Cryptography – Key management – Key distribution
Reexamination Certificate
1998-12-09
2010-02-16
Vu, Kimyen (Department: 2435)
Cryptography
Key management
Key distribution
C380S286000, C380S200000, C380S201000, C713S193000, C726S026000
Reexamination Certificate
active
07664268
ABSTRACT:
A method for providing conditional access (i.e., managing access) to a received scrambled audio/visual (A/V) signal from a variety of sources by utilizing secret sharing for key recovery. Secret sharing eliminates the necessity to protect and transfer the complete descrambling keys between devices, because a portion of the key is stored in the device or a smart card coupled thereto.
REFERENCES:
patent: 4634808 (1987-01-01), Moerder
patent: 4736422 (1988-04-01), Mason
patent: 4751732 (1988-06-01), Kamitake
patent: 4802215 (1989-01-01), Mason
patent: 5103479 (1992-04-01), Takaragi et al.
patent: 5117458 (1992-05-01), Takaragi et al.
patent: 5351294 (1994-09-01), Matsumoto et al.
patent: 5590200 (1996-12-01), Nachman et al.
patent: 5627893 (1997-05-01), Demytko
patent: 5737424 (1998-04-01), Elteto et al.
patent: 5737425 (1998-04-01), Ajtai
patent: 5790666 (1998-08-01), Ooi
patent: 6035037 (2000-03-01), Chaney
patent: 6049873 (2000-04-01), Kaku et al.
patent: 6760445 (2004-07-01), Schwenk et al.
patent: 658054 (1995-06-01), None
patent: 714024 (1996-05-01), None
patent: 62180625 (1987-07-01), None
patent: 7288522 (1995-10-01), None
patent: 8195735 (1996-07-01), None
patent: 9181689 (1997-07-01), None
patent: WO97/07481 (1997-02-01), None
Santis, How to share a function securely, 1994, ACM, pp. 522-533.
Shamir, How to Share a Secret, 1979, Communications of the ACM, vol. 22, pp. 612-613.
Chen, Liqun, et al., “Secret Sharing with Reusable Polynomials,” Lecture Notes in Computer Science, vol. 1270, p. 184-193, Information Security and Privacy, Jul. 23, 1997.
Japan Business Machine Industries Assn, JBMIA Committee for ISO Standards, Story and Summary of International Standardization on Office Machine (3), “Business and Management,” vol. 42, No. 524, p. 96-101, NOMA Research Institute, Inc., Japan, Feb. 1, 1990.
Koyano, Yukio. “Future Industry Research Corner (87), Movement of Consortium Relating to Standardization-Exemplified by IC Card and PC Card,” Technique and Economy, JapanTechno-Economics Society, Serial vol. 332, p. 72-77, Oct. 5, 1994.
“Functional Model of Conditional Access System” EBU Project Group B/CA Published by the European Broadcasting Union Case postale 678, CH-1218 Grand-Saconnex , Geneva, Switzerland, 1995.
Chambers WG: “Solution of Welch-Berlekamp Key Equation by Euclidean Algorithm” Electronic Letters, vol. 29, No. 11, May 27, 1993, p. 1031.
Guillou LC et al: “Encipherment and Conditional Access” SMPTE Journal, vol. 103, No. 6, Jun. 1, 1994, pp. 398-406.
Engelkamp H: “Hard—Und Software Der Set-Top-Boxen” Radio Fernsehen Electronik, vol. 45, No. 8, Aug. 1996, pp. 20-23 Translation Attached.
European Search Report Dated Feb. 10, 1999.
Beyers, Jr. Billy Wesley
Eskicioglu Ahmet Mursit
Ozkan Mehmet Kemal
Kiel Paul P.
Patel Nirav
Shedd Robert D.
Thomson Licensing
Vu Kimyen
LandOfFree
Conditional access system for digital receivers does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Conditional access system for digital receivers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Conditional access system for digital receivers will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4185264