×

System, method, and service for tracing traitors from content protection circumvention devices

  • US 8,023,655 B2
  • Filed: 06/05/2008
  • Issued: 09/20/2011
  • Est. Priority Date: 12/08/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A processor implemented method of tracing a traitor from a circumvention device comprising:

  • generating a hypothesized model on a hypothesized set of device keys that models a hypothesis that the circumvention device comprises the hypothesized set of device keys;

    identifying a compromised device key;

    removing the compromised key, adding new keys to the hypothesized set of keys and updating the hypothesized model until a media key block (MKB) created on the hypothesized set of device keys disables the circumvention device;

    iteratively detecting additional compromised device keys from the set of compromised device keys, until a majority of the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device;

    generating probabilities of the newly added keys being in the circumvention device;

    generating a circumvention device model that models a behavior of a circumvention device, wherein the circumvention device comprises a plurality of compromised device keys; and

    the circumvention device incorporates predetermined hypotheses regarding hypothetical compromised keys,wherein the circumvention device model includes a set of tests from which the test is selected, a set of key sets comprising one key set for each of the set of tests, and a respective probability for each of the key sets indicating likelihood, based on history of iterative tests including said set of tests, that the circumvention device will play the one of the set of tests associated with the key set;

    storing a history of the set of tests;

    selecting a test based on a hypothesized model and the circumvention device model to apply to the circumvention device;

    encrypting the selected test;

    receiving a response from the circumvention device, the response indicating success of the selected test in playing a protected content on the circumvention device;

    updating the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model for selecting at least one test that identifies the compromised device keys obtained from the traitor; and

    testing the hypothesized model to determine the strength of the belief that the compromised device key is contained in the circumvention device.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×