SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES
First Claim
1. A processor-implemented method of tracing a traitor from a circumvention device, the circumvention device comprising a set of compromised device keys obtained from the traitor, the method comprising:
- generating a hypothesized model on a hypothesized set of device keys that models a hypothesis that the circumvention device comprises the hypothesized set of device keys;
passing the hypothesized model to the subset tracing method to identify a compromised device key; and
removing the compromised key, adding new keys to the hypothesized set of keys and updating the hypothesized model until the MKB created on the hypothesized set of device keys disables the circumvention device.
5 Assignments
0 Petitions
Accused Products
Abstract
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
16 Citations
37 Claims
-
1. A processor-implemented method of tracing a traitor from a circumvention device, the circumvention device comprising a set of compromised device keys obtained from the traitor, the method comprising:
-
generating a hypothesized model on a hypothesized set of device keys that models a hypothesis that the circumvention device comprises the hypothesized set of device keys; passing the hypothesized model to the subset tracing method to identify a compromised device key; and removing the compromised key, adding new keys to the hypothesized set of keys and updating the hypothesized model until the MKB created on the hypothesized set of device keys disables the circumvention device. - View Dependent Claims (2, 11, 12)
-
-
3. A subset tracing method of identifying a compromised key from a circumvention device, the subset tracing method comprising:
-
generating a circumvention device model that models a behavior of a circumvention device; selecting a test based on the hypothesized model and the circumvention device model to apply to the circumvention device; receiving a response from the circumvention device, the response indicating a success of the test in playing a protected content on the circumvention device; updating the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model for selecting at least one test that identifies the compromised device keys obtained from the traitor; and testing the hypothesized model to determine the strength of the belief that the compromised device key is contained in the circumvention device. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 13, 14, 15, 16)
-
-
17. A computer program product having a plurality of executable instruction codes stored on a computer readable medium for tracing a traitor from a circumvention device, the circumvention device comprising at least one compromised device key obtained from the traitor, the computer program product comprising:
-
a set of instruction codes for generating a hypothesized model on a hypothesized set of device keys that models a hypothesis that the circumvention device comprises a hypothesized set of device keys; a set of instruction codes for passing the hypothesized model and invoking the subset tracing method to identify a compromised key; and a set of instruction codes for updating the hypothesized model. - View Dependent Claims (18, 22)
-
-
19. A computer program product having a plurality of executable instruction codes stored on a computer readable medium for tracing a traitor from a circumvention device, the circumvention device comprising at least one compromised device key obtained from the traitor, the computer program product comprising:
-
a set of instruction codes for generating a circumvention device model that models a behavior of the circumvention device; a set of instruction codes for selecting a test based on the hypothesized model and the circumvention device model to apply to the circumvention device; a set of instruction codes for receiving a response from the circumvention device, the response indicating a success of the test in playing a protected content on the circumvention device; a set of instruction codes for updating the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model for selecting at least one test that identifies the compromised device keys obtained from the traitor; and a set of instruction codes for testing the hypothesized model to determine the strength of the belief that the compromised device key is contained in the circumvention device. - View Dependent Claims (20, 21, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A processor-implemented system for tracing a traitor from a circumvention device, the circumvention device comprising at least one compromised device key obtained from the traitor, the system comprising:
-
means for generating a hypothesized model on a hypothesized set of device keys that models a hypothesis that the circumvention device comprises the hypothesized set of device keys; means for passing the hypothesized model to the subset tracing method to identify a compromised device key; and means for removing the compromised key, adding new keys to the hypothesized set of device keys and updating the hypothesized model until the MKB created on the hypothesized model can disable the circumvention device - View Dependent Claims (33)
-
-
34. A processor-implemented system for tracing a traitor from a circumvention device, the circumvention device comprising at least one compromised device key obtained from the traitor, the system comprising:
-
a circumvention device model module for generating a circumvention device model that models a behavior of the circumvention device; the circumvention device model module generating a circumvention device model that models a behavior of the circumvention device; a test selection module for selecting a test based on the hypothesized model and the circumvention device model to apply to the circumvention device; a hypothesis update module for receiving a response from the circumvention device, the response indicating a success of the test in playing a protected content on the circumvention device; the hypothesis update module updating the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model for selecting at least one test that identifies the compromised device keys obtained from the traitor; and a significance module for testing the hypothesized model to determine the strength of the belief that the compromised device key is contained in the circumvention device. - View Dependent Claims (35, 36)
-
-
37. A processor-implemented service for tracing a traitor from a circumvention device, the circumvention device comprising a set of compromised device keys obtained from the traitor, the service comprising:
-
generating a hypothesized model on a set of hypothesized device keys that models a hypothesis that the circumvention device comprises a hypothesized set of device keys; passing on the hypothesized model to the subset tracing and detecting a compromised device key; and updating the hypothesized model until the MKB created on the hypothesized set of keys can disable the circumvention device.
-
Specification