会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • Methods and systems of protecting digital content
    • 保护数字内容的方法和系统
    • US20050273862A1
    • 2005-12-08
    • US11192348
    • 2005-07-28
    • Josh BenalohAndrew RosenGideon Yuval
    • Josh BenalohAndrew RosenGideon Yuval
    • G06F1/00G06F21/00G11B20/00H04L9/08H04L9/30H04L9/00
    • G06F21/10G06F2211/007G06F2221/0737G06F2221/0753G06F2221/2107G11B20/00086G11B20/0021H04L9/0825H04L2209/60H04L2209/606
    • Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. The innovative advancements do not rely on post-distribution watermarking or fingerprinting techniques, and yet intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced. In one embodiment, digital content is provided and comprises multiple partition sets, with each partition set comprising a first partition and at least one different version of the first partition. Each partition of each partition set is uniquely marked and encrypted with a different key. Individual unique key collections are then defined to contain, for each partition set, one key that was used to encrypt a partition from the partition set and no two key collections are identical. This means that each key collection can decrypt one unique version of the digital content. This unique version of the digital content is thus inextricably tied to the key collection that was utilized to decrypt the content. Each key collection is then encrypted with a different public key associated with one of multiple content players on which the digital content is to be played. Thus, each content player is inextricably associated with one key collection, and each key collection is inextricably associated with a unique version of the digital content. The digital content and one or more key collections can then be provided to the content players. When a content player decrypts its associated key collection and uses the key collection to decrypt the digital content, the version of the digital content that is decrypted points directly to the specific content-player that was authorized to decrypt it with that key collection.
    • 描述了通过使盗版拷贝可追溯到用于解密原始加密内容的唯一解密密钥来实现数字内容(例如电影等)的保护的方法和系统。 创新的进步不依赖于后期分发水印或指纹技术,而是将任何未经授权的副本本质上链接到复制真实副本时使用的唯一加密密钥或密钥集合。 在一个实施例中,提供数字内容并且包括多个分区集合,其中每个分区集包括第一分区和第一分区的至少一个不同版本。 每个分区集的每个分区都用不同的密钥进行唯一标记和加密。 然后,将各个唯一的密钥集合定义为包含每个分区集一个用于从分区集加密分区的密钥,并且两个密钥集合是相同的。 这意味着每个密钥集合可以解密数字内容的一个唯一版本。 因此,数字内容的独特版本与用于解密内容的密钥集合密不可分。 然后,利用与要在其上播放数字内容的多个内容播放器中的一个相关联的不同的公钥来加密每个密钥集合。 因此,每个内容播放器与一个密钥集合不可分割地相关联,并且每个密钥集合与数字内容的唯一版本不可分割地相关联。 然后可以向内容播放器提供数字内容和一个或多个密钥集合。 当内容播放器解密其关联的密钥集合并使用密钥集合来解密数字内容时,被解密的数字内容的版本直接指向被该密钥集合被授权解密的特定内容播放器。
    • 8. 发明授权
    • System and method for non-interactive human answerable challenges
    • 非交互式人为责任挑战的系统和方法
    • US07337324B2
    • 2008-02-26
    • US10725243
    • 2003-12-01
    • Josh BenalohIsmail Cem Paya
    • Josh BenalohIsmail Cem Paya
    • H04L9/32
    • H04L63/12G06F21/31H04L63/0435H04L63/0442
    • A system and method for automatically determining if a computer user is a human or an automated script. Human interactive proofs (HIPs) are currently used to deter automated registration for web services by automated computer scripts. Unfortunately, HIPs entail multiple steps (request service, receive challenge, respond to challenge) that can be burdensome. The system and method of the invention in one embodiment provides a “black-box” to potential users consisting of a challenge generator and a secret key. The challenge is generated for the user and the response can be provided as part of the service request, eliminating the need for a separate challenge from a service provider and response to the challenge.
    • 用于自动确定计算机用户是人或自动脚本的系统和方法。 人类交互式证明(HIP)目前用于通过自动计算机脚本来阻止Web服务的自动注册。 不幸的是,HIP需要多重步骤(请求服务,接收挑战,应对挑战),这可能是繁重的。 在一个实施例中,本发明的系统和方法为由挑战发生器和秘密密钥组成的潜在用户提供“黑箱”。 为用户生成挑战,并且响应可以作为服务请求的一部分提供,消除了对来自服务提供商的单独挑战的需求以及对挑战的响应。
    • 9. 发明申请
    • Using hierarchical identity based cryptography for authenticating outbound mail
    • 使用基于层次标识的加密技术来验证出站邮件
    • US20070124578A1
    • 2007-05-31
    • US11291946
    • 2005-11-30
    • Cem PayaJosh Benaloh
    • Cem PayaJosh Benaloh
    • H04L9/00
    • H04L63/06H04L9/3073H04L9/3247H04L9/3271H04L51/00H04L63/12
    • A hierarchical identity based cryptographic system (“HIBC”) is integrated with the domain name system (“DNS”). A private key is assigned to each of the top level domain name authorities responsible for assigning the top level domain names (e.g., net, .com, etc.). The private key is generated according to an HIBC system, wherein the corresponding public key is based on the identity of the particular domain authority. When user requests a domain name from one of the top level domain name authorities, the user is issued a private key that is generated by the top level domain authority using its private key and the identity of the user according to the particular HIBC system implemented. The user's corresponding public key can be derived from the identity of the user and the public key of the top level domain name authority. Similarly, when the user adds servers and accounts to the users domain, the user can generate private keys for the servers and accounts using the users private key according to the particular HIBC system. Later, emails originating from the users domain can be authenticated by recipients using the public key associated with the top level domain name authority.
    • 基于层次标识的加密系统(“HIBC”)与域名系统(“DNS”)集成。 私钥分配给负责分配顶级域名(例如,net,.com等)的顶级域名权限。 私钥根据HIBC系统生成,其中相应的公钥基于特定域权限的身份。 当用户从顶级域名权限之一请求域名时,将使用其私有密钥和根据实施的特定HIBC系统的用户身份由顶级域机构生成的私钥。 用户的相应公钥可以从用户的身份和顶级域名权限的公钥中导出。 类似地,当用户将服务器和帐户添加到用户域时,用户可以使用根据特定HIBC系统的用户私钥为服务器和帐户生成私钥。 之后,来自用户域的电子邮件可以由收件人使用与顶级域名权限关联的公钥进行身份验证。