摘要:
A digital processor (16) is disclosed for improving the statistical characteristics of nondeterministic random-like binary sequence. The basic elements of the digital processor are a feedback loop comprising a delay (17) and a signal combiner (18) and a subsampler (19). Maximum performance of the digital processor is achieved when a relatively prime relationship exists between number of cells in the delay (17) and ratio of the original signaling rate to the output signaling rate of the subsampler (19). Mathematical analysis is presented for showing that the digital processor improves both the equidistribution of the binary variable and autocorrelation statistic of output signal over the nondeterministic random-like binary signal. A further improvement in statistical properties is obtained by using two digital processors (116 and 121) in serial fashion.
摘要:
Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.
摘要:
A method for performing electronic transactions, comprising receiving a long-term certificate, authenticating a user associated with the long-term certificate, and then sending a short-term certificate to the authenticated user. In addition, risk associated with the user can be evaluated, and this risk information, as well as other information, can be included in the short-term certificate.
摘要:
A method for performing electronic transactions, comprising receiving a long-term certificate, authenticating a user associated with the long-term certificate, and then sending a short-term certificate to the authenticated user. In addition, risk associated with the user can be evaluated, and this risk information, as well as other information, can be included in the short-term certificate.
摘要:
The generation of electronic identifiers for network interface units connected to a data network for use in detecting unauthorized decryption of encrypted data transmitted over the data network. A random number is generated for use as a private key decryption code and is stored in memory in each network interface unit. A public key is calculated from the stored private key using a non-invertible mathematical formula. If the calculated public key is unique, then a portion of the public key (e.g. a subset of its bits) is stored in a data provider database as an electronic identifier for use in detecting unauthorized decryption of data by the interface unit.
摘要:
We have recognized that there is a strong need to control and maintain the secrecy of the intelligence that may be used by computers to communicate with another, for example, by encrypting the messages that they exchange with one another. Thus, the encryption keys used to encrypt such messages need to be managed in a highly secure manner. Accordingly, we provide an encryption module, which, in accord with an aspect of the invention, generates a unique device encryption key (S.sub.local), a cryptographic key formed from a unique identification key (S.sub.id) and an associated public key (KP.sub.id), and at least one program encryption key, in which the public key is generated as a function of the unique identification key. The module then encrypts the unique identification key and program encryption key using said device encryption key and stores the encrypted result in memory internal to security module, thereby securing the keys against misappropriation. In addition, the module provides a mechanism for using the program encryption key to encrypt information that it receives from an external source and store the encrypted information in memory external to the security module, and responsive to receiving from a requester a request for the program encryption key, encrypting the program encryption key, in accord with an aspect of the invention, using a symmetrical encryption key generated as a function of a public key generated by a security module associated with the requester. The former security module then supplies the encrypted program encryption key to the requester.
摘要:
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content.
摘要:
Systems and methods are described for targeting advertisements to a user of an electronic device. In one embodiment, the user's device receives multiple advertisements and at least one content item. Using a control associated with the content item and controls associated with the advertisements, the user's system dynamically determines the optimum advertisements to render with the content item. Information about the advertisements that were selected can be sent to a remote party to facilitate payment by the provider of the advertisements to the provider of the content.
摘要:
A method for distributing an electronic content item for consumption with advertisements is provided. In one embodiment, a content provider creates a license identifying one or more slots within an electronic content item at which advertisements are to be inserted. The license specifies one or more types of advertisements that are not permitted to be inserted into the slots, and also specifies criteria for dynamically selecting advertisements to insert into the one or more slots. The content provider securely associates the electronic license with the electronic content item and distributes the electronic content item and the electronic license to a third party for consumption or subsequent transfer to an end user.
摘要:
A method and apparatus for establishing and distributing a currency is disclosed. First, a user accesses a web site and downloads a form. The user completes and returns the form with a currency name, an initial amount of currency and other parameters which characterize the currency. Next, the system server checks to ensure the requested currency name is unique. If the name is unique, the system server and user's smart card employ a cryptographic key management system to establish the currency as a leaf in a currency tree on the user's smart card. A new root value is computed for the currency tree and saved in memory on the user's smart card. The user may then distribute the currency to other holders of smart cards from the same smart card issuer using the same cryptographic key management system employed between the system server and the user's smart card.