Protecting information in a system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S151000, C713S153000, C713S166000, C713S168000

Reexamination Certificate

active

06507907

ABSTRACT:

BACKGROUND
The invention relates to protection of information in a system.
Television programming and associated data may be broadcast over a number of different transport media, which may include cable networks, digital satellite television links, and other wired or wireless links. Paid television broadcasts, in which consumers pay for specific programs or channels that they would like to view (e.g., movie channels, pay-per-view programs, etc.), have become increasingly popular. To provide pay television services, conditional access systems have been used by broadcasters to enable viewing of such paid television broadcasts by authorized viewers.
In conditional access systems, broadcast programming content is typically encrypted according to some conditional access cryptographic protocol. In addition, an authorization process typically is performed to enable receipt of encrypted content by authorized receivers. The authorization process may include sending instructions to each of a potentially large population of addressable receivers (such as those located in set-top boxes, for example).
Authorization may be performed by sending an authorization signal that is targeted, or addressed, to a receiver along with the encrypted content. The authorization signal enables the addressed receiver to decrypt the encrypted content according to a conditional access protocol so that a clean copy of the programming content may be produced for viewing.
However, the encrypted information transmitted in a conditional access system may be circumvented relatively easily by unauthorized descramblers. Such unauthorized access causes loss of revenue to service providers as well as degradation of transmitted signals due to extra unexpected loading. Thus a need exists for an improved protection scheme for broadcast signals or other transmitted information.
SUMMARY
In general, according to one embodiment, a method of securely communicating content between a first device and a second device includes sending identification information of the first and second devices to a third device. The third device generates a predetermined message based on the identification information. The first and second devices are authenticated using the predetermined message.
Other features and embodiments will become apparent from the following description and from the claims.


REFERENCES:
patent: 4712238 (1987-12-01), Gilhousen et al.
patent: 5142577 (1992-08-01), Pastor
patent: 5790669 (1998-08-01), Miller et al.
patent: 5796829 (1998-08-01), Newby et al.
patent: 5943426 (1999-08-01), Frith et al.
patent: 6021491 (2000-02-01), Renaud
patent: 6023509 (2000-02-01), Herbert et al.
patent: WO 97/38530 (1997-10-01), None
patent: WO 98/56179 (1998-12-01), None
Bruce Schneier,Applied Cryptography, John Wiley & Sons, Inc., pp. 28-41, 44-46, 429-431, 442-445, 461-466, 476-479, 483-495, 513-516, 532-533, (1996).
Digital Video Broadcasting,DVB Shows Conditional Access Common Sense, pp. 1. printed from web site http://www.dvb.org/dvb_news/dvb_pr025.htm, dated at least as early as Dec. 30, 1998.
Jim Barthold,The Next Digital Transition? A Move To Open Cable, CableLabs Push Making Progress, But It Won't Show Up At The Western Show, pp. 1-3, printed from web site http://www.mediacentral.com/MagazineWorld/News97/1997112413.htm/539128, dated as early as Dec. 8, 1998.
Paragon Cable,Cable Modem FAQ, pp. 1-7, printed from web site http://www.paragonpdx.com/cablemod.html, dated early as Dec. 8, 1998.
Electronic Privacy Information Center,Digital Signatures, pp. 1-2, printed from web site http://www.epic.org/crypto/dss, dated as early as Jan. 14, 1999.
Charlotte Adams,NIST Initiative Will Shine Spotlight On Elliptic Curve, pp. 1-3, printed from web site http://www.fcw.com/pubs/fcw/1997/0609/few-curve-6-9-1997.html, (Jun. 9, 1997).
Electronic Privacy Information Center,CSL Bulletin, pp. 1-6, printed from web site http://www.epic.org/crypto/dss
ist_dss_bulletin.html, (Jan. 1993).
Digital Signature Standard, Fact Sheet On Digital Signature Standard, pp. 1-5, (May 1994).
Office of Telecommunications,The Pricing Of Conditional Access Services For Digital Television, pp. 1-31, (Oct. 1997).
Schneier:Applied Cryptography, 1996, Wiley & Sons, New York XP002138607 pp. 56-63.
Bruce Schneier, John Wiley & Sons, Inc.,Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, p. 39, section “Algorithms and Terminology” (1996).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Protecting information in a system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Protecting information in a system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting information in a system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3015180

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.