Patent application number | Description | Published |
20090083394 | Multimedia Content Delivery Method and System - The present invention relates to a method for the distribution of multimedia content, comprising: | 03-26-2009 |
20130179555 | METHOD AND DEVICE FOR TIMESTAMPING DATA AND METHOD AND DEVICE FOR VERIFICATION OF A TIMESTAMP - An owner timestamps data f by generating a set of domain names D from the data f and the ‘timestamping’ time t. The owner then sends resolution requests for the domain names D to one or more DNS servers. To verify a timestamp, a verifier generates a set of domain names D from the data f and the ‘timestamping’ time t, sends resolution requests for the domain names D to the same DNS servers as the owner, receives resolution responses comprising TTL values, retrieves reference TTLs for the DNS servers and compares the current time with the ‘timestamping’ time t and, for each resolution response, the TTL and the reference TTL. If a predetermined ratio of comparisons match, then the timestamp is verified. Also provided are devices and computer program products. | 07-11-2013 |
20130242795 | METHOD AND DEVICE FOR FINGERPRINTING OF WIRELESS COMMUNICATION DEVICES - A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, if possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol. | 09-19-2013 |
20130347105 | METHOD AND DEVICE FOR COUNTERING FINGERPRINT FORGERY ATTACKS IN A COMMUNICATION SYSTEM - A method and a fingerprinting device for countering fingerprint forgery in a communication system. The fingerprinting device obtains and stores a reference fingerprint for a client device, generates and transmits decoy traffic that appears to originate from the client device, the decoy traffic having different fingerprinting properties than real traffic from the client device, generates a fingerprint for non-decoy traffic purportedly from the client device, and compares the generated fingerprint with a reference fingerprint. A forged fingerprint is detected if there is a mismatch. The decoy traffic preferably comprises frames to which no response is needed. The invention is particularly suited for 802.11 using fingerprints based on duration fields of received frames and the decoy traffic is then preferably probe request frames and null data frames. | 12-26-2013 |
20140019754 | ANONYMOUS AND UNLINKABLE DISTRIBUTED COMMUNICATION AND DATA SHARING SYSTEM - A distributed communication and data sharing system that provides anonymity and unlinkability. A group comprising a number of structures, each having a public/private key pair, is stored on a plurality of nodes in a Distributed Hash Table. Advantageous features of the group management system are provided through the use of Cryptographically Generated Addresses (CGA) for the structures, a secure capture method that enables a user to capture an address and be the only one authorized to request certain operations for the address, and an anonymous get/set mechanism in which a user signs messages, encloses the public key in the message and encrypts the message and public key using the public key of the receiver. The distributed communication and data sharing system of the invention can advantageously be used for group management of social networks. | 01-16-2014 |
20140195818 | METHOD AND DEVICE FOR PRIVACY RESPECTING DATA PROCESSING - A user device encrypts data and privacy attributes associated with the data. A processing device receives the encrypted data and privacy attributes, receives a signed script from a requester and verifies the signature. If successfully verified, the private key is unsealed and used to decrypt the privacy attributes and script attributes, which are compared to determine if the script respects the privacy attributes. If so, the encrypted data are decrypted and the script processes the private data to generate a result that is encrypted using a key of the requester and the encrypted result is then output. The device is preferably configured to inhibit the output of any information while the data is unencrypted. This way, the user can be ensured that the processing of the private data respects the privacy attributes set by the user. | 07-10-2014 |
20140313983 | METHOD AND DEVICE FOR FINGERPRINTING OF NETWORK DEVICES - A method for fingerprinting at least one network device is disclosed which comprises, in a monitoring device, computing a passive fingerprint from a plurality of parameters of the at least one network device. And in the at least one network device, modifying at least one parameter among the plurality of parameters of the at least one network device by applying to the at least one parameter a diversity function; wherein the diversity function is chosen in such a way that variations of the modified parameter of each network devices are not correlated; and wherein a variation range of the at least one modified parameter is inferior to a first value so that a variation range of the passive fingerprint for each of the at least one network device is limited to a determined range. A network device, modifying at least one parameter among the plurality of parameters of the at least one network device by applying to the at least one parameter a diversity function is further disclosed. The invention is particularly suitable for IEEE 802.11 and for a fingerprinting method based on inter-arrival time histogram. | 10-23-2014 |
20150033255 | METHOD FOR CACHING OF DATA ITEMS IN A CHACHE AREA OF A DATA PROCESSING SYSTEM AND CORRESPONDING DEVICE - A scalable and cost-effective solution for implementing a cache in a data processing environment. A sliding window comprises a number of past time slots. For each time slot, a number of request for a data item is counted. A mean request rate for the data item is computed over the sliding window. If the mean request rate is superior to a threshold, the data item is added to cache, or the data item is removed from cache otherwise. | 01-29-2015 |