System and method for a variable key ladder

Cryptography – Video cryptography – Copy protection or prevention

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S042000, C380S044000, C726S026000

Reexamination Certificate

active

07933410

ABSTRACT:
A method of generating encryption and decryption keys for a multiple tier, variable key ladder (VKL) hierarchy includes determining a device key based on network connection and configuration data contained in conditional access system firmware, decrypting and extracting a session or category key from an input media stream or an Entitlement Management Message using the device key, and configuring a key ladder in response to at least one Entitlement Control Message (ECM), wherein the key ladder comprises the device key and at least one of (i) a program key, (ii) the session or category key, and (iii) at least one control word.

REFERENCES:
patent: 4792973 (1988-12-01), Gilhousen et al.
patent: 4860353 (1989-08-01), Brown
patent: 5054067 (1991-10-01), Moroney et al.
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5671276 (1997-09-01), Eyer et al.
patent: 5734720 (1998-03-01), Salganicoff
patent: 5784095 (1998-07-01), Robbins et al.
patent: 5982363 (1999-11-01), Naiff
patent: 6157719 (2000-12-01), Wasilewski et al.
patent: 6271837 (2001-08-01), Naiff
patent: 6424717 (2002-07-01), Pinder et al.
patent: 6748080 (2004-06-01), Russ et al.
patent: 6898285 (2005-05-01), Hutchings et al.
patent: 6944083 (2005-09-01), Pedlow, Jr.
patent: 6976163 (2005-12-01), Hind et al.
patent: 7069452 (2006-06-01), Hind et al.
patent: 2001/0046299 (2001-11-01), Wasilewski et al.
patent: 2002/0080958 (2002-06-01), Ober et al.
patent: 2002/0090090 (2002-07-01), Van Rijnsoever et al.
patent: 2002/0101990 (2002-08-01), Morino et al.
patent: 2002/0118837 (2002-08-01), Hamilton
patent: 2002/0136406 (2002-09-01), Fitzhardinge et al.
patent: 2002/0170054 (2002-11-01), Kudelski et al.
patent: 2003/0002577 (2003-01-01), Pinder
patent: 2003/0097655 (2003-05-01), Novak
patent: 2003/0123667 (2003-07-01), Weber et al.
patent: 2003/0190044 (2003-10-01), Higashi et al.
patent: 2003/0219127 (2003-11-01), Russ et al.
patent: 2004/0003263 (2004-01-01), Brique et al.
patent: 2004/0057579 (2004-03-01), Fahrny
patent: 2004/0088558 (2004-05-01), Candelore
patent: 2004/0098591 (2004-05-01), Fahrny
patent: 2004/0177369 (2004-09-01), Akins, III
patent: 2004/0208316 (2004-10-01), Wack et al.
patent: 2005/0010778 (2005-01-01), Walmsley
patent: 2005/0058291 (2005-03-01), Candelore
patent: 2005/0063541 (2005-03-01), Candelore
patent: 2005/0100161 (2005-05-01), Husemann et al.
patent: 2005/0119967 (2005-06-01), Ishiguro et al.
patent: 2005/0169468 (2005-08-01), Fahrny et al.
patent: 2005/0172132 (2005-08-01), Chen et al.
patent: 2005/0177741 (2005-08-01), Chen et al.
patent: 2006/0031873 (2006-02-01), Fahrny et al.
patent: 2006/0122946 (2006-06-01), Fahrny et al.
patent: 2006/0137015 (2006-06-01), Fahrny et al.
patent: 2006/0153379 (2006-07-01), Candelore et al.
patent: 2006/0200412 (2006-09-01), Fahrny et al.
patent: 2007/0168048 (2007-07-01), Allen et al.
patent: 2007/0206799 (2007-09-01), Wingert et al.
patent: 2008/0086641 (2008-04-01), Rodgers et al.
patent: 2009/0323971 (2009-12-01), Munguia et al.
patent: 03043310 (2003-05-01), None
Cunningham et al., “Secure Pay Per View Testbest”, Networks and Telecommunications Research Group, Trinity College, 1995, p. 1-4.
Tu, Laih and Tung: On Key Distribution Management for Conditional Access System on Pay-TV System, IEEE, 1999, p. 1-8.
ANSI/SCTE 41 2003 (Formerly DVS 301 POD Copy Protection Standard.
FIPS PUB 140-2 “Security Requirements for Cryptographic Modules”, May 25, 2001, http://www.itl.nist.gov/fibspubs/.
FIPS PUB 186-2, “Digital Signature Standard” Federal Information Processing Standards Publication (FIPS PUB), Jan. 27, 2000, http://www.itl.nist.gov/fibspubs/.
FIPS-PUB 180-2, “Secure Hash Standard” Federal Information Processing Standards Publication (FIPS PUB), Aug. 1, 2002, http://www.itl.nist.gov/fibspubs/.
FIPS-PUB 46-3 “Data Encryption Standard”, Oct. 25, 1999 http://csrc.nist.gov/publications/fips/fips46-3/flips46-3.pdf.
FIPS-PUB 81 “DES Modes of Operation”, Dec. 2, 1980; http://www.itl.nist.gov/fipspubs/fip81.htm.
IETF RFC 1750, Randomness Recommendations for Security, (Donald Eastlake, Stephen Crocker and Jeff Schiller), Dec. 1994, www.ietf.org/.
IETF RFC 2104, HMAC: Keyed-Hashing for Message Authentication, (Krawczyk, Bellare, and Canetti), Mar. 1996, www.ietf.org/.
IETF RFC 2630, Cryptographic Message Syntax, (R. Housley), Jun. 1999, www.ietf.org/.
IETF RFC 3280, “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, R. Housley, W. Ford, W. Polk, D. Solo, Jan. 2002, www.ietf.org/.
RSA1, “PKCS #1: RSA Encryption Standard”, Version 1.5, RSA Laboratories, Nov. 1993 2.2 Reference Acquisition, http://www.rsasecurity.com/rsalabs/pkcs/.
CableLabs Specifications, www.opencable.com, p. 1.
Hopper, Andy, A Network Striped Storage System for Video on Demand, article, http://citeseer.ist.psu.edu/26010.html.
“Explorer 4200HD Home Gateway” Copyright 2002 Scientific Atlanta Inc. http://www.sciatl.com/products/consumers/userguidepdfs/4001344.pdf.
Jim Lyle, “HDCP: what it is and how to use it” Originally Published Apr. 18, 2002 pp. 1-5, and Figures 1-6. http://www.edn.com/index.asp?layout=articlePrint&articleID=CA209091.
FCC News: Commission Adopts “Navigation Devices” Rules Creating Consumer Market for Set Top Boxes and Other Equipment Used with Video Programming Systems (CS Docket 97-80). Originally Published Jun. 11, 1998 pp. 1-3 http://www.fcc.gov/Bureaus/Cable/News—Releases/1998
rcb8013.html.
International Preliminary Report on Patentability and Written Opinion for PCT/US06/01673, mailed Apr. 2, 2009.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for a variable key ladder does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for a variable key ladder, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for a variable key ladder will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2646019

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.