Tracing copies of an implementation

A look-up table and version technology, which is applied in the field of copying systems, can solve problems such as the difficulty of extracting and distributing keys

Inactive Publication Date: 2009-11-11
IRDETO BV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes it more difficult for an attacker to extract and distribute keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tracing copies of an implementation
  • Tracing copies of an implementation
  • Tracing copies of an implementation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] White-box cryptography is about implementing a block cipher on a fixed key K such that it is difficult for an attacker to extract the key K from said implementation. The attack mode identified in white-box cryptography is the white-box attack mode. With this attack model, the attacker is assumed to have sufficient access to the software and sufficient control over the implementation environment.

[0060] One embodiment relates to a conditional access system for pay TV. The content provider distributes the content encrypted by AES and content key K. One of the problems that have to be solved with respect to conditional access systems is how to distribute the content key K for decrypting the content for the subscriber and not for others. Two methods are described below. First, a simple approach is to keep the content key K fixed over time and provide the key K only to subscribers. However, this implementation has the following two disadvantages. The first disadvantag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system (600) for facilitating tracing copies (634) of an implementation of a computational method (602). A network generator (604) for generating a network of look-up tables representing steps of the computational method (602), the network being formed by using an output value of a first look-up table as an input value of a different second look-up 5 table. A personalizer (606) for generating a plurality of different versions of the network of look-up tables by changing at least one value in the network of look-up tables, end results of the version corresponding to a relevant domain of input values being substantially the same for each version. An associator (608) for associating individual versions with individual stations (610) or users (632) of stations (610). The computational method (602) includes a 10 cryptographic scheme and a cryptographic key.

Description

technical field [0001] The present invention relates to a system for facilitating tracking of copies of implementations of computing methods. Background technique [0002] The Internet provides users with convenient and ubiquitous access to digital content. The use of the Internet as a distribution medium for copyrighted content poses a strong challenge to securing the interests of content providers. In particular, copyright and business models need to be granted to content providers. Increasingly, consumer electronics (CE) platforms are run using processors loaded with appropriate software. Such software includes a major part of the functionality for presenting (reproducing) digital content such as audio and / or video. Control of reproduction software is one way to enforce the interests of content owners, including the terms and conditions under which said content can be used. Whereas in the past many CE platforms (except PCs and PDAs) were turned off, today more and mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06
CPCH04L2209/608H04L9/0681H04L9/002H04L2209/606H04L9/0631G06F21/10H04L2209/16
Inventor W·P·A·J·米歇尔斯P·M·H·M·A·戈里森H·D·L·霍尔曼
Owner IRDETO BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products