Key management for content protection

Cryptography – Key management – Key escrow or recovery

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S044000, C380S046000, C380S047000, C380S277000, C380S282000, C380S283000, C726S002000, C726S003000, C726S004000, C726S005000, C726S006000, C726S009000, C726S018000, C726S020000, C726S034000, C713S159000, C713S163000, C713S171000, C713S172000, C713S185000, C713S193000, C713S194000

Reexamination Certificate

active

08054978

ABSTRACT:
A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining whether step, to be prevented from having access is comprised in at least one group of the authorized set.

REFERENCES:
patent: 4440976 (1984-04-01), Bocci et al.
patent: 4712238 (1987-12-01), Gilhousen et al.
patent: 4771458 (1988-09-01), Citta et al.
patent: 4782529 (1988-11-01), Shima
patent: 4926475 (1990-05-01), Spiotta et al.
patent: 5301231 (1994-04-01), Abraham et al.
patent: 5309516 (1994-05-01), Takaragi et al.
patent: 5426700 (1995-06-01), Berson
patent: 5550575 (1996-08-01), West et al.
patent: 5592552 (1997-01-01), Fiat
patent: 5633928 (1997-05-01), Lenstra et al.
patent: 5661803 (1997-08-01), Cordery et al.
patent: 5721777 (1998-02-01), Blaze
patent: 5812666 (1998-09-01), Baker et al.
patent: 5857022 (1999-01-01), Sudia
patent: 5889863 (1999-03-01), Weber
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5923759 (1999-07-01), Lee
patent: 5937066 (1999-08-01), Gennaro et al.
patent: RE36310 (1999-09-01), Bjerrum et al.
patent: 5953418 (1999-09-01), Bock et al.
patent: 6009177 (1999-12-01), Sudia
patent: 6014745 (2000-01-01), Ashe
patent: 6035405 (2000-03-01), Gage et al.
patent: 6141423 (2000-10-01), Fischer
patent: 6151394 (2000-11-01), Tatebayashi et al.
patent: 6195751 (2001-02-01), Caronni et al.
patent: 6263435 (2001-07-01), Dondeti et al.
patent: 6263446 (2001-07-01), Kausik et al.
patent: 6272225 (2001-08-01), Miyauchi et al.
patent: 6272632 (2001-08-01), Carman et al.
patent: 6314190 (2001-11-01), Zimmermann
patent: 6370251 (2002-04-01), Hardy et al.
patent: 6373952 (2002-04-01), Asano et al.
patent: 6377691 (2002-04-01), Swift et al.
patent: 6525718 (2003-02-01), Murakami et al.
patent: 6530020 (2003-03-01), Aoki
patent: 6535607 (2003-03-01), Chandersekaran et al.
patent: 6651167 (2003-11-01), Terao et al.
patent: 6829356 (2004-12-01), Ford
patent: 6880081 (2005-04-01), Itkis
patent: 6918038 (2005-07-01), Smith et al.
patent: 6950941 (2005-09-01), Lee et al.
patent: 7181602 (2007-02-01), Rankl
patent: 7194092 (2007-03-01), England et al.
patent: 2001/0002212 (2001-05-01), Asano et al.
patent: 2003/0074565 (2003-04-01), Wasilewski et al.
patent: 2005/0190174 (2005-09-01), Kim et al.
patent: 2009/0030843 (2009-01-01), Hoffman et al.
patent: 2010/0031064 (2010-02-01), Walmsley
patent: 0207534 (1987-01-01), None
patent: 0781003 (1997-06-01), None
patent: 0896483 (1999-02-01), None
patent: 9919822 (1999-04-01), None
patent: 0103365 (2001-01-01), None
Stinson, D.R. “Crytography Theory and Practice.”In Discrete Mathematics and Its Applications(CRC Press Inc) (1995) pp. 280-409.
Fiat, A., et al. “Broadcast Encryption.”Crypto Annual Conference(1993) pp. 481-491.
Canetti,R., et al., “Multicast Security: A Taxonomy and Some Efficient Constructions.”IEEE INFOCOM-99(1999) pp. 1-9.
Canetti,R., et al., “A Taxonomy of Multicast Security Issues.”IBM Research and the Weizmann Institute(1999) pp. 1-15.
Itkis, G., et al., “Asymmetric MACs Secure IP Multicast and Other East Crypto.”Slide Presentation, NDS Israel(1999) pp. 1-14.
Itkis, G., et al., “The Role of Revocation in Content Protection: White Paper.”NDS Israel(Doc. No. WP-R028) (1998) pp. 1-13.
Wallner, D., et al. “Key Management for Multicast: Issues and Architectures.”National Security Agency(1999) pp. 1-46.
Itkis, G. “Improved Key Distribution System.”NDS Israel(1999) pp. 1-7.
Menezes , A., et al. “Key Management Tech{dot over (n)}iques.” in Handbook of Applied Cryptography, CRC Press (1996) pp. 543 & 584-586.
Menezes, et al. “Handbook of Applied Cryptography.” (1996) pp. 543 and 584-586.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Key management for content protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Key management for content protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key management for content protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4273936

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.