Securely relaying content using key chains

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S050000

Reexamination Certificate

active

07349886

ABSTRACT:
A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as through the use of Entitlement Management Message (EMM), or the like. In one embodiment, the access key within the EMM may be further encrypted by another encryption key that may be unique to the downstream recipient.

REFERENCES:
patent: 4535355 (1985-08-01), Arn et al.
patent: 4802215 (1989-01-01), Mason
patent: 5870474 (1999-02-01), Wasilewski et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6415031 (2002-07-01), Colligan et al.
patent: 6434535 (2002-08-01), Kupka et al.
patent: 6834110 (2004-12-01), Marconcini et al.
patent: 7039614 (2006-05-01), Candelore
patent: 2002/0001385 (2002-01-01), Kawada et al.
patent: 2002/0015498 (2002-02-01), Houlberg et al.
patent: 2002/0021805 (2002-02-01), Schumann et al.
patent: 2002/0089410 (2002-07-01), Janiak et al.
patent: 2002/0104004 (2002-08-01), Couillard
patent: 2002/0141582 (2002-10-01), Kocher et al.
patent: 2006/0129811 (2006-06-01), Fiske
patent: 0886409 (1998-12-01), None
patent: 2000113587 (2000-04-01), None
patent: WO-01/93212 (2001-12-01), None
Hewitt, R., “North America MPEG-2 Information,” www.coolstf.com/mpeg, pp. 1-34 (2005).
Namba, S., “Technologies and Services on Digital Broadcasting (6); Scrambling (Conditional Access System),” Broadcast Technology, 12:10-13 (2002).
chiariglione.org, “Riding the Media Bits Protecting Content,” www.chiariglione.org/ride/protecting—content/protecting—content.htm, pp. 1-4 (2003).
Wu, Tsung-Li et al., Selective Encryption and Watermarking of MPEG Video (Extended Abstract), Feb. 17, 1997, International Conference on Image Science, Systems, and Technology, 10 pgs.
U.S. Appl. No. 11/361,469, Official Communication mailed May 24, 2007.
U.S. Appl. No. 11/361,469, Official Communication mailed Dec. 20, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Securely relaying content using key chains does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Securely relaying content using key chains, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securely relaying content using key chains will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2808121

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.