Devices, systems, and methods for secure download of data

Electrical computers and digital processing systems: support – Data processing protection using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S193000, C713S194000, C705S051000

Reexamination Certificate

active

07634664

ABSTRACT:
A secure content receiver includes a processing unit operable to request a data file from a remote device, to provide a first encryption key to the remote device, and to receive the requested data file and a key object from the remote device. The received data file is encrypted using the first encryption key. The key object imposes restrictions on the decryption of the data file. The receiver further includes a first security module that is coupled to the processing unit and that is operable to decrypt the data file according to the restrictions imposed by the key object.

REFERENCES:
patent: 6184521 (2001-02-01), Coffin et al.
patent: 6236727 (2001-05-01), Ciacelli et al.
patent: 6389538 (2002-05-01), Gruse et al.
patent: 6782479 (2004-08-01), Williams et al.
patent: 7039815 (2006-05-01), Grassl et al.
patent: 7124170 (2006-10-01), Sibert
patent: 2003/0061496 (2003-03-01), Ananda
patent: 2004/0187014 (2004-09-01), Molaro
patent: 2005/0010786 (2005-01-01), Michener et al.
patent: 2005/0060568 (2005-03-01), Beresnevichiene et al.
patent: 2005/0066355 (2005-03-01), Cromer et al.
patent: 1022640 (2000-07-01), None
Qiong Liu, et al., “Digital Rights Management for Content Distribution”, Proceedings of the Australasian Information Security Workshop Conference on ACSW frontiers 2003, vol. 21, pp. 49-58.
Ross anderson and Markus Kuhn, “tamper Resistance: a cautionary note”, USENIX Workshop on Electronic Commerce Proceedings, Nov. 18-21, 1996, pp. 1-11.
Bennet Yee and J. D. Tygar, “Secure Coprocessors in Electronic Commerce Applications”, In Proceedings of the 1st USENIX Workshop on Electronic Commerce, Jul. 1995, pp. 155-170.
Joe Grand, “Practical Secure Hardware Design for Embedded Systems”, http://www..grandideastudio.com/wp-admin/uploads/secure—embed—paper.pdf, Jun. 23, 2004.
Qiong Liu et al., “Digital Rights Managemnt for Content Distribution,” Proceedings of the Australasian Information Security Workshop Conference on ACSW frontiers 2003, vol. 21, pp. 49-58.
Ross Anderson and Markus Kuhn, “Tamper Resistance: a cautionary note”, USENIX Workshop on Electronic Commerce Proceedings, Nov. 18-21, 1996, pp. 1-11.
Joe Grand, “Practical Secure Hardware Design for Embedded Systems”, http://www.grandideastudio.com/wp-admin/uploads/secure—embed—paper.pdf, Jun. 23, 2004.
Mulligan et al., “How DRM-Based Content Delivery Systems Disrupt Expectations of ‘Personal Use’”, ACM Workshop on Digital Rights Management, Proceedings o the 3rd ACM workshop on Digital Rights Management, Oct. 27, 2003, pp. 77-89.
Qiong Liu et al., “Digital Rights Management for Content Distribution,” Proceedings of hte Australasian Information Security Workshop Conference on ACSW frontiers 2003, vol. 21, pp. 49-58.
Ross Anderson and Markus Kuhn, “Tamper Resistance: a cautionalry note”, USENIX Workshop on Electronic Commerce Proceedings, Nov. 18-21, 1996, pp. 1-11.
Bennet Yee and J. D. Tygar, “Secure Coprocessors in Electronic Commerce Applications,” In Proceedings of hte 1st USENIX Workshop on Electronic Commerce, Jul. 1995, pp. 155-170.
Joe Grand, “Practical Secure Hardware Design for Embedded Systems,” http://www.grandideastudio.com/wp-admin/uploads/secure—embed—paper.pdf, Jun. 23, 2004.
Bajikar, Sundeep, Trusted Platform Module (TPM) based Security on Notebook PCs—White Paper, Mobile Platforms Group, Intel Corporation, pp. 1-20, Jun. 20, 2002.
Trusted Computing Group, Backgrounder, pp. 1-8, May 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Devices, systems, and methods for secure download of data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Devices, systems, and methods for secure download of data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Devices, systems, and methods for secure download of data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4108153

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.