Cryptography – Video cryptography – Video electric signal modification
Reexamination Certificate
2005-08-16
2005-08-16
Sheikh, Ayaz (Department: 2136)
Cryptography
Video cryptography
Video electric signal modification
C380S046000, C380S202000, C713S168000, C708S252000
Reexamination Certificate
active
06931129
ABSTRACT:
A video source device includes a cipher unit. The video source device uses the cipher unit to generate cipher bits for ciphering video to be transmitted to protect the video from unauthorized copying. The video source device authenticates video receiving devices using a symmetric ciphering/deciphering process that requires the video source device to generate and provide the video receiving device with a pseudo random number as the seed/basis number for the symmetric ciphering/deciphering process. The video source device is further provided with a state machine that controls the cipher unit to generate the required pseudo random number for the video source devices, thereby eliminating the need of having to provide separate circuitry to generate the required pseudo random numbers.
REFERENCES:
patent: 3798360 (1974-03-01), Feistel
patent: 4004089 (1977-01-01), Richard et al.
patent: 4316055 (1982-02-01), Feistel
patent: 4605820 (1986-08-01), Campbell, Jr.
patent: 4607137 (1986-08-01), Jansen et al.
patent: 4613901 (1986-09-01), Gilhousen et al.
patent: 4641102 (1987-02-01), Coulthart et al.
patent: 4897875 (1990-01-01), Pollard et al.
patent: 4991208 (1991-02-01), Walker et al.
patent: 5020106 (1991-05-01), Rabold et al.
patent: 5029207 (1991-07-01), Gammie
patent: 5117379 (1992-05-01), Yanaguchi et al.
patent: 5195136 (1993-03-01), Hardy et al.
patent: 5295188 (1994-03-01), Wilson et al.
patent: 5341425 (1994-08-01), Wasilewski et al.
patent: 5341426 (1994-08-01), Barney et al.
patent: 5353353 (1994-10-01), Vijeh et al.
patent: 5490258 (1996-02-01), Fenner
patent: 5509073 (1996-04-01), Monnin
patent: 5533127 (1996-07-01), Luther
patent: 5590194 (1996-12-01), Ryan
patent: 5657095 (1997-08-01), Yoshida et al.
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5680131 (1997-10-01), Utz
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5825879 (1998-10-01), Davis
patent: 5842224 (1998-11-01), Fenner
patent: 5852472 (1998-12-01), Prasad et al.
patent: 5860136 (1999-01-01), Fenner
patent: 5862150 (1999-01-01), Lavelle et al.
patent: 5940509 (1999-08-01), Jovanovich et al.
patent: 6005940 (1999-12-01), Kulinets
patent: 6047103 (2000-04-01), Yamauchi et al.
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6115376 (2000-09-01), Sherer et al.
patent: 6118873 (2000-09-01), Lotspiech et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289102 (2001-09-01), Ueda et al.
patent: 6345101 (2002-02-01), Shukla
patent: 6452959 (2002-09-01), McDonough
patent: 6453304 (2002-09-01), Manabu et al.
patent: 6466669 (2002-10-01), Matsui et al.
patent: 6477252 (2002-11-01), Faber et al.
patent: 6654883 (2003-11-01), Tatebayashi
patent: 6782476 (2004-08-01), Ishibashi
patent: 0 599 366 (1994-01-01), None
patent: WO 96/06504 (1996-02-01), None
patent: WO 01/17252 (2001-03-01), None
patent: WO 01/16251 (2001-08-01), None
High-bandwidth Digital Content Protection System, Revision 1.0, Feb. 17, 2000, Copyright © 1999-2000 by Intel Corporation, pp. 1-59.
Heys, Howard M., An Analysis of the Statistical Self-Synchronization of Stream Ciphers, IEEE Infocom 2001, pp. 897-904.
Heys, Howard M., Delay Characteristics of Statistical Cipher Feedback Mode, IEEE 2001, pp. 5-9.
Simmons, Gustavus J., Symmetric and Asymmetric Encryption, Computing Surveys, vol. 11. No. 4, Dec. 1979, pp. 305-330.
The Art Of Computer Programming, vol. 2/Seminumerical Algorithms, © 1969, Addison-Wesley Publishing Company, Inc., Reading, Massachusetts; Menlo Park, California; London; Amsterdam; Don Mills, Ontario; Sydney, pp. 30-31.
B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” 1996, Chapters 2-6 and 12-17, Second Edition, Published by John Wiley & Sons, Inc., USA.
Bruce Schneier, Applied Cryptography, 1996, Chapter 9: pp. 189-211, 2nd Edition, John Wiley & Sons, Inc., USA.
Bruce Schneier, Applied Cryptography, 1996, Chapter 1: pp. 1-18, 2nd Edition, John Wiley & Sons, Inc., USA.
Bruce Schneier, Applied Cryptography, 1996, Chapter 12: pp. 265-278, 2nd Edition, John Wiley & Sons, Inc., USA.
“High-Bandwidth Digital Content Protection”, Feb. 2000, Silicon Image, Inc., pp. 1-11.
Schneier, et al., “Unbalanced Feistel Networks and Block-Cipher Design”, Minneapolis, MN, pp. 1-24.
“Digital Cisual Interface (DVI)”, Infocus Corporation, Nov. 2001, pp. 1-15.
William Stallings, “Cryptography and Network Security”, Principles and Practice, Second Edition, 47 Pgs.
Faber Robert W.
Graunke Gary L.
Lee David A.
Traw Brendan S.
Hoffman Brandon
Sheikh Ayaz
LandOfFree
Method and apparatus for generating pseudo random numbers in... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for generating pseudo random numbers in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for generating pseudo random numbers in... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3442300