摘要:
A computer-implemented system and method for configuring and operating a white-box cipher is disclosed. In one implementation, the system employs a method for configuring pseudorandom data derived from a key to perform key-scheduling functionality associated with rounds of the cipher. Additionally, the system employs a method for generating white-box executable code, wherein the code hides the pseudorandom data by incorporating it into mathematical operations performed during execution of the rounds. Accordingly, the cipher is suited for white-box applications managing digital rights, such as decoding audio, video and other content.
摘要:
System for protecting copyrighted information, e.g., video signals, from unauthorized copying. Analog red (R), green (G) and blue (B) video signals are transmitted from a source device, e.g., a display adapter, to a display device, e.g., a monitor, over corresponding analog signal lines after the identify of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices after the identification of the destination device is confirmed. The source and destination devices each includes a pseudo-random number generator driven by the session key. The lines that carry the R, G and B video signals are changed, e.g., swapped, on a periodic basis as a function of the output of the pseudo-random number generator in the source device. The destination device, which has an input to its pseudo-random number generator synchronized with the random number generator of the source device, decrypts the received video signals in a complimentary fashion to the encryption. Encrypted digital information subject to copying constraints may be supplied to a display adapter via an IEEE 1394 compliant bus.
摘要:
Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized use are described. Encrypted video signals are transmitted from a source device, e.g., display adapter, to a display device, e.g., monitor, over analog signal lines after the identity of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices. The source and destination devices each include a pseudo-random number generator driven by the session key. As part of the encryption process a false video signal is generated. The false video signal and R, G, B video signals are transmitted to the display device over four lines. The lines used to transmit the R, G, B and false video signals are periodically swapped as a function of the output of the pseudo random number generator to encrypt, e.g., scramble, the video signals. To avoid having to provide an additional line between the display adapter and the display device beyond those used in conventional displays, horizontal synchronization information is combined with, e.g., modulated on, one or more of the other signals transmitted to the display. The horizontal sync line is then used to convey one of the four video signals. The display device extracts the horizontal timing information from the received video signals and decrypts the signals using the output of its pseudo random number generator to reverse the scrambling process used to encrypt the transmitted video signals.
摘要:
Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.
摘要:
Systems and/or methods are described that strengthen secure hash functions. These systems and/or methods may, in some embodiments, create a random-appearing element based on a message and using a process. The element may then be assembled with the message. This assembly may be hashed using a secure hash function. Using the same process and secure hash function, the message may later be authenticated.
摘要:
Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. The innovative advancements do not rely on post-distribution watermarking or fingerprinting techniques, and yet intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced. In one embodiment, digital content is provided and comprises multiple partition sets, with each partition set comprising a first partition and at least one different version of the first partition. Each partition of each partition set is uniquely marked and encrypted with a different key. Individual unique key collections are then defined to contain, for each partition set, one key that was used to encrypt a partition from the partition set and no two key collections are identical. This means that each key collection can decrypt one unique version of the digital content. This unique version of the digital content is thus inextricably tied to the key collection that was utilized to decrypt the content. Each key collection is then encrypted with a different public key associated with one of multiple content players on which the digital content is to be played. Thus, each content player is inextricably associated with one key collection, and each key collection is inextricably associated with a unique version of the digital content. The digital content and one or more key collections can then be provided to the content players. When a content player decrypts its associated key collection and uses the key collection to decrypt the digital content, the version of the digital content that is decrypted points directly to the specific content-player that was authorized to decrypt it with that key collection.
摘要:
A secure communication channel between first and second radio frequency communication devices is indicated by the synchronized indicators on each of the two devices. The indicator may be a light or speaker. After a secure channel is established, the indicators may be simultaneously operated so that a user may definitively and positively determine that the two devices are securely connected to each other. Any interloper devices would not be indicating on the same pattern and thereby be identified.
摘要:
An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.
摘要:
An imaging or other sensory reproduction system efficiently converts image or other sensory data between a perceptual color space (e.g., the sRGB color space) and a physical color space (unity gamma) or other perceptual/physical sensory models that are related by an expression involving a computationally expensive exponential function. The imaging system calculates exponential functions that can be composed from computationally inexpensive operations, such as square root, square, reciprocal, as well as multiplications and/or additions and subtractions. These computationally less expensive functions are then combined, such as in a weighted and/or offset mean, summation or difference to approximate the computationally expensive exponential function. The imaging system evaluates the expression using the approximation to efficiently yield the converted image data. The efficient conversion between perceptual and physical color spaces allows operations, such as blending and anti-aliasing, to be performed in the physical color space before display of a perceptual color space image.
摘要:
An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.