-
公开(公告)号:WO2005052841A2
公开(公告)日:2005-06-09
申请号:PCT/EP2004052884
申请日:2004-11-09
Applicant: IBM , IBM UK , JIN HONXIA , LEAKE DONALD JR , LOTSPIECH JEFFREY , NIN SIGFREDO , PLOUFFE WILFRED
Inventor: JIN HONXIA , LEAKE DONALD JR , LOTSPIECH JEFFREY , NIN SIGFREDO , PLOUFFE WILFRED
IPC: G06F21/00
CPC classification number: G06F21/6218 , G06F21/14 , G06F21/51
Abstract: A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
Abstract translation: 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,防止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法,以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。
-
2.
公开(公告)号:JP2005124165A
公开(公告)日:2005-05-12
申请号:JP2004264505
申请日:2004-09-10
Applicant: Internatl Business Mach Corp
, インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Inventor: DORAK JOHN , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
IPC: G06F21/24 , G06F1/00 , G06F21/00 , G06Q20/36 , G06Q20/38 , G06Q30/06 , G09C1/00 , G10K15/02 , H03M7/30 , H04L9/08 , H04L9/10 , H04L29/06 , H04L29/08 , H04N7/167 , H04N7/173 , G06F12/14 , G06F17/60
CPC classification number: G06F21/10 , G06F2221/0737 , G06F2221/2135 , G06Q20/3674 , G06Q20/382 , G06Q20/3829 , G06Q30/0617 , G06Q30/0623 , G06Q30/0633 , H04L9/0822 , H04L9/0825 , H04L63/0428 , H04L67/18 , H04L69/329 , H04L2209/603 , H04L2463/101 , H04L2463/102 , H04W4/02
Abstract: PROBLEM TO BE SOLVED: To solve the problem that processing of optimal encoding for digital contents takes too much time durations. SOLUTION: Genre of digital contents is acquired. According to the genre, optimal compression algorithm and optimal compression label are selected and decided automatically based on a table defined beforehand. Furthermore, encoding parameters which establish dynamic arbitration of contents, equalization level etc. are created automatically. The compression algorithm contains algorithms such as MPEG, AC3 and ATRAC. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract translation: 要解决的问题:为了解决数字内容的最佳编码处理花费太多时间的问题。
解决方案:获取数字内容的类型。 根据类型,根据预先定义的表格自动选择和决定了最佳压缩算法和最优压缩标签。 此外,自动创建建立内容动态仲裁,均衡等级的编码参数。 压缩算法包含诸如MPEG,AC3和ATRAC之类的算法。 版权所有(C)2005,JPO&NCIPI
-
3.
公开(公告)号:JP2005122708A
公开(公告)日:2005-05-12
申请号:JP2004264471
申请日:2004-09-10
Applicant: Internatl Business Mach Corp
, インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Inventor: DORAK JOHN , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
IPC: G06F21/24 , G06F1/00 , G06F21/00 , G06Q20/36 , G06Q20/38 , G06Q30/06 , G09C1/00 , G10K15/02 , H03M7/30 , H04L9/08 , H04L9/10 , H04L29/06 , H04L29/08 , H04N7/167 , H04N7/173 , G06F12/14 , G06F15/00 , G06F17/60
CPC classification number: G06F21/10 , G06F2221/0737 , G06F2221/2135 , G06Q20/3674 , G06Q20/382 , G06Q20/3829 , G06Q30/0617 , G06Q30/0623 , G06Q30/0633 , H04L9/0822 , H04L9/0825 , H04L63/0428 , H04L67/18 , H04L69/329 , H04L2209/603 , H04L2463/101 , H04L2463/102 , H04W4/02
Abstract: PROBLEM TO BE SOLVED: To provide a system for tracing the use of a digital content on an end user device. SOLUTION: An electronic store connected to a network sells a license for playing back a digital content data to a user. To play back the content data having the issued license, a content player which receives the content data having the issued license from the network is used. A log record site receives playback information, including the number of times the content data is played back by the related content player, from the network. Further, when the content data is played back by the content player, or when the content data is copied to an external medium from the content player, information to that effect is inevitably transmitted to the log record site. As a result, the use of the content data having the issued license can be traced. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract translation: 要解决的问题:提供一种用于跟踪在终端用户设备上使用数字内容的系统。
解决方案:连接到网络的电子商店出售用于向用户回放数字内容数据的许可证。 为了播放具有已发行许可证的内容数据,使用从网络接收具有已发行许可证的内容数据的内容播放器。 日志记录站点从网络接收包括相关内容播放器播放的内容数据的次数的播放信息。 此外,当内容播放器回放内容数据时,或者当从内容播放器将内容数据复制到外部媒体时,不可避免地将信息发送到日志记录站点。 结果,可以追踪使用具有已发行许可证的内容数据。 版权所有(C)2005,JPO&NCIPI
-
公开(公告)号:WO2005052841A9
公开(公告)日:2006-07-20
申请号:PCT/EP2004052884
申请日:2004-11-09
Applicant: IBM , IBM UK , JIN HONXIA , LEAKE DONALD JR , LOTSPIECH JEFFREY , NIN SIGFREDO , PLOUFFE WILFRED
Inventor: JIN HONXIA , LEAKE DONALD JR , LOTSPIECH JEFFREY , NIN SIGFREDO , PLOUFFE WILFRED
IPC: G06F21/00
CPC classification number: G06F21/6218 , G06F21/14 , G06F21/51
Abstract: A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allows the Java application to securely store and retrieve secrets. The trusted Java virtual machine environment comprises a TrustedDictionary, a TrustedBundle, an optional encryption method for encrypting and decrypting byte codes, and an underlying trusted Java virtual machine. The encrypted TrustedDictionary protects data while the TrustedBundle protects programming code, allowing applications to store secret data and secure counters. The application designer can restrict TrustedBundle access to only those interfaces that the application designer explicitly exports. The open source code may optionally be encrypted. Secrets required by the open source programming code of the application are encrypted in TrustedDictionary.
Abstract translation: 受信任的Java虚拟机提供了一种支持防篡改应用程序的方法,确保应用程序的完整性及其密钥(如密钥)。 受信任的Java虚拟机验证Java应用程序的完整性,阻止Java应用程序的调试,并允许Java应用程序安全地存储和检索秘密。 受信任的Java虚拟机环境包括TrustedDictionary,TrustedBundle,用于加密和解密字节代码的可选加密方法以及底层可信Java虚拟机。 加密的TrustedDictionary保护数据,而TrustedBundle保护编程代码,允许应用程序存储秘密数据和安全计数器。 应用程序设计人员可以将TrustedBundle访问限制为应用程序设计程序明确导出的那些接口。 可以可选地加密开源代码。 应用程序的开源编程代码所需的秘密在TrustedDictionary中加密。
-
公开(公告)号:WO0221243A3
公开(公告)日:2003-10-09
申请号:PCT/GB0103962
申请日:2001-09-05
Inventor: LOTSPIECH JEFFREY , NUSSER STEFAN
CPC classification number: G06F21/64 , G06F21/445
Abstract: Software manufacturers examine their module and determine a range of addresses in memory which the module occupies. A protected range of addresses in memory is predefined to not allow changes, such as patching by hackers. Each manufacturer delivers the range of addresses describing the protected area and a known good version of their module to other manufacturers that they want to interoperate with. The other manufacturers return digital signatures on the protected area, and these digital signatures are stored in the first manufacturer's module. Correspondingly, the other manufacturers do the same with their own modules. Then, in order to effect a secure communication channel between two modules the modules first pass each other the signatures previously produced. Then, to ensure that communication is being effected with an authentic authorized module, through the use of the signature and the address ranges in the protected area, each module checks that the other module has not been patched. They each further verify that all the entry points in the other module they intend to call are in fact within the protected area. In the event that both modules are verified as being trustworthy, the modules now call each other freely. However, each module, when it is called must verify that it was called from within the protected area of the other module.
Abstract translation: 软件制造商检查其模块并确定模块占用的内存中的一系列地址。 内存中保护的地址范围被预先定义为不允许更改,例如黑客修补。 每个制造商提供描述保护区域的一系列地址和其模块的已知良好版本,以供他们想要互操作的其他制造商。 其他制造商在保护区域返回数字签名,这些数字签名存储在第一个制造商的模块中。 相应地,其他制造商也用自己的模块做同样的事情。 然后,为了实现两个模块之间的安全通信信道,模块首先通过彼此之前产生的签名。 然后,为了确保通过真实的授权模块进行通信,通过使用保护区域中的签名和地址范围,每个模块检查另一个模块未被修补。 他们每个进一步验证他们打算打电话的其他模块中的所有入口点实际上在保护区内。 如果两个模块都被验证为可靠的,那么这些模块现在可以自由地相互呼叫。 然而,每个模块在被调用时都必须验证它是否在另一个模块的保护区内被调用。
-
6.
公开(公告)号:JP2005122710A
公开(公告)日:2005-05-12
申请号:JP2004264524
申请日:2004-09-10
Applicant: Internatl Business Mach Corp
, インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Inventor: DORAK JOHN , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
IPC: G06F21/24 , G06F1/00 , G06F21/00 , G06Q20/36 , G06Q20/38 , G06Q30/06 , G09C1/00 , G10K15/02 , H03M7/30 , H04L9/08 , H04L9/10 , H04L29/06 , H04L29/08 , H04N7/167 , H04N7/173 , G06F12/14 , G06F17/60
CPC classification number: G06F21/10 , G06F2221/0737 , G06F2221/2135 , G06Q20/3674 , G06Q20/382 , G06Q20/3829 , G06Q30/0617 , G06Q30/0623 , G06Q30/0633 , H04L9/0822 , H04L9/0825 , H04L63/0428 , H04L67/18 , H04L69/329 , H04L2209/603 , H04L2463/101 , H04L2463/102 , H04W4/02
Abstract: PROBLEM TO BE SOLVED: To provide a system for tracing the use of a digital content on an end user device. SOLUTION: An electronic store connected to a network sells a license for playing back a digital content data to a user. To play back the content data having the issued license, a content player which receives the content data having the issued license from the network is used. A log record site receives playback information, including the number of times the content data is played back, from the network. Also, a method for tracing the use of the digital content on the end user device is provided. When the content data having the issued license is transmitted to the content player of the user and played back, or when the content data is copied to an external medium from the content player, information to that effect is inevitably transmitted to the log record site. As a result, the use of the content data having the issued license can be traced. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract translation: 要解决的问题:提供一种用于跟踪在终端用户设备上使用数字内容的系统。
解决方案:连接到网络的电子商店出售用于向用户回放数字内容数据的许可证。 为了播放具有已发行许可证的内容数据,使用从网络接收具有已发行许可证的内容数据的内容播放器。 日志记录站点从网络接收回放信息,包括回放内容数据的次数。 另外,提供了一种用于跟踪在最终用户设备上使用数字内容的方法。 当将具有已发行许可证的内容数据发送给用户的内容播放器并重放时,或者当内容数据从内容播放器复制到外部媒体时,不可避免地将信息传送到日志记录站点。 结果,可以追踪使用具有已发行许可证的内容数据。 版权所有(C)2005,JPO&NCIPI
-
7.
公开(公告)号:JP2005122709A
公开(公告)日:2005-05-12
申请号:JP2004264493
申请日:2004-09-10
Applicant: Internatl Business Mach Corp
, インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Inventor: DORAK JOHN , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
IPC: G06F21/24 , G06F1/00 , G06F21/00 , G06Q20/36 , G06Q20/38 , G06Q30/06 , G09C1/00 , G10K15/02 , H03M7/30 , H04L9/08 , H04L9/10 , H04L29/06 , H04L29/08 , H04N7/167 , H04N7/173 , G06F12/14 , G06F15/00 , G06F17/60
CPC classification number: G06F21/10 , G06F2221/0737 , G06F2221/2135 , G06Q20/3674 , G06Q20/382 , G06Q20/3829 , G06Q30/0617 , G06Q30/0623 , G06Q30/0633 , H04L9/0822 , H04L9/0825 , H04L63/0428 , H04L67/18 , H04L69/329 , H04L2209/603 , H04L2463/101 , H04L2463/102 , H04W4/02
Abstract: PROBLEM TO BE SOLVED: To provide a system for tracing the use of a digital content on an end user device. SOLUTION: An electronic store connected to a network sells a license for playing back a digital content data to a user. To play back the content data having the issued license, a content player which receives the content data having the issued license from the network is used. Further, a log record site connected to the network traces the playback of the content data. Also, a method for tracing the use of the digital content on the end user device is provided. When the content data is played back by the content player, or when the content data is copied to an external medium from the content player, information to that effect is inevitably transmitted to the log record site. As a result, the use of the content data having the issued license can be traced. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract translation: 要解决的问题:提供一种用于跟踪在终端用户设备上使用数字内容的系统。
解决方案:连接到网络的电子商店出售用于向用户回放数字内容数据的许可证。 为了播放具有已发行许可证的内容数据,使用从网络接收具有已发行许可证的内容数据的内容播放器。 此外,连接到网络的日志记录站点跟踪内容数据的回放。 另外,提供了一种用于跟踪在最终用户设备上使用数字内容的方法。 当内容播放器回放内容数据时,或者当从内容播放器将内容数据复制到外部媒体时,不可避免地将信息发送到日志记录站点。 结果,可以追踪使用具有已发行许可证的内容数据。 版权所有(C)2005,JPO&NCIPI
-
8.
公开(公告)号:WO0008909A3
公开(公告)日:2000-11-16
申请号:PCT/US9918383
申请日:1999-08-12
Applicant: IBM , DORAK JOHN JR , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
Inventor: DORAK JOHN JR , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
IPC: G06F21/24 , G06F1/00 , G06F21/00 , G06Q20/36 , G06Q20/38 , G06Q30/06 , G09C1/00 , G10K15/02 , H03M7/30 , H04L9/08 , H04L9/10 , H04L29/06 , H04L29/08 , H04N7/167 , H04N7/173 , G06F17/60
CPC classification number: G06F21/10 , G06F2221/0737 , G06F2221/2135 , G06Q20/3674 , G06Q20/382 , G06Q20/3829 , G06Q30/0617 , G06Q30/0623 , G06Q30/0633 , H04L9/0822 , H04L9/0825 , H04L63/0428 , H04L67/18 , H04L69/329 , H04L2209/603 , H04L2463/101 , H04L2463/102 , H04W4/02
Abstract: A system for tracking usage of digital content on user devices. Electronic stores coupled to a network sell licenses to play digital content data to users. A system for securely providing data, the system being capable of receiving both data encrypted with a first encryption key and a encrypted first encryption key.
Abstract translation: 用于跟踪用户设备上数字内容的使用的系统。 耦合到网络的电子商店销售许可证以向用户播放数字内容数据。 一种用于安全地提供数据的系统,该系统能够接收利用第一加密密钥加密的数据和加密的第一加密密钥。
-
公开(公告)号:AU2003227202A1
公开(公告)日:2003-09-04
申请号:AU2003227202
申请日:2003-06-16
Applicant: IBM
Inventor: MEDINA CESAR , LOTSPIECH JEFFREY , LEHMAN CHRISTOPHER , HURTADO MARCO , GRUSE GEORGE GREGORY , DOWNS EDGAR , DORAK JOHN JR , MILSTED KENNETH
-
公开(公告)号:AU763380B2
公开(公告)日:2003-07-24
申请号:AU5481899
申请日:1999-08-12
Applicant: IBM
Inventor: DORAK JOHN JR , DOWNS EDGAR , GRUSE GEORGE GREGORY , HURTADO MARCO , LEHMAN CHRISTOPHER , LOTSPIECH JEFFREY , MEDINA CESAR , MILSTED KENNETH
IPC: G06F21/24 , G06F1/00 , G06F21/00 , G06Q20/36 , G06Q20/38 , G06Q30/06 , G09C1/00 , G10K15/02 , H03M7/30 , H04L9/08 , H04L9/10 , H04L29/06 , H04L29/08 , H04N7/167 , H04N7/173 , G06F17/60
Abstract: A system for tracking usage of digital content on user devices. Electronic stores coupled to a network sell licenses to play digital content data to users. Content players, which receive from the network the licensed content data, are used to play the licensed content data. Additionally, a logging site that is coupled to thte network tracks the playing of the content data. In particular, the logging site receives play information from the network, and the play information includes the number of times that the content data has been played by the associated content player. Also provided is a method for tracking usage of digital content on user devices. According to the method, a license to play digital content data is sold to a user, and the licensed content data is transmitted to a content player for the user.; Further, information is transmitted to a logging site whenever the content data is played by the content player or copied from the content player to an external medium so that usage of the licensed content data can be tracked.
-
-
-
-
-
-
-
-
-