Abstract:
Various technologies described herein pertain to a computing device that includes secure hardware (e.g., a TPM, a secure processor of a processing platform, protected memory that includes a software-based TPM, etc.). The secure hardware includes a shared secret, which is shared by the secure hardware and a server computing system. The shared secret is provisioned by the server computing system or a provisioning computing system of a party affiliated with the server computing system. The secure hardware further includes a cryptographic engine that can execute a cryptographic algorithm using the shared secret or a key generated from the shared secret. The cryptographic engine can execute the cryptographic algorithm to perform encryption, decryption, authentication, and/or attestation.
Abstract:
A memory device for using time from a trusted host device and a method for use therewith are disclosed. In one embodiment, an application on a memory device receives a request to perform a time-based operation from an entity authenticated by the memory device, wherein the entity is running on a host device. The application selects time from the host device instead of time from a time module on the memory device to perform the time-based operation and uses the time from the host device to perform the time-based operation. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination.
Abstract:
The present invention relates to a system (70, 80) and a method for a key block based authentication comprising a plurality of drive units (3) comprising a plurality of subsets, wherein a drive unit (3) has a set of node keys (KN d ) and an identifier (ID d ) indicating the subsets said drive unit (3) is part of and wherein an application unit (1) has a key block (AKB). In order to allow identification of a hacked drive unit (3) in order to revoke the hacked drive unit (3) from said key block based authentication, wherein said system is to a large extent compatible with existing systems and methods for a key block based authentication, a system is proposed comprising: - a plurality of drive units (3) comprising a plurality of subsets, wherein a drive unit (3) has a set of node keys (KN d ) and an identifier (ID d ) indicating the subsets said drive unit (3) is part of, - an application unit (1) having a key block (AKB) comprising a plurality of pairs of authorization and authentication keys (KA x , KR authx ), wherein each pair of keys is associated with one of said subsets, - a communication means (72) for submitting said identifier (ID d ) from said drive unit (3) to said application unit (1) and for submitting an authorization key (KA x ) from said application unit (1) to said drive unit (3), and - an authentication means (54) for authenticating said drive unit (3) and said application unit (1) by means of a pair of keys, wherein said application unit (1) comprises a selecting means (62) for selecting said pair of keys from said key block (AKB) corresponding to said identifier (ID d ), wherein said drive unit (3) comprises a decoding means (52) for deriving said authentication key (KR authx ) of said pair of keys from said authorization key (KA x ) of said pair of keys by means of said set of node keys (KN d ).
Abstract:
A content key, an authentication key, program data along with an effective key block (EKB) are transmitted by an encryption key structure of a tree structure. The EKB has a structure in which a device constituting a tree leaf holds a leaf key and a limited node key. A specific effective key block (EKB) is generated and distributed to a group specified by a specific node, thus limiting an updateable device. A device not belonging to a group cannot be decoded, ensuring the distribution security of the key and so forth. Keys or data is distributed by an encryption key structure of tree structure, thereby providing an information processing system and method capable of efficiently and safely distributing data.
Abstract:
A method of revoking a descrambling privilege for copy controlled content to a host device is provided. The method includes receiving (410) copy controlled content at a conditional access module. A revocation list is also received (420) at the module. The method includes determining (430) whether the host device associated with the module is on the list. If so, the conditional access module will not descramble the content (440).
Abstract:
In embodiments of the present invention improved capabilities are described for rendering a document from a server-based computing device to a client computing device when the client computing device is online, and upon request to access the document offline, the server-based computing device sends the client computing device an encrypted version of the document with limit-use encryption keys, where the encrypted document is stored in a virtual container on the client computer device where commands for coping, saving, and printing are restricted.
Abstract:
A method of and apparatus for encrypting and/or decrypting content according to broadcast encryption scheme. The decryption method includes: determining whether or not a revoked device among devices that have licenses for predetermined content is present; and according to the determination result, selectively decrypting a content key encrypted by using a key to prevent the revoked device from decrypting the predetermined content. By doing so, an unnecessary encryption process and decryption process that occur when there is no revoked device are avoided.
Abstract:
A system and method for describing a portal page (16), comprising, defining a placeholder on a template (32), associating at least one portlet (30) with the placeholder, and wherein the template can be customized for least one of a group and a user.
Abstract:
A system and a method for providing application flow integration in a portal framework. In accordance with one embodiment, the invention comprises a portal servlet (102), which handles all incoming servlet requests and determines whether the incoming request a request either for a portal page or for a non-portal page; and, a portal processor (107) which handles all portal page requests passed by the portal servlet, and executes an appropriate webflow to update the current state of the portal page, depending on a current set of events. Each of a plurality of portlets may have an individual webflow associated with it.