Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization via incorrect functional behavior of white-box implementations

A correct, white-box technology that can be used in countermeasures against encryption mechanisms, program/content distribution protection, computer security devices, etc.

Active Publication Date: 2018-05-04
NXP BV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The idea behind this is that it will be more difficult to extract information through code inspection alone
Therefore, it is more difficult to find and change the code that handles access and permission controls for secure applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization via incorrect functional behavior of white-box implementations
  • Authorization via incorrect functional behavior of white-box implementations
  • Authorization via incorrect functional behavior of white-box implementations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The description and drawings illustrate the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise numerous arrangements (although not explicitly described or shown herein) which embody the principles of the invention and are included within its scope. Furthermore, all examples set forth herein are clearly intended primarily for teaching purposes to assist the reader in understanding the principles of the invention and ideas contributed by the inventors to advance the state of the art and are not to be considered limited to the examples and conditions specifically described. Furthermore, the term "or" as used herein refers to a non-exclusive or (ie and / or), unless otherwise indicated (eg, "or other" or "or in the alternative"). Furthermore, the various embodiments described herein are not necessarily mutually exclusive, and some embodiments can be combined with one or more other embodiments to form new embodiments. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authorization method in a cryptographic system using a single cryptographic key to provide separate authorizations for a plurality of different sets of input messages, the method comprising: receiving, by the cryptographic system, a first input message from a first set of input messages; The cryptographic system performs a keyed cryptographic operation mapping the first input message to a first output message, wherein, when the cryptographic system is authorized for the set of first input messages, the keyed a cryptographic operation producing correct output messages, said keyed cryptographic operation not producing correct output when said cryptographic system is not authorized for use with said first set of input messages, and each of said plurality of sets of input messages have associated sets of input messages, wherein the sets of input messages do not overlap.

Description

technical field [0001] Various exemplary embodiments disclosed herein relate generally to enabling authorization via incorrect functional behavior implemented by a white box. Background technique [0002] The Internet has brought users easy and pervasive access to digital content. Because the Internet is a powerful distribution channel, many user devices strive to have direct Internet access. User devices may include personal computers, laptops, set-top boxes, Internet-enabled media players, mobile phones, smartphones, tablets, mobile hotspots, or any other device capable of accessing the Internet. The use of the Internet as a distribution medium for copyrighted content presents significant challenges in securing the interests of content providers. It is increasingly common for user devices to render (play back) digital content (such as audio and / or video) using a processor loaded with appropriate software. Control over playback software is a means of enforcing the intere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCH04L9/002H04L9/0631H04L2209/043H04L2209/16H04L63/0428G06F21/51
Inventor W·P·A·J·米歇尔斯简·胡格布鲁格
Owner NXP BV