Tamper resistant player for scrambled contents
    2.
    发明授权
    Tamper resistant player for scrambled contents 失效
    防篡改播放器用于加扰内容

    公开(公告)号:US06175925B1

    公开(公告)日:2001-01-16

    申请号:US08924167

    申请日:1997-09-05

    IPC分类号: G06F1130

    摘要: In one apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a descrambler that descrambles scrambled content to generate descrambled content. In another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an authenticator that provides appropriate authentication challenges to a scrambled content provider, and generates appropriate authentication responses to authentication challenges from the scrambled content provider. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an integrity verifier that performs integrity verification on a decoder. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a secrets holder that holds a number of secrets associated with playing scrambled contents.

    摘要翻译: 在一种装置中,提供了一组编程指令的纯文本和混淆单元,以实现解扰器,其解扰加扰的内容以产生解扰的内容。 在另一种装置中,提供了一组编程指令的明文和混淆单元,以实现向加扰的内容提供商提供适当的认证挑战的认证器,并从加扰的内容提供商产生对认证挑战的适当认证响应。 在又一设备中,提供了一组编程指令的纯文本和混淆单元,以实现在解码器上执行完整性验证的完整性验证器。 在另一装置中,提供一组编程指令的明文和混淆单元,以实现保存与播放加扰内容相关联的多个秘密的秘密持有者。

    Tamper resistant methods and apparatus
    3.
    发明授权
    Tamper resistant methods and apparatus 失效
    防篡改方法和装置

    公开(公告)号:US06205550B1

    公开(公告)日:2001-03-20

    申请号:US08924740

    申请日:1997-09-05

    IPC分类号: G06F1130

    摘要: In one apparatus, a number of obfuscated programming instructions are equipped to self-verify whether execution of the obfuscated programming instructions is being observed. In another apparatus, a number of obfuscated programming instruction are equipped to determine whether the apparatus is being operated in a mode that supports single step execution of the obfuscated programming instructions. In yet another apparatus, a number of obfuscated programming instruction are equipped to verify whether an amount of elapsed execution time has exceeded a threshold. In yet another apparatus, a first and a second group of obfuscated programming instruction are provided to implement a first and a second tamper resistant technique respectively, with the first and the second group of programming instructions sharing a storage location for a first and a second key value corresponding to the first and the second tamper resistant technique.

    摘要翻译: 在一种装置中,配置了许多模糊编程指令来自我验证是否正在观察到模糊编程指令的执行。 在另一装置中,配备有多个模糊编程指令,以确定装置是否以支持模糊编程指令的单步执行的模式操作。 在另一装置中,配备有多个模糊编程指令,以验证经过的执行时间量是否超过阈值。 在另一装置中,提供第一组和第二组混淆编程指令以分别实现第一和第二防篡改技术,第一组和第二组编程指令共享用于第一和第二键的存储位置 值对应于第一和第二防篡改技术。

    Policy based selective encryption of compressed video data
    4.
    发明授权
    Policy based selective encryption of compressed video data 失效
    基于策略的压缩视频数据的选择性加密

    公开(公告)号:US5805700A

    公开(公告)日:1998-09-08

    申请号:US730065

    申请日:1996-10-15

    摘要: Basic transfer units (BTUs) of compressed video data of video images are selectively encrypted in accordance with an encryption policy to degrade the video images to at least a virtually useless state, if the selectively encrypted compressed video images were to be rendered without decryption. As a result, degradation that approximates the level provided by the total encryption approach is achieved, but requiring only a fraction of the processor cycle cost required by the total encryption approach, to decrypt and render the video images.

    摘要翻译: 视频图像的压缩视频数据的基本传送单元(BTU)根据加密策略被选择性地加密,以将视频图像降级到至少几乎无用的状态,如果选择性地加密的压缩视频图像被无需解密地呈现。 结果,实现了近似总加密方法提供的级别的劣化,但是仅需要总加密方法所需的处理器周期成本的一小部分来解密和呈现视频图像。

    Method and apparatus for hiding crytographic keys utilizing
autocorrelation timing encoding and computation
    5.
    发明授权
    Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation 失效
    利用自相关定时编码和计算隐藏加密密钥的方法和装置

    公开(公告)号:US6041122A

    公开(公告)日:2000-03-21

    申请号:US32594

    申请日:1998-02-27

    IPC分类号: H04L9/08 H04L9/00

    摘要: A method and apparatus for hiding cryptographic keys based on autocorrelation timing attacks is provided. The method and apparatus of the present invention utilize a autocorrelation timing attack to allow independent software entities to authenticate themselves without storing a private cryptographic key. This is accomplished by storing timing statistics related to the evaluation of an equation in the software entity rather than the cryptographic key itself. When the software entity authenticates itself, the cryptographic key is derived based on information provided by the timing statistics contained in the software entity.

    摘要翻译: 提供了一种基于自相关定时攻击隐藏加密密钥的方法和装置。 本发明的方法和装置利用自相关定时攻击来允许独立软件实体在不存储专用加密密钥的情况下进行认证。 这通过存储与软件实体中的等式的评估相关的定时统计而不是加密密钥本身来实现。 当软件实体自身进行认证时,基于由软件实体中包含的定时统计信息提供的信息导出加密密钥。

    Broadcast key distribution apparatus and method using chinese remainder
    6.
    发明授权
    Broadcast key distribution apparatus and method using chinese remainder 失效
    广播密钥分配装置和方法使用中文余数

    公开(公告)号:US5712800A

    公开(公告)日:1998-01-27

    申请号:US779138

    申请日:1997-01-06

    申请人: David W. Aucsmith

    发明人: David W. Aucsmith

    IPC分类号: H04L9/08 H04L9/30 G09C1/00

    摘要: A communication system utilizing low bandwidth requirements for transmitting an encoded value formulated using the Chinese Remainder procedure to receivers having a private key. The system offers the advantages of low bandwidth transmission of single standard key systems but the security of private key systems. Each receiver contains a private key and a prime number associated with the receiver. The transmitter system utilizes the Chinese Remainder procedure and the private key and the prime number associated with each receiver to generate a unique value X that solves a particular set of relationships for a set of authorized receivers of the communication network and no others. The value X is broadcast to all receivers and each receiver utilizes its prime number and its private decryption key to arrive at a master key. Unauthorized receivers will not obtain a valid master key because their prime numbers are outside of the set relationships that X solves. By broadcasting only X, the system avoids the requirement of broadcasting a separate encoded version of the master key to each authorized receiver. The system may be used to also broadcast new private keys to the receivers or a subset of receivers within the network.

    摘要翻译: 一种利用低带宽要求的通信系统,用于将使用中文剩余程序的编码值发送给具有私钥的接收机。 该系统具有单个标准密钥系统的低带宽传输优点,但是私钥系统的安全性。 每个接收器包含私钥和与接收器相关联的素数。 发射机系统利用中国剩余过程,私钥和与每个接收机相关联的素数生成唯一的值X,其解决通信网络的一组授权接收机的特定的关系集合,而不是其他值。 值X被广播给所有接收机,并且每个接收机利用其素数及其专用解密密钥来获得主密钥。 未经授权的接收者将无法获取有效的主密钥,因为它们的素数不在X解决的集合关系之外。 通过仅广播X,该系统避免了向每个授权接收机广播主密钥的单独编码版本的要求。 该系统还可以用于向接收机或网络内的接收机的子集广播新的私钥。

    Parameterized bloom filters
    7.
    发明授权
    Parameterized bloom filters 失效
    参数化的bloom过滤器

    公开(公告)号:US5701464A

    公开(公告)日:1997-12-23

    申请号:US528912

    申请日:1995-09-15

    申请人: David W. Aucsmith

    发明人: David W. Aucsmith

    摘要: A method and apparatus for determining validity of a key. A bloom filter is updated in a first computer system (e.g. a client system) at periodic intervals by providing the system's requirements of the bloom filter to a second computer system (e.g. a server system). These requirements may include: a number of bits which are included in the bloom vectors; a number of the coefficients for hash functions of the bloom filter; or an error value indicating the possibility of error of the bloom filter. The second computer system has access to an invalidity database which includes all invalid keys and can generate a matrix of bloom vectors and coefficients for different client requirements. Responsive to the provision of the first system's requirements, it receives bloom vectors and coefficients which comprise the bloom filter. The system can then accept a key and apply the bloom filter to the key to determine if the key is present in the invalidity database. Invalidity of the key can be confirmed if the bloom filter indicates that the key is present in the invalidity database by transmitting the key to the second computer system to determine the presence of the key in the invalidity database. In this way, communications bandwidth is conserved because no communication between the first computer system and the second computer system need take place if the bloom filter indicates that the key is not present in the invalidity database.

    摘要翻译: 一种用于确定密钥的有效性的方法和装置。 通过向第二计算机系统(例如服务器系统)提供系统对布隆过滤器的要求,以周期性间隔在第一计算机系统(例如,客户端系统)中更新布隆过滤器。 这些要求可以包括:包括在花样向量中的多个比特; 用于布隆过滤器的散列函数的多个系数; 或指示布隆过滤器的错误的可能性的错误值。 第二个计算机系统可以访问包含所有无效密钥的无效数据库,并且可以生成用于不同客户端要求的绽放向量和系数的矩阵。 响应于提供第一个系统的要求,它接收包含布尔值过滤器的绽放向量和系数。 然后,系统可以接受一个密钥,并将该bloom过滤器应用于密钥,以确定密钥是否存在于无效数据库中。 如果bloom过滤器通过将密钥发送到第二计算机系统来确定密钥在无效数据库中的存在,则可以确认密钥的无效性。 以这种方式,通信带宽被节省,因为如果布隆过滤器指示该密钥不存在于无效数据库中,则不需要在第一计算机系统和第二计算机系统之间进行通信。

    ANONYMOUS ELECTRONIC TRANSACTIONS
    8.
    发明申请
    ANONYMOUS ELECTRONIC TRANSACTIONS 审中-公开
    无声电子交易

    公开(公告)号:US20140136374A1

    公开(公告)日:2014-05-15

    申请号:US13858548

    申请日:2013-04-08

    IPC分类号: G06Q30/06

    摘要: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.

    摘要翻译: 公开了用于保护各方对电子交易(例如通过GSM网络进行的交易)的隐私的技术。 匿名服务提供商接收从其订户指定的货物或服务的接收者的订单,以及关于其订户的信息。 匿名服务提供商将订单中继给收件人,但按照用户指示,保留订户信息。 收件人通过来自匿名服务提供商的凭单接收收益或服务的付款。

    Parameterized hash functions for access control
    10.
    发明授权
    Parameterized hash functions for access control 失效
    用于访问控制的参数化哈希函数

    公开(公告)号:US5940513A

    公开(公告)日:1999-08-17

    申请号:US960834

    申请日:1997-10-30

    摘要: A method and apparatus for access control in a computer system are disclosed. A storage unit receives a block of data having an encrypted executable image and a signature component. A separation unit coupled to the storage unit separates the signature component from the encrypted executable image. A decryption unit coupled to the separation unit decrypts the encrypted executable image using the signature component as a key. This yields an decrypted executable program. An identification unit coupled to the decryption unit locates an identification mark in the decrypted executable program and identifies a composite key assigned to the identification mark. A signature generation unit coupled to the identification unit performs a keyed cryptographic hash algorithm on the decrypted executable program using the composite key as a key. A verification unit coupled to the signature generation unit compares the signature component with the computed keyed cryptographic hash value to verify the source of the block of data and to determine whether it has been modified. If the signature matches the keyed cryptographic hash value, a rights assignment unit coupled to the verification unit assigns appropriate access rights to the decrypted executable program and allows it to be executed by a computer system.

    摘要翻译: 公开了一种用于计算机系统中的访问控制的方法和装置。 存储单元接收具有加密的可执行图像和签名组件的数据块。 耦合到存储单元的分离单元将签名组件与加密的可执行映像分离。 耦合到分离单元的解密单元使用签名组件作为密钥来解密加密的可执行图像。 这产生一个解密的可执行程序。 耦合到解密单元的识别单元将解密的可执行程序中的识别标记定位并识别分配给识别标记的复合键。 耦合到识别单元的签名生成单元使用复合密钥作为密钥对解密的可执行程序执行密钥密码散列算法。 耦合到签名生成单元的验证单元将签名组件与计算的密钥加密散​​列值进行比较,以验证数据块的来源并确定其是否已被修改。 如果签名与密钥加密哈希值匹配,则与验证单元相连的权限分配单元向解密的可执行程序分配适当的访问权限,并允许其由计算机系统执行。