摘要:
The present invention relates to a method of embedding an additional layer of error correction into an error correcting code, wherein information is encoded into code words of said code over a first Galois field and wherein a number of code words rare arranged in the columns of a code block comprising a user data sub-block and a parity data sub-block In order to provide an additional layer of error correction that can be easily implemented without losing compatibility improving the error correction capabilities, a method is proposed comprising the steps of:—encoding the rows of at least said user data sub-block separately or in groups using a horizontal error correcting code over a second Galois field larger than said first Galois field to obtain horizontal parities,—embedding said horizontal parities as additional layer in said error correcting code.
摘要:
The present invention relates to a method of embedding an additional layer of error correction into an error correcting code such as a product code in a DVD or a picket code in a DVR, wherein information is encoded into code words of said code and wherein a number of code words are arranged in the columns of code block. In order to provide an additional layer of error correction that can be easily implemented without losing compatibility improving the error correction capabilities a method is proposed comprising the steps of: reducing the length of each row of said code block by adding row symbols together according to a predetermined adding rule resulting in a reduced code block, encoding the shortened rows of said reduced code block using a horizontal error correcting code to obtain horizontal parities, embedding said horizontal parities as additional layer in said error correcting code.
摘要:
A physical random function (PUF) is a function that is easy to evaluate but hard to characterize. Controlled physical random functions (CPUFs) are PUFs that can only be accessed via a security program controlled by a security algorithm that is physically bound to the PUF in an inseparable way. CPUFs enable certified execution, where a certificate is produced that proves that a specific computation was carried out on a specific processor In particular, an integrated circuit containing a CPUF can be authenticated using Challenge-Response Pairs (CRPs). The invention provides a mechanism to generate a shared secret between different security programs running on a CPUF.
摘要:
A method for processing one or more terms includes, at a first computation facility, computing an obfuscated numerical representation for each of the terms. The computed obfuscated representations are provided from the first facility to a second computation facility. A result of an arithmetic computation based on the provided obfuscated values is received at the first facility. This received result represents an obfuscation of a result of application of a first function to the terms. The received result is processed to determine the result of application of the first function to the terms.
摘要:
A technique provides a security-sensitive environment. The technique involves establishing a first secure channel from a trusted server to a first data source DA. The technique further involves establishing a second secure channel from the trusted server to a second data source DB. The technique further involves, while the trusted server performs a set of collaborative operations in which the trusted server (i) accesses the first data source through the first secure channel (ii) accesses the second data source through the second secure channel, and (iii) generates a set of collaborative results based on information from the first and second data sources (i.e., the output of f(DA,DB)), running a set of security policy compliance operations in the trusted server to inhibit unauthorized leakage of data in the set of collaborative results.
摘要:
An integrated circuit has a first component that has a dynamic characteristic that varies among like integrated circuits, for example, among integrated circuits fabricated using the same lithography mask. Operating the first component produces an output that is dependent on the dynamic characteristic of the first component. A digital value associated with the integrated circuit is generated using the output of the first component, and then the generated digital value is used in operation of the integrated circuit.
摘要:
A method of generating a common secret between a first party and a second party, preferably devices (101-105) in a home network (100) that operate in accordance with a Digital Rights Management (DRM) framework. The devices calculate the common secret by evaluating the product of two polynomials P(x, y) and Q(x, z) using parameters previously distributed by a Trusted Third Party (TTP) and parameters obtained from the other party. Preferably the parties subsequently verify that the other party has generated the same secret using a zero-knowledge protocol or a commitment-based protocol. The method is particularly suitable for very low power devices such as Chip-In-Disc type devices.
摘要:
An improved technique for verifying a license of a software product includes performing license checks with a server and passing to the server, as part of the license checks, a drifting digital code. The drifting code forms a particular drift pattern, which the server detects over the course of multiple license checks. The drift pattern is typically unique, or relatively unique, to the machine on which the software product is run, and changes in a manner that is difficult for malicious users to replicate on other machines. If a second copy of the software is installed, e.g., if the software is pirated, the second copy will produce a drifting code that has its own drift pattern, which differs from that of the initial copy. The server detects the duplicate copy by observing a divergence in the codes it receives during license checks.
摘要:
A method for providing access to device-specific information includes providing a first value to the device, and then, in the device, using a second value that is a first one-way function of the provided first value to determine a third value such that the third value is a device-specific function of the second value. The third value is then accepted from the device and stored outside the device. Subsequent to accepting the third value from the device, the second value is provided to the device. In the device, the provided second value is used to determine the third value once again and a fourth value is determined that is a second one-way function of the third value. This determining of the fourth value is performed without disclosing the third value outside the device. The fourth value is accepted from the device.
摘要:
The invention relates to a system for improved copy protection comprising a record carrier like a CD-RW+ or a DVD storing copy-protected information and a device for reading from and/or writing to the record carrier. For that the record carrier (1) has a first area (3) storing information (data), which is at least partly stored in encrypted form (EAK(data)), this part being called an asset (EAK(data)), and which includes a first part of decryption information (HCK, EDNK(HCK)), and the record carrier (1) further has a second area (4) storing a second part of decryption information (UCID), wherein both the first (HCK) and second (UCID) parts of decryption information serve in decrypting an asset (EAK(data)). Such distribution of decryption information over at least two areas of the record carrier may further be combined with additional safety mechanisms as e.g. hidden channels, encrypted keys, counter mechanisms, and revocation lists.