Peer-to-peer networks with protections
    71.
    发明授权
    Peer-to-peer networks with protections 失效
    具有保护的对等网络

    公开(公告)号:US07987368B2

    公开(公告)日:2011-07-26

    申请号:US11381951

    申请日:2006-05-05

    Abstract: In a peer-to-peer environment, copyrights and users' privacies can be protected by a tracking mechanism. In described implementations, tracking mechanisms can use certificates that are produced using random numbers to protect the privacy of users and/or certificates that are produced responsive to at least one hardware identifier to enable uploader to be identified to protect copyrights.

    Abstract translation: 在对等环境中,版权和用户的隐私可以通过跟踪机制来保护。 在所描述的实现中,跟踪机制可以使用使用随机数产生的证书来保护响应于至少一个硬件标识符产生的用户和/或证书的隐私,以使上载者被识别以保护版权。

    Locally interative encryption generating compliant ciphertext for general syntax specifications
    72.
    发明授权
    Locally interative encryption generating compliant ciphertext for general syntax specifications 有权
    本地迭代加密生成符合一般语法规范的密文

    公开(公告)号:US07769168B2

    公开(公告)日:2010-08-03

    申请号:US11095048

    申请日:2005-03-31

    Abstract: A fast and secure syntax compliant encryption schema, “locally iterative encryption,” can produce compliant ciphertext for a general syntax specification. In one implementation, an engine partitions a data stream into blocks, and encrypts each block iteratively until syntax compliance conditions are met. A system using the schema can utilize either stream ciphers or block ciphers in different modes. Locally iterative encryption methods are fast and remain at approximately the same speed even as the length of the data stream to be encrypted increases. Besides providing superior processing speed, the locally iterative encryption schema is also more robust to errors in the resulting ciphertext and in the resulting decrypted plaintext than conventional syntax compliant encryption techniques. Locally iterative encryption is secure as long as an underlying encryption cipher selected for use in the schema is secure.

    Abstract translation: 快速和安全的语法兼容加密模式“本地迭代加密”可以为通用语法规范提供符合规定的密文。 在一个实现中,引擎将数据流分割成块,并且迭代地对每个块进行加密,直到满足语法符合条件。 使用该模式的系统可以利用不同模式的流密码或块密码。 即使要加密的数据流的长度增加,本地迭代加密方法也是快速且保持大致相同的速度。 除了提供优越的处理速度之外,本地迭代加密模式对于所生成的密文中的错误以及生成的解密明文也比传统的符合法规的加密技术更加鲁棒。 只要选择用于模式的底层加密密码是安全的,本地迭代加密就是安全的。

    Scalable layered access control for multimedia
    73.
    发明授权
    Scalable layered access control for multimedia 有权
    可扩展分层访问控制多媒体

    公开(公告)号:US07756271B2

    公开(公告)日:2010-07-13

    申请号:US10869280

    申请日:2004-06-15

    Abstract: A flexible framework for generating “scalable layered access” codestreams allows a bitstream architect to select the number of access types and the number of access layers within each access type. At least some of the access layers are encrypted (or scrambled). Some of the access layers may be left unencrypted or unscrambled to allow free access to those layers. The framework facilitates simultaneous access of multimedia content by different users enjoying selective decryption of different access types and different access layers. An exemplary key schema for the framework sends only one or only a few keys to an end user for a given access layer, from which decryption keys for the content can be derived by hashing and then combining under a Group Diffie-Hellman key agreement. In one implementation, only one key is sent in a license to an end user and other partial key information for Group Diffie-Hellman combination with the licensed key is included in the publicly distributed codestream.

    Abstract translation: 用于生成“可分级分层访问”码流的灵活框架允许比特流架构师选择每种访问类型中的访问类型的数量和访问层数。 至少一些接入层被加密(或加扰)。 一些访问层可以保持未加密或解扰,以允许对这些层的自由访问。 该框架便于不同用户同时访问多媒体内容,享受不同接入类型和不同接入层的选择性解密。 用于框架的示例性关键模式仅向给定访问层的最终用户发送一个或仅几个密钥,通过散列然后根据Group Diffie-Hellman密钥协议来组合内容的解密密钥。 在一个实现中,只有一个密钥在许可证中发送给最终用户,并且用于具有许可密钥的组Diffie-Hellman组合的其他部分密钥信息被包括在公开分发的码流中。

    Distributed single sign-on service
    74.
    发明授权
    Distributed single sign-on service 有权
    分布式单点登录服务

    公开(公告)号:US07690026B2

    公开(公告)日:2010-03-30

    申请号:US11208509

    申请日:2005-08-22

    Abstract: The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the establishment of an authenticated communication session. However, the authentication servers are not necessarily trusted authorities. That is, secrets of the various described devices are not revealed to each other.

    Abstract translation: 所描述的实现涉及在客户端计算设备和服务提供商之间建立认证通信。 在一个实现中,一旦注册过程完成,则客户端计算设备和服务提供商使用多个认证服务器来促进认证通信会话的建立。 然而,认证服务器不一定是受信任的权限。 也就是说,各种描述的装置的秘密不会彼此泄露。

    DISASSEMBLING AN EXECUTABLE BINARY
    76.
    发明申请
    DISASSEMBLING AN EXECUTABLE BINARY 有权
    拆除可执行的二进制文件

    公开(公告)号:US20090235054A1

    公开(公告)日:2009-09-17

    申请号:US12050159

    申请日:2008-03-17

    CPC classification number: G06F8/53

    Abstract: A method for disassembling an executable binary (binary). In one implementation, a plurality of potential address references may be identified based on the binary and a plurality of storage addresses containing the binary. A plurality of assembler source code instructions (instructions) may be generated by disassembling the binary. The binary may be disassembled at one or more sequential addresses starting at each of the plurality of potential address references.

    Abstract translation: 一种拆卸可执行二进制(二进制)的方法。 在一个实现中,可以基于二进制和多个包含二进制的存储地址来识别多个潜在地址引用。 可以通过拆卸二进制来生成多个汇编源代码指令(指令)。 二进制码可以在从多个潜在地址引用中的每一个开始的一个或多个顺序地址处被分解。

    Secure image authentication with discrete level tamper localization
    78.
    发明授权
    Secure image authentication with discrete level tamper localization 有权
    使用离散级别篡改定位的安全映像认证

    公开(公告)号:US07454797B2

    公开(公告)日:2008-11-18

    申请号:US10963696

    申请日:2004-10-13

    Abstract: Systems and methods for secure multimedia authentication with discrete level tamper localization are described. In these aspects, the term “discrete” means that tamper localization is at the pixel level with respect to an image or video data, or at the sample level with respect to audio data. More particularly, and in one aspect, multimedia is evaluated to determine authenticity of the multimedia. This evaluation is based on data block(s). Responsive to determining that the multimedia is not authentic, a tampered portion of the multimedia is localized by addressing each respective pixel or sample of the tampered portion.

    Abstract translation: 描述了使用离散级别篡改定位进行安全多媒体认证的系统和方法。 在这些方面,术语“离散”意味着篡改定位相对于图像或视频数据处于像素级,或相对于音频数据处于采样级。 更具体地,在一个方面,评估多媒体以确定多媒体的真实性。 此评估基于数据块。 响应于确定多媒体不可信,通过寻址被篡改部分的每个相应的像素或样本来对多媒体的被篡改的部分进行定位。

    Embedding Data in Audio and Detecting Embedded Data in Audio
    80.
    发明申请
    Embedding Data in Audio and Detecting Embedded Data in Audio 有权
    在音频中嵌入数据并检测音频中的嵌入式数据

    公开(公告)号:US20080215333A1

    公开(公告)日:2008-09-04

    申请号:US11923355

    申请日:2007-10-24

    Abstract: A method of embedding data into an audio signal provides a data sequence for embedding in the audio signal and computes masking thresholds for the audio signal from a frequency domain transform of the audio signal. The masking thresholds correspond to subbands of the audio signal, which are obtained from a masking model used to compress the audio signal. The method applies the masking threshold to the data sequence to produce masked data sequence and inserts the masked data sequence in the audio signal to produce an embedded audio signal. A method of detecting data embedded in an audio signal analyzes the audio signal to estimate the masking threshold used in embedding the data and applies the estimated masking threshold to the audio signal to extract the embedded data.

    Abstract translation: 将数据嵌入到音频信号中的方法提供用于嵌入到音频信号中的数据序列,并且根据音频信号的频域变换来计算音频信号的掩蔽阈值。 掩蔽阈值对应于从用于压缩音频信号的掩蔽模型获得的音频信号的子带。 该方法将掩蔽阈值应用于数据序列以产生掩蔽的数据序列,并将屏蔽的数据序列插入到音频信号中以产生嵌入的音频信号。 检测嵌入在音频信号中的数据的方法分析音频信号以估计用于嵌入数据的掩蔽阈值,并将估计的屏蔽阈值应用于音频信号以提取嵌入数据。

Patent Agency Ranking