Cryptography – Video cryptography
Reexamination Certificate
2005-07-19
2005-07-19
Song, Hosuk (Department: 2135)
Cryptography
Video cryptography
C380S201000, C380S259000, C380S044000, C713S193000
Reexamination Certificate
active
06920221
ABSTRACT:
A video source application in a video source device requests from a video hardware interface of the video source device status with respect to a link linking the video source device to an external video sink device, and supplements the status request with a first basis value to a symmetric ciphering/deciphering process. The video source application, upon receiving from the video hardware interface the requested status and a verification key, generated using said symmetric ciphering/deciphering process and employing the first basis value, verifies the correctness of the verification key to determine whether to trust said provided status. In like manner, the video source application requests from the video hardware interface a secret the video hardware interface uses to cipher video to be transmitted by the video hardware interface to the external video sink device. The secret request is supplemented with a second basis value to the symmetric ciphering/deciphering process. The secret is returned in a cipher form, ciphered using a ciphering key generated using the second basis value. The video source application deciphers the secret using its own independently generated copy of the ciphering key.
REFERENCES:
patent: 3798360 (1974-03-01), Feistel
patent: 4004089 (1977-01-01), Richard et al.
patent: 4316055 (1982-02-01), Feistel
patent: 4605820 (1986-08-01), Campbell, Jr.
patent: 4607137 (1986-08-01), Jansen et al.
patent: 4613901 (1986-09-01), Gilhousen et al.
patent: 4641102 (1987-02-01), Coulthart et al.
patent: 4897875 (1990-01-01), Pollard et al.
patent: 4953208 (1990-08-01), Ideno
patent: 4991208 (1991-02-01), Walker et al.
patent: 5020106 (1991-05-01), Rabold et al.
patent: 5029207 (1991-07-01), Gammie
patent: 5117379 (1992-05-01), Yanagiuchi et al.
patent: 5195136 (1993-03-01), Hardy et al.
patent: 5295188 (1994-03-01), Wilson et al.
patent: 5341425 (1994-08-01), Wasilewski et al.
patent: 5341426 (1994-08-01), Barney et al.
patent: 5353353 (1994-10-01), Vijeh et al.
patent: 5490258 (1996-02-01), Fenner
patent: 5509073 (1996-04-01), Monnin
patent: 5533127 (1996-07-01), Luther
patent: 5590194 (1996-12-01), Ryan
patent: 5621799 (1997-04-01), Katta et al.
patent: 5657095 (1997-08-01), Yoshida et al.
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5680131 (1997-10-01), Utz
patent: 5708714 (1998-01-01), Lopez et al.
patent: 5825879 (1998-10-01), Davis
patent: 5842224 (1998-11-01), Fenner
patent: 5852472 (1998-12-01), Prasad et al.
patent: 5860136 (1999-01-01), Fenner
patent: 5862150 (1999-01-01), Lavelle et al.
patent: 5940509 (1999-08-01), Jovanovich et al.
patent: 6005940 (1999-12-01), Kulinets
patent: 6047103 (2000-04-01), Yamauchi et al.
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6118873 (2000-09-01), Lotspiech et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289102 (2001-09-01), Ueda et al.
patent: 6345101 (2002-02-01), Shukla
patent: 6452959 (2002-09-01), McDonough
patent: 6453304 (2002-09-01), Manabu et al.
patent: 6466669 (2002-10-01), Matsui et al.
patent: 6477252 (2002-11-01), Faber et al.
patent: 6654883 (2003-11-01), Tatebayashi
patent: 0 599 366 (1993-02-01), None
patent: WO 96-06504 (1996-02-01), None
patent: WO 99/18729 (1999-04-01), None
patent: WO 99/19822 (1999-04-01), None
patent: WO 01-17251 (2001-03-01), None
patent: WO 01/17251 (2001-03-01), None
Bruce Schneier,Applied Cryptography, 10/96, second edition,Wiley and sons,Inc, pp. 265-278.
Schneier, Bruce, Applied Cryptography, Protocols, Algorithms, and Source Code in C, Second Edition, ©1996, John Wiley & Sons, Inc., Chapter 1, pp. 1-18.
Schneier, Bruce, et al., Unbalanced Feistel Networks and Block-Cipher Design, Feb. 1996, Third International Workshop Proceedings, pp. 1-24.
Stallings, William, Cryptography and Network Security, Jun. 4, 1998, Prentice-Hall, Inc. 2ndEdition, Chapter 3.
Infocus Corporation, Digital Visual Interface (DVI) white paper, Nov. 2001, pp. 1-15.
Silicon Image, High-Bandwidth Digital Content Protection white paper, Feb. 2000, pp. 1-11.
Schneier, Bruce; “Applied Cryptography, Second Edition, Protocols, Algorithms, and Source Code in C”, John Wiley & Sons, Inc.; Copyright 1996; Chapters 2-6 and 12-17.
Search Report for PCT/US 00/22785, mailed Dec. 6, 2000, 2 pages.
Search Report for PCT/US 00/22834, mailed Dec. 4, 2000, 1 page.
Written Opinion for PCT/US00/22834; 1 page.
The Art Of Computer Programming, vol. 2/Seminumerical Algorithms, ©1969, Addison-Wesley Publishing Company, Inc., Reading, Massachusetts; Menlo Park, California; London; Amsterdam; Don Mills, Ontario; Sydney, pp. 30-31.
High-bandwidth Digital Content Protection System, Revision 1.0, Feb. 17, 2000,. pp. 1-59.
Heys, Howard M., An Analysis of the Statistical Self-Synchronization of Stream Ciphers, IEEE Infocom 2001, pp. 897-904.
Heys, Howard M., Delay Characteristics of Statistical Cipher Feedback Mode, IEEE 2001, pp. 5-9.
Simmons, Gustavus J., Symmetric and Asymmetric Encryption, Computing Surveys, vol. 11, No. 4, Dec. 1979, pp. 305-330.
International Preliminary Examination Report PCT/US00/22834. 6 pages. Mailed Nov. 19, 2001.
Internation Preliminary Examination Report PCT/US00/22785. 7 Pages. Mailed Nov. 5, 2001.
Written Opinion for PCT/US/00/22785; 1 page.
Faber Robert W.
Graunke Gary L.
Lee David A.
Mangold Richard P.
Traw Brendan
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Song Hosuk
LandOfFree
Method and apparatus for protected exchange of status and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for protected exchange of status and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protected exchange of status and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3381744