Patents by Inventor Peter K. Pearson
Peter K. Pearson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8949624Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: July 1, 2011Date of Patent: February 3, 2015Assignee: Irdeto USA, Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Patent number: 8571993Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: June 17, 2011Date of Patent: October 29, 2013Assignee: Irdeto USA, Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Patent number: 8055910Abstract: Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disk (200) carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations (225), access secure non-volatile storage, submit data to CODECs for output (250), and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: July 7, 2004Date of Patent: November 8, 2011Assignee: Rovi Solutions CorporationInventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Publication number: 20110264923Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: July 1, 2011Publication date: October 27, 2011Applicant: Rovi Solutions CorporationInventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Publication number: 20110255690Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: June 17, 2011Publication date: October 20, 2011Applicant: Rovi Solutions CorporationInventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Patent number: 7987510Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: July 7, 2003Date of Patent: July 26, 2011Assignee: Rovi Solutions CorporationInventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Publication number: 20080137848Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: October 31, 2007Publication date: June 12, 2008Applicant: Cryptography Research, Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Publication number: 20080130886Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: ApplicationFiled: October 31, 2007Publication date: June 5, 2008Applicant: Cryptography Research, Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Matthew T. Carter, Peter K. Pearson
-
Publication number: 20080133938Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: October 31, 2007Publication date: June 5, 2008Applicant: Cryptography Research, Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Publication number: 20040133794Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: July 7, 2003Publication date: July 8, 2004Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Carter C. Laren, Peter K. Pearson, Nathaniel J. Lawson
-
Publication number: 20020141582Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: ApplicationFiled: March 27, 2002Publication date: October 3, 2002Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun, Matthew T. Carter, Peter K. Pearson
-
Patent number: 6038315Abstract: A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment.Type: GrantFiled: March 17, 1997Date of Patent: March 14, 2000Assignee: The Regents of the University of CaliforniaInventors: Robert S. Strait, Peter K. Pearson, Sailes K. Sengupta