Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Irdeto B v patents

Recent patent applications related to Irdeto B v. Irdeto B v is listed as an Agent/Assignee. Note: Irdeto B v may have other listings under different names/spellings. We're not affiliated with Irdeto B v, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Irdeto B v-related inventors

System and encapsulating and enabling protection through diverse variations in software libraries

A flexible software library in which the software modules are defined as an abstract intermediate representation. The flexible library allows security transformation and performance attribute selections to be made by the end-user, rather than the library creator. Furthermore, since the flexible library contains an abstract representation of the software modules,... Irdeto B v

A challenge-response method and associated computing device

There is described a challenge-response method for a computing device. The method comprises steps of: (a) receiving challenge data at a secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce; (b) the secured module recovering... Irdeto B v

Method and system for dynamic platform security in a device operating system

A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secure software agent is provided for embedding within the abstraction layer... Irdeto B v

Providing access to content

A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a... Irdeto B v

Accessing a secured software application

There are also described corresponding computing devices, computer programs and computer-readable media.... Irdeto B v

Protecting an item of software

There is described a method of protecting an item of software so as to obfuscate a condition which causes a variation in control flow through a portion of the item of software dependent on whether the condition is satisfied, wherein satisfaction of the condition is based on evaluation of one... Irdeto B v

Protecting an item of software

A method for a computer to execute an item of software, the method comprising: the computer executing one or more security modules; the computer executing the item of software, said executing the item of software comprising, at at least one point during execution of the item of software at which... Irdeto B v

Updating software components

A method and system for renewing software at the component-level is provided. A client program includes a base component for loading a software component into at least one loadable region of the program to update the program. Code in the software component is for writing state data associating the state... Irdeto B v

Systems and methods for securing polymorphic content

Computer-implemented systems, methods, and computer-readable media for selecting a sequence of content parts from polymorphic content of an audiovisual presentation based on at least one profile of a user include receiving content information associated with polymorphic content, receiving profile information of a user, and selecting for rendering, from amongst the... Irdeto B v

Obfuscated performance of a predetermined function

A method of obfuscated performance of a predetermined function, wherein for the predetermined function there is a corresponding plurality of first functions so that, for a set of inputs for the function, a corresponding set of outputs may be generated by (a) representing the set of inputs as a corresponding... Irdeto B v

Optimizing and protecting software

A method comprising: carrying out optimization of an item of software in a first intermediate representation; carrying out protection of the item of software in a second intermediate representation different to the first intermediate representation.... Irdeto B v

Software protection

A method comprising: providing a protected item of software to a device, wherein the protected item of software is in a scripted language or an interpreted language or source code, wherein the protected item of software, when executed by the device, is arranged to perform a security-related operation for the... Irdeto B v

Cryptographic chip and related methods

There is described a chip for performing cryptographic operations. The chip comprises a key storage module, a rule storage module, an interface module and a cryptographic module. The key storage module is configured to store one or more cryptographic keys. The rule storage module is configured to store one or... Irdeto B v

Protecting an item of software

There is described a method of protecting an item of software. The method comprises (a) identifying an invariant which holds true at a specified point in the item of software; and (b) generating a protected item of software by inserting code at the specified point in the item of software.... Irdeto B v

Protecting an item of software

A method of protecting an item of software, said item of software arranged to perform data processing based on one or more items of data, the method comprising: applying one or more software protection techniques to said item of software to generate a protected item of software, wherein said one... Irdeto B v

Method, apparatus, and computer-readable medium for ofuscating execution of an application on a virtual machine

An apparatus, computer-readable medium, and computer-implemented method for obfuscating execution of an application on a virtual machine (VM), includes receiving a custom VM definition corresponding to a custom VM, generating custom application bytecode from application source code based at least in part on the custom VM definition, the custom application... Irdeto B v

Secured electronics device

An electronics device comprising one or more modules that implement a security-related operation in an obfuscated manner to thereby provide the security-related operation with resistance against a hardware attack, wherein the electronics device is either (a) a printed electronics device or (b) a device created using e-beam lithography.... Irdeto B v

Constructing a transport stream

There is disclosed a head-end system in which differently processed copies of content portions are reordered such that copies from different content portions are not interleaved in the final transport stream.... Irdeto B v

Secured execution of a web application

Methods and nodes for securing execution of a web application by determining that a call dependency from a first to a second function needs to be protected, adding a Partial Execution Stub (PES) function comprising code to establish a communication connection with a trusted module. Methods and nodes for secured... Irdeto B v

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Irdeto B v in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Irdeto B v with additional patents listed. Browse our Agent directory for other possible listings. Page by