System and method for assigning sequence keys to a media player to enable hybrid traitor tracing
    1.
    发明申请
    System and method for assigning sequence keys to a media player to enable hybrid traitor tracing 有权
    将序列密钥分配给媒体播放器以启用混合叛逆者追踪的系统和方法

    公开(公告)号:US20070067242A1

    公开(公告)日:2007-03-22

    申请号:US11230843

    申请日:2005-09-19

    IPC分类号: H04L9/00

    摘要: A hybrid traitor-tracing enabling system comprises an inner code and a multi-level outer code. The inner code comprises encrypted tables comprising codewords for file segment variations. One level of the multi-level outer code comprises assignments of a cluster of sequence keys to manufacturers or models of media players. Another level comprises assignments to the media players of sequence keys within the cluster. The system enables tracing of only a manufacturer or model, or a manufacturer, model, and a media player. When tracing a manufacturer or model, the system enables detection with relatively few recovered files. With additional recovered files, the media player used for piracy can be discovered. Furthermore, the present system enables detection of collusion between manufacturers or models and collusion between individual media players.

    摘要翻译: 混合叛逃追踪启用系统包括内部代码和多级外部代码。 内部代码包括包括用于文件段变化的码字的加密表。 多级外部代码的一个级别包括对制造商或媒体播放器的模型的序列密钥簇的分配。 另一个级别包括对集群内的序列密钥的媒体播放器的分配。 该系统只能跟踪制造商或型号,制造商,型号和媒体播放器。 跟踪制造商或型号时,系统可以检测到相对较少的恢复文件。 使用额外的恢复文件,可以发现用于盗版的媒体播放器。 此外,本系统能够检测制造商或模型之间的串通以及各个媒体播放器之间的串通。

    Tamper-resistant trusted java virtual machine and method of using the same
    2.
    发明申请
    Tamper-resistant trusted java virtual machine and method of using the same 失效
    防篡改的可信java虚拟机和使用方法相同

    公开(公告)号:US20050114683A1

    公开(公告)日:2005-05-26

    申请号:US10723725

    申请日:2003-11-26

    IPC分类号: G06F21/00 H04L9/32

    摘要: A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.

    摘要翻译: 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。

    Method for tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
    3.
    发明申请
    Method for tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system 有权
    在广播加密系统中跟踪叛国联盟并防止数字内容盗版的方法

    公开(公告)号:US20070165853A1

    公开(公告)日:2007-07-19

    申请号:US11323247

    申请日:2005-12-30

    IPC分类号: H04N7/167

    摘要: A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 一种系统,方法和计算机程序产品,用于查找串联产生盗版保护内容的接收者联盟,然后评估每个已识别联盟的特定成员是叛徒的机会与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    Renewable traitor tracing
    4.
    发明申请
    Renewable traitor tracing 有权
    可再生叛逆者追踪

    公开(公告)号:US20070067244A1

    公开(公告)日:2007-03-22

    申请号:US11230022

    申请日:2005-09-19

    IPC分类号: G06Q99/00

    摘要: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    摘要翻译: 可重新防止广播加密系统中的叛逃者重新使用受损密钥的系统,方法和计算机程序产品。 许可代理机构优先为制造商分配一组序列密钥,并将序列密钥块(SKB)分配给要分发的受保护内容文件。 文件可以分布在预先记录的媒体上,通常包括几个文件修改。 盗版版本的特定修改可以帮助您识别哪些叛徒造成其盗用。 分配给叛逃者识别后分发的新文件的SKB无法使用先前内容盗版中使用的受损密钥进行有效的处理。 无辜的接收者碰巧损害了与叛逆者共同的密钥,可以使用该集合中的替代未妥协的序列密钥来有效解密内容。 然而,叛徒将逐步通过所有的序列键,而不会达到可以工作的顺序键。

    System and Method to Proactively Detect Software Tampering
    5.
    发明申请
    System and Method to Proactively Detect Software Tampering 失效
    系统和方法主动检测软件篡改

    公开(公告)号:US20080066178A1

    公开(公告)日:2008-03-13

    申请号:US11930425

    申请日:2007-10-31

    IPC分类号: G06F21/00

    摘要: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

    摘要翻译: 使用动态演进的审计日志主动检测软件入侵,其中日志条目在审计日志中生成,并且密钥值是根据先前日志条目和先前密钥两者的单向函数进行演变的。 具有生成的日志条目和最终密钥值的审核日志被传送到通过分析这些值来检测软件入侵的清算站。 为了减少要发送的日志的大小,日志条目被分配相同的值,因此只需要将一个日志条目和最后一个密钥值发送到清算所。

    System and method for assigning sequence keys to a media player to enable flexible traitor tracing
    6.
    发明申请
    System and method for assigning sequence keys to a media player to enable flexible traitor tracing 有权
    用于将序列键分配给媒体播放器以实现灵活的叛逆者追踪的系统和方法

    公开(公告)号:US20070174637A1

    公开(公告)日:2007-07-26

    申请号:US11231174

    申请日:2005-09-19

    IPC分类号: G06F12/14

    摘要: A traitor tracing enabling system assigns sequence keys to a media player to enable better tracability with fewer actual variations in the content. The system comprises a technique for increasing a number of sequence keys, allowing a finer granularity in a traitor tracing process with little increase in sequence key storage or in bandwidth required to transmit sequence keys to a media player. The present system comprises a variation table which maps the sequence keys to the individual variations in the file, such that multiple sequence keys can be mapped to a single variation.

    摘要翻译: 叛逆追踪启用系统将序列密钥分配给媒体播放器,以实现更好的可跟踪性,同时减少内容的实际变化。 该系统包括用于增加多个序列密钥的技术,允许在追踪跟踪过程中更细的粒度,其中序列密钥存储器的增加很少或将序列密钥发送到媒体播放器所需的带宽中。 本系统包括将序列密钥映射到文件中的各个变体的变化表,使得可以将多个序列密钥映射到单个变体。

    System and method for protecting a title key in a secure distribution system for recordable media content
    7.
    发明申请
    System and method for protecting a title key in a secure distribution system for recordable media content 失效
    用于保护用于可记录媒体内容的安全分发系统中的标题密钥的系统和方法

    公开(公告)号:US20050177740A1

    公开(公告)日:2005-08-11

    申请号:US10775596

    申请日:2004-02-09

    摘要: A title key protection system includes a title key with recordable media content; storage in a repository is not required. The title key is decrypted when needed by a clearinghouse, and then re-encrypted. The title key confers rights from the content owners to the user to play and copy the content for personal use. A user downloads encrypted content from a content repository. The user's media recording device extracts an encrypted title key from the content and obtains a media key block and media ID from the physical media on which the content will be recorded. The encrypted title key, media key block, and media ID are transmitted to a clearinghouse. The clearinghouse decrypts the title key and derives a media unique key from the media key block and media ID. The clearinghouse re-encrypts the title key with the media unique key and returns this re-encrypted title key to the media recording device for recording with the content on the physical media.

    摘要翻译: 标题密钥保护系统包括具有可记录媒体内容的标题密钥; 存储库中的存储不是必需的。 标题密钥在清算所需要时解密,然后重新加密。 标题密钥赋予内容所有者对用户播放和复制用于个人使用的内容的权利。 用户从内容存储库下载加密的内容。 用户的媒体记录设备从内容中提取加密的标题密钥,并从内容将被记录在物理介质上获取媒体密钥块和媒体ID。 加密的标题密钥,媒体密钥块和媒体ID被发送到结算所。 清算所解密标题密钥,并从媒体密钥块和媒体ID导出媒体唯一密钥。 票据交换所使用媒体唯一键重新加密标题密钥,并将该重新加密的标题密钥返回到媒体记录设备,以便用物理介质上的内容进行记录。

    System and method for secure authentication of external software modules provided by third parties

    公开(公告)号:US20050216422A1

    公开(公告)日:2005-09-29

    申请号:US11123373

    申请日:2005-05-06

    摘要: An external module loads into an entity's memory and is transformed by two functions. These are namely, the STOMP function and the UNSTOMP function. One or both of these functions is based on the actual code that is found in a legitimate version of the external module. The STOMP-UNSTOMP pair produces an external module that works differently if even a single byte of code in the external module has been changed by an attacker. The STOMP transforms the external module and makes it temporarily unusable whilst conversely, the UNSTOMP repairs the damage and makes it workable again. Thus, if the module is not authentic, the pairing between the STOMP and UNSTOMP is broken. Therefore, a patched module from a hacker remains unusable since the STOMP and UNSTOMP transformations do not produce a working external module. Because of the STOMP and UNSTOMP technique, an application is secure because if an external module is free from tampering then the application executes normally. In the event that an illicitly patched external module is loaded then the application fails. In either case, no audio, video or information content is illegally copied because of the disablement of the external module by the STOMP-UNSTOMP procedure.