Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
1999-02-26
2003-04-15
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S163000, C713S168000
Reexamination Certificate
active
06550008
ABSTRACT:
BACKGROUND
The invention relates to protection of information transmitted over communications channels, including transmissions of video content.
Television programming and associated data may be broadcast over a number of different transport media, which may include cable networks, digital satellite television links, and other wired or wireless links. Paid television broadcasts, in which consumers pay for specific programs or channels that they would like to view (e.g., movie channels, pay-per-view programs, etc.), have become increasingly popular. To provide pay television services, conditional access systems have been used by broadcasters to enable viewing of such paid television broadcasts by authorized viewers.
In conditional access systems, broadcast programming content is typically encrypted according to some conditional access cryptographic protocol. In addition, an authorization process typically is performed to enable receipt of encrypted content by authorized receivers. The authorization process may include sending instructions to each of a potentially large population of addressable receivers (such as those located in set-top boxes, for example).
Authorization may be performed by sending an authorization signal that is targeted, or addressed, to a receiver along with the encrypted content. The authorization signal enables the addressed receiver to decrypt the encrypted content according to a conditional access protocol so that a clean copy of the programming content may be produced for viewing.
However, the encrypted information transmitted in a conditional access system may be circumvented relatively easily by unauthorized descramblers. Such unauthorized access causes loss of revenue to service providers as well as degradation of transmitted signals due to extra unexpected loading. Thus a need exists for an improved protection scheme for broadcast signals or other transmitted information.
SUMMARY
In general, according to one embodiment, a method of protecting information communicated between a first and a second device includes generating a request to a third device, the request including information identifying the first and second devices. The third device verifies the first and second devices based on the information in the request. Predetermined information is sent to at least one of the first and second devices, and the first and second devices authenticate each other based on the predetermined information.
Other embodiments and features will become apparent from the following description and from the claims.
REFERENCES:
patent: 4712238 (1987-12-01), Gilhousen et al.
patent: 5796829 (1998-08-01), Newby et al.
patent: 5943426 (1999-08-01), Frith et al.
patent: 6021491 (2000-02-01), Renaud
patent: 6023509 (2000-02-01), Herbert et al.
patent: WO 97/38530 (1997-10-01), None
patent: WO 98/56179 (1998-12-01), None
Menezes, “Handbook of Applied Cryptography”, 1996, sec. 1.9, sec. 9.4.*
Schneier:Applied Cryptography,1996, Wiley & Sons, Ney York XP002138607 pp. 56-63.
Bruce Schneier,Applied Cryptography,John Wiley & Sons, Inc., pp. 28-41, 44-46,429-431, 442-445, 461-466, 476-479, 483-495, 513-516, 532-533, (1996).
Digital Video Broadcasting,DVB Shows Conditional Access Common Sense,pp. 1, printed from web site http://www.dvb.org/dvb-news/dvb-pr025.htm, dated at least as early as Dec. 30, 1998.
Jim Barthold,The Next Digital Transition? A Move To Open Cable, CableLabs Push Making Progress, But It Won't Show Up At The Western Show,pp. 1-3, printed from web site http://www.mediacentral.com/MagazineWorld/News97/1997112413.htm/539128, dated as early as Dec. 8, 1998.
Paragon Cable,Cable Modem FAQ,pp. 1-7, printed from web site http://www.paragonpdx.com/cablemod.html, dated as early as Dec. 8, 1998.
Electronic Privacy Information Center,Digital Signatures,pp. 1-2, printed from web site http://www.epic.org/crypto/dss, dated as early as Jan. 14, 1999.
Charlotte Adams,NIST Initiative Will Shine Spotlight On Elliptic Curve,pp. 1-3, printed from web site http://www.fcw.com/pubs/fcw/1997/0609/few-curve-6-9-1997.html, (Jun. 9, 1997).
Electronic Privacy Information Center,CSL Bulletin,pp. 1-6, printed from web site http://www.epic.org/crypto/dss
ist-dss-bulletin.html, (Jan. 1993).
Digital Signature Standard, Fact Sheet On Digital Signature Standard,pp. 1-5, (May 1994).
Office of Telecommunications, The Pricing Of Conditional Access Services For Digital Television,pp. 1-31, (Oct. 1997).
Bruce Schneier, John Wiley & Sons, Inc.,Applied Cryptography: Protocols, Algorithms, and Source Code in C,Second Edition, P. 39, section “Algorithms and Terminology” (1996).
Takahashi Richard J.
Zhang Minda
Intel Corporation
Peeso Thomas R.
Trop Pruner & Hu P.C.
LandOfFree
Protection of information transmitted over communications... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protection of information transmitted over communications..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protection of information transmitted over communications... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3066687