Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant
Reexamination Certificate
2008-07-01
2008-07-01
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Tamper resistant
C713S179000, C726S029000, C705S056000
Reexamination Certificate
active
07395438
ABSTRACT:
A device renders content on a medium by obtaining a table from the medium, obtaining a device key (DK) of the device and an index value of such (DK), indexing into an entry of the table based on the obtained index value, selecting an encrypted secret from the indexed-into entry, applying the obtained device key (DK) to the selected encrypted secret to expose the secret, and applying the exposed secret to render the content.
REFERENCES:
patent: 5715403 (1998-02-01), Stefik
patent: 6236988 (2001-05-01), Aldred
patent: 6832319 (2004-12-01), Bell et al.
patent: 6880081 (2005-04-01), Itkis
patent: 6912634 (2005-06-01), Ripley et al.
patent: 7010808 (2006-03-01), Leung et al.
patent: 7088822 (2006-08-01), Asano
patent: 7152166 (2006-12-01), Strom et al.
patent: 2002/0123968 (2002-09-01), Okayama et al.
patent: 2002/0152387 (2002-10-01), Asano
patent: 2004/0003267 (2004-01-01), Strom et al.
patent: 2004/0093495 (2004-05-01), Engel
patent: 2007/0006314 (2007-01-01), Costa et al.
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
C. Brendan S. Traw, Protecting Digital Content within the Home, IEEE Journal, vol. 34, Issue 10, Oct. 2001 pp. 42-47.
Griswold, G.N. “A Method for Protecting Copyright on Networks”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 169-178.
Kahn, R.E. “Deposit, Registration and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 111-120.
Molotkov, S.N. et al., “On the key generation for N users in quantum cryptography”,JETP Letters, 1995, 62(12), 959-964.
Rivest, R.L. “The RC5 encryption algorithm”,Dr. Dobb's Journal, 1995, 20(1), 146-148.
Wheeler, D.J. “A bulk data encryption algorithm”,Cambridge Security Workshop. Fast Software Encryption, Dec. 9-11, 1993, Publication Date 1994, 127-134, Inspec Abstract No. C9502-6130S-023.
Helin Jonas Fredrik
Parks M. Jay
Peinado Marcus
Strom Clifford P.
Microsoft Corporation
Revak Christopher
Woodcock & Washburn LLP
LandOfFree
Digital rights management (DRM) encryption and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital rights management (DRM) encryption and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital rights management (DRM) encryption and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2759261