会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • Traceable method and system for broadcasting digital data
    • 可溯源的数字数据广播方法和系统
    • US08774408B2
    • 2014-07-08
    • US13000305
    • 2009-06-23
    • Olivier BilletRyad Benadjila
    • Olivier BilletRyad Benadjila
    • H04L9/20H04L9/08
    • H04L9/0836H04L2209/606
    • A method and system for a user to obtain a derived value Kr of m bits, in which, given two pseudo-random functions g0 and g1 from m bits to m bits, said user obtains, on the basis of an input parameter consisting of a word r of n bits, a derived value Kr=grn∘ . . . gr2∘gr1 (S), where, for i=1, . . . , n, gri=g0 if ri=0, and gri=g1 if ri=1, and where S is a master value of m bits which is not disclosed to said user. This method comprises the following steps: a search is conducted, from among a set of words of m bits Uj, where j=1, . . . , p, recorded in a table TU and equal to Uj=gvl(j)(j)∘ . . . gv2(j)∘gv1(j) (S), where, for i=1, . . . , l(j), the indices vi(j) are predetermined bits, for a word Uσ equal to Uσ=grl(σ)∘ . . . gr2∘gr1 (S); said derived value Kr is thereafter obtained by calculating Kr=grn∘ . . . grl(σ)+1 (Uσ).Application to the encryption/decryption of pay-per-use digital contents, and to authentication.
    • 一种用于获得m比特的导出值Kr的方法和系统,其中给定从m比特到m比特的两个伪随机函数g0和g1,所述用户基于由 n位的字r,派生值Kr = grn o。 。 。 gr2 ogr1(S),其中,对于i = 1, 。 。 如果ri = 0,则n,gri = g0,如果ri = 1,则gri = g1,其中S是未向所述用户公开的m位的主值。 该方法包括以下步骤:从m位Uj的一组单词中进行搜索,其中j = 1,...。 。 。 ,p,记录在表TU中并且等于Uj = gvl(j)(j)o。 。 。 gv2(j)∘gv1(j)(S),其中,对于i = 1, 。 。 ,l(j),索引vi(j)是字U&sgr的预定位; 等于U&sgr; = grl(&sgr;)o。 。 。 gr2 ogr1(S); 然后通过计算Kr = grn0获得所述导出值Kr。 。 。 grl(&sgr;)+ 1(U&sgr;)。 应用于按使用付费数字内容的加密/解密,以及认证。
    • 9. 发明授权
    • Traitor tracing in a content protection system
    • 叛徒追踪内容保护系统
    • US08533849B2
    • 2013-09-10
    • US12877001
    • 2010-09-07
    • Hongxia JinSerdar Pehlivanoglu
    • Hongxia JinSerdar Pehlivanoglu
    • H04L29/06
    • G06F21/105H04L2209/606
    • A method for detecting at least one traitor computer system among a plurality of receiver computer systems including: assigning a version of protected content to each of the plurality of receiver computer systems that are currently identified as innocent by a content protection system that monitors distribution of protected content to the plurality of receiver computer systems; recovering at least one unauthorized rebroadcast of the content; generating a score for each of the plurality of receiver computer systems with respect to the recovered unauthorized rebroadcast; calculating a threshold independent of an estimation of maximum traitor computer systems; checking a highest score against the threshold; incriminating a receiver computer system having the highest score above the threshold as a traitor computer system; and removing any unauthorized rebroadcasts overlapping with the traitor computer system. The process may be repeated from generating scores until all traitors are identified.
    • 一种用于在多个接收机计算机系统中检测至少一个叛逆计算机系统的方法,包括:将受保护内容的版本分配给当前被识别为无害的多个接收机计算机系统中的每一个,所述内容保护系统监视受保护的 内容到多个接收机计算机系统; 恢复内容的至少一次未经授权的转播; 对于所述多个接收机计算机系统中的每一个相对于所述恢复的未经授权的转播而生成分数; 计算独立于最大叛逆计算机系统的估计的阈值; 根据阈值检查最高分数; 将具有高于阈值的最高分数的接收机计算机系统作为叛徒计算机系统; 并删除与叛逆计算机系统重叠的任何未经授权的转播。 可以从产生评分重复该过程,直到所有叛徒被识别。