Content security layer providing long-term renewable security
    1.
    发明申请
    Content security layer providing long-term renewable security 有权
    内容安全层提供长期的可再生安全

    公开(公告)号:US20080037781A1

    公开(公告)日:2008-02-14

    申请号:US11974594

    申请日:2007-10-15

    IPC分类号: H04N7/167

    摘要: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player. Features to enable migration from legacy formats are also provided.

    摘要翻译: 在示例性实施例中,数字内容被掌握为加密数据和数据处理操作的组合,使得能够在批准的回放环境中使用。 具有与内容的数据处理操作兼容的处理环境的播放器设备能够解密和播放内容。 播放器还可以向内容提供基本功能,例如从媒体加载数据,执行网络通信,确定播放环境配置,控制解密/播放,和/或使用播放器的键执行加密操作。 这些功能允许内容实现和执行自己的安全策略。 如果海盗妥协个人玩家或内容标题,新的内容可以掌握新的安全功能,阻止旧的攻击。 还可以提供选择性解密能力,使得能够进行动态水印插入,从而可以将攻击追溯到特定的播放器。 还提供了允许从旧格式迁移的功能。

    Prevention of side channel attacks against block cipher implementations and other cryptographic systems
    6.
    发明申请
    Prevention of side channel attacks against block cipher implementations and other cryptographic systems 有权
    防止针对块密码实现和其他加密系统的侧信道攻击

    公开(公告)号:US20060045264A1

    公开(公告)日:2006-03-02

    申请号:US11252898

    申请日:2005-10-18

    IPC分类号: H04K1/06

    摘要: Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P{K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.

    摘要翻译: 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K 1和K 2)和两个64位明文消息(M 1和M 2),每个与排列相关联(即,K 1 P,K 2 P和M 1 P,M 2 P),使得K 1 P {K 1} XOR K 2 P {K 2}等于“标准”DES密钥K,并且M 1 P {M 1} XOR M 2 P {M 2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。

    Leak-resistant cryptographic payment smartcard
    7.
    发明申请
    Leak-resistant cryptographic payment smartcard 有权
    防漏密码支付智能卡

    公开(公告)号:US20080104400A1

    公开(公告)日:2008-05-01

    申请号:US11981495

    申请日:2007-10-30

    IPC分类号: H04L9/30 H04L9/32

    摘要: We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.

    摘要翻译: 我们公开了保护加密设备免受外部监控和分析攻击的方法和设备。 引入了“自愈”财产,使部分妥协之后不断重新建立安全性。 除了产生有用的加密结果之外,典型的防漏密码操作以设计成使得无用的任何关于可能先前从系统泄露的秘密的信息的方式修改或更新秘密密钥材料。 示出了用于对称认证,经认证的Diffie-Hellman(当一个或两个用户具有证书​​时),RSA,ElGamal公钥解密的示例性的防漏和防漏实施。

    Specialized circuitry for cryptographic authentication and other purposes
    9.
    发明申请
    Specialized circuitry for cryptographic authentication and other purposes 审中-公开
    用于加密认证和其他用途的专用电路

    公开(公告)号:US20060184807A1

    公开(公告)日:2006-08-17

    申请号:US11387401

    申请日:2006-03-23

    IPC分类号: G06F12/14

    摘要: To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.

    摘要翻译: 为了防止盗版,视听内容在传输给消费者之前被加密。 低成本,高安全性的加密权限模块(如智能卡)可使诸如播放器/显示器等设备解码此类内容。 安全关键功能可以由加密模块以允许通过升级或替换加密模块来解决安全危害的方式来执行,从而避免需要替换或修改其他(通常成本更高的成本)组件。 安全模块包含加密密钥,用于处理权限启用消息(REM)和密钥导出消息(KDM)。 从REM和KDM,安全模块导出与内容对应的密钥数据,使用公开密钥和/或对称密码来对另一设备的导出密钥数据进行重新加密,并将重新加密的密钥数据提供给解码设备。 解码装置然后使用从重新加密的密钥数据导出的加密值来解密内容。