首页> 外国专利> System, method, and service for tracing traitors from content protection circumvention devices

System, method, and service for tracing traitors from content protection circumvention devices

机译:从内容保护规避设备追踪叛徒的系统,方法和服务

摘要

A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
机译:叛徒追踪系统生成一个规避设备的假设模型,该模型对被规避设备损害的一组假设的设备密钥进行建模。该系统迭代地调用子集跟踪系统以识别受感染的设备密钥,直到识别出一组受损害的设备密钥中的基本上所有受损害的设备密钥,以禁用该规避设备。子集跟踪系统生成一个规避设备模型,该模型使用先验知识对规避设备的行为进行建模,然后系统根据假设模型和规避设备模型迭代地选择测试并将其应用于规避设备,并从规避设备接收响应表示测试成功播放了规避设备上的受保护内容。系统使用接收到的响应,所选测试,假设模型的当前版本以及规避设备模型的当前版本来更新假设模型,以使测试选择过程集中在确定从叛徒获得的设备密钥上。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号