摘要:
The invention relates to a device (250) and a method for key block based authentication. In order to overcome the problems of known devices and method for authentication and to allow for an effective key block and/or application revocation wherein it is ensured that valid and new revocation information reaches said device and is used for authentication, a device (250) for a key block based authentication is proposed comprising authentication means (252) for authenticating between said device (250) having revocation information (254) and an application unit to be authenticated having a key block (AKB) by means of said revocation information (254) and said key block (AKB), and internal trigger means (256) for triggering a process of renewing of said revocation information (254).
摘要:
In order to efficiently prevent the save-and-restore attack on usage rights associated with digital work, these usage rights are protected by a hidden channel. In order to make it a difficult or expensive to manipulate the hidden channel, a device is proposed comprising: writing means (34) for writing on a record carrier (20) said digital work (DW) and attached usage right information (22) defining one or more conditions to be satisfied in order for the usage right to be exercised,—fingerprint extraction means (23) for deriving fingerprint data (24) from physically uncontrollable, changeable non-uniformities on said record carrier (20), and authentication means (25) for generating authentication data (26) from said fingerprint data (24) and said usage right information (22), said authentication data being provided for authenticating said usage right information, said writing means (34) being adapted for writing said authentication data (25) on said record carrier (20).
摘要:
A transmitter provides receivers conditional access to data transmitted via a network. A content encryptor is used to encrypt the data under control of a same authorization key before it is transmitted to all receivers. The transmitter has a storage with a plurality of device keys. A further encryptor is used for producing a key block with a plurality of entries, where each entry is associated with a respective one of the device keys. At least some of the entries contain a representation of the authorization key encrypted with the associated device key. The transmitter transmits the same key block to all receivers.The receiver has a subset of the device keys. A first decryptor is used to retrieve the authorization key by decrypting at least one entry of the key block that is associated with one of the device keys of the receiver. A second decryptor is used for decrypting the data under control of the authorization key.
摘要:
An optical device for multiplexing/demultiplexing optical wavelength signals comprises arrayed waveguide grating devices. To one thereof an optical signal, e.g. one of the optical wavelength signals or an optical signal from a reference source, is input so that its corresponding output signal can be used as a temperature control signal for a temperature control means of the waveguide device. Thus optimization for one optical wavelength signal automatically leads to optimization of all other optical wavelength signals.
摘要:
An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated, then it is determined if the first party qualifies for a sub-authorization. The sub-authorization depends on a value of a grace-counter associated with a number of times that first parties have been qualified for the sub-authorization. If the first party qualifies for the sub-authorization, the operation is performed and the grace counter is decremented. If the first party is authenticated, then the grace counter is set to a predetermined number.
摘要:
In a method for providing copy-protection services on a storage medium (for instance a solid state memory module), the data are arranged in sectors to which a field (S4T) is associated, where said field contains a random value Ri which is changed randomly when writing data to said sector. By encrypting the data stored on the medium using a key which depends critically on said random numbers, bit-by-bit copies (apart from said random numbers, which can not be deterministically changed by an application) to a second storage medium or recopies from some intermediate storage medium, can not be decrypted because the values of said random numbers will have changed, thus preventing unauthorized duplication and replay attacks.
摘要:
The present invention relates to a digital rights management system (40) for controlling access rights to copy protected content comprising an application unit (1, 21, 41) and a drive unit (3, 23, 43), to an application unit (1, 21, 41), to a drive unit (3, 23, 43) and to a corresponding digital rights management method. In order to allow an increased security in the management of digital rights, wherein in particular a “filter-driver”-hack is made impossible or is at least substantially complicated and a reliable confirmation about a command given in respect of digital rights and its execution, a digital rights management system (40) is proposed wherein said application unit (1, 21, 41) comprises a key storage unit (45) for storing a bus key (KB), a request generation unit (47) for generating a request (7, 27) to be carried out by said drive unit including a message regarding said access rights and a challenge (RX), a communication unit (51) for transmitting said request (7, 27) and for receiving a response (13, 33) to said request (7, 27) from said drive unit (3, 23, 43), a response verification unit (49) for verifying a link between said request (7, 27) and said response (13, 33) by decoding said response (13, 33) using said bus key (KB) and by checking for the presence of an indication of said challenge (RX) in said response (13, 33) and said drive unit (3, 23, 43) comprises a key storage unit (55) for storing a bus key (KB), a communication unit (51) for receiving a request (7, 27) including a message regarding said access rights and a challenge (RX) from said application unit (1, 21, 41) and for transmitting a response (13, 33) to said request (1, 21, 41), a request processing unit (57) for verifying said request (7, 27) and processing said message, a response generation unit (59) for generating said response (13, 33) including an indication of said challenge (RX) and a reply to said message, wherein said indication of said challenge (RX) and said reply are cryptographically linked by means of said bus key (KB) and wherein indication of said challenge (RX) in said response (13, 33) indicates that said request has been carried out.
摘要:
In an apparatus and a method for reproducing user data stored in encrypted form on a recording medium, in order to provide a higher level of protection against hacking of user data and, in particular, of decryption keys, which are used for encrypting said user data and which are also stored on the recording medium, an integrated unit calculates a decryption key using key data read from the recording medium, decrypts the user data read from said recording medium using the calculated decryption key, andre-encrypts the decrypted data using a re-encryption key. The re-encrypted data and the re-encryption key are then transmitted to an application unit for decrypting the re-encrypted data using the re-encryption key and for reproducing the decrypted data.
摘要:
Methods and arrangements for processing a signal using a digital processor having a given word length. The signal is pre-processed using a pre-processor which reduces the word length and performs an operation which is invariant with respect to a process being performed by the digital signal processor. This means that if the pre-processor operated with infinite accuracy, it would have no effect on the subsequent process. If such a pre-processor operates with infinite accuracy, it will reduce the guantization noise. In the digital signal processor, the pre-processed signal may be transformed into frequency coefficients which are normalized directly thereafter.
摘要:
A method and device for adding or extracting a secondary information signal to/from a runlength-limited code sequence, includes detecting a polarity of a runlength at a first predetermined position of the runlength-limited code sequence and setting a parameter reflecting the degree of freedom that is present in the runlength-limited channel code, e.g., the selection of a merging bit pattern in the CD-standard, on the basis of the detected polarity so as to obtain a predetermined polarity of a runlength at a subsequent second predetermined position of the runlength-limited code sequence. The predetermined polarity then corresponds to a binary value of the secondary information. Thus, a side-channel with a small capacity is provided, which is positioned very close to the physical channel such that the secondary information is hard to be detected from the EFM bit stream. Therefore, the side-channel can be used as a hidden channel for copy protection purposes.