Patents by Inventor Yves Maetz

Yves Maetz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8869292
    Abstract: A 3D object is protected by a first device that receives the 3D object, generates translation vectors that are added to the points of the 3D object to obtain a protected 3D object, and outputs the protected 3D object. The protected 3D object is unprotected by a second device by receiving the protected 3D object, generating translation vectors that are subtracted from the points of the protected 3D object to obtain an unprotected 3D object, and outputting the unprotected 3D object. Also provided are the first device, the second device and computer readable storage media.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: October 21, 2014
    Assignee: Thomson Licensing
    Inventors: Marc Eluard, Yves Maetz, Sylvain Lelievre
  • Publication number: 20140229742
    Abstract: To code a digital object, a sender encrypts its data to obtain a bitstream that is converted into a set of points that are then packaged and the coded object is output. A receiver receives and unpacks the coded object to obtain the set of points, converts the set of points to a bitstream that is decrypted to generate the original object that is output. The invention is particularly suited for protection of 3D objects, but it can also be used to protect any kind of digital data, in which case it may be possible to append the protected data of another kind to a 3D object.
    Type: Application
    Filed: September 4, 2012
    Publication date: August 14, 2014
    Inventors: Olivier Heen, Yves Maetz, Marc Eluard
  • Patent number: 8732819
    Abstract: A device and a method for graphical passwords. A device displays an initial image comprising a plurality of graphical elements, each graphical element having at least two variants; receives user input to select a variant of a number of the graphical elements, thereby generating a modified image; and generates the secret value from at least the selected variants of the graphical elements. The graphical elements are advantageously seamlessly integrated in the images, thereby making the system resistant to shoulder surfing attacks.
    Type: Grant
    Filed: May 9, 2011
    Date of Patent: May 20, 2014
    Assignee: Thomson Licensing
    Inventors: Yves Maetz, Marc Eluard, Davide Alessio, Gilles Desoblin
  • Publication number: 20140119538
    Abstract: A method for encrypting a 3D object. In a preferred embodiment, the encryption shapes the 3D object by generating a set of secret functions using a secret K, applying the generated functions to the 3D object, determining the function that gives an output that is closest to predetermined characteristics, encrypting the 3D object using the determined function, and outputting the encrypted 3D object and an indication of the determined function. Also provided is a corresponding decryption method, an encryption device and a decryption device.
    Type: Application
    Filed: October 25, 2013
    Publication date: May 1, 2014
    Applicant: THOMSON LICENSING
    Inventors: Yves MAETZ, Sylvain LELIEVRE, Marc ELUARD, Gwenael DOERR
  • Publication number: 20140115345
    Abstract: The graphical characteristics of 3D graphical objects encrypted using format-preserving encryption makes rendering of such objects quite inefficient by non-authorized devices. To optimise the rendering of a three-dimensional graphical object represented by a list of points and a list of surfaces defined by points in the list of points, a device receives the graphical object; encrypts the graphical object using a format-preserving encryption method to obtain an encrypted graphical object; encapsulates the encrypted graphical object to obtain an encapsulated graphical object by adding at least one encapsulation by adding for each encapsulation, to the list of surfaces, a plurality of surfaces that together enclose the encrypted graphical object and, in an embodiment, at least one point to the list of points; and outputs the encapsulated graphical object. Decryption is performed by essentially reversing the encryption.
    Type: Application
    Filed: October 22, 2013
    Publication date: April 24, 2014
    Applicant: THOMSON LICENSING
    Inventors: Yves MAETZ, Marc Eluard
  • Publication number: 20130305380
    Abstract: A method of protecting a graphical object represented by a list of vertices and a list of surfaces, each surface being defined by a number N vertices. A device selects a surface S with N vertices; computes a new vertex d using a random or pseudo-random function; inserts the new vertex d into the list of vertices; creates N new surfaces S1-SN from the surface S and the new vertex d; and replaces the selected surface S by the new surfaces S1-SN in the list of surfaces. The device preferably iterates the method. The device may shuffle the list of vertices with the inserted vertices. Also provided is an unprotection method and corresponding devices and computer readable storage media.
    Type: Application
    Filed: May 14, 2013
    Publication date: November 14, 2013
    Applicant: THOMSON LICENSING
    Inventors: Eric DIEHL, Olivier HEEN, Yves MAETZ, Marc ELUARD
  • Patent number: 8477018
    Abstract: A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch, a component, advantageously a processor, and a time usage limiter. The antenna is adapted to transform received RFID signals to electric energy that powers the component and the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. The time usage limiter counts down a timer when it is powered via the rotational switch and disables the RFID tag when the timer expires. Supports equipped with the RFID tag of the invention will thus respond until the timer expires, and preferably only if they rotate sufficiently.
    Type: Grant
    Filed: January 15, 2011
    Date of Patent: July 2, 2013
    Assignee: Thomson Licensing
    Inventors: Marc Eluard, Yves Maetz, Niclas Stahl
  • Patent number: 8436717
    Abstract: A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch and a component, advantageously a processor. The antenna is adapted to transform received RFID signals to electric energy that powers the component. In a preferred embodiment, the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. Supports equipped with the RFID tag of the invention will thus respond only if they rotate sufficiently. This can avoid collisions in case more than one such RFID tag is within communication range of an antenna of a reader. In a preferred embodiment, the information returned by the component is needed for full use of the content on the support.
    Type: Grant
    Filed: June 10, 2010
    Date of Patent: May 7, 2013
    Assignee: Thomson Licensing
    Inventors: Yves Maetz, Marc Eluard, Niclas Stahl
  • Publication number: 20120299915
    Abstract: A 3D object is protected by a first device that receives the 3D object, generates translation vectors that are added to the points of the 3D object to obtain a protected 3D object, and outputs the protected 3D object. The protected 3D object is unprotected by a second device by receiving the protected 3D object, generating translation vectors that are subtracted from the points of the protected 3D object to obtain an unprotected 3D object, and outputting the unprotected 3D object. Also provided are the first device, the second device and computer readable storage media.
    Type: Application
    Filed: May 1, 2012
    Publication date: November 29, 2012
    Inventors: Marc ELUARD, Yves MAETZ, Sylvain LELIEVRE
  • Publication number: 20120297022
    Abstract: A method of executing a software application. A storage device stores connection data, an identifier of the software application, a context selector, and an application launcher. An execution device connects, using the connection data, to a server. The storage device transfers the context selector to the execution device, which executes it to generate a first context for the execution device. The identifier and the first context are sent to the server from which the storage device receives the software application, which is stored with the first context. The application launcher is transferred to the execution device for execution. A second context of the execution device is generated and the storage device checks if it matches the first context. If so, the storage device transfers the software application to the execution device where it is executed.
    Type: Application
    Filed: January 17, 2011
    Publication date: November 22, 2012
    Inventors: Yves Maetz, Marc Eluard
  • Patent number: 8291447
    Abstract: The invention relates to a method for displaying audiovisual sequences, typically advertisements, carried out by a device provided with means for the reception and recording of said sequences. A display scenario is sent to the device. Said scenario comprises groups of data made up of sequence identifiers and at least one time display window. Following the reception of a signal which typically announces an advertising spot, the device selects a sequence whose associated time display window includes the present moment and displays it. Usual behavior of the user is stored by the device which plans the display of said sequences when the user is not normally present during the planned time window. In an advanced form, the time window is broken down into periods and the scenario specifies a number of displays of the sequence during said period. The invention also relates to a device which can receive a scenario and run it in order to select sequences and display them according to the display method.
    Type: Grant
    Filed: June 28, 2005
    Date of Patent: October 16, 2012
    Assignee: Thomson Licensing
    Inventors: Franck Hiron, Yves Maetz
  • Publication number: 20120210439
    Abstract: There are times when a first user may wish to distribute an excerpt of a protected digital content to a second user, for example for criticism. The protected digital content is divided into a plurality of parts, each part being encrypted using a control word specific for the part, wherein each control word can be generated from a master control word for the protected digital content. A device belonging to the first user selects the parts of the excerpt; generates the control words for the selected parts from the master control word; generates a license for the selected parts, the license comprising the control words for the selected parts; and transmits the selected parts and the license to the receiver of the second user. Also provided is the device of the first user.
    Type: Application
    Filed: February 10, 2012
    Publication date: August 16, 2012
    Inventors: Eric DIEHL, Yves MAETZ, Mohamed KARROUMI, Stéphane ONNO
  • Publication number: 20120192284
    Abstract: A method for acquisition of a software application stored on a software application distribution unit and intended to be supplied to a user computer unit is disclosed wherein, the user computer unit communicates an item of identification information identifying the software application to be acquired to an electronic security module connected to the user computer unit. The module generates, using a secret and identification information, an item of user information and transmits it with the identification information to the unit. The unit protects with the user information the software application identified by the identification information and the protected software application is transmitted to the user computer unit. Thus, the software application is protected with an item of information from the electronic security module of the user. The protected software application then has its protection removed on an electronic security unit equipped with an electronic security module.
    Type: Application
    Filed: July 1, 2010
    Publication date: July 26, 2012
    Inventors: Christophe Vincent, Marc Eluard, Yves Maetz
  • Patent number: 8219828
    Abstract: A method for secure installation of software applications. The user receives the software, partly encrypted, and an installation token for a number of licenses from the software provider, plugs the software and the installation token into a computer, and launches the installation application. A Secure Authenticated Channel is established between the installation application and the installation token and a unique identifier of the computer is sent thereon to the installation token. The installation token verifies that there are remaining licenses, decreases the remaining licenses, authorizes the installation and sends the decryption key and a certificate/key pair to the installation application that decrypts and installs the software, preferably linking the installation to the computer's identifier.
    Type: Grant
    Filed: December 18, 2007
    Date of Patent: July 10, 2012
    Assignee: Thomson Licensing
    Inventors: Yves Maetz, Eric Diehl, Alain Durand, Michel Morvan
  • Publication number: 20120120062
    Abstract: A 3D object is protected by a first device that receives the 3D object, permutes the coordinates of at least one dimension of at least some of the points of the 3D object to obtain a protected 3D object, and outputs the protected 3D object. The coordinates of the dimensions are preferably permuted independently of the permutations of the other dimensions. The protected 3D object is unprotected by a second device (140) by receiving the protected 3D object, permuting the coordinates of at least one dimension of at least some the points of the protected 3D object to obtain an unprotected 3D object, and outputting the unprotected 3D object. Also provided are the first device, the second device and computer readable storage media.
    Type: Application
    Filed: November 3, 2011
    Publication date: May 17, 2012
    Inventors: Marc Eluard, Yves Maetz, Sylvain Lelievre, Gwenael Doerr
  • Publication number: 20120112881
    Abstract: An electronic device with a limited time of use. The electronic device comprises a physical interface for removable connection to a host device, a processor and a usage time limit module with a counter. When the counter reaches a pre-determined value, the usage time limit module is configured to disable the electronic device, preferably by modifying the hardware of the electronic device, e.g. by disabling a communication line between the processor and the physical interface, which may be effected by blowing a fuse. The usage time limit module is powered by the host device via a power supply from the physical interface. In a preferred embodiment, the electronic device is a storage device. In a further preferred embodiment, the physical interface is a USB interface.
    Type: Application
    Filed: October 25, 2011
    Publication date: May 10, 2012
    Inventors: Marc Eluard, Yves Maetz, Niclas Stahl, Sébastien Perrot
  • Publication number: 20110283353
    Abstract: A device and a method for graphical passwords. A device displays an initial image comprising a plurality of graphical elements, each graphical element having at least two variants; receives user input to select a variant of a number of the graphical elements, thereby generating a modified image; and generates the secret value from at least the selected variants of the graphical elements. The graphical elements are advantageously seamlessly integrated in the images, thereby making the system resistant to shoulder surfing attacks.
    Type: Application
    Filed: May 9, 2011
    Publication date: November 17, 2011
    Inventors: Yves Maetz, Marc Eluard, Davide Alessio, Gilles Desoblin
  • Publication number: 20110199189
    Abstract: A rotation-activated electronic component, preferably a RFID tag mounted on or incorporated in a support that is rotated when read, e.g. a CD or DVD. The RFID tag comprises an antenna, a rotational switch, a component, advantageously a processor, and a time usage limiter. The antenna is adapted to transform received RFID signals to electric energy that powers the component and the rotational switch is adapted to cut the circuit unless the support does not rotate at or above a certain rotational speed. The time usage limiter counts down a timer when it is powered via the rotational switch and disables the RFID tag when the timer expires. Supports equipped with the RFID tag of the invention will thus respond until the timer expires, and preferably only if they rotate sufficiently.
    Type: Application
    Filed: January 15, 2011
    Publication date: August 18, 2011
    Inventors: Marc Eluard, Yves Maetz, Niclas Stahl
  • Publication number: 20110179495
    Abstract: A method of execution of a software application. A storage device stores the software application in a first memory. The software application comprises code that, when executed by a computing device authenticates the storage device. The storage device verifies an integrity of the software application and transfers the software application to the computing device upon successful verification. The computing device executes the software application, which authenticates the storage device. If the storage device is successfully authenticated, the computing device accesses data in a second memory of the storage device, the data being susceptible to be used by the software application during execution. Also provided is the storage device.
    Type: Application
    Filed: January 12, 2011
    Publication date: July 21, 2011
    Inventors: Yves Maetz, Marc Eluard
  • Patent number: 7971224
    Abstract: A method for activating several applications, where a received start up application determines whether a first application or a second application will be activated. The first application, which is received, along with the start up application, is activated if a file of additional data is not present in a memory. Conversely, the second application will be activated if the file is present in the memory.
    Type: Grant
    Filed: October 2, 2003
    Date of Patent: June 28, 2011
    Assignee: Thomson Licensing
    Inventors: Yves Maetz, Ralf Schaefer