Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2008-03-25
2008-03-25
Elisca, Pierre Eddy (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S050000
Reexamination Certificate
active
11388241
ABSTRACT:
A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as through the use of Entitlement Management Message (EMM), or the like. In one embodiment, the access key within the EMM may be further encrypted by another encryption key that may be unique to the downstream recipient.
REFERENCES:
patent: 4535355 (1985-08-01), Arn et al.
patent: 4802215 (1989-01-01), Mason
patent: 5870474 (1999-02-01), Wasilewski et al.
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6415031 (2002-07-01), Colligan et al.
patent: 6434535 (2002-08-01), Kupka et al.
patent: 6834110 (2004-12-01), Marconcini et al.
patent: 7039614 (2006-05-01), Candelore
patent: 2002/0001385 (2002-01-01), Kawada et al.
patent: 2002/0015498 (2002-02-01), Houlberg et al.
patent: 2002/0021805 (2002-02-01), Schumann et al.
patent: 2002/0089410 (2002-07-01), Janiak et al.
patent: 2002/0104004 (2002-08-01), Couillard
patent: 2002/0141582 (2002-10-01), Kocher et al.
patent: 2006/0129811 (2006-06-01), Fiske
patent: 0886409 (1998-12-01), None
patent: 2000113587 (2000-04-01), None
patent: WO-01/93212 (2001-12-01), None
Hewitt, R., “North America MPEG-2 Information,” www.coolstf.com/mpeg, pp. 1-34 (2005).
Namba, S., “Technologies and Services on Digital Broadcasting (6); Scrambling (Conditional Access System),” Broadcast Technology, 12:10-13 (2002).
chiariglione.org, “Riding the Media Bits Protecting Content,” www.chiariglione.org/ride/protecting—content/protecting—content.htm, pp. 1-4 (2003).
Wu, Tsung-Li et al., Selective Encryption and Watermarking of MPEG Video (Extended Abstract), Feb. 17, 1997, International Conference on Image Science, Systems, and Technology, 10 pgs.
U.S. Appl. No. 11/361,469, Official Communication mailed May 24, 2007.
U.S. Appl. No. 11/361,469, Official Communication mailed Dec. 20, 2006.
Morten Glenn A.
Rassool Reza P.
Darby & Darby PC
Elisca Pierre Eddy
Widevine Technologies, Inc.
Wiegand Jamie L.
LandOfFree
Securely relaying content using key chains does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Securely relaying content using key chains, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securely relaying content using key chains will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3928513