摘要:
A fingerprinting method. For each round in a series of rounds: providing to each receiver in a set of receivers a version of a source item of content, the source item of content corresponding to the round. For the round there is a corresponding part of a fingerprint-code for the receiver, the part includes one or more symbols. The version provided to the receiver represents those one or more symbols. One or more corresponding symbols are obtained from a suspect item as a corresponding part of a suspect-code. For each receiver in the set of receivers, a corresponding score that indicates a likelihood that the receiver is a colluding-receiver is updated.
摘要:
A method is provided for obfuscating code generated from a block diagram model in a graphical programming environment. The obfuscation may be removed through the use of a password. Incorporating the obfuscated code in a block diagram allows for code to be generated from the block diagram incorporating the obfuscated code.
摘要:
Apparatus and method for data security through the use of an encrypted keystore data structure. In accordance with some embodiments, first and second sets of input data are respectively encrypted using first and second encryption keys to form corresponding first and second encrypted data sets. The first and second encryption keys are combined to form a string. A hidden key stored within a system on chip (SOC) is used to encrypt the string to form an encrypted keystore data structure, and the first and second encrypted data sets and the encrypted keystore data structure are stored in a memory.
摘要:
Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed.
摘要:
A method for water-marking digital books with parameters involves developing, for each parameter, a new typeface on the basis of a pre-existing typeface, by creating at least one new code/glyph pair. The method also includes developing a new coded text on the basis of the pre-existing coded text by replacing, in the pre-existing coded text, at least one code or group of codes from the pre-existing typeface. The method further includes allowing display of a character or a combination of characters from the digital book by the code or the group of codes from the new typeface allowing display of the graphically identical character or combination of characters on any screen. The code or this group of codes from the new typeface having at least the code from the new code/glyph pair, providing the new coded text and the new typeface as a water-marked digital book.
摘要:
Methods and systems to allow for selective access to supplemental content that is associated with more generally distributed original content. In an embodiment, supplemental content may be encrypted, then integrated with original content using a steganographic technique. The resulting aggregated content may then be made available to users. Users may then extract the encrypted supplemental content from the original content. Those users having the proper privilege level may be given a cryptographic key to allow decryption of the supplemental content. Those without the necessary privilege will not be given this decryption key, and will therefore be unable to access the supplemental content.
摘要:
A method and system for processing data is described, the method and system including encoding a string of symbols, each having a respective symbol value, as a sequence of vectors, each vector including a respective number of repetitions of a sub-vector of a predefined length, such that the respective number of the repetitions in each vector in the sequence is indicative of the respective symbol value of a corresponding symbol in the string, and applying a watermark to an item of content including digital data by inserting the sequence of the vectors into the data. Related methods, systems and apparatus are also described.
摘要:
The present invention relates to a method for transferring content to a device, the method including the steps of: receiving a request for content from the device; delivering a uniquely identifiable, ephemeral player to the device; and transferring content to the device, for presentation on the device by the player. The invention has particular application to digital rights management in respect of the distribution of audiovisual content such as film and television programs, advertisements and live event broadcasts over communication networks such as the Internet.
摘要:
An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one embodiment of the invention comprises: initializing a secure enclave in response to a first command, the secure enclave comprising a trusted software execution environment which prevents software executing outside the enclave from having access to software and data inside the enclave; and executing a trusted platform module (TPM) from within the secure enclave, the trusted platform module securely reading data from a set of platform control registers (PCR) in a processor or chipset component into a memory region allocated to the secure enclave.
摘要:
Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed.