Abstract:
PROBLEM TO BE SOLVED: To provide a method for preventing the path change of multiplexed contents that an operation trader transmits to at least one subscriber, in order to protect the contents to be transmitted. SOLUTION: The present method includes: associating multiplexed contents with at least one authentication message that can be protected by an encryption function which can be generated only by the operation trader, in the case of transmission; associating the message with at least one variable data item for the operation trader to specify a change with time in advance; analyzing the authentication message in the case of reception; approving access to the multiplexed contents of the message when the message is authentic and complete and changes of the variable data items have consistency; and prohibiting access to the multiplexed contents in other cases. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
The invention relates to a method and a system for computer-assisted maintenance of a device to be maintained, comprising a storage in a first system, which storage is implemented progressively when in use an operating system comprising the device to be maintained, of operational data associated with the said operating system. For a maintenance processing method, which is to be implemented by the second system (8) by applying a processing algorithm (38) to a set of operational data, the maintenance system uses a homomorphic or partially homomorphic cryptosystem (28) to obtain a modified maintenance processing algorithm (40) which makes it possible to obtain an item of predictive or corrective maintenance information in encrypted form, from a set of protected operational data comprising a first subset of encrypted operational data ((D1)H) by a means of a cryptosystem encryption method (28), and a second subset of plain data (D2) from the said set of operational data.
Abstract:
This method for reading a video stream comprises a step of comparing a datum characteristic of a behavior of a user with a set of predetermined thresholds, each of which, when it is crossed, characterizes an abnormal behavior of the user, a step of signaling an abnormal behavior if at least one predetermined part of these thresholds is crossed, and, otherwise, the absence of this signaling of an abnormal behavior, and a step of executing a counter-measure which makes it more difficult or impossible to access the set of information items contained in a first baseband video stream on the basis of various proofs of a second baseband video stream composed by a first terminal, this execution step being triggered automatically in response to the signaling of an abnormal behavior and not being triggered in the absence of this signaling of an abnormal behavior.
Abstract:
A method for providing a licence includes: a step a) wherein a server receives a request including an identifier of a multimedia content and an identifier of a terminal or of a user. The server computes the licence including at least one access data needed by the terminal to access the multimedia content. Before step a), there is a step e) for obtaining a first recommendation list for the user and from the list, obtaining one multimedia content identifier. For each automatically selected identifier, the method includes pre-computing at least one access data, and in a step b), searching for the identifier of the multimedia content received in step a) from among the identifiers automatically selected in the step e). In the event of success, the method includes selecting the pre-computed access data corresponding to the identifier, and, in the event of failure, generating the access data.
Abstract:
A method for broadcasting protected multimedia content includes, at predetermined intervals, having an access-rights server broadcast each new right of access to the broadcast multimedia content only to those terminals whose logins are included in a broadcast list. In response to a predetermined event, a terminal sends, to the access-rights server, via a point-to-point connection, a status message indicating, to the access-rights server, that the terminal is in its ready state. Alternatively, if the terminal is occupied, it avoids sending a status message. In the absence of reception of the status message that was expected in response to the predetermined event, the access-rights server automatically removes the identifier of the terminal from the broadcast list.
Abstract:
The invention relates to a method for the identification of security processors in a system for delivering protected multimedia content, in which: upon request from an identification device, a network head-end transmits (136) a command to suspend a first identified pre-determined security processor which, in response, switches (136) from an active state to an idle state; the sharing server detects (120) that the first security processor is in the idle state and then transmits (120) access control messages to a second security processor instead of the first security processor; in response to the identification of at least the second security processor, upon request from the identification device, the network head-end transmits (134) a command to re-establish the first security processor, and, subsequently, in response, the first security processor switches (134) from the idle state to the active state.
Abstract:
A method of identifying a show in a video that has been filmed by a spectator's camera includes selecting a color set to identify the show, recording, in a database, a show identifier associated with a code for the color set, before the show is filmed, inserting, within a scene in which the show is performed, a display-panel set, causing the display-panel set to display the color set without considering scene lighting, thereby raising a likelihood that the camera will capture the displayed color set, once the camera has begun filming a video of the scene, causing a tracer to download an image of the video, to search within the image for the color set associated by the database with the show identifier, and to respond to finding the color set by identifying the filmed show with the aid of the show identifier.
Abstract:
A terminal identification method which acquires then decodes multimedia temporal content to generate a multimedia stream in unscrambled form with at least one temporal succession of time intervals. A set of information bits for displaying an image or playing a sound being transmitted during a single time interval. The terminal identification device transmits an identification command to the terminal and the terminal triggers and alternately inhibits a predetermined modification of at least some of the information bits necessary for playing a sound or displaying an image contained in the multimedia stream to obtain a modified multimedia stream and transmits the stream as a multimedia. The device acquires the modified stream transmitted by the terminal and determines the identifier of the terminal to which it belongs on the basis of the transmitted command and the presence or absence of the predetermined modification in the acquired stream.
Abstract:
A method for providing a licence includes: a step a) wherein a server receives a request including an identifier of a multimedia content and an identifier of a terminal or of a user. The server computes the licence including at least one access data needed by the terminal to access the multimedia content. Before step a), there is a step e) for obtaining a first recommendation list for the user and from the list, obtaining one multimedia content identifier. For each automatically selected identifier, the method includes pre-computing at least one access data, and in a step b), searching for the identifier of the multimedia content received in step a) from among the identifiers automatically selected in the step e). In the event of success, the method includes selecting the pre-computed access data corresponding to the identifier, and, in the event of failure, generating the access data.
Abstract:
The invention concerns a method and system for manufacturing a three-dimensional part by a computer-aided manufacturing process, and an associated method and system for detecting a manufacturing process breach in a computer-aided manufacturing process of a three-dimensional part. The three-dimensional part manufacturing comprises computing pedigree information (10) relating to the manufacturing process of the three-dimensional part, wherein the pedigree information (10) gives access to pedigree data of the manufacturing process of the three- dimensional part, the pedigree data comprising manufacturing data (8D) collected during the manufacturing process of the three-dimensional part, and inserting a mark (20) encoding the pedigree information on a surface or within a volume of the three- dimensional part, to obtain a marked three-dimensional part (24). The detection of manufacturing process breach comprises pedigree data (42) retrieval from a marked three-dimensional part and determining whether a manufacturing breach occurred by applying classifying means to the retrieved pedigree data.