Abstract:
The invention relates to a watermark generation method for generating watermarks to be embedded in digital media, where said watermark is generated by combining at least two watermark patterns from a set of watermark patterns. The set of watermark patterns are divided into at least two subsets of watermark patterns, and the subsets are hierarchically related and the watermark patterns in said watermark are directly related watermark patterns. Directly related means that the watermark patterns are related like parent and child in a hierarchical structure e.g. a tree structure. Further, the invention relates to an apparatus adapted to generate watermarks to be embedded in media.
Abstract:
The present invention relates to a system (70, 80) and a method for a key block based authentication comprising a plurality of drive units (3) comprising a plurality of subsets, wherein a drive unit (3) has a set of node keys (KN d ) and an identifier (ID d ) indicating the subsets said drive unit (3) is part of and wherein an application unit (1) has a key block (AKB). In order to allow identification of a hacked drive unit (3) in order to revoke the hacked drive unit (3) from said key block based authentication, wherein said system is to a large extent compatible with existing systems and methods for a key block based authentication, a system is proposed comprising: - a plurality of drive units (3) comprising a plurality of subsets, wherein a drive unit (3) has a set of node keys (KN d ) and an identifier (ID d ) indicating the subsets said drive unit (3) is part of, - an application unit (1) having a key block (AKB) comprising a plurality of pairs of authorization and authentication keys (KA x , KR authx ), wherein each pair of keys is associated with one of said subsets, - a communication means (72) for submitting said identifier (ID d ) from said drive unit (3) to said application unit (1) and for submitting an authorization key (KA x ) from said application unit (1) to said drive unit (3), and - an authentication means (54) for authenticating said drive unit (3) and said application unit (1) by means of a pair of keys, wherein said application unit (1) comprises a selecting means (62) for selecting said pair of keys from said key block (AKB) corresponding to said identifier (ID d ), wherein said drive unit (3) comprises a decoding means (52) for deriving said authentication key (KR authx ) of said pair of keys from said authorization key (KA x ) of said pair of keys by means of said set of node keys (KN d ).
Abstract:
In a system (600), a server (610) provides a digital signal processing function ƒ to an executing device (620) in an obfuscated form. The function ƒ includes a function cascade of signal processing functions f 1 , 1 ≤ i ≤ N to formula (I). The server includes a processor (612) for selecting a set of 2 N invertible permutations p i ,, 1≤ i ≤ 2N; calculating a set of N functions g, , where g, is functionally equivalent to formula (II) for 1≤ i ≤ N ; and calculating a set of N -1 functions h, , where h, is functionally equivalent to formula (III) for 2 ≤ i ≤ N. The server includes means (614) for equipping the executing device with an execution device function cascade that includes formula (IV) , where y 1 , ... , y N are function parameters to formula (V), and means (616) for providing the functions g 1 , , ... g N to the executing device. The executing device includes means (626) for obtaining the functions g 1 ,..., g N and a processor (622) for loading the execution device function cascade and applying the loaded execution device function cascade to the functions g 1 ,...,g N (e.g.,ED,(g 1 ,...,g N )).
Abstract translation:在系统(600)中,服务器(610)以模糊形式向执行装置(620)提供数字信号处理功能f。 函数f包括信号处理函数f1,1 <= I&LE的函数级联; Nto配方(I)。 服务器包括用于选择一组2N可逆排列的处理器(612),其中1 N = 计算一组N个函数g,其中g在功能上等同于1 <= i <= N的公式(II); 并且计算一组N-1函数h,其中h在功能上等同于2 <= i <= N的公式(III)。服务器包括用于装备执行装置具有执行装置功能级联的装置(614) 其包括公式(IV),其中y1,...,yN是对公式(V)的函数参数,以及用于向执行装置提供函数g1,...,gN的装置(616)。 执行装置包括用于获取功能g1,...,gN的装置(626)和用于加载执行装置功能级联的处理器(622),并将加载的执行装置功能级联应用于功能g1,...,gN (例如,ED(G1,...,GN))。
Abstract:
The present invention relates to a content protection method and system as well as to a reproduction method and device providing copy protection of electronic content. In order to provide protection against illicit copying by consumers as well as by authoring and formatting facilities content-dependent encryption of the content is proposed. In an encryption step the content (C0) is encrypted using an application key (AK) and/or a disc key (DK). Further, a content-dependent content mark (AK', H, MAC) is generated using said content (C0), which content mark is to be evaluated during decryption of said encrypted content (C2).
Abstract:
The present invention relates to a record carrier (10) for storing user data in sectors (S) and management information (n) associated with said sectors. In order to provide a simple, low-cost, flexible and secure copy protection of the user data when being transmitted over a communication bus (6) of a PC it is proposed according to the present invention that the management information comprises an encryption indication information (M1) indicating that the user data stored in the associated sector (S) are to be encrypted by a read-out device (2) before being transmitted over a communication bus (6).
Abstract:
This invention relates to attaching or relating a unique identifier of an importing/screening device to content material during import from a non-compliant domain into a compliant domain. In this way, it is always possible to identify the importing device for a given content material. A list comprising unique identifiers for importing devices that has been determined to import content material illegally may then be used in devices, applications, systems, etc. for the using content material in such a way that the use may be prohibited for content material being imported in to the compliant domain by devices, applications, systems, etc. that has been determined to import content material illegally. This allows for the revocation of use of content material in the compliant domain that has been imported there byan importing/screening device that has been determined to illegally import content material.
Abstract:
A method of enabling authentication of content, comprising computing a number of respective message authentication codes for the content, each respective message authentication code being computed using a respective group key associated with a group of devices suitable for accessing the content. Preferably for each of a plurality of sections of the content respective message authentication codes are computed using the respective group keys. Also a device suitable for accessing content and comprising means for authenticating the content, in which the means for authenticating are configured for computing a message authentication code for the content and for comparing the computed message authentication code against at least one of a plurality of recorded message authentication codes that are provided with the content. Also a system comprising a plurality of such devices.
Abstract:
A method of enabling content origin authentication, comprising deriving an authorization element from at least one section of the content, from a group key associated with a group of devices suitable for accessing the content and from a content key to be used in decrypting the content, the authorization element enabling reconstruction of the content key given the at least one section and the group key. Also a device suitable for accessing content and comprising means for authenticating the content, in which the means for authenticating are configured for reconstructing a content key to be used in decrypting the content given one of a plurality of authorization elements, at least one section of the content and a group key. Also a system comprising a plurality of such devices.
Abstract:
This invention relates to an authentication method for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. If the first party is not authenticated, then if the first party qualifies for a subauthorization, the operation is still performed. Further, a device that comprises a first memory area holding a comparison measure, which is associated with time, and which is also used in said authentication procedure, a second memory area holding a limited list of other parties which have been involved in an authentication procedure with the device, and a third memory area, holding compliance certificates concerning parties of said list.
Abstract:
Current legislation requires the possibility of encryption when storing television programmes received by broadcast. However, legacy playback apparatuses will not be able to play back such encrypted data in a regular way, but possibly in a wrong way. This may result in problems like damage of speakers. Therefore, the invention intends to hide any of such possibly damaging streams by intentionally providing such streams with a wrong identification during the encryption process. The invention provides among others a method and circuit for encryption and a method and circuit for decryption. The invention is especially suitable for DVD recorders, but may also be employed for other video and/or audio recorders. The invention may even be used for encrypting non-audiovisual data.