Collusion-resistant watermarking and fingerprinting

    公开(公告)号:US20050086487A1

    公开(公告)日:2005-04-21

    申请号:US10975804

    申请日:2004-10-28

    IPC分类号: G06T1/00 H04N1/32 G06K9/00

    摘要: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.

    System and method for detecting fraudulent expenditure of electronic
assets
    23.
    发明授权
    System and method for detecting fraudulent expenditure of electronic assets 失效
    检测电子资产欺诈支出的制度和方法

    公开(公告)号:US5878138A

    公开(公告)日:1999-03-02

    申请号:US600409

    申请日:1996-02-12

    申请人: Yacov Yacobi

    发明人: Yacov Yacobi

    摘要: An electronic asset system includes tamper-resistant electronic wallets that store non-transferable electronic assets. To break such tamper-resistant wallets, the criminal is expected to spend an initial investment to defeat the tamper-resistant protection. The electronic assets are uniquely issued by an institution to a wallet (anonymously or non-anonymously). During expenditure, the electronic assets are transferred from the wallet to a recipient. Since the assets are non-transferable, they are marked as exhausted assets upon expenditure. The recipient then batch deposits the received electronic assets with a collecting institution (which may or may not be the same as the issuing institution). A fraud detection system samples a subset of the exhausted assets received by the recipient to detect "bad" assets which have been used in a fraudulent manner. Upon detection, the fraud detection system identifies the electronic wallet that used the bad asset and marks it as a "bad wallet". The fraud detection system then compiles a list of bad electronic wallets and distributes the list to warn potential recipients of the bad electronic wallets. When a bad wallet next attempts to spend assets (whether fraudulently or not), the intended recipient will check the local hot list of bad wallets and refuse to transact business with the bad wallet.

    摘要翻译: 电子资产系统包括存储不可转让电子资产的防篡改电子钱包。 为了打破这种防篡改钱包,犯罪分子预计将花费初始投资来打败篡改的保护。 电子资产由机构独特地发行到钱包(匿名或非匿名)。 在支出期间,电子资产从钱包转移到收件人。 由于资产不可转让,在支出上标注为资产减值。 接收方然后批量收取收款机构(可能与发行机构相同或不一样)存放收到的电子资产。 欺诈检测系统对接收者收到的用尽资产的子集进行抽样,以检测以欺诈方式使用的“坏”资产。 检测后,欺诈检测系统识别使用不良资产并将其标记为“不良钱包”的电子钱包。 然后,欺诈检测系统编制不良电子钱包列表,并分发列表以向潜在收件人发出不良电子钱包。 当一个坏的钱包下一次尝试花费资产(无论是否欺诈)时,预定的收件人将检查当地的不良钱包列表,并拒绝与坏的钱包进行交易。

    Attribute-based access-controlled data-storage system
    24.
    发明授权
    Attribute-based access-controlled data-storage system 有权
    基于属性的访问控制数据存储系统

    公开(公告)号:US08996863B2

    公开(公告)日:2015-03-31

    申请号:US14159377

    申请日:2014-01-20

    申请人: Yacov Yacobi

    发明人: Yacov Yacobi

    摘要: The current application is directed to computationally efficient attribute-based access control that can be used to secure access to stored information in a variety of different types of computational systems. Many of the currently disclosed computationally efficient implementations of attribute-based access control employ hybrid encryption methodologies in which both an attribute-based encryption or a similar, newly-disclosed policy-encryption method as well as a hierarchical-key-derivation method are used to encrypt payload keys that are employed, in turn, to encrypt data that is stored into, and retrieved from, various different types of computational data-storage systems.

    摘要翻译: 当前的应用涉及基于计算的有效的基于属性的访问控制,其可以用于安全地访问各种不同类型的计算系统中的存储的信息。 目前公开的基于属性的访问控制的计算上有效的实现中的许多使用混合加密方法,其中使用基于属性的加密或类似的新公开的策略加密方法以及分层关键词派生方法 加密所使用的有效载荷密钥,进而加密存储在各种不同类型的计算数据存储系统中和从其中检索的数据。

    Maintaining privacy during user profiling
    25.
    发明授权
    Maintaining privacy during user profiling 有权
    在用户分析期间维护隐私

    公开(公告)号:US08520842B2

    公开(公告)日:2013-08-27

    申请号:US12683586

    申请日:2010-01-07

    IPC分类号: H04L29/06

    摘要: Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain privacy during user profiling are provided. A profiling service receives, from a first device, rules for profiling a user. The rules were encrypted using a private key. The profiling service also receives, from a second device, user data. The user data was encrypted using a public key communicated to the second device by the first device. The profiling service then matches the encrypted rules with the encrypted user data, and based on the matching, generates a profile for the user. In embodiments, such a user profile can be utilized to deliver personalized digital content to a user.

    摘要翻译: 提供了具有在其上体现的具有在用户分析期间保持隐私的计算机可执行指令的系统,方法和计算机存储介质。 分析服务从第一设备接收用于分析用户的规则。 这些规则是使用私钥加密的。 分析服务还从第二设备接收用户数据。 使用由第一设备传送到第二设备的公共密钥对用户数据进行加密。 然后,分析服务将加密的规则与加密的用户数据相匹配,并且基于匹配,为用户生成简档。 在实施例中,可以利用这样的用户简档来向用户传送个性化数字内容。

    Data protection for a mobile device
    26.
    发明授权
    Data protection for a mobile device 有权
    移动设备的数据保护

    公开(公告)号:US07957532B2

    公开(公告)日:2011-06-07

    申请号:US11474016

    申请日:2006-06-23

    IPC分类号: H04K1/00 H04L9/00 H04L9/08

    摘要: A network-based data protection scheme for a mobile device utilizes encryption techniques and a remote key server that stores encryption keys on behalf of the mobile device. The mobile device stores encrypted data, preferably having no unencrypted counterpart stored therewith. On an as-needed basis, the mobile device requests a decryption key (or an encrypted version of a decryption key) from the key server, where the decryption key can be used by the mobile device to decrypt the encrypted information. The key server transmits the decryption key to the mobile device after authenticating the user of the mobile device.

    摘要翻译: 用于移动设备的基于网络的数据保护方案利用加密技术和代表移动设备存储加密密钥的远程密钥服务器。 移动设备存储加密数据,优选地不存储与其一起存储的未加密的对应物。 根据需要,移动设备从密钥服务器请求解密密钥(或解密密钥的加密版本),其中解密密钥可被移动设备用于解密加密的信息。 密钥服务器在认证移动设备的用户之后将解密密钥发送到移动设备。

    Ad-based revenue generation using media-hashing to control fraud
    27.
    发明申请
    Ad-based revenue generation using media-hashing to control fraud 审中-公开
    基于广告的创收使用媒体散列来控制欺诈

    公开(公告)号:US20090287648A1

    公开(公告)日:2009-11-19

    申请号:US12152417

    申请日:2008-05-14

    申请人: Yacov Yacobi

    发明人: Yacov Yacobi

    IPC分类号: H04L9/00 G06F17/30

    摘要: The claimed subject matter provides systems and methods that controls fraud and/or generates revenue. The system can upload media content to a generator that produces a digital certificate that includes a short identifier associated with the content. The system further sends the media content together with the digital certificate associated with the media content to a server that forwards the short identifier to a database engine which in return supplies the server with details associated with the producer of the content. At the request of a playback device the server can download the content to the playback device, at which point the playback device notifies the server to effectuate payment for utilization of the downloaded content by the playback device.

    摘要翻译: 所要求保护的主题提供了控制欺诈和/或产生收入的系统和方法。 该系统可以将媒体内容上传到生成数字证书的生成器,该数字证书包括与内容相关联的短标识符。 该系统还将媒体内容与与媒体内容相关联的数字证书一起发送到将短标识符转发到数据库引擎的服务器,数据库引擎返回为服务器提供与内容的生成者相关联的细节。 根据播放装置的要求,服务器可以将内容下载到播放装置,在此时播放装置通知服务器对由播放装置使用下载的内容进行支付。

    Asymmetric spread-spectrum watermarking systems and methods of use
    28.
    发明授权
    Asymmetric spread-spectrum watermarking systems and methods of use 有权
    不对称扩频水印系统及其使用方法

    公开(公告)号:US07460683B2

    公开(公告)日:2008-12-02

    申请号:US10990155

    申请日:2004-11-16

    IPC分类号: G06K9/00

    摘要: Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kinds of processing and all types of malicious attacks that attempt to remove or modify the watermark from the signal. The implementations of the watermark detecting system, described herein, support quick, efficient, and accurate detection of watermarks by the specifically designed watermark detecting system. In one described implementation, a watermark detecting system employs an improved normalized covariance test to determine the presence of a watermark using less expensive materials (hardware), quicker calculations, and a more accurate test (than the original correlation test). In other described implementations, a watermark detecting system employs a cepstrum filter and dynamic processing to minimize the affect of the “noise” in the watermarked signal. The “noise” is the original content of the signal before such signal was watermarked. In still another described implementation, a watermark detecting system employs a mechanism for random detection threshold so that the act of watermark detection does not provide decipherable clues to a digital pirate as to the value or location of the embedded watermark.

    摘要翻译: 这里描述了用于检测诸如音乐剪辑的音频信号中的水印的音频水印技术。 水印识别内容制作者,提供嵌入在音频信号中的签名,不能被删除。 水印被设计成能够经受所有典型的处理以及尝试从信号中去除或修改水印的所有类型的恶意攻击。 本文所描述的水印检测系统的实现通过专门设计的水印检测系统支持对水印的快速,有效和准确的检测。 在一个描述的实现中,水印检测系统采用改进的归一化协方差测试来使用较便宜的材料(硬件),更快的计算和更精确的测试来确定水印的存在(比原始的相关性测试)。 在其他描述的实现中,水印检测系统采用倒谱滤波器和动态处理来最小化水印信号中“噪声”的影响。 “噪声”是信号在水印之前的原始内容。 在另一个描述的实现中,水印检测系统采用用于随机检测阈值的机制,使得水印检测的动作不向数字盗版者提供关于嵌入水印的值或位置的可解释的线索。

    Semi-public white-box cipher
    29.
    发明申请
    Semi-public white-box cipher 有权
    半公开白盒密码

    公开(公告)号:US20070086586A1

    公开(公告)日:2007-04-19

    申请号:US11251625

    申请日:2005-10-14

    IPC分类号: H04L9/28

    摘要: A computer-implemented system and method for configuring and operating a white-box cipher is disclosed. In one implementation, the system employs a method for configuring pseudorandom data derived from a key to perform key-scheduling functionality associated with rounds of the cipher. Additionally, the system employs a method for generating white-box executable code, wherein the code hides the pseudorandom data by incorporating it into mathematical operations performed during execution of the rounds. Accordingly, the cipher is suited for white-box applications managing digital rights, such as decoding audio, video and other content.

    摘要翻译: 公开了一种用于配置和操作白盒密码的计算机实现的系统和方法。 在一个实现中,系统采用一种用于配置从密钥导出的伪随机数据以执行与密码轮相关联的密钥调度功能的方法。 另外,该系统采用一种产生白盒可执行代码的方法,其中该代码通过将伪随机数据并入到执行循环期间执行的数学运算中来隐藏伪随机数据。 因此,该密码适用于管理数字权利的白盒应用,例如解码音频,视频和其他内容。

    Systems for fingerprinting digital data
    30.
    发明申请
    Systems for fingerprinting digital data 失效
    数字数据指纹系统

    公开(公告)号:US20050117777A1

    公开(公告)日:2005-06-02

    申请号:US11021192

    申请日:2004-12-22

    申请人: Yacov Yacobi

    发明人: Yacov Yacobi

    摘要: Systems for fingerprinting digital data are described. In one embodiment, a system is configured to form a Γ code by defining a plurality of fingerprinting words. Each fingerprinting word is unique and contains at least one spread sequence. Each fingerprinting word contains a plurality of Γ-symbols, each Γ-symbol containing 2c-1 spread sequences, where c is the number of colluders that are desired to be defended against. The fingerprinting words are structured to permit a collusion analysis to ascertain identities of potential colluders who change an associated fingerprinting word. The individual fingerprinting words are assigned to individual respective entities who constitute potential colluders and serve to identify an entity to which it is assigned.

    摘要翻译: 描述数字数据指纹系统。 在一个实施例中,系统被配置为通过定义多个指纹词来形成伽马码。 每个指纹字是唯一的,并且包含至少一个扩展序列。 每个指纹字包含多个Gamma符号,每个Gamma符号包含2c-1扩展序列,其中c是希望防御的共谋者的数目。 指纹字被构造成允许串通分析以确定改变相关指纹词的潜在共谋者的身份。 单独的指纹词被分配给构成潜在共谋者的各个实体,并且用于识别被分配给其的实体。