摘要:
Methods and systems for secure watermarking of at least part of a content item X are described, wherein the method comprises: providing a distorted content item X+y, comprising one or more distorted data units wherein the payload of a distorted data unit comprises a distortion signal y which distorts the rendering of the payload in said distorted data unit; providing a compensating watermark payload w-y comprising one or more compensating watermark signals δ-y; using homomorphic encryption for encrypting at least part of said distorted content item X+y and said compensating watermark payload into an encrypted distorted content item E(X+y) and an encrypted compensating watermark payload E(w-y) on the basis of one or more encryption keys; and, combining said encrypted distorted content item with said encrypted compensating watermark payload on the basis of one or more homomorphic computations, wherein said one or more computations modify a distortion signal y in the payload of a distorted data unit into a non-perceptible watermark signal δ.
摘要:
The invention enables a device to discover one or more other devices within range for a device-to-device mode of communication. This proximity discovery may trigger a target device, e.g. to start listening to signals from a source device or perform any other action based on the proximity discovery like e.g. charging at a toll gate. A source device that wants to be discovered broadcasts a message including an identifier or a representation of the identifier. This identifier may be an identifier of the target device to be contacted or of the source device or a derivation thereof or a common security association used by a set of peers. The target device compares the broadcast identifier with a known identifier to establish proximity discovery.
摘要:
Methods and systems are described for secure delivery of a content item from at least a first content distribution network (CDN1) to at least one content receiving entity using a split-key cryptosystem comprising encryption and decryption algorithms E and D, a cipher algorithm for generating encryption and decryption keys e,d on the basis of secret information S and a split-key algorithm using secret information S for splitting e into i different split-encryption keys e 1 ,e 2 ,…,e i and/or for splitting d into k different split-decryption keys d 1 ,d 2 ,…,d k respectively, such that D dk (D dk-1 (…(D d2 (D d1 (E ei (E ei-1 (…(E e2 (E e1 (X))…))= D dk (D dk-1 (…(D d2 (D d1 (X e1,e2,…,ei ))=X wherein i,k≥1 and i+k>2. The method may comprise: a content source providing said at least one CDN1 with at least one an encrypted content item X e ; a key generator associated with said content source comprising said cipher and split-key algorithm generating first split-key information and transmitting said first split-key information to said first CDN1, preferably to a first secure module associated with said CDN1; generating a partially decrypted content item on the basis of said encrypted content item X e , said decryption algorithm D and said first split-key information; and, transmitting said partially decrypted content item to said content receiving entity.
摘要:
The invention enables a device to discover one or more other devices within range for a device-to-device mode of communication. This proximity discovery may trigger a target device, e.g. to start listening to signals from a source device or perform any other action based on the proximity discovery like e.g. charging at a toll gate. A source device that wants to be discovered broadcasts a message including an identifier or a representation of the identifier. This identifier may be an identifier of the target device to be contacted or of the source device or a derivation thereof or a common security association used by a set of peers. The target device compares the broadcast identifier with a known identifier to establish proximity discovery.
摘要:
A method, suitable for content delivery, is described of communicating a value originating at a first node which forms a part of a first entity, to a third node, which first and second node are separated by a second node which is arranged to generate a key distribution scheme. The third node is arranged to receive keys distributed via the key distribution scheme. The method comprises encrypting the value at the first node using a number N generated by the first entity, and a random number r i generated by the third entity, and where r i and N do not have a common divisor, N has large prime factors p and q, and the second entity is in receipt of N but is not in receipt of p and q. The encrypted value is transmitted from the first node through the second node to the third node.
摘要:
A method, suitable for content delivery, is described of communicating a value originating at a first node which forms a part of a first entity, to a third node, which first and second node are separated by a second node which is arranged to generate a key distribution scheme. The third node is arranged to receive keys distributed via the key distribution scheme. The method comprises encrypting the value at the first node using a number N generated by the first entity, and a random number r i generated by the third entity, and where r i and N do not have a common divisor, N has large prime factors p and q, and the second entity is in receipt of N but is not in receipt of p and q. The encrypted value is transmitted from the first node through the second node to the third node.
摘要:
Methods and systems are described for enabling secure delivery of a content item from a content source to a content receiving device associated with a decryption module configured for use with a split-key cryptosystem comprising encryption and decryption algorithms E and D, a cipher algorithm for generating encryption and decryption keys e,d on the basis of secret information S and a split- key algorithm for splitting e and/or d into i different split-encryption keys e 1 ,e 2 ,…,e i and/or k different split-decryption keys d 1 , d 2 ,…,d k respectively, such that Ddk(Ddk- 1 (…(D d2 (D d1 (E ei (E ei-1 (…(E e2 (E e1 (X))…))= D dk (D dk-1 (…(D d2 (D d1 (X e1 , e2 , …,ei ))=X wherein i,k≥1 and i+k>2, wherein the method comprises: provisioning said decryption module with first split-key information comprising at least a first split-key; generating second split-key information comprising at least a second split-key on the basis of said first split-key information, said decryption key d and, optionally, said secret information S; and, provisioning said decryption module with said at least second split-key 1 information for decrypting an encrypted content item X e on the basis of said first and second split-key information and decryption algorithm D in said decryption module.