Protection of information transmitted over communications...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S163000, C713S168000

Reexamination Certificate

active

06550008

ABSTRACT:

BACKGROUND
The invention relates to protection of information transmitted over communications channels, including transmissions of video content.
Television programming and associated data may be broadcast over a number of different transport media, which may include cable networks, digital satellite television links, and other wired or wireless links. Paid television broadcasts, in which consumers pay for specific programs or channels that they would like to view (e.g., movie channels, pay-per-view programs, etc.), have become increasingly popular. To provide pay television services, conditional access systems have been used by broadcasters to enable viewing of such paid television broadcasts by authorized viewers.
In conditional access systems, broadcast programming content is typically encrypted according to some conditional access cryptographic protocol. In addition, an authorization process typically is performed to enable receipt of encrypted content by authorized receivers. The authorization process may include sending instructions to each of a potentially large population of addressable receivers (such as those located in set-top boxes, for example).
Authorization may be performed by sending an authorization signal that is targeted, or addressed, to a receiver along with the encrypted content. The authorization signal enables the addressed receiver to decrypt the encrypted content according to a conditional access protocol so that a clean copy of the programming content may be produced for viewing.
However, the encrypted information transmitted in a conditional access system may be circumvented relatively easily by unauthorized descramblers. Such unauthorized access causes loss of revenue to service providers as well as degradation of transmitted signals due to extra unexpected loading. Thus a need exists for an improved protection scheme for broadcast signals or other transmitted information.
SUMMARY
In general, according to one embodiment, a method of protecting information communicated between a first and a second device includes generating a request to a third device, the request including information identifying the first and second devices. The third device verifies the first and second devices based on the information in the request. Predetermined information is sent to at least one of the first and second devices, and the first and second devices authenticate each other based on the predetermined information.
Other embodiments and features will become apparent from the following description and from the claims.


REFERENCES:
patent: 4712238 (1987-12-01), Gilhousen et al.
patent: 5796829 (1998-08-01), Newby et al.
patent: 5943426 (1999-08-01), Frith et al.
patent: 6021491 (2000-02-01), Renaud
patent: 6023509 (2000-02-01), Herbert et al.
patent: WO 97/38530 (1997-10-01), None
patent: WO 98/56179 (1998-12-01), None
Menezes, “Handbook of Applied Cryptography”, 1996, sec. 1.9, sec. 9.4.*
Schneier:Applied Cryptography,1996, Wiley & Sons, Ney York XP002138607 pp. 56-63.
Bruce Schneier,Applied Cryptography,John Wiley & Sons, Inc., pp. 28-41, 44-46,429-431, 442-445, 461-466, 476-479, 483-495, 513-516, 532-533, (1996).
Digital Video Broadcasting,DVB Shows Conditional Access Common Sense,pp. 1, printed from web site http://www.dvb.org/dvb-news/dvb-pr025.htm, dated at least as early as Dec. 30, 1998.
Jim Barthold,The Next Digital Transition? A Move To Open Cable, CableLabs Push Making Progress, But It Won't Show Up At The Western Show,pp. 1-3, printed from web site http://www.mediacentral.com/MagazineWorld/News97/1997112413.htm/539128, dated as early as Dec. 8, 1998.
Paragon Cable,Cable Modem FAQ,pp. 1-7, printed from web site http://www.paragonpdx.com/cablemod.html, dated as early as Dec. 8, 1998.
Electronic Privacy Information Center,Digital Signatures,pp. 1-2, printed from web site http://www.epic.org/crypto/dss, dated as early as Jan. 14, 1999.
Charlotte Adams,NIST Initiative Will Shine Spotlight On Elliptic Curve,pp. 1-3, printed from web site http://www.fcw.com/pubs/fcw/1997/0609/few-curve-6-9-1997.html, (Jun. 9, 1997).
Electronic Privacy Information Center,CSL Bulletin,pp. 1-6, printed from web site http://www.epic.org/crypto/dss
ist-dss-bulletin.html, (Jan. 1993).
Digital Signature Standard, Fact Sheet On Digital Signature Standard,pp. 1-5, (May 1994).
Office of Telecommunications, The Pricing Of Conditional Access Services For Digital Television,pp. 1-31, (Oct. 1997).
Bruce Schneier, John Wiley & Sons, Inc.,Applied Cryptography: Protocols, Algorithms, and Source Code in C,Second Edition, P. 39, section “Algorithms and Terminology” (1996).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Protection of information transmitted over communications... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Protection of information transmitted over communications..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protection of information transmitted over communications... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3066687

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.