Patent application number | Description | Published |
20090052671 | SYSTEM AND METHOD FOR CONTENT PROTECTION - The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit. | 02-26-2009 |
20090052672 | SYSTEM AND METHOD FOR PROTECTION OF CONTENT STORED IN A STORAGE DEVICE - The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with an identifier and with a media Key block MKB. The media center includes: a unique identifier identifying the media center MC_UID, a set of device keys DK; storage means for storing files identified by respective file identifiers; and a processing unit comprising file encryption means for encrypting each file before storage in the storage means, using a title key (Kt) computed from the identifier MC_UID of the media center and for encrypting the title key Kt from the set of device keys DK of the media center, and from the identifier and the media key block MKB of the mobile secure and protection keyring, the media center being further provided to write the encrypted title key (eKt) in association with the file identifier of the file to the mobile secure and protection keyring. | 02-26-2009 |
20090169019 | METHOD AND SYSTEMS USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object. | 07-02-2009 |
20130230166 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity about an object. The request includes a media identifier, a media key block, an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted using a random key. The encrypted step certificate and an encrypted random key are sent to the requester entity for subsequent writing the step certificate and the encrypted random key on a media. | 09-05-2013 |
20130230167 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first encrypted step certificate is extracted. A second hashing result is obtained from hashing the object to be authenticated. A third hashing result of an object identifier encoded within a decrypted second encrypted step certificate is extracted. A fourth hashing result is obtained from hashing the object to be authenticated. It is determining that the first hashing result is equal to the second hashing result and that the third hashing result is equal to the fourth hashing result, from which it is ascertained the object status of the object is that the object is an authentic object, a counterfeited object, or a stolen object. The ascertained object status is displayed on a screen of an authenticity verification equipment. | 09-05-2013 |
20150058635 | GENERATING AND PROCESSING AN AUTHENTICATION CERTIFICATE - A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media. | 02-26-2015 |
Patent application number | Description | Published |
20130137847 | POLY(DIHYDROFERULIC ACID) A BIORENEWABLE POLYETHYLENE TEREPHTHALATE MIMIC DERIVED FROM LIGNIN AND ACETIC ACID AND COPOLYMERS THEREOF - An embodiment of the invention is directed to a biorenewable thermoplastic, poly(dihydroferulic acid) (PHFA), which is an effective polyethylene terephthalate (PET) mimic. In another embodiment of the invention, a biorenewable thermoplastic copolymer, poly(dihydroferulic acid-co-ferulic acid) is an effective polystyrene mimic. The PHFA and the copolymer can be prepared by the homocondensation of acetyldihydroferulic acid or the copolymerization of acetyldihydroferulic acid with acetylferulic acid, which are monomers that can be synthesized from starting materials isolated from lignin, rice bran, or other biorenewable sources. | 05-30-2013 |
20150274883 | POLY(DIHYDROFERULIC ACID) A BIORENEWABLE POLYETHYLENE TEREPHTHALATE MIMIC DERIVED FROM LIGNIN AND ACETIC ACID AND COPOLYMERS THEREOF - An embodiment of the invention is directed to a biorenewable thermoplastic, poly(dihydroferulic acid) (PHFA), which is an effective polyethylene terephthalate (PET) mimic. In another embodiment of the invention, a biorenewable thermoplastic copolymer, poly(dihydroferulic acid-co-ferulic acid) is an effective polystyrene mimic. The PHFA and the copolymer can be prepared by the homocondensation of acetyldihydroferulic acid or the copolymerization of acetyldihydroferulic acid with acetylferulic acid, which are monomers that can be synthesized from starting materials isolated from lignin, rice bran, or other biorenewable sources. | 10-01-2015 |