SYSTEM AND METHOD FOR CONTROLLING ACCES TO PROTECTED DIGITALCONTENT BY VERIFICATION OF A MEDIA KEY BLOCK

    公开(公告)号:CA2594760A1

    公开(公告)日:2006-07-20

    申请号:CA2594760

    申请日:2006-01-09

    Abstract: A recorder system contains a media key block (MKB) and selectively writes protected content into a recording medium according to the following content protection logic, to combat theft of the protected content: If the medium does not have a MKB, then the recorder writes its stored MKB into the medium and writes protected content into the medium. If the medium has a MKB that is older than the stored MKB in the recorder, then the recorder writes its stored MKB into the medium before re-encrypting and writing protected content into the medium. If the medium has a MKB that is newer than the stored MKB, then the MKB in the medium is used for content protection. The recorder may store the newer MKB in non-volatile memory, effectively updating its previous stored MKB, so the recorder will have the most recently observed MKB for content protection use.

    13.
    发明专利
    未知

    公开(公告)号:DE60229354D1

    公开(公告)日:2008-11-27

    申请号:DE60229354

    申请日:2002-01-23

    Applicant: IBM

    Abstract: A method for tracing traitor receivers in a broadcast encryption system. The method includes using a false key to encode plural subsets representing receivers in the system. The subsets are derived from a tree using a Subset-Cover system, and the traitor receiver is associated with one or more compromised keys that have been obtained by a potentially cloned pirate receiver. Using a clone of the pirate receiver, the identity of the traitor receiver is determined, or the pirate receiver clones are rendered useless for decrypting data using the compromised key by generating an appropriate set of subsets.

    SYSTEM AND METHOD FOR GUARANTEEING SOFTWARE INTEGRITY

    公开(公告)号:AU2003264906A1

    公开(公告)日:2004-04-19

    申请号:AU2003264906

    申请日:2003-09-22

    Applicant: IBM

    Abstract: A system, method, and computer program product enabling individual user devices to authenticate and validate a digital message sent by a distribution center, without requiring transmissions to the distribution center. The center transmits the message with an appended modulus that is the product of two specially selected primes. The transmission also includes an appended authentication value that is based on an original message hash value, a new message hash value, and the modulus. The new message hash value is designed to be the center's public RSA key; a corresponding private RSA key is also computed. Individual user devices combine a digital signet, a public modulus, preferably unique hardware-based numbers, and an original message hash to compute a unique integrity value K. Subsequent messages are similarly processed to determine new integrity values K′, which equal K if and only if new messages originated from the center and have not been corrupted.

    15.
    发明专利
    未知

    公开(公告)号:BR8604507A

    公开(公告)日:1987-05-19

    申请号:BR8604507

    申请日:1986-09-22

    Applicant: IBM

    Abstract: A bit-image printer is disclosed, having a page memory, (11) a font memory (14) and a font library (16). Fonts are selected from the library for use in composing a page image in the page memory. Loading of font characters into the page memory is controlled by the position of a cursor located within page memory. The font characters include cursor parameters which control the loading of the character into page memory, based upon current cursor position, and control movement of the cursor to a new location, in preparation for loading of the next character into page memory. After a page image is composed, the image is used to control an LED printhead (10) which images the photoconductor (12) of a xerographic reproduction device.

    SEGMENTATION APPARATUS AND METHOD FOR CHARACTER RECOGNITION

    公开(公告)号:DE3175537D1

    公开(公告)日:1986-12-04

    申请号:DE3175537

    申请日:1981-06-23

    Applicant: IBM

    Abstract: Segmentation in the field of optical character recognition involves forming vertical histograms from video data representing a line of characters, for example counts of black picture elements at imaginary vertical lines along the line of characters. The vertical histograms are used in a variety of wavs e.g. in segmenting characters after location of the baseline using horizontal histograms, in segmenting words in the line, and in determining underscore, such underscores being masked during subsequent segmentation and recognition of the underscored character.

    Método para la codificación de transmisiones

    公开(公告)号:ES2334109T5

    公开(公告)日:2013-05-03

    申请号:ES02710108

    申请日:2002-01-23

    Applicant: IBM

    Abstract: Un método para cifrado o codificado de transmisión, que comprende: asignar a cada usuario en un grupo de usuarios información privada respectiva Iu; seleccionar al menos una clave de cifrado de sesión K; dividir a los usuarios que no están en un conjunto revocado R en subconjuntos disjuntos Si1,...Sim que tienen claves de subconjuntos asociadas Li1,...Lim; y cifrar la clave de sesión K con las claves de subconjuntos Li1,...Lim para hacer m versiones cifradas de la clave de sesión K.

    18.
    发明专利
    未知

    公开(公告)号:BRPI0617419A2

    公开(公告)日:2011-07-12

    申请号:BRPI0617419

    申请日:2006-09-11

    Applicant: IBM

    Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    19.
    发明专利
    未知

    公开(公告)号:DE60233929D1

    公开(公告)日:2009-11-19

    申请号:DE60233929

    申请日:2002-01-23

    Applicant: IBM

    Abstract: A tree is used to partition stateless receivers in a broadcast content encryption system into subsets. Two different methods of partitioning are disclosed. When a set of revoked receivers is identified, the revoked receivers define a relatively small cover of the non-revoked receivers by disjoint subsets. Subset keys associated with the subsets are then used to encrypt a session key that in turn is used to encrypt the broadcast content. Only non-revoked receivers can decrypt the session key and, hence, the content.

    20.
    发明专利
    未知

    公开(公告)号:DE3682746D1

    公开(公告)日:1992-01-16

    申请号:DE3682746

    申请日:1986-09-09

    Applicant: IBM

    Abstract: A bit-image printer is disclosed, having a page memory, (11) a font memory (14) and a font library (16). Fonts are selected from the library for use in composing a page image in the page memory. Loading of font characters into the page memory is controlled by the position of a cursor located within page memory. The font characters include cursor parameters which control the loading of the character into page memory, based upon current cursor position, and control movement of the cursor to a new location, in preparation for loading of the next character into page memory. After a page image is composed, the image is used to control an LED printhead (10) which images the photoconductor (12) of a xerographic reproduction device.

Patent Agency Ranking