Method for assigning encryption keys
    2.
    发明授权
    Method for assigning encryption keys 有权
    分配加密密钥的方法

    公开(公告)号:US06888944B2

    公开(公告)日:2005-05-03

    申请号:US09777506

    申请日:2001-02-05

    摘要: Sets of encryption keys useful by devices for decrypting encrypted content are defined using an error-correcting code such as a Reed-Solomon code to define vectors of length “n” over an alphabet of (0, . . . , N−1), wherein “n” is the number of columns in a key matrix and “N” is the number of rows in the matrix. Each vector represents a set of keys that can be assigned to a device. With this invention, overlap between sets of keys can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the key set of a compromised device is revoked. Also, only the generating matrix of the error-correcting code and the index of one set of keys need be stored in memory, since all previously defined key sets can be regenerated if need be from just the generating matrix and index.

    摘要翻译: 使用诸如里德 - 所罗门码的纠错码来定义加密内容解密设备所使用的加密密钥集合,以在(0,...,N-1)的字母表上定义长度为“n”的向量, 其中“n”是键矩阵中的列数,“N”是矩阵中的行数。 每个向量表示可以分配给设备的一组密钥。 利用本发明,可以最小化密钥组之间的重叠,以最小化当被破坏的设备的密钥组被撤销时,无辜设备的密钥组可能被无意中撤销的可能性。 此外,只有纠错码的生成矩阵和一组密钥的索引需要存储在存储器中,因为如果需要仅来自生成矩阵和索引,则可以重新生成所有先前定义的密钥集。

    Renewable traitor tracing
    6.
    发明授权
    Renewable traitor tracing 有权
    可再生叛逆者追踪

    公开(公告)号:US09520993B2

    公开(公告)日:2016-12-13

    申请号:US11230022

    申请日:2005-09-19

    IPC分类号: G06Q20/00 H04L9/08

    摘要: The present invention provides a method performed on a computer of preventing re-use of compromised keys in a broadcast encryption system. In an exemplary embodiment, the method includes (1) incorporating a particular set of Sequence Keys assigned by a license agency into individual receivers, (2) assigning a Sequence Key Block (SKB) by the license agency to at least one distributed protected file, (3) performing incremental cryptographic testing by the individual receivers to determine if a selected Sequence Key from the set of Sequence Keys is compromised, (4) if the selected Sequence Key is not compromised, decrypting the file, and (5) if the selected Sequence Key is compromised and if a subsequent Sequence Key from the set of Sequence Keys is available, selecting the subsequent Sequence Key.

    摘要翻译: 本发明提供一种在计算机上执行的防止在广播加密系统中重复使用受损密钥的方法。 在一个示例性实施例中,该方法包括(1)将由许可证代理机构分配的特定的一组序列密钥合并到单独的接收机中,(2)将许可代理机构的序列密钥块(SKB)分配给至少一个分布式受保护文件, (3)执行各个接收机的增量密码测试,以确定序列密钥集合中所选择的序列密钥是否受到损害,(4)如果所选择的序列密钥不受影响,解密该文件,以及(5)如果选定的 序列密钥被破坏,并且如果序列密钥集合中的后续序列密钥可用,则选择随后的序列密钥。

    Method and means for evaluating a tetrahedral linear interpolation
function
    7.
    发明授权
    Method and means for evaluating a tetrahedral linear interpolation function 失效
    用于评估四面体线性插值函数的方法和装置

    公开(公告)号:US6137494A

    公开(公告)日:2000-10-24

    申请号:US929139

    申请日:1997-09-05

    IPC分类号: G06T3/40 G06T5/00

    CPC分类号: G06T3/4015 G06T3/4007

    摘要: A method of evaluating a tetrahedral linear interpolation function utilizes a table preparation process and a linear interpolating process. In the table preparation process, values v and domain points p of the function are related by two tetrahedral interpolation variables denoted as a matrix T and a vector t, as follows: v=t+pT. The coordinates of p include n components, and the value v includes m components. The matrix T includes n rows and m columns, as it must to relate p to v. If the value of the function is scalar, t is also a scalar, and T is a vector of n elements. From the coordinates of the (n+1) domain input points and the function values v at these points, the values of variables t and T are computed and stored in a table. The linear interpolation procedure of the invention uses the values tabulated for t and T to calculate an approximation for the components of the function value v at a given p. The function arguments are stored in a first array of n elements denoted as p[i], and the calculated approximations are to be stored in a second array of m elements denoted as v[j]. The approximations for the array v[j] may be calculated according to the following equation: ##EQU1##

    摘要翻译: 评估四面体线性插值函数的方法利用表格准备过程和线性内插处理。 在表的准备过程中,函数的值v和域点p由表示为矩阵T和向量t的两个四面体内插变量相关,如下:v = t + pT。 p的坐标包括n个分量,并且值v包括m个分量。 矩阵T包括n行和m列,因为它必须将p与v相关联。如果函数的值是标量,则t也是标量,T是n个元素的向量。 从这些点处的(n + 1)域输入点的坐标和函数值v,计算变量t和T的值并将其存储在表中。 本发明的线性内插程序使用列表为t和T的值来计算在给定p处的函数值v的分量的近似。 函数参数存储在表示为p [i]的n个元素的第一个数组中,计算出的近似值将被存储在表示为v [j]的m个元素的第二个数组中。 阵列v [j]的近似可以根据以下等式计算:

    Function approximation using a centered cubic packing with tetragonal
disphenoid extraction
    8.
    发明授权
    Function approximation using a centered cubic packing with tetragonal disphenoid extraction 失效
    函数近似使用中心立方填充与四方形去萃取

    公开(公告)号:US5751926A

    公开(公告)日:1998-05-12

    申请号:US996306

    申请日:1992-12-23

    IPC分类号: G06F17/17 H04N1/60 G03F3/08

    CPC分类号: G06F17/17 H04N1/6022

    摘要: The invention provides approximation of the value of a function of three variables. The invention embraces three processes: function domain packing, polyhedron extraction, and volumetric interpolation. The processes are applied to a mathematical function to calculate an approximation for the function range output value at a point which has been arbitrarily selected from the input domain of the function. Function domain packing utilizes two interlocked domain subdivisions. A first subdivision and a second subdivision each divide the domain space into rectangular solids. Each subdivision is accomplished by means of a plurality of planes of constant value corresponding to each of the input dimensions. After a function domain has been so subdivided, a tetrahedral volume is extracted from the fraction domain space. This tetrahedral volume is defined by two points from the first subdivision and two points from the second subdivision. The third process of the invention is a function approximation method using volumetric interpolation. If the fraction domain is subdivided according to the present invention, a continuous approximation of function range output values will result. The volumetric interpolation process commences by subdividing the extracted tetrahedron into four sub-tetrahedra. The subdivision is implemented by drawing lines from each of the vertices of the extracted tetrahedron to the target evaluation point to form four sub-tetrahedra.

    摘要翻译: 本发明提供了三个变量的函数的值的近似。 本发明包括三个过程:功能领域包装,多面体提取和体积插值。 该过程被应用于数学函数以计算在从功能的输入域中任意选择的点处的功能范围输出值的近似。 功能域包装使用两个互锁域分部。 第一细分和第二细分每个将域空间分成矩形固体。 每个细分通过对应于每个输入尺寸的多个恒定值平面来实现。 在函数域被细分之后,从分数域空间中提取四面体体积。 这个四面体体积是由第一个细分的两个点和第二个细分的两个点定义的。 本发明的第三个过程是使用体积插值的函数近似方法。 如果根据本发明细分分数域,则将产生功能范围输出值的连续近似。 通过将提取的四面体细分为四个亚四面体开始体积插值过程。 通过将提取的四面体的每个顶点的线绘制到目标评估点来实现细分以形成四个子四面体。

    REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS
    9.
    发明申请
    REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS 有权
    在具有不同安全级别的设备集群中重新配置内容标签

    公开(公告)号:US20110158404A1

    公开(公告)日:2011-06-30

    申请号:US12651382

    申请日:2009-12-31

    IPC分类号: H04L9/00

    摘要: According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device.

    摘要翻译: 根据本发明的一个实施例,提供了一种系统,方法和计算机程序产品,用于在广播加密系统中具有不同安全级别的设备群中重新标识标题密钥。 所述方法包括:接收新的管理密钥,并将加密的标题密钥与先前使用的管理密钥解除绑定,所述标题密钥具有安全级别,并且驻留在具有安全等级的设备的标题密钥块中,所述设备处于 设备包括具有多个安全等级的设备。 如果设备安全级别低于标题密钥安全级别,则使用新的管理密钥部分地弹出未绑定的标题密钥。 然后将部分反弹的标题密钥保存在设备的标题密钥块中。

    Rebinding of content title keys in clusters of devices with distinct security levels
    10.
    发明授权
    Rebinding of content title keys in clusters of devices with distinct security levels 有权
    在具有不同安全级别的设备群集中重新绑定内容标题密钥

    公开(公告)号:US08391481B2

    公开(公告)日:2013-03-05

    申请号:US12651382

    申请日:2009-12-31

    IPC分类号: H04L29/06

    摘要: According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device.

    摘要翻译: 根据本发明的一个实施例,提供了一种系统,方法和计算机程序产品,用于在广播加密系统中具有不同安全级别的设备群中重新标识标题密钥。 所述方法包括:接收新的管理密钥,并将加密的标题密钥与先前使用的管理密钥解除绑定,所述标题密钥具有安全级别,并且驻留在具有安全等级的设备的标题密钥块中,所述设备处于 设备包括具有多个安全等级的设备。 如果设备安全级别低于标题密钥安全级别,则使用新的管理密钥部分地弹出未绑定的标题密钥。 然后将部分反弹的标题密钥保存在设备的标题密钥块中。