×

SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES

  • US 20090327717A1
  • Filed: 06/05/2008
  • Published: 12/31/2009
  • Est. Priority Date: 12/08/2006
  • Status: Active Grant
First Claim
Patent Images

1. A processor-implemented method of tracing a traitor from a circumvention device, the circumvention device comprising a set of compromised device keys obtained from the traitor, the method comprising:

  • generating a hypothesized model on a hypothesized set of device keys that models a hypothesis that the circumvention device comprises the hypothesized set of device keys;

    passing the hypothesized model to the subset tracing method to identify a compromised device key; and

    removing the compromised key, adding new keys to the hypothesized set of keys and updating the hypothesized model until the MKB created on the hypothesized set of device keys disables the circumvention device.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×