摘要:
A system for controlling unauthorized access to information distributed to users and, more particularly, for controlling unauthorized access to software distributed to users is provided. One method utilizing the system of the present invention enables the software to be encrypted using a single encryption key and to be decrypted using a multiplicity of "decryption" keys, each of which is unique to a particular user. The "decryption" keys are the products of numeric representations of identifying information relating to users and unique user keys generated using the numeric representations and a "true" decryption key. Since each user receives a unique user key and both the numeric representation and the user key are generated using the identifying information, if the user reveals the numeric representation and the user key (or the product of the numeric representation and the user key), the numeric representation and the user key can be traced to the user who revealed them. Another method utilizing the system of the present invention introduces randomness or pseudo-randomness into the decryption scheme to provide an additional level of security to the scheme.
摘要:
Serialized data from broadcast services is provided to a broadcast server for transmitting to one or more client devices. The serialized data may correspond to shared data, private data, or control data. Data is scheduled for transmission based on weighted priorities including quality of service metrics. The transmission frame is arranged according to a frame protocol that includes provisions for a table of contents indexing system for the shared data. Packets of shared data are formatted based on criteria that is known by the particular broadcast service and corresponding application that is resident on the client device. The client device receives the table of contents at the transport layer, and notifies applications of data that will be available in the next frame. Applications submit prioritized requests to the transport layer, requesting data in the next frame. Data is retrieved by the transport layer, and deserialized by handlers for each application.
摘要:
An imaging or other sensory reproduction system efficiently converts image or other sensory data between a perceptual color space (e.g., the sRGB color space) and a physical color space (unity gamma) or other perceptual/physical sensory models that are related by an expression involving a computationally expensive exponential function. The imaging system calculates exponential functions that can be composed from computationally inexpensive operations, such as square root, square, reciprocal, as well as multiplications and/or additions and subtractions. These computationally less expensive functions are then combined, such as in a weighted and/or offset mean, summation or difference to approximate the computationally expensive exponential function. The imaging system evaluates the expression using the approximation to efficiently yield the converted image data. The efficient conversion between perceptual and physical color spaces allows operations, such as blending and anti-aliasing, to be performed in the physical color space before display of a perceptual color space image.
摘要:
A method for providing a 16-bit floating point data representation where the 16-bit floating point data representation may be operated upon by a microprocessors native floating point instruction set. The method contemplates the use a variety of techniques for converting the 16-bit floating point number into a representative native floating point value. Thereafter, the native microprocessor floating point instruction set may perform operations upon the converted data. Upon completion, the native floating point data representation may be converted back into the 16-bit floating point value.
摘要:
An imaging or other sensory reproduction system efficiently converts image or other sensory data between a perceptual color space (e.g., the sRGB color space) and a physical color space (unity gamma) or other perceptual/physical sensory models that are related by an expression involving a computationally expensive exponential function. The imaging system calculates exponential functions that can be composed from computationally inexpensive operations, such as square root, square, reciprocal, as well as multiplications and/or additions and subtractions. These computationally less expensive functions are then combined, such as in a weighted and/or offset mean, summation or difference to approximate the computationally expensive exponential function. The imaging system evaluates the expression using the approximation to efficiently yield the converted image data. The efficient conversion between perceptual and physical color spaces allows operations, such as blending and anti-aliasing, to be performed in the physical color space before display of a perceptual color space image.
摘要:
A high color resolution image is accurately approximated with a low resolution image through a unique combination of ordered dithering and error diffusion. The true color of each pixel is modified with error from previously rendered pixels and then dithered to an intermediate color of 15 bits. The intermediate color is then mapped to the nearest displayable color in a displayable color palette using a precomputed look-up table. Any error between a displayed color of a pixel and its true color is calculated and spread among neighboring pixels not yet rendered.
摘要:
A custom palette comprises colors on a plurality of luminance levels consisting of colors of uniform luminance. The spacing in luminance between levels varies in relation to the luminance, the spacing between levels being closer at low luminance and increasing at greater luminance. The palette preferably includes a gray color from each luminance level, highly saturated colors at the vertices of every alternate level, and a selection of lower saturation colors encircling the gray color on each level. The selection of lower saturation colors preferably includes a higher concentration of flesh and sky colors.
摘要:
Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.
摘要:
A computer-implemented system and method for configuring and operating a white-box cipher is disclosed. In one implementation, the system employs a method for configuring pseudorandom data derived from a key to perform key-scheduling functionality associated with rounds of the cipher. Additionally, the system employs a method for generating white-box executable code, wherein the code hides the pseudorandom data by incorporating it into mathematical operations performed during execution of the rounds. Accordingly, the cipher is suited for white-box applications managing digital rights, such as decoding audio, video and other content.
摘要:
An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.