END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    1.
    发明申请
    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY 审中-公开
    具有交通可见性的端到端网络安全

    公开(公告)号:US20120096270A1

    公开(公告)日:2012-04-19

    申请号:US13337919

    申请日:2011-12-27

    IPC分类号: H04L9/32

    摘要: End-to-end security between clients and a server, and traffic visibility to intermediate network devices, achieved through combined mode, single pass encryption and authentication using two keys is disclosed. In various embodiments, a combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag using an authentication key in parallel with the generation of the cipher text using an encryption key, where the authentication and encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in AES-GMAC mode Using a two key, single pass combined mode algorithm preserves network performance using a limited number of HW gates, while allowing an intermediate device access to the encryption key for deciphering the data, without providing that device the ability to compromise data integrity, which is preserved between the end to end devices.

    摘要翻译: 公开了客户机与服务器之间的端到端安全性,以及通过组合模式,单程加密和使用两个密钥的认证实现的对中间网络设备的流量可见性。 在各种实施例中,组合加密认证单元包括与密码单元并行耦合的密码单元和认证单元,并且使用加密密钥与密文生成并行地使用认证密钥生成认证标签,其中 认证和加密密钥具有不同的密钥值。 在各种实施例中,密码单元以AES计数器模式运行,并且认证单元以AES-GMAC模式并行操作。使用双键单通组合模式算法使用有限数量的HW门保留网络性能,同时允许 中间设备访问用于解密数据的加密密钥,而不提供该设备损害数据完整性的能力,这在端到端设备之间保留。

    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY
    2.
    发明申请
    END-TO-END NETWORK SECURITY WITH TRAFFIC VISIBILITY 审中-公开
    具有交通可见性的端到端网络安全

    公开(公告)号:US20090119510A1

    公开(公告)日:2009-05-07

    申请号:US11935783

    申请日:2007-11-06

    IPC分类号: H04L9/32

    摘要: End-to-end security between clients and a server, and traffic visibility to intermediate network devices, achieved through combined mode, single pass encryption and authentication using two keys is disclosed. In various embodiments, a combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag using an authentication key in parallel with the generation of the cipher text using an encryption key, where the authentication and encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in AES-GMAC mode Using a two key, single pass combined mode algorithm preserves network performance using a limited number of HW gates, while allowing an intermediate device access to the encryption key for deciphering the data, without providing that device the ability to compromise data integrity, which is preserved between the end to end devices.

    摘要翻译: 公开了客户机与服务器之间的端到端安全性,以及通过组合模式,单程加密和使用两个密钥的认证实现的对中间网络设备的流量可见性。 在各种实施例中,组合加密认证单元包括与密码单元并行耦合的密码单元和认证单元,并且使用加密密钥与密文生成并行地使用认证密钥生成认证标签,其中 认证和加密密钥具有不同的密钥值。 在各种实施例中,密码单元以AES计数器模式运行,并且认证单元以AES-GMAC模式并行操作。使用双键单通组合模式算法使用有限数量的HW门保留网络性能,同时允许 中间设备访问用于解密数据的加密密钥,而不提供该设备损害数据完整性的能力,这在端到端设备之间保留。

    Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content
    3.
    发明授权
    Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content 有权
    防篡改方法,装置和系统,用于数字版权管理保护内容的安全可移植性

    公开(公告)号:US08266707B2

    公开(公告)日:2012-09-11

    申请号:US12039456

    申请日:2008-02-28

    IPC分类号: G06F21/00

    CPC分类号: G06F21/10

    摘要: An apparatus and system provide a tamper-resistant scheme for portability of DRM-protected digital content. According to embodiments of the invention, a portable crypto unit may be utilized in conjunction with a VT integrity services (VIS) scheme as well as a Virtual Machine Manager (VMM) and a TPM to provide a secure scheme to protect digital content. Additionally, in one embodiment, the digital content may be partitioned into blocks comprising multiple segments to further enhance the security of the scheme.

    摘要翻译: 一种装置和系统为DRM保护的数字内容的便携性提供防篡改方案。 根据本发明的实施例,便携式加密单元可以与VT完整性服务(VIS)方案以及虚拟机管理器(VMM)和TPM结合使用,以提供保护数字内容的安全方案。 此外,在一个实施例中,数字内容可以被划分为包括多个段的块,以进一步增强该方案的安全性。

    TAMPER RESISTANT METHOD, APPARATUS AND SYSTEM FOR SECURE PORTABILITY OF DIGITAL RIGHTS MANAGEMENT-PROTECTED CONTENT
    4.
    发明申请
    TAMPER RESISTANT METHOD, APPARATUS AND SYSTEM FOR SECURE PORTABILITY OF DIGITAL RIGHTS MANAGEMENT-PROTECTED CONTENT 有权
    防篡改方法,安全数据管理保护内容可移植性的装置和系统

    公开(公告)号:US20090220090A1

    公开(公告)日:2009-09-03

    申请号:US12039456

    申请日:2008-02-28

    IPC分类号: H04L9/06 H04L9/32

    CPC分类号: G06F21/10

    摘要: An apparatus and system provide a tamper-resistant scheme for portability of DRM-protected digital content. According to embodiments of the invention, a portable crypto unit may be utilized in conjunction with a VT integrity services (VIS) scheme as well as a Virtual Machine Manager (VMM) and a TPM to provide a secure scheme to protect digital content. Additionally, in one embodiment, the digital content may be partitioned into blocks comprising multiple segments to further enhance the security of the scheme.

    摘要翻译: 一种装置和系统为DRM保护的数字内容的便携性提供防篡改方案。 根据本发明的实施例,便携式加密单元可以与VT完整性服务(VIS)方案以及虚拟机管理器(VMM)和TPM结合使用,以提供保护数字内容的安全方案。 此外,在一个实施例中,数字内容可以被划分为包括多个段的块,以进一步增强该方案的安全性。

    Method and apparatus for multiple inclusion offsets for security protocols
    5.
    发明申请
    Method and apparatus for multiple inclusion offsets for security protocols 审中-公开
    用于安全协议的多重包含偏移的方法和装置

    公开(公告)号:US20080022388A1

    公开(公告)日:2008-01-24

    申请号:US11478986

    申请日:2006-06-30

    IPC分类号: G06F15/16

    CPC分类号: H04L63/105

    摘要: A method and apparatus to define multiple zones in a data packet for inclusion in processing by security operations of a security protocol. In one embodiment, each defined zone has an associated list of security operations to which the zone is subjected. In another embodiment, the list of security operations for a zone includes parameters to be passed when performing the security operations on the zone.

    摘要翻译: 一种在数据分组中定义多个区域以包括在安全协议的安全操作的处理中的方法和装置。 在一个实施例中,每个定义的区域具有该区域经受的安全操作的关联列表。 在另一个实施例中,区域的安全操作的列表包括在区域上执行安全操作时要传递的参数。

    Dynamic generation of integrity manifest for run-time verification of software program
    6.
    发明授权
    Dynamic generation of integrity manifest for run-time verification of software program 有权
    动态生成软件程序的运行时验证的完整性清单

    公开(公告)号:US08364973B2

    公开(公告)日:2013-01-29

    申请号:US11967928

    申请日:2007-12-31

    IPC分类号: G06F21/00

    CPC分类号: G06F21/64 G06F21/51

    摘要: A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered.

    摘要翻译: 测量引擎为软件程序生成完整性清单,并使用它来执行主动平台观察。 完整性清单表示程序代码的一部分的完整性检查值。 测量引擎计算内存中程序映像的比较值,并确定比较值是否与预期的完整性校验值相匹配。 如果值不匹配,则确定程序的图像被修改,并且可能触发适当的补救动作。

    DYNAMIC GENERATION OF INTEGRITY MANIFEST FOR RUN-TIME VERIFICATION OF SOFTWARE PROGRAM
    8.
    发明申请
    DYNAMIC GENERATION OF INTEGRITY MANIFEST FOR RUN-TIME VERIFICATION OF SOFTWARE PROGRAM 有权
    软件程序运行验证的完整性更新动态生成

    公开(公告)号:US20090172814A1

    公开(公告)日:2009-07-02

    申请号:US11967928

    申请日:2007-12-31

    IPC分类号: G06F21/22

    CPC分类号: G06F21/64 G06F21/51

    摘要: A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered.

    摘要翻译: 测量引擎为软件程序生成完整性清单,并使用它来执行主动平台观察。 完整性清单表示程序代码的一部分的完整性检查值。 测量引擎计算内存中程序映像的比较值,并确定比较值是否与预期的完整性校验值相匹配。 如果值不匹配,则确定程序的图像被修改,并且可能触发适当的补救动作。

    Methods and systems for cryptographic access control of video
    10.
    发明授权
    Methods and systems for cryptographic access control of video 有权
    视频加密访问控制的方法和系统

    公开(公告)号:US09094733B2

    公开(公告)日:2015-07-28

    申请号:US13977529

    申请日:2012-03-31

    摘要: Cryptographic access control of multimedia video is presented. A method includes generating as metadata an access control policy (ACP) associated with video, the ACP including authorization rules and cryptographic information associated with an encryption policy; encrypting the video according to the encryption policy; and encoding the encrypted video with the authorization rules and the cryptographic information, which may be used to decrypt and render the encoded video. As an example, an authorized receiver device having credentials and/or capabilities matched to the authorization rules may extract the ACP information from the encrypted video and use it to decrypt and properly render the video. The method may further include visually encoding the encrypted video with at least portions of the authorization rules and the cryptographic information, such that the visually encoded video is renderable as the video by an authorized device, but is renderable as visually unintelligible video by an unauthorized device.

    摘要翻译: 介绍了多媒体视频的密码访问控制。 一种方法包括:生成与视频相关联的访问控制策略(ACP)作为元数据,所述ACP包括与加密策略相关联的授权规则和加密信息; 根据加密策略加密视频; 并使用可用于解密和呈现编码视频的授权规则和密码信息对加密的视频进行编码。 作为示例,具有与授权规则匹配的凭证和/或能力的授权接收机设备可以从加密的视频中提取ACP信息,并使用它来解密并适当地呈现视频。 该方法还可以包括使用授权规则和密码信息的至少一部分来视觉地编码加密的视频,使得视觉编码的视频可以由授权设备呈现为视频,但是可被未经授权的设备呈现为视觉上难以理解的视频 。