Issued Patents All Time
Showing 1–21 of 21 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10419800 | Method to identify the origin of a security module in pay-TV decoder system | — | 2019-09-17 |
| 10070189 | Electronic support allowing access to remote audio/video assets | Bertrand Wendling, Pierre Sarda, Alain Delpuch | 2018-09-04 |
| 9525688 | Electronic support allowing access to remote audio/video assets | Bertrand Wendling, Pierre Sarda, Alain Delpuch | 2016-12-20 |
| 9348983 | Method for controlling the access to a specific type of services and authentication device for controlling the access to such type of services | — | 2016-05-24 |
| 9344154 | Near field communication system in a local network | Bertrand Wendling | 2016-05-17 |
| 9197312 | Near field communication system in a local network | Bertrand Wendling | 2015-11-24 |
| 8874488 | Process for carrying out a transaction between a payment module and a security module | — | 2014-10-28 |
| 8687807 | Cascading dynamic crypto periods | Gregory Duval | 2014-04-01 |
| 8683224 | Processor-implemented method for ensuring software integrity | Marco Macchetti | 2014-03-25 |
| 8646097 | Security module for audio/video data processing unit | Joel Conus, Luca Gradassi, Rached Ksontini | 2014-02-04 |
| 8484435 | Method for updating data in memories using a memory management unit | Fabien Gremaud | 2013-07-09 |
| 8458739 | Method for processing conditional access contents by a user unit | Frederic Thomas, Sebastien Robyr, Guy Moreillon, Philippe Desarzens | 2013-06-04 |
| 8352734 | Method for updating the firmware of a security module | Xavier Carrel, Olivier Brique, Nicolas Fisher | 2013-01-08 |
| 8347114 | Method and apparatus for enforcing a predetermined memory mapping | Fabien Gremaud | 2013-01-01 |
| 8036387 | Method for the transmission of management data | Joel Conus | 2011-10-11 |
| 7908491 | Method and device for controlling access to encrypted data | Jimmy Cochard | 2011-03-15 |
| 7890770 | Method for deactivating and reactivating security modules | Olivier Brique, Christian Wirz, Patrick Hauert | 2011-02-15 |
| 7725740 | Generating a root key for decryption of a transmission key allowing secure communications | Serge Gaumain | 2010-05-25 |
| 7502473 | Process for managing the handling of conditional access data by at least two decoders | Corinne Le Buhan, Guy Moreillon | 2009-03-10 |
| 7486793 | Invoicing management method of a service transmitted per time unit | Jimmy Cochard, Marco Sasselli | 2009-02-03 |
| 7487349 | Method for securing a ciphered content transmitted by a broadcaster | Rached Ksontini, Cédric Groux | 2009-02-03 |