The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 17, 2019

Filed:

Aug. 21, 2015
Applicant:

Irdeto B.v., Hoofddorp, NL;

Inventors:

Andrew Augustine Wajs, Hoofddorp, NL;

John Wimer, Hoofddorp, NL;

Dmitri Jarnikov, Hoofddorp, NL;

Assignee:

IRDETO B.V., Hoofddorp, NL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/16 (2013.01); G06F 21/36 (2013.01); H04L 9/32 (2006.01); H04N 21/254 (2011.01); H04W 12/06 (2009.01); G06F 21/10 (2013.01); G06T 1/00 (2006.01); G06F 21/84 (2013.01);
U.S. Cl.
CPC ...
G06F 21/16 (2013.01); G06F 21/105 (2013.01); G06F 21/36 (2013.01); G06T 1/0021 (2013.01); H04L 9/3226 (2013.01); H04N 21/2541 (2013.01); H04W 12/06 (2013.01); G06F 21/10 (2013.01); G06F 21/84 (2013.01); G06F 2221/0737 (2013.01); G06F 2221/0753 (2013.01); H04L 2209/603 (2013.01);
Abstract

There is described a method for a first software application to access a secured software application on a computing device. The first software application is not configured to interface with the secured software application. The computing device includes an interfacing application configured to interface with the secured software application. The method comprises the first software application interfacing with the interfacing application to thereby cause the interfacing application to access the secured software application. The first software application is configured to interface with the interfacing application. There is also described a method of generating an encrypted version of an image using a library of pre-encrypted blocks of data, the same content encryption key having been used to encrypt each of the pre-encrypted blocks of data. The method comprises forming the encrypted version of the image from an ordered sequence of pre-encrypted blocks of data from the library, wherein each pre-encrypted block of data in the ordered sequence corresponds to a respective sub-image of a plurality of sub-images making up the image. There are also described corresponding computing devices, computer programs and computer-readable media.


Find Patent Forward Citations

Loading…