Sistema y método para copiar y mover contenidos de manera controlada entre dispositivos y dominios sobre la base de una encriptación condicional de clave de contenido en función del estado de uso

    公开(公告)号:ES2557439T3

    公开(公告)日:2016-01-26

    申请号:ES02801461

    申请日:2002-10-16

    Abstract: Un método para mover contenidos protegidos dentro de un dominio autorizado (10), en el que al menos un primer dispositivo (12) y un segundo dispositivo (13) forman parte del dominio autorizado, compartiendo cada uno de los dispositivos (12, 13) que forman parte del dominio autorizado una clave de dominio, en el que tener la clave de dominio define los dispositivos (12, 13) como parte del dominio autorizado, comprendiendo el método con respecto al primer dispositivo: recibir de una fuente de proveedor de contenidos externa (50) un valor inicial de clave de contenido y un contenido que comprende un ID de contenido, en donde el valor inicial de clave de contenido y el ID de contenido están asociados entre sí de una manera conocida por el proveedor de contenidos; crear una clave de contenido operando sobre el valor inicial de clave de contenido con la clave de dominio del primer dispositivo; encriptar el contenido recibido con la clave de contenido; encriptar la clave de contenido con la clave de dominio, de tal manera que todos los dispositivos dentro del dominio autorizado tengan la capacidad de desencriptar la clave de contenido encriptada con la clave de dominio; crear un certificado asociado al contenido encriptado, incluyendo el certificado la clave de contenido encriptada, el ID de contenido, un registro de estados de uso que establece los límites de reproducción en relación con el contenido, y la información que identifica el dominio autorizado; transmitir el contenido encriptado y el certificado al segundo dispositivo (13); y después de transmitir el certificado, inutilizar cualquier certificado en el primer dispositivo que esté asociado a dicho contenido encriptado.

    METHOD, APPARATUS, COMPUTER PROGRAM PRODUCT AND SYSTEM FOR REPUTATION GENERATION

    公开(公告)号:EP3155536A4

    公开(公告)日:2017-11-22

    申请号:EP14894209

    申请日:2014-06-12

    Inventor: YAN ZHENG

    CPC classification number: G06Q30/0282 G06F7/026 G06F17/30867 G06F2216/03

    Abstract: Method, apparatus, system, computer program product and computer readable medium are disclosed for generating reputation of an entity from a plurality of opinions associated with that entity, wherein the entity and the plurality of opinions are expressed in a natural language. The method comprises filtering said plurality of opinions based on pertinence of each opinion with respect to the entity; fusing the filtered opinions into at least one principle opinion set; and generating a reputation value based on said at least one principle opinion set. The method further comprises providing reputation visualization for users, and recommending an entity based on its reputation value, opinions provided by users, opinion pertinence and user opinion's similarity.

    METHODS AND APPARATUS FOR DATA ACCESS CONTROL
    4.
    发明公开
    METHODS AND APPARATUS FOR DATA ACCESS CONTROL 审中-公开
    方法和设备的数据访问控制

    公开(公告)号:EP2912800A4

    公开(公告)日:2016-06-01

    申请号:EP12887182

    申请日:2012-10-26

    Inventor: YAN ZHENG

    CPC classification number: H04L63/061 G06F21/62 H04L9/085 H04L63/0853

    Abstract: Systems and techniques for controlling access to data are described. Data is delivered to a repository in such a way that access to the data can be controlled, for example, by encrypting the data before delivery. The power to provide a requester with the ability to gain access to the data is divided, so that multiple entities can provide the requester with a portion of the information needed to gain access to the data. The portions of the information may be partial keys that can be assembled into a complete key. The requester can gain access to the data only if it receives all portions of the information needed to gain access to the data, and different criteria may be used to decide whether or not to provide each portion of the information to the requester.

    METHOD AND APPARATUS FOR VERIFYING PROCESSED DATA
    7.
    发明公开
    METHOD AND APPARATUS FOR VERIFYING PROCESSED DATA 审中-公开
    VERFAHREN UND VORRICHTUNG ZUR VERIFIZIERUNG VON VERARBEITETEN DATEN

    公开(公告)号:EP3114602A4

    公开(公告)日:2017-10-04

    申请号:EP14884814

    申请日:2014-03-07

    Inventor: YAN ZHENG

    Abstract: A method, comprising: obtaining, at a trustworthy party, a data processing result from a requesting party or a processing party in response to receiving a request for verifying correctness of the data processing result from the requesting party, wherein the data processing result is obtained by the requesting party from the processing party; obtaining, at a trustworthy party, the data used to getting the data processing result and a corresponding algorithm from the processing party, wherein the processing party uses the corresponding algorithm to process the data and gets the data processing result; processing, at the trustworthy party, the obtained data with the corresponding algorithm and comparing the processed result with the received data processing result, and if the two results are the same, the data processing result verified by the trustworthy party is correct.

    Abstract translation: 1。一种方法,包括:响应于接收到请求方验证数据处理结果的正确性的请求,在可信方获得来自请求方或处理方的数据处理结果,其中获得数据处理结果 由请求方向处理方提供; 在可信方获取用于获取数据处理结果的数据和处理方的相应算法,其中处理方使用相应的算法处理数据并获取数据处理结果; 在可信方处理获得的数据和对应的算法,并将处理结果与接收到的数据处理结果进行比较,如果两者相同,则可信方验证的数据处理结果是正确的。

    METHOD AND APPARATUS FOR MALWARE DETECTION
    8.
    发明公开
    METHOD AND APPARATUS FOR MALWARE DETECTION 审中-公开
    VERFAHREN UND VORRICHTUNG ZUR ERKENNUNG VON SCHADPROGRAMMEN

    公开(公告)号:EP3090375A4

    公开(公告)日:2017-08-30

    申请号:EP13900779

    申请日:2013-12-30

    Inventor: YAN ZHENG

    CPC classification number: G06F21/56 G06F21/562 G06F21/566 H04L51/12

    Abstract: An approach is provided for providing an offline malware detection, and in addition a real-time malware detection. The offline malware detection may comprise: detecting at least one of function calling map of the application offline, wherein a function calling map records relationships of callings among functions called by the application; extracting patterns of the function callings of the application from the at least one function calling map; and comparing the extracted pattern with at least one basic pattern of normal applications. The real-time malware detection may comprises: running an application in a real environment; recording behaviors of the application at runtime of the application; extracting behavior patterns from the recorded behaviors; and comparing the extracted behavior patterns with at least one of basic patterns of normal applications or patterns previously recorded for the application.

    Abstract translation: 提供了一种提供脱机恶意软件检测的方法,此外还提供实时恶意软件检测。 离线恶意软件检测可以包括:离线检测应用程序的函数调用映射中的至少一个,其中函数调用映射记录应用程序调用的函数间的调用关系; 从至少一个函数调用映射中提取应用程序的函数调用的模式; 并将提取的模式与正常应用程序的至少一个基本模式进行比较。 实时恶意软件检测可以包括:在真实环境中运行应用程序; 在应用程序运行时记录应用程序的行为; 从记录的行为中提取行为模式; 以及将所提取的行为模式与之前针对该应用记录的正常应用或模式的基本模式中的至少一个进行比较。

    A METHOD AND APPARATUS FOR PRIVACY-ENHANCED EVIDENCE EVALUATION
    9.
    发明公开
    A METHOD AND APPARATUS FOR PRIVACY-ENHANCED EVIDENCE EVALUATION 审中-公开
    VERFAHREN UND VORRICHTUNGFÜREVIDENZBEWERTUNG MITERHÖHTEMPRIVATSPHÄRENSCHUTZ

    公开(公告)号:EP3036875A4

    公开(公告)日:2017-04-19

    申请号:EP13891783

    申请日:2013-08-20

    Inventor: YAN ZHENG

    Abstract: A method for privacy-enhanced evidence evaluation may comprise: sending a request for pre-evaluation information regarding evidence data of a target object to a first network entity from a requesting node; obtaining the pre-evaluation information from the first network entity, in response to successful verification of the requesting node at a second network entity; and calculating an evidence evaluation of the target object based at least in part on the pre-evaluation information, wherein the pre-evaluation information comprises re-encrypted evidence data of the target object associated with one or more time slots, and wherein the re-encrypted evidence data of the target object at an associated time slot is resulted at least in part from encrypted evidence data of the target object collected by the first network entity from one or more evidence providers at the associated time slot, by using a re-encryption key from the second network entity.

    Abstract translation: 用于隐私增强的证据评估的方法可以包括:从请求节点向第一网络实体发送关于目标对象的证据数据的预评估信息的请求; 响应于在第二网络实体处对请求节点的成功验证,从第一网络实体获得预评估信息; 以及至少部分地基于所述预评估信息来计算所述目标对象的证据评估,其中所述预评估信息包括与一个或多个时隙相关联的所述目标对象的重新加密证据数据,并且其中, 至少部分地通过使用重新加密从第一网络实体从相关联的时隙处的一个或多个证据提供者收集的目标对象的加密证据数据获得在相关时隙处的目标对象的加密证据数据 密钥来自第二个网络实体。

    METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATIONS BASED ON TRUST EVALUATIONS IN A DISTRIBUTED MANNER
    10.
    发明公开
    METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATIONS BASED ON TRUST EVALUATIONS IN A DISTRIBUTED MANNER 审中-公开
    方法和设备,用于基于信任评估安全通信以分布式的方式

    公开(公告)号:EP2909964A4

    公开(公告)日:2016-07-06

    申请号:EP12886856

    申请日:2012-10-17

    Inventor: YAN ZHENG

    Abstract: An approach is provided for providing secure communications based on trust evaluation in a distributed manner. A method can comprises: sending data to a plurality of devices, the data being encrypted with a communication key; encrypting the communication key with public attribute keys associated with attributes, wherein the attributes comprising at least one trust level related attribute representing an access condition for the data based on a trust level; evaluating a trust level of each device of the plurality of devices, to identify eligible devices of the plurality of devices whose trust levels satisfy the access condition; sending the encrypted communication key to the plurality of devices; and sending secret attribute keys associated with the attributes to each device of the eligible devices for decrypting the encrypted communication key, the secret attribute keys being personalized for the each device of the eligible devices.

    Abstract translation: 提供了用于提供基于信任评价以分布式的方式进行安全通信的方法。 可以包括一种方法:将数据发送到的设备的复数,所述数据被用密钥加密的通信; 加密与属性相关联的公共属性键的通信密钥,属性worin包括表示到用于基于信任级别的数据访问条件的至少一个相关trustLevel属性; 评价装置的多个的每个设备的信任级别,以确定设备是谁的信任级别满足存取条件的多个符合条件的设备; 发送所述加密的通信密钥的装置的多元性; 和发送与所述属性到符合条件的设备的每个设备用于解密所述加密的通信密钥相关联的秘密密钥属性,被个性化的符合条件的设备的每个设备的秘密属性键。

Patent Agency Ranking