会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 24. 发明授权
    • System, method, and service for tracing traitors from content protection circumvention devices
    • 从内容保护规避设备跟踪叛徒的系统,方法和服务
    • US08023655B2
    • 2011-09-20
    • US12134113
    • 2008-06-05
    • Hongxia JinJeffrey Bruce LotsplechPhilip Anastasios Zigoris
    • Hongxia JinJeffrey Bruce LotsplechPhilip Anastasios Zigoris
    • H04L9/00
    • H04L9/32G09C5/00H04L9/0891H04L2209/606
    • A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
    • 叛逆者追踪系统产生对避开装置的假设模型,以模拟被规避装置损害的假设的一组装置钥匙。 系统迭代地调用子集跟踪系统以识别受损的设备密钥,直到被识别的设备密钥集中的基本上所有受损设备密钥被识别为禁用规避设备。 子集跟踪系统生成规避设备模型,其使用先验知识对规避设备的行为进行建模,并且系统基于假设模型和规避设备模型迭代地选择并应用到规避设备的测试,并且接收来自规避设备的响应 表明在规避设备上播放受保护内容的测试成功。 系统使用接收到的响应,所选择的测试,假设模型的当前版本和规避设备模型的当前版本来更新假设模型,以将测试选择过程集中在确定从叛徒获得的设备密钥。
    • 25. 发明授权
    • Method for effective tamper resistance
    • 有效防篡改的方法
    • US07996685B2
    • 2011-08-09
    • US12135052
    • 2008-06-06
    • Hongxia JinJeffrey Bruce LotspiechGinger M. Myles
    • Hongxia JinJeffrey Bruce LotspiechGinger M. Myles
    • G06F21/00
    • G06F21/14
    • A system, method, and computer program product for preventing a malicious user from analyzing and modifying software content. The one-way functions used in prior art systems using dynamically evolving audit logs or self-modifying applications are replaced with a one-way function based on group theory. With this modification, untampered key evolution will occur inside a defined mathematical group such that all valid key values form a subgroup. However, if the program is altered, the key will evolve incorrectly and will no longer be a member of the subgroup. Once the key value is outside of the subgroup, it is not possible to return it to the subgroup. The present invention provides a limited total number of valid keys. The key evolution points are not restricted to locations along the deterministic path, so the key can be used in various novel ways to regulate the program's behavior, including in non-deterministic execution paths.
    • 一种用于防止恶意用户分析和修改软件内容的系统,方法和计算机程序产品。 使用动态演进的审计日志或自修改应用程序的现有技术系统中使用的单向函数被基于组理论的单向函数所取代。 通过这种修改,无限制的密钥演进将发生在定义的数学组内,使得所有有效的密钥值形成一个子组。 但是,如果程序被更改,则密钥将不正确地发展,不再是该子组的成员。 一旦键值超出了子组,就不可能将其返回到子组。 本发明提供了有限的总数量的有效密钥。 关键演化点不仅限于确定路径上的位置,所以密钥可以以各种新颖的方式用于调节程序的行为,包括在非确定性执行路径中。
    • 26. 发明申请
    • Security Classes in a Media Key Block
    • 媒体密钥块中的安全类
    • US20100040231A1
    • 2010-02-18
    • US12192962
    • 2008-08-15
    • Hongxia JinJeffrey Bruce Lotspiech
    • Hongxia JinJeffrey Bruce Lotspiech
    • H04L9/32H04L9/08
    • H04L9/0833H04L9/12H04L2209/601H04L2209/606
    • According to one embodiment of the present invention, a method for broadcast encryption with security classes in a media key block is provided. In one embodiment the method includes receiving encrypted media of a first and a second class, where the media includes a common media key block, in a device of a first class and in a device of a second class. A first media key is calculated from the common media key block in the device of a first class. A first media key precursor is calculated from the common media key block in the device of a second class. The first media precursor may be used to decrypt media of a first class. The first media precursor may also be used to calculate a second media key in the device of a second class to decrypt content of a first class.
    • 根据本发明的一个实施例,提供了一种用于在媒体密钥块中具有安全类别的广播加密的方法。 在一个实施例中,该方法包括在第一类的设备和第二类的设备中接收第一类和第二类的加密媒体,其中媒体包括公共媒体密钥块。 从第一类设备中的公共媒体密钥块计算第一媒体密钥。 从第二类设备中的公共媒体密钥块计算第一媒体密钥前体。 第一媒体前体可用于解密第一类的媒体。 也可以使用第一媒体前体来计算第二类的设备中的第二媒体密钥来解密第一类的内容。