Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-02-28
2006-02-28
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S152000, C713S168000
Reexamination Certificate
active
07007162
ABSTRACT:
A forensic media key block (MKB) is provided to a clone device, either a software- or hardware-implemented clone, that has gained access to one or more compromised device keys of unknown identity from a set of the device keys in a digital content guard system. Media keys in the forensic MKB are selectively marked as “revoked” and then the ability of the clone to decrypt the MKB to successfully play content is observed. In this way the identity of the compromised key or keys is eventually learned, and the system can then revoke the compromised key or keys system-wide.
REFERENCES:
patent: 4694491 (1987-09-01), Horne et al.
patent: 5345505 (1994-09-01), Pires
patent: 5592552 (1997-01-01), Fiat
Sean Burak, “Protecting the Copyright of Digital Audio and Video Content”, Retrieved from the internet Feb. 3, 2004: <URL: http://www.cas.mcmaster.ca/˜wmfarmer/SE-4C03-01/papers/Burak-dig-media-sec.pdf>.
Robert Sedgewick, “Algorithms”, 1988, Addison-Wesley, 2nd Edition, pp 115-130.
Gregory Kesden, “Content Scrambling System (CSS): Introduction”, Retrieved from the Internet Feb. 3, 2004: <URL:http://www-2.cs.cmu.edu/-dst/DeCSS/Kesden/index.html>.
Evaluation of revocation systems with a Java test-bed; Munoz, J.L.; Forne, J.; Esparza, O.; Soriano, M.; Jodra, D.; Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on Sep. 1-5, 2003 Page(s):450-454.
Implementation of ECC/ECDSA cryptography algorithms based on Java card;Jin-Hee Han; Young-Jin Kim; Sung-Ik Jun; Kyo-Il Chung; Chang-Ho Seo;Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on Jul. 2-5, 2002 Page(s):2.
Novel applications of cryptography in digital communications; Omura, J.K.; Communications Magazine, IEEE vol. 28, Issue 5, May 1990 Page(s):21-29.
International Business Machines - Corporation
Jung David
Rogitz John L.
LandOfFree
Forensic media key block for identifying compromised keys does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Forensic media key block for identifying compromised keys, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Forensic media key block for identifying compromised keys will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3626736