Patent application number | Description | Published |
20080279376 | SYSTEM, METHOD, AND SERVICE FOR PERFORMING UNIFIED BROADCAST ENCRYPTION AND TRAITOR TRACING FOR DIGITAL CONTENT - A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKB | 11-13-2008 |
20090049308 | Method for Effective Tamper Resistance - A system, method, and computer program product for preventing a malicious user from analyzing and modifying software content. The one-way functions used in prior art systems using dynamically evolving audit logs or self-modifying applications are replaced with a one-way function based on group theory. With this modification, untampered key evolution will occur inside a defined mathematical group such that all valid key values form a subgroup. However, if the program is altered, the key will evolve incorrectly and will no longer be a member of the subgroup. Once the key value is outside of the subgroup, it is not possible to return it to the subgroup. The present invention provides a limited total number of valid keys. The key evolution points are not restricted to locations along the deterministic path, so the key can be used in various novel ways to regulate the program's behavior, including in non-deterministic execution paths. | 02-19-2009 |
20090113549 | SYSTEM AND METHOD TO ANALYZE SOFTWARE SYSTEMS AGAINST TAMPERING - A system, article of manufacture and method is provided for determining the vulnerability to attack of a software system by generating a hybrid graph, the hybrid graph including an attack graph portion describing at least one potential attack goal on the software system and describing sub-attacks required to achieve the potential attack goal. The hybrid graph also includes a defense graph describing ways to defend against the potential sub-attacks. The hybrid attack-defense graph may be evaluated and a score may be calculated based on the evaluation. | 04-30-2009 |
20090113552 | System and Method To Analyze Software Systems Against Tampering - A system, article of manufacture and method is provided for determining the vulnerability to attack of a software system by generating a hybrid graph, the hybrid graph including an attack graph portion describing at least one potential attack goal on the software system and describing sub-attacks required to achieve the potential attack goal. The hybrid graph also includes a defense graph describing ways to defend against the potential sub-attacks. The hybrid attack-defense graph may be evaluated and a score may be calculated based on the evaluation. | 04-30-2009 |
20090214029 | Unified Broadcast Encryption System - A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media. | 08-27-2009 |
20090214031 | UNIFIED BROADCAST ENCRYPTION SYSTEM - A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media. | 08-27-2009 |
20090287679 | Evaluation of tamper resistant software system implementations - According to one embodiment of the present invention, a method for evaluating a software system includes defining a rating of the tamper resistance of a software system and breaking down the rating into a plurality of metrics relevant to the tamper resistance of the software system. A score may then be calculated for each metric and the scores may be combined into a composite score for the rating. | 11-19-2009 |
20090319227 | ADAPTIVE TRAITOR TRACING - One embodiment of the present invention includes a method for traitor tracing that selects a probability distribution for the assignment of file-segment variations in a digital file. This probability distribution is selected to improve traceability for a particular size of a coalition of attackers. At least one symbol for each file-segment variation is then distributed based on the selected probability distribution. | 12-24-2009 |
20090320130 | TRAITOR DETECTION FOR MULTILEVEL ASSIGNMENT - One embodiment of the present invention includes a method for traitor tracing that includes performing an inner code traitor tracing on a recovered pirated digital file, the recovered digital file incorporating an inner code for assigning segments of the digital file and an outer code for assigning inner codes to individual digital files. The method also includes extracting partial information regarding the outer code from the inner code tracing. An outer code tracing procedure may then be performed using the partial information. | 12-24-2009 |
20090323936 | SYSTEM, METHOD, AND SERVICE FOR PERFORMING UNIFIED BROADCAST ENCRYPTION AND TRAITOR TRACING FOR DIGITAL CONTENT - A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKB | 12-31-2009 |
20090327717 | SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES - A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor. | 12-31-2009 |
20100040231 | Security Classes in a Media Key Block - According to one embodiment of the present invention, a method for broadcast encryption with security classes in a media key block is provided. In one embodiment the method includes receiving encrypted media of a first and a second class, where the media includes a common media key block, in a device of a first class and in a device of a second class. A first media key is calculated from the common media key block in the device of a first class. A first media key precursor is calculated from the common media key block in the device of a second class. The first media precursor may be used to decrypt media of a first class. The first media precursor may also be used to calculate a second media key in the device of a second class to decrypt content of a first class. | 02-18-2010 |
20100183148 | RECORDING KEYS IN A BROADCAST-ENCRYPTION-BASED SYSTEM - According to one embodiment of the present invention, a method for protecting content in a broadcast-encryption-based system, where the devices in the system receive a recording key table. Each device generates a set of recording keys from the recording key table using a media key variant calculated from the broadcast encryption system's media key block. The digital content is encrypted in a title key picked by the recorder. The selected title key is also encrypted in each one of the recorder's generated recording keys. To play back the content, a player uses one of its generated recording keys to decrypt the title key and the decrypt the content. The recording key table is designed so that any two devices are guaranteed to have at least one key in common during normal operation, although during a forensic situation, this rule can be abandoned. | 07-22-2010 |
20110137916 | SYSTEM AND METHOD FOR SYNCHRONIZED CONTENT DIRECTORIES ON CLUSTER DEVICES - According to embodiments of the invention, a system, method and computer program product for a computer program product for synchronizing content directories on cluster devices are provided. Embodiments generate a binary tree for each device in a cluster of devices, the binary tree representing the locations of all copies of content residing in the device. The binary tree for a plurality of other devices in the cluster may be stored in each device the binary tree. The binary trees for the plurality of other devices may be used to determine availability of content and the available content may be displayed to a user. | 06-09-2011 |
20110158404 | REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS - According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device. | 06-30-2011 |
20110185023 | CONTENT USAGE TRACKING IN SUPERDISTRIBUTION - According to one embodiment of the present invention, a method for tracking the usage of digital content is provided. The method includes tracking the usage of at least one digital content by having a provider computer system prepare the content in an encoded format and allowing the provider computer system to distribute the content to a user computer system. The user computer system is made to generate at least one usage tracking message in response to the usage of the content by the user computer system in a uniform, fine-grained and format independent way. The user computer system is enabled to report the usage tracking message to the provider computer system. The provider computer system verifies the usage tracking message. | 07-28-2011 |
20120016875 | PERSONALIZED DATA SEARCH UTILIZING SOCIAL ACTIVITIES - Embodiments relate personalized data searches utilizing social activities. In one embodiment, a search query is received from a user. A set of search results that satisfy the search query is received from a search engine. A user interest profile associated with the user is identified. The user interest profile includes information associated with a set of activities performed by the user on one or more social systems. A ranking score is assigned to each result in at least a subset of search results in the set of search results based at least on the user interest profile. The subset of search results are sorted based on the score that has assigned to each result in the subset of results. The subset of search results that has been sorted is sent to the user. | 01-19-2012 |
20120016885 | ADAPTIVE AND PERSONALIZED TAG RECOMMENDATION - Embodiments of the invention relate to techniques for personalized tag recommendation for enterprise social bookmarking systems. According to one embodiment of the invention, a method comprises computing at least one set of candidate tags for a document in accordance with at least one factor, and combining the at least one set of candidate tags from different factors into an overall recommendation list of candidate tags. At least one suggested tag from the overall recommendation list is returned as a result of the combination. At least one applied tag that is applied to the document by a user of a computer system is recorded, and the combination is adjusted based on the at least one applied tag. | 01-19-2012 |
20120036578 | TRACING TRAITOR COALITIONS AND PREVENTING PIRACY OF DIGITAL CONTENT IN A BROADCAST ENCRYPTION SYSTEM - Embodiments of the invention relate to finding coalitions of receivers who collude to produce pirated protected content, then evaluates the confidence that particular members of each identified coalition are traitors versus innocent receivers incriminated by chance. Typically, each file in a group of original files is modified to include variations of critical file segments. The group of files is then broadcast with individualized codes that enable particular authorized receivers to properly process the modified files. The modifications in a pirated version of a file can identify which traitorous receivers contributed to its piracy. Candidate coalitions of differing size are first evaluated to determine if they cover observed file variations with greater than a predetermined likelihood that an innocent coalition is falsely incriminated by chance. Individual members of satisfactory coalitions are then evaluated. Traitors may be cryptographically revoked. | 02-09-2012 |
20120042366 | SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS - Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider is logged onto a computer system in a physical area assigned to the patient. Whether the health care provider is logged onto the computer system during working hours of the provider is also ascertained. The health care provider is provided with access to the electronic record of the patient via the computer system if the determining resolves to true and the ascertaining resolves to true. | 02-16-2012 |
20120222093 | PARTIAL AUTHENTICATION FOR ACCESS TO INCREMENTAL DATA - Embodiments of the invention relate to partial authentication to access incremental information. An aspect of the invention concerns a method of authorizing access to information that comprises providing an initial segment of a password wherein the password includes password segments each associated with an incremental portion of the information. In response to the initial password segment satisfying an expected value, the method may authorize access to the information portion associated with the initial password segment. The method may authorize access to other information portions associated with subsequent segments of the password in response to the subsequent password segments satisfying respectively expected values. | 08-30-2012 |
20120317135 | MITIGATION OF DATA LEAKAGE IN A MULTI-SITE COMPUTING INFRASTRUCTURE - Embodiments of the invention relate to a method, system, and computer program product to dynamically mitigate data leakage in a file sharing environment. Mandatory access control policies are provided to address and maintain restrictions on file sharing both with respect to security rules of an organization and restrictions pertaining to discretionary sharing decisions. In addition, suggestions for potential recipients for file sharing are supported, as well as examination of abnormal recipients in response to the discretionary sharing decisions. | 12-13-2012 |
20120323607 | SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS - Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider is logged onto a computer system in a physical area assigned to the patient. Whether the health care provider is logged onto the computer system during working hours of the provider is also ascertained. The health care provider is provided with access to the electronic record of the patient via the computer system if the determining resolves to true and the ascertaining resolves to true. | 12-20-2012 |
20130013641 | INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT - Embodiments of the invention relate to a method for intelligently providing consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions. | 01-10-2013 |
20130014278 | INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT - Embodiments of the invention relate to a system and computer program product to intelligently provide consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions. | 01-10-2013 |
20130018921 | NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISKAANM JIN; HongxiaAACI San JoseAAST CAAACO USAAGP JIN; Hongxia San Jose CA USAANM WANG; QihuaAACI San JoseAAST CAAACO USAAGP WANG; Qihua San Jose CA US - Embodiments of the invention related to access control to sensitive data records, and in particular need-to-know information access using quantified risk. In one aspect of the invention access control includes retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. A warning is issued if the aggregated total risk score for any of the plurality of users exceeds a risk-tolerance threshold. | 01-17-2013 |
20130232582 | NEED-TO-KNOW INFORMATION ACCESS USING QUANTIFIED RISK - Access control can include retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time. The access patterns are derived based on said accesses and the derived access patterns are stored. A risk score is computed, for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose, and the risk scores are stored. An aggregated total risk score for each of the plurality of users is created based on each respective user's computed risk score in a specified number of recent periods of time. A risk tolerance threshold is determined based on the aggregated total risk score for each of the plurality of users. | 09-05-2013 |
20130325861 | Data Clustering for Multi-Layer Social Link Analysis - Embodiments of the invention relate to a modeling activity area associated with groups of data items. Tools are provided to profile activity area involvement, both from the data item and from associated participants. The data items are placed into clusters and one or more activity areas are derived from the formed clusters. Each activity area is defined from the perspective of a single user. Participants in an activity area are connected to a user, but not necessarily to each other. The combination of formations of clusters and activity areas provides a multi-facetted organization of connections between data items and associated participants. | 12-05-2013 |
20130325863 | Data Clustering for Multi-Layer Social Link Analysis - Embodiments of the invention relate to a modeling activity area associated with groups of data items. Tools are provided to profile activity area involvement, both from the data item and from associated participants. The data items are placed into clusters and one or more activity areas are derived from the formed clusters. Each activity area is defined from the perspective of a single user. Participants in an activity area are connected to a user, but not necessarily to each other. The combination of formations of clusters and activity areas provides a multi-facetted organization of connections between data items and associated participants. | 12-05-2013 |
20130325866 | Community Profiling for Social Media - Embodiments of the invention relate to modeling communities associated with groups of data items. Tools are provided to iteratively assign data items to communities and to update topic and participant distribution in the assigned communities. As the distributions are updated, the characteristics of the communities are updated. Each activity area is defined from the perspective of a single user. Participants in a community are connected to a user, but not necessarily to each other. The combination of formations of communities and the statistical aspect of evaluating characteristics of the communities provides a multi-facetted organization of connections between data items and associated participants. | 12-05-2013 |
20130325923 | Intelligent Attention Management for Unified Messaging - Embodiments of the invention relate to a method, system, and computer program product to group and prioritize communications. Attention reports are automatically generated with representative communications displayed to a user for processing. As new communications are received, they are adaptively incorporated into the groupings and prioritization, together with previously received and processed communications. | 12-05-2013 |
20130325953 | Community Profiling for Social Media - Embodiments of the invention relate to modeling communities associated with groups of data items. Tools are provided to iteratively assign data items to communities and to update topic and participant distribution in the assigned communities. As the distributions are updated, the characteristics of the communities are updated. Each activity area is defined from the perspective of a single user. Participants in a community are connected to a user, but not necessarily to each other. The combination of formations of communities and the statistical aspect of evaluating characteristics of the communities provides a multi-facetted organization of connections between data items and associated participants. | 12-05-2013 |
20140025368 | Fixing Broken Tagged Words - Embodiments of the invention relate to a method, system, and computer program product to identify broken tag words of a data item and to replace the broken tag words with a compound word. Data items that have at least two tag words are examined to determine if the tag words are broken elements of a compound word. A computational assessment is conducted to determine a relationship between a set of compound words and an examined data item. Based upon the computational assessment a set of broken tag words may be replaced with a related compound word. | 01-23-2014 |
20140025373 | Fixing Broken Tagged Words - Embodiments of the invention relate to a method for identifying broken tag words of a data item and replacing the broken tag words with a compound word. Data items that have at least two tag words are examined to determine if the tag words are broken elements of a compound word. A computational assessment is conducted to determine a relationship between a set of compound words and an examined data item. Based upon the computational assessment a set of broken tag words may be replaced with a related compound word. | 01-23-2014 |
20140041039 | VECTORIAL PRIVATE EQUALITY TESTING - A system for equality testing, the system comprising a first client device including a first private data unit, a second client device including a second private data unit, and a server. The server receives a first obfuscated data unit corresponding to the first private data unit from the first client device, and a second obfuscated data unit corresponding to the second private data unit from the second client device. The server performs a vector calculation based on the first and second obfuscated data units to generate a combination of the first and second obfuscated data units. The server sends the combination to the first client device. The first client device is configured to determine whether the first private data unit is equal to the second private data unit based on the combination. | 02-06-2014 |
20140082740 | COMPUTING SYSTEM WITH PRIVACY MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: an initialization module configured to generate initial sharing options; a rating analysis module, coupled to the initialization module, configured to generate a privacy score and a benefit score with a control unit for one or more of the initial sharing options; a mapping module, coupled to the rating analysis module, configured to generate a map based on the initial sharing options, the privacy score, and the benefit score; and a tuning module, coupled to the mapping module, configured to: analyze an initial distribution of the map, and generate the tuned sharing options based on the initial distribution for displaying on a device. | 03-20-2014 |
20140237623 | COMPUTING SYSTEM WITH PROTOCOL PROTECTION MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a control unit configured to: determine a protocol profile including a first protocol and a second protocol for communicating between a first device and a second device, generate a unified-protocol privacy mechanism for a privacy protection scenario, the unified-protocol privacy mechanism based on combining the first protocol and the second protocol; and a communication unit, coupled to the control unit, configured to communicate content information according to the unified-protocol privacy mechanism between the first device and the second device. | 08-21-2014 |
20140280152 | COMPUTING SYSTEM WITH RELATIONSHIP MODEL MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a contact identification module configured to identify a contact-profile for representing a contact; a recording module, coupled to the contact identification module, configured to identify an interaction with the contact; a clustering module, coupled to the recording module, configured to generate a category cluster from processing the interaction; and a relationship modeling module, coupled to the clustering module, configured to generate a connection model including the category cluster for characterizing the interaction with the contact for displaying on a device. | 09-18-2014 |
20140281532 | INFORMATION DELIVERY SYSTEM WITH ADVERTISING MECHANISM AND METHOD OF OPERATION THEREOF - An information delivery system includes: a control unit configured to: generate an anonymous identity for concealing client information of an anonymous client from a provider, generate a comparison result for determining whether a client encryption data of the anonymous identity matches with a provider encryption data of the provider, obtain a provider notification based on the comparison result of a match for displaying on a device, and a user interface, coupled to the control unit, configured to display the provider notification. | 09-18-2014 |
20140283101 | COMPUTING SYSTEM WITH PRIVACY MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes a context module configured to determine a sharing context; an option module, coupled to the context module, configured to generate a sharing option for the sharing context based on a default set for the sharing context, a user's past sharing selection for the sharing context, and a personalization degree for the sharing context; and a privacy preference module, coupled to the option module, configured to estimate a user's privacy preference based on the sharing option. | 09-18-2014 |
20150067883 | COMPUTING SYSTEM WITH IDENTITY PROTECTION MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a communication unit configured to access a target account including a feature; a control unit, coupled to the communication unit, configured to: calculate a comparison result based on the feature, determine an anonymity threshold for conforming the target account with a comparison account, and determine the feature for the target account based on the comparison result and the anonymity threshold for displaying on a device. | 03-05-2015 |