-
公开(公告)号:US20050022004A1
公开(公告)日:2005-01-27
申请号:US10893771
申请日:2004-07-16
申请人: M. Mihcak , Ramarathnam Venkatesan
发明人: M. Mihcak , Ramarathnam Venkatesan
CPC分类号: G06K9/00
摘要: An implementation of a technology is described herein for recognizing the perceptual similarity of the content of digital goods. At least one implementation, described herein, introduces a new hashing technique. More particularly, this hashing technique produces hash values for digital goods that are proximally near each other, when the digital goods contain perceptually similar content. In other words, if the content of digital goods are perceptually similar, then their hash values are, likewise, similar. The hash values are proximally near each other. This is unlike conventional hashing techniques where the hash values of goods with perceptually similar content are far apart with high probability in some distance sense (e.g., Hamming). This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
摘要翻译: 本文描述了一种用于识别数字商品内容的感知相似性的技术的实现。 这里描述的至少一个实现引入了新的散列技术。 更具体地说,当数字商品包含感知上相似的内容时,这种散列技术产生近似彼此接近的数字商品的哈希值。 换句话说,如果数字商品的内容在感觉上是相似的,那么它们的散列值也是类似的。 哈希值在近处彼此靠近。 这与传统的散列技术不同,其中具有感知相似内容的商品的哈希值在某种距离方面(例如,汉明)具有很高的概率。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
-
公开(公告)号:US06546114B1
公开(公告)日:2003-04-08
申请号:US09390272
申请日:1999-09-07
IPC分类号: G06K900
CPC分类号: G06T1/005 , G06T2201/0052 , G06T2201/0065 , G06T2201/0083 , H04N1/3216 , H04N1/32165 , H04N1/3217 , H04N1/32187 , H04N2201/3236
摘要: Apparatus and an accompanying method, for generating a cryptographic identifier for a non-marked image and embedding that identifier within the image itself in order to generate a “watermarked” image; for subsequently detecting that watermark in a test image; and the watermarked image so formed. First, pixel values for a non-marked image are transformed, either directly or after being enhanced, into a series of transform coefficients. A set of pseudo-random perturbation values which collectively constitute the watermark is determined wherein each of these values is heuristically selected, such that all these values collectively satisfy a plurality of different mathematical constraints and each such value preferably equals a relatively small value in a predefined range. These perturbation values are then added to the transform coefficients. Resulting perturbed coefficients are then inversely transformed back to pixel values to form the watermarked image. To detect whether a test image contains the watermark and hence is a copy of the watermarked image, the pixel values for the test image are transformed to yield transform coefficients. A plurality of different mathematical tests or a majority type rule is then used, in conjunction with the perturbation values, previously used to create the watermark, and these transform coefficients to determine whether the perturbation values collectively exist in the test image, and hence whether the watermark is present or not.
摘要翻译: 用于生成未标记图像的加密标识符并将该标识符嵌入在图像本身内以便生成“加水印”图像的装置和附带方法; 用于随后在测试图像中检测该水印; 并且如此形成的水印图像。 首先,将未标记图像的像素值直接地或经过增强后变换为一系列变换系数。 确定共同构成水印的一组伪随机扰动值,其中这些值中的每一个被启发式地选择,使得所有这些值共同满足多个不同的数学约束,并且每个这样的值优选地等于预定义的 范围。 然后将这些扰动值加到变换系数中。 然后将产生的扰动系数反向变换回到像素值,以形成水印图像。 为了检测测试图像是否包含水印,因此是水印图像的副本,将测试图像的像素值进行变换以产生变换系数。 然后结合先前用于创建水印的扰动值,并且这些变换系数用于确定扰动值是否共同存在于测试图像中,因此使用多个不同的数学测试或多数类型规则,并且因此是否 水印存在与否。
-
公开(公告)号:US09053348B2
公开(公告)日:2015-06-09
申请号:US13430598
申请日:2012-03-26
CPC分类号: G06F21/85
摘要: A secure cloud computing platform. The platform has a pool of secure computing devices such that each can be allocated to a customer as with other computing resources. Each secure computing device may be configured by a customer with a key and software for performing operations on sensitive data. The customer may submit data, defining a job for execution on the platform, as cyphertext. The secure computing device may perform operations on that data, which may include decrypting the data with the key and then executing the software to perform an operation on cleartext data. This operation, and the data on which it is performed, though in cleartext, may be inaccessible to the operator of the cloud computing platform. The device may operate according to a secure protocol under which the software is validated before loading and the device is provisioned with a key shared with the customer.
摘要翻译: 一个安全的云计算平台。 该平台具有一组安全计算设备,使得每个可以与其他计算资源一样分配给客户。 每个安全计算设备可以由具有用于对敏感数据执行操作的密钥和软件的客户配置。 客户可以提交数据,在平台上定义作业以执行作为cyphertext。 安全计算设备可以对该数据执行操作,其可以包括用密钥解密数据,然后执行软件以对明文数据执行操作。 该操作及其执行的数据虽然明文可能无法由云计算平台的操作员访问。 设备可以根据安全协议进行操作,在该安全协议下,软件在加载之前被验证并且设备被提供有与客户共享的密钥。
-
公开(公告)号:US08402439B2
公开(公告)日:2013-03-19
申请号:US12147908
申请日:2008-06-27
IPC分类号: G06F9/44
CPC分类号: G06F8/49
摘要: Described is a technology by which program analysis uses rich invariant templates that may specify an arbitrary Boolean combination of linear inequalities for program verification. Also described is choosing a cut-set that identifies program locations, each of which is associated with an invariant template. The verification generates second-order constraints, converts second-order logic formula based on those constraints into first-order logic formula, then converts the first-order logic formula into a quantifier-free formula, which is then converted into a Boolean satisfiability formula. Off-the-shelf constraint solvers may then be applied to the Boolean satisfiability formula to generate program analysis results. Various templates may be used to convert the second-order logic formula into the first-order logic formula. Further described are interprocedural analysis and the determination of weakest precondition and strongest postcondition with applications to termination analysis, timing bounds analysis, and generation of most-general counterexamples for both termination and safety properties.
摘要翻译: 描述了一种技术,程序分析使用丰富的不变模板,可以为程序验证指定线性不等式的任意布尔组合。 还描述了选择一个标识程序位置的剪辑,每个程序位置与不变模板相关联。 验证产生二阶约束,将基于这些约束的二阶逻辑公式转换为一阶逻辑公式,然后将一阶逻辑公式转换为无量词的公式,然后将其转换为布尔可满足公式。 现在可以将现成的约束求解器应用于布尔可满足公式以生成程序分析结果。 可以使用各种模板来将二阶逻辑公式转换成一阶逻辑公式。 进一步描述的是过程间分析以及最弱前提条件和最强后置条件的确定,适用于终止分析,时序界限分析,以及针对终端和安全属性生成大多数一般的反例。
-
公开(公告)号:US08171306B2
公开(公告)日:2012-05-01
申请号:US12265197
申请日:2008-11-05
IPC分类号: G06F21/00
CPC分类号: G06F21/14 , H04L9/3234 , H04L9/3242 , H04L2209/16
摘要: Program obfuscation is accomplished with tamper proof token including an embedded oracle. A public obfuscation function can be applied to any program/circuit to produce a new obfuscated program/circuit that makes calls to the corresponding oracle to facilitate program execution. A universal circuit representation can be employ with respect to obfuscation to hide circuit wiring and allow the whole circuit to be public. Furthermore, the token or embedded oracle can be universal and stateless to enable a single token to be employed with respect to many programs.
摘要翻译: 程序模糊化是通过包含嵌入式oracle的防篡改令牌完成的。 公共混淆函数可以应用于任何程序/电路,以产生一个新的混淆程序/电路,调用相应的oracle来促进程序的执行。 可以采用通用电路表示来进行混淆以隐藏电路布线并允许整个电路公开。 此外,令牌或嵌入式oracle可以是普遍的和无状态的,以使得能够针对许多程序使用单个令牌。
-
76.
公开(公告)号:US07941726B2
公开(公告)日:2011-05-10
申请号:US11772049
申请日:2007-06-29
申请人: Ramarathnam Venkatesan , Adi Akavia
发明人: Ramarathnam Venkatesan , Adi Akavia
CPC分类号: H03M13/3746 , H03M13/45 , H03M13/63
摘要: Systems and methods provide an optionally keyed error-correcting code that is spectrally concentrated. Each codeword of the low dimensional spectral concentration code (LDSC code) typically has very few coefficients of large magnitude and can be constructed even with limited processing resources. Decoding can be performed on low power devices. Error-correcting code is constructed around a key using basic computer arithmetic for computations instead of finite field arithmetic, thus saving energy. A recipient who possesses the key enjoys correction of a relatively high percentage of noise errors. In one implementation, a direct list-decoder iteratively estimates a list of message words directly, instead of a list of codewords. In variations, a unique message word is selected from the list either by applying a randomness test or by using message passing.
摘要翻译: 系统和方法提供了光谱集中的可选密钥纠错码。 低维频谱浓度码(LDSC码)的每个码字通常具有非常少的大幅度系数,并且甚至可以在有限的处理资源的情况下构造。 可以在低功耗设备上进行解码。 使用计算的基本计算机算术而不是有限域算术来构造纠错码,从而节省能量。 具有密钥的接收者可以修正相对较高百分比的噪声误差。 在一个实现中,直接列表解码器直接迭代地估计消息字列表,而不是码字列表。 在变体中,通过应用随机性测试或使用消息传递从列表中选择唯一的消息字。
-
公开(公告)号:US20100228809A1
公开(公告)日:2010-09-09
申请号:US12782647
申请日:2010-05-18
CPC分类号: H04N7/167 , H04N21/8358
摘要: Techniques are disclosed to provide randomized signal transforms and/or their applications. More particularly, a signal (e.g., an audio signal, an image, or a video signal) is transformed by applying randomly-selected basis functions to the signal. The applications of the randomized signal transforms include, but are not limited to, compression, denoising, hashing, identification, authentication, and data embedding (e.g., watermarking).
摘要翻译: 公开了提供随机信号变换和/或其应用的技术。 更具体地,通过对信号应用随机选择的基函数来变换信号(例如,音频信号,图像或视频信号)。 随机信号变换的应用包括但不限于压缩,去噪,散列,识别,认证和数据嵌入(例如,水印)。
-
公开(公告)号:US07770014B2
公开(公告)日:2010-08-03
申请号:US10837563
申请日:2004-04-30
IPC分类号: H04L9/32
CPC分类号: H04N7/167 , H04N21/8358
摘要: Techniques are disclosed to provide randomized signal transforms and/or their applications. More particularly, a signal (e.g., an audio signal, an image, or a video signal) is transformed by applying randomly-selected basis functions to the signal. The applications of the randomized signal transforms include, but are not limited to, compression, denoising, hashing, identification, authentication, and data embedding (e.g., watermarking).
摘要翻译: 公开了提供随机信号变换和/或其应用的技术。 更具体地,通过对信号应用随机选择的基函数来变换信号(例如,音频信号,图像或视频信号)。 随机信号变换的应用包括但不限于压缩,去噪,散列,识别,认证和数据嵌入(例如,水印)。
-
公开(公告)号:US07730315B2
公开(公告)日:2010-06-01
申请号:US11275215
申请日:2005-12-19
IPC分类号: H04L9/00
CPC分类号: H04L9/302 , H04L9/32 , H04L2209/20 , H04L2209/30
摘要: A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.
摘要翻译: 密码系统具有基于曲线雅可比的一组点的顺序的秘密。 在某些实施例中,密码系统用于生成对应于特定产品的产品标识符。 产品标识符是通过初始接收与产品的副本(或副本)相关联的值来生成的。 使用可识别的图案填充接收的值,并且将填充值转换为由特定位数表示的数字。 然后将该数字转换为曲线的雅可比元素,然后将元素升高到特定的功率。 然后将元件升高到特定功率的结果被压缩并作为产品标识符输出。 随后,可以反转加密处理,并且解密的值用于指示产品标识符的有效性和/或真实性。
-
公开(公告)号:US20100107245A1
公开(公告)日:2010-04-29
申请号:US12260581
申请日:2008-10-29
IPC分类号: G06F11/00
CPC分类号: G06F21/52
摘要: Tamper-tolerant programs enable correct and continued execution despite attacks. Programs can be transformed into tamper-tolerant versions that correct effects of tampering in response to detection thereof Tamper-tolerant programs can execute alone or in conjunction with tamper resistance/prevention mechanisms such as obfuscation and encryption/decryption, among other things. In fact, the same and/or similar mechanisms can be employed to protect tamper tolerance functionality.
摘要翻译: 防篡改程序可以正确和持续执行,尽管发生攻击。 可以将程序转换成防篡改版本,以纠正篡改对于检测的影响。防篡改程序可以单独执行,也可以与诸如混淆和加密/解密之类的防篡改/预防机制一起执行。 事实上,可以采用相同和/或类似的机制来保护篡改容忍功能。
-
-
-
-
-
-
-
-
-