System and method for enhanced piracy protection in a...

Information security – Prevention of unauthorized use of data including prevention... – Limitations on number or amount of copies

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S231000, C705S057000, C707S793000

Reexamination Certificate

active

09919518

ABSTRACT:
A key-sharing scheme is used to control distribution and use of video and audio content in personal digital assistants (PDAs) and other wireless devices. A private key is split into key-shares using a Blakley-Shamir key splitting technique and the key-shares are distributed to various network entities including a finance server and security server. Key-shares are also stored in a user's subscriber identity module (SIM) and a security processor of the PDA. The key-shares from the network entities are provided to the PDA after the user requests specific video or audio content and a credit verification is performed. The PDA's security processor combines the key-shares to form the decryption key for use in playing the content by the PDA's communications processor. When a service limit is reached, the PDA's security processor purges the key-shares to prevent further use of the content.

REFERENCES:
patent: 4864615 (1989-09-01), Bennett et al.
patent: 5103392 (1992-04-01), Mori
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5247575 (1993-09-01), Sprague et al.
patent: 5647000 (1997-07-01), Leighton
patent: 5757909 (1998-05-01), Park
patent: 5796841 (1998-08-01), Cordery et al.
patent: 5838792 (1998-11-01), Ganesan
patent: 5933503 (1999-08-01), Schell et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 5995965 (1999-11-01), Experton
patent: 6009177 (1999-12-01), Sudia
patent: 6016476 (2000-01-01), Maes et al.
patent: 6055314 (2000-04-01), Spies et al.
patent: 6075862 (2000-06-01), Yoshida et al.
patent: 6164531 (2000-12-01), Harris et al.
patent: 6175924 (2001-01-01), Arnold
patent: 6182214 (2001-01-01), Hardjono
patent: 6192472 (2001-02-01), Garay et al.
patent: 6219560 (2001-04-01), Erkkila et al.
patent: 6226618 (2001-05-01), Downs et al.
patent: 6253193 (2001-06-01), Ginter et al.
patent: 6363365 (2002-03-01), Kou
patent: 6373946 (2002-04-01), Johnston
patent: 6385596 (2002-05-01), Wiser et al.
patent: 6625734 (2003-09-01), Marvit et al.
patent: 6631359 (2003-10-01), Braitberg et al.
patent: 6647260 (2003-11-01), Dusse et al.
patent: 6763370 (2004-07-01), Schmeidler et al.
patent: 6922735 (2005-07-01), Chang
patent: 2001/0013037 (2001-08-01), Matsumoto
patent: 2001/0051996 (2001-12-01), Cooper et al.
patent: 2001/0056404 (2001-12-01), Kuriya et al.
patent: 2002/0016775 (2002-02-01), Nakagawa
patent: 2002/0069365 (2002-06-01), Howard et al.
patent: 2002/0076051 (2002-06-01), Nii
patent: 2003/0048906 (2003-03-01), Vora et al.
Schneier, Bruce, “Applied Crpytography”, 1996, pp. 71-72.
Mori et al, “Superdistribution: The Concept and the Architecture,” The Transactions of the IEICE, vol. E 73, No. 7, Jul. 1990, p. 1133-1146. <http://www.virtualschool.edu/mon/ElectronicProperty/MoriSuperdist.html>.
Eskicioglu, Ahmet, “A Key Transport Protocol Based on Secret Sharing—An Application to Conditional Access Systems,” Proceedings of the SPIE Security and Watermarking of Multimedia Contents III Conference, vol. 4314, pp. 139-148, San Jose, CA, Jan. 22-25, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for enhanced piracy protection in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for enhanced piracy protection in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for enhanced piracy protection in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3849312

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.