发明名称 |
SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES |
摘要 |
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor. |
申请公布号 |
US2009327717(A1) |
申请公布日期 |
2009.12.31 |
申请号 |
US20080134113 |
申请日期 |
2008.06.05 |
申请人 |
INTERNATIONAL BUSINESS MACHINES CORPORATION |
发明人 |
JIN HONGXIA;LOTSPIECH JEFFREY BRUCE;ZIGORIS PHILIP ANASTASIOS |
分类号 |
H04L9/32;G06G7/62;G06N5/02 |
主分类号 |
H04L9/32 |
代理机构 |
|
代理人 |
|
主权项 |
|
地址 |
|