会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明申请
    • Methods and systems of protecting digital content
    • 保护数字内容的方法和系统
    • US20050273862A1
    • 2005-12-08
    • US11192348
    • 2005-07-28
    • Josh BenalohAndrew RosenGideon Yuval
    • Josh BenalohAndrew RosenGideon Yuval
    • G06F1/00G06F21/00G11B20/00H04L9/08H04L9/30H04L9/00
    • G06F21/10G06F2211/007G06F2221/0737G06F2221/0753G06F2221/2107G11B20/00086G11B20/0021H04L9/0825H04L2209/60H04L2209/606
    • Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. The innovative advancements do not rely on post-distribution watermarking or fingerprinting techniques, and yet intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced. In one embodiment, digital content is provided and comprises multiple partition sets, with each partition set comprising a first partition and at least one different version of the first partition. Each partition of each partition set is uniquely marked and encrypted with a different key. Individual unique key collections are then defined to contain, for each partition set, one key that was used to encrypt a partition from the partition set and no two key collections are identical. This means that each key collection can decrypt one unique version of the digital content. This unique version of the digital content is thus inextricably tied to the key collection that was utilized to decrypt the content. Each key collection is then encrypted with a different public key associated with one of multiple content players on which the digital content is to be played. Thus, each content player is inextricably associated with one key collection, and each key collection is inextricably associated with a unique version of the digital content. The digital content and one or more key collections can then be provided to the content players. When a content player decrypts its associated key collection and uses the key collection to decrypt the digital content, the version of the digital content that is decrypted points directly to the specific content-player that was authorized to decrypt it with that key collection.
    • 描述了通过使盗版拷贝可追溯到用于解密原始加密内容的唯一解密密钥来实现数字内容(例如电影等)的保护的方法和系统。 创新的进步不依赖于后期分发水印或指纹技术,而是将任何未经授权的副本本质上链接到复制真实副本时使用的唯一加密密钥或密钥集合。 在一个实施例中,提供数字内容并且包括多个分区集合,其中每个分区集包括第一分区和第一分区的至少一个不同版本。 每个分区集的每个分区都用不同的密钥进行唯一标记和加密。 然后,将各个唯一的密钥集合定义为包含每个分区集一个用于从分区集加密分区的密钥,并且两个密钥集合是相同的。 这意味着每个密钥集合可以解密数字内容的一个唯一版本。 因此,数字内容的独特版本与用于解密内容的密钥集合密不可分。 然后,利用与要在其上播放数字内容的多个内容播放器中的一个相关联的不同的公钥来加密每个密钥集合。 因此,每个内容播放器与一个密钥集合不可分割地相关联,并且每个密钥集合与数字内容的唯一版本不可分割地相关联。 然后可以向内容播放器提供数字内容和一个或多个密钥集合。 当内容播放器解密其关联的密钥集合并使用密钥集合来解密数字内容时,被解密的数字内容的版本直接指向被该密钥集合被授权解密的特定内容播放器。
    • 26. 发明授权
    • Managing group keys
    • 管理组密钥
    • US08325924B2
    • 2012-12-04
    • US12389217
    • 2009-02-19
    • Tolga AcarJosh BenalohNiels Thomas FergusonCarl M. EllisonMira BelenkiyDuy Lan Nguyen
    • Tolga AcarJosh BenalohNiels Thomas FergusonCarl M. EllisonMira BelenkiyDuy Lan Nguyen
    • H04L9/00
    • H04L9/0891H04L9/0833
    • In an example, one or more cryptographic keys may be associated with a group. Any member of the group may use the key to encrypt and decrypt information, thereby allowing members of the group to share encrypted information. Domain controllers (DCs) maintain copies of the group's keys. The DCs may synchronize with each other, so that each DC may have a copy of the group's keys. Keys may have expiration dates, and any client connected to a DC may generate a new key when a key is nearing expiration. The various clients may create new keys at differing amounts of time before expiration on various DCs. DCs that store keys early thus may have time to propagate the newly-created keys through synchronization before other DCs are requested to store keys created by other clients. In this way, the creation of an excessive number of new keys may be avoided.
    • 在一个示例中,一个或多个加密密钥可以与组相关联。 该组的任何成员可以使用密钥来加密和解密信息,从而允许该组的成员共享加密的信息。 域控制器(DC)维护组的密钥副本。 DC可以彼此同步,使得每个DC可以具有组的密钥的副本。 密钥可能有过期日期,连接到DC的任何客户端可能在密钥接近到期时生成新密钥。 各种客户端可以在不同的时间段之前以不同的时间量创建新的密钥。 因此,早期存储密钥的DC可能有时间通过​​同步传播新创建的密钥,而其他DC被请求存储由其他客户端创建的密钥。 以这种方式,可以避免创建过多的新密钥。
    • 27. 发明授权
    • Defending against denial of service attacks
    • 防止拒绝服务攻击
    • US07937586B2
    • 2011-05-03
    • US11771034
    • 2007-06-29
    • Douglas Robert de la TorreAidan Thomas Joseph HughesJosh Benaloh
    • Douglas Robert de la TorreAidan Thomas Joseph HughesJosh Benaloh
    • H04L9/00G06F11/00
    • H04L63/1458G06F21/445G06F2221/2129H04L63/12H04L2463/141
    • In various embodiments, a server may be provided. The server may respond to a request for a service, from a processing device, with a challenge. The challenge may include a partial key for a memory-intensive operation, a number of iterations of the memory-intensive operation to perform, and a result of performing the number of iterations of the memory-intensive operation. Upon receiving the challenge, the processing device may choose a complete key consistent with the partial key and may produce a proposed result by performing the memory-intensive operation for the number of iterations. When the proposed result matches the result included in the challenge, the processing device may send a challenge answer, including the chosen complete key, to the server. Upon receiving a correct challenge answer from the processing device, the server may access the requested service and may return a result of the access to the processing device.
    • 在各种实施例中,可以提供服务器。 服务器可以响应来自处理设备的对服务的请求的挑战。 挑战可以包括用于存储器密集型操作的部分密钥,要执行的存储器密集型操作的迭代次数以及执行存储器密集型操作的迭代次数的结果。 在接收到挑战时,处理设备可以选择与部分密钥一致的完整密钥,并且可以通过对迭代次数执行存储器密集型操作来产生建议的结果。 当提出的结果与挑战中包含的结果相匹配时,处理装置可以向服务器发送包括所选择的完整密钥的质询答案。 在从处理设备接收到正确的挑战答案之后,服务器可以访问所请求的服务,并且可以将访问的结果返回给处理设备。
    • 29. 发明授权
    • Licensing the use of software on a particular CPU
    • 授权在特定CPU上使用软件
    • US07552341B2
    • 2009-06-23
    • US10931785
    • 2004-09-01
    • Ling Tony ChenJosh Benaloh
    • Ling Tony ChenJosh Benaloh
    • G06F11/30H04K1/00G06F7/04H04L9/32H04L29/06H04L9/00
    • G06F21/121G06F21/10G06F2221/2109
    • Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the associated computing device. The software may reside on a computer-readable medium, such as a CD-ROM or DVD disk, that is being used in conjunction with the computing device. The unlocking code may be provided directly to the user in private (e.g., via email or a mobile phone) or in public (e.g., published on a website). Portions of the software that may be unlocked include a particular level of a game or other features (such as additional characters or weapons), or a working or more advanced version of an application that was otherwise provided as a demo or older version. The unlocking code may be based on a unique identifier of the computing device and an identifier associated with the software seeking to be accessed. Thus, the code may only be used by the computing device having that unique identifier. This prevents unauthorized or unlicensed computing devices from using the software.
    • 软件许可在特定的计算设备上使用,如游戏机或多媒体控制台。 从分发服务向计算设备(直接地或经由用户)提供解锁代码,这又解锁相关软件或软件的一部分以与相关联的计算设备一起使用。 软件可以驻留在与计算设备一起使用的诸如CD-ROM或DVD盘的计算机可读介质上。 解锁代码可以私人地(例如,通过电子邮件或移动电话)或公开地(例如,在网站上发布)直接提供给用户。 可以解锁的软件的部分包括特定级别的游戏或其他功能(例如附加字符或武器),或作为演示或旧版本另外提供的应用的工作或更高级版本。 解锁代码可以基于计算设备的唯一标识符和与寻求被访问的软件相关联的标识符。 因此,代码只能由具有该唯一标识符的计算设备使用。 这可以防止未授权或未授权的计算设备使用该软件。