Cryptography – Video cryptography – Video electric signal modification
Reexamination Certificate
2008-07-22
2008-07-22
Barron, Jr., Gilberto (Department: 2132)
Cryptography
Video cryptography
Video electric signal modification
C380S241000, C380S242000
Reexamination Certificate
active
07403618
ABSTRACT:
A transmitter provides receivers conditional access to data transmitted via a network. A content encryptor is used to encrypt the data under control of a same authorization key before it is transmitted to all receivers. The transmitter has a storage with a plurality of device keys. A further encryptor is used for producing a key block with a plurality of entries, where each entry is associated with a respective one of the device keys. At least some of the entries contain a representation of the authorization key encrypted with the associated device key. The transmitter transmits the same key block to all receivers.The receiver has a subset of the device keys. A first decryptor is used to retrieve the authorization key by decrypting at least one entry of the key block that is associated with one of the device keys of the receiver. A second decryptor is used for decrypting the data under control of the authorization key.
REFERENCES:
patent: 5592552 (1997-01-01), Flat
patent: 5712800 (1998-01-01), Aucsmith
patent: 5999623 (1999-12-01), Bowman et al.
patent: 6026165 (2000-02-01), Marino et al.
patent: 6118873 (2000-09-01), Lotspiech et al.
patent: 6167137 (2000-12-01), Marino et al.
patent: 6263435 (2001-07-01), Dondeti et al.
patent: 6542610 (2003-04-01), Traw et al.
patent: 6609116 (2003-08-01), Lotspiech
patent: 6650753 (2003-11-01), Lotspiech et al.
patent: 6880081 (2005-04-01), Itkis
patent: 2003/0194091 (2003-10-01), Wajs
patent: 0641103 (1995-03-01), None
patent: WO-0130018 (2001-04-01), None
D.H. Wallner, E.J. Harder, R.C. Agee, “Key Management for Multicast: Issues and Architectures”, Request for Comments 2627, Jun. 1999.
C.K. Wong, M. Gouda, S. Lam, “Secure Group Communications Using Key Graphs”, Proceedings SIG-COMM 1998, ACM Press, NY, pp. 68-79, IEEE/ACM Transactions on Networking, vol. 8, No. 1, Feb. 2000, pp. 16-30.
“International Search Report for Application No. PCT/EP 00/09866”, (May 1, 2001),3 pgs.
Blundo, C, et al., “Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution”,Advances in cryptology—crypto '96. 16th annual international cryptology conference, XP000626596 German ISBN: 3-540-61512-1, p. 389,(Aug. 18-22, 1996),387-400.
Nakamura, H , et al., “Hierarchical group oriented key management method HGK”,Proceedings of the Sixth Annual Computer Security Applications Conference, IEEE, (1990),44-49.
Shiuh-Jeng Wang, et al., “A hierarchical and dynamic group-oriented cryptographic scheme”,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronic Information and Communication, ENG, Japan, vol. E79-A, No. 1, p. 78, column 2—p. 79, column 1; figure 2,(Jan. 1996),76-85.
“U.S. Appl. No. 10/124,287 Final Office Action mailed Jun. 7, 2006”, 15 pgs.
“U.S. Appl. No. 10/124,287 Non Final Office Action mailed Nov. 30, 2005”, 13 pgs.
“U.S. Appl. No. 10/124,287 Response filed Feb. 28, 2006 to Non Final Office Action mailed Nov. 30, 2005”, 14 pgs.
Staring Antonius Adriaan Maria
Talstra Johan Cornelis
Van Rijnsoever Bartholomeus Johannes
Barron Jr. Gilberto
Irdeto Eindhoven B.V.
Perungavoor Venkat
Schwegman, Lundberg & Wossner, P.A.
LandOfFree
Conditional access does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Conditional access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Conditional access will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2786029