Secure transmission of digital content between a host and a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C380S229000, C705S067000, C709S225000

Reexamination Certificate

active

07472270

ABSTRACT:
A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.

REFERENCES:
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5715403 (1998-02-01), Stefik
patent: 6069647 (2000-05-01), Sullivan et al.
patent: 6088802 (2000-07-01), Bialick et al.
patent: 7231517 (2007-06-01), Mashayekhi
patent: 2002/0007456 (2002-01-01), Peinado et al.
patent: 2002/0026583 (2002-02-01), Harrison et al.
patent: 2002/0138442 (2002-09-01), Hori et al.
patent: WO 00/58811 (2000-10-01), None
patent: WO 00/59150 (2000-10-01), None
patent: WO 01/52021 (2001-07-01), None
Schneier, Bruce, Applied Cryptography, 1996, John Wiley & Sons Inc., Second Edition, pp. 48-49.
Schneier, Bruce, Applied Crpytography, 1996, John Wiley & Sons Inc., Second Edition, pp. 48-49.
Griswold, G.N., “A Method for Protecting Copyright on Networks,”IMA Intell. Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 169-178.
Kahn, R. E., “Deposit, Registration, and Recordation in an Electronic Copyright Management System,”IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 111-120.
Weber, R., “Digital Rights Management Technology,” Oct. 1995, 35 pages.
Hanaoka, G. et al., “A Hierarchical Non-interactive Key-sharing Scheme with Low Memory Size and High Resistance Against Collusion Attacks,”Computer Journal, 2002, vol. 45, No. 3, pp. 293-303.
Mizuki, T., “Sharing Unconditionally Secure Secret Keys,”Record of Electrical and Communication Engineering Conversazione Tohoku University, Aug. 2000, 1-186.
Woei-Jiunn Tsaur et al, “Protocols for Designing a Fast and Perfect Group-oriented Secret Key Sharing in Distributed Systems,”Proc. Second Int'l Symposium on Parallel Architectures, Algorithms, and Networks, Jun. 12-14, 1996, Beijing, China, Li, G.-J. et al. (Eds.), IEEE Comput. Soc. Press, Los Alamitos, CA, USA, 1996, 326-9.
Rifa-Coma, J., “How to Avoid the Cheaters Succeeding in the Key Sharing Scheme,”Designs, Codes and Cryptography, Jul. 1993, vol. 3, No. 3, pp. 221-228.
Matsumoto, T. et al., “Crypto-Key Sharing Among Multiple Users,”1986 IEEE Int'l. Sym. On Information Theory(ISIT), Abstracts of Papers (Cat. No. 86CH2374-7) Oct. 6-10, 1986, Ann Arbor, MI, USA, IEEE, NY, 1986, p. 103.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure transmission of digital content between a host and a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure transmission of digital content between a host and a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure transmission of digital content between a host and a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4040578

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.