytime meta-data, and a signal carrying such protected information accordingly. Protection is obtained by applying a signature and certification approach. Optionally, an additional step of cannolization or a transform function is used. Data fragments can be labeled with a unique identifier so they can be referenced and separately signed individually or as a set by several different parties.Type: ApplicationFiled: October 17, 2003Publication date: March 2, 2006Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Sebastiaan Antonius Fransiscus Van Den Heuvel, Alexis Ashley
-
Publication number: 20050257260Abstract: In whilelist-based authentication, a first device (102) in a system (100) authenticates itself to a second device (103) using a group certificate identifying a range of non-revoked device identifiers, said range encompassing the device identifier of the first device (102). Preferably the device identifiers correspond to leaf nodes in a hierarchically ordered tree, and the group certificate identifies a node (202-207) in the tree representing a subtree in which the leaf nodes correspond to said range. The group certificate can also identify a further node (308, 310, 312) in the subtree which represents a sub-subtree in which the leaf nodes correspond to revoked device identifiers. Alternatively, the device identifiers are selected from a sequentially ordered range, and the group certificate identifies a subrange of the sequentially ordered range, said subrange encompassing the whitelisted device identifiers.Type: ApplicationFiled: May 27, 2003Publication date: November 17, 2005Applicant: Koninklijke Philips Electronics N.V.Inventors: Petrus Lenoir, Johan Talstra, Sebastiaan Antonius Fransiscus Van Den Heuvel, Antonius Staring
-
Publication number: 20050220304Abstract: A certifying authority provides a method for whitelist-based controlling of authentication of a first device (102) in a system (100) to a second device (103). The method comprises issuing to the first device (102) a group certificate identifying a range of non-revoked device identifiers, said range encompassing the device identifier of the first device (102). Preferably the device identifiers correspond to leaf nodes in a hierarchically ordered tree, and the group certificate identifies a node (202-207) in the tree representing a subtree in which the leaf nodes correspond to said range. The group certificate can also identify a further node (308, 310, 312) in the subtree which represents a sub-subtree in which the leaf nodes correspond to revoked device identifiers. Alternatively, the device identifiers are selected from a sequentially ordered range, and the group certificate identifies a subrange of the sequentially ordered range, said subrange encompassing the whitelisted device identifiers.Type: ApplicationFiled: May 27, 2003Publication date: October 6, 2005Applicant: Koninklijke Philips Electronics N.V.Inventors: Petrus Lenoir, Johan Talstra, Sebastiaan Antonius Fransiscus Van Den Heuvel, Antonius Staring
-
Publication number: 20050168323Abstract: A system (100) comprising a plurality of interconnected devices (101-105) and being arranged to provide the devices (101-105) conditional access to protected content items, characterized in that the system (100) is arranged to restrict the number of simultaneous sessions involving said protected content items to a predetermined total limit. Preferably the system (100) restricts the number of content items that can be accessed simultaneously to the predetermined limit. Security modules (300) such as smart cards can be used for this purpose. Each security module (300) may be arranged to restrict the number of content items to which it provides access simultaneously to an individual limit which can change over time. The system restricts the sum of the individual limits to the predetermined total limit. If the limit is reached, further sessions may he refused or allowed at reduced quality level.Type: ApplicationFiled: April 22, 2003Publication date: August 4, 2005Applicant: Koninklijke Philips Electronics N.V.Inventors: Petrus Lenoir, Sebastiaan Antonius Fransiscus Van Den Heuvel, Gerardus Lokhoff, Hans De Jong