System, method, and service for tracing traitors from...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S030000, C380S200000, C703S013000, C705S052000, C726S026000

Reexamination Certificate

active

07986787

ABSTRACT:
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.

REFERENCES:
patent: 6304833 (2001-10-01), Ferkinhoff et al.
patent: 7007162 (2006-02-01), Lotspiech
patent: 7039803 (2006-05-01), Lotspiech et al.
patent: 2001/0034712 (2001-10-01), Colvin
patent: 2002/0133701 (2002-09-01), Lotspiech et al.
patent: 2003/0070003 (2003-04-01), Chong et al.
patent: 2006/0153377 (2006-07-01), Arditti Modiano
patent: 2006/0195415 (2006-08-01), Meyer
patent: 2007/0033419 (2007-02-01), Kocher et al.
patent: 2008/0075287 (2008-03-01), Boneh et al.
Moni Naor and Benny Pinkas “Threshold Traitor Tracing” Published by H. Krawczyk : CRYPT0'98 LNCS 1462, pp. 502-517, 1998.
Naor, D., et al., “Revocation and Tracing Schemes for Stateless Receivers,” Crypto 2001, LNCS vol. 2139, pp. 41-62, 2001.
Vomlel, Jiri, “Bayesian networks in Mastermind,” Proceeding of the 7th Czech-Japan Seminar, Awaji Island, Japan, 2004.
Rish, Irina, “Adaptive Diagnosis in Distributed Systems,” IEEE Transactions on Neural Networks, vol. 16, No. 5, Sep. 2005, pp. 1088-1109.
Judea Pearl, “Casuality: models, reasoning, and inference”, Cambridge University Press, 2000; ISBN 0-521-77362-8.
Office Action dated Nov. 9, 2010 from related U.S. Appl. No. 12/134,113.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System, method, and service for tracing traitors from... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System, method, and service for tracing traitors from..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System, method, and service for tracing traitors from... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2692138

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.