Cryptography – Key management – Key distribution
Reexamination Certificate
2011-06-14
2011-06-14
Zee, Edward (Department: 2435)
Cryptography
Key management
Key distribution
C380S281000, C726S026000
Reexamination Certificate
active
07961887
ABSTRACT:
A content distribution system encrypts a content by using different session keys assigned to user systems, encrypts each of the session keys with a public key corresponding to a decryption key unique to each user system, generates, for a group of user identification information items, header information including the encrypted session keys, and a first vector which corresponds to a session key of the session keys and is assigned to arbitrary user identification information u in the group, the first vector being set such that an inner product of the first vector and a second vector concerning the user identification information u becomes equal to zjuv(where zjis a constant value of a session key sjassigned to the user identification information u, and v is group identification information to the group), and transmits the header information and one of the encrypted contents to the user systems.
REFERENCES:
patent: 2003/0152234 (2003-08-01), Matsushita
patent: 2005/0157878 (2005-07-01), Matsushita
patent: 2007/0180233 (2007-08-01), Matsushita
patent: 1 331 751 (2003-07-01), None
patent: 2000-253459 (2000-09-01), None
patent: 2002-165081 (2002-06-01), None
patent: 2006-19975 (2006-01-01), None
IEICE Technical Report, “Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates”; Matsushita, et al., pp. 91-98, 2006.
Proc. of DRM 2001, “On Crafty Pirates and Foxy Tracers”, A. Kiayias, et al., LNCS 2320, pp. 22-39, 2002.
Cox, et al., “A Secure, Robust Watermark for Multimedia”; Proc. Information Hiding, LNCS 1174, pp. 185-206, 1996.
T. Matsushita, “Black-Box Traitor Tracing Schemes for Copyright Protection”, PhD Thesis, The University of Tokyo, Juapan, Jan. 2006, 13 pps.
Matsushita, et al., “Hierarchical Key Assignment for Black-Box Tracing With Efficient Ciphertext Size”, Information and Communications Security Lecture Notes in Computer Science, pp. 92-111, Jan. 1, 2006.
Matsushita, et al., “A Public-Key Black Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates”, Advances in Cryptology, pp. 206-275, 2004.
Naor, et al., “Revocation and Tracing Schemes for Stateless Receivers”, http://eprint.iacr.org/2001/059.pdf, Jul. 24, 2002, pp. 1-34.
Matsushita, et al., “A Flexible-Revocation Scheme for Efficient Public-Key Black-BoxTraitor Tracing”; IEICE Trans. Fundamentals, vol. E88-A, No. 4, Apr. 2005, pp. 1055-1062.
Office Action from corresponding EP 07024310.0 dated Feb. 23, 2010.
Matsushita, et al., “Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates”, Information Processing Society of Japan Technical Report, vol. 1, Jul. 21, 2006, No. 81 pp. 321-328 (w/Abstract).
Office Action from corresponding JP 2007-002658 dated Sep. 24, 2008 (w/translation).
Kabushiki Kaisha Toshiba
Ohlandt Greeley Ruggiero & Perle L.L.P.
Zee Edward
LandOfFree
Content distribution system and tracking system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Content distribution system and tracking system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Content distribution system and tracking system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2729279