METHOD FOR BROADCAST ENCRYPTION
    1.
    发明申请
    METHOD FOR BROADCAST ENCRYPTION 审中-公开
    广播加密方法

    公开(公告)号:WO02060116A3

    公开(公告)日:2002-09-26

    申请号:PCT/GB0200305

    申请日:2002-01-23

    Applicant: IBM IBM UK

    Abstract: A tree is used to partition stateless receivers in a broadcast content encryption system into subsets. Two different methods of partitioning are disclosed. When a set of revoked receivers is identified, the revoked receivers define a relatively small cover of the non-revoked receivers by disjoint subsets. Subset keys associated with the subsets are then used to encrypt a session key that in turn is used to encrypt the broadcast content. Only non-revoked receivers can decrypt the session key and, hence, the content.

    Abstract translation: 一棵树用于将广播内容加密系统中的无状态接收器分成子集。 公开了两种不同的分割方法。 当识别出一组撤销的接收者时,撤销的接收者通过不相交的子集定义非撤销的接收者的相对较小的覆盖。 与子集相关联的子集密钥然后用于加密会话密钥,会话密钥又用于加密广播内容。 只有非撤销的接收者可以解密会话密钥,因此可以解密内容。

    METHOD OF A FULL COVERAGE LOW POWER MODE FOR STORAGE SYSTEMS STORING REPLICATED DATA ITEMS
    2.
    发明申请
    METHOD OF A FULL COVERAGE LOW POWER MODE FOR STORAGE SYSTEMS STORING REPLICATED DATA ITEMS 审中-公开
    用于存储系统的全覆盖低功耗模式存储替换数据项的方法

    公开(公告)号:WO2010127973A3

    公开(公告)日:2010-12-29

    申请号:PCT/EP2010055691

    申请日:2010-04-28

    Abstract: A method of implementing a full coverage low power mode in a storage system comprised of one or more memory storage devices storing replicated data items. A subset of the memory storage devices is chosen whose replicated data items require the least amount of storage. If the chosen subset stores uncovered data items, these data items are copied to an auxiliary memory storage device. The storage system can enter a full coverage low power mode by powering down the chosen subset of memory storage devices.

    Abstract translation: 一种在由存储复制数据项的一个或多个存储器设备组成的存储系统中实现全覆盖低功率模式的方法。 选择存储器存储设备的子集,其复制数据项需要最少量的存储。 如果所选择的子集存储未覆盖的数据项,则这些数据项被复制到辅助存储器存储设备。 存储系统可以通过关闭所选择的存储器存储设备的子集来进入全覆盖低功率模式。

    SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SECURE ACCESS CONTROL TO A STORAGE DEVICE
    3.
    发明申请
    SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SECURE ACCESS CONTROL TO A STORAGE DEVICE 审中-公开
    用于对存储设备进行安全访问控制的系统,方法和计算机程序产品

    公开(公告)号:WO2007141206A3

    公开(公告)日:2008-02-07

    申请号:PCT/EP2007055390

    申请日:2007-06-01

    CPC classification number: G06F21/62 G06F21/80

    Abstract: A method for accessing a storage device, the method includes: receiving, by storage device, a block based storage access command and cryptographically secured access control information; wherein the block based storage access command and the cryptographically secured access control information are associated with at least one fixed size block of data and with a client; processing at least a portion of the cryptographically secured access control information by using a secret key accessible to the storage device and to a security entity; and selectively executing the block based storage access command in response to a result of the processing.

    Abstract translation: 一种用于访问存储设备的方法,所述方法包括:由存储设备接收基于块的存储访问命令和加密安全的访问控制信息; 其中基于块的存储访问命令和加密安全的访问控制信息与至少一个固定大小的数据块和客户端相关联; 通过使用存储设备可访问的秘密密钥和安全实体来处理至少一部分密码安全的访问控制信息; 以及响应于所述处理的结果选择性地执行基于块的存储访问命令。

    Method for broadcast encryption
    5.
    发明专利

    公开(公告)号:AU2002228163A1

    公开(公告)日:2002-08-06

    申请号:AU2002228163

    申请日:2002-01-23

    Applicant: IBM

    Abstract: A tree is used to partition stateless receivers in a broadcast content encryption system into subsets. Two different methods of partitioning are disclosed. When a set of revoked receivers is identified, the revoked receivers define a relatively small cover of the non-revoked receivers by disjoint subsets. Subset keys associated with the subsets are then used to encrypt a session key that in turn is used to encrypt the broadcast content. Only non-revoked receivers can decrypt the session key and, hence, the content.

    6.
    发明专利
    未知

    公开(公告)号:DE60229354D1

    公开(公告)日:2008-11-27

    申请号:DE60229354

    申请日:2002-01-23

    Applicant: IBM

    Abstract: A method for tracing traitor receivers in a broadcast encryption system. The method includes using a false key to encode plural subsets representing receivers in the system. The subsets are derived from a tree using a Subset-Cover system, and the traitor receiver is associated with one or more compromised keys that have been obtained by a potentially cloned pirate receiver. Using a clone of the pirate receiver, the identity of the traitor receiver is determined, or the pirate receiver clones are rendered useless for decrypting data using the compromised key by generating an appropriate set of subsets.

    METODO PARA LA CODIFICACION DE TRANSMISIONES.

    公开(公告)号:ES2334109T3

    公开(公告)日:2010-03-05

    申请号:ES02710108

    申请日:2002-01-23

    Applicant: IBM

    Abstract: Un método para cifrado o codificado de transmisión, que comprende: asignar a cada usuario en un grupo de usuarios información privada respectiva Iu; seleccionar al menos una clave de cifrado de sesión K; dividir a los usuarios que no están en un conjunto revocado R en subconjuntos disjuntos Si1,...Sim que tienen claves de subconjuntos asociadas Li1,...Lim; y cifrar la clave de sesión K con las claves de subconjuntos Li1,...Lim para hacer m versiones cifradas de la clave de sesión K.

    9.
    发明专利
    未知

    公开(公告)号:AT411665T

    公开(公告)日:2008-10-15

    申请号:AT02710110

    申请日:2002-01-23

    Applicant: IBM

    Abstract: A method for tracing traitor receivers in a broadcast encryption system. The method includes using a false key to encode plural subsets representing receivers in the system. The subsets are derived from a tree using a Subset-Cover system, and the traitor receiver is associated with one or more compromised keys that have been obtained by a potentially cloned pirate receiver. Using a clone of the pirate receiver, the identity of the traitor receiver is determined, or the pirate receiver clones are rendered useless for decrypting data using the compromised key by generating an appropriate set of subsets.

    Método para la codificación de transmisiones

    公开(公告)号:ES2334109T5

    公开(公告)日:2013-05-03

    申请号:ES02710108

    申请日:2002-01-23

    Applicant: IBM

    Abstract: Un método para cifrado o codificado de transmisión, que comprende: asignar a cada usuario en un grupo de usuarios información privada respectiva Iu; seleccionar al menos una clave de cifrado de sesión K; dividir a los usuarios que no están en un conjunto revocado R en subconjuntos disjuntos Si1,...Sim que tienen claves de subconjuntos asociadas Li1,...Lim; y cifrar la clave de sesión K con las claves de subconjuntos Li1,...Lim para hacer m versiones cifradas de la clave de sesión K.

Patent Agency Ranking