会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • EXTENDING THE NUMBER OF APPLICATIONS FOR ACCESSING PROTECTED CONTENT IN A MEDIA USING MEDIA KEY BLOCKS
    • 使用媒体关键块扩展访问媒体中保护内容的应用数量
    • US20140052996A1
    • 2014-02-20
    • US13586861
    • 2012-08-15
    • Sigfredo I. NinDulce B. Ponceleon
    • Sigfredo I. NinDulce B. Ponceleon
    • G06F21/24
    • G06F21/10
    • Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of extended applications supported the media key blocks and facilitates the assignment of the applications to the media key blocks. One aspect of the invention concerns a method that comprises assigning a first media key block in a protected area of the media for extended applications accessing protected content, processing the first media key block with a first device key set to generate a first media key, and for each extended application, creating a second media key block in a protected area of the media. The second media key block is processed to generate a second media key. A content-accessing device processes the first and second media keys in order to access protected content.
    • 本发明的实施例涉及使用基于媒体中的设备密钥的加密和解密的可记录介质的数字内容保护。 本发明增加了支持媒体密钥块的扩展应用的数量,并且有助于将应用分配给媒体密钥块。 本发明的一个方面涉及一种方法,其包括在媒体的保护区域中分配第一媒体密钥块以用于访问受保护内容的扩展应用,利用第一设备密钥集来处理第一媒体密钥块以生成第一媒体密钥,以及 对于每个扩展应用,在媒体的保护区域中创建第二媒体密钥块。 第二媒体密钥块被处理以产生第二媒体密钥。 内容访问设备处理第一和第二媒体密钥以访问受保护的内容。
    • 4. 发明授权
    • Extending the number of applications for accessing protected content in a media using media key blocks
    • 使用媒体密钥块扩展访问媒体中受保护内容的应用数量
    • US08782440B2
    • 2014-07-15
    • US13586861
    • 2012-08-15
    • Sigfredo I. NinDulce B. Ponceleon
    • Sigfredo I. NinDulce B. Ponceleon
    • G06F21/00G06F11/30G06F7/04G06F17/30H04N7/16
    • G06F21/10
    • Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of extended applications supported the media key blocks and facilitates the assignment of the applications to the media key blocks. One aspect of the invention concerns a method that comprises assigning a first media key block in a protected area of the media for extended applications accessing protected content, processing the first media key block with a first device key set to generate a first media key, and for each extended application, creating a second media key block in a protected area of the media. The second media key block is processed to generate a second media key. A content-accessing device processes the first and second media keys in order to access protected content.
    • 本发明的实施例涉及使用基于媒体中的设备密钥的加密和解密的可记录介质的数字内容保护。 本发明增加了支持媒体密钥块的扩展应用的数量,并且有助于将应用分配给媒体密钥块。 本发明的一个方面涉及一种方法,其包括在媒体的保护区域中分配第一媒体密钥块以用于访问受保护内容的扩展应用,用第一设备密钥集处理第一媒体密钥块以生成第一媒体密钥,以及 对于每个扩展应用,在媒体的保护区域中创建第二媒体密钥块。 第二媒体密钥块被处理以产生第二媒体密钥。 内容访问设备处理第一和第二媒体密钥以访问受保护的内容。
    • 5. 发明授权
    • Tamper-resistant trusted Java virtual machine and method of using the same
    • 防篡改的可信Java虚拟机及其使用方法
    • US07747877B2
    • 2010-06-29
    • US12363876
    • 2009-02-02
    • Hongxia JinDonald E. Leake, Jr.Jeffrey B. LotspiechSigfredo I. NinWilfred E. Plouffe
    • Hongxia JinDonald E. Leake, Jr.Jeffrey B. LotspiechSigfredo I. NinWilfred E. Plouffe
    • G06F11/30G06F12/14
    • G06F21/6218G06F21/14G06F21/51
    • A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
    • 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。
    • 6. 发明授权
    • Tamper-resistant trusted java virtual machine and method of using the same
    • 防篡改的可信java虚拟机和使用方法相同
    • US07516331B2
    • 2009-04-07
    • US10723725
    • 2003-11-26
    • Hongxia JinDonald E. Leake, Jr.Jeffrey B. LotspiechSigfredo I. NinWilfred E. Plouffe
    • Hongxia JinDonald E. Leake, Jr.Jeffrey B. LotspiechSigfredo I. NinWilfred E. Plouffe
    • H04L9/32
    • G06F21/6218G06F21/14G06F21/51
    • A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
    • 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。
    • 8. 发明申请
    • Tamper-Resistant Trusted JAVA Virtual Machine And Method Of Using The Same
    • 防篡改可信JAVA虚拟机及其使用方法
    • US20090138731A1
    • 2009-05-28
    • US12363876
    • 2009-02-02
    • Hongxia JinDonald E. Leake, JR.Jeffrey B. LotspiechSigfredo I. NinWilfred E. Plouffe
    • Hongxia JinDonald E. Leake, JR.Jeffrey B. LotspiechSigfredo I. NinWilfred E. Plouffe
    • G06F21/22
    • G06F21/6218G06F21/14G06F21/51
    • A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
    • 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。