An Entity of Type: Application106570110, from Named Graph: http://dbpedia.org, within Data Space: dbpedia.org

Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers.In a traitor tracing scheme, each customer is given a different personal decryption key.(Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.)

Property Value
dbo:abstract
  • Skema Pelacakan peretas membantu melacak sumber kebocoran ketika data rahasia atau kepemilikan dijual ke banyak pelanggan. Dalam skema pelacakan peretas, setiap pelanggan diberikan kunci dekripsi pribadi yang berbeda. (Skema pelacakan peretas sering digabungkan dengan sistem akses bersyarat sehingga setelah algoritme penelusuran peretas mengidentifikasi kunci dekripsi pribadi yang terkait dengan kebocoran, distributor konten dapat mencabut kunci dekripsi pribadi tersebut, memungkinkan pelanggan yang jujur untuk terus menonton televisi berbayar sementara peretas dan semua pengguna yang tidak sah menggunakan kunci dekripsi pribadi peretas terputus.) Skema pelacakan peretas dipakai di televisi berbayar untuk mencegah pirate decryption – untuk mencegah pelanggan yang sah memberikan kunci dekripsi. Skema pelacakan peretas tidak efektif jika peretas menyiarkan ulang seluruh konten asli (yang didekripsi). Ada jenis skema lain yang mencegah siaran ulang pirate decryption – yaitu, mencegah pelanggan yang sah memberikan konten asli yang didekripsi. Skema lain ini menggunakan penandaairan digital tahan kerusakan untuk menghasilkan versi berbeda dari konten asli. Skema penugasan kunci pelacakan peretast dapat diterjemahkan ke dalam skema penandaairan digital semacam itu. Pelacakan peretas adalah sistem deteksi pelanggaran hak cipta yang bekerja dengan melacak sumber file yang bocor daripada dengan langsung. Metodenya adalah distributor menambahkan salt unik ke setiap salinan yang diberikan. Ketika salinannya bocor ke publik, distributor dapat memeriksa nilainya dan melacaknya kembali ke "kebocoran". (in)
  • Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers.In a traitor tracing scheme, each customer is given a different personal decryption key.(Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.) Traitor tracing schemes are used in pay television to discourage pirate decryption – to discourage legitimate subscribers from giving away decryption keys.Traitor tracing schemes are ineffective if the traitor rebroadcasts the entire (decrypted) original content.There are other kinds of schemes that discourages pirate rebroadcast – i.e., discourages legitimate subscribers from giving away decrypted original content. These other schemes use tamper-resistant digital watermarking to generate different versions of the original content. Traitor tracing key assignment schemes can be translated into such digital watermarking schemes. Traitor tracing is a copyright infringement detection system which works by tracing the source of leaked files rather than by direct copy protection. The method is that the distributor adds a unique salt to each copy given out. When a copy of it is leaked to the public, the distributor can check the value on it and trace it back to the "leak". (en)
dbo:wikiPageID
  • 1790556 (xsd:integer)
dbo:wikiPageLength
  • 10405 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID
  • 1115559855 (xsd:integer)
dbo:wikiPageWikiLink
dbp:wikiPageUsesTemplate
dct:subject
gold:hypernym
rdf:type
rdfs:comment
  • Skema Pelacakan peretas membantu melacak sumber kebocoran ketika data rahasia atau kepemilikan dijual ke banyak pelanggan. Dalam skema pelacakan peretas, setiap pelanggan diberikan kunci dekripsi pribadi yang berbeda. (Skema pelacakan peretas sering digabungkan dengan sistem akses bersyarat sehingga setelah algoritme penelusuran peretas mengidentifikasi kunci dekripsi pribadi yang terkait dengan kebocoran, distributor konten dapat mencabut kunci dekripsi pribadi tersebut, memungkinkan pelanggan yang jujur untuk terus menonton televisi berbayar sementara peretas dan semua pengguna yang tidak sah menggunakan kunci dekripsi pribadi peretas terputus.) (in)
  • Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers.In a traitor tracing scheme, each customer is given a different personal decryption key.(Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.) (en)
rdfs:label
  • Pelacakan peretas (in)
  • Traitor tracing (en)
owl:sameAs
prov:wasDerivedFrom
foaf:isPrimaryTopicOf
is dbo:wikiPageWikiLink of
is foaf:primaryTopic of
Powered by OpenLink Virtuoso    This material is Open Knowledge     W3C Semantic Web Technology     This material is Open Knowledge    Valid XHTML + RDFa
This content was extracted from Wikipedia and is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License