会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • CONTENT PROTECTION KEY ENCRYPTOR FOR SECURITY PROVIDERS
    • 内容保护用于安全提供者的主要加密器
    • US20110091037A1
    • 2011-04-21
    • US12580589
    • 2009-10-16
    • Howard G. Pinder
    • Howard G. Pinder
    • H04L9/00
    • H04L9/0822H04L9/083H04L9/0897H04L2209/60
    • Techniques are provided to receive at an encryption device from a control device an encryption request comprising a message and an identifier for a device. The control device and the device are associated with a security provider that provides secure content to the device using the message encrypted with a device key that is securely embedded in the device and also stored on the encryption device. The encryption device is associated with a key provider and the device key is not divulged to the security provider. At the encryption device, the device key is retrieved based on the identifier. The message is encrypted with the device key using a predetermined algorithm, and the encrypted message is then sent to the control device.
    • 提供技术来在加密设备处从控制设备接收包括消息的加密请求和设备的标识符。 控制设备和设备与安全提供商相关联,安全提供商使用安全地嵌入在设备中并且还存储在加密设备中的设备密钥加密的消息向设备提供安全内容。 加密设备与密钥提供商相关联,并且设备密钥不被泄漏给安全提供者。 在加密装置中,基于标识符检索设备密钥。 消息使用预定算法用设备密钥加密,然后将加密的消息发送到控制设备。
    • 7. 发明申请
    • Partially Reversible Key Obfuscation
    • 部分可逆键混淆
    • US20100241872A1
    • 2010-09-23
    • US12407884
    • 2009-03-20
    • Howard G. Pinder
    • Howard G. Pinder
    • H04L9/06
    • H04L9/0869H04L2209/16
    • Techniques are provided to obfuscate seed values to produce a decryption key for a simplified content protection scheme. A first repeatable sequence is performed that encrypts a value stored in a first memory location using a value stored in the second memory location to produce an encrypted value and the value stored in the first memory location is overwritten with the encrypted value and then applying a constraining function to the value stored in the second memory location to produce a result and the value stored in the second memory location is overwritten with the result, wherein the result contains a less entropy compared an entropy level of the value in the second memory location prior to applying the constraining function. This sequence is repeated, but the values used in the first and second memory locations are used in opposite fashion. Techniques are also provided to perform the reverse operation and de-obfuscate a decryption key.
    • 提供技术来模糊种子值以产生用于简化的内容保护方案的解密密钥。 执行第一可重复序列,其使用存储在第二存储器位置中的值来加密存储在第一存储器位置中的值以产生加密值,并且存储在第一存储器位置中的值被加密的值重写,然后施加约束 对存储在第二存储器位置中的值进行功能以产生结果,并且存储在第二存储器位置中的值被结果覆盖,其中结果包含较少熵,其比较第二存储器位置中的值的熵值, 应用约束函数。 重复该顺序,但是以相反的方式使用在第一和第二存储器位置中使用的值。 还提供技术来执行反向操作并解密模糊解密密钥。