会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Renewable traitor tracing
    • 可再生叛逆者追踪
    • US09520993B2
    • 2016-12-13
    • US11230022
    • 2005-09-19
    • Hongxia JinJeffrey Bruce LotspiechSigfredo Ismael Nin
    • Hongxia JinJeffrey Bruce LotspiechSigfredo Ismael Nin
    • G06Q20/00H04L9/08
    • H04L9/3268H04L9/083H04L9/0891H04L9/3247H04L63/061H04L2209/601H04L2209/606
    • The present invention provides a method performed on a computer of preventing re-use of compromised keys in a broadcast encryption system. In an exemplary embodiment, the method includes (1) incorporating a particular set of Sequence Keys assigned by a license agency into individual receivers, (2) assigning a Sequence Key Block (SKB) by the license agency to at least one distributed protected file, (3) performing incremental cryptographic testing by the individual receivers to determine if a selected Sequence Key from the set of Sequence Keys is compromised, (4) if the selected Sequence Key is not compromised, decrypting the file, and (5) if the selected Sequence Key is compromised and if a subsequent Sequence Key from the set of Sequence Keys is available, selecting the subsequent Sequence Key.
    • 本发明提供一种在计算机上执行的防止在广播加密系统中重复使用受损密钥的方法。 在一个示例性实施例中,该方法包括(1)将由许可证代理机构分配的特定的一组序列密钥合并到单独的接收机中,(2)将许可代理机构的序列密钥块(SKB)分配给至少一个分布式受保护文件, (3)执行各个接收机的增量密码测试,以确定序列密钥集合中所选择的序列密钥是否受到损害,(4)如果所选择的序列密钥不受影响,解密该文件,以及(5)如果选定的 序列密钥被破坏,并且如果序列密钥集合中的后续序列密钥可用,则选择随后的序列密钥。
    • 4. 发明授权
    • Rebinding of content title keys in clusters of devices with distinct security levels
    • 在具有不同安全级别的设备群集中重新绑定内容标题密钥
    • US08391481B2
    • 2013-03-05
    • US12651382
    • 2009-12-31
    • Robert Glenn DeenHongxia JinSigfredo Ismael NinDulce B. Ponceleon
    • Robert Glenn DeenHongxia JinSigfredo Ismael NinDulce B. Ponceleon
    • H04L29/06
    • H04L9/0836H04L9/0891H04L2209/601
    • According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device.
    • 根据本发明的一个实施例,提供了一种系统,方法和计算机程序产品,用于在广播加密系统中具有不同安全级别的设备群中重新标识标题密钥。 所述方法包括:接收新的管理密钥,并将加密的标题密钥与先前使用的管理密钥解除绑定,所述标题密钥具有安全级别,并且驻留在具有安全等级的设备的标题密钥块中,所述设备处于 设备包括具有多个安全等级的设备。 如果设备安全级别低于标题密钥安全级别,则使用新的管理密钥部分地弹出未绑定的标题密钥。 然后将部分反弹的标题密钥保存在设备的标题密钥块中。
    • 8. 发明申请
    • Method for Effective Tamper Resistance
    • 有效篡改电阻的方法
    • US20090049308A1
    • 2009-02-19
    • US12135052
    • 2008-06-06
    • Hongxia JinJeffrey Bruce LotspiechGinger M. Myles
    • Hongxia JinJeffrey Bruce LotspiechGinger M. Myles
    • H04L9/06
    • G06F21/14
    • A system, method, and computer program product for preventing a malicious user from analyzing and modifying software content. The one-way functions used in prior art systems using dynamically evolving audit logs or self-modifying applications are replaced with a one-way function based on group theory. With this modification, untampered key evolution will occur inside a defined mathematical group such that all valid key values form a subgroup. However, if the program is altered, the key will evolve incorrectly and will no longer be a member of the subgroup. Once the key value is outside of the subgroup, it is not possible to return it to the subgroup. The present invention provides a limited total number of valid keys. The key evolution points are not restricted to locations along the deterministic path, so the key can be used in various novel ways to regulate the program's behavior, including in non-deterministic execution paths.
    • 一种用于防止恶意用户分析和修改软件内容的系统,方法和计算机程序产品。 使用动态演进的审计日志或自修改应用程序的现有技术系统中使用的单向函数被基于组理论的单向函数所取代。 通过这种修改,无限制的密钥演进将发生在定义的数学组内,使得所有有效的密钥值形成一个子组。 但是,如果程序被更改,则密钥将不正确地发展,不再是该子组的成员。 一旦键值超出了子组,就不可能将其返回到子组。 本发明提供了有限的总数量的有效密钥。 关键演化点不仅限于确定路径上的位置,所以密钥可以以各种新颖的方式用于调节程序的行为,包括在非确定性执行路径中。
    • 9. 发明申请
    • System, Method, and Service for Tracing Traitors from Content Protection Circumvention Devices
    • 从内容保护设备追踪叛徒的系统,方法和服务
    • US20080137864A1
    • 2008-06-12
    • US11608268
    • 2006-12-08
    • Hongxia JinJeffrey Bruce LotspiechPhilip Anastasios Zigoris
    • Hongxia JinJeffrey Bruce LotspiechPhilip Anastasios Zigoris
    • H04L9/16G06F17/50
    • H04L9/32G09C5/00H04L9/0891H04L2209/606
    • A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
    • 叛逆者追踪系统产生对避开装置的假设模型,以模拟被规避装置损害的假设的一组装置钥匙。 系统迭代地调用子集跟踪系统以识别受损的设备密钥,直到被识别的设备密钥集中的基本上所有受损设备密钥被识别为禁用规避设备。 子集跟踪系统生成规避设备模型,其使用先验知识对规避设备的行为进行建模,并且系统基于假设模型和规避设备模型迭代地选择并应用到规避设备的测试,并且接收来自规避设备的响应 表明在规避设备上播放受保护内容的测试成功。 系统使用接收到的响应,所选择的测试,假设模型的当前版本和规避设备模型的当前版本来更新假设模型,以将测试选择过程集中在确定从叛徒获得的设备密钥。