Peer-to-Peer Networks with Protections
    1.
    发明申请
    Peer-to-Peer Networks with Protections 失效
    对等网络与保护

    公开(公告)号:US20070113096A1

    公开(公告)日:2007-05-17

    申请号:US11381951

    申请日:2006-05-05

    IPC分类号: H04L9/00

    摘要: In a peer-to-peer environment, copyrights and users' privacies can be protected by a tracking mechanism. In described implementations, tracking mechanisms can use certificates that are produced using random numbers to protect the privacy of users and/or certificates that are produced responsive to at least one hardware identifier to enable uploader to be identified to protect copyrights.

    摘要翻译: 在对等环境中,版权和用户的隐私可以通过跟踪机制来保护。 在所描述的实现中,跟踪机制可以使用使用随机数产生的证书来保护响应于至少一个硬件标识符产生的用户和/或证书的隐私,以使上载者被识别以保护版权。

    Peer-to-peer networks with protections
    2.
    发明授权
    Peer-to-peer networks with protections 失效
    具有保护的对等网络

    公开(公告)号:US07987368B2

    公开(公告)日:2011-07-26

    申请号:US11381951

    申请日:2006-05-05

    IPC分类号: H04L9/32

    摘要: In a peer-to-peer environment, copyrights and users' privacies can be protected by a tracking mechanism. In described implementations, tracking mechanisms can use certificates that are produced using random numbers to protect the privacy of users and/or certificates that are produced responsive to at least one hardware identifier to enable uploader to be identified to protect copyrights.

    摘要翻译: 在对等环境中,版权和用户的隐私可以通过跟踪机制来保护。 在所描述的实现中,跟踪机制可以使用使用随机数产生的证书来保护响应于至少一个硬件标识符产生的用户和/或证书的隐私,以使上载者被识别以保护版权。

    Ciphertext switching for syntax compliant encryption
    3.
    发明授权
    Ciphertext switching for syntax compliant encryption 有权
    用于符合语法的加密的密文切换

    公开(公告)号:US07424112B2

    公开(公告)日:2008-09-09

    申请号:US11081279

    申请日:2005-03-16

    IPC分类号: H04L9/00

    摘要: Systems and methods providing ciphertext switching for syntax compliant encryption are described. In one aspect, intermediate ciphertext is generated from syntax compliant plaintext. Post-processing is applied to the intermediate ciphertext to determine if there are any illegal symbols in the intermediate ciphertext. If an illegal symbol is located, the illegal symbol in the intermediate ciphertext is switched with a corresponding plaintext symbol. One or more iterations of the post-processing and switching operations result in syntax compliant ciphertext.

    摘要翻译: 描述了为符合语法的加密提供密文切换的系统和方法。 在一个方面,从语法兼容的明文生成中间密文。 后处理应用于中间密文以确定中间密文中是否存在任何非法符号。 如果存在非法符号,则用相应的明文符号切换中间密文中的非法符号。 后处理和切换操作的一个或多个迭代导致符合语法的密文。

    Digital rights management system
    4.
    发明申请
    Digital rights management system 失效
    数字版权管理系统

    公开(公告)号:US20050080746A1

    公开(公告)日:2005-04-14

    申请号:US10685234

    申请日:2003-10-14

    摘要: A public licensing infrastructure (PLI) for a digital rights management (DRM) system is described. In an implementation, a method includes generating a formal license for content. The formal license includes a decryption key for decrypting the content and access rules for accessing the content. A plurality of license authorities is configured to provide a plurality of partial licenses. The plurality of partial licenses is combinable to form the formal license. Each license authority provides a respective partial license.

    摘要翻译: 描述了数字版权管理(DRM)系统的公共许可基础设施(PLI)。 在实现中,一种方法包括生成内容的正式许可证。 正式许可证包括用于解密内容的解密密钥和用于访问内容的访问规则。 多个许可机构被配置为提供多个部分许可证。 多个部分许可证可组合形成正式许可证。 每个许可证机构都提供相应的部分许可证。

    Secure key management for scalable codestreams
    5.
    发明授权
    Secure key management for scalable codestreams 有权
    可扩展的码流的安全密钥管理

    公开(公告)号:US07644445B2

    公开(公告)日:2010-01-05

    申请号:US11178943

    申请日:2005-07-11

    IPC分类号: H04L9/18 H04L9/34

    摘要: Key management is performed to generate a single key allowing of the decoding of all authorized levels of a plurality of access types within a scalable codestream. An access node set is derived from sets representing access types having hierarchies representable by fully ordered sets, such as resolution and layer levels, and hierarchies representable by partially ordered sets, such as tile and precinct levels. The access node set derived is a partially ordered set representing the combinations of levels of the access types included within the codestream. A hierarchical key management system is applied to the access node set to assign a key to each of the access nodes, generate content encryption keys, and encrypt the codestream. A client receiving the codestream, access node set, and other public information uses the key to derive additional keys to decrypt the codestream.

    摘要翻译: 执行密钥管理以生成允许在可缩放码流内解码多个接入类型的所有授权级别的单个密钥。 访问节点集是从表示具有可由完全有序集合表示的层次的访问类型的集合导出的,例如分辨率和层级,以及可由部分有序集合表示的层次,例如平铺和区域级别。 导出的访问节点集是表示码流内包括的访问类型的级别的组合的部分有序集合。 分层密钥管理系统被应用于接入节点集合,以将密钥分配给每个接入节点,生成内容加密密钥和加密码流。 接收码流,接入节点集和其他公共信息的客户端使用密钥来导出附加密钥来解密码流。

    Digital rights management system
    6.
    发明授权
    Digital rights management system 失效
    数字版权管理系统

    公开(公告)号:US07594275B2

    公开(公告)日:2009-09-22

    申请号:US10685234

    申请日:2003-10-14

    IPC分类号: G06F7/04 H04N7/16

    摘要: A public licensing infrastructure (PLI) for a digital rights management (DRM) system is described. In an implementation, a method includes generating a formal license for content. The formal license includes a decryption key for decrypting the content and access rules for accessing the content. A plurality of license authorities is configured to provide a plurality of partial licenses. The plurality of partial licenses is combinable to form the formal license. Each license authority provides a respective partial license.

    摘要翻译: 描述了数字版权管理(DRM)系统的公共许可基础设施(PLI)。 在实现中,一种方法包括生成内容的正式许可证。 正式许可证包括用于解密内容的解密密钥和用于访问内容的访问规则。 多个许可机构被配置为提供多个部分许可证。 多个部分许可证可组合形成正式许可证。 每个许可证机构都提供相应的部分许可证。

    Fully scalable encryption for scalable multimedia
    7.
    发明授权
    Fully scalable encryption for scalable multimedia 有权
    用于可扩展多媒体的完全可扩展的加密

    公开(公告)号:US07406176B2

    公开(公告)日:2008-07-29

    申请号:US10405970

    申请日:2003-04-01

    IPC分类号: H04N7/167

    摘要: Subject matter includes exemplary systems and related methods for fully scalable encryption of scalable multimedia. A scalable bitstream encrypted using the subject matter maintains full functionality of scalable features in the encrypted form. The exemplary scalable encryption allows transcoding, rate shaping, and other operations directly on the ciphertext without degradation of scalable compression efficiency and error resiliency.

    摘要翻译: 主题包括用于可扩展多媒体的完全可扩展加密的示例性系统和相关方法。 使用主题加密的可扩展比特率保持加密形式的可扩展特征的完整功能。 示例性的可扩展加密允许直接在密文上进行代码转换,速率整形和其他操作,而不降低可伸缩的压缩效率和错误弹性。

    Scalable, error resilient DRM for scalable media
    8.
    发明授权
    Scalable, error resilient DRM for scalable media 有权
    可伸缩的,具有弹性的DRM可扩展媒体

    公开(公告)号:US07313814B2

    公开(公告)日:2007-12-25

    申请号:US10405973

    申请日:2003-04-01

    摘要: An exemplary digital rights management engine and related methods divides multimedia content into service level layers, encrypts at least some of the layers, and offers access to the encrypted layers by permission. The multimedia content may be layered using multiple different layering approaches simultaneously, and access to the different types of layers may be offered simultaneously. One of the layers may be left unencrypted to allow free browsing of a low quality service level. An exemplary system of key management for digital rights management is also disclosed.

    摘要翻译: 示例性数字版权管理引擎和相关方法将多媒体内容划分为服务级别层,至少对某些层进行加密,并且通过许可提供对加密层的访问。 多媒体内容可以使用多个不同的分层方法同时分层,并且可以同时提供对不同类型的层的访问。 其中一层可能未加密,以允许免费浏览低质量的服务级别。 还公开了一种用于数字版权管理的示例性密钥管理系统。

    Elliptic curve point multiplication
    9.
    发明申请
    Elliptic curve point multiplication 有权
    椭圆曲线点乘法

    公开(公告)号:US20070064931A1

    公开(公告)日:2007-03-22

    申请号:US11173251

    申请日:2005-07-01

    IPC分类号: H04L9/30

    摘要: Systems and methods configured for recoding an odd integer and elliptic curve point multiplication are disclosed, having general utility and also specific application to elliptic curve point multiplication and cryptosystems. In one implementation, the recoding is performed by converting an odd integer k into a binary representation. The binary representation could be, for example, coefficients for powers of two representing the odd integer. The binary representation is then configured as comb bit-columns, wherein every bit-column is a signed odd integer. Another implementation applies this recoding method and discloses a variation of comb methods that computes elliptic curve point multiplication more efficiently and with less saved points than known comb methods. The disclosed point multiplication methods are then modified to be Simple Power Analysis (SPA)-resistant.

    摘要翻译: 公开了用于重新编码奇整数和椭圆曲线点乘法的系统和方法,其具有一般实用性,并且还具体应用于椭圆曲线点乘法和密码系统。 在一个实现中,通过将奇数整数k转换成二进制表示来执行重新编码。 二进制表示可以是例如表示奇整数的两个幂的系数。 然后将二进制表示配置为梳状位列,其中每个位列是带符号的奇整数。 另一种实现方式应用这种重新编码方法,并且公开了一种梳理方法的变体,它们比已知的梳理方法更有效地计算椭圆曲线点乘积并且具有较少的保存点。 然后将所公开的点乘法方法修改为抗电阻简单功率分析(SPA)。

    Locally interative encryption generating compliant ciphertext for general syntax specifications
    10.
    发明申请
    Locally interative encryption generating compliant ciphertext for general syntax specifications 有权
    本地迭代加密生成符合一般语法规范的密文

    公开(公告)号:US20060227965A1

    公开(公告)日:2006-10-12

    申请号:US11095048

    申请日:2005-03-31

    IPC分类号: H04K1/06

    摘要: A fast and secure syntax compliant encryption schema, “locally iterative encryption,” can produce compliant ciphertext for a general syntax specification. In one implementation, an engine partitions a data stream into blocks, and encrypts each block iteratively until syntax compliance conditions are met. A system using the schema can utilize either stream ciphers or block ciphers in different modes. Locally iterative encryption methods are fast and remain at approximately the same speed even as the length of the data stream to be encrypted increases. Besides providing superior processing speed, the locally iterative encryption schema is also more robust to errors in the resulting ciphertext and in the resulting decrypted plaintext than conventional syntax compliant encryption techniques. Locally iterative encryption is secure as long as an underlying encryption cipher selected for use in the schema is secure.

    摘要翻译: 快速和安全的语法兼容加密模式“本地迭代加密”可以为通用语法规范提供符合规定的密文。 在一个实现中,引擎将数据流分割成块,并且迭代地对每个块进行加密,直到满足语法符合条件。 使用该模式的系统可以利用不同模式的流密码或块密码。 即使要加密的数据流的长度增加,本地迭代加密方法也是快速且保持大致相同的速度。 除了提供优越的处理速度之外,本地迭代加密模式对于所生成的密文中的错误以及生成的解密明文也比传统的符合法规的加密技术更加鲁棒。 只要选择用于模式的底层加密密码是安全的,本地迭代加密就是安全的。