Scalable layered access control for multimedia
    11.
    发明申请
    Scalable layered access control for multimedia 有权
    可扩展分层访问控制多媒体

    公开(公告)号:US20050276416A1

    公开(公告)日:2005-12-15

    申请号:US10869280

    申请日:2004-06-15

    IPC分类号: H04N7/167

    摘要: A flexible framework for generating “scalable layered access” codestreams allows a bitstream architect to select the number of access types and the number of access layers within each access type. At least some of the access layers are encrypted (or scrambled). Some of the access layers may be left unencrypted or unscrambled to allow free access to those layers. The framework facilitates simultaneous access of multimedia content by different users enjoying selective decryption of different access types and different access layers. An exemplary key schema for the framework sends only one or only a few keys to an end user for a given access layer, from which decryption keys for the content can be derived by hashing and then combining under a Group Diffie-Hellman key agreement. In one implementation, only one key is sent in a license to an end user and other partial key information for Group Diffie-Hellman combination with the licensed key is included in the publicly distributed codestream.

    摘要翻译: 用于生成“可分级分层访问”码流的灵活框架允许比特流架构师选择每种访问类型中的访问类型的数量和访问层数。 至少一些接入层被加密(或加扰)。 一些访问层可以保持未加密或解扰,以允许对这些层的自由访问。 该框架便于不同用户同时访问多媒体内容,享受不同接入类型和不同接入层的选择性解密。 用于框架的示例性关键模式仅向给定访问层的最终用户发送一个或仅几个密钥,通过散列然后根据Group Diffie-Hellman密钥协议来组合内容的解密密钥。 在一个实现中,只有一个密钥在许可证中发送给最终用户,并且用于具有许可密钥的组Diffie-Hellman组合的其他部分密钥信息被包括在公开分发的码流中。

    Elliptic curve point multiplication
    12.
    发明授权
    Elliptic curve point multiplication 有权
    椭圆曲线点乘法

    公开(公告)号:US07602907B2

    公开(公告)日:2009-10-13

    申请号:US11173251

    申请日:2005-07-01

    IPC分类号: H04K1/00 H04K3/00

    摘要: Systems and methods configured for recoding an odd integer and elliptic curve point multiplication are disclosed, having general utility and also specific application to elliptic curve point multiplication and cryptosystems. In one implementation, the recoding is performed by converting an odd integer k into a binary representation. The binary representation could be, for example, coefficients for powers of two representing the odd integer. The binary representation is then configured as comb bit-columns, wherein every bit-column is a signed odd integer. Another implementation applies this recoding method and discloses a variation of comb methods that computes elliptic curve point multiplication more efficiently and with less saved points than known comb methods. The disclosed point multiplication methods are then modified to be Simple Power Analysis (SPA)-resistant.

    摘要翻译: 公开了用于重新编码奇整数和椭圆曲线点乘法的系统和方法,其具有一般实用性,并且还具体应用于椭圆曲线点乘法和密码系统。 在一个实现中,通过将奇数整数k转换成二进制表示来执行重新编码。 二进制表示可以是例如表示奇整数的两个幂的系数。 然后将二进制表示配置为梳状位列,其中每个位列是带符号的奇整数。 另一种实现方式应用这种重新编码方法,并且公开了一种梳理方法的变体,它们比已知的梳理方法更有效地计算椭圆曲线点乘积并且具有较少的保存点。 然后将所公开的点乘法方法修改为抗电阻简单功率分析(SPA)。

    Distributed single sign-on service
    13.
    发明申请
    Distributed single sign-on service 有权
    分布式单点登录服务

    公开(公告)号:US20070044143A1

    公开(公告)日:2007-02-22

    申请号:US11208509

    申请日:2005-08-22

    IPC分类号: G06F17/30

    摘要: The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the establishment of an authenticated communication session. However, the authentication servers are not necessarily trusted authorities. That is, secrets of the various described devices are not revealed to each other.

    摘要翻译: 所描述的实现涉及在客户端计算设备和服务提供商之间建立认证通信。 在一个实现中,一旦注册过程完成,则客户端计算设备和服务提供商使用多个认证服务器来促进认证通信会话的建立。 然而,认证服务器不一定是受信任的权限。 也就是说,各种描述的装置的秘密不会彼此泄露。

    JPEG2000 SYNTAX-COMPLIANT ENCRYPTION WITH FULL SCALABILITY
    14.
    发明申请
    JPEG2000 SYNTAX-COMPLIANT ENCRYPTION WITH FULL SCALABILITY 有权
    JPEG2000具有完整的可扩展性的合成加密

    公开(公告)号:US20060265601A1

    公开(公告)日:2006-11-23

    申请号:US11419468

    申请日:2006-05-19

    IPC分类号: H04K1/00

    CPC分类号: H04K1/00 H04L9/0637

    摘要: A method and system is provided for encrypting an image compressed with a JPEG2000-based compression with minimal overhead so that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression and can be scaled without decrypting. The encryption system generates, for each independent encryption segment of a codestream for an image, a unique initialization vector from a global initialization vector in such a way that the initialization vectors can be generated during decryption from the global initialization vector, even after truncation. The encryption system encrypts each independent encryption segment using its unique initialization vector. The encryption system ensures that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression both as originally generated and as truncated by an encryption-unaware device.

    摘要翻译: 提供了一种方法和系统,用于以最小的开销加密用基于JPEG2000的压缩压缩的图像,使得加密的码流符合基于JPEG2000的压缩的语法,并且可以在不进行解密的情况下进行缩放。 加密系统对于图像的码流的每个独立加密段产生来自全局初始化向量的唯一初始化向量,使得即使在截断之后也可以在全局初始化向量的解密期间生成初始化向量。 加密系统使用其唯一的初始化向量来加密每个独立的加密段。 加密系统确保加密的码流符合基于JPEG2000的压缩的语法,原始生成并被加密不知情的设备截断。

    Ciphertext switching for syntax compliant encryption
    15.
    发明申请
    Ciphertext switching for syntax compliant encryption 有权
    用于符合语法的加密的密文切换

    公开(公告)号:US20060210081A1

    公开(公告)日:2006-09-21

    申请号:US11081279

    申请日:2005-03-16

    IPC分类号: H04L9/00

    摘要: Systems and methods providing ciphertext switching for syntax compliant encryption are described. In one aspect, intermediate ciphertext is generated from syntax compliant plaintext. Post-processing is applied to the intermediate ciphertext to determine if there are any illegal symbols in the intermediate ciphertext. If an illegal symbol is located, the illegal symbol in the intermediate ciphertext is switched with a corresponding plaintext symbol. One or more iterations of the post-processing and switching operations result in syntax compliant ciphertext.

    摘要翻译: 描述了为符合语法的加密提供密文切换的系统和方法。 在一个方面,从语法兼容的明文生成中间密文。 后处理应用于中间密文以确定中间密文中是否存在任何非法符号。 如果存在非法符号,则用相应的明文符号切换中间密文中的非法符号。 后处理和切换操作的一个或多个迭代导致符合语法的密文。

    Image-based CAPTCHA exploiting context in object recognition
    16.
    发明授权
    Image-based CAPTCHA exploiting context in object recognition 有权
    基于图像的CAPTCHA利用对象识别中的上下文

    公开(公告)号:US08483518B2

    公开(公告)日:2013-07-09

    申请号:US12709311

    申请日:2010-02-19

    IPC分类号: G06K9/60

    摘要: Techniques for an image-based CAPTCHA for object recognition are described. The disclosure describes adding images to a database by collecting images by querying descriptive keywords to an image search engine or crawling images from the Internet.The disclosure describes generating the image-based CAPTCHA. The image is retrieved from the database, along with objects having significant values. An object is cropped from its image. The portion on the image where the object has been cropped is filled with image inpainting. The process obtains other objects from the database. The object is mixed among the other objects to form a set of candidate objects. A user is asked to select “the object” from the set of candidate objects that fits or matches the image. The image-based CAPTCHA evaluates whether a response, the selection, is from a human or a bot.

    摘要翻译: 描述了用于对象识别的基于图像的CAPTCHA的技术。 本公开内容描述了通过向图像搜索引擎查询描述性关键词或从因特网爬行图像来收集图像来向图像数据库添加图像。 该公开内容描述了生成基于图像的CAPTCHA。 从数据库中检索图像以及具有重要值的对象。 一个物体从其图像中裁剪出来。 被裁剪对象的图像部分填充有图像修复。 该进程从数据库获取其他对象。 对象在其他对象之间进行混合以形成一组候选对象。 要求用户从适合或匹配图像的候选对象集中选择“对象”。 基于图像的CAPTCHA评估响应,选择是来自人还是机器人。

    JPEG2000 syntax-compliant encryption with full scalability
    17.
    发明授权
    JPEG2000 syntax-compliant encryption with full scalability 有权
    具有完全可扩展性的JPEG2000语法兼容加密

    公开(公告)号:US08081755B2

    公开(公告)日:2011-12-20

    申请号:US11419468

    申请日:2006-05-19

    CPC分类号: H04K1/00 H04L9/0637

    摘要: A method and system is provided for encrypting an image compressed with a JPEG2000-based compression with minimal overhead so that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression and can be scaled without decrypting. The encryption system generates, for each independent encryption segment of a codestream for an image, a unique initialization vector from a global initialization vector in such a way that the initialization vectors can be generated during decryption from the global initialization vector, even after truncation. The encryption system encrypts each independent encryption segment using its unique initialization vector. The encryption system ensures that the encrypted codestream is compliant with the syntax of the JPEG2000-based compression both as originally generated and as truncated by an encryption-unaware device.

    摘要翻译: 提供了一种方法和系统,用于以最小的开销加密用基于JPEG2000的压缩压缩的图像,使得加密的码流符合基于JPEG2000的压缩的语法,并且可以在不进行解密的情况下进行缩放。 加密系统对于图像的码流的每个独立加密段产生来自全局初始化向量的唯一初始化向量,使得即使在截断之后也可以在全局初始化向量的解密期间生成初始化向量。 加密系统使用其唯一的初始化向量来加密每个独立的加密段。 加密系统确保加密的码流符合基于JPEG2000的压缩的语法,原始生成并被加密不知情的设备截断。

    Locally interative encryption generating compliant ciphertext for general syntax specifications
    18.
    发明授权
    Locally interative encryption generating compliant ciphertext for general syntax specifications 有权
    本地迭代加密生成符合一般语法规范的密文

    公开(公告)号:US07769168B2

    公开(公告)日:2010-08-03

    申请号:US11095048

    申请日:2005-03-31

    IPC分类号: H04K1/06

    摘要: A fast and secure syntax compliant encryption schema, “locally iterative encryption,” can produce compliant ciphertext for a general syntax specification. In one implementation, an engine partitions a data stream into blocks, and encrypts each block iteratively until syntax compliance conditions are met. A system using the schema can utilize either stream ciphers or block ciphers in different modes. Locally iterative encryption methods are fast and remain at approximately the same speed even as the length of the data stream to be encrypted increases. Besides providing superior processing speed, the locally iterative encryption schema is also more robust to errors in the resulting ciphertext and in the resulting decrypted plaintext than conventional syntax compliant encryption techniques. Locally iterative encryption is secure as long as an underlying encryption cipher selected for use in the schema is secure.

    摘要翻译: 快速和安全的语法兼容加密模式“本地迭代加密”可以为通用语法规范提供符合规定的密文。 在一个实现中,引擎将数据流分割成块,并且迭代地对每个块进行加密,直到满足语法符合条件。 使用该模式的系统可以利用不同模式的流密码或块密码。 即使要加密的数据流的长度增加,本地迭代加密方法也是快速且保持大致相同的速度。 除了提供优越的处理速度之外,本地迭代加密模式对于所生成的密文中的错误以及生成的解密明文也比传统的符合法规的加密技术更加鲁棒。 只要选择用于模式的底层加密密码是安全的,本地迭代加密就是安全的。

    Scalable layered access control for multimedia
    19.
    发明授权
    Scalable layered access control for multimedia 有权
    可扩展分层访问控制多媒体

    公开(公告)号:US07756271B2

    公开(公告)日:2010-07-13

    申请号:US10869280

    申请日:2004-06-15

    IPC分类号: H04N7/167

    摘要: A flexible framework for generating “scalable layered access” codestreams allows a bitstream architect to select the number of access types and the number of access layers within each access type. At least some of the access layers are encrypted (or scrambled). Some of the access layers may be left unencrypted or unscrambled to allow free access to those layers. The framework facilitates simultaneous access of multimedia content by different users enjoying selective decryption of different access types and different access layers. An exemplary key schema for the framework sends only one or only a few keys to an end user for a given access layer, from which decryption keys for the content can be derived by hashing and then combining under a Group Diffie-Hellman key agreement. In one implementation, only one key is sent in a license to an end user and other partial key information for Group Diffie-Hellman combination with the licensed key is included in the publicly distributed codestream.

    摘要翻译: 用于生成“可分级分层访问”码流的灵活框架允许比特流架构师选择每种访问类型中的访问类型的数量和访问层数。 至少一些接入层被加密(或加扰)。 一些访问层可以保持未加密或解扰,以允许对这些层的自由访问。 该框架便于不同用户同时访问多媒体内容,享受不同接入类型和不同接入层的选择性解密。 用于框架的示例性关键模式仅向给定访问层的最终用户发送一个或仅几个密钥,通过散列然后根据Group Diffie-Hellman密钥协议来组合内容的解密密钥。 在一个实现中,只有一个密钥在许可证中发送给最终用户,并且用于具有许可密钥的组Diffie-Hellman组合的其他部分密钥信息被包括在公开分发的码流中。

    Distributed single sign-on service
    20.
    发明授权
    Distributed single sign-on service 有权
    分布式单点登录服务

    公开(公告)号:US07690026B2

    公开(公告)日:2010-03-30

    申请号:US11208509

    申请日:2005-08-22

    IPC分类号: G06F17/30

    摘要: The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the establishment of an authenticated communication session. However, the authentication servers are not necessarily trusted authorities. That is, secrets of the various described devices are not revealed to each other.

    摘要翻译: 所描述的实现涉及在客户端计算设备和服务提供商之间建立认证通信。 在一个实现中,一旦注册过程完成,则客户端计算设备和服务提供商使用多个认证服务器来促进认证通信会话的建立。 然而,认证服务器不一定是受信任的权限。 也就是说,各种描述的装置的秘密不会彼此泄露。