SYSTEM AND METHOD FOR A KEY BLOCK BASED AUTHENTICATION
    2.
    发明申请
    SYSTEM AND METHOD FOR A KEY BLOCK BASED AUTHENTICATION 审中-公开
    基于密钥块验证的系统和方法

    公开(公告)号:WO2007000711A2

    公开(公告)日:2007-01-04

    申请号:PCT/IB2006052082

    申请日:2006-06-26

    Abstract: The present invention relates to a system (70, 80) and a method for a key block based authentication comprising a plurality of drive units (3) comprising a plurality of subsets, wherein a drive unit (3) has a set of node keys (KN d ) and an identifier (ID d ) indicating the subsets said drive unit (3) is part of and wherein an application unit (1) has a key block (AKB). In order to allow identification of a hacked drive unit (3) in order to revoke the hacked drive unit (3) from said key block based authentication, wherein said system is to a large extent compatible with existing systems and methods for a key block based authentication, a system is proposed comprising: - a plurality of drive units (3) comprising a plurality of subsets, wherein a drive unit (3) has a set of node keys (KN d ) and an identifier (ID d ) indicating the subsets said drive unit (3) is part of, - an application unit (1) having a key block (AKB) comprising a plurality of pairs of authorization and authentication keys (KA x , KR authx ), wherein each pair of keys is associated with one of said subsets, - a communication means (72) for submitting said identifier (ID d ) from said drive unit (3) to said application unit (1) and for submitting an authorization key (KA x ) from said application unit (1) to said drive unit (3), and - an authentication means (54) for authenticating said drive unit (3) and said application unit (1) by means of a pair of keys, wherein said application unit (1) comprises a selecting means (62) for selecting said pair of keys from said key block (AKB) corresponding to said identifier (ID d ), wherein said drive unit (3) comprises a decoding means (52) for deriving said authentication key (KR authx ) of said pair of keys from said authorization key (KA x ) of said pair of keys by means of said set of node keys (KN d ).

    Abstract translation: 本发明涉及一种用于基于密钥块的认证的系统(70,80)和方法,其包括多个包括多个子集的驱动单元(3),其中驱动单元(3)具有一组节点密钥 指示所述驱动单元(3)的子集的一部分的标识符(ID&lt; d&gt;),其中应用单元(1)具有密钥块(AKB )。 为了允许识别被入侵的驱动单元(3),以便从所述基于密钥块的认证中撤销被入侵的驱动单元(3),其中所述系统在很大程度上与现有的系统和基于密钥块的方法兼容 提出了一种系统,其包括: - 包括多个子集的多个驱动单元(3),其中驱动单元(3)具有一组节点密钥(KN )和标识符 (3)是所述驱动单元(3)的一部分的子组件(ID), - 具有密钥块(AKB)的应用单元(1),所述密钥块(AKB)包括多对授权和认证密钥(KA 其中每对密钥与所述子集中的一个相关联, - 通信装置(72),用于提交所述标识符(ID&lt; SUB&gt;&gt; 从所述驱动单元(3)向所述应用单元(1)提供从所述应用单元(1)向所述驱动单元(3)提交授权密钥(KA )从所述应用单元(1) ,a d - 用于通过一对密钥认证所述驱动单元(3)和所述应用单元(1)的认证装置(54),其中所述应用单元(1)包括选择装置(62),用于选择所述一对 对应于所述标识符(ID)的所述密钥块(AKB)的密钥,其中所述驱动单元(3)包括一个解码装置(52),用于导出所述验证密钥(KRALAuthx < / SUB>)通过所述一组节点密钥(KN )从所述一对密钥的所述授权密钥(KA×××)中获得。

    BLOCK CIPHERING SYSTEM, USING PERMUTATIONS TO HIDE THE CORE CIPHERING FUNCTION OF EACH ENCRYPTION ROUND
    3.
    发明申请
    BLOCK CIPHERING SYSTEM, USING PERMUTATIONS TO HIDE THE CORE CIPHERING FUNCTION OF EACH ENCRYPTION ROUND 审中-公开
    块式加密系统,使用PERMUTATIONS来隐藏每个加密圆的核心加密功能

    公开(公告)号:WO2005060147A1

    公开(公告)日:2005-06-30

    申请号:PCT/IB2004/052607

    申请日:2004-11-30

    CPC classification number: H04L9/002 H04L9/0625 H04L2209/16

    Abstract: In a system (600), a server (610) provides a digital signal processing function ƒ to an executing device (620) in an obfuscated form. The function ƒ includes a function cascade of signal processing functions f 1 , 1 ≤ i ≤ N to formula (I). The server includes a processor (612) for selecting a set of 2 N invertible permutations p i ,, 1≤ i ≤ 2N; calculating a set of N functions g, , where g, is functionally equivalent to formula (II) for 1≤ i ≤ N ; and calculating a set of N -1 functions h, , where h, is functionally equivalent to formula (III) for 2 ≤ i ≤ N. The server includes means (614) for equipping the executing device with an execution device function cascade that includes formula (IV) , where y 1 , ... , y N are function parameters to formula (V), and means (616) for providing the functions g 1 , , ... g N to the executing device. The executing device includes means (626) for obtaining the functions g 1 ,..., g N and a processor (622) for loading the execution device function cascade and applying the loaded execution device function cascade to the functions g 1 ,...,g N (e.g.,ED,(g 1 ,...,g N )).

    Abstract translation: 在系统(600)中,服务器(610)以模糊形式向执行装置(620)提供数字信号处理功能f。 函数f包括信号处理函数f1,1 <= I&LE的函数级联; Nto配方(I)。 服务器包括用于选择一组2N可逆排列的处理器(612),其中1 N = 计算一组N个函数g,其中g在功能上等同于1 <= i <= N的公式(II); 并且计算一组N-1函数h,其中h在功能上等同于2 <= i <= N的公式(III)。服务器包括用于装备执行装置具有执行装置功能级联的装置(614) 其包括公式(IV),其中y1,...,yN是对公式(V)的函数参数,以及用于向执行装置提供函数g1,...,gN的装置(616)。 执行装置包括用于获取功能g1,...,gN的装置(626)和用于加载执行装置功能级联的处理器(622),并将加载的执行装置功能级联应用于功能g1,...,gN (例如,ED(G1,...,GN))。

    CONTENT PROTECTION METHOD AND SYSTEM
    4.
    发明申请
    CONTENT PROTECTION METHOD AND SYSTEM 审中-公开
    内容保护方法和系统

    公开(公告)号:WO2005024820A8

    公开(公告)日:2005-05-06

    申请号:PCT/IB2004051585

    申请日:2004-08-27

    Abstract: The present invention relates to a content protection method and system as well as to a reproduction method and device providing copy protection of electronic content. In order to provide protection against illicit copying by consumers as well as by authoring and formatting facilities content-dependent encryption of the content is proposed. In an encryption step the content (C0) is encrypted using an application key (AK) and/or a disc key (DK). Further, a content-dependent content mark (AK', H, MAC) is generated using said content (C0), which content mark is to be evaluated during decryption of said encrypted content (C2).

    Abstract translation: 本发明涉及一种内容保护方法和系统以及提供电子内容的复制保护的复制方法和设备。 为了防止消费者的非法复制以及创作和格式化设施,提出了内容相关的内容加密。 在加密步骤中,使用应用密钥(AK)和/或盘密钥(DK)来加密内容(C0)。 此外,使用所述内容(C0)生成内容相关内容标记(AK',H,MAC),该内容标记将在所述加密内容(C2)的解密期间被评估。

    REVOCATION OF CONTENT MATERIAL
    6.
    发明申请
    REVOCATION OF CONTENT MATERIAL 审中-公开
    内容材料的回收

    公开(公告)号:WO2003083627A2

    公开(公告)日:2003-10-09

    申请号:PCT/IB2003/000803

    申请日:2003-02-26

    CPC classification number: G06F21/10 G06F2221/0704 G06F2221/0706

    Abstract: This invention relates to attaching or relating a unique identifier of an importing/screening device to content material during import from a non-compliant domain into a compliant domain. In this way, it is always possible to identify the importing device for a given content material. A list comprising unique identifiers for importing devices that has been determined to import content material illegally may then be used in devices, applications, systems, etc. for the using content material in such a way that the use may be prohibited for content material being imported in to the compliant domain by devices, applications, systems, etc. that has been determined to import content material illegally. This allows for the revocation of use of content material in the compliant domain that has been imported there byan importing/screening device that has been determined to illegally import content material.

    Abstract translation: 本发明涉及将导入/筛选设备的唯一标识符附加到或将其与内容资料相关联,并将其从不兼容域导入到兼容域。 以这种方式,总是可以识别给定内容资料的导入设备。 然后可以在设备,应用程序,系统等中使用非法导入内容资料的导入设备的唯一标识符列表,以便使用内容资料可能被禁止进行内容资料的使用 通过已被确定非法导入内容资料的设备,应用程序,系统等进入兼容域。 这允许在被确定为非法导入内容资料的进口/筛选设备中撤销在已经导入的合规域中的内容资料的使用。

    IMPROVED METHOD OF CONTENT PROTECTION
    7.
    发明申请
    IMPROVED METHOD OF CONTENT PROTECTION 审中-公开
    改进的内容保护方法

    公开(公告)号:WO2007093946A1

    公开(公告)日:2007-08-23

    申请号:PCT/IB2007/050444

    申请日:2007-02-12

    Abstract: A method of enabling authentication of content, comprising computing a number of respective message authentication codes for the content, each respective message authentication code being computed using a respective group key associated with a group of devices suitable for accessing the content. Preferably for each of a plurality of sections of the content respective message authentication codes are computed using the respective group keys. Also a device suitable for accessing content and comprising means for authenticating the content, in which the means for authenticating are configured for computing a message authentication code for the content and for comparing the computed message authentication code against at least one of a plurality of recorded message authentication codes that are provided with the content. Also a system comprising a plurality of such devices.

    Abstract translation: 一种启用内容认证的方法,包括计算所述内容的相应消息认证码的数目,每个相应的消息认证码使用与适合于访问所述内容的一组设备相关联的相应组密钥来计算。 优选地,对于内容的多个部分中的每一个,相应的消息认证码使用相应的组密钥来计算。 还有一种适用于访问内容的装置,并且包括用于认证内容的装置,其中用于认证的装置被配置用于计算内容的消息认证码,并且用于将所计算的消息认证码与多个记录消息中的至少一个进行比较 与内容一起提供的身份验证码。 还有一种包括多个这样的设备的系统。

    IMPROVED METHOD OF CONTENT PROTECTION
    8.
    发明申请
    IMPROVED METHOD OF CONTENT PROTECTION 审中-公开
    改进的内容保护方法

    公开(公告)号:WO2007093925A1

    公开(公告)日:2007-08-23

    申请号:PCT/IB2007/050303

    申请日:2007-01-30

    Abstract: A method of enabling content origin authentication, comprising deriving an authorization element from at least one section of the content, from a group key associated with a group of devices suitable for accessing the content and from a content key to be used in decrypting the content, the authorization element enabling reconstruction of the content key given the at least one section and the group key. Also a device suitable for accessing content and comprising means for authenticating the content, in which the means for authenticating are configured for reconstructing a content key to be used in decrypting the content given one of a plurality of authorization elements, at least one section of the content and a group key. Also a system comprising a plurality of such devices.

    Abstract translation: 一种启用内容源认证的方法,包括从与适合于访问内容的一组设备相关联的组密钥和用于解密该内容的内容密钥从该内容的至少一个部分导出授权元素, 所述授权元件能够对给定所述至少一个部分和所述组密钥的所述内容密钥进行重建。 还有一种适用于访问内容并包括用于认证内容的装置的装置,其中用于认证的装置被配置用于重建用于解密给定一个授权要素的内容的内容密钥,所述内容的至少一个部分 内容和组密钥。 还有一种包括多个这样的设备的系统。

    METHOD AND CIRCUIT FOR ENCRYPTING A DATA STREAM
    10.
    发明申请
    METHOD AND CIRCUIT FOR ENCRYPTING A DATA STREAM 审中-公开
    加密数据流的方法和电路

    公开(公告)号:WO2005081544A2

    公开(公告)日:2005-09-01

    申请号:PCT/IB2005/050594

    申请日:2005-02-17

    CPC classification number: G11B20/00086 G11B20/0021 G11B20/00492

    Abstract: Current legislation requires the possibility of encryption when storing television programmes received by broadcast. However, legacy playback apparatuses will not be able to play back such encrypted data in a regular way, but possibly in a wrong way. This may result in problems like damage of speakers. Therefore, the invention intends to hide any of such possibly damaging streams by intentionally providing such streams with a wrong identification during the encryption process. The invention provides among others a method and circuit for encryption and a method and circuit for decryption. The invention is especially suitable for DVD recorders, but may also be employed for other video and/or audio recorders. The invention may even be used for encrypting non-audiovisual data.

    Abstract translation: 当前立法要求在存储通过广播接收的电视节目时加密。 然而,传统播放设备将不能以常规的方式播放这样的加密数据,但可能以错误的方式播放。 这可能会导致扬声器损坏等问题。 因此,本发明意图通过在加密过程期间有意地提供具有错误标识的这种流来隐藏任何这种可能有害的流。 本发明提供了一种用于加密的方法和电路以及用于解密的方法和电路。 本发明特别适用于DVD刻录机,但也可用于其它视频和/或音频记录器。 本发明甚至可以用于加密非视听数据。

Patent Agency Ranking