SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING
    1.
    发明公开
    SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING 审中-公开
    系统和方法进行软件操控主动检测

    公开(公告)号:EP1573545A4

    公开(公告)日:2008-08-27

    申请号:EP03774922

    申请日:2003-10-22

    Applicant: IBM

    CPC classification number: G06F21/14 G06F21/316 G06F21/552 G06F2221/2101

    Abstract: Software intrusion is proactively detected using a dynamically evolving audit log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on both the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these values. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).

    RENEWABLE TRAITOR TRACING
    2.
    发明专利

    公开(公告)号:CA2623182C

    公开(公告)日:2014-10-07

    申请号:CA2623182

    申请日:2006-09-11

    Applicant: IBM

    Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications . The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    A SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING

    公开(公告)号:CA2505477C

    公开(公告)日:2009-10-13

    申请号:CA2505477

    申请日:2003-10-22

    Applicant: IBM

    Abstract: Software intrusion is proactively detected using a dynamically evolving audi t log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on bo th the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these value s. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).

    4.
    发明专利
    未知

    公开(公告)号:BRPI0617419A2

    公开(公告)日:2011-07-12

    申请号:BRPI0617419

    申请日:2006-09-11

    Applicant: IBM

    Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    5.
    发明专利
    未知

    公开(公告)号:DE602006007019D1

    公开(公告)日:2009-07-09

    申请号:DE602006007019

    申请日:2006-09-11

    Applicant: IBM

    Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING

    公开(公告)号:CA2505477A1

    公开(公告)日:2004-07-22

    申请号:CA2505477

    申请日:2003-10-22

    Applicant: IBM

    Abstract: Software intrusion is proactively detected using a dynamically evolving audi t log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on bo th the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these value s. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).

    RASTREO RENOVABLE DE TRAIDORES.
    7.
    发明专利

    公开(公告)号:ES2327273T3

    公开(公告)日:2009-10-27

    申请号:ES06793423

    申请日:2006-09-11

    Applicant: IBM

    Abstract: Un método para prevenir la reutilización de claves comprometidas en un sistema de codificación de emisión, caracterizado por: (a) incorporar un conjunto particular de claves de secuencia asignadas por una agencia de licenciamiento a receptores individuales; (b) asignar un bloque de claves de secuencia (en adelante SKB) por la agencia de licenciamiento al menos a un archivo protegido distribuido; (c) pruebas criptográficas incrementales por los receptores individuales para determinar (200) si una clave de secuencia seleccionada está comprometida; (d1) si la clave de secuencia seleccionada no está comprometida, entonces descodificar adecuadamente en respuesta (202) el archivo y finalizar el método; (d2) si la clave de secuencia seleccionada está comprometida, entonces determinar en respuesta (204) si se dispone de una clave de secuencia subsiguiente del conjunto; (e1) si está disponible una clave de secuencia subsiguiente, entonces seleccionar (206) esa clave de secuencia subsiguiente y volver a la etapa (c); y (e2) si no está disponible una clave de secuencia subsiguiente, entonces el método termina (208) sin descodificar apropiadamente el archivo.

    8.
    发明专利
    未知

    公开(公告)号:AT432560T

    公开(公告)日:2009-06-15

    申请号:AT06793423

    申请日:2006-09-11

    Applicant: IBM

    Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    RENEWABLE TRAITOR TRACING
    9.
    发明专利

    公开(公告)号:CA2623182A1

    公开(公告)日:2007-04-12

    申请号:CA2623182

    申请日:2006-09-11

    Applicant: IBM

    Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.

    SYSTEM AND METHOD TO PROACTIVELY DETECT SOFTWARE TAMPERING

    公开(公告)号:AU2003282989A1

    公开(公告)日:2004-07-29

    申请号:AU2003282989

    申请日:2003-10-22

    Applicant: IBM

    Abstract: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.

Patent Agency Ranking