Cryptography – Key management
Reexamination Certificate
2011-07-26
2011-07-26
Arani, Taghi T (Department: 2438)
Cryptography
Key management
C380S030000, C380S200000, C703S013000, C705S052000, C726S026000
Reexamination Certificate
active
07986787
ABSTRACT:
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
REFERENCES:
patent: 6304833 (2001-10-01), Ferkinhoff et al.
patent: 7007162 (2006-02-01), Lotspiech
patent: 7039803 (2006-05-01), Lotspiech et al.
patent: 2001/0034712 (2001-10-01), Colvin
patent: 2002/0133701 (2002-09-01), Lotspiech et al.
patent: 2003/0070003 (2003-04-01), Chong et al.
patent: 2006/0153377 (2006-07-01), Arditti Modiano
patent: 2006/0195415 (2006-08-01), Meyer
patent: 2007/0033419 (2007-02-01), Kocher et al.
patent: 2008/0075287 (2008-03-01), Boneh et al.
Moni Naor and Benny Pinkas “Threshold Traitor Tracing” Published by H. Krawczyk : CRYPT0'98 LNCS 1462, pp. 502-517, 1998.
Naor, D., et al., “Revocation and Tracing Schemes for Stateless Receivers,” Crypto 2001, LNCS vol. 2139, pp. 41-62, 2001.
Vomlel, Jiri, “Bayesian networks in Mastermind,” Proceeding of the 7th Czech-Japan Seminar, Awaji Island, Japan, 2004.
Rish, Irina, “Adaptive Diagnosis in Distributed Systems,” IEEE Transactions on Neural Networks, vol. 16, No. 5, Sep. 2005, pp. 1088-1109.
Judea Pearl, “Casuality: models, reasoning, and inference”, Cambridge University Press, 2000; ISBN 0-521-77362-8.
Office Action dated Nov. 9, 2010 from related U.S. Appl. No. 12/134,113.
Jin Hongxia
Lotspiech Jeffrey Bruce
Zigoris Philip Anastasios
Arani Taghi T
International Business Machines - Corporation
Lee Jason
Shimokaji & Associates PC
LandOfFree
System, method, and service for tracing traitors from... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System, method, and service for tracing traitors from..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System, method, and service for tracing traitors from... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2692138