NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISK
    71.
    发明申请
    NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISK 审中-公开
    需要知道的信息使用量化风险

    公开(公告)号:US20130232582A1

    公开(公告)日:2013-09-05

    申请号:US13593331

    申请日:2012-08-23

    IPC分类号: G06F21/62

    CPC分类号: G06F21/62 G06F21/6245

    摘要: Access control can include retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users.

    摘要翻译: 访问控制可以包括在特定时间段内为特定目的检索由多个用户访问数据的列表。 基于所述访问导出访问模式,并且存储导出的访问模式。 基于多个用户中的每一个需要访问用于该特定目的的数据,计算出每个用户的风险分数,并存储风险分数。 基于每个相应用户在指定数量的最近一段时间内的计算的风险评分来创建多个用户中的每一个的总计总风险分数。 基于多个用户中的每一个的总计总风险评分来确定风险容忍阈值。

    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
    72.
    发明授权
    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system 失效
    跟踪叛国者联盟,防止广播加密系统中数字内容的盗版

    公开(公告)号:US08495755B2

    公开(公告)日:2013-07-23

    申请号:US13267774

    申请日:2011-10-06

    IPC分类号: G06F21/00

    摘要: Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 本发明的实施例涉及发现联合制作盗版的受保护内容的接收者的联盟,然后评估每个被识别的联盟的特定成员是叛徒的信心与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    Security classes in a media key block
    73.
    发明授权
    Security classes in a media key block 失效
    媒体密钥块中的安全类

    公开(公告)号:US08422684B2

    公开(公告)日:2013-04-16

    申请号:US12192962

    申请日:2008-08-15

    IPC分类号: H04L9/00

    摘要: According to one embodiment of the present invention, a method for broadcast encryption with security classes in a media key block is provided. In one embodiment the method includes receiving encrypted media of a first and a second class, where the media includes a common media key block, in a device of a first class and in a device of a second class. A first media key is calculated from the common media key block in the device of a first class. A first media key precursor is calculated from the common media key block in the device of a second class. The first media precursor may be used to decrypt media of a first class. The first media precursor may also be used to calculate a second media key in the device of a second class to decrypt content of a first class.

    摘要翻译: 根据本发明的一个实施例,提供了一种用于在媒体密钥块中具有安全类别的广播加密的方法。 在一个实施例中,该方法包括在第一类的设备和第二类的设备中接收第一类和第二类的加密媒体,其中媒体包括公共媒体密钥块。 从第一类设备中的公共媒体密钥块计算第一媒体密钥。 从第二类设备中的公共媒体密钥块计算第一媒体密钥前体。 第一媒体前体可用于解密第一类的媒体。 也可以使用第一媒体前体来计算第二类的设备中的第二媒体密钥来解密第一类的内容。

    NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISK
    74.
    发明申请
    NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISK 审中-公开
    需要知道的信息使用量化风险

    公开(公告)号:US20130018921A1

    公开(公告)日:2013-01-17

    申请号:US13182317

    申请日:2011-07-13

    IPC分类号: G06F7/00 G06F17/00

    CPC分类号: G06F21/62 G06F21/6245

    摘要: Embodiments of the invention related to access control to sensitive data records, and in particular need-to-know information access using quantified risk. In one aspect of the invention access control includes retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. A warning is issued if the aggregated total risk score for any of the plurality of users exceeds a risk-tolerance threshold.

    摘要翻译: 本发明的实施例涉及对敏感数据记录的访问控制,特别是使用量化风险的需要知道的信息访问。 在本发明的一个方面中,访问控制包括在指定的时间段内为特定目的检索由多个用户访问数据的列表。 基于所述访问导出访问模式,并且存储导出的访问模式。 基于多个用户中的每一个需要访问用于该特定目的的数据,计算出每个用户的风险分数,并存储风险分数。 基于每个相应用户在指定数量的最近一段时间内的计算的风险评分来创建多个用户中的每一个的总计总风险分数。 基于多个用户中的每一个的总计总风险评分来确定风险容忍阈值。 如果多个用户中的任一个的总计总风险分数超过风险容忍阈值,则发出警告。

    Evaluation of tamper resistant software system implementations
    75.
    发明授权
    Evaluation of tamper resistant software system implementations 有权
    防篡改软件系统实现的评估

    公开(公告)号:US08176560B2

    公开(公告)日:2012-05-08

    申请号:US12152486

    申请日:2008-05-14

    IPC分类号: G06F21/00

    CPC分类号: G06F21/57 G06F2221/033

    摘要: According to one embodiment of the present invention, a method for evaluating a software system includes defining a rating of the tamper resistance of a software system and breaking down the rating into a plurality of metrics relevant to the tamper resistance of the software system. A score may then be calculated for each metric and the scores may be combined into a composite score for the rating.

    摘要翻译: 根据本发明的一个实施例,一种用于评估软件系统的方法包括定义软件系统的防篡改的等级,并将该等级分解成与软件系统的防篡改相关的多个度量。 然后可以为每个度量计算分数,并且分数可以合并成评级的综合得分。

    ADAPTIVE AND PERSONALIZED TAG RECOMMENDATION
    77.
    发明申请
    ADAPTIVE AND PERSONALIZED TAG RECOMMENDATION 有权
    自适应和个性化标签建议

    公开(公告)号:US20120016885A1

    公开(公告)日:2012-01-19

    申请号:US12838427

    申请日:2010-07-16

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30884

    摘要: Embodiments of the invention relate to techniques for personalized tag recommendation for enterprise social bookmarking systems. According to one embodiment of the invention, a method comprises computing at least one set of candidate tags for a document in accordance with at least one factor, and combining the at least one set of candidate tags from different factors into an overall recommendation list of candidate tags. At least one suggested tag from the overall recommendation list is returned as a result of the combination. At least one applied tag that is applied to the document by a user of a computer system is recorded, and the combination is adjusted based on the at least one applied tag.

    摘要翻译: 本发明的实施例涉及用于企业社会书签系统的个性化标签推荐的技术。 根据本发明的一个实施例,一种方法包括根据至少一个因素计算文档的至少一组候选标签集合,以及将来自不同因素的至少一组候选标签组合成候选者的总体推荐列表 标签。 作为组合的结果,返回总体推荐列表中至少一个建议的标签。 记录由计算机系统的用户应用于文档的至少一个应用标签,并且基于至少一个应用标签来调整组合。

    PERSONALIZED DATA SEARCH UTILIZING SOCIAL ACTIVITIES
    78.
    发明申请
    PERSONALIZED DATA SEARCH UTILIZING SOCIAL ACTIVITIES 失效
    个人数据搜索利用社会活动

    公开(公告)号:US20120016875A1

    公开(公告)日:2012-01-19

    申请号:US12838082

    申请日:2010-07-16

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30867

    摘要: Embodiments relate personalized data searches utilizing social activities. In one embodiment, a search query is received from a user. A set of search results that satisfy the search query is received from a search engine. A user interest profile associated with the user is identified. The user interest profile includes information associated with a set of activities performed by the user on one or more social systems. A ranking score is assigned to each result in at least a subset of search results in the set of search results based at least on the user interest profile. The subset of search results are sorted based on the score that has assigned to each result in the subset of results. The subset of search results that has been sorted is sent to the user.

    摘要翻译: 实施例涉及使用社会活动的个性化数据搜索。 在一个实施例中,从用户接收到搜索查询。 从搜索引擎收到满足搜索查询的一组搜索结果。 识别与用户相关联的用户兴趣简档。 用户兴趣简档包括与一个或多个社会系统上的用户执行的一组活动相关联的信息。 至少基于用户兴趣简档,在搜索结果集中的搜索结果的至少一个子集中为每个结果分配排名得分。 搜索结果的子集根据分配给结果子集中每个结果的分数进行排序。 已排序的搜索结果的子集发送给用户。

    REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS
    79.
    发明申请
    REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS 有权
    在具有不同安全级别的设备集群中重新配置内容标签

    公开(公告)号:US20110158404A1

    公开(公告)日:2011-06-30

    申请号:US12651382

    申请日:2009-12-31

    IPC分类号: H04L9/00

    摘要: According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device.

    摘要翻译: 根据本发明的一个实施例,提供了一种系统,方法和计算机程序产品,用于在广播加密系统中具有不同安全级别的设备群中重新标识标题密钥。 所述方法包括:接收新的管理密钥,并将加密的标题密钥与先前使用的管理密钥解除绑定,所述标题密钥具有安全级别,并且驻留在具有安全等级的设备的标题密钥块中,所述设备处于 设备包括具有多个安全等级的设备。 如果设备安全级别低于标题密钥安全级别,则使用新的管理密钥部分地弹出未绑定的标题密钥。 然后将部分反弹的标题密钥保存在设备的标题密钥块中。

    System and method for assigning sequence keys to a media player to enable flexible traitor tracing
    80.
    发明授权
    System and method for assigning sequence keys to a media player to enable flexible traitor tracing 有权
    用于将序列键分配给媒体播放器以实现灵活的叛逆者追踪的系统和方法

    公开(公告)号:US07711114B2

    公开(公告)日:2010-05-04

    申请号:US11231174

    申请日:2005-09-19

    IPC分类号: G06F21/00

    摘要: A traitor tracing enabling system assigns sequence keys to a media player to enable better tracability with fewer actual variations in the content. The system comprises a technique for increasing a number of sequence keys, allowing a finer granularity in a traitor tracing process with little increase in sequence key storage or in bandwidth required to transmit sequence keys to a media player. The present system comprises a variation table which maps the sequence keys to the individual variations in the file, such that multiple sequence keys can be mapped to a single variation.

    摘要翻译: 叛逆追踪启用系统将序列密钥分配给媒体播放器,以实现更好的可跟踪性,同时减少内容的实际变化。 该系统包括用于增加多个序列密钥的技术,允许在追踪跟踪过程中更细的粒度,其中序列密钥存储器的增加很少或将序列密钥发送到媒体播放器所需的带宽中。 本系统包括将序列密钥映射到文件中的各个变体的变化表,使得可以将多个序列密钥映射到单个变体。