Abstract:
Current legislation requires the possibility of encryption when storing television programmes received by broadcast. However, legacy playback apparatuses will not be able to play back such encrypted data in a regular way, but possibly in a wrong way. This may result in problems like damage of speakers. Therefore, the application intends to hide any of such possibly damaging streams by intentionally providing such streams with a wrong identification during the encryption process. The application provides among others a method and circuit for encryption and a method and circuit for decryption. The application is especially suitable for DVD recorders, but may also be employed for other video and/or audio recorders. The invention may even be used for encrypting non-audiovisual data.
Abstract:
This invention provides a method, proximity check server (203), system (200), and computer program product (207, 208) for determining the level of allowed communication between devices (201, 202) in e.g. a home network. By addition of one or more tamper-resistant devices, so-called proximity check server(s) (203,204), round-trip time measurements to estimate the distance between the devices are performed in order to determine the amount of communication allowed between these devices. In a specific embodiment, a single tamper-resistant proximity server computes the distance between communication devices that are implemented as trusted applications on open platforms.
Abstract:
A method of and source device (410) for authorizing access to content (425) by a sink device (400) in accordance with usage rights, the content being stored on a storage medium (420) controlled by the source device. The revocation status of the sink device is verified using the most recently issued revocation information that is available if the usage rights need to be modified as part of the authorization of access to the content, and using revocation information associated with the content stored on the storage medium, preferably the revocation information stored on the storage medium, otherwise. The revocation information on the storage medium, or only the part relating to the sink device, is optionally updated to the most recently issued revocation information if the usage rights need to be modified. Preferably this is done only if the result of the verification is that the sink device has been revoked.
Abstract:
In a system (600), a server (610) provides a digital signal processing function ƒ to an executing device (620) in an obfuscated form. The function ƒ includes a function cascade of signal processing functions f 1 , 1 ≤ i ≤ N to formula (I). The server includes a processor (612) for selecting a set of 2 N invertible permutations p i ,, 1≤ i ≤ 2N; calculating a set of N functions g, , where g, is functionally equivalent to formula (II) for 1≤ i ≤ N ; and calculating a set of N -1 functions h, , where h, is functionally equivalent to formula (III) for 2 ≤ i ≤ N. The server includes means (614) for equipping the executing device with an execution device function cascade that includes formula (IV) , where y 1 , ... , y N are function parameters to formula (V), and means (616) for providing the functions g 1 , , ... g N to the executing device. The executing device includes means (626) for obtaining the functions g 1 ,..., g N and a processor (622) for loading the execution device function cascade and applying the loaded execution device function cascade to the functions g 1 ,...,g N (e.g.,ED,(g 1 ,...,g N )).
Abstract translation:在系统(600)中,服务器(610)以模糊形式向执行装置(620)提供数字信号处理功能f。 函数f包括信号处理函数f1,1 <= I&LE的函数级联; Nto配方(I)。 服务器包括用于选择一组2N可逆排列的处理器(612),其中1 N = 计算一组N个函数g,其中g在功能上等同于1 <= i <= N的公式(II); 并且计算一组N-1函数h,其中h在功能上等同于2 <= i <= N的公式(III)。服务器包括用于装备执行装置具有执行装置功能级联的装置(614) 其包括公式(IV),其中y1,...,yN是对公式(V)的函数参数,以及用于向执行装置提供函数g1,...,gN的装置(616)。 执行装置包括用于获取功能g1,...,gN的装置(626)和用于加载执行装置功能级联的处理器(622),并将加载的执行装置功能级联应用于功能g1,...,gN (例如,ED(G1,...,GN))。
Abstract:
The present invention relates to a record carrier (10) for storing user data in sectors (S) and management information (n) associated with said sectors. In order to provide a simple, low-cost, flexible and secure copy protection of the user data when being transmitted over a communication bus (6) of a PC it is proposed according to the present invention that the management information comprises an encryption indication information (M1) indicating that the user data stored in the associated sector (S) are to be encrypted by a read-out device (2) before being transmitted over a communication bus (6).
Abstract:
The invention relates to a device for running copy-protected software stored on an information carrier (6). It is a object of the invention to increase the hurdle for hackers to make a readable copy of the information carrier (6). To achieve this object a device is provided, comprising: a drive (1) for reading said encrypted graphics data (7) and said encryption data (8, 11, 12), means (9) for decrypting said encrypted graphics data (7) using said encryption data (8, 11, 12) for obtaining decrypted graphics data (16), an application processing unit (4) fDr running said copy-protected software, a graphics processing unit (10) for processing said graphics data (16), means for opening a secure communication channel (5) between said drive (1) and said graphics processing unit (10) for transferring said decrypted graphics data 16 and/or said encryption data (8, 11, 12) from said information carrier (6) to said graphics processing unit (10).
Abstract:
A recording system records blocks of information on a record carrier according to a file management system. Data space on a partly and fragmented recorded record carrier (60-68) is managed as follows. The information includes a first type of information, such as video, and a second type, such a general purpose data. The first type has extent allocation requirements that include requiring an extent to accommodate a multitude of information blocks in a consecutive range of addresses and the extent to have at least a predetermined extent size. Data space is managed by selecting at least one partly recorded data area (67,63,68) of at least the extent size which data area contains information blocks (63) at recorded addresses, and subsequently creating a free data area (74) on the record carrier by moving the information blocks from the recorded addresses in the partly recorded data area to different addresses (73) outside the free data area (74) and correspondingly adapting the file management data.
Abstract:
Current legislation requires the possibility of encryption when storing television programmes received by broadcast. However, legacy playback apparatuses will not be able to play back such encrypted data in a regular way, but possibly in a wrong way. This may result in problems like damage of speakers. Therefore, the invention intends to hide any of such possibly damaging streams by intentionally providing such streams with a wrong identification during the encryption process. The invention provides among others a method and circuit for encryption and a method and circuit for decryption. The invention is especially suitable for DVD recorders, but may also be employed for other video and/or audio recorders. The invention may even be used for encrypting non-audiovisual data.
Abstract:
A method, apparatus and signal for combining two robust watermarks, whereby a low complexity watermark is searched for first, and if not found, a second higher complexity watermark is searched for. The low complexity watermark is robust against a limited set of signal processing that can be expected by a "friendly user" under normal conditions. The second higher complexity watermark is robust against all kinds of malicious attacks.
Abstract:
A method, apparatus and signal for combining two robust watermarks, whereby a low complexity watermark is searched for first, and if not found, a second higher complexity watermark is searched for. The low complexity watermark is robust against a limited set of signal processing that can be expected by a "friendly user" under normal conditions. The second higher complexity watermark is robust against all kinds of malicious attacks.