会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content
    • 使用智能卡或其他加密模块,使连接的设备能够访问加密的音频和视频内容
    • US07039816B2
    • 2006-05-02
    • US10695256
    • 2003-10-27
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04N7/167H04L9/30
    • G06F21/602G06F21/10G06F21/72G06F2211/007G06F2221/0753G06F2221/2101G06Q20/367H04L9/0833H04L2209/127H04L2209/603
    • To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.
    • 为了防止盗版,视听内容在传输给消费者之前被加密。 低成本,高安全性的加密权限模块(如智能卡)可使诸如播放器/显示器等设备解码此类内容。 安全关键功能可以由加密模块以允许通过升级或替换加密模块来解决安全危害的方式来执行,从而避免需要替换或修改其他(通常成本更高的成本)组件。 安全模块包含加密密钥,用于处理权限启用消息(REM)和密钥导出消息(KDM)。 从REM和KDM,安全模块导出与内容对应的密钥数据,使用公开密钥和/或对称密码来对另一设备的导出密钥数据进行重新加密,并将重新加密的密钥数据提供给解码设备。 解码装置然后使用从重新加密的密钥数据导出的加密值来解密内容。
    • 6. 发明授权
    • Method and apparatus for preventing piracy of digital content
    • 防止数字内容盗版的方法和装置
    • US06289455B1
    • 2001-09-11
    • US09389268
    • 1999-09-02
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • G06F1214
    • G06F21/602G06F21/10G06F21/72G06F2211/007G06F2221/0753G06F2221/2101G06Q20/367H04L9/0833H04L2209/127H04L2209/603
    • A secure cryptographic rights unit for cryptographically regulating access to digital content includes an interface control processor and a specialized cryptographic unit that protects access to a memory. Rights keys, which allow access to content, are added by the cryptographic unit by transforming data received from the control processor and storing the result in the protected memory. The cryptographic unit then produces content decryption keys by using stored rights keys to transform other data received from the control processor. Because the control processor does not have the ability to directly access the protected memory, the security can remain effective even if the control processor is compromised. To prevent reverse engineering of the cryptographic transformations, the invention provides for an algorithm generator that uses random sources to produce algorithm definitions in machine-readable form. Because the generator itself does not contain any secrets, it can be submitted for open review.
    • 用于密码地调节对数字内容的访问的安全加密权限单元包括接口控制处理器和保护对存储器的访问的专用加密单元。 允许访问内容的权限由加密单元通过转换从控制处理器接收的数据并将结果存储在受保护的存储器中来添加。 密码单元然后通过使用存储的权限密钥来转换从控制处理器接收的其他数据来产生内容解密密钥。 由于控制处理器不具备直接访问受保护的存储器的能力,因此即使控制处理器受到威胁,安全性也可以保持有效。 为了防止加密变换的逆向工程,本发明提供了一种使用随机源产生机器可读形式的算法定义的算法生成器。 因为发电机本身不包含任何秘密,所以可以提交公开审查。
    • 8. 发明授权
    • Prevention of side channel attacks against block cipher implementations and other cryptographic systems
    • 防止针对块密码实现和其他加密系统的侧信道攻击
    • US07787620B2
    • 2010-08-31
    • US11252898
    • 2005-10-18
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P{K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。
    • 9. 发明授权
    • Cryptographic computation using masking to prevent differential power analysis and other attacks
    • 使用掩码进行密码计算,以防止差分功率分析和其他攻击
    • US07668310B2
    • 2010-02-23
    • US09930836
    • 2001-08-15
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • Paul C. KocherJoshua M. JaffeBenjamin C. Jun
    • H04L9/22
    • H04L9/0625G06F21/556G06F21/602G06F21/755G06F2207/7219H04L9/003H04L2209/046H04L2209/08H04L2209/127
    • Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit keys (K1 and K2) and two 64-bit plaintext messages (M1 and M2), each associated with a permutation (i.e., K1P, K2P and M1P, M2P) such that K1P{K1} XOR K2P {K2} equals the “standard” DES key K, and M1P{M1} XOR M2P{M2} equals the “standard” message. During operation of the device, the tables are preferably periodically updated, by introducing fresh entropy into the tables faster than information leaks out, so that attackers will not be able to obtain the table contents by analysis of measurements. The technique is implementable in cryptographic smartcards, tamper resistant chips, and secure processing systems of all kinds.
    • 公开了用于通过减少在处理期间泄露的有用信息的量(和信噪比)来改善DES和其他加密协议以防外部监视攻击的方法和装置。 本发明的改进的DES实施方案改为使用两个56位密钥(K1和K2)和两个64位明文消息(M1和M2),每个与排列相关联(即,K1P,K2P和M1P,M2P),使得 K1P {K1} XOR K2P {K2}等于“标准”DES密钥K,M1P {M1} XOR M2P {M2}等于“标准”消息。 在设备的操作期间,优选地通过将新鲜的熵引入到表中比信息泄漏出来更周期地更新表,使得攻击者将不能通过分析测量获得表内容。 该技术可在加密智能卡,防篡改芯片和各种安全处理系统中实现。