Renewable traitor tracing
    3.
    发明授权
    Renewable traitor tracing 有权
    可再生叛逆者追踪

    公开(公告)号:US09520993B2

    公开(公告)日:2016-12-13

    申请号:US11230022

    申请日:2005-09-19

    IPC分类号: G06Q20/00 H04L9/08

    摘要: The present invention provides a method performed on a computer of preventing re-use of compromised keys in a broadcast encryption system. In an exemplary embodiment, the method includes (1) incorporating a particular set of Sequence Keys assigned by a license agency into individual receivers, (2) assigning a Sequence Key Block (SKB) by the license agency to at least one distributed protected file, (3) performing incremental cryptographic testing by the individual receivers to determine if a selected Sequence Key from the set of Sequence Keys is compromised, (4) if the selected Sequence Key is not compromised, decrypting the file, and (5) if the selected Sequence Key is compromised and if a subsequent Sequence Key from the set of Sequence Keys is available, selecting the subsequent Sequence Key.

    摘要翻译: 本发明提供一种在计算机上执行的防止在广播加密系统中重复使用受损密钥的方法。 在一个示例性实施例中,该方法包括(1)将由许可证代理机构分配的特定的一组序列密钥合并到单独的接收机中,(2)将许可代理机构的序列密钥块(SKB)分配给至少一个分布式受保护文件, (3)执行各个接收机的增量密码测试,以确定序列密钥集合中所选择的序列密钥是否受到损害,(4)如果所选择的序列密钥不受影响,解密该文件,以及(5)如果选定的 序列密钥被破坏,并且如果序列密钥集合中的后续序列密钥可用,则选择随后的序列密钥。

    Method for assigning encryption keys
    6.
    发明授权
    Method for assigning encryption keys 有权
    分配加密密钥的方法

    公开(公告)号:US06888944B2

    公开(公告)日:2005-05-03

    申请号:US09777506

    申请日:2001-02-05

    摘要: Sets of encryption keys useful by devices for decrypting encrypted content are defined using an error-correcting code such as a Reed-Solomon code to define vectors of length “n” over an alphabet of (0, . . . , N−1), wherein “n” is the number of columns in a key matrix and “N” is the number of rows in the matrix. Each vector represents a set of keys that can be assigned to a device. With this invention, overlap between sets of keys can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the key set of a compromised device is revoked. Also, only the generating matrix of the error-correcting code and the index of one set of keys need be stored in memory, since all previously defined key sets can be regenerated if need be from just the generating matrix and index.

    摘要翻译: 使用诸如里德 - 所罗门码的纠错码来定义加密内容解密设备所使用的加密密钥集合,以在(0,...,N-1)的字母表上定义长度为“n”的向量, 其中“n”是键矩阵中的列数,“N”是矩阵中的行数。 每个向量表示可以分配给设备的一组密钥。 利用本发明,可以最小化密钥组之间的重叠,以最小化当被破坏的设备的密钥组被撤销时,无辜设备的密钥组可能被无意中撤销的可能性。 此外,只有纠错码的生成矩阵和一组密钥的索引需要存储在存储器中,因为如果需要仅来自生成矩阵和索引,则可以重新生成所有先前定义的密钥集。

    Unified broadcast encryption system

    公开(公告)号:US09712321B2

    公开(公告)日:2017-07-18

    申请号:US12131076

    申请日:2008-05-31

    IPC分类号: H04L9/00 H04L9/08 G09C5/00

    摘要: A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.

    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
    8.
    发明授权
    Tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system 有权
    跟踪叛国者联盟,防止广播加密系统中数字内容的盗版

    公开(公告)号:US08176568B2

    公开(公告)日:2012-05-08

    申请号:US11323247

    申请日:2005-12-30

    IPC分类号: G06F21/00

    摘要: A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 一种系统,方法和计算机程序产品,用于查找串联产生盗版保护内容的接收者联盟,然后评估每个已识别联盟的特定成员是叛徒的机会与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM
    9.
    发明申请
    TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM 失效
    跟踪TRAITOR COALITIONS并防止数字内容在广播加密系统中的传播

    公开(公告)号:US20120036578A1

    公开(公告)日:2012-02-09

    申请号:US13267774

    申请日:2011-10-06

    IPC分类号: G06F21/00

    摘要: Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.

    摘要翻译: 本发明的实施例涉及发现联合制作盗版的受保护内容的接收者的联盟,然后评估每个被识别的联盟的特定成员是叛徒的信心与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。

    System, method, and service for performing unified broadcast encryption and traitor tracing for digital content
    10.
    发明授权
    System, method, and service for performing unified broadcast encryption and traitor tracing for digital content 有权
    用于执行数字内容的统一广播加密和叛逆追踪的系统,方法和服务

    公开(公告)号:US07876895B2

    公开(公告)日:2011-01-25

    申请号:US11746491

    申请日:2007-05-09

    IPC分类号: H04K1/04

    摘要: A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKBu). The system decrypts digital content by obtaining required key media variants from the MKBu, using the key media variant to find an entry in a variant key table, decrypt a title key, and locate a variant number from the variant key table. The system uses the variant number to identify which of the variations may be decrypted by the title key and uses the title key to decrypt segments and variations.

    摘要翻译: 统一广播加密系统将媒体密钥树划分为S子树,将数字内容划分为多个段,并将其中的一些段转换为变体; 段数和变化数为q。 系统将每个子树细分为q / | S | 细分子树,将关键媒体变体分配给每个细分子树,并生成统一的媒体关键块(MKBu)。 该系统通过从MKBu获得所需的密钥介质变体来解密数字内容,使用密钥介质变体来在变式密钥表中找到条目,解密标题密钥以及从变体密钥表中定位变体号。 系统使用变体号来标识哪个变体可以由标题密钥解密,并使用标题密钥来解密段和变体。