Cryptography – Equipment test or malfunction indication
Reexamination Certificate
2007-07-10
2007-07-10
Zand, Kambiz (Department: 2134)
Cryptography
Equipment test or malfunction indication
Reexamination Certificate
active
09991057
ABSTRACT:
A communication system including a transmitter, a receiver, a communication link (for example, a TMDS-like link), and preferably also an external agent with which the transmitter and receiver can communicate, in which video data (or other data) are encrypted, the encrypted data are transmitted from the transmitter to the receiver, and the transmitted data are decrypted in the receiver, a transmitter and a receiver for use in such a system, a cipher engine for use in such a transmitter or receiver, a method for operating such a transmitter or receiver to encrypt or decrypt data, and a method for distributing keys to the transmitter and receiver. The receiver can be a player coupled to a downstream receiver by a TMDS-like link, and configured to re-encrypt the decrypted data (for example, using an AES or HDCP protocol) and send re-encrypted data over the link to the receiver. Optionally, the player is a repeater which translates the decrypted data from the transmitter, and then re-encrypts the translated data for transmission to the downstream receiver. The transmitter can itself be a player that receives and decrypts encrypted data from an upstream source. In preferred embodiments, the system implements a content protection protocol including a challenge-response procedure. After a new key is supplied to the receiver (and the same new key should have been supplied to the transmitter) and before the receiver can use the new key, the challenge-response procedure requires that the receiver validate the transmitter by verifying that the transmitter has proper knowledge of the new key.
REFERENCES:
patent: 5805706 (1998-09-01), Davis
patent: 2003/0005285 (2003-01-01), Graunke
Pfleeger (Charles P. Pfleeger, “Security in computing”, 2nd edition, 1996, ISBN: 0133374866), p. 101, 131-132, 140-141, 262, 386-387, 389, 406.
Menezes et al. (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of applied cryptography”, 1997, ISBN: 0849385237), p. 400-401.
Stallings (William Stallings, “Data and computer communications”, 5th edition, 1997, ISBN: 0024154253), Fig. 1.2 p. 6.
Pfleeger (Charles P. Pfleeger, “Security in computing”, 2nd edition, 1996, ISBN: 0133374866), p. 101, 113, 131-134, 386-387, 389, 406.
Menezes (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of applied cryptography”, 1997, ISBN: 0849385237), p. 400-402.
NIST (Nechvatal et al., Report on the Development of the Advanced Encryption Standard (AES), Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Technology Administration U.S. Department of Commerce, Publication Date: Oct. 2, 2000), http://csrc.nist.gov/CryptoToolkit/aes/round2/r2.
High-Bandwidth Digital Content Protection System, Revision 1.0, by Intel Corporation, Feb. 17, 2000, pp. 1-60.
High-Bandwith Digital Content Protection System Revision 1.0 Erratum, by Intel Corporation, Mar. 19, 2001, pp. 1-9.
Upstream Link for High-bandwidth Digital Content Protection, Revision 1.00, by Intel Corporation, Jan, 26, 2001, pp. 1-38.
National Institute of Standards and Technology, Draft FIPS for the AES, 48 pages, downloaded from the Internet (from http://csrc.nist.gov/encryption/aes) on Sep. 18, 2001.
Girard & Equitz LLP
Poltorak Peter
Silicon Image Inc.
Zand Kambiz
LandOfFree
Method and system for encrypting and decrypting data using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for encrypting and decrypting data using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for encrypting and decrypting data using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3742311