摘要:
The present invention relates to methods, devices, computer program products as well as a signal for providing privacy to a user in relation to data, which data can be a content identifier (cr_id) for identifying content. For that reason a usage right certificate (UR) generated in relation to the data, includes the data (cr_id), concealed user identifying information (for example by using (H(PK//RAN)) and random data (RAN)) enabling the verification of the user identity in the user identifying information. In this way a user is guaranteed privacy in relation to information, such as content he has purchased.
摘要:
A method of and server (100) for enabling composition of a message at a remote terminal (101). The method comprises generating an image comprising a plurality of symbols representing input means, the symbols having an associated particular visual characteristic which is mutually different for at least two of the symbols, transmitting the image for display on the remote terminal (101), receiving a sequence of coordinates from the remote terminal (101), reconstructing the message as a sequence of input means represented by the symbols comprised in the image at the received coordinates, constructing an authentication code as a sequence of visual characteristics associated with the symbols comprised in the image at the received coordinates, and accepting the message as authentic if the authentication code matches a predetermined sequence of visual characteristics.
摘要:
A radio frequency identification, RHD, device (116) for use at an article (114) is described that communicates information with a washing machine (100). The RFID device (116) comprises RFID circuitry (118), an antenna (120) connected to the RFID circuitry (118), as well as switching means (122) connected to any of the RFID circuitry (118) and the antenna (120) and configured to react to contact with a fluid (108) in the washing machine (100) by switching the RFID circuitry (118) from a first mode of operation to a second mode of operation. The two modes of operation comprise at least a respective first and second ability to communicate with the washing machine (100).
摘要:
A method of verifying the authenticity of an image (1) rendered on a display screen (10) involves using a graphical representation of an authentication code (2) associated with the image. The graphical representation of the authentication code is also rendered on the display screen, while optional guide marks (3) may also be displayed. Both the image (1) and the associated authentication code (2) are read using a scanner (20), preferably a handheld linear scanner. The scanner calculates an authentication code based upon the image and compares the calculated authentication code with the authentication code read from the display.
摘要:
Methods of and devices (D1) for authorizing an operation requested by a first user (P2) on a content item (C1) in accordance with a user right (UR1). The user right may identify the first user or a second user (P) and authorizes the user in question to perform the requested operation on the content item. If the user right identifies the second user, the operation is authorized upon receipt of information linking a user right of the first user and the user right of the second user. Preferably the information comprises one or more domain certificates (DC1, DC2) identifying the first and second users as members of the same authorized domain (AD). Preferably a content right (CR1) enabling the operation is used, whereby the user right authorizes the second user to employ the content right.
摘要:
A device (1) for decrypting encrypted images comprises an array of sensor elements (11) for sensing a first image, for example an encrypted image, and an array of display elements (12) for displaying a second image, for example a decrypted image. At least some display elements comprise integrated sensor elements, thus reducing the number of parts of the device. The integrated display/sensor elements (13) may be constituted by polymeric LED elements. The sensor function of the integrated elements may also be used for positioning the device relative to a terminal, and/or for checking a biometric feature of the user.
摘要:
A trusted display device (1) for, upon being superimposed on an untrusted display (2), reconstructing a graphical message, said device comprising a display screen (1a) having a plurality of independently addressable pixels. A plurality of sensors (1c) are associated with at least a subset of the pixels of said display screen (1a) and arranged such that they, when the displays (1, 2) are superimposed, are able to detect optically encoded information presented by an underlying pixel of the untrusted display (2) and adapt the activation of its pixels based on said information sensed.
摘要:
A method of generating a common secret between a first party and a second party, preferably devices (101-105) in a home network (100) that operate in accordance with a Digital Rights Management (DRM) framework. The devices calculate the common secret by evaluating the product of two polynomials P(x, y) and Q(x, z) using parameters previously distributed by a Trusted Third Party (TTP) and parameters obtained from the other party. Preferably the parties subsequently verify that the other party has generated the same secret using a zero-knowledge protocol or a commitment-based protocol. The method is particularly suitable for very low power devices such as Chip-In-Disc type devices.
摘要:
To ensure that digital rights cannot be forged or tampered with, they can be digitally signed. However, this means that updating the digital rights is no longer possible, as this would invalidate the digital signature. The present invention proposes that the issuer of digital rights issues rights which are signed in elementary pieces, rather than as a whole. Rather than issuing a right to play back a piece of content three times, the provider issues for example three rights to play back the content once in a particular AD, of which two may be transferred to other domains. The digital rights are individually protected by signatures and it is no longer possible to forge digital rights. As an enhancement the rights that can be transferred are indicated as such and stored securely to prevent tampering. When the right is transferred, it must be signed by the person who originally received it.
摘要:
This invention relates to a system and a method of generating an Authorized Domain (AD) by selecting a domain identifier, and binding at least one user (P1, P, PN1), at least one device (D1, D2, . . . , DM), and at least one content item (C1, C2, . . . , CNZ) to the Authorized Domain (AD) given by the domain identifier (Domain ID). Hereby, a number of verified devices (D1, D2, . . . , DM) and a number of verified persons (P1, P2, . . . , PN1) that is authorized to access a content item of said Authorized Domain (100) is obtained. In this way, access to a content item of an authorized domain by a user operating a device is obtained either by verifying that the content item and the user is linked the same domain or by verifying that the device and the content item is linked to the same domain. Thereby, enhanced flexibility for one or more users when accessing content in an authorized domain is obtained while security of the content is still maintaining. This is further done in a simple, secure and reliable way.