Company Information

CIN
Status
Date of Incorporation
20 April 2011
State / ROC
/ ROC Delhi
Last Balance Sheet
Last Annual Meeting
Paid Up Capital
0
Authorised Capital
0

Directors

Natarajan Ramasubramanian
Natarajan Ramasubramanian
Authorised Representative
about 10 years ago

Past Directors

Ranjit Nigam
Ranjit Nigam
Authorised Representative
over 14 years ago

Patents

Method Of Smoothing The Workload Of A Server

This method of smoothing the workload of a transaction server executing processes in response to requests transmitted by terminals this method comprising:  for each terminal the logging (100) of the instants of toggling between an active state and an inactive state  the construction (100) for each terminal on the ba...
This method for renewing the code of an algorithm comprises: - receiving (122) a randomly drawn seed whose size in terms of number of bits, is at least four times smaller than the number of bits needed to encode the N numerical constants of the cryptographic algorithm, - expanding (128) the seed deterministically ...

“Verification Of Mac Code Without Disclosure”

The invention relates to a verification of the authenticity of a message (M) transmitted by a transmitting unit (95) to a receiver unit (96) with a cryptographic redundancy corresponding to a message authentification code (MAC) calculated from a block encryption. According to the invention, instead of verifying the ...

Methods For Sending And Receiving Image Streams&Nbsp; Recording Medium&Nbsp; Sending Device&Nbsp; Conversion Module For These Methods

This method for sending a stream of plain images comprises the conversion (108)  by means of a secret invertible transform  of the images of the plain image stream to obtain a converted image stream that is encoded and sent instead of the plain image stream  this secret invertible transform converting each image of ...

Method For Conditioning And Controlling The Access To Hierarchical Coding Content And Processor And Transmitter For Said Method

The hierarchical access control method includes: - the reception (100) and transnnission (106) to a security processor of second cryptograms, (CWi)Ki for i included between 1 and k-1, which are obtained by enciphering control words CW1 to CWK-1 with keys K1 to Kk-1 respectively, which are constructed with at least ...

Method And Device For Diagnosing The First Reception Of An Identifier, Detection Method, Storage Medium And Computer Software For Said Method

The method of the invention comprises: a) determining (64, 68) at least one limit based on N already received identifiers, where N is strictly higher than the number of identifiers that can be contained in an anti-replay memory, the limit being determined so as to define, on the one hand, a range of identifiers that...

Method For Loading The Code Of At Least One Software Module

The invention relates to a method for loading the code of at least one software module in a main memory by a security processor in which: a bootstrap loader also loads (170) the code of the software module in the main memory before the execution of an operating system is launched into a range of addresses of the mai...

Control Word Deciphering, Transmission And Reception Methods, Recording Medium And Server For These Methods

The invention relates to a method for decrypting control words for a first and second terminal, that includes: a control word server that transmits (162) to the first terminal a control word CW2,t obtained by decrypting a cryptogram CW*2,t transmitted by the second terminal even before the first terminal changes a d...

Method For Detecting An Attack Attempt&Nbsp; Recording Medium And Security Processor For This Method

The method in which an attempt to attack a security processor is detected by the security processor itself comprises: measurements (50) of several different events occurring independently of one another in the absence of attack attempts  :building (52) the value of at least one attack indicator as a function of a...

Method Of Transmitting A Complementary Datum To A Receiving Terminal

The invention relates to a method of transmitting at least one complementary datum D in a list of control words CWi for access to a scrambled content transmitted by a content server of an operator of user equipment (2) comprising a reception terminal (4) associated with a security processor (6), each control word CW...

Method For Detecting Illegal Use Of A Security Processor

This method for detecting an illicit use of a security processor used for the descrambling of different multimedia contents disseminated on several respective channels comprises: - the incrementing (153) of a counter Kchi by a predetermined step whenever, after verification, a message ECMi,c is received within a ti...

Method For Detecting The Abnormal Use Of A Safety Processor

The invention relates to a method for detecting the abnormal use of a safety processor called by at least one reception terminal for controlling the access to a scrambled digital content provided by at least one operator to said reception terminal. The method comprises the following steps: analysing the use of the s...

A Method For Controlling Access To A Scrambled Digital Content

The invention relates to a method for controlling access by a secret key K to a scrambled digital content distributed, along with the security data D(K) calculated on the basis of K, by an operator equipped with a content server and an access-rights server to at least one receiving terminal comprising a plurality of...

Method For Access Control To A Scrambled Content

ABSTRACT The invention relates to a method for access control to a digital scrambled content distributed to a set of installed reception terminals comprising one master terminal and at least one slave terminal dependent on said master terminal, method in which the slave terminal systematically or occasionally ...

Security Processor And Methods For Registering Access Entitlements And Cryptographic Keys

This security method for scrambled multimedia signal decoder comprises at least one rewritable lock (62, 64), the value of which can be toggled at least between a first and a second value in response to an EMM message, and in which a registration module is able, in response to one and the same EMM registration messa...

A Method Of Broadcasting A Scrambled Multimedia Programme

Abstract METHODS FOR BROADCASTING AND RECEIVING A SCRAMBLED MULTIMEDIA PROGRAMME, NETWORK HEAD, TERMINAL, RECEIVER AND SECURITY PROCESSOR FOR THESE METHODS A method of broadcasting a scrambled multimedia programme, by way of a broadband network, in wliich before transmitting a licence key; - a network head carr...

Security Processor And Method Of Configuring The Behaviour Of The Security Processor

Abstract SECURITY PROCESSOR AND RECORDING METHOD AND MEDIUM FOR CONFIGURING THE BEHAVIOUR OF THIS PROCESSOR Security processor (42) for a decoder able to receive a scrambled multimedia signal, this processor comprising: - at least one first rewritable lock (FIELDKEY, FIELDPIEMM, FIELDPIEMMC, FIELDPIECM, FIELDFCT) ...

A Method Of Establishing A Session Key And Units For Implementing The Method

A method of establishing a session key Ks for a session between a unit for descrambling scrambled multimedia signals and a removable cryptographic unit, wherein: - one of the units sends (steps 166, 184) the other unit a message containing a received random number, a term a and a signature of the random number ...

A Method Of Establishing Cryptographic Session Key

Abstract METHOD OF ESTABLISHING A CRYPTOGRAPHIC KEY, NETWORK HEAD AND RECEIVER FOR THIS METHOD, AND METHOD OF TRANSMITTING SIGNALS This method of establishing a cryptographic session key comprises: a subscription phase (104) during which an identifier of a local loop to the end of which a receiver must be connec...

Methods Of Broadcasting And Receiving Scrambled Multimedia Programs, A Terminal And A Network Head End For Said Methods

NA

Methods For Receiving And Transmitting A Piece Of Multimedia Content, Receiver, Transmitter And Storage Medium, And Security Processor For Said Method

This method comprises: the modification (114), whenever a second multimedia content is viewed by means of an electronic receiver, of the value of the counter as a function of the instructions on progression associated with this second multimedia content, the storage (114) of the value of this counter between ...

Method For Securing A Conditional Jump, Information Carrier, Program, Secured System And Security Processor For This Method

The conditional jump authorizes the execution of a specific processing operation on a data element D if a Boolean expression between one or more operands is verified and, if not, prohibits the execution of the specific processing operation on the data element D. The method for securing this conditional jump comprise...

Method For Protecting Contents And Multimedia Services

The invention relates to a method for protecting content (6) scrambled by a content key (CW) transmitted in an encrypted form using a content-access key (K), said content being provided by a transmission system to at least one reception terminal (4) using a locally configured service at said reception terminal accor...

Methods For Decrypting, Transmitting And Receiving Control Words, Recording Medium And Control Word Server To Implement These Methods

The invention concerns a method for decrypting control words for terminals that are mechanically and electronically independent of one another  wherein a control word server: – determines  (164)  selectively for each terminal  a number of additional control words CWs to be transmitted to the terminal as a functio...

Protection Method&Nbsp; Decrypting Method&Nbsp; Recording Medium And Terminal For Thisprotection Method

This method for protecting the transmission of a multimedia content or of a control word between a security processor and a terminal comprises: - the advance recording in the terminal of several secret codes Ci-1  each secret code Ci-1 enabling solely the decryption of the multimedia content or of the control word...

Method Of Transmitting And Receiving A Multimedia Content

The invention relates to a method of transmitting and receiving a multimedia content scrabbled with the aid of a control word CW comprising:  the encryption (216) of the control word CW with the aid of a mother virtual card so as to obtain a cryptogram CW*  the generation (220) of a message ECM incorporating the cry...

Methods And Burst Transmitters Of A Piece Of Encrypted Multimedia Content, And Storage Medium For Said Methods

The invention pertains to a method for sending an enciphered multimedia content in bursts, wherein the replacing (110; 140) of a current enciphering key TEKj by another current key TEKj+1 to encipher a segment Pi of the multimedia content is delayed until after an instant tdi + TSTKM brought forward to or before an ...

Method Of Protecting A Content

The invention relates to a method of protecting a content to be distributed to a pool of receiving terminals connected to a content distribution network and each having a specific level of security dependent on the technical security means used method comprising the following steps: at the sending end  generating a ...

Method For Securing Messages Transmitted By A Transmitting Terminal To A Remote Receiving Terminal

The invention relates to a method for securing a number n greater than or equal to 1 of messages MUi (i= 1 to n) transmitted by a transmitting terminal to a receiving terminal in which, Before  transmitting,  the  transmitting terminal, a- generating an ordered sequence comprising N data blocks Bj, (j= 1 to N), wh...

Transmission, Reception And Identification Methods,Security Processor And Information Recording Medium For Said Methods

The invention relates to a method for transmitting an additional datum from a security processor to an external device, in which the transmission of the additional datum is carried out by delaying (98) the beginning of an information frame transmission from the security processor to the external device for a duratio...

Documents

CERTIFICATE FOR CLOSURE OF PLACE OF BUSINESS-20160510
-25042016
Optional Attachment-(1)-25042016
Details of directors and key managerial personnel and their remuneration-260216.PDF
Details of penalties-punishment-Compounding of offences-260216.PDF
Details of Promoters - Directors and Key managerial personnel and changes.-260216.PDF
Details of the meeting of the members or class thereof- board and its various committees along with attendance-260216.PDF
Optional Attachment 1-260216.PDF
Particulars of Holding- subsidiary and associate companies and firms has not been attached-260216.PDF
Particulars of members and debenture holders along with changes therein since the close of previous financial year-260216.PDF
Form FC-2-211115.PDF
Copy of the Board resolution- if any--211115.PDF
Form FC-3-300915.OCT
Copy of amended document memorandum-300915.PDF
Copy of the general meeting resolution.-300915.PDF
Form FC-3-081214.OCT
Copy of amended document memorandum-081214.PDF
Copy of the general meeting resolution.-081214.PDF
Form 52-271213.PDF
Optional Attachment 1-271213.PDF
Annual accounts-271213.PDF
Form 52-281212.PDF
Annual accounts-281212.PDF
Optional Attachment 1-281212.PDF
Certificate of establishment of business in India-080411.PDF
Certificate of establishment of business in India-080411.PDF
Optional Attachment 1-190411.PDF
Form 67 -Addendum--190411 in respect of Form 44-080411.PDF
Optional Attachment 1-080411.PDF
List of directors- individuals-080411.PDF