Method and apparatus for authenticating an hierarchy of...

Cryptography – Video cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S259000, C713S168000, C713S171000

Reexamination Certificate

active

06956949

ABSTRACT:
A video source device and a video repeater device cooperatively authenticates said video repeater apparatus to said video source device. In one embodiment, the authentication is performed using an identical authentication process a video sink device would authenticate itself to the video source device. The video repeater device augment the identical process identifying itself as a repeater device. The video repeater device also in cooperation with at least one video sink device authenticates the at least one video sink device. The video repeater device in turn, in cooperation with the video source device, authenticates the at least one video sink device to the video source device. In one embodiment, the video repeater device also in cooperation with another video repeater device, authenticates yet another at least one video sink device to the video repeater device. In like manner, the video repeater device, in cooperation with the video source device, authenticates the yet another at least one video sink device to the video source device. In one embodiment, the video repeater device includes topological information of the video sink devices among the authentication information provided to the video source device. Accordingly, video sink devices may be hierarchically organized to the video source device.

REFERENCES:
patent: 3798360 (1974-03-01), Feistel
patent: 4004089 (1977-01-01), Richard et al.
patent: 4316055 (1982-02-01), Feistel
patent: 4605820 (1986-08-01), Campbell, Jr.
patent: 4607137 (1986-08-01), Jansen et al.
patent: 4613901 (1986-09-01), Gilhousen et al.
patent: 4641102 (1987-02-01), Coulthart et al.
patent: 4953208 (1990-08-01), Ideno
patent: 4991208 (1991-02-01), Walker et al.
patent: 5020106 (1991-05-01), Rabold et al.
patent: 5195136 (1993-03-01), Hardy et al.
patent: 5341425 (1994-08-01), Wasilewski et al.
patent: 5341426 (1994-08-01), Barney et al.
patent: 5353353 (1994-10-01), Vijeh et al.
patent: 5509073 (1996-04-01), Monnin
patent: 5533127 (1996-07-01), Luther
patent: 5590194 (1996-12-01), Ryan
patent: 5621799 (1997-04-01), Katta et al.
patent: 5657095 (1997-08-01), Yoshida et al.
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5680131 (1997-10-01), Utz
patent: 5825879 (1998-10-01), Davis
patent: 5852472 (1998-12-01), Prasad et al.
patent: 5862150 (1999-01-01), Lavelle et al.
patent: 5940509 (1999-08-01), Jovanovich et al.
patent: 6005940 (1999-12-01), Kulinets
patent: 6047103 (2000-04-01), Yamauchi et al.
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6115376 (2000-09-01), Sherer et al.
patent: 6118873 (2000-09-01), Lotspiech et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289102 (2001-09-01), Ueda et al.
patent: 6345101 (2002-02-01), Skukla
patent: 6452959 (2002-09-01), McDonough
patent: 6453304 (2002-09-01), Manabu et al.
patent: 6466669 (2002-10-01), Matsui et al.
patent: 6477252 (2002-11-01), Faber et al.
patent: 6654883 (2003-11-01), Tatebayashi
patent: 6782476 (2004-08-01), Ishibashi
patent: 0 599 366 (1993-02-01), None
patent: WO 96-06504 (1996-02-01), None
patent: WO 99/19822 (1998-09-01), None
patent: WO 99/18729 (1999-04-01), None
patent: WO 01-17251 (2001-03-01), None
patent: WO 01/17252 (2001-03-01), None
Schneier, Bruce; “Applied Cryptography, Second Edition, Protocols, Algorithms, and Source Code in C”; John Wiley & Sons, Inc.; Copyright 1996; Chapters 2-6 and 12-17.
Written Opinion for PCT/US00/22834; 1 page.
Written Opinion for PCT/US/00/22785; 1 page.
Heys, Howard M., An Analysis of the Statistical Self-Synchronization of Stream Ciphers, IEEE INFOCOM 2001, pp. 897-904.
Heys, Howard M., Delay Characteristics of Statistical Cipher Feedback Mode, IEEE 2001, pp. 5-9.
Simmons, Gustavus J., Symmetric and Asymmetric Encryption, Computing Surveys, vol. 11, No. 4, Dec. 1979, pp. 305-330.
The Art Of Computer Programming, vol. 2/Seminumerical Algorithms, © 1969, Addison-Wesley Publishing Company, Inc., Reading, Massachusetts; Menlo Park, California; London; Amsterdam; Don Mills, Ontario; Sydney, pp. 30-31.
High-bandwidth Digital Content Protection System, Revision 1.0, Feb. 17, 2000, pp. 1-59.
Schneier, Bruce, et al., Unbalanced Feistel Networks and Block-Cipher Design, Feb. 1996, Third International Workshop Proceedings, pp. 1-24.
Stallings, William, Cryptography and Network Security, Jun. 4, 1998, Prentice-Hall, Inc. 2ndEdition, Chapter 3.
Infocus Corporation, Digital Visual Interface (DVI) white paper, Nov. 2001, pp. 1-15.
Silicon Image, High-Bandwidth Digital Content Protection white paper, Feb. 2000, pp. 1-11.
Schneier, Bruce, Applied Cryptography, 1996, John Wiley & Sons, Inc., 2ndEdition, Chapter 1.
Search Report for PCT/US 00/22834, mailed Dec. 4, 2000, 2 pages.
Search Report for PCT/US 00/22785, mailed Dec. 6, 2000, 2 pages.
International Preliminary Examination Report PCT/US00/22834. 6 Pages. Mailed Nov. 19, 2001.
Internation Preliminary Examination Report PCT/US00/22785. 7 Pages. Mailed Nov. 5, 2001.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for authenticating an hierarchy of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for authenticating an hierarchy of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for authenticating an hierarchy of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3443573

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.