ADAPTIVE TRAITOR TRACING
    2.
    发明申请
    ADAPTIVE TRAITOR TRACING 有权
    自适应TRAITOR跟踪

    公开(公告)号:US20090319227A1

    公开(公告)日:2009-12-24

    申请号:US12143658

    申请日:2008-06-20

    IPC分类号: G06F17/18

    摘要: One embodiment of the present invention includes a method for traitor tracing that selects a probability distribution for the assignment of file-segment variations in a digital file. This probability distribution is selected to improve traceability for a particular size of a coalition of attackers. At least one symbol for each file-segment variation is then distributed based on the selected probability distribution.

    摘要翻译: 本发明的一个实施例包括一种用于叛逆者跟踪的方法,其选择用于数字文件中的文件段变体的分配的概率分布。 选择这种概率分布来提高攻击者联盟特定大小的可追溯性。 然后,基于所选择的概率分布来分配每个文件段变化的至少一个符号。

    Method for assigning encryption keys
    3.
    发明授权
    Method for assigning encryption keys 有权
    分配加密密钥的方法

    公开(公告)号:US06947563B2

    公开(公告)日:2005-09-20

    申请号:US09789451

    申请日:2001-02-20

    摘要: An encryption key matrix has rows grouped into segments, with a set of one segment per column establishing a slot. Slots are assigned to device manufacturers, with the keys of the slots then being assigned to decryption devices made by the respective manufacturer. In generating the slots, the number “q” of segments in a column is first defined such that a predetermined maximum number of devices can be revoked devices (in that all the keys held by the device are revoked) while ensuring that a good device remains a functional device with a probability of at least (1−Q), wherein Q is a predefined device confidence. Once the number “q” of segments has been defined, the slots themselves are defined in a provably non-discriminatory fashion using an error-correcting code such as a Reed-Solomon code. With this invention, overlap between slots can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the keys in the slots of a “bad” manufacturer are revoked.

    摘要翻译: 加密密钥矩阵将行分组成段,每列建立一个段的一组。 插槽被分配给设备制造商,然后插槽的密钥被分配给由相应制造商制造的解密设备。 在产生时隙中,首先定义列中的段数“q”,使得可以撤销预定的最大数量的设备(因为设备保持的所有密钥被撤销),同时确保良好设备保持 具有至少(1-Q)的概率的功能设备,其中Q是预定义的设备置信度。 一旦已经定义了段数“q”,则使用纠错码(例如里德 - 所罗门码)以可证明的非歧视方式来定义时隙本身。 利用本发明,可以最小化时隙之间的重叠,以最小化当“坏”制造商的时隙中的密钥被撤销时,无辜设备的密钥组可能被无意中撤销的可能性。

    Unified broadcast encryption system

    公开(公告)号:US09712321B2

    公开(公告)日:2017-07-18

    申请号:US12131076

    申请日:2008-05-31

    IPC分类号: H04L9/00 H04L9/08 G09C5/00

    摘要: A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
    5.
    发明授权
    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system 有权
    跟踪叛国者联盟,防止广播加密系统中数字内容的盗版

    公开(公告)号:US08176568B2

    公开(公告)日:2012-05-08

    申请号:US11323247

    申请日:2005-12-30

    IPC分类号: G06F21/00

    摘要: A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 一种系统,方法和计算机程序产品,用于查找串联产生盗版保护内容的接收者联盟,然后评估每个已识别联盟的特定成员是叛徒的机会与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM
    6.
    发明申请
    TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM 失效
    跟踪TRAITOR COALITIONS并防止数字内容在广播加密系统中的传播

    公开(公告)号:US20120036578A1

    公开(公告)日:2012-02-09

    申请号:US13267774

    申请日:2011-10-06

    IPC分类号: G06F21/00

    摘要: Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 本发明的实施例涉及发现联合制作盗版的受保护内容的接收者的联盟,然后评估每个被识别的联盟的特定成员是叛徒的信心与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    System, method, and service for performing unified broadcast encryption and traitor tracing for digital content
    7.
    发明授权
    System, method, and service for performing unified broadcast encryption and traitor tracing for digital content 有权
    用于执行数字内容的统一广播加密和叛逆追踪的系统,方法和服务

    公开(公告)号:US07876895B2

    公开(公告)日:2011-01-25

    申请号:US11746491

    申请日:2007-05-09

    IPC分类号: H04K1/04

    摘要: A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKBu). The system decrypts digital content by obtaining required key media variants from the MKBu, using the key media variant to find an entry in a variant key table, decrypt a title key, and locate a variant number from the variant key table. The system uses the variant number to identify which of the variations may be decrypted by the title key and uses the title key to decrypt segments and variations.

    摘要翻译: 统一广播加密系统将媒体密钥树划分为S子树,将数字内容划分为多个段,并将其中的一些段转换为变体; 段数和变化数为q。 系统将每个子树细分为q / | S | 细分子树,将关键媒体变体分配给每个细分子树,并生成统一的媒体关键块(MKBu)。 该系统通过从MKBu获得所需的密钥介质变体来解密数字内容,使用密钥介质变体来在变式密钥表中找到条目,解密标题密钥以及从变体密钥表中定位变体号。 系统使用变体号来标识哪个变体可以由标题密钥解密,并使用标题密钥来解密段和变体。

    System and method to proactively detect software tampering
    8.
    发明授权
    System and method to proactively detect software tampering 失效
    主动检测软件篡改的系统和方法

    公开(公告)号:US07707429B2

    公开(公告)日:2010-04-27

    申请号:US11930425

    申请日:2007-10-31

    IPC分类号: G06F21/00 H04L9/00

    摘要: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

    摘要翻译: 使用动态演进的审计日志主动检测软件入侵,其中日志条目在审计日志中生成,并且密钥值是根据先前日志条目和先前密钥两者的单向函数进行演变的。 具有生成的日志条目和最终密钥值的审核日志被传送到通过分析这些值来检测软件入侵的清算站。 为了减少要发送的日志的大小,日志条目被分配相同的值,因此只需要将一个日志条目和最后一个密钥值发送到清算所。

    System and method for assigning sequence keys to a media player to enable hybrid traitor tracing
    9.
    发明授权
    System and method for assigning sequence keys to a media player to enable hybrid traitor tracing 有权
    将序列密钥分配给媒体播放器以启用混合叛逆者追踪的系统和方法

    公开(公告)号:US07630497B2

    公开(公告)日:2009-12-08

    申请号:US11230843

    申请日:2005-09-19

    IPC分类号: H04L9/00 G06F21/00

    摘要: A hybrid traitor-tracing enabling system comprises an inner code and a multi-level outer code. The inner code comprises encrypted tables comprising codewords for file segment variations. One level of the multi-level outer code comprises assignments of a cluster of sequence keys to manufacturers or models of media players. Another level comprises assignments to the media players of sequence keys within the cluster. The system enables tracing of only a manufacturer or model, or a manufacturer, model, and a media player. When tracing a manufacturer or model, the system enables detection with relatively few recovered files. With additional recovered files, the media player used for piracy can be discovered. Furthermore, the present system enables detection of collusion between manufacturers or models and collusion between individual media players.

    摘要翻译: 混合叛逃追踪启用系统包括内部代码和多级外部代码。 内部代码包括包括用于文件段变化的码字的加密表。 多级外部代码的一个级别包括对制造商或媒体播放器的模型的序列密钥簇的分配。 另一个级别包括对集群内的序列密钥的媒体播放器的分配。 该系统只能跟踪制造商或型号,制造商,型号和媒体播放器。 跟踪制造商或型号时,系统可以检测到相对较少的恢复文件。 使用额外的恢复文件,可以发现用于盗版的媒体播放器。 此外,本系统能够检测制造商或模型之间的串通以及各个媒体播放器之间的串通。

    Unified broadcast encryption system

    公开(公告)号:US09729316B2

    公开(公告)日:2017-08-08

    申请号:US12038773

    申请日:2008-02-27

    IPC分类号: H04L9/00 H04L9/08 G09C5/00

    摘要: A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.