会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Security within integrated circuits
    • 集成电路内的安全
    • US08539596B2
    • 2013-09-17
    • US12736564
    • 2009-05-21
    • Chaim Shen-OrrZvi ShkedyReuven ElbaumYonatan ShlomovichYigal ShapiroYaacov BelenkyYaakov (Jordan) LevyReuben SumnerItsik Mantin
    • Chaim Shen-OrrZvi ShkedyReuven ElbaumYonatan ShlomovichYigal ShapiroYaacov BelenkyYaakov (Jordan) LevyReuben SumnerItsik Mantin
    • G06F21/00
    • G06F21/60G06F21/79H04L9/003
    • A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time. Related apparatus and methods are also described.
    • 描述了阻止从存储单元中保存的秘密泄漏的信息的检测的方法,所述方法包括在接收到触发事件之后接收等待至少第一时间量的触发事件以通过,所述存储单元为 在所述至少第一时间量之后的至少第一时间量内处于非操作状态,改变所述存储器单元在其下操作的至少一个第一状态,从而使所述存储器单元进入操作状态 在改变至少一个第一条件之后等待第二时间量过去,并且在所述第二时间量之后改变所述存储器单元操作的至少一个第二状态,从而使所述存储器单元进入非 其中对秘密信息的访问仅在第二时间段期间被启用,并且在f期间有意无意地泄漏的秘密信息的检测受到限制 第一次的时间 还描述了相关装置和方法。
    • 4. 发明申请
    • SECURITY WITHIN INTEGRATED CIRCUITS
    • 在集成电路中的安全
    • US20110083194A1
    • 2011-04-07
    • US12736564
    • 2009-05-21
    • Chaim Shen-OrrZvi ShkedyReuven ElbaumYonatan ShlomovichYigal ShapiroYaacov BelenkyYaakov (Jordan) LevyReuben SumnerItsik Mantin
    • Chaim Shen-OrrZvi ShkedyReuven ElbaumYonatan ShlomovichYigal ShapiroYaacov BelenkyYaakov (Jordan) LevyReuben SumnerItsik Mantin
    • G06F21/24
    • G06F21/60G06F21/79H04L9/003
    • A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time. Related apparatus and methods are also described.
    • 描述了阻止从存储单元中保存的秘密泄漏的信息的检测的方法,所述方法包括在接收到触发事件之后接收等待至少第一时间量的触发事件以通过,所述存储单元为 在所述至少第一时间量之后的至少第一时间量内处于非操作状态,改变所述存储器单元在其下操作的至少一个第一状态,从而使所述存储器单元进入操作状态 在改变至少一个第一条件之后等待第二时间量过去,并且在所述第二时间量之后改变所述存储器单元操作的至少一个第二状态,从而使所述存储器单元进入非 其中对秘密信息的访问仅在第二时间段期间被启用,并且在f期间有意无意地泄漏的秘密信息的检测受到限制 第一次的时间 还描述了相关装置和方法。
    • 6. 发明授权
    • Digital rights management system and method
    • 数字版权管理系统和方法
    • US07920702B2
    • 2011-04-05
    • US12388717
    • 2009-02-19
    • Chaim Shen-OrrEliphaz HibshooshGyora BenedekHillel SolowYaacov BelenkyYossi TsuriaZvi Shkedy
    • Chaim Shen-OrrEliphaz HibshooshGyora BenedekHillel SolowYaacov BelenkyYossi TsuriaZvi Shkedy
    • H04L9/32H04N7/167
    • G06F21/10G06F2221/0704G06F2221/0744G09G5/00G09G2358/00G09G2360/18
    • A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided.
    • 一种用于提供用于保护数字内容的可变安全机制的系统和方法,其中单个安全机制不用于所有内容。 相反,安全机制的至少一个特性或特征在单元,实例或内容类别之间变化。 因此,即使未授权的访问获得到单个内容单元,内容分发系统的整体完整性和安全性也不会受到损害。 优选地,通过通用机制来提供安全性,然后进行变化,以便为不同类型的内容提供可变的不同的安全方案。 根据“内容类型”,它是指单个内容单元,单个内容实例或单个内容类别中的任何一个。 例如,对于内容的类别,内容可以根据内容本身的身份(例如电影的标题)和/或根据内容的特定副本的所有者来表征。 因此,可以可选地且优选地从特定根结构生成不同的安全方案。 还提供了相关的装置和方法。
    • 7. 发明申请
    • DIGITAL RIGHTS MANAGEMENT SYSTEM AND METHOD
    • 数字权限管理系统与方法
    • US20090154697A1
    • 2009-06-18
    • US12388717
    • 2009-02-19
    • Chaim Shen-OrrEliphaz HibshooshGyora BenedekHillel SolowYaacov BelenkyYossi TsuriaZvi Shkedy
    • Chaim Shen-OrrEliphaz HibshooshGyora BenedekHillel SolowYaacov BelenkyYossi TsuriaZvi Shkedy
    • H04N7/167
    • G06F21/10G06F2221/0704G06F2221/0744G09G5/00G09G2358/00G09G2360/18
    • A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided though a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided.
    • 一种用于提供用于保护数字内容的可变安全机制的系统和方法,其中单个安全机制不用于所有内容。 相反,安全机制的至少一个特性或特征在单元,实例或内容类别之间变化。 因此,即使未授权的访问获得到单个内容单元,内容分发系统的整体完整性和安全性也不会受到损害。 优选地,通过通用机制来提供安全性,然后进行变化,以便为不同类型的内容提供可变的不同的安全方案。 根据“内容类型”,它是指单个内容单元,单个内容实例或单个内容类别中的任何一个。 例如,对于内容的类别,内容可以根据内容本身的身份(例如电影的标题)和/或根据内容的特定副本的所有者来表征。 因此,可以可选地且优选地从特定根结构生成不同的安全方案。 还提供了相关的装置和方法。
    • 8. 发明授权
    • Digital rights management system and method
    • 数字版权管理系统和方法
    • US07512986B2
    • 2009-03-31
    • US10472286
    • 2002-02-21
    • Chaim Shen-OrrEliphaz HibshooshGyora BenedekHillel SolowYaacov BelenkyYossi TsuriaZvi Shkedy
    • Chaim Shen-OrrEliphaz HibshooshGyora BenedekHillel SolowYaacov BelenkyYossi TsuriaZvi Shkedy
    • G06F12/14H04N7/16
    • G06F21/10G06F2221/0704G06F2221/0744G09G5/00G09G2358/00G09G2360/18
    • A system and a method for providing variable security mechanisms for securing digital content, in which a single security mechanism is not used for all content. Instead, at least one characteristic or feature of the security mechanism is varied between units, instances or categories of content. Therefore, even if unauthorized access is gained to a single unit of content, the overall integrity and security of the system for content distribution is not compromised. Preferably, security is provided through a general mechanism, which is then varied in order to provide variable, dissimilar security schemes for different types of content. By “type of content”, it is meant any of a single unit of content, a single instance of content or a single category of content. For example, for a category of content, the content may be characterized according to the identity of the content itself, such as the title of a movie for example, and/or according to the owner of a particular copy of the content. Thus, different security schemes may optionally and preferably be generated from a particular root structure. Related apparatus and methods are also provided.
    • 一种用于提供用于保护数字内容的可变安全机制的系统和方法,其中单个安全机制不用于所有内容。 相反,安全机制的至少一个特性或特征在单元,实例或内容类别之间变化。 因此,即使未授权的访问获得到单个内容单元,内容分发系统的整体完整性和安全性也不会受到损害。 优选地,通过通用机制提供安全性,然后进行变化,以便为不同类型的内容提供可变的不同的安全性方案。 根据“内容类型”,它是指单个内容单元,单个内容实例或单个内容类别中的任何一个。 例如,对于内容的类别,内容可以根据内容本身的身份(例如电影的标题)和/或根据内容的特定副本的所有者来表征。 因此,可以可选地且优选地从特定根结构生成不同的安全方案。 还提供了相关的装置和方法。
    • 9. 发明申请
    • Native Scrambling System
    • 本地加扰系统
    • US20080137851A1
    • 2008-06-12
    • US11918110
    • 2006-03-22
    • Chaim Shen-OrrEliphaz HibshooshYaacov BelenkyYaakov (Jordan) Levy
    • Chaim Shen-OrrEliphaz HibshooshYaacov BelenkyYaakov (Jordan) Levy
    • H04N7/167
    • H04L63/0428H04N21/23476H04N21/434H04N21/44055
    • A system for scrambling/descrambling packets of a stream of content, each packet having a must stay clear (MSC) section, the system including an input handler including a receiving module to receive the stream, a characteristic analyzer to analyze the stream in order to determine a data independent characteristic of each packet, and a scrambling /descrambling device operationally associated with the input handler, the scrambling/descrambling device including a receiving module to receive the data independent characteristic for each packet from the input handler, and an Initial Value module to determine an Initial Value for each packet as a function of the data independent characteristic of one of the packets being processed, wherein the scrambling/descrambling device is adapted to scramble and/or descramble the packets based on the Initial Value and a Control Word. Related apparatus and methods are included.
    • 一种用于对内容流进行加扰/解扰的分组的系统,每个分组具有必须保持清晰(MSC)部分,所述系统包括包括接收模块的输入处理器以接收流;特征分析器,用于分析流,以便 确定每个分组的数据独立特性,以及与输入处理器操作地相关联的加扰/解扰设备,加扰/解扰设备包括接收模块,用于从输入处理器接收每个分组的数据独立特性,以及初始值模块 根据所处理的一个分组的数据独立特性来确定每个分组的初始值,其中所述加扰/解扰设备适于基于初始值和控制字对分组进行加扰和/或解扰。 包括相关的装置和方法。
    • 10. 发明申请
    • System for Proximity Determination
    • 接近度测定系统
    • US20070300070A1
    • 2007-12-27
    • US11629435
    • 2005-05-11
    • Chaim Shen-OrrEliphaz HibshooshYaacov Belenky
    • Chaim Shen-OrrEliphaz HibshooshYaacov Belenky
    • H04L9/32H04K1/00
    • H04L63/0823G06F21/33G06F2221/2103G06F2221/2111G06F2221/2129H04L63/0428H04L63/06H04W12/02H04W12/04H04W12/06H04W24/00
    • A method for determining proximity between a first device and a second device, the method comprising providing a first device storing a first device private key, the first device having an associated secure first device certificate storing secured information, the secured information comprising a first device public key corresponding to the first device private key, providing a second device storing a second device private key, the second device having an associated secure second device certificate storing secured information, the secured information comprising a second device public key corresponding to the second device private key, and a second device processing delay, providing a copy of the second device certificate to the first device, establishing a secure authenticated channel between the first device and the second device, sending a proximity challenge from the first device to the second device, the proximity challenge including a numeric challenge value, receiving the proximity challenge at the second device, processing the proximity challenge at the second device to produce the response to the proximity challenge, and sending the response to the proximity challenge from the second device to the first device, receiving the response to the proximity challenge at the first device, and performing the following at the first device verifying, at the first device, that the response to the proximity challenge is legitimate, determining a gross time between sending the proximity challenge and receiving the response to the proximity challenge, subtracting the second device processing delay from the gross time to produce a net response time, and comparing the net response time to a first threshold and determining whether the first device and the second device are in proximity based on a result of the comparing. Related methods and apparatus are also described.
    • 一种用于确定第一设备和第二设备之间的接近度的方法,所述方法包括提供存储第一设备私钥的第一设备,所述第一设备具有存储安全信息的相关联的安全第一设备证书,所述安全信息包括第一设备公共 密钥对应于第一设备专用密钥,提供存储第二设备专用密钥的第二设备,第二设备具有存储安全信息的相关联的安全第二设备证书,所述安全信息包括与第二设备专用密钥对应的第二设备公钥 以及第二设备处理延迟,将第二设备证书的副本提供给第一设备,在第一设备和第二设备之间建立安全认证信道,从第一设备向第二设备发送接近质询,接近度 挑战包括数字挑战价值,接受近似 处理在第二设备处的接近度挑战,以产生对接近度挑战的响应,以及将响应发送到从第二设备到第一设备的接近挑战,接收对接近挑战的响应 第一设备,并且在第一设备处,在第一设备处,验证对接近度挑战的响应是合法的,确定发送邻近度挑战和接收到接近质疑的响应之间的总时间,然后减去第二设备 处理从总时间的延迟以产生净响应时间,以及将净响应时间与第一阈值进行比较,并且基于比较的结果来确定第一设备和第二设备是否处于接近状态。 还描述了相关方法和装置。