SYSTEM AND METHOD TO ANALYZE SOFTWARE SYSTEMS AGAINST TAMPERING
    31.
    发明申请
    SYSTEM AND METHOD TO ANALYZE SOFTWARE SYSTEMS AGAINST TAMPERING 审中-公开
    分析篡改软件系统的系统和方法

    公开(公告)号:US20090113549A1

    公开(公告)日:2009-04-30

    申请号:US11923521

    申请日:2007-10-24

    IPC分类号: G06F11/00

    CPC分类号: G06F21/577

    摘要: A system, article of manufacture and method is provided for determining the vulnerability to attack of a software system by generating a hybrid graph, the hybrid graph including an attack graph portion describing at least one potential attack goal on the software system and describing sub-attacks required to achieve the potential attack goal. The hybrid graph also includes a defense graph describing ways to defend against the potential sub-attacks. The hybrid attack-defense graph may be evaluated and a score may be calculated based on the evaluation.

    摘要翻译: 提供了一种系统,制品和方法,用于通过生成混合图来确定软件系统的攻击的脆弱性,该混合图包括描述软件系统上的至少一个潜在攻击目标的攻击图部分并描述子攻击 要求达到潜在的攻击目标。 混合图还包括描述防御潜在次攻击的方法的防御图。 可以评估混合攻击防御图,并且可以基于评估来计算分数。

    System and Method to Proactively Detect Software Tampering
    32.
    发明申请
    System and Method to Proactively Detect Software Tampering 失效
    系统和方法主动检测软件篡改

    公开(公告)号:US20080066178A1

    公开(公告)日:2008-03-13

    申请号:US11930425

    申请日:2007-10-31

    IPC分类号: G06F21/00

    摘要: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

    摘要翻译: 使用动态演进的审计日志主动检测软件入侵,其中日志条目在审计日志中生成,并且密钥值是根据先前日志条目和先前密钥两者的单向函数进行演变的。 具有生成的日志条目和最终密钥值的审核日志被传送到通过分析这些值来检测软件入侵的清算站。 为了减少要发送的日志的大小,日志条目被分配相同的值,因此只需要将一个日志条目和最后一个密钥值发送到清算所。

    System and method for assigning sequence keys to a media player to enable flexible traitor tracing
    33.
    发明申请
    System and method for assigning sequence keys to a media player to enable flexible traitor tracing 有权
    用于将序列键分配给媒体播放器以实现灵活的叛逆者追踪的系统和方法

    公开(公告)号:US20070174637A1

    公开(公告)日:2007-07-26

    申请号:US11231174

    申请日:2005-09-19

    IPC分类号: G06F12/14

    摘要: A traitor tracing enabling system assigns sequence keys to a media player to enable better tracability with fewer actual variations in the content. The system comprises a technique for increasing a number of sequence keys, allowing a finer granularity in a traitor tracing process with little increase in sequence key storage or in bandwidth required to transmit sequence keys to a media player. The present system comprises a variation table which maps the sequence keys to the individual variations in the file, such that multiple sequence keys can be mapped to a single variation.

    摘要翻译: 叛逆追踪启用系统将序列密钥分配给媒体播放器,以实现更好的可跟踪性,同时减少内容的实际变化。 该系统包括用于增加多个序列密钥的技术,允许在追踪跟踪过程中更细的粒度,其中序列密钥存储器的增加很少或将序列密钥发送到媒体播放器所需的带宽中。 本系统包括将序列密钥映射到文件中的各个变体的变化表,使得可以将多个序列密钥映射到单个变体。

    Unified broadcast encryption system

    公开(公告)号:US09712321B2

    公开(公告)日:2017-07-18

    申请号:US12131076

    申请日:2008-05-31

    IPC分类号: H04L9/00 H04L9/08 G09C5/00

    摘要: A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

    Traitor tracing in a content protection system
    36.
    发明授权
    Traitor tracing in a content protection system 失效
    叛徒追踪内容保护系统

    公开(公告)号:US08533849B2

    公开(公告)日:2013-09-10

    申请号:US12877001

    申请日:2010-09-07

    IPC分类号: H04L29/06

    CPC分类号: G06F21/105 H04L2209/606

    摘要: A method for detecting at least one traitor computer system among a plurality of receiver computer systems including: assigning a version of protected content to each of the plurality of receiver computer systems that are currently identified as innocent by a content protection system that monitors distribution of protected content to the plurality of receiver computer systems; recovering at least one unauthorized rebroadcast of the content; generating a score for each of the plurality of receiver computer systems with respect to the recovered unauthorized rebroadcast; calculating a threshold independent of an estimation of maximum traitor computer systems; checking a highest score against the threshold; incriminating a receiver computer system having the highest score above the threshold as a traitor computer system; and removing any unauthorized rebroadcasts overlapping with the traitor computer system. The process may be repeated from generating scores until all traitors are identified.

    摘要翻译: 一种用于在多个接收机计算机系统中检测至少一个叛逆计算机系统的方法,包括:将受保护内容的版本分配给当前被识别为无害的多个接收机计算机系统中的每一个,所述内容保护系统监视受保护的 内容到多个接收机计算机系统; 恢复内容的至少一次未经授权的转播; 对于所述多个接收机计算机系统中的每一个相对于所述恢复的未经授权的转播而生成分数; 计算独立于最大叛逆计算机系统的估计的阈值; 根据阈值检查最高分数; 将具有高于阈值的最高分数的接收机计算机系统作为叛徒计算机系统; 并删除与叛逆计算机系统重叠的任何未经授权的转播。 可以从产生评分重复该过程,直到所有叛徒被识别。

    INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT
    37.
    发明申请
    INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT 审中-公开
    智能决策支持同意管理

    公开(公告)号:US20130013641A1

    公开(公告)日:2013-01-10

    申请号:US13586921

    申请日:2012-08-16

    IPC分类号: G06F17/30

    摘要: Embodiments of the invention relate to a method for intelligently providing consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions.

    摘要翻译: 本发明的实施例涉及一种用于智能地提供访问共享资源池中的记录的同意的方法。 提供工具来支持政策,以解决和保持指定记录的限制性访问,无论是关于本地和非本地的规则和条例,还有关于个人和酌情分享决定的个人限制。

    Multifunctional Antioxidants and methods of use thereof
    38.
    发明授权
    Multifunctional Antioxidants and methods of use thereof 有权
    多功能抗氧化剂及其使用方法

    公开(公告)号:US08268849B2

    公开(公告)日:2012-09-18

    申请号:US12237936

    申请日:2008-09-25

    摘要: Compositions comprising multifunctional agents and methods of use thereof are provided. Particularly, a series of analogs of 1-N, N′-dimethylsulfamoyl-4-(2-pyrimidyl)piperazine are provided which are useful for treating and/or preventing cataract, macular degeneration, neurodegenerative disorders, and/or injury or symptoms associated with radiation exposure.

    摘要翻译: 提供了包含多功能剂的组合物及其使用方法。 特别地,提供了一系列类似的1-N,N'-二甲基氨磺酰基-4-(2-嘧啶基)哌嗪,其可用于治疗和/或预防白内障,黄斑变性,神经变性疾病和/或相关的损伤或症状 与辐射暴露。

    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
    39.
    发明授权
    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system 有权
    跟踪叛国者联盟,防止广播加密系统中数字内容的盗版

    公开(公告)号:US08176568B2

    公开(公告)日:2012-05-08

    申请号:US11323247

    申请日:2005-12-30

    IPC分类号: G06F21/00

    摘要: A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 一种系统,方法和计算机程序产品,用于查找串联产生盗版保护内容的接收者联盟,然后评估每个已识别联盟的特定成员是叛徒的机会与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM
    40.
    发明申请
    TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM 失效
    跟踪TRAITOR COALITIONS并防止数字内容在广播加密系统中的传播

    公开(公告)号:US20120036578A1

    公开(公告)日:2012-02-09

    申请号:US13267774

    申请日:2011-10-06

    IPC分类号: G06F21/00

    摘要: Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 本发明的实施例涉及发现联合制作盗版的受保护内容的接收者的联盟,然后评估每个被识别的联盟的特定成员是叛徒的信心与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。