Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-03-21
2006-03-21
Smithers, Matthew (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S187000, C713S189000, C713S193000, C705S057000
Reexamination Certificate
active
07017044
ABSTRACT:
An extremely secure method for keying source contents to a source storage medium provided to prevent use of unauthorized copies at minimal cost. The host processor combines a unique, immutable and verifiable physical attribute of a hard disk drive, i.e., the drive's defect list, with the content to be secured to write a corresponding fingerprinted encrypted content on a source medium. When a local processor wants to use the sanctioned source content, the fingerprinted content is read from a local storage medium. The local processor then decrypts and separates the defect list out of the source content and reads the local storage medium defect list. If the decrypted defect list matches the local storage medium defect list, then the local processor recognizes the local sanctioned medium and continues processing the source contents. Otherwise, a non-matching defect list indicates an unauthorized copy from the source to the local storage medium.
REFERENCES:
patent: 4746998 (1988-05-01), Robinson et al.
patent: 5113518 (1992-05-01), Durst, Jr. et al.
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5805699 (1998-09-01), Akiyama et al.
patent: 5920628 (1999-07-01), Indeck et al.
patent: 6076165 (2000-06-01), Maenza
patent: 6148407 (2000-11-01), Aucsmith
patent: 6473861 (2002-10-01), Stokes
patent: 6560176 (2003-05-01), Heylen
patent: 6684199 (2004-01-01), Stebbings
patent: 6782458 (2004-08-01), Noble
patent: 2002/0010864 (2002-01-01), Safa
Bruce Schneier, Applied Cryptography, 1996, John Wiley and Sons, Inc., second edition, pp 220-222.
Carpenter Christopher M.
Carpenter Todd Peter
Dudte Chris Paul
Masles John
Maxtor Corporation
Nguyen Minh Dieu
Sigmond David M.
Smithers Matthew
LandOfFree
Extremely secure method for keying stored contents to a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Extremely secure method for keying stored contents to a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Extremely secure method for keying stored contents to a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3573516