Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2000-12-26
2003-02-25
Barrón, Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S153000, C380S030000, C380S043000, C380S232000, C380S285000
Reexamination Certificate
active
06526508
ABSTRACT:
FIELD OF THE INVENTION
The invention concerns systems for protecting information and more particularly concerns systems for protecting information that is transmitted by means of a wired or wireless medium against unauthorized access.
BACKGROUND OF THE INVENTION
One way of distributing information is to broadcast it, that is, to place the information on a medium from which it can be received by any device that is connected to the medium. Television and radio are well-known broadcast media. If one wishes to make money by distributing information on a broadcast medium, there are a couple of alternatives. A first is to find sponsors to pay for broadcasting the information. A second is to permit access to the broadcast information only to those who have paid for it. This is generally done by broadcasting the information in scrambled or encrypted form. Although any device that is connected to the medium can receive the scrambled or encrypted information, only the devices of those users who have paid to have access to the information are able to unscramble or decrypt the information. A service distribution organization, for example a CATV company or a satellite television company, provides its subscribers with information from a number of program sources, that is, collections of certain kinds of information. For example, the History Channel is a program source that provides television programs about history. Each program provided by the History Channel is an “instance” of that program source. When the service distribution organization broadcasts an instance of the program source, it encrypts or scrambles the instance to form encrypted instance. An encrypted instance contains instance data, which is the encrypted information making up the program.
An encrypted instance is broadcast over a transmission medium. The transmission medium may be wireless or it may be “wired”, that is, provided via a wire, a coaxial cable, or a fiber optic cable. It is received in a large number of set top boxes. The function of set-top box is to determine whether encrypted instance should be decrypted and, if so, to decrypt it to produce a decrypted instance comprising the information making up the program. This information is delivered to a television set. Known set top boxes include decryptors to decrypt the encrypted instance.
Subscribers generally purchase services by the month (though a service may be a one-time event), and after a subscriber has purchased a service, the service distribution organization sends the set top box belonging to the subscriber messages required to provide the authorization information for the purchased services. Authorization information may be sent with the instance data or may be sent via a separate channel, for example, via an out-of-band RF link, to a set top box. Various techniques have been employed to encrypt the authorization information. Authorization information may include a key for a service of the service distribution organization and an indication of what programs in the service the subscriber is entitled to watch. If the authorization information indicates that the subscriber is entitled to watch the program of an encrypted instance, the set-top box decrypts the encrypted instance.
It will be appreciated that “encryption” and “scrambling” are similar processes and that “decryption” and “descrambling” are similar processes; a difference is that scrambling and descrambling are generally analog in nature, while encryption and description processes are usually digital.
The access restrictions are required in both analog and digital systems. In all systems, the continued technological improvements being used to overcome the access restrictions require more secure and flexible access restrictions. As more systems switch from an analog format to a digital format, or a hybrid system containing both analog and digital formats, flexible access restrictions will be required.
Restricting access to broadcast information is even more important for digital information. One reason for this is that each copy of digital information is as good as the original; another is that digital information can be compressed, and consequently, a given amount of bandwidth carries much more information in digital form; a third is that the service distribution organizations are adding reverse paths which permit a set-top box to send a message to the service distribution organization, thereby permitting various interactive services.
Thus, the service distribution organizations require access restrictions which are both more secure and more flexible than those in conventional systems.
REFERENCES:
patent: 4155042 (1979-05-01), Permut et al.
patent: 4358672 (1982-11-01), Hyatt et al.
patent: 4388643 (1983-06-01), Aminetzah
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4531020 (1985-07-01), Weschselberger et al.
patent: 4600921 (1986-07-01), Thomas et al.
patent: 4613901 (1986-09-01), Gilhousen et al.
patent: 4634807 (1987-01-01), Chorley et al.
patent: 4649533 (1987-03-01), Chorley et al.
patent: 4658093 (1987-04-01), Hellman
patent: 4712238 (1987-12-01), Gilhousen et al.
patent: 4712239 (1987-12-01), Frezza
patent: 4736422 (1988-04-01), Mason
patent: 4823385 (1989-04-01), Hegendörfer
patent: 4864615 (1989-09-01), Bennett et al.
patent: 4866770 (1989-09-01), Seth-Smith et al.
patent: 4993068 (1989-11-01), Piosenka et al.
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 4887296 (1989-12-01), Horne
patent: RE33189 (1990-03-01), Lee et al.
patent: 4912762 (1990-03-01), Lee et al.
patent: 4982430 (1991-01-01), Frezza et al.
patent: 5003591 (1991-03-01), Kauffman
patent: 5018196 (1991-05-01), Takaragi et al.
patent: 5029207 (1991-07-01), Gammie
patent: 5036537 (1991-07-01), Jeffers et al.
patent: 5073935 (1991-12-01), Pastor
patent: RE33808 (1992-01-01), Wright, Jr.
patent: 5124117 (1992-06-01), Tatebayashi et al.
patent: 5142578 (1992-08-01), Matyas et al.
patent: 5151782 (1992-09-01), Ferraro
patent: 5155591 (1992-10-01), Wachob
patent: 5175765 (1992-12-01), Perlman
patent: 5231665 (1993-07-01), Auld et al.
patent: 5235643 (1993-08-01), Anderson et al.
patent: 5237610 (1993-08-01), Gammie et al.
patent: 5243652 (1993-09-01), Teare et al.
patent: 5249230 (1993-09-01), Mihm, Jr.
patent: 5270822 (1993-12-01), Choi
patent: 5282248 (1994-01-01), DeJoy
patent: 5282249 (1994-01-01), Cohen et al.
patent: 5285497 (1994-02-01), Thatcher, Jr.
patent: 5787172 (1994-02-01), Arnold
patent: 5301233 (1994-04-01), Coutrot et al.
patent: 5341425 (1994-08-01), Wasilewski et al.
patent: 5343527 (1994-08-01), Moore
patent: 5381477 (1995-01-01), Beyers, III et al.
patent: 5381481 (1995-01-01), Gammie et al.
patent: 5400401 (1995-03-01), Wasilewski et al.
patent: 5402490 (1995-03-01), Mihm, Jr.
patent: 5414773 (1995-05-01), Handelman
patent: 5420866 (1995-05-01), Wasilewski
patent: 5425101 (1995-06-01), Woo et al.
patent: 5432542 (1995-07-01), Thibadeau et al.
patent: 5440633 (1995-08-01), Augustine et al.
patent: 5465299 (1995-11-01), Matsumoto et al.
patent: 5675649 (1995-11-01), Brennan et al.
patent: 5473692 (1995-12-01), Davis
patent: 5740246 (1995-12-01), Saito
patent: 5481542 (1996-01-01), Logston et al.
patent: 5481613 (1996-01-01), Ford et al.
patent: 5488410 (1996-01-01), Lieberfarb et al.
patent: 5497422 (1996-03-01), Tysen et al.
patent: 5499294 (1996-03-01), Friedman
patent: 5499295 (1996-03-01), Cooper
patent: 5506904 (1996-04-01), Sheldrick et al.
patent: 5509073 (1996-04-01), Monnin et al.
patent: 5519780 (1996-05-01), Woo et al.
patent: 5524052 (1996-06-01), Augustine et al.
patent: 5550984 (1996-08-01), Gelb
patent: 5557678 (1996-09-01), Ganesan
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5559889 (1996-09-01), Easter et al.
patent: 5563950 (1996-10-01), Easter et al.
patent: 5565909 (1996-10-01), Thibadeau et al.
patent: 5568552 (1996-10-01), Davis
patent: 5568554 (1996-10-01), Eastlake, III
patent: 5583939 (1996-12-01), Chang et al.
patent: 5588058 (1996-12-01), Le Berre
patent: 5590202 (1996-12-01), Bestler et al.
patent: 5621793 (1997-04-01), Bednarek et al.
patent: 5671276 (
Akins, III Glendon L.
Banker Robert O.
Palgon Michael S.
Pinder Howard G.
Wasilewski Anthony J.
Barnhardt, III Hulbert J.
Barrón Gilberto
Couturier Shelley L.
Massaroni Kenneth M.
Scientific-Atlanta, Inc.
LandOfFree
Source authentication of download information in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Source authentication of download information in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Source authentication of download information in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3175060