Key distribution via a memory device

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S053000, C705S054000, C705S055000, C705S056000, C705S057000, C380S277000, C380S278000, C380S279000, C380S280000, C380S281000, C380S282000, C380S283000, C380S284000, C380S285000, C380S286000

Reexamination Certificate

active

09454349

ABSTRACT:
A memory element is provided in the recording medium that is readable but not writeable by external devices, and whose content changes each time select material is recorded onto the medium. The content of this memory element forms a unique encryption key for encrypting the content encryption key. This encrypted content encryption key is further encrypted using a public key that corresponds to a private key of the intended rendering device. Although the unique encryption key is determinable by reading and processing the content of the externally read-only memory element, the decryption of the content encryption key requires both the unique encryption key and the private key of the intended rendering device. Because the unique encryption key is based on a content value of the read-only memory element that is unique to each recording to the recording medium, a subsequent illicit re-recording of the original encrypted content material onto the recording medium (a replay attack) will not provide the same unique encryption key as the unique encryption key used to originally encrypt the content encryption key. Because the unique encryption key of the replay attack differs from the original unique encryption key used to encrypt the content encryption key, the rendering device will be unable to decrypt the content encryption key, and thereby will be unable to decrypt the content material, and the replay attack will fail.

REFERENCES:
patent: 5144665 (1992-09-01), Takaragi et al.
patent: 5719938 (1998-02-01), Haas et al.
patent: 5857021 (1999-01-01), Kataoka et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6587837 (2003-07-01), Spagna et al.
patent: 0 672 991 (1995-03-01), None
patent: 0 809 244 (1996-11-01), None
patent: 0 672 991 (1995-09-01), None
patent: 0672991 (1995-09-01), None
patent: 0 717 566 (1996-06-01), None
patent: 0717566 (1996-06-01), None
patent: 0 809 244 (1997-11-01), None
patent: 0809244 (1997-11-01), None
patent: 0809244 (1997-11-01), None
patent: 9605673 (1996-02-01), None
patent: PCT/US95/10221 (1996-02-01), None
patent: 9847258 (1998-10-01), None
Garfinkel, Simson; Go for public keys: public keys are the safest way to secure your data today. (The Critical Distinction)(computer security issues)(one of five articles in “Your Best Defense”)(Column), Windows Sources, vol. 3, No. 0, p. 86(1).
Cecere, Carl; Ruppert, William H.; A framework for security. (information systems); Journal of Electronic Defense, vol. 15, No. 1, p. 54(4), Jan. 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Key distribution via a memory device does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Key distribution via a memory device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key distribution via a memory device will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3734985

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.