EP2318961A1 - Outil de vérification informatique - Google Patents
Outil de vérification informatiqueInfo
- Publication number
- EP2318961A1 EP2318961A1 EP09806494A EP09806494A EP2318961A1 EP 2318961 A1 EP2318961 A1 EP 2318961A1 EP 09806494 A EP09806494 A EP 09806494A EP 09806494 A EP09806494 A EP 09806494A EP 2318961 A1 EP2318961 A1 EP 2318961A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- data sets
- new
- sets
- values
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 claims abstract description 16
- 238000012795 verification Methods 0.000 claims description 5
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims 3
- 238000004422 calculation algorithm Methods 0.000 description 25
- 230000006870 function Effects 0.000 description 25
- 238000000342 Monte Carlo simulation Methods 0.000 description 7
- 230000003044 adaptive effect Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 6
- 238000005259 measurement Methods 0.000 description 5
- 230000002349 favourable effect Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 238000004088 simulation Methods 0.000 description 3
- 230000001143 conditioned effect Effects 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000005433 particle physics related processes and functions Effects 0.000 description 1
- 230000000135 prohibitive effect Effects 0.000 description 1
- 239000000700 radioactive tracer Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Definitions
- the invention relates to a computer verification tool for the determination of rare events.
- watermark in English
- the watermark marking algorithms have experienced a remarkable increase because they are less restrictive for the end user, are complex to work around, and offer good interoperability.
- Determining the likelihood of false positives is particularly crucial because it is the credibility of the company implementing the tagging algorithm, as users very little value being falsely accused and unable to access to contents that they obtained legally. There is currently no really reliable and inexpensive method that can test these algorithms to determine the probability of false positive because it is very small.
- the invention improves the situation.
- the invention proposes a computer verification tool capable of repetitively processing a plurality of data sets, each data set comprising data distributed according to a chosen statistical law.
- the tool includes an estimator, able to establish for a dataset a value characterizing the reproduction, by this dataset, of a criterion relating to the data it contains, and a mixer, capable of establishing a new dataset, based on an existing dataset, maintaining the distribution according to the chosen statistical law.
- the tool further comprises a driver, arranged to call the estimator from a plurality of data sets to determine a plurality of values, to call the mixer with at least some of the data sets on the basis of a rule based on said plurality of values, and to repeat the call of the estimator and the mixer each time with a plurality of new sets of data previously established, until a condition which involves an extremum of said plurality of values and / or the number of repetitions.
- a driver arranged to call the estimator from a plurality of data sets to determine a plurality of values, to call the mixer with at least some of the data sets on the basis of a rule based on said plurality of values, and to repeat the call of the estimator and the mixer each time with a plurality of new sets of data previously established, until a condition which involves an extremum of said plurality of values and / or the number of repetitions.
- This tool is extremely advantageous because it makes it possible to calculate the probability of a false positive quickly and reliably.
- the invention also relates to a computer verification method, capable of repetitively processing a plurality of data sets, comprising the following steps,
- steps d) to g) selectively repeating steps d) to g) with each time the new plurality of data sets, until verifying an end-of-iteration condition, which involves an extremum of the value and / or the number of iterations.
- FIG. 1 represents a schematic view of a tool according to the invention
- FIG. 2 represents a general operating diagram of the tool of FIG. 1;
- FIGS 3 to 6 show examples of particular implementations of functions of the operations of Figure 2 and;
- FIG. 7 represents another embodiment of an operation of FIG. 2.
- the algorithm is installed on a digital device, for example a camcorder.
- the camcorder is arranged to call the algorithm whenever a content to which it accesses is to be copied / recorded.
- the algorithm analyzes the data flow of the content and determines whether it is protected or not. If the content is protected, the camcorder blocks any recording of that content.
- Filigree marking algorithms must be as reliable as possible. For this, manufacturers meet to define standards to qualify the reliability of these algorithms.
- the problem is therefore the ability to determine the probability of rare events (the presence of a false positive) with a reasonable cost.
- Another method is to implement the Monte Carlo method. However, this method is not applicable in this case because it has a prohibitive calculation cost in view of the probabilities sought.
- FIG. 1 represents a schematic view of a tool 2 according to the invention.
- the tool 2 comprises a memory 4, a driver 6, an estimator 8 and a mixer 10.
- the tool 2 is a computer.
- the invention applies to any set of tools or devices suitable for implementing the elements of the tool 2, such as a specialized chip (for example of the FPGA type), a generic or specialized printed circuit (for example: example ASIC type), an integrated system chip (for example SOC type) or other.
- a specialized chip for example of the FPGA type
- a generic or specialized printed circuit for example: example ASIC type
- an integrated system chip for example SOC type
- the memory 4 can be made in any manner known to those skilled in the art, for example in the form of a hard disk, a CD type optical memory. or DVD or other, and is not necessarily physically assembled with the other elements of the tool 2.
- the memory 4 can be accessed by network, or by any other means known to those skilled in the art.
- estimator 8 and the mixer 10 described herein are software elements that are physically stored on the memory 4 and which are called and implemented by the driver 8. As such, these elements can be parameterized and or updated as needed.
- these elements could be functions engraved in a chip forming the tool 2, or have physical and / or logical locks to prevent their modification.
- Tool 2 works by applying an algorithm qualified as a multi-level Monte-Carlo method. This algorithm is based on the general principle of:
- Tool 2 operates by dividing a main problem (finding extremely rare events reliably and in a short time) into a multitude of simpler but interrelated problems (finding less rare events, and sorting out those among them). more favorable), as explained by the following formula:
- dynamics we mean the fact that these elements are trajectories that evolve continuously in time according to an intrinsic model of evolution given by the physical nature of the problem studied.
- the trajectories are simulated and repetitively selected to choose those offering the best score, that is to say the sequences reaching a maximum state over the period of observation.
- the replacement step is to replace the lower score items with the minimum of the top score items.
- This article is mainly a mathematical demonstration of the feasibility and reliability of the adaptive multilevel Monte Carlo method in the restricted framework where the elements have a dynamic set by the nature of the problem studied.
- the replacement stage with new elements which, on the one hand respect the particular statistical characteristics, and which on the other hand form points of favorable start to find other rare events conditioned by high score events, is particularly complex to implement.
- FIG. 2 represents a schematic view of the operation of the tool 2.
- the tool starts from an initialization operation 30.
- it performs a loop which comprises a selection operation 40 , a mixing operation 50, and which ends with a loop end condition 52.
- an operation 60 returns the rare event probability that has just been calculated.
- the rare event sought is defined as the fact that an element distributed according to a distribution law imposed by the studied problem has a score greater than a certain threshold.
- FIG. 3 represents an exemplary implementation of the operation 30 of FIG. 2.
- This operation has for function the initialization of the elements which will be used for the determination of probability of rare event, as well as the initialization of the first adaptive level.
- a counter i is initialized to 1.
- a loop then begins, which comprises the repetition of an element generation operation 310, and a score calculating operation 320 of the element generated in the operation. 310.
- An end of loop condition 330 determines whether the counter ia reaches the number of elements n that it is desired to simulate simultaneously or not. When that is not the case, the counter i is incremented at 340 and the loop resumes.
- a function gen () receives as argument a statistical law px to generate an element x [i].
- the element x [i] which has just been generated is transmitted as an argument to a function sc () which determines the score of this element. This score is stored in a dx [i] element.
- an element x [i] is a pointer to a digital content or a sub-part of a digital content such as a rectangular selection of a still image, a portion of a soundtrack between two given moments, an image extracted from a video film.
- the function gen () of the operation 310 randomly draws digital content of this type from among a large set of contents made available to the invention, as well as a randomly selected portion of this content.
- the function sc () of the operation 320 is a likelihood measure because the "digital content indicated by the pointer x [i] contains the desired watermark.
- an element x [i] is a binary word of several bits identifying users of a content sales service.
- the function gen () is the algorithm used by this service to create and assign these identifiers. In this embodiment, the function gen () ensures that a given identifier is assigned to only one user of the service.
- the sc () function is a measure of the likelihood that the identifier x [i] was used to create an illegally re-distributed copy on a data exchange network.
- x [] is a table which receives the successive elements used to determine / generate an element which respects the statistical law px and which is a rare event compared to the law of measurement which represents the function sc ( ).
- dx [] is an array that stores all the scores of elements of x [] in a given simulation iteration.
- the function max () receives as argument the current score table dx [] and a selection parameter k, and returns the k-th highest score in the array dx [].
- the parameter k is the number of elements that are kept for the next iteration, the n-k other elements being removed.
- the max () function can be implemented in various ways.
- An effective example of implementation is to sort the array dx [] in order of decreasing values, and to retrieve the value of the kth element.
- the initialization operation 30 ends at 370.
- FIG. 4 represents an exemplary implementation of the operation 40 of FIG. 2.
- This operation carries out the first part of each iteration, that is to say the selection of the best elements which will serve as a basis for the mixing of the operation 50.
- the operation 40 therefore starts from an operation 400 in which a counter i and a counter m are initialized to 1. Then, in an operation 410, a test determines whether the element x [i] has a corresponding score dx [i ] greater than the threshold of the current level S [N].
- this element is copied into an array y [] as element y [t].
- the score dx [i] of this element is copied into an array dy [] as element dy [t].
- the counter t is incremented.
- a test 450 determines whether all the elements x [i] have been traveled. When this is not the case, the counter i is incremented to 460. Otherwise, the operation ends in 470. It should be noted that, by defining the threshold S [N] as the kth highest score of dx [], the array y [] contains exactly k elements. These k elements will serve as a basis in the operation 50 mixing and convergence of the algorithm.
- FIG. 5 represents an exemplary implementation of operation 50 of FIG. 2.
- the operation 50 is a loop which starts from the selected elements of the array y [], and which will mix or disturb each of its elements a number of times of the order of n / k. This mixture aims to "move" the elements so as to converge to a rarer element.
- part of this operation ensures that the score of the "mixed" elements progresses, and we keep only the mixed elements that have a favorable score. Otherwise, they are replaced by the corresponding undisturbed element.
- the operation 50 here comprises two main loops:
- a second loop which is internal to the first loop, to mix n / k times each element of y [i], and to keep the best mixed elements.
- the operation 50 therefore starts in 500 by setting the counter i to 1. It is followed in 502 by setting the counter j to 1.
- the second loop then begins with a first perturbation of the element y [i] at 510.
- This perturbation is carried out by means of a function mel () which receives y [i] as argument and calls the mixer 10 with this argument as well. only with a parameter ⁇ controlling the strength of the disturbance.
- the mixer 10 returns a new element z, which is a random perturbation of the element y [i], which nevertheless retains the same statistical law px that the x [i].
- the element z is, in the space of possibilities, in a neighborhood of the element y [i].
- the size of this neighborhood is a function of the strength of the disturbance, and can therefore be controlled with the parameter ⁇ .
- the mixer can be a Gaussian noise generator of intensity given by the parameter ⁇ to ensure sufficient displacement to explore the space of possibilities, but not excessive to remain useful.
- this Gaussian noise is added to the element y [i], the sum being then normalized to find a Gaussian law with the same variance as the elements x [i].
- the mixer modifies the digital content in a random but controlled manner.
- the mixer may be one of the processes described in the scientific article "Stochastic Image Warping for Improved Watermark Desynchronization" by Angela D'Angelo, Mauro Barni, and Neri Merhav, published in EURASIP Journal on Information Security, Volume 2008 (2008), Article ID 345184, doi: l 0.1155 / 2008/345184.
- the mixer randomly modifies the selection of the content: for example, on a soundtrack, the passage selected by the new pointer z is shifted by ⁇ microseconds, randomly to the past or the future with respect to the passage selected by yfi].
- the score value of the element z, sc (z), is calculated and compared with the threshold of the current level S [N] in an operation 520. If sc (z) is greater than S [N], then the mixed element is more efficient than the original element y [i], that is to say rarer.
- the counter j is incremented at 552, and the second loop resumes at 510, with the mixing again of the element y [i] current.
- the level counter N is incremented, and in 572 the threshold of the current level is defined in the same way as the operation 360.
- the threshold of the current level S [N] is greater than the stop threshold S, that is to say that the rare event sought has been detected; or if the N level counter is greater than a maximum number of iterations.
- the second condition prevents the algorithm from looping indefinitely in case of non-convergence due to incorrect parameterization. To date, the Applicant has nevertheless not found any non-convergence of the algorithm implemented by the tool 2.
- the tool 2 has a very particular adaptation to the problems posed by the rare events related to marking and tracing.
- the value of the parameter ⁇ controlling the disturbance force during the implementation of the mixer as well as the size of the neighborhood in which the element at the output of the mixer is located with respect to the input element of the mixer is either chosen by the user of the invention, or adaptively fixed for each iteration of the invention;
- the operation 60 returns the exact probability associated with the iterations concerned, which is therefore an estimator of the probability sought.
- Operation 60 thus starts at 600 by the initialization of a counter 1, and continues at 610 by the initialization of another counter i.
- the principle is to traverse the x [i] established at the last iteration to determine the number of them which is greater than the threshold S which is one of the two iteration stop conditions.
- counter 1 is incremented to 630, and in 640 we test if all x [i] have been traversed. If this is not the case, then the counter i is incremented to 650 and the operation 620 repeated with the next element x [i].
- FIG. 7 shows another embodiment of operation 50.
- k does not divide n, and operation 50 is no longer performed by nesting two loops, but follows the same reasoning. mixing of y [i] with selection of the best elements.
- the operation starts in 701 pa * generating a table of permutation of the integers between 1 and k.
- This array is the result of a function Permut () which receives the integer k as input, and randomly generates an array of which each element has an integer between 1 and k, each element being present only once in Perm [] .
- the loop starts with the initialization of a counter 1 to 1 at 702, and continues at 703 with the filling of the element Ind [l] with the value of Perm [mod (l, k)], where mod (l, k) is the modulo function, which returns the remainder of the division of 1 by k.
- a loop is then started to mix y [i] and select the best elements, with in 708, the index i which receives the value of Ind [j].
- the operations 710, 720, 730, 732, 740 and 742 are performed identically to the operations 510, 520, 530, 532, 540 and 542, except that the index j replaces the index j + (il) n / k because of the new way of mixing.
- This loop is conditioned by a test 760 on j to see if there are elements to mix. In this case, the counter j is incremented at 762 and the loop resumes at 707.
- operation 50 ends with operations 770, 772 and 780 identical to operations 570, 572 and 580.
- This implementation is particularly interesting because it is no longer necessary for k to divide n, and to maintain the same state of mind as the operation 50 of FIG. 5, as the [i] are replicated on average n / k times using operations 701 to 707.
- the invention provides a method for setting the value of the parameter ⁇ automatically. Too large a value results in many z elements being rejected during operation 520 (or 720).
- the invention then passes too often by the operations 540 and 542 (respectively 740 and 742) at the expense of the operations 530 and 532 (respectively 730 and 732).
- a counter calculates how many times the invention has passed through 540 (respectively 740) during the operation 50. At the end of the operation 50, if this counter is greater than a certain fraction of n (for example 0.7 * n), then the operation 50 is canceled because this is interpreted as an indication that the parameter ⁇ is too strong.
- the parameter N is then not incremented, the tables x [] and dxQ as well as all the counters of the operation 50 are reset.
- the parameter ⁇ is decreased by a chosen percentage, for example 10%.
- Operation 50 begins again with this new value of ⁇ . This is done until the counter is less than the fraction of n mentioned above, thus ensuring that the disturbances are realized, ie operations 530 and 532 (respectively 730 and 732) a comfortable number of times .
- the probabilities sought in the context of tracing problems are of the order of 10 ⁇ -12.
- the intermediate thresholds stored in the table S [] can be used. They give an estimate of the curve that associates a threshold with a probability of a rare event, giving approximate points on this curve: threshold S [i] for a probability (k / n) ⁇ i.
- the thresholds must be set in such a way that the probability of a false positive (detecting a marking when there is none, or accusing an innocent person) is less than a given given in the specifications.
- the table S [] makes it possible to find a first approximation of the threshold sought.
- the threshold S defining the rare event is deliberately defined with a very important value, so that a maximum number of iterations are performed, which gives a maximum of data.
- Such a device can operate by returning a scalar value the magnitude of which qualifies the presence of presence of marking or tracing.
- Other devices may return a binary value indicating the suspected presence of marking or tracing.
- Other devices will operate with other types of values.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Complex Calculations (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0804584A FR2935058A1 (fr) | 2008-08-13 | 2008-08-13 | Outil de verification informatique |
PCT/FR2009/000860 WO2010018313A1 (fr) | 2008-08-13 | 2009-07-10 | Outil de vérification informatique |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2318961A1 true EP2318961A1 (fr) | 2011-05-11 |
Family
ID=40548039
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09806494A Ceased EP2318961A1 (fr) | 2008-08-13 | 2009-07-10 | Outil de vérification informatique |
Country Status (4)
Country | Link |
---|---|
US (1) | US8583941B2 (fr) |
EP (1) | EP2318961A1 (fr) |
FR (1) | FR2935058A1 (fr) |
WO (1) | WO2010018313A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110968888A (zh) * | 2018-09-30 | 2020-04-07 | 北京国双科技有限公司 | 一种数据处理方法及装置 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2935058A1 (fr) | 2008-08-13 | 2010-02-19 | Inst Nat Rech Inf Automat | Outil de verification informatique |
CN103150454B (zh) * | 2013-03-27 | 2015-06-17 | 山东大学 | 基于样本推荐标注的动态机器学习建模方法 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
JP4842417B2 (ja) * | 1999-12-16 | 2011-12-21 | ソニー株式会社 | 記録装置 |
US7403904B2 (en) * | 2002-07-19 | 2008-07-22 | International Business Machines Corporation | System and method for sequential decision making for customer relationship management |
US8055910B2 (en) * | 2003-07-07 | 2011-11-08 | Rovi Solutions Corporation | Reprogrammable security for controlling piracy and enabling interactive content |
CN1914850B (zh) * | 2004-01-29 | 2010-07-21 | 索尼株式会社 | 信息处理设备和方法 |
JP2006011682A (ja) * | 2004-06-24 | 2006-01-12 | Sony Corp | 情報記録媒体検証装置、および情報記録媒体検証方法、並びにコンピュータ・プログラム |
US8018609B2 (en) * | 2005-09-13 | 2011-09-13 | Sony Corporation | Information processing device, information recording medium manufacturing device, information recording medium, methods therefore, and computer program |
WO2009068822A2 (fr) * | 2007-11-16 | 2009-06-04 | France Telecom | Procede et dispositif de tri de paquets |
FR2935058A1 (fr) | 2008-08-13 | 2010-02-19 | Inst Nat Rech Inf Automat | Outil de verification informatique |
-
2008
- 2008-08-13 FR FR0804584A patent/FR2935058A1/fr active Pending
-
2009
- 2009-07-10 US US13/058,840 patent/US8583941B2/en active Active
- 2009-07-10 EP EP09806494A patent/EP2318961A1/fr not_active Ceased
- 2009-07-10 WO PCT/FR2009/000860 patent/WO2010018313A1/fr active Application Filing
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2010018313A1 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110968888A (zh) * | 2018-09-30 | 2020-04-07 | 北京国双科技有限公司 | 一种数据处理方法及装置 |
CN110968888B (zh) * | 2018-09-30 | 2022-03-08 | 北京国双科技有限公司 | 一种数据处理方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
US8583941B2 (en) | 2013-11-12 |
FR2935058A1 (fr) | 2010-02-19 |
US20120060061A1 (en) | 2012-03-08 |
WO2010018313A1 (fr) | 2010-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1570648B1 (fr) | Méthode de sécurisation des mises à jour de logiciels | |
EP1483673B1 (fr) | Methode de stockage de blocs de donnees dans une memoire | |
EP1977365B1 (fr) | Procede de gestion de documents electroniques | |
WO2010018313A1 (fr) | Outil de vérification informatique | |
EP1449067A2 (fr) | Securisation d'un generateur pseudo-aleatoire | |
EP3857810B1 (fr) | Procédé cryptographique de comparaison sécurisée de deux données secrètes x et y | |
FR3110268A1 (fr) | Procédés d’utilisation sécurisée d’un premier réseau de neurones sur une donnée d’entrée, et d’apprentissage de paramètres d’un deuxième réseau de neurones | |
EP1034476B1 (fr) | Procede de verification du fonctionnement d'un systeme | |
WO2019122241A1 (fr) | Procédé de construction automatique de scénarios d'attaques informatiques, produit programme d'ordinateur et système de construction associés | |
EP2153575A2 (fr) | Obtention de valeurs dérivées dépendant d'une valeur maîtresse secrète | |
WO2017060495A1 (fr) | Procédé et système de sauvegarde répartie dynamique | |
WO2009095616A1 (fr) | Procede d'identification d'un document multimedia dans une base de reference, programme d'ordinateur, et dispositif d'identification correspondants | |
EP2274869A2 (fr) | Protection en boite-blanche d'algorithmes cryptographiques comprenant le calcul d'une forme quadratique | |
EP4443412A1 (fr) | Procédé de tatouage numérique d'un réseau de neurones, dispositif et programme d ordinateur correspondant | |
FR2872373A1 (fr) | Procede et dispositif de detection et preuve pour le tatouage d'entites multimedia | |
WO2025012147A1 (fr) | Méthode de tatouage numérique d'une image, méthode d'extraction d'un tatouage numérique et méthode de détection de falsification d'une image tatouée | |
WO2022229563A1 (fr) | Caracterisation d'un utilisateur par association d'un son a un element interactif | |
FR3053862A1 (fr) | Procede de generation des parametres caracterisant un protocole cryptographique | |
EP4280560A1 (fr) | Procédé pour détecter des anomalies de routage entre systèmes autonomes | |
FR3122753A1 (fr) | Procédé d'exécution d'un code binaire par un microprocesseur | |
EP3614617A1 (fr) | Procédé et dispositif de génération de paramètre(s) d'un protocole cryptographique asymétrique à partir d'une blockchain, procédé et appareil de cryptage ou de décryptage et programme d'ordinateur associés | |
FR3146741A1 (fr) | procédé utilisant des distances inter-crêtes en pixels se rapportant à des empreintes digitales | |
WO2009103872A1 (fr) | Moniteur de système de communication par messages amélioré | |
EP2153359A1 (fr) | Procede de classification d'un ensemble de documents electroniques | |
FR3000332A1 (fr) | Procede de reconstruction d'une mesure de reference d'une donnee confidentielle a partir d'une mesure bruitee de cette donnee |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20110210 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20170328 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
APAV | Appeal reference deleted |
Free format text: ORIGINAL CODE: EPIDOSDREFNE |
|
APAX | Date of receipt of notice of appeal deleted |
Free format text: ORIGINAL CODE: EPIDOSDNOA2E |
|
APBK | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNE |
|
APBN | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2E |
|
APBR | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3E |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230527 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
APBT | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9E |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20240704 |