摘要:
A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for being applied according to a predetermined look-up scheme. The look-up scheme prescribes that an output of a first look-up table of the plurality of look-up tables be used to generate an input of a second look-up table of the plurality of look-up tables. The combined cryptographic and watermarking operation comprises a cryptographic operation and a watermarking operation. A control module looks up values in the plurality of look-up tables in dependence on the received content and in accordance to the look-up scheme, thereby applying the combined cryptographic and watermarking operation to the content.
摘要:
A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for being applied according to a predetermined look-up scheme. The look-up scheme prescribes that an output of a first look-up table of the plurality of look-up tables be used to generate an input of a second look-up table of the plurality of look-up tables. The combined cryptographic and watermarking operation comprises a cryptographic operation and a watermarking operation. A control module looks up values in the plurality of look-up tables in dependence on the received content and in accordance to the look-up scheme, thereby applying the combined cryptographic and watermarking operation to the content.
摘要:
The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can 5 be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
摘要:
A method of performing measurement of a subject comprises measuring a physiological parameter of a subject, deriving data from the measured parameter, optionally, obtaining metadata relating to the measurement of the physiological parameter, determining the quality of the derived data from the derived data and/or the obtained metadata, and if the determined quality matches a predefined criteria, performing a predefined corrective action. In one embodiment, the method further comprises calculating one or more qualifiers from the derived data and/or from the obtained metadata, and wherein the step of determining the quality of the derived data comprises determining the quality of the derived data from the calculated qualifiers.
摘要:
Computer programs are preprocessed to produce normalized or standard versions to remove obfuscation that might prevent the detection of embedded malware through comparison with standard malware signatures. The normalization process can provide an unpacking of compressed or encrypted malware, a reordering of the malware into a standard form, and the detection and removal of semantically identified nonfunctional code added to disguise the malware.
摘要:
The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
摘要:
A method of performing measurement of a subject comprises measuring a physiological parameter of a subject, deriving data from the measured parameter, optionally, obtaining metadata relating to the measurement of the physiological parameter, determining the quality of the derived data from the derived data and/or the obtained metadata, and if the determined quality matches a predefined criteria, performing a predefined corrective action. In one embodiment, the method further comprises calculating one or more qualifiers from the derived data and/or from the obtained metadata, and wherein the step of determining the quality of the derived data comprises determining the quality of the derived data from the calculated qualifiers.
摘要:
A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs slightly from the original, i.e. is watermarked. Forensic tracking is possible by distributing unique decryption keys to individual users. The invention allows a forensic mark to be securely embedded in the compressed domain signal. In an embodiment of this invention, the content (x) and an encryption sequence (r) are entropy encoded using a homomorphic Huffman table. A homomorphic Huffmann table is a table H having the property that there exists an operation f( ) such that H-1 (f(H(a),H(b)))=a+b.
摘要翻译:公开了一种安全的法医水印系统,其将相同的加密内容分发给所有用户。 解密密钥对于每个用户是不同的,使得解密的内容与原始内容略有不同,即被加密。 通过向个别用户分发唯一的解密密钥可以进行取证跟踪。 本发明允许将法医标记安全地嵌入到压缩域信号中。 在本发明的一个实施例中,内容(x)和加密序列(r)使用同态霍夫曼表进行熵编码。 同形霍夫曼表是具有存在使得H-1(f(H(a),H(b)))= a + b的操作f()的性质的表H。
摘要:
The present invention relates to methods and apparatus for digital content distribution. A method of transferring digital content from a first entity (60) to a second entity (70) includes the steps of: a transfer control entity (50) transmitting a transmission key (KA) to the first entity, the first entity storing content data comprising digital content embedded with a first watermark (WA). The first entity applies the transmission key to the content data to remove the first watermark from the digital content and encrypt the digital content. The first entity transmits the encrypted digital content (CX) to the second entity. The transfer control entity transmits a receive key (KB) to the second entity and the second entity applies the receive key to the encrypted digital content to generate decrypted data comprising the decrypted digital content embedded with a second watermark (WB).