-
1.
公开(公告)号:EP1573545A4
公开(公告)日:2008-08-27
申请号:EP03774922
申请日:2003-10-22
Applicant: IBM
Inventor: JIN HONGXIA , LOTSPIECH JEFFREY B
CPC classification number: G06F21/14 , G06F21/316 , G06F21/552 , G06F2221/2101
Abstract: Software intrusion is proactively detected using a dynamically evolving audit log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on both the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these values. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).
-
公开(公告)号:CA2623182C
公开(公告)日:2014-10-07
申请号:CA2623182
申请日:2006-09-11
Applicant: IBM
Inventor: LOTSPIECH JEFFREY BRUCE , NIN SIGFREDO ISMAEL , JIN HONGXIA
IPC: H04L9/08
Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications . The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
-
公开(公告)号:CA2505477C
公开(公告)日:2009-10-13
申请号:CA2505477
申请日:2003-10-22
Applicant: IBM
Inventor: LOTSPIECH JEFFREY B , JIN HONGXIA
Abstract: Software intrusion is proactively detected using a dynamically evolving audi t log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on bo th the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these value s. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).
-
公开(公告)号:BRPI0617419A2
公开(公告)日:2011-07-12
申请号:BRPI0617419
申请日:2006-09-11
Applicant: IBM
Inventor: LOTSPIECH JEFFREY BRUCE , NIN SIGFREDO ISMAEL , JIN HONGXIA
IPC: H04L9/08
Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
-
公开(公告)号:DE602006007019D1
公开(公告)日:2009-07-09
申请号:DE602006007019
申请日:2006-09-11
Applicant: IBM
Inventor: LOTSPIECH JEFFREY BRUCE , NIN SIGFREDO ISMAEL , JIN HONGXIA
IPC: H04L9/08
Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
-
公开(公告)号:CA2505477A1
公开(公告)日:2004-07-22
申请号:CA2505477
申请日:2003-10-22
Applicant: IBM
Inventor: LOTSPIECH JEFFREY B , JIN HONGXIA
Abstract: Software intrusion is proactively detected using a dynamically evolving audi t log (404) wherein log entries are generated in the audit log (404) and key values (406) are evolved based upon a one-way function (408) depending on bo th the previous log (404) entry and the previous key (406). The audit log (404) with the generated log entries and the final key value is transmitted to a clearinghouse (410) that detects software intrusion by analyzing these value s. In an effort to reduce the size of the log (404) to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse (410).
-
公开(公告)号:ES2327273T3
公开(公告)日:2009-10-27
申请号:ES06793423
申请日:2006-09-11
Applicant: IBM
Inventor: LOTSPIECH JEFFREY BRUCE , NIN SIGFREDO ISMAEL , JIN HONGXIA
IPC: H04L9/08
Abstract: Un método para prevenir la reutilización de claves comprometidas en un sistema de codificación de emisión, caracterizado por: (a) incorporar un conjunto particular de claves de secuencia asignadas por una agencia de licenciamiento a receptores individuales; (b) asignar un bloque de claves de secuencia (en adelante SKB) por la agencia de licenciamiento al menos a un archivo protegido distribuido; (c) pruebas criptográficas incrementales por los receptores individuales para determinar (200) si una clave de secuencia seleccionada está comprometida; (d1) si la clave de secuencia seleccionada no está comprometida, entonces descodificar adecuadamente en respuesta (202) el archivo y finalizar el método; (d2) si la clave de secuencia seleccionada está comprometida, entonces determinar en respuesta (204) si se dispone de una clave de secuencia subsiguiente del conjunto; (e1) si está disponible una clave de secuencia subsiguiente, entonces seleccionar (206) esa clave de secuencia subsiguiente y volver a la etapa (c); y (e2) si no está disponible una clave de secuencia subsiguiente, entonces el método termina (208) sin descodificar apropiadamente el archivo.
-
公开(公告)号:AT432560T
公开(公告)日:2009-06-15
申请号:AT06793423
申请日:2006-09-11
Applicant: IBM
Inventor: LOTSPIECH JEFFREY , NIN SIGFREDO , JIN HONGXIA
IPC: H04L9/08
Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
-
公开(公告)号:CA2623182A1
公开(公告)日:2007-04-12
申请号:CA2623182
申请日:2006-09-11
Applicant: IBM
Inventor: LOTSPIECH JEFFREY BRUCE , NIN SIGFREDO ISMAEL , JIN HONGXIA
IPC: H04L9/08
Abstract: A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of Sequence Keys preferably at manufacture, and assigns Sequence Key Blocks (SKBs) to protected content files to be distributed. The files may be distributed on prerecorded media and typically include several file modifications. The particular modifications in a pirated version of a file can help identify which traitors contributed to its theft. SKBs assigned to new files distributed after traitors have been identified cannot be usefully processed using the compromised keys employed in previous content piracy. Innocent receivers that happen to have compromised key(s) in common with traitors can use a replacement uncompromised Sequence Key from the set to usefully decrypt content. Traitors will however step through all their Sequence Keys without reaching one that will work.
-
公开(公告)号:AU2003282989A1
公开(公告)日:2004-07-29
申请号:AU2003282989
申请日:2003-10-22
Applicant: IBM
Inventor: JIN HONGXIA , LOTSPIECH JEFFREY B
Abstract: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.
-
-
-
-
-
-
-
-
-