Veldhoven, Netherlands

Erwin Jeroen Van Dommelen


Average Co-Inventor Count = 2.0

ph-index = 1

Forward Citations = 3(Granted Patents)


Company Filing History:


Years Active: 2009

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Erwin Jeroen Van Dommelen: Innovator in Conditional Access Technology

Introduction

Erwin Jeroen Van Dommelen is a notable inventor based in Veldhoven, Netherlands. He has made significant contributions to the field of conditional access technology, particularly through his innovative patent. His work focuses on enhancing the security and management of data streams, which is crucial in today's digital landscape.

Latest Patents

Erwin holds a patent for a "Conditional access method and devices." This invention involves a data stream containing content data that can be decrypted using control words. The patent describes how ECM messages included in the stream contain the necessary control words for decrypting nearby content data. Additionally, EMM messages provide management information that entitles selected stream receiving devices to decrypt content data using the control words from ECM messages. The secure device detects further management information and tests whether it is targeted at the stream receiving device. If so, it disables subsequent decryption of part of the stream, enhancing security measures.

Career Highlights

Erwin is currently employed at Irdeto Eindhoven B.V., where he continues to develop innovative solutions in the field of digital security. His expertise in conditional access technology has positioned him as a valuable asset to the company and the industry at large.

Collaborations

One of Erwin's notable coworkers is Robert Schipper. Their collaboration contributes to the advancement of technologies that protect digital content and ensure secure access for users.

Conclusion

Erwin Jeroen Van Dommelen's contributions to conditional access technology exemplify the importance of innovation in securing digital content. His patent reflects a deep understanding of the complexities involved in data management and security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…