会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Tamper-resistant trusted java virtual machine and method of using the same
    • 防篡改的可信java虚拟机和使用方法相同
    • US20050114683A1
    • 2005-05-26
    • US10723725
    • 2003-11-26
    • Hongxia JinDonald LeakeJeffrey LotspiechSigfredo NinWilfred Plouffe
    • Hongxia JinDonald LeakeJeffrey LotspiechSigfredo NinWilfred Plouffe
    • G06F21/00H04L9/32
    • G06F21/6218G06F21/14G06F21/51
    • A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
    • 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。
    • 2. 发明申请
    • Renewable traitor tracing
    • 可再生叛逆者追踪
    • US20070067244A1
    • 2007-03-22
    • US11230022
    • 2005-09-19
    • Hongxia JinJeffrey LotspiechSigfredo Nin
    • Hongxia JinJeffrey LotspiechSigfredo Nin
    • G06Q99/00
    • H04L9/3268H04L9/083H04L9/0891H04L9/3247H04L63/061H04L2209/601H04L2209/606
    • A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
    • 可重新防止广播加密系统中的叛逃者重新使用受损密钥的系统,方法和计算机程序产品。 许可代理机构优先为制造商分配一组序列密钥,并将序列密钥块(SKB)分配给要分发的受保护内容文件。 文件可以分布在预先记录的媒体上,通常包括几个文件修改。 盗版版本的特定修改可以帮助您识别哪些叛徒造成其盗用。 分配给叛逃者识别后分发的新文件的SKB无法使用先前内容盗版中使用的受损密钥进行有效的处理。 无辜的接收者碰巧损害了与叛逆者共同的密钥,可以使用该集合中的替代未妥协的序列密钥来有效解密内容。 然而,叛徒将逐步通过所有的序列键,而不会达到可以工作的顺序键。