会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Tamper-resistant trusted java virtual machine and method of using the same
    • 防篡改的可信java虚拟机和使用方法相同
    • US20050114683A1
    • 2005-05-26
    • US10723725
    • 2003-11-26
    • Hongxia JinDonald LeakeJeffrey LotspiechSigfredo NinWilfred Plouffe
    • Hongxia JinDonald LeakeJeffrey LotspiechSigfredo NinWilfred Plouffe
    • G06F21/00H04L9/32
    • G06F21/6218G06F21/14G06F21/51
    • A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
    • 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。
    • 2. 发明申请
    • Renewable traitor tracing
    • 可再生叛逆者追踪
    • US20070067244A1
    • 2007-03-22
    • US11230022
    • 2005-09-19
    • Hongxia JinJeffrey LotspiechSigfredo Nin
    • Hongxia JinJeffrey LotspiechSigfredo Nin
    • G06Q99/00
    • H04L9/3268H04L9/083H04L9/0891H04L9/3247H04L63/061H04L2209/601H04L2209/606
    • A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
    • 可重新防止广播加密系统中的叛逃者重新使用受损密钥的系统,方法和计算机程序产品。 许可代理机构优先为制造商分配一组序列密钥,并将序列密钥块(SKB)分配给要分发的受保护内容文件。 文件可以分布在预先记录的媒体上,通常包括几个文件修改。 盗版版本的特定修改可以帮助您识别哪些叛徒造成其盗用。 分配给叛逃者识别后分发的新文件的SKB无法使用先前内容盗版中使用的受损密钥进行有效的处理。 无辜的接收者碰巧损害了与叛逆者共同的密钥,可以使用该集合中的替代未妥协的序列密钥来有效解密内容。 然而,叛徒将逐步通过所有的序列键,而不会达到可以工作的顺序键。
    • 4. 发明申请
    • Method for tracing traitor coalitions and preventing piracy of digital content in a broadcast encryption system
    • 在广播加密系统中跟踪叛国联盟并防止数字内容盗版的方法
    • US20070165853A1
    • 2007-07-19
    • US11323247
    • 2005-12-30
    • Hongxia JinJeffrey Lotspiech
    • Hongxia JinJeffrey Lotspiech
    • H04N7/167
    • H04N7/165H04L9/08H04L2209/606H04N21/2585
    • A system, method, and computer program product to find coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked.
    • 一种系统,方法和计算机程序产品,用于查找串联产生盗版保护内容的接收者联盟,然后评估每个已识别联盟的特定成员是叛徒的机会与被机会犯罪的无辜接收者的信心。 通常,一组原始文件中的每个文件都被修改为包括关键文件段的变体。 然后使用个性化代码广播文件组,使得特定授权的接收者能够正确处理修改的文件。 盗版版本的文件的修改可以识别哪些叛国接收器对其盗版作出贡献。 首先评估不同大小的候选联盟,以确定它们是否覆盖观察到的文件差异,超过预期的可能性,无辜的联盟被机会错误地引诱。 然后评估满意联盟的个人成员。 叛徒可能被加密地撤销。