Tamper-Resistant Trusted JAVA Virtual Machine And Method Of Using The Same
    5.
    发明申请
    Tamper-Resistant Trusted JAVA Virtual Machine And Method Of Using The Same 有权
    防篡改可信JAVA虚拟机及其使用方法

    公开(公告)号:US20090138731A1

    公开(公告)日:2009-05-28

    申请号:US12363876

    申请日:2009-02-02

    IPC分类号: G06F21/22

    摘要: A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.

    摘要翻译: 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。

    Tamper-resistant trusted java virtual machine and method of using the same
    6.
    发明授权
    Tamper-resistant trusted java virtual machine and method of using the same 失效
    防篡改的可信java虚拟机和使用方法相同

    公开(公告)号:US07516331B2

    公开(公告)日:2009-04-07

    申请号:US10723725

    申请日:2003-11-26

    IPC分类号: H04L9/32

    摘要: A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.

    摘要翻译: 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。

    Tamper-resistant trusted Java virtual machine and method of using the same
    7.
    发明授权
    Tamper-resistant trusted Java virtual machine and method of using the same 有权
    防篡改的可信Java虚拟机及其使用方法

    公开(公告)号:US07747877B2

    公开(公告)日:2010-06-29

    申请号:US12363876

    申请日:2009-02-02

    IPC分类号: G06F11/30 G06F12/14

    摘要: A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.

    摘要翻译: 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。

    System, service, and method for enabling authorized use of distributed content on a protected media
    8.
    发明授权
    System, service, and method for enabling authorized use of distributed content on a protected media 有权
    允许在受保护媒体上授权使用分布式内容的系统,服务和方法

    公开(公告)号:US07685636B2

    公开(公告)日:2010-03-23

    申请号:US11072943

    申请日:2005-03-07

    IPC分类号: H04L9/10 H04L9/38

    CPC分类号: G06F21/10 G06F2221/0711

    摘要: A protected content distribution system utilizes media-based copy protection to support online distribution of protected content in a secure and legitimate fashion. Using a media-based copy protection scheme based on broadcast encryption, the protected content distribution system realizes online distribution of protected content such as, for example audio files, movies, etc, authorizing consumption of unlicensed content by transfer of a unique encrypted key to the protected media. This transaction is fast, involving the transfer of an encrypted binding key rather than the protected content. Content is enabled through a unique encrypted key on protected media accessed through a device separate from the media driver.

    摘要翻译: 受保护的内容分发系统利用基于媒体的复制保护来以安全和合法的方式支持受保护内容的在线分发。 使用基于广播加密的基于媒体的复制保护方案,受保护的内容分发系统实现受保护内容的在线分发,例如音频文件,电影等,授权通过将唯一的加密密钥传送到 受保护的媒体。 此事务快速,涉及转移加密的绑定密钥而不是受保护的内容。 通过与媒体驱动程序分开的设备访问的受保护媒体上的唯一加密密钥启用内容。

    Device archiving of past cluster binding information on a broadcast encryption-based network
    9.
    发明授权
    Device archiving of past cluster binding information on a broadcast encryption-based network 有权
    在基于广播加密的网络上设备归档过去的集群绑定信息

    公开(公告)号:US09009489B2

    公开(公告)日:2015-04-14

    申请号:US13585950

    申请日:2012-08-15

    IPC分类号: G06F11/30 G06F12/14 H04L9/08

    CPC分类号: H04L9/0866 H04L2209/601

    摘要: Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or more clusters are merged, a binding ID corresponding to one of the clusters is selected and a new management key is generated. Binding IDs associated with the clusters other than the cluster associated with the selected binding ID are encrypted using the new management key and stored on a cluster-authorized device in a binding ID archive. Content stored in conformity with an outdated binding ID is retrieved by decrypting the binding ID archive with the management key, recalculating an old management key and decrypting the stored content.

    摘要翻译: 提供了用于创建和存储用于绑定ID的存档的技术,所述绑定ID对应于呈现由广播加密方案保护的内容的设备的集群。 当两个或更多个集群合并时,选择与一个集群对应的绑定ID,并生成新的管理密钥。 与除与所选绑定ID相关联的集群之外的集群相关联的绑定ID使用新的管理密钥加密并存储在绑定ID归档中的集群授权设备上。 通过用管理密钥解密绑定ID档案,重新计算旧的管理密钥并解密所存储的内容来检索与过时的绑定ID一致的存储的内容。

    Processing performance of repeated device compliance update messages
    10.
    发明授权
    Processing performance of repeated device compliance update messages 失效
    处理重复设备合规更新消息的性能

    公开(公告)号:US08528055B2

    公开(公告)日:2013-09-03

    申请号:US12950244

    申请日:2010-11-19

    IPC分类号: G06F7/04 H04L9/32

    摘要: A first message comprising a received indication of a management key block (MKB) and a received indication of an authorization table (AT) is received at a first network device from a second network device. The received indications of the MKB and AT are validated by comparing them to generated indications of the MKB and AT, respectively. A response is generated based on the validation of the received indications and transmitted from the first network device to the second network device. The generated indications and response are stored. A second message comprising a second received indication of the MKB and a second received indication of the AT is received at the first network device from the second network device. The first network device communicates with the second network device in accordance with the stored response on determining that the second received indications match corresponding stored indications.

    摘要翻译: 在第一网络设备处从第二网络设备接收包括管理密钥块(MKB)的接收指示和授权表(AT)的接收指示的第一消息。 通过将MKB和AT的接收指示与MKB和AT的生成指示进行比较来验证。 基于接收到的指示的验证并从第一网络设备发送到第二网络设备来产生响应。 生成的指示和响应被存储。 在第一网络设备处从第二网络设备接收包括MKB的第二接收指示和AT的第二接收指示的第二消息。 第一网络设备在确定第二接收指示匹配相应的存储指示时,根据存储的响应与第二网络设备通信。