Peter Pearson (born March 13, 1938 in Toronto, Ontario) is a Canadian film director and screenwriter. Contents. 1 Biography; 2 Selected filmography ...
Paul Carl Kocher - San Francisco CA, US Joshua Michael Jaffe - San Francisco CA, US Benjamin Che-Ming Jun - Oakland CA, US Matthew Thomas Carter - San Leandro CA, US Peter Kelley Pearson - Aptos CA, US
Assignee:
Rovi Solutions Corporation - Santa Clara CA
International Classification:
H04L 9/00
US Classification:
380202, 713193, 726 33
Abstract:
In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player. Features to enable migration from legacy formats are also provided.
Paul Carl Kocher - San Francisco CA, US Joshua Michael Jaffe - San Francisco CA, US Benjamin Che-Ming Jun - Oakland CA, US Matthew Thomas Carter - San Leandro CA, US Peter Kelley Pearson - Aptos CA, US
Assignee:
Rovi Solutions Corporation - Santa Clara CA
International Classification:
G06F 21/06 H04L 9/18
US Classification:
380202, 713176, 725 34
Abstract:
In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player. Features to enable migration from legacy formats are also provided.
Paul Carl Kocher - San Francisco CA, US Joshua Michael Jaffe - San Francisco CA, US Benjamin Che-Ming Jun - Oakland CA, US Matthew Thomas Carter - San Leandro CA, US Peter Kelley Pearson - Aptos CA, US
Assignee:
Rovi Solutions Corporation - Santa Clara CA
International Classification:
G06F 21/00 H04L 9/06
US Classification:
380210, 725 25, 705 56, 713193
Abstract:
In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player. Features to enable migration from legacy formats are also provided.
Paul Carl Kocher - San Francisco CA, US Joshua Michael Jaffe - San Francisco CA, US Benjamin Che-Ming Jun - Oakland CA, US Carter Cyrus Laren - San Leandro CA, US Peter Kelley Pearson - Aptos CA, US Nathaniel James Lawson - Oakland CA, US
Assignee:
Rovi Solutions Corporation - Santa Clara CA
International Classification:
G06F 7/04
US Classification:
726 27, 726 28, 726 29
Abstract:
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e. g. , a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
Paul C. Kocher - San Francisco CA, US Joshua M. Jaffe - San Francisco CA, US Benjamin C. Jun - Menlo Park CA, US Carter C. Laren - San Francisco CA, US Peter K. Pearson - Livermore CA, US Nathaniel J. Lawson - Oakland CA, US
Assignee:
Rovi Solutions Corporation - Santa Clara CA
International Classification:
G06F 7/04
US Classification:
726 27, 726 28, 726 29
Abstract:
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e. g. , a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
Reprogrammable Security For Controlling Piracy And Enabling Interactive Content
Paul C. Kocher - San Francisco CA, US Joshua M. Jaffe - San Francisco CA, US Benjamin C. Jun - Oakland CA, US Carter C. Laren - Castro Valley CA, US Peter K. Pearson - Aptos CA, US Nathaniel J. Lawson - Oakland CA, US
Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disk () carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e. g. , a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations (), access secure non-volatile storage, submit data to CODECs for output (), and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
Reprogrammable Security For Controlling Piracy And Enabling Interactive Content Using Revocation Status
Paul Carl Kocher - San Francisco CA, US Joshua Michael Jaffe - San Francisco CA, US Benjamin Che-Ming Jun - Oakland CA, US Carter Cyrus Laren - San Leandro CA, US Peter Kelley Pearson - Aptos CA, US Nathaniel James Lawson - Oakland CA, US
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e. g. , a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
Reprogrammable Security For Controlling Piracy And Enabling Interactive Content
Paul C. Kocher - San Francisco CA, US Joshua M. Jaffe - San Francisco CA, US Benjamin C. Jun - Oakland CA, US Carter C. Laren - Castro Valley CA, US Peter K. Pearson - Aptos CA, US Nathaniel J. Lawson - Oakland CA, US
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e. g. , a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies. If pirates compromise a player or title, future content can be mastered with security features that, for example, block the attack, revoke pirated media, or use native code to correct player vulnerabilities.
Owner and Co-Director at The Couples Institute, Private Practice at The Couples Institute
Location:
San Francisco Bay Area
Industry:
Mental Health Care
Work:
The Couples Institute - Menlo Park, CA since 1985
Owner and Co-Director
The Couples Institute - Menlo Park, CA since 1979
Private Practice
Stanford University 1989 - 2002
Consulting Associate Professor, Department of Education
Ward & Associates May 1984 - Feb 1985
Consultant Executive Outplacement
El Camino Hospital - Mountain View, CA 1981 - 1984
Chief Psychologist of the CONCERN Program
Education:
University of Southern Mississippi 1970 - 1972
Doctor of Philosophy (Ph.D.), Counseling Psychology
Indiana State University 1967 - 1969
Master of Science (M.S.), Psychology
Northwest Missouri State University 1962 - 1966
Bachelor of Science (B.S.), Social Science
Interests:
Tennis, traveling
Certifications:
Psychologist, State Board of Psychologists California
at large since Sep 2001
Cryptographic Consultant
Cryptography Research, Inc. Dec 1999 - Sep 2001
Senior Cryptologist
Certicom Apr 1999 - Nov 1999
Security Engineer
Uptronics Jan 1995 - Mar 1999
Senior Cryptologist
Lawrence Livermore National Laboratory Sep 1982 - Dec 1994
Scientist / Software Engineer