WO2008108764A3 - Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique - Google Patents
Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique Download PDFInfo
- Publication number
- WO2008108764A3 WO2008108764A3 PCT/US2007/005803 US2007005803W WO2008108764A3 WO 2008108764 A3 WO2008108764 A3 WO 2008108764A3 US 2007005803 W US2007005803 W US 2007005803W WO 2008108764 A3 WO2008108764 A3 WO 2008108764A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bit stream
- security protocol
- digital copyright
- copyright control
- recursive security
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Communication Control (AREA)
Abstract
L'invention concerne des systèmes et des procédés qui utilisent un protocole de sécurité récursif destiné à la protection de données numériques. Ces systèmes et ces procédés peuvent inclure le chiffrement d'un flux de bits avec un premier algorithme de chiffrement et l'association d'un premier algorithme de déchiffrement du flux de bits chiffré. Le flux de bits résultant peut ensuite être chiffré avec un deuxième algorithme de chiffrement afin d'obtenir un deuxième flux de bits. Ce deuxième flux de bits est alors associé à un deuxième algorithme de déchiffrement. Ce deuxième flux de bits peut ensuite être déchiffré par un destinataire utilisant des clés associées.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07772246A EP2119092A4 (fr) | 2007-03-06 | 2007-03-06 | Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique |
JP2009552649A JP2010520703A (ja) | 2007-03-06 | 2007-03-06 | デジタル著作権制御用再帰的セキュリティプロトコルのための方法およびシステム |
PCT/US2007/005803 WO2008108764A2 (fr) | 2007-03-06 | 2007-03-06 | Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2007/005803 WO2008108764A2 (fr) | 2007-03-06 | 2007-03-06 | Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008108764A2 WO2008108764A2 (fr) | 2008-09-12 |
WO2008108764A3 true WO2008108764A3 (fr) | 2008-11-27 |
Family
ID=39738920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/005803 WO2008108764A2 (fr) | 2007-03-06 | 2007-03-06 | Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2119092A4 (fr) |
JP (1) | JP2010520703A (fr) |
WO (1) | WO2008108764A2 (fr) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7203844B1 (en) | 2002-06-20 | 2007-04-10 | Oxford William V | Method and system for a recursive security protocol for digital copyright control |
US8438392B2 (en) | 2002-06-20 | 2013-05-07 | Krimmeni Technologies, Inc. | Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol |
US8588410B2 (en) | 2009-04-06 | 2013-11-19 | Elster Electricity, Llc | Simplified secure symmetrical key management |
US8509438B2 (en) * | 2010-01-29 | 2013-08-13 | Elster Solutions Llc | Key management in a wireless network using primary and secondary keys |
KR20150011802A (ko) * | 2012-03-20 | 2015-02-02 | 크림메니 테크놀로지스, 인크. | 프로세스 작업 세트 격리를 위한 방법 및 시스템 |
DE102015121861A1 (de) * | 2015-12-15 | 2017-06-22 | Endress + Hauser Flowtec Ag | Zugangsschlüssel für ein Feldgerät |
WO2024218781A1 (fr) * | 2023-04-21 | 2024-10-24 | Parth Shah | Chiffrement temporel récursif avec cryptographie |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6226742B1 (en) * | 1998-04-20 | 2001-05-01 | Microsoft Corporation | Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message |
US20020013772A1 (en) * | 1999-03-27 | 2002-01-31 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like |
US20020138435A1 (en) * | 2001-03-26 | 2002-09-26 | Williams L. Lloyd | Method and system for content delivery control using a parallel network |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
DE10224473A1 (de) * | 2001-06-18 | 2003-12-24 | Hans-Joachim Mueschenborn | Symmetrische und asymmetrische Verschlüsselungsverfahren mit beliebig wählbaren Einmalschlüsseln |
KR20040039443A (ko) * | 2001-09-27 | 2004-05-10 | 마쯔시다덴기산교 가부시키가이샤 | 암호화 장치, 복호화 장치, 비밀 키 생성 장치, 저작권보호 시스템, 및 암호 통신 장치 |
JP4248208B2 (ja) * | 2001-09-27 | 2009-04-02 | パナソニック株式会社 | 暗号化装置、復号化装置、秘密鍵生成装置、著作権保護システムおよび暗号通信装置 |
US7366302B2 (en) * | 2003-08-25 | 2008-04-29 | Sony Corporation | Apparatus and method for an iterative cryptographic block |
US20050172132A1 (en) * | 2004-01-30 | 2005-08-04 | Chen Sherman (. | Secure key authentication and ladder system |
CA2555793A1 (fr) * | 2004-02-13 | 2005-09-22 | Psycrypt, Inc. | Procede et appareil de traitement cryptographique de donnees |
WO2006080754A1 (fr) * | 2004-10-12 | 2006-08-03 | Information And Communications University Research And Industrial Cooperation Group | Procede de chiffrement de contenu, systeme et procede pour la fourniture de contenu a travers le reseau mettant en oeuvre le procede de chiffrement |
US7480385B2 (en) * | 2004-11-05 | 2009-01-20 | Cable Television Laboratories, Inc. | Hierarchical encryption key system for securing digital media |
JP2006222496A (ja) * | 2005-02-08 | 2006-08-24 | Matsushita Electric Ind Co Ltd | デジタル映像受信装置およびデジタル映像受信システム |
-
2007
- 2007-03-06 EP EP07772246A patent/EP2119092A4/fr not_active Withdrawn
- 2007-03-06 JP JP2009552649A patent/JP2010520703A/ja active Pending
- 2007-03-06 WO PCT/US2007/005803 patent/WO2008108764A2/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6226742B1 (en) * | 1998-04-20 | 2001-05-01 | Microsoft Corporation | Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message |
US20020013772A1 (en) * | 1999-03-27 | 2002-01-31 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out / checking in the digital license to / from the portable device or the like |
US20020138435A1 (en) * | 2001-03-26 | 2002-09-26 | Williams L. Lloyd | Method and system for content delivery control using a parallel network |
Also Published As
Publication number | Publication date |
---|---|
JP2010520703A (ja) | 2010-06-10 |
EP2119092A2 (fr) | 2009-11-18 |
WO2008108764A2 (fr) | 2008-09-12 |
EP2119092A4 (fr) | 2012-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009134937A3 (fr) | Systèmes cryptographiques préservant le format | |
WO2006126191A3 (fr) | Procede, dispositif et systeme de codage/decodage de donnees | |
WO2008108764A3 (fr) | Procédé et système pour un protocole de sécurité récursif pour un contrôle de droits d'auteur numérique | |
WO2008031109A3 (fr) | Système et procédé pour crypter des données | |
WO2010138865A3 (fr) | Etablissement de confiance entre des dispositifs à liaison aller seulement et des dispositifs de liaison non-aller seulement | |
TW200746773A (en) | Security considerations for the LTE of UMTS | |
WO2006091304A3 (fr) | Systeme et procede de gestion de droits numeriques par regions et fuseaux horaires | |
WO2007028099A3 (fr) | Hierarchie de cle efficace permettant de distribuer un contenu multimedia | |
SG148090A1 (en) | Content-protected digital link over a single signal line | |
WO2012122117A3 (fr) | Api de reproduction de contenu utilisant des flux cryptés | |
WO2008014326A3 (fr) | Systèmes et procédés d'actualisation d'un certificat racine | |
WO2003065639A3 (fr) | Systeme et procede de masquage de cles privees cryptographiques | |
TW200701728A (en) | Data-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module | |
WO2011012642A3 (fr) | Chiffrement et déchiffrement d'agent de collaboration | |
WO2005072225A3 (fr) | Systeme et procede de traitement securise d'emissions de donnees en continu | |
EP2503533A4 (fr) | Système de traitement de chiffrement, dispositif de génération de clé, dispositif de délégation de clé, dispositif de cryptage, dispositif de décryptage, procédé et programme de traitement de chiffrement | |
WO2010010336A3 (fr) | Chiffrement multiclavier | |
WO2008086241A3 (fr) | Procédé d'algorithme de cryptage et de décryptage (symétrique) à clé privée à deux chaînes | |
WO2008042175A3 (fr) | Système et procédé d'encapsulation de clé par cryptage | |
EP2628124A4 (fr) | Système et procédé de génération de clés de cryptage/décryptage et de cryptage/décryptage d'une oeuvre dérivée | |
GB201101471D0 (en) | A method, module and host | |
WO2014113132A3 (fr) | Procédé pour une comparaison sécurisée de symboles | |
WO2013002996A3 (fr) | Procédé et appareil de distribution de clé ayant une autorisation hors ligne implicite | |
WO2010011921A3 (fr) | Gestion http d'authentification et d'autorisation | |
WO2008154049A3 (fr) | Contrôle cryptographique d'accès à des documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07772246 Country of ref document: EP Kind code of ref document: A2 |
|
REEP | Request for entry into the european phase |
Ref document number: 2007772246 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007772246 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009552649 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |