Abstract:
Systems and methods are described herein for validating computer hardware identification information. A validation server can receive a request from an offer provider to validate an instance of computer hardware for enrollment in an offer. The offer may be associated with a service identifier. The validation server can request a hardware identification code from the instance of computer hardware. The validation server can receive the hardware identification code from the instance of computer hardware. The validation server can validate that the hardware identification code is eligible to enroll in the offer associated with the service identifier and then transmit a response to the offer provider indicating the validated status while maintaining privacy of the hardware identification code away from the offer provider.
Abstract:
Techniques for peer to peer attestation are provided. An example method includes receiving, at a first device, a discovery message from a second device, based on the discovery message, establishing a communication channel between the first device and the second device, receiving, at the first device, identity information from the second device, the identity information including one or more of: a trusted platform module (TPM) endorsement key certificate, a public portion of an identity key, one or more platform control register (PCR) values or a quote of the PCR values with the identity key, verifying, at the first device, one or more of the PCR values, the quote or the endorsement key certificate and authenticating one or more of the communication channel or the identity information of the second device based on the verification of a signature received from the second device.
Abstract:
A system to facilitate media content protection is provided. The system includes a partitioning component, a key derivation component and an output component. The partitioning component partitions encrypted media content associated with a master key into a plurality of media content segments. The key derivation component generates respective subkeys for the plurality of media content segments based at least in part on the master key and one or more parameters associated with one or more memory operations. The output component generates decrypted media content based at least in part on the respective subkeys.
Abstract:
A system to facilitate media content protection is provided. The system includes a partitioning component, a key derivation component and an output component. The partitioning component partitions encrypted media content associated with a master key into a plurality of media content segments. The key derivation component generates respective subkeys for the plurality of media content segments based at least in part on the master key and one or more parameters associated with one or more memory operations. The output component generates decrypted media content based at least in part on the respective subkeys.
Abstract:
A method includes receiving a request for a device to replace a unique identifier associated with the device with a revocable identifier, generating a revocable identifier for the device, wherein the revocable identifier comprises at least a cryptographic representation of the unique identifier associated with the device and a counter value, checking the generated revocable identifier to determine that the generated revocable identifier has not previously been generated for the device and associating the generated revocable identifier with the device.