Abstract:
Un método para mover contenidos protegidos dentro de un dominio autorizado (10), en el que al menos un primer dispositivo (12) y un segundo dispositivo (13) forman parte del dominio autorizado, compartiendo cada uno de los dispositivos (12, 13) que forman parte del dominio autorizado una clave de dominio, en el que tener la clave de dominio define los dispositivos (12, 13) como parte del dominio autorizado, comprendiendo el método con respecto al primer dispositivo: recibir de una fuente de proveedor de contenidos externa (50) un valor inicial de clave de contenido y un contenido que comprende un ID de contenido, en donde el valor inicial de clave de contenido y el ID de contenido están asociados entre sí de una manera conocida por el proveedor de contenidos; crear una clave de contenido operando sobre el valor inicial de clave de contenido con la clave de dominio del primer dispositivo; encriptar el contenido recibido con la clave de contenido; encriptar la clave de contenido con la clave de dominio, de tal manera que todos los dispositivos dentro del dominio autorizado tengan la capacidad de desencriptar la clave de contenido encriptada con la clave de dominio; crear un certificado asociado al contenido encriptado, incluyendo el certificado la clave de contenido encriptada, el ID de contenido, un registro de estados de uso que establece los límites de reproducción en relación con el contenido, y la información que identifica el dominio autorizado; transmitir el contenido encriptado y el certificado al segundo dispositivo (13); y después de transmitir el certificado, inutilizar cualquier certificado en el primer dispositivo que esté asociado a dicho contenido encriptado.
Abstract:
Method, apparatus, system, computer program product and computer readable medium are disclosed for generating reputation of an entity from a plurality of opinions associated with that entity, wherein the entity and the plurality of opinions are expressed in a natural language. The method comprises filtering said plurality of opinions based on pertinence of each opinion with respect to the entity; fusing the filtered opinions into at least one principle opinion set; and generating a reputation value based on said at least one principle opinion set. The method further comprises providing reputation visualization for users, and recommending an entity based on its reputation value, opinions provided by users, opinion pertinence and user opinion's similarity.
Abstract:
Systems and techniques for controlling access to data are described. Data is delivered to a repository in such a way that access to the data can be controlled, for example, by encrypting the data before delivery. The power to provide a requester with the ability to gain access to the data is divided, so that multiple entities can provide the requester with a portion of the information needed to gain access to the data. The portions of the information may be partial keys that can be assembled into a complete key. The requester can gain access to the data only if it receives all portions of the information needed to gain access to the data, and different criteria may be used to decide whether or not to provide each portion of the information to the requester.
Abstract:
A framework, apparatus, system and method for realizing security and trust management for virtualized networks. A computing platform for implementation in a networking device of a virtualized network comprises a root-trusted module layer, which includes a root trust module for providing root trust; and a middleware layer, which includes system-level components configured to manage security and trust of virtualized network functions by verifying, establishing or maintaining trust with regard to the virtualized network functions based on the root trust. The computing platform can further comprise a number of virtualized security and trust functions that can be flexibly deployed in the virtualized network function infrastructure supported by the above two layers.
Abstract:
A method for anonymous trust authentication may comprise: issuing trust information to a first node from a network entity, wherein the trust information indicates a trust evaluation for the first node; distributing a trust list to a plurality of nodes comprising at least the first node and a second node, wherein the trust list is associated with the trust evaluation for the first node, and wherein the trust information and the trust list are used for an anonymous trust authentication between the first node and the second node.
Abstract:
A method, comprising: obtaining, at a trustworthy party, a data processing result from a requesting party or a processing party in response to receiving a request for verifying correctness of the data processing result from the requesting party, wherein the data processing result is obtained by the requesting party from the processing party; obtaining, at a trustworthy party, the data used to getting the data processing result and a corresponding algorithm from the processing party, wherein the processing party uses the corresponding algorithm to process the data and gets the data processing result; processing, at the trustworthy party, the obtained data with the corresponding algorithm and comparing the processed result with the received data processing result, and if the two results are the same, the data processing result verified by the trustworthy party is correct.
Abstract:
An approach is provided for providing an offline malware detection, and in addition a real-time malware detection. The offline malware detection may comprise: detecting at least one of function calling map of the application offline, wherein a function calling map records relationships of callings among functions called by the application; extracting patterns of the function callings of the application from the at least one function calling map; and comparing the extracted pattern with at least one basic pattern of normal applications. The real-time malware detection may comprises: running an application in a real environment; recording behaviors of the application at runtime of the application; extracting behavior patterns from the recorded behaviors; and comparing the extracted behavior patterns with at least one of basic patterns of normal applications or patterns previously recorded for the application.
Abstract:
A method for privacy-enhanced evidence evaluation may comprise: sending a request for pre-evaluation information regarding evidence data of a target object to a first network entity from a requesting node; obtaining the pre-evaluation information from the first network entity, in response to successful verification of the requesting node at a second network entity; and calculating an evidence evaluation of the target object based at least in part on the pre-evaluation information, wherein the pre-evaluation information comprises re-encrypted evidence data of the target object associated with one or more time slots, and wherein the re-encrypted evidence data of the target object at an associated time slot is resulted at least in part from encrypted evidence data of the target object collected by the first network entity from one or more evidence providers at the associated time slot, by using a re-encryption key from the second network entity.
Abstract:
An approach is provided for providing secure communications based on trust evaluation in a distributed manner. A method can comprises: sending data to a plurality of devices, the data being encrypted with a communication key; encrypting the communication key with public attribute keys associated with attributes, wherein the attributes comprising at least one trust level related attribute representing an access condition for the data based on a trust level; evaluating a trust level of each device of the plurality of devices, to identify eligible devices of the plurality of devices whose trust levels satisfy the access condition; sending the encrypted communication key to the plurality of devices; and sending secret attribute keys associated with the attributes to each device of the eligible devices for decrypting the encrypted communication key, the secret attribute keys being personalized for the each device of the eligible devices.