Method for effective tamper resistance
    21.
    发明授权
    Method for effective tamper resistance 有权
    有效防篡改的方法

    公开(公告)号:US07996685B2

    公开(公告)日:2011-08-09

    申请号:US12135052

    申请日:2008-06-06

    IPC分类号: G06F21/00

    CPC分类号: G06F21/14

    摘要: A system, method, and computer program product for preventing a malicious user from analyzing and modifying software content. The one-way functions used in prior art systems using dynamically evolving audit logs or self-modifying applications are replaced with a one-way function based on group theory. With this modification, untampered key evolution will occur inside a defined mathematical group such that all valid key values form a subgroup. However, if the program is altered, the key will evolve incorrectly and will no longer be a member of the subgroup. Once the key value is outside of the subgroup, it is not possible to return it to the subgroup. The present invention provides a limited total number of valid keys. The key evolution points are not restricted to locations along the deterministic path, so the key can be used in various novel ways to regulate the program's behavior, including in non-deterministic execution paths.

    摘要翻译: 一种用于防止恶意用户分析和修改软件内容的系统,方法和计算机程序产品。 使用动态演进的审计日志或自修改应用程序的现有技术系统中使用的单向函数被基于组理论的单向函数所取代。 通过这种修改,无限制的密钥演进将发生在定义的数学组内,使得所有有效的密钥值形成一个子组。 但是,如果程序被更改,则密钥将不正确地发展,不再是该子组的成员。 一旦键值超出了子组,就不可能将其返回到子组。 本发明提供了有限的总数量的有效密钥。 关键演化点不仅限于确定路径上的位置,所以密钥可以以各种新颖的方式用于调节程序的行为,包括在非确定性执行路径中。

    Security Classes in a Media Key Block
    22.
    发明申请
    Security Classes in a Media Key Block 失效
    媒体密钥块中的安全类

    公开(公告)号:US20100040231A1

    公开(公告)日:2010-02-18

    申请号:US12192962

    申请日:2008-08-15

    IPC分类号: H04L9/32 H04L9/08

    摘要: According to one embodiment of the present invention, a method for broadcast encryption with security classes in a media key block is provided. In one embodiment the method includes receiving encrypted media of a first and a second class, where the media includes a common media key block, in a device of a first class and in a device of a second class. A first media key is calculated from the common media key block in the device of a first class. A first media key precursor is calculated from the common media key block in the device of a second class. The first media precursor may be used to decrypt media of a first class. The first media precursor may also be used to calculate a second media key in the device of a second class to decrypt content of a first class.

    摘要翻译: 根据本发明的一个实施例,提供了一种用于在媒体密钥块中具有安全类别的广播加密的方法。 在一个实施例中,该方法包括在第一类的设备和第二类的设备中接收第一类和第二类的加密媒体,其中媒体包括公共媒体密钥块。 从第一类设备中的公共媒体密钥块计算第一媒体密钥。 从第二类设备中的公共媒体密钥块计算第一媒体密钥前体。 第一媒体前体可用于解密第一类的媒体。 也可以使用第一媒体前体来计算第二类的设备中的第二媒体密钥来解密第一类的内容。

    TRAITOR DETECTION FOR MULTILEVEL ASSIGNMENT
    23.
    发明申请
    TRAITOR DETECTION FOR MULTILEVEL ASSIGNMENT 有权
    TRAITOR检测多用户分配

    公开(公告)号:US20090320130A1

    公开(公告)日:2009-12-24

    申请号:US12143061

    申请日:2008-06-20

    IPC分类号: G06F21/00

    摘要: One embodiment of the present invention includes a method for traitor tracing that includes performing an inner code traitor tracing on a recovered pirated digital file, the recovered digital file incorporating an inner code for assigning segments of the digital file and an outer code for assigning inner codes to individual digital files. The method also includes extracting partial information regarding the outer code from the inner code tracing. An outer code tracing procedure may then be performed using the partial information.

    摘要翻译: 本发明的一个实施例包括一种用于叛徒追踪的方法,其包括在恢复的盗版数字文件上执行内部代码叛逆者跟踪,所述恢复的数字文件包含用于分配数字文件的段的内部代码和用于分配内部代码的外部代码 个人数字文件。 该方法还包括从内部代码跟踪中提取关于外部代码的部分信息。 然后可以使用部分信息来执行外部代码跟踪过程。

    Security classes in a media key block
    24.
    发明授权
    Security classes in a media key block 失效
    媒体密钥块中的安全类

    公开(公告)号:US08422684B2

    公开(公告)日:2013-04-16

    申请号:US12192962

    申请日:2008-08-15

    IPC分类号: H04L9/00

    摘要: According to one embodiment of the present invention, a method for broadcast encryption with security classes in a media key block is provided. In one embodiment the method includes receiving encrypted media of a first and a second class, where the media includes a common media key block, in a device of a first class and in a device of a second class. A first media key is calculated from the common media key block in the device of a first class. A first media key precursor is calculated from the common media key block in the device of a second class. The first media precursor may be used to decrypt media of a first class. The first media precursor may also be used to calculate a second media key in the device of a second class to decrypt content of a first class.

    摘要翻译: 根据本发明的一个实施例,提供了一种用于在媒体密钥块中具有安全类别的广播加密的方法。 在一个实施例中,该方法包括在第一类的设备和第二类的设备中接收第一类和第二类的加密媒体,其中媒体包括公共媒体密钥块。 从第一类设备中的公共媒体密钥块计算第一媒体密钥。 从第二类设备中的公共媒体密钥块计算第一媒体密钥前体。 第一媒体前体可用于解密第一类的媒体。 也可以使用第一媒体前体来计算第二类的设备中的第二媒体密钥来解密第一类的内容。

    System and method for assigning sequence keys to a media player to enable flexible traitor tracing
    26.
    发明授权
    System and method for assigning sequence keys to a media player to enable flexible traitor tracing 有权
    用于将序列键分配给媒体播放器以实现灵活的叛逆者追踪的系统和方法

    公开(公告)号:US07711114B2

    公开(公告)日:2010-05-04

    申请号:US11231174

    申请日:2005-09-19

    IPC分类号: G06F21/00

    摘要: A traitor tracing enabling system assigns sequence keys to a media player to enable better tracability with fewer actual variations in the content. The system comprises a technique for increasing a number of sequence keys, allowing a finer granularity in a traitor tracing process with little increase in sequence key storage or in bandwidth required to transmit sequence keys to a media player. The present system comprises a variation table which maps the sequence keys to the individual variations in the file, such that multiple sequence keys can be mapped to a single variation.

    摘要翻译: 叛逆追踪启用系统将序列密钥分配给媒体播放器,以实现更好的可跟踪性,同时减少内容的实际变化。 该系统包括用于增加多个序列密钥的技术,允许在追踪跟踪过程中更细的粒度,其中序列密钥存储器的增加很少或将序列密钥发送到媒体播放器所需的带宽中。 本系统包括将序列密钥映射到文件中的各个变体的变化表,使得可以将多个序列密钥映射到单个变体。

    SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES
    27.
    发明申请
    SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES 有权
    用于跟踪内容保护环境设备的系统,方法和服务

    公开(公告)号:US20090327717A1

    公开(公告)日:2009-12-31

    申请号:US12134113

    申请日:2008-06-05

    IPC分类号: H04L9/32 G06G7/62 G06N5/02

    摘要: A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.

    摘要翻译: 叛逆者追踪系统产生对避开装置的假设模型,以模拟被规避装置损害的假设的一组装置钥匙。 系统迭代地调用子集跟踪系统以识别受损的设备密钥,直到被识别的设备密钥集中的基本上所有受损设备密钥被识别为禁用规避设备。 子集跟踪系统生成规避设备模型,其使用先验知识对规避设备的行为进行建模,并且系统基于假设模型和规避设备模型迭代地选择并应用到规避设备的测试,并且接收来自规避设备的响应 表明在规避设备上播放受保护内容的测试成功。 系统使用接收到的响应,所选择的测试,假设模型的当前版本和规避设备模型的当前版本来更新假设模型,以将测试选择过程集中在确定从叛徒获得的设备密钥。

    ADAPTIVE TRAITOR TRACING
    28.
    发明申请
    ADAPTIVE TRAITOR TRACING 有权
    自适应TRAITOR跟踪

    公开(公告)号:US20090319227A1

    公开(公告)日:2009-12-24

    申请号:US12143658

    申请日:2008-06-20

    IPC分类号: G06F17/18

    摘要: One embodiment of the present invention includes a method for traitor tracing that selects a probability distribution for the assignment of file-segment variations in a digital file. This probability distribution is selected to improve traceability for a particular size of a coalition of attackers. At least one symbol for each file-segment variation is then distributed based on the selected probability distribution.

    摘要翻译: 本发明的一个实施例包括一种用于叛逆者跟踪的方法,其选择用于数字文件中的文件段变体的分配的概率分布。 选择这种概率分布来提高攻击者联盟特定大小的可追溯性。 然后,基于所选择的概率分布来分配每个文件段变化的至少一个符号。

    METHOD FOR EFFECTIVE TAMPER RESISTANCE
    29.
    发明申请
    METHOD FOR EFFECTIVE TAMPER RESISTANCE 审中-公开
    有效阻力的方法

    公开(公告)号:US20080148061A1

    公开(公告)日:2008-06-19

    申请号:US11613001

    申请日:2006-12-19

    IPC分类号: G06F11/30

    CPC分类号: G06F21/14

    摘要: A system, method, and computer program product for preventing a malicious user from analyzing and modifying software content. The one-way functions used in prior art systems using dynamically evolving audit logs or self-modifying applications are replaced with a one-way function based on group theory. With this modification, untampered key evolution will occur inside a defined mathematical group such that all valid key values form a subgroup. However, if the program is altered, the key will evolve incorrectly and will no longer be a member of the subgroup. Once the key value is outside of the subgroup, it is not possible to return it to the subgroup. The present invention provides a limited total number of valid keys. The key evolution points are not restricted to locations along the deterministic path, so the key can be used in various novel ways to regulate the program's behavior, including in non-deterministic execution paths.

    摘要翻译: 一种用于防止恶意用户分析和修改软件内容的系统,方法和计算机程序产品。 使用动态演进的审计日志或自修改应用程序的现有技术系统中使用的单向函数被基于组理论的单向函数所取代。 通过这种修改,无限制的密钥演进将发生在定义的数学组内,使得所有有效的密钥值形成一个子组。 但是,如果程序被更改,则密钥将不正确地发展,不再是该子组的成员。 一旦键值超出了子组,就不可能将其返回到子组。 本发明提供了有限的总数量的有效密钥。 关键演化点不仅限于确定路径上的位置,所以密钥可以以各种新颖的方式用于调节程序的行为,包括在非确定性执行路径中。

    System and method to proactively detect software tampering
    30.
    发明授权
    System and method to proactively detect software tampering 有权
    主动检测软件篡改的系统和方法

    公开(公告)号:US07305564B2

    公开(公告)日:2007-12-04

    申请号:US10248130

    申请日:2002-12-19

    IPC分类号: G06F11/30 H04L9/00

    摘要: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

    摘要翻译: 使用动态演进的审计日志主动检测软件入侵,其中日志条目在审计日志中生成,并且密钥值是根据先前日志条目和先前密钥两者的单向函数进行演变的。 具有生成的日志条目和最终密钥值的审核日志被传送到通过分析这些值来检测软件入侵的清算站。 为了减少要发送的日志的大小,日志条目被分配相同的值,因此只需要将一个日志条目和最后一个密钥值发送到清算所。