1
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Method and apparatus for preventing piracy of digital content. Crypotography Research, Joseph Yang, Thomas R Lane, Skadden Arps, September 11, 2001: US06289455 (324 worldwide citation)

A secure cryptographic rights unit for cryptographically regulating access to digital content includes an interface control processor and a specialized cryptographic unit that protects access to a memory. Rights keys, which allow access to content, are added by the cryptographic unit by transforming ...


2
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, August 21, 2001: US06278783 (147 worldwide citation)

Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit key ...


3
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun, Carter C Laren, Peter K Pearson, Nathaniel J Lawson: Self-protecting digital content. Rovi Solutions Corporation, Schwegman Lundberg & Woessner P A, July 26, 2011: US07987510 (144 worldwide citation)

Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the ...


4
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Digital content protection method and apparatus. Cryptography Research, Joseph Yang, Skadden Arps, October 28, 2003: US06640305 (140 worldwide citation)

Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resi ...


5
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun, Carter C Laren, Peter K Pearson, Nathaniel J Lawson: Reprogrammable security for controlling piracy and enabling interactive content. Irdeto USA, Hayes Soloway P C, October 29, 2013: US08571993 (135 worldwide citation)

Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the ...


6
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Using unpredictable information to minimize leakage from smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps et al, December 4, 2001: US06327661 (102 worldwide citation)

Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. This is generally accomplished by incorporating unpredictable information into the cryptographic pro ...


7
Joshua M Jaffe, Paul C Kocher, Benjamin C Jun: Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, January 21, 2003: US06510518 (60 worldwide citation)

Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcards and many ...


8
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun, Carter C Laren, Peter K Pearson, Nathaniel J Lawson: Reprogrammable security for controlling piracy and enabling interactive content. Rovi Solutions Corporation, Schwegman Lundberg & Woessner P A, November 8, 2011: US08055910 (59 worldwide citation)

Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disk (200) carries an encrypted digital video title combined with data processing operations that implement the title's ...


9
Joshua M Jaffe, Paul C Kocher, Benjamin C Jun: Hardware-level mitigation and DPA countermeasures for cryptographic devices. Cryptography Research, Joseph Yang, Skadden Arps, November 25, 2003: US06654884 (53 worldwide citation)

Differential power analysis is a powerful cryptanalytic method that can be used to extract secret keys from cryptographic hardware during operation. To reduce the risk of compromise, cryptographic hardware can employ countermeasures to reduce the amount of secret information that can be deduced by p ...


10
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Prevention of side channel attacks against block cipher implementations and other cryptographic systems. Cryptography Research, Michael A Glenn, Glenn Patent Group, August 31, 2010: US07787620 (23 worldwide citation)

Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit key ...