CN101401348B - 用于使密码函数模糊的方法和系统 - Google Patents
用于使密码函数模糊的方法和系统 Download PDFInfo
- Publication number
- CN101401348B CN101401348B CN2007800085510A CN200780008551A CN101401348B CN 101401348 B CN101401348 B CN 101401348B CN 2007800085510 A CN2007800085510 A CN 2007800085510A CN 200780008551 A CN200780008551 A CN 200780008551A CN 101401348 B CN101401348 B CN 101401348B
- Authority
- CN
- China
- Prior art keywords
- question blank
- parameter
- group
- data
- bit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 75
- 238000012545 processing Methods 0.000 claims abstract description 76
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 64
- 230000008859 change Effects 0.000 claims description 35
- 238000006243 chemical reaction Methods 0.000 claims description 30
- 230000014509 gene expression Effects 0.000 claims description 27
- 230000000694 effects Effects 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 13
- 230000008569 process Effects 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 88
- 230000015654 memory Effects 0.000 description 31
- 239000011159 matrix material Substances 0.000 description 23
- 238000010586 diagram Methods 0.000 description 20
- 238000013507 mapping Methods 0.000 description 18
- 239000000203 mixture Substances 0.000 description 16
- 238000005516 engineering process Methods 0.000 description 11
- 230000004048 modification Effects 0.000 description 11
- 238000012986 modification Methods 0.000 description 11
- 238000013478 data encryption standard Methods 0.000 description 10
- 238000006073 displacement reaction Methods 0.000 description 8
- 230000011218 segmentation Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 6
- 230000009466 transformation Effects 0.000 description 6
- 239000013598 vector Substances 0.000 description 6
- 241001269238 Data Species 0.000 description 4
- 230000003044 adaptive effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 230000008676 import Effects 0.000 description 4
- 230000001965 increasing effect Effects 0.000 description 4
- PXFBZOLANLWPMH-UHFFFAOYSA-N 16-Epiaffinine Natural products C1C(C2=CC=CC=C2N2)=C2C(=O)CC2C(=CC)CN(C)C1C2CO PXFBZOLANLWPMH-UHFFFAOYSA-N 0.000 description 3
- 206010020400 Hostility Diseases 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 230000002441 reversible effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000007596 consolidation process Methods 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 241000270295 Serpentes Species 0.000 description 1
- 238000010521 absorption reaction Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000005315 distribution function Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000008672 reprogramming Effects 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
- 230000003245 working effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (18)
Applications Claiming Priority (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06110974 | 2006-03-10 | ||
EP06110974.0 | 2006-03-10 | ||
EP06116693 | 2006-07-06 | ||
EP06116693.0 | 2006-07-06 | ||
EP06117036.1 | 2006-07-12 | ||
EP06117036 | 2006-07-12 | ||
EP07102674 | 2007-02-20 | ||
EP07102674.4 | 2007-02-20 | ||
PCT/IB2007/050640 WO2007105126A2 (en) | 2006-03-10 | 2007-02-28 | Method and system for obfuscating a cryptographic function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101401348A CN101401348A (zh) | 2009-04-01 |
CN101401348B true CN101401348B (zh) | 2011-08-31 |
Family
ID=38179640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007800085510A Expired - Fee Related CN101401348B (zh) | 2006-03-10 | 2007-02-28 | 用于使密码函数模糊的方法和系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8479016B2 (zh) |
EP (1) | EP1997265B1 (zh) |
JP (1) | JP5249053B2 (zh) |
CN (1) | CN101401348B (zh) |
WO (1) | WO2007105126A2 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105024808A (zh) * | 2014-04-28 | 2015-11-04 | 恩智浦有限公司 | 无需改变密钥的安全性补丁 |
Families Citing this family (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5496663B2 (ja) * | 2006-07-12 | 2014-05-21 | イルデト・コーポレート・ビー・ヴイ | デジタルデータ処理装置の耐改竄性 |
US8700915B2 (en) | 2006-07-12 | 2014-04-15 | Irdeto Corporate B.V. | Method and system for verifying authenticity of at least part of an execution environment for executing a computer module |
JP5485694B2 (ja) * | 2006-11-17 | 2014-05-07 | イルデト・コーポレート・ビー・ヴイ | ホワイトボックス実施のための暗号化方法 |
TW200903296A (en) * | 2007-05-22 | 2009-01-16 | Koninkl Philips Electronics Nv | Data security |
CA2699042C (en) | 2007-09-13 | 2017-01-03 | Irdeto B.V. | Cryptographic processing of content |
US8634553B2 (en) | 2007-11-05 | 2014-01-21 | Sumitomo Electric Industries, Ltd. | Encryption key generation device |
CN101978647A (zh) * | 2008-01-31 | 2011-02-16 | 耶德托公司 | 保护智能卡 |
EP2255317B1 (en) * | 2008-03-05 | 2013-05-15 | Irdeto B.V. | Cryptographic system |
ATE533104T1 (de) * | 2008-03-05 | 2011-11-15 | Irdeto Bv | White-box-implementierung |
EP2286330A1 (en) * | 2008-05-07 | 2011-02-23 | Irdeto B.V. | Exponent obfuscation |
US8171306B2 (en) * | 2008-11-05 | 2012-05-01 | Microsoft Corporation | Universal secure token for obfuscation and tamper resistance |
WO2010102960A1 (en) * | 2009-03-10 | 2010-09-16 | Irdeto B.V. | White-box cryptographic system with input dependent encodings |
WO2010146139A1 (en) * | 2009-06-19 | 2010-12-23 | Irdeto B.V. | White-box cryptographic system with configurable key using intermediate data modification |
US8812959B2 (en) * | 2009-06-30 | 2014-08-19 | International Business Machines Corporation | Method and system for delivering digital content |
US9274976B2 (en) * | 2010-11-05 | 2016-03-01 | Apple Inc. | Code tampering protection for insecure environments |
WO2012167231A1 (en) * | 2011-06-03 | 2012-12-06 | Exelis Inc. | Method and system for a programmable parallel computation and data manipulation accelerator |
US8605894B2 (en) * | 2011-07-14 | 2013-12-10 | Apple Inc. | Cryptographic process execution protecting an input value against attacks |
US9111072B1 (en) | 2011-08-23 | 2015-08-18 | Tectonic Labs, LLC | Anti-reverse engineering unified process |
US9189425B2 (en) * | 2011-09-01 | 2015-11-17 | Apple Inc. | Protecting look up tables by mixing code and operations |
FR2995111B1 (fr) * | 2012-09-04 | 2015-07-24 | Morpho | Protection contre canaux auxiliaires |
WO2014059547A1 (en) * | 2012-10-17 | 2014-04-24 | Elliptic Technologies Inc. | Cryptographic sequencing system and method |
EP2936730B1 (en) * | 2012-12-21 | 2016-06-15 | Koninklijke Philips N.V. | Computing device configured with a table network |
CN105453481B (zh) | 2012-12-27 | 2019-02-26 | 皇家飞利浦有限公司 | 包括表网络的计算设备 |
WO2014154270A1 (en) | 2013-03-27 | 2014-10-02 | Irdeto B.V. | Tamper resistant cryptographic algorithm implementation |
US9454653B1 (en) * | 2014-05-14 | 2016-09-27 | Brian Penny | Technologies for enhancing computer security |
CN105765896B (zh) * | 2013-12-05 | 2020-02-07 | 皇家飞利浦有限公司 | 用于表格网络的迭代应用的计算设备 |
CN106464484B (zh) * | 2014-03-31 | 2019-08-09 | 爱迪德技术有限公司 | 预定函数的混淆执行 |
KR20150123476A (ko) * | 2014-04-25 | 2015-11-04 | 한국전자통신연구원 | 부채널 공격 방지를 위한 대칭키 암호 알고리즘의 함수 마스킹 장치 및 그 방법 |
EP2940677A1 (en) | 2014-04-28 | 2015-11-04 | Nxp B.V. | Method for including an implicit integrity or authenticity check into a white-box implementation |
EP2940925B1 (en) * | 2014-04-28 | 2017-12-27 | Nxp B.V. | Implementing use-dependent security settings in a single white-box implementation |
US9641337B2 (en) * | 2014-04-28 | 2017-05-02 | Nxp B.V. | Interface compatible approach for gluing white-box implementation to surrounding program |
US9380033B2 (en) | 2014-04-28 | 2016-06-28 | Nxp B.V. | Implementing use-dependent security settings in a single white-box implementation |
US9485226B2 (en) | 2014-04-28 | 2016-11-01 | Nxp B.V. | Method for including an implicit integrity or authenticity check into a white-box implementation |
EP2960891B1 (en) | 2014-06-24 | 2019-01-16 | Nxp B.V. | Method for introducing dependence of white-box implementationon a set of strings |
US10412054B2 (en) * | 2014-06-24 | 2019-09-10 | Nxp B.V. | Method for introducing dependence of white-box implementation on a set of strings |
DE102014016548A1 (de) * | 2014-11-10 | 2016-05-12 | Giesecke & Devrient Gmbh | Verfahren zum Testen und zum Härten von Softwareapplikationen |
US10469245B2 (en) | 2014-12-24 | 2019-11-05 | Koninklijke Philips N.V. | Cryptographic system and method |
US10922292B2 (en) | 2015-03-25 | 2021-02-16 | WebCloak, LLC | Metamorphic storage of passcodes |
EP3278259B1 (en) * | 2015-03-30 | 2020-12-23 | Irdeto B.V. | Data protection |
US10505709B2 (en) * | 2015-06-01 | 2019-12-10 | Nxp B.V. | White-box cryptography interleaved lookup tables |
US9916472B2 (en) | 2015-07-22 | 2018-03-13 | International Business Machines Corporation | Obfuscation and protection of data rights |
JP6292195B2 (ja) * | 2015-08-24 | 2018-03-14 | 富士電機株式会社 | 情報処理装置及び情報処理方法 |
DE102015014038A1 (de) * | 2015-10-30 | 2017-05-04 | Giesecke & Devrient Gmbh | Alternative Darstellung des Krypto-Algorithmus DES |
GB201519612D0 (en) * | 2015-11-06 | 2015-12-23 | Nagravision Sa | Key sequence generation for cryptographic operations |
NL2015745B1 (en) * | 2015-11-09 | 2017-05-26 | Koninklijke Philips Nv | A cryptographic device arranged to compute a target block cipher. |
US10432596B2 (en) * | 2016-02-09 | 2019-10-01 | Kåre L. Andersson | Systems and methods for cryptography having asymmetric to symmetric key agreement |
KR101933649B1 (ko) * | 2016-05-27 | 2018-12-28 | 삼성에스디에스 주식회사 | 화이트박스 암호 알고리즘을 이용한 공개키 암호화를 위한 장치 및 방법 |
US10389517B2 (en) | 2016-06-27 | 2019-08-20 | Nxp B.V. | Using secure key storage to bind a white-box implementation to one platform |
DE102016008456B4 (de) * | 2016-07-12 | 2018-03-29 | Giesecke+Devrient Mobile Security Gmbh | White Box AES Implementierung |
JP6876423B2 (ja) * | 2016-12-14 | 2021-05-26 | Kddi株式会社 | ストリーム暗号における内部状態の初期化装置、方法及びプログラム |
FR3078463A1 (fr) * | 2018-02-26 | 2019-08-30 | Stmicroelectronics (Rousset) Sas | Procede et dispositif de realisation d'operations en table de substitution |
FR3078464A1 (fr) * | 2018-02-26 | 2019-08-30 | Stmicroelectronics (Rousset) Sas | Procede et circuit de mise en oeuvre d'une table de substitution |
US11218291B2 (en) * | 2018-02-26 | 2022-01-04 | Stmicroelectronics (Rousset) Sas | Method and circuit for performing a substitution operation |
JP7383985B2 (ja) * | 2019-10-30 | 2023-11-21 | 富士電機株式会社 | 情報処理装置、情報処理方法及びプログラム |
FR3103591A1 (fr) * | 2019-11-22 | 2021-05-28 | Orange | Procédé sécurisé d’échange de données entre un terminal et un serveur |
CN111555862B (zh) * | 2020-05-13 | 2023-04-28 | 华南师范大学 | 基于掩码保护的随机冗余轮函数的白盒aes实现方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2792141A1 (fr) * | 1999-04-09 | 2000-10-13 | Bull Cp8 | Procede de securisation d'un ou plusieurs ensembles electroniques mettant en oeuvre un meme algorithme cryptographique avec cle secrete, une utilisation du procede et l'ensemble electronique |
CN1490739A (zh) * | 2003-09-15 | 2004-04-21 | 苏盛辉 | 基于杠杆函数的2型公开密钥密码系统 |
CN1496055A (zh) * | 2002-02-12 | 2004-05-12 | ��۳��д�ѧ | 序列产生器和伪随机序列的产生方法 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1038370B1 (en) | 1998-06-25 | 2006-09-06 | Koninklijke Philips Electronics N.V. | Synchronous stream cipher |
JP3917357B2 (ja) * | 2000-10-10 | 2007-05-23 | 三菱電機株式会社 | 非線形変換方法及びプログラムを記録したコンピュータ読み取り可能な記録媒体及び非線形変換装置 |
CA2327911A1 (en) | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
FR2856539A1 (fr) * | 2003-06-17 | 2004-12-24 | France Telecom | Procede et systeme tracables de chiffrement et/ou de dechiffrement d'informations, et supports d'enregistrement pour la mise en oeuvre du procede |
US7363620B2 (en) * | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
EP1712032B1 (en) * | 2003-12-11 | 2011-05-11 | Irdeto B.V. | Block ciphering system, using permutations to hide the core ciphering function of each encryption round |
US20060002548A1 (en) * | 2004-06-04 | 2006-01-05 | Chu Hon F | Method and system for implementing substitution boxes (S-boxes) for advanced encryption standard (AES) |
US7715555B2 (en) * | 2004-09-07 | 2010-05-11 | Broadcom Corporation | Method and system for extending advanced encryption standard (AES) operations for enhanced security |
EP1646174A1 (en) | 2004-10-07 | 2006-04-12 | Axalto SA | Method and apparatus for generating cryptographic sets of instructions automatically and code generation |
US7881466B2 (en) | 2004-10-28 | 2011-02-01 | Irdeto B.V. | Method and system for obfuscating a cryptographic function |
JP2007298847A (ja) * | 2006-05-02 | 2007-11-15 | Kddi Corp | プログラム内データの保護装置、保護方法およびプログラム |
-
2007
- 2007-02-28 US US12/282,175 patent/US8479016B2/en active Active
- 2007-02-28 CN CN2007800085510A patent/CN101401348B/zh not_active Expired - Fee Related
- 2007-02-28 EP EP07705965.7A patent/EP1997265B1/en active Active
- 2007-02-28 WO PCT/IB2007/050640 patent/WO2007105126A2/en active Application Filing
- 2007-02-28 JP JP2008557864A patent/JP5249053B2/ja not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2792141A1 (fr) * | 1999-04-09 | 2000-10-13 | Bull Cp8 | Procede de securisation d'un ou plusieurs ensembles electroniques mettant en oeuvre un meme algorithme cryptographique avec cle secrete, une utilisation du procede et l'ensemble electronique |
CN1496055A (zh) * | 2002-02-12 | 2004-05-12 | ��۳��д�ѧ | 序列产生器和伪随机序列的产生方法 |
CN1490739A (zh) * | 2003-09-15 | 2004-04-21 | 苏盛辉 | 基于杠杆函数的2型公开密钥密码系统 |
Non-Patent Citations (2)
Title |
---|
Hamilton E. Link el. al..Clarifying Obfuscation: Improving the Security of White-Box DES.《Information Technology: Coding and Computing, 2005. ITCC 2005》.2005,第1卷p.679-684. * |
HamiltonE.Linkel.al..ClarifyingObfuscation:ImprovingtheSecurityofWhite-BoxDES.《InformationTechnology:CodingandComputing 2005. ITCC 2005》.2005 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105024808A (zh) * | 2014-04-28 | 2015-11-04 | 恩智浦有限公司 | 无需改变密钥的安全性补丁 |
CN105024808B (zh) * | 2014-04-28 | 2019-04-16 | 恩智浦有限公司 | 无需改变密钥的安全性补丁 |
Also Published As
Publication number | Publication date |
---|---|
JP2009529819A (ja) | 2009-08-20 |
US20090158051A1 (en) | 2009-06-18 |
WO2007105126A2 (en) | 2007-09-20 |
EP1997265B1 (en) | 2020-08-05 |
JP5249053B2 (ja) | 2013-07-31 |
EP1997265A2 (en) | 2008-12-03 |
US8479016B2 (en) | 2013-07-02 |
WO2007105126A3 (en) | 2007-11-15 |
CN101401348A (zh) | 2009-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101401348B (zh) | 用于使密码函数模糊的方法和系统 | |
CN101536398B (zh) | 用于白盒实现的加密方法 | |
CN102461058B (zh) | 具有输入相关编码的白盒密码系统 | |
CN101491001B (zh) | 数字数据处理单元的防篡改系统和方法 | |
CN102484581B (zh) | 使用中间数据更改的具有可配置密钥的白盒密码系统 | |
CN101048969B (zh) | 用于扰乱密码函数的方法和系统 | |
US8306216B2 (en) | Method and system for tracking or identifying copy of implementation of computational method, and computation system | |
CN101491000B (zh) | 用于混淆密码函数的方法和系统 | |
CN101790865A (zh) | 更新密码密钥数据 | |
CN102099780B (zh) | 指数模糊 | |
EP1712032B1 (en) | Block ciphering system, using permutations to hide the core ciphering function of each encryption round | |
CN107273724A (zh) | 为白盒实施方案的输入和输出加水印 | |
CN100561396C (zh) | 修改数字权限对象的方法及其所用的电子设备 | |
CN101681408A (zh) | 数据安全性 | |
JP2004086917A (ja) | 情報処理装置、耐タンパ処理装置 | |
JP2004078976A (ja) | 情報処理装置、耐タンパ処理装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: YEDETO CO., LTD. Owner name: YEDETO CO., LTD. Free format text: FORMER OWNER: KONINKLIJKE PHILIPS ELECTRONICS N.V. Effective date: 20100402 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: EINDHOVEN, NETHERLANDS TO: HOOFDDORP, NETHERLAND |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20100402 Effective date of registration: 20100402 Address after: Holland Hoofddorp Applicant after: IRDETO B.V. Co-applicant after: IRDETO B.V. Address before: Holland Ian Deho Finn Applicant before: Koninklijke Philips Electronics N.V. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C56 | Change in the name or address of the patentee |
Owner name: IRDETO BV Free format text: FORMER NAME: IRDETO B.V. |
|
CP01 | Change in the name or title of a patent holder |
Address after: Holland Hoofddorp Patentee after: IRDETO CORPORATE B.V. Address before: Holland Hoofddorp Patentee before: Irdeto B.V. |
|
ASS | Succession or assignment of patent right |
Owner name: IRDETO B.V. Free format text: FORMER OWNER: IRDETO BV Effective date: 20150108 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150108 Address after: Holland Hoofddorp Patentee after: IRDETO B.V. Address before: Holland Hoofddorp Patentee before: IRDETO CORPORATE B.V. |
|
C56 | Change in the name or address of the patentee |
Owner name: IRDETO B. V. Free format text: FORMER NAME: IRDETO B.V. |
|
CP01 | Change in the name or title of a patent holder |
Address after: Holland Hoofddorp Patentee after: IRDETO B.V. Address before: Holland Hoofddorp Patentee before: Irdeto B.V. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110831 |
|
CF01 | Termination of patent right due to non-payment of annual fee |